From nobody Fri Dec 19 05:06:35 2025 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2A760C04A6A for ; Fri, 11 Aug 2023 20:37:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236662AbjHKUhP (ORCPT ); Fri, 11 Aug 2023 16:37:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51506 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229771AbjHKUhN (ORCPT ); Fri, 11 Aug 2023 16:37:13 -0400 Received: from madras.collabora.co.uk (madras.collabora.co.uk [IPv6:2a00:1098:0:82:1000:25:2eeb:e5ab]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 71345120; Fri, 11 Aug 2023 13:37:12 -0700 (PDT) Received: from localhost (unknown [86.122.17.29]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: cristicc) by madras.collabora.co.uk (Postfix) with ESMTPSA id 659C266071A1; Fri, 11 Aug 2023 21:37:10 +0100 (BST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=collabora.com; s=mail; t=1691786230; bh=mtF0mCsh4R/MZePtjuIheuk3+v28lUM1yrXv3yXp1jQ=; h=From:To:Cc:Subject:Date:From; b=dzFp1qFm0XV6kq4YGRuxCTmeLxZ7DiFsmH45CbDchgvXl46jP8q7mg7X1enhBaM37 ucvVjNcMBgZ/g0znpcLqLevXgpAB34ZaTFL+aYPTolEMGrS3SEJoceCaNjFARafEXy kZ/p/AgECnLWDy/B4pk/EU475IM4zKsPZmNXxeK0T80+YtgOanxaaz1fOVq7GnDtbq TPzvFHY9ieXOuVg/5MrUa/z86aNRN5Gxj8MUOO01n8hRxgaL/dUtwKjj0cuNio4Xa5 Nm/b6qUiC7uwcXcMtEhK90Mg1pMPDv69dNESTJ/iragpDTox4RsZh6QAH5RPFw/32k B2Z/s3ZAOS/mQ== From: Cristian Ciocaltea To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Alexey Kardashevskiy , "Jason A. Donenfeld" , Chuck Lever , Juergen Gross , Jakub Kicinski , Kim Phillips , Heiko Carstens , Andrew Cooper Cc: x86@kernel.org, linux-kernel@vger.kernel.org, kernel@collabora.com, stable@vger.kernel.org Subject: [PATCH] x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 Date: Fri, 11 Aug 2023 23:37:05 +0300 Message-ID: <20230811203705.1699914-1-cristian.ciocaltea@collabora.com> X-Mailer: git-send-email 2.41.0 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" Commit 522b1d69219d ("x86/cpu/amd: Add a Zenbleed fix") provided a fix for the Zen2 VZEROUPPER data corruption bug affecting a range of CPU models, but the AMD Custom APU 0405 found on SteamDeck was not listed, although it is clearly affected by the vulnerability. Add this CPU variant to the Zenbleed erratum list, in order to unconditionally enable the fallback fix until a proper microcode update is available. Cc: stable@vger.kernel.org Signed-off-by: Cristian Ciocaltea --- arch/x86/kernel/cpu/amd.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c index b55d8f82b621..70f9d56f9305 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -73,6 +73,7 @@ static const int amd_erratum_1054[] =3D static const int amd_zenbleed[] =3D AMD_LEGACY_ERRATUM(AMD_MODEL_RANGE(0x17, 0x30, 0x0, 0x4f, 0xf), AMD_MODEL_RANGE(0x17, 0x60, 0x0, 0x7f, 0xf), + AMD_MODEL_RANGE(0x17, 0x90, 0x0, 0x91, 0xf), AMD_MODEL_RANGE(0x17, 0xa0, 0x0, 0xaf, 0xf)); =20 static const int amd_div0[] =3D --=20 2.41.0