summaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/exported-sql-viewer.py
diff options
context:
space:
mode:
authorPawan Gupta <pawan.kumar.gupta@linux.intel.com>2022-05-19 20:33:13 -0700
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2022-06-16 13:23:32 +0200
commitbc64f38b5a3839f14896cb9e2de7614d47151fc3 (patch)
tree400fcaec97ecd90a114ba175f60bf9b8e08e9ba0 /tools/perf/scripts/python/exported-sql-viewer.py
parent020ce7495cfccec17693bf58b42282707dece24d (diff)
downloadlinux-stable-bc64f38b5a3839f14896cb9e2de7614d47151fc3.tar.gz
linux-stable-bc64f38b5a3839f14896cb9e2de7614d47151fc3.tar.bz2
linux-stable-bc64f38b5a3839f14896cb9e2de7614d47151fc3.zip
x86/speculation/srbds: Update SRBDS mitigation selection
commit 22cac9c677c95f3ac5c9244f8ca0afdc7c8afb19 upstream Currently, Linux disables SRBDS mitigation on CPUs not affected by MDS and have the TSX feature disabled. On such CPUs, secrets cannot be extracted from CPU fill buffers using MDS or TAA. Without SRBDS mitigation, Processor MMIO Stale Data vulnerabilities can be used to extract RDRAND, RDSEED, and EGETKEY data. Do not disable SRBDS mitigation by default when CPU is also affected by Processor MMIO Stale Data vulnerabilities. Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> Signed-off-by: Borislav Petkov <bp@suse.de> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'tools/perf/scripts/python/exported-sql-viewer.py')
0 files changed, 0 insertions, 0 deletions