summaryrefslogtreecommitdiffstats
path: root/tools/perf/util/scripting-engines/trace-event-python.c
diff options
context:
space:
mode:
authorPawan Gupta <pawan.kumar.gupta@linux.intel.com>2022-05-19 20:34:14 -0700
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2022-06-16 13:23:32 +0200
commitd961592635932bd1ea32a534412a41fb794e2212 (patch)
tree0b467ccbfb42bd267160097741cef5e2487e6086 /tools/perf/util/scripting-engines/trace-event-python.c
parentbc64f38b5a3839f14896cb9e2de7614d47151fc3 (diff)
downloadlinux-stable-d961592635932bd1ea32a534412a41fb794e2212.tar.gz
linux-stable-d961592635932bd1ea32a534412a41fb794e2212.tar.bz2
linux-stable-d961592635932bd1ea32a534412a41fb794e2212.zip
x86/speculation/mmio: Reuse SRBDS mitigation for SBDS
commit a992b8a4682f119ae035a01b40d4d0665c4a2875 upstream The Shared Buffers Data Sampling (SBDS) variant of Processor MMIO Stale Data vulnerabilities may expose RDRAND, RDSEED and SGX EGETKEY data. Mitigation for this is added by a microcode update. As some of the implications of SBDS are similar to SRBDS, SRBDS mitigation infrastructure can be leveraged by SBDS. Set X86_BUG_SRBDS and use SRBDS mitigation. Mitigation is enabled by default; use srbds=off to opt-out. Mitigation status can be checked from below file: /sys/devices/system/cpu/vulnerabilities/srbds Signed-off-by: Pawan Gupta <pawan.kumar.gupta@linux.intel.com> Signed-off-by: Borislav Petkov <bp@suse.de> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions