diff options
author | Borislav Petkov (AMD) <bp@alien8.de> | 2025-04-10 13:42:22 +0200 |
---|---|---|
committer | Ingo Molnar <mingo@kernel.org> | 2025-04-12 21:09:42 +0200 |
commit | 805b743fc163f1abef7ce1bea8eca8dfab5b685b (patch) | |
tree | 4521eab286025ab01a583e7d57c894c232b478b6 /tools/perf/scripts/python/stackcollapse.py | |
parent | 164a9f712fa53e4c92b2a435bb071a5be0c31dbc (diff) | |
download | linux-805b743fc163f1abef7ce1bea8eca8dfab5b685b.tar.gz linux-805b743fc163f1abef7ce1bea8eca8dfab5b685b.tar.bz2 linux-805b743fc163f1abef7ce1bea8eca8dfab5b685b.zip |
x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches
All Zen5 machines out there should get BIOS updates which update to the
correct microcode patches addressing the microcode signature issue.
However, silly people carve out random microcode blobs from BIOS
packages and think are doing other people a service this way...
Block loading of any unreleased standalone Zen5 microcode patches.
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: <stable@kernel.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Maciej S. Szmigiero <mail@maciej.szmigiero.name>
Cc: Nikolay Borisov <nik.borisov@suse.com>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Link: https://lore.kernel.org/r/20250410114222.32523-1-bp@kernel.org
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions