diff options
author | Alexandre Chartre <alexandre.chartre@oracle.com> | 2022-06-15 00:15:49 +0300 |
---|---|---|
committer | Borislav Petkov <bp@suse.de> | 2022-06-27 11:33:59 +0300 |
commit | 6b80b59b3555706508008f1f127b5412c89c7fd8 (patch) | |
tree | edd7ed146b9599cf45c2d4a5f479999b85b4aca8 /tools/perf/scripts/python/exported-sql-viewer.py | |
parent | a149180fbcf336e97ce4eb2cdc13672727feb94d (diff) | |
download | linux-6b80b59b3555706508008f1f127b5412c89c7fd8.tar.xz |
x86/bugs: Report AMD retbleed vulnerability
Report that AMD x86 CPUs are vulnerable to the RETBleed (Arbitrary
Speculative Code Execution with Return Instructions) attack.
[peterz: add hygon]
[kim: invert parity; fam15h]
Co-developed-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Kim Phillips <kim.phillips@amd.com>
Signed-off-by: Alexandre Chartre <alexandre.chartre@oracle.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
Reviewed-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Borislav Petkov <bp@suse.de>
Diffstat (limited to 'tools/perf/scripts/python/exported-sql-viewer.py')
0 files changed, 0 insertions, 0 deletions