diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2023-03-05 20:27:48 +0100 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2023-03-05 20:27:48 +0100 |
commit | 7f9ec7d8169b5281eff2b907d8ffb1bf56045f73 (patch) | |
tree | a48e3363789751bf9df08caf409248e04a9ce0c3 /net/batman-adv/soft-interface.c | |
parent | Merge tag 'irq-urgent-2023-03-05' of git://git.kernel.org/pub/scm/linux/kerne... (diff) | |
parent | virt/sev-guest: Return -EIO if certificate buffer is not large enough (diff) | |
download | linux-7f9ec7d8169b5281eff2b907d8ffb1bf56045f73.tar.xz linux-7f9ec7d8169b5281eff2b907d8ffb1bf56045f73.zip |
Merge tag 'x86-urgent-2023-03-05' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 updates from Thomas Gleixner:
"A small set of updates for x86:
- Return -EIO instead of success when the certificate buffer for SEV
guests is not large enough
- Allow STIPB to be enabled with legacy IBSR. Legacy IBRS is cleared
on return to userspace for performance reasons, but the leaves user
space vulnerable to cross-thread attacks which STIBP prevents.
Update the documentation accordingly"
* tag 'x86-urgent-2023-03-05' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
virt/sev-guest: Return -EIO if certificate buffer is not large enough
Documentation/hw-vuln: Document the interaction between IBRS and STIBP
x86/speculation: Allow enabling STIBP with legacy IBRS
Diffstat (limited to 'net/batman-adv/soft-interface.c')
0 files changed, 0 insertions, 0 deletions