summaryrefslogtreecommitdiffstats
path: root/tools/perf/util/cs-etm-decoder/cs-etm-decoder.c
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2023-03-05 20:27:48 +0100
committerLinus Torvalds <torvalds@linux-foundation.org>2023-03-05 20:27:48 +0100
commit7f9ec7d8169b5281eff2b907d8ffb1bf56045f73 (patch)
treea48e3363789751bf9df08caf409248e04a9ce0c3 /tools/perf/util/cs-etm-decoder/cs-etm-decoder.c
parentMerge tag 'irq-urgent-2023-03-05' of git://git.kernel.org/pub/scm/linux/kerne... (diff)
parentvirt/sev-guest: Return -EIO if certificate buffer is not large enough (diff)
downloadlinux-7f9ec7d8169b5281eff2b907d8ffb1bf56045f73.tar.xz
linux-7f9ec7d8169b5281eff2b907d8ffb1bf56045f73.zip
Merge tag 'x86-urgent-2023-03-05' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 updates from Thomas Gleixner: "A small set of updates for x86: - Return -EIO instead of success when the certificate buffer for SEV guests is not large enough - Allow STIPB to be enabled with legacy IBSR. Legacy IBRS is cleared on return to userspace for performance reasons, but the leaves user space vulnerable to cross-thread attacks which STIBP prevents. Update the documentation accordingly" * tag 'x86-urgent-2023-03-05' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: virt/sev-guest: Return -EIO if certificate buffer is not large enough Documentation/hw-vuln: Document the interaction between IBRS and STIBP x86/speculation: Allow enabling STIBP with legacy IBRS
Diffstat (limited to 'tools/perf/util/cs-etm-decoder/cs-etm-decoder.c')
0 files changed, 0 insertions, 0 deletions