summaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/stackcollapse.py
diff options
context:
space:
mode:
authorDavid Kaplan <david.kaplan@amd.com>2025-01-08 23:24:41 +0300
committerBorislav Petkov (AMD) <bp@alien8.de>2025-02-28 14:34:30 +0300
commit98c7a713db91c5a9a7ffc47cd85e7158e0963cb8 (patch)
treeef411f3eb9b069dcdcd1fb372859c4803208534a /tools/perf/scripts/python/stackcollapse.py
parent8f64eee70cdd3bb8c3ec7d30f0d1f52922aaef7c (diff)
downloadlinux-98c7a713db91c5a9a7ffc47cd85e7158e0963cb8.tar.xz
x86/bugs: Add X86_BUG_SPECTRE_V2_USER
All CPU vulnerabilities with command line options map to a single X86_BUG bit except for Spectre V2 where both the spectre_v2 and spectre_v2_user command line options are related to the same bug. The spectre_v2 command line options mostly relate to user->kernel and guest->host mitigations, while the spectre_v2_user command line options relate to user->user or guest->guest protections. Define a new X86_BUG bit for spectre_v2_user so each *_select_mitigation() function in bugs.c is related to a unique X86_BUG bit. No functional changes. Signed-off-by: David Kaplan <david.kaplan@amd.com> Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de> Link: https://lore.kernel.org/r/20250108202515.385902-2-david.kaplan@amd.com
Diffstat (limited to 'tools/perf/scripts/python/stackcollapse.py')
0 files changed, 0 insertions, 0 deletions