aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/tools/perf/scripts/python
diff options
context:
space:
mode:
authorTony Luck <tony.luck@intel.com>2025-08-14 09:17:06 -0700
committerRafael J. Wysocki <rafael.j.wysocki@intel.com>2025-08-18 18:07:38 +0200
commit6c705851499172c0ce863e816946fb5a564ff69f (patch)
treeff5fb9089e5e2bcb66314cc99a9b9bb679fc2da7 /tools/perf/scripts/python
parentLinux 6.17-rc2 (diff)
downloadwireguard-linux-6c705851499172c0ce863e816946fb5a564ff69f.tar.xz
wireguard-linux-6c705851499172c0ce863e816946fb5a564ff69f.zip
ACPI: APEI: EINJ: Check if user asked for EINJV2 injection
On an EINJV2 capable system, users may still use the old injection interface but einj_get_parameter_address() takes the EINJV2 path to map the parameter structure. This results in the address the user supplied being stored to the wrong location and the BIOS injecting based on an uninitialized field (0x0 in the reported case). Check the version of the request when mapping the EINJ parameter structure in BIOS reserved memory. Fixes: 691a0f0a557b ("ACPI: APEI: EINJ: Discover EINJv2 parameters") Reported-by: Lai, Yi1 <yi1.lai@intel.com> Signed-off-by: Tony Luck <tony.luck@intel.com> Reviewed-by: Zaid Alali <zaidal@os.amperecomputing.com> Reviewed-by: Hanjun Guo <gouhanjun@huawei.com> Link: https://patch.msgid.link/20250814161706.4489-1-tony.luck@intel.com Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions