linux-stable/Documentation/arch
Borislav Petkov (AMD) ecd16da39d x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT
commit 2995674833 upstream.

It was meant well at the time but nothing's using it so get rid of it.

Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Acked-by: Ard Biesheuvel <ardb@kernel.org>
Link: https://lore.kernel.org/r/20240202163510.GDZb0Zvj8qOndvFOiZ@fat_crate.local
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2024-04-03 15:28:50 +02:00
..
arc docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
arm docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
arm64 arm64: Subscribe Microsoft Azure Cobalt 100 to ARM Neoverse N2 errata 2024-02-23 09:25:14 +01:00
ia64 Documentation/arch/ia64/features.rst: fix kernel-feat directive 2024-02-23 09:25:28 +01:00
loongarch docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
m68k docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
mips docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
nios2 docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
openrisc docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
parisc docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
s390 docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
sh docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
sparc docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
x86 x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT 2024-04-03 15:28:50 +02:00
xtensa docs: kernel_feat.py: fix potential command injection 2024-01-31 16:18:46 -08:00
index.rst Documentation work keeps chugging along; stuff for 6.6 includes: 2023-08-30 20:05:42 -07:00