[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20201007195351.776555-1-nivedita@alum.mit.edu>
Date: Wed, 7 Oct 2020 15:53:46 -0400
From: Arvind Sankar <nivedita@...m.mit.edu>
To: x86@...nel.org, Joerg Roedel <jroedel@...e.de>
Cc: linux-kernel@...r.kernel.org
Subject: [PATCH 0/5] Couple of bugfixes to sev-es series
With the SEV-ES series, the kernel command line is no longer guaranteed
to be mapped on entry into the main kernel. This fixes that, and a
stackprotector issue that cropped up on head64.c.
The first three patches are preparatory cleanups. Patch 4 fixes the
mapping issue and patch 5 disables stack protector for head code.
Arvind Sankar (5):
x86/boot: Initialize boot_params in startup code
x86/boot: Move get_cmd_line_ptr() and COMMAND_LINE_SIZE into misc.h
x86/boot/64: Change add_identity_map() to take size for ease of use
x86/boot/64: Explicitly map boot_params and command line
x86/head/64: Disable stack protection for head$(BITS).o
arch/x86/boot/compressed/cmdline.c | 8 ------
arch/x86/boot/compressed/head_32.S | 11 ++++----
arch/x86/boot/compressed/head_64.S | 34 ++++++++-----------------
arch/x86/boot/compressed/ident_map_64.c | 18 ++++++-------
arch/x86/boot/compressed/kaslr.c | 6 -----
arch/x86/boot/compressed/misc.c | 10 +-------
arch/x86/boot/compressed/misc.h | 13 ++++++++++
arch/x86/boot/compressed/pgtable_64.c | 5 +---
arch/x86/kernel/Makefile | 2 ++
9 files changed, 43 insertions(+), 64 deletions(-)
--
2.26.2
Powered by blists - more mailing lists