[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20201008191623.2881677-1-nivedita@alum.mit.edu>
Date: Thu, 8 Oct 2020 15:16:18 -0400
From: Arvind Sankar <nivedita@...m.mit.edu>
To: x86@...nel.org, Joerg Roedel <jroedel@...e.de>,
Borislav Petkov <bp@...en8.de>
Cc: linux-kernel@...r.kernel.org
Subject: [PATCH v2 0/5] Couple of bugfixes to sev-es series
With the SEV-ES series, the kernel command line is no longer guaranteed
to be mapped on entry into the main kernel. This fixes that, and a
stackprotector issue that cropped up on head64.c.
The first three patches are preparatory cleanups. Patch 4 fixes the
mapping issue and patch 5 disables stack protector for head code.
Changes from v1:
- Add comments suggested by Joerg
- Split out cmdline into cmdline.h and use it
- Leave add_identity_map() as [start,end)
v1: https://lore.kernel.org/lkml/20201007195351.776555-1-nivedita@alum.mit.edu/
Arvind Sankar (5):
x86/boot: Initialize boot_params in startup code
x86/boot: Split out command-line related declarations
x86/boot/64: Show original faulting address in case of error
x86/boot/64: Explicitly map boot_params and command line
x86/head/64: Disable stack protection for head$(BITS).o
arch/x86/boot/compressed/acpi.c | 1 +
arch/x86/boot/compressed/cmdline.c | 1 +
arch/x86/boot/compressed/cmdline.h | 13 +++++++
.../boot/compressed/early_serial_console.c | 1 +
arch/x86/boot/compressed/head_32.S | 12 ++++---
arch/x86/boot/compressed/head_64.S | 35 +++++++------------
arch/x86/boot/compressed/ident_map_64.c | 22 +++++++++---
arch/x86/boot/compressed/kaslr.c | 7 +---
arch/x86/boot/compressed/misc.c | 10 +-----
arch/x86/boot/compressed/misc.h | 4 ---
arch/x86/boot/compressed/pgtable_64.c | 7 ++--
arch/x86/kernel/Makefile | 2 ++
12 files changed, 58 insertions(+), 57 deletions(-)
create mode 100644 arch/x86/boot/compressed/cmdline.h
--
2.26.2
Powered by blists - more mailing lists