[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <YKoqk6WplkzaAitt@zn.tnic>
Date: Sun, 23 May 2021 12:12:35 +0200
From: Borislav Petkov <bp@...e.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v5.13-rc3
Hi Linus,
please pull a couple of x86/urgent fixes which accumulated recently.
Thx.
---
The following changes since commit d07f6ca923ea0927a1024dfccafc5b53b61cfecc:
Linux 5.13-rc2 (2021-05-16 15:27:44 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v5.13_rc3
for you to fetch changes up to 4954f5b8ef0baf70fe978d1a99a5f70e4dd5c877:
x86/sev-es: Use __put_user()/__get_user() for data accesses (2021-05-19 18:45:37 +0200)
----------------------------------------------------------------
- Fix how SEV handles MMIO accesses by forwarding potential page faults instead
of killing the machine and by using the accessors with the exact functionality
needed when accessing memory.
- Fix a confusion with Clang LTO compiler switches passed to the it
- Handle the case gracefully when VMGEXIT has been executed in userspace
----------------------------------------------------------------
Joerg Roedel (3):
x86/sev-es: Don't return NULL from sev_es_get_ghcb()
x86/sev-es: Forward page-faults which happen during emulation
x86/sev-es: Use __put_user()/__get_user() for data accesses
Nathan Chancellor (1):
x86/build: Fix location of '-plugin-opt=' flags
Tom Lendacky (2):
x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch
x86/sev-es: Invalidate the GHCB after completing VMGEXIT
arch/x86/Makefile | 12 ++--
arch/x86/kernel/sev-shared.c | 1 +
arch/x86/kernel/sev.c | 136 +++++++++++++++++++++++++++----------------
3 files changed, 92 insertions(+), 57 deletions(-)
--
Regards/Gruss,
Boris.
SUSE Software Solutions Germany GmbH, GF: Felix Imendörffer, HRB 36809, AG Nürnberg
Powered by blists - more mailing lists