[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <YM7nUwsJ+1v66B9m@zn.tnic>
Date: Sun, 20 Jun 2021 08:59:31 +0200
From: Borislav Petkov <bp@...e.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v5.13-rc6
Hi Linus,
here are some x86/urgent fixes before 5.13 releases. This time, I'm not
even going to think of saying that they're the last batch. :)
Please pull,
thx.
---
The following changes since commit 614124bea77e452aa6df7a8714e8bc820b489922:
Linux 5.13-rc5 (2021-06-06 15:47:27 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v5.13_rc6
for you to fetch changes up to 28e5e44aa3f4e0e0370864ed008fb5e2d85f4dc8:
x86/mm: Avoid truncating memblocks for SGX memory (2021-06-18 19:37:01 +0200)
----------------------------------------------------------------
A first set of urgent fixes to the FPU/XSTATE handling mess^W code.
(There's a lot more in the pipe):
- Prevent corruption of the XSTATE buffer in signal handling by
validating what is being copied from userspace first.
- Invalidate other task's preserved FPU registers on XRSTOR failure
(#PF) because latter can still modify some of them.
- Restore the proper PKRU value in case userspace modified it
- Reset FPU state when signal restoring fails
Other:
- Map EFI boot services data memory as encrypted in a SEV guest so that
the guest can access it and actually boot properly
- Two SGX correctness fixes: proper resources freeing and a NUMA fix
----------------------------------------------------------------
Andy Lutomirski (1):
x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer
Fan Du (1):
x86/mm: Avoid truncating memblocks for SGX memory
Kai Huang (1):
x86/sgx: Add missing xa_destroy() when virtual EPC is destroyed
Thomas Gleixner (4):
x86/fpu: Prevent state corruption in __fpu__restore_sig()
x86/process: Check PF_KTHREAD and not current->mm for kernel threads
x86/pkru: Write hardware init value to PKRU when xstate is init
x86/fpu: Reset state for all signal restore failures
Tom Lendacky (1):
x86/ioremap: Map EFI-reserved memory as encrypted for SEV
arch/x86/include/asm/fpu/internal.h | 13 ++++++---
arch/x86/kernel/cpu/sgx/virt.c | 1 +
arch/x86/kernel/fpu/signal.c | 54 ++++++++++++++++++++++++-------------
arch/x86/mm/ioremap.c | 4 ++-
arch/x86/mm/numa.c | 8 +++++-
5 files changed, 56 insertions(+), 24 deletions(-)
--
Regards/Gruss,
Boris.
SUSE Software Solutions Germany GmbH, GF: Felix Imendörffer, HRB 36809, AG Nürnberg
Powered by blists - more mailing lists