[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230526120225.31936-1-kirill.shutemov@linux.intel.com>
Date: Fri, 26 May 2023 15:02:22 +0300
From: "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
To: dave.hansen@...el.com, tglx@...utronix.de, mingo@...hat.com,
bp@...en8.de
Cc: decui@...rosoft.com, rick.p.edgecombe@...el.com,
sathyanarayanan.kuppuswamy@...ux.intel.com, seanjc@...gle.com,
thomas.lendacky@....com, x86@...nel.org,
linux-kernel@...r.kernel.org,
"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
Subject: [PATCHv2 0/3] x86/tdx: Fix one more load_unaligned_zeropad() issue
During review of TDX guests on Hyper-V patchset Dave pointed to the
potential race between changing page private/shared status and
load_unaligned_zeropad().
Fix the issue.
v2:
- Add more info in commit message of the first patch.
- Move enc_status_change_finish_noop() into a separate patch.
- Fix typo in commit message and comment.
Kirill A. Shutemov (3):
x86/mm: Allow guest.enc_status_change_prepare() to fail
x86/tdx: Fix race between set_memory_encrypted() and
load_unaligned_zeropad()
x86/mm: Fix enc_status_change_finish_noop()
arch/x86/coco/tdx/tdx.c | 56 +++++++++++++++++++++++++++++++--
arch/x86/include/asm/x86_init.h | 2 +-
arch/x86/kernel/x86_init.c | 4 +--
arch/x86/mm/mem_encrypt_amd.c | 4 ++-
arch/x86/mm/pat/set_memory.c | 3 +-
5 files changed, 61 insertions(+), 8 deletions(-)
--
2.39.3
Powered by blists - more mailing lists