diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2021-03-14 22:48:10 +0300 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2021-03-14 22:48:10 +0300 |
commit | 0a7c10df49eb69dd888ea8b8ddd29bde2aa2fd48 (patch) | |
tree | 433e5a9f1252cea52ff4a5dac2ec4b9d8be09a34 /drivers/firmware | |
parent | c3c7579f5e3b4826d32af0521e53d5d565ed5a73 (diff) | |
parent | bffe30dd9f1f3b2608a87ac909a224d6be472485 (diff) | |
download | linux-0a7c10df49eb69dd888ea8b8ddd29bde2aa2fd48.tar.xz |
Merge tag 'x86_urgent_for_v5.12_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Borislav Petkov:
- A couple of SEV-ES fixes and robustifications: verify usermode stack
pointer in NMI is not coming from the syscall gap, correctly track
IRQ states in the #VC handler and access user insn bytes atomically
in same handler as latter cannot sleep.
- Balance 32-bit fast syscall exit path to do the proper work on exit
and thus not confuse audit and ptrace frameworks.
- Two fixes for the ORC unwinder going "off the rails" into KASAN
redzones and when ORC data is missing.
* tag 'x86_urgent_for_v5.12_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
x86/sev-es: Use __copy_from_user_inatomic()
x86/sev-es: Correctly track IRQ states in runtime #VC handler
x86/sev-es: Check regs->sp is trusted before adjusting #VC IST stack
x86/sev-es: Introduce ip_within_syscall_gap() helper
x86/entry: Fix entry/exit mismatch on failed fast 32-bit syscalls
x86/unwind/orc: Silence warnings caused by missing ORC data
x86/unwind/orc: Disable KASAN checking in the ORC unwinder, part 2
Diffstat (limited to 'drivers/firmware')
0 files changed, 0 insertions, 0 deletions