diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2021-06-20 09:09:58 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2021-06-20 09:09:58 -0700 |
commit | 8363e795eb79a74c857ba89e3b04668a33fe3344 (patch) | |
tree | edfdbfa3be22e945ce84260d2a48b7fb6cdac210 /drivers/phy/phy-core.c | |
parent | b84a7c286cecf0604a5f8bd5dfcd5e1ca7233e15 (diff) | |
parent | 28e5e44aa3f4e0e0370864ed008fb5e2d85f4dc8 (diff) | |
download | linux-8363e795eb79a74c857ba89e3b04668a33fe3344.tar.gz linux-8363e795eb79a74c857ba89e3b04668a33fe3344.tar.bz2 linux-8363e795eb79a74c857ba89e3b04668a33fe3344.zip |
Merge tag 'x86_urgent_for_v5.13_rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Borislav Petkov:
"A first set of urgent fixes to the FPU/XSTATE handling mess^W code.
(There's a lot more in the pipe):
- Prevent corruption of the XSTATE buffer in signal handling by
validating what is being copied from userspace first.
- Invalidate other task's preserved FPU registers on XRSTOR failure
(#PF) because latter can still modify some of them.
- Restore the proper PKRU value in case userspace modified it
- Reset FPU state when signal restoring fails
Other:
- Map EFI boot services data memory as encrypted in a SEV guest so
that the guest can access it and actually boot properly
- Two SGX correctness fixes: proper resources freeing and a NUMA fix"
* tag 'x86_urgent_for_v5.13_rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
x86/mm: Avoid truncating memblocks for SGX memory
x86/sgx: Add missing xa_destroy() when virtual EPC is destroyed
x86/fpu: Reset state for all signal restore failures
x86/pkru: Write hardware init value to PKRU when xstate is init
x86/process: Check PF_KTHREAD and not current->mm for kernel threads
x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer
x86/fpu: Prevent state corruption in __fpu__restore_sig()
x86/ioremap: Map EFI-reserved memory as encrypted for SEV
Diffstat (limited to 'drivers/phy/phy-core.c')
0 files changed, 0 insertions, 0 deletions