diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2021-03-14 12:48:10 -0700 | 
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2021-03-14 12:48:10 -0700 | 
| commit | 0a7c10df49eb69dd888ea8b8ddd29bde2aa2fd48 (patch) | |
| tree | 433e5a9f1252cea52ff4a5dac2ec4b9d8be09a34 /scripts/gcc-plugins/structleak_plugin.c | |
| parent | c3c7579f5e3b4826d32af0521e53d5d565ed5a73 (diff) | |
| parent | bffe30dd9f1f3b2608a87ac909a224d6be472485 (diff) | |
Merge tag 'x86_urgent_for_v5.12_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Borislav Petkov:
 - A couple of SEV-ES fixes and robustifications: verify usermode stack
   pointer in NMI is not coming from the syscall gap, correctly track
   IRQ states in the #VC handler and access user insn bytes atomically
   in same handler as latter cannot sleep.
 - Balance 32-bit fast syscall exit path to do the proper work on exit
   and thus not confuse audit and ptrace frameworks.
 - Two fixes for the ORC unwinder going "off the rails" into KASAN
   redzones and when ORC data is missing.
* tag 'x86_urgent_for_v5.12_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
  x86/sev-es: Use __copy_from_user_inatomic()
  x86/sev-es: Correctly track IRQ states in runtime #VC handler
  x86/sev-es: Check regs->sp is trusted before adjusting #VC IST stack
  x86/sev-es: Introduce ip_within_syscall_gap() helper
  x86/entry: Fix entry/exit mismatch on failed fast 32-bit syscalls
  x86/unwind/orc: Silence warnings caused by missing ORC data
  x86/unwind/orc: Disable KASAN checking in the ORC unwinder, part 2
Diffstat (limited to 'scripts/gcc-plugins/structleak_plugin.c')
0 files changed, 0 insertions, 0 deletions
