From: Linus Torvalds Date: Sun, 14 Mar 2021 19:48:10 +0000 (-0700) Subject: Merge tag 'x86_urgent_for_v5.12_rc3' of git://git.kernel.org/pub/scm/linux/kernel... X-Git-Tag: v5.15~1541 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=0a7c10df49eb69dd888ea8b8ddd29bde2aa2fd48;p=platform%2Fkernel%2Flinux-starfive.git Merge tag 'x86_urgent_for_v5.12_rc3' of git://git./linux/kernel/git/tip/tip Pull x86 fixes from Borislav Petkov: - A couple of SEV-ES fixes and robustifications: verify usermode stack pointer in NMI is not coming from the syscall gap, correctly track IRQ states in the #VC handler and access user insn bytes atomically in same handler as latter cannot sleep. - Balance 32-bit fast syscall exit path to do the proper work on exit and thus not confuse audit and ptrace frameworks. - Two fixes for the ORC unwinder going "off the rails" into KASAN redzones and when ORC data is missing. * tag 'x86_urgent_for_v5.12_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/sev-es: Use __copy_from_user_inatomic() x86/sev-es: Correctly track IRQ states in runtime #VC handler x86/sev-es: Check regs->sp is trusted before adjusting #VC IST stack x86/sev-es: Introduce ip_within_syscall_gap() helper x86/entry: Fix entry/exit mismatch on failed fast 32-bit syscalls x86/unwind/orc: Silence warnings caused by missing ORC data x86/unwind/orc: Disable KASAN checking in the ORC unwinder, part 2 --- 0a7c10df49eb69dd888ea8b8ddd29bde2aa2fd48