Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp691793pxu; Wed, 7 Oct 2020 13:17:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwNQV0basaVJsgmzPuUlaPldOpK87+KEgwgBRf3AkOUCICBKWaTwgQp0zY0cz9rjs+VBvZq X-Received: by 2002:aa7:d690:: with SMTP id d16mr5577992edr.301.1602101878796; Wed, 07 Oct 2020 13:17:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602101878; cv=none; d=google.com; s=arc-20160816; b=JYivMd1WoQP1QhSS71LihDNM60RuRQ8HSOqGHMJz7o5nqtF57zRzJQ/yiGA9cngJeY rTy9pPds6sp1mHyZ/ovkWGmTU0Oc+5PYk+pE3pPDFn48V1hOWKHMrTeXjFxDXm9cOd3l 27m3iE0fKBtABT1KmTZUWcqpzX0PmTm/G+PVwYaNDZOSw53p+jkhjgnbnIKAw9E9CZ2O atGDNkqrsgpLyCoPZkQ6lHL+/s0xRgXk6Ed+ZX7WZ4bDfroVgzdHviXaXTcPkE8xL8Cz dC9kCLd1ONb47yEMn0l+MDpqLWWXOBSDgopuL6R3i1sOf9BAzVPf2Uf/p9XK7OjQud6/ ZaNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=xk9LAQPuEe9GFuiMRhVrHYjn4Gx46lgQdVs1DWPuRb0=; b=SqWHSgh+oqRNzEd63xt8TErOJvE6USFRamxJPx+IbKDCZ128oR1qF8rRFTkODO7eKG GUksn6BQmqi0ZmXmUtuk+BmKsgKyKfsJyljn/e6Lk3jP6IlE/SU0R0i32JyUZYqgUaaC fC44vYjg0fGNm5To0eNZuHU8apYMHwe/XzzAB8fXAUc/GncKBD8tEW/8AKOgJetfhHwB nTcxoDDirqVM3bI6h7cqTwe0hqCNCVdlgseGJ31TvvhiUZ+3o5BCBle4+ZL0h32m96q4 Q8JoD8cTsieSxDQ59t3n6fWAvgE+m+YXJzh/LfJzpKJhMAJHPzqCaheT/XGlf/dIccmD WUlg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e14si2099355ejj.573.2020.10.07.13.17.35; Wed, 07 Oct 2020 13:17:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728499AbgJGTxy (ORCPT + 99 others); Wed, 7 Oct 2020 15:53:54 -0400 Received: from mail-qt1-f195.google.com ([209.85.160.195]:47012 "EHLO mail-qt1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728476AbgJGTxy (ORCPT ); Wed, 7 Oct 2020 15:53:54 -0400 Received: by mail-qt1-f195.google.com with SMTP id r8so3033206qtp.13 for ; Wed, 07 Oct 2020 12:53:53 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=xk9LAQPuEe9GFuiMRhVrHYjn4Gx46lgQdVs1DWPuRb0=; b=YkxCab0pZYrlLsUQd+jpQZ7vfp7LXhdyWclut2lQ2BvgVD3MncMW+hByUOba5OgXxd dTPpiEQvEWLXzGUVfXkrrjBXyAOLqe6OTuNVLgtvGcwApmm6gwEzIOSNl95S2rkBDTWc GUIUk7ob6hs3KDJmV0T+XdLuvi9GMrlINcxrn1NuubyuNUjwxaCSxFB6zbEAte0/O9D1 GzPGAS9dbwvrxc+3pqNKnhosQYaYmd6K0aGb05V17HYWWBQchbS04gYCzS30JGuxlij5 mt91d4rajb4PeOJ19TXzUsr/rNIGyzwygGzvdJ7JOD+7kiWCLexC4D6/bUzBTN0v/beV aMWg== X-Gm-Message-State: AOAM530H2mzUtz4tgi6QeM4L64K5y5HcugEdeh4dKLn++2e8bLbl4w9c chBqnGFKTuCVGh9Lf/7klRs= X-Received: by 2002:aed:3145:: with SMTP id 63mr5139816qtg.29.1602100433027; Wed, 07 Oct 2020 12:53:53 -0700 (PDT) Received: from rani.riverdale.lan ([2001:470:1f07:5f3::b55f]) by smtp.gmail.com with ESMTPSA id k20sm2287658qtm.44.2020.10.07.12.53.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 07 Oct 2020 12:53:52 -0700 (PDT) From: Arvind Sankar To: x86@kernel.org, Joerg Roedel Cc: linux-kernel@vger.kernel.org Subject: [PATCH 0/5] Couple of bugfixes to sev-es series Date: Wed, 7 Oct 2020 15:53:46 -0400 Message-Id: <20201007195351.776555-1-nivedita@alum.mit.edu> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With the SEV-ES series, the kernel command line is no longer guaranteed to be mapped on entry into the main kernel. This fixes that, and a stackprotector issue that cropped up on head64.c. The first three patches are preparatory cleanups. Patch 4 fixes the mapping issue and patch 5 disables stack protector for head code. Arvind Sankar (5): x86/boot: Initialize boot_params in startup code x86/boot: Move get_cmd_line_ptr() and COMMAND_LINE_SIZE into misc.h x86/boot/64: Change add_identity_map() to take size for ease of use x86/boot/64: Explicitly map boot_params and command line x86/head/64: Disable stack protection for head$(BITS).o arch/x86/boot/compressed/cmdline.c | 8 ------ arch/x86/boot/compressed/head_32.S | 11 ++++---- arch/x86/boot/compressed/head_64.S | 34 ++++++++----------------- arch/x86/boot/compressed/ident_map_64.c | 18 ++++++------- arch/x86/boot/compressed/kaslr.c | 6 ----- arch/x86/boot/compressed/misc.c | 10 +------- arch/x86/boot/compressed/misc.h | 13 ++++++++++ arch/x86/boot/compressed/pgtable_64.c | 5 +--- arch/x86/kernel/Makefile | 2 ++ 9 files changed, 43 insertions(+), 64 deletions(-) -- 2.26.2