diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2020-04-12 10:17:16 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2020-04-12 10:17:16 -0700 |
commit | 4f8a3cc1183c442daee6cc65360e3385021131e4 (patch) | |
tree | 030efd9b19604201a4a42e10dd44357e5c2de1bd /kernel | |
parent | 0785249f8b93836986e9d1bdeefd2a2c13f160af (diff) | |
parent | e6f8b6c12f03818baacc5f504fe83fa5e20771d6 (diff) |
Merge tag 'x86-urgent-2020-04-12' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Thomas Gleixner:
"A set of three patches to fix the fallout of the newly added split
lock detection feature.
It addressed the case where a KVM guest triggers a split lock #AC and
KVM reinjects it into the guest which is not prepared to handle it.
Add proper sanity checks which prevent the unconditional injection
into the guest and handles the #AC on the host side in the same way as
user space detections are handled. Depending on the detection mode it
either warns and disables detection for the task or kills the task if
the mode is set to fatal"
* tag 'x86-urgent-2020-04-12' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
KVM: VMX: Extend VMXs #AC interceptor to handle split lock #AC in guest
KVM: x86: Emulate split-lock access as a write in emulator
x86/split_lock: Provide handle_guest_split_lock()
Diffstat (limited to 'kernel')
0 files changed, 0 insertions, 0 deletions