From: Joerg Roedel <[email protected]>

Hi,

here is the next revision of my pending fixes for SEV-ES guest
support. Changes to the previous version are:

        - Removed the patches already merged
        - Added a new fix to map the EFI MOKVar table encrypted
        - Disabled IRQs when GHCB is active
        - Relaxed state tracking by using irqentry_enter()/exit
          instead of irqentry_nmi_enter()/exit()
        - Changed error reporting from insn_fetch_from_user*() as
          requested by Boris

Changes are based on tip/x86/urgent. Please review.

Thanks,

        Joerg

Joerg Roedel (6):
  x86/sev-es: Fix error message in runtime #VC handler
  x86/sev-es: Disable IRQs while GHCB is active
  x86/sev-es: Run #VC handler in plain IRQ state
  x86/insn-eval: Make 0 a valid RIP for insn_get_effective_ip()
  x86/insn: Extend error reporting from
    insn_fetch_from_user[_inatomic]()
  x86/sev-es: Propagate #GP if getting linear instruction address failed

Tom Lendacky (1):
  x86/ioremap: Map efi_mem_reserve() memory as encrypted for SEV

 arch/x86/kernel/sev.c    | 61 +++++++++++++++++++++++++---------------
 arch/x86/kernel/umip.c   | 10 +++----
 arch/x86/lib/insn-eval.c | 22 +++++++++------
 arch/x86/mm/ioremap.c    |  4 ++-
 4 files changed, 59 insertions(+), 38 deletions(-)


base-commit: 009767dbf42ac0dbe3cf48c1ee224f6b778aa85a
-- 
2.31.1

_______________________________________________
Virtualization mailing list
[email protected]
https://lists.linuxfoundation.org/mailman/listinfo/virtualization

Reply via email to