path: root/usr
diff options
authorLinus Torvalds <torvalds@linux-foundation.org>2020-04-12 10:17:16 -0700
committerLinus Torvalds <torvalds@linux-foundation.org>2020-04-12 10:17:16 -0700
commit4f8a3cc1183c442daee6cc65360e3385021131e4 (patch)
tree030efd9b19604201a4a42e10dd44357e5c2de1bd /usr
parent0785249f8b93836986e9d1bdeefd2a2c13f160af (diff)
parente6f8b6c12f03818baacc5f504fe83fa5e20771d6 (diff)
Merge tag 'x86-urgent-2020-04-12' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Thomas Gleixner: "A set of three patches to fix the fallout of the newly added split lock detection feature. It addressed the case where a KVM guest triggers a split lock #AC and KVM reinjects it into the guest which is not prepared to handle it. Add proper sanity checks which prevent the unconditional injection into the guest and handles the #AC on the host side in the same way as user space detections are handled. Depending on the detection mode it either warns and disables detection for the task or kills the task if the mode is set to fatal" * tag 'x86-urgent-2020-04-12' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: KVM: VMX: Extend VMXs #AC interceptor to handle split lock #AC in guest KVM: x86: Emulate split-lock access as a write in emulator x86/split_lock: Provide handle_guest_split_lock()
Diffstat (limited to 'usr')
0 files changed, 0 insertions, 0 deletions