Revision e75417739b1de4f6eb99f3f080c67bfd6812d562 authored by Greg Kroah-Hartman on 29 September 2018, 21:34:06 UTC, committed by Greg Kroah-Hartman on 29 September 2018, 21:34:06 UTC
Thomas writes:
  "A single fix for the AMD memory encryption boot code so it does not
   read random garbage instead of the cached encryption bit when a kexec
   kernel is allocated above the 32bit address limit."

* 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
  x86/boot: Fix kexec booting failure in the SEV bit detection code
2 parent s e1ce697 + bdec8d7
History
File Mode Size
Kconfig -rw-r--r-- 1.4 KB
Makefile -rw-r--r-- 378 bytes
qcom_glink_native.c -rw-r--r-- 39.8 KB
qcom_glink_native.h -rw-r--r-- 1017 bytes
qcom_glink_rpm.c -rw-r--r-- 7.9 KB
qcom_glink_smem.c -rw-r--r-- 7.0 KB
qcom_smd.c -rw-r--r-- 40.2 KB
rpmsg_char.c -rw-r--r-- 13.4 KB
rpmsg_core.c -rw-r--r-- 16.9 KB
rpmsg_internal.h -rw-r--r-- 3.2 KB
virtio_rpmsg_bus.c -rw-r--r-- 29.4 KB

back to top