commit | e75417739b1de4f6eb99f3f080c67bfd6812d562 | [log] [tgz] |
---|---|---|
author | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | Sat Sep 29 14:34:06 2018 -0700 |
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | Sat Sep 29 14:34:06 2018 -0700 |
tree | 85ee529dd51c22fe323533df47c39d18e0d8d205 | |
parent | e1ce697db67421cc7e9a1cc1312149f3a4e08c93 [diff] | |
parent | bdec8d7fa55e6f5314ed72e5a0b435d90ff90548 [diff] |
Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip Thomas writes: "A single fix for the AMD memory encryption boot code so it does not read random garbage instead of the cached encryption bit when a kexec kernel is allocated above the 32bit address limit." * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/boot: Fix kexec booting failure in the SEV bit detection code