lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <YKoqk6WplkzaAitt@zn.tnic>
Date:   Sun, 23 May 2021 12:12:35 +0200
From:   Borislav Petkov <bp@...e.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v5.13-rc3

Hi Linus,

please pull a couple of x86/urgent fixes which accumulated recently.

Thx.

---

The following changes since commit d07f6ca923ea0927a1024dfccafc5b53b61cfecc:

  Linux 5.13-rc2 (2021-05-16 15:27:44 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v5.13_rc3

for you to fetch changes up to 4954f5b8ef0baf70fe978d1a99a5f70e4dd5c877:

  x86/sev-es: Use __put_user()/__get_user() for data accesses (2021-05-19 18:45:37 +0200)

----------------------------------------------------------------
- Fix how SEV handles MMIO accesses by forwarding potential page faults instead
of killing the machine and by using the accessors with the exact functionality
needed when accessing memory.

- Fix a confusion with Clang LTO compiler switches passed to the it

- Handle the case gracefully when VMGEXIT has been executed in userspace

----------------------------------------------------------------
Joerg Roedel (3):
      x86/sev-es: Don't return NULL from sev_es_get_ghcb()
      x86/sev-es: Forward page-faults which happen during emulation
      x86/sev-es: Use __put_user()/__get_user() for data accesses

Nathan Chancellor (1):
      x86/build: Fix location of '-plugin-opt=' flags

Tom Lendacky (2):
      x86/sev-es: Move sev_es_put_ghcb() in prep for follow on patch
      x86/sev-es: Invalidate the GHCB after completing VMGEXIT

 arch/x86/Makefile            |  12 ++--
 arch/x86/kernel/sev-shared.c |   1 +
 arch/x86/kernel/sev.c        | 136 +++++++++++++++++++++++++++----------------
 3 files changed, 92 insertions(+), 57 deletions(-)

-- 
Regards/Gruss,
    Boris.

SUSE Software Solutions Germany GmbH, GF: Felix Imendörffer, HRB 36809, AG Nürnberg

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ