lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <YX/BhEUBTK4bkQNm@zn.tnic>
Date:   Mon, 1 Nov 2021 11:29:24 +0100
From:   Borislav Petkov <bp@...e.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/cpu for v5.16

Hi Linus,

please pull x86/cpu updates for v5.16.

Thx.

---
The following changes since commit 6880fa6c56601bb8ed59df6c30fd390cc5f6dd8f:

  Linux 5.15-rc1 (2021-09-12 16:28:37 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_cpu_for_v5.16_rc1

for you to fetch changes up to 415de44076640483648d6c0f6d645a9ee61328ad:

  x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (2021-10-21 20:49:16 +0200)

----------------------------------------------------------------
- Start checking a CPUID bit on AMD Zen3 which states that the CPU
clears the segment base when a null selector is written. Do the explicit
detection on older CPUs, zen2 and hygon specifically, which have the
functionality but do not advertize the CPUID bit. Factor in the presence
of a hypervisor underneath the kernel and avoid doing the explicit check
there which the HV might've decided to not advertize for migration
safety reasons, a.o.

- Add support for a new X86 CPU vendor: VORTEX. Needed for whitelisting
those CPUs in the hardware vulnerabilities detection

- Force the compiler to use rIP-relative addressing in the fallback path of
static_cpu_has(), in order to avoid unnecessary register pressure

----------------------------------------------------------------
Borislav Petkov (1):
      x86/umip: Downgrade warning messages to debug loglevel

H. Peter Anvin (1):
      x86/asm: Avoid adding register pressure for the init case in static_cpu_has()

H. Peter Anvin (Intel) (1):
      x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix

Jane Malalane (1):
      x86/cpu: Fix migration safety with X86_BUG_NULL_SEL

Marcos Del Sol Vives (1):
      x86/CPU: Add support for Vortex CPUs

 arch/x86/Kconfig.cpu              | 13 +++++++++++
 arch/x86/include/asm/asm.h        |  5 +++++
 arch/x86/include/asm/cpufeature.h | 13 +++++++----
 arch/x86/include/asm/processor.h  |  3 ++-
 arch/x86/kernel/cpu/Makefile      |  1 +
 arch/x86/kernel/cpu/amd.c         |  2 ++
 arch/x86/kernel/cpu/common.c      | 46 +++++++++++++++++++++++++++++++++------
 arch/x86/kernel/cpu/cpu.h         |  1 +
 arch/x86/kernel/cpu/hygon.c       |  2 ++
 arch/x86/kernel/cpu/vortex.c      | 39 +++++++++++++++++++++++++++++++++
 arch/x86/kernel/umip.c            |  8 +++----
 11 files changed, 117 insertions(+), 16 deletions(-)
 create mode 100644 arch/x86/kernel/cpu/vortex.c

-- 
Regards/Gruss,
    Boris.

SUSE Software Solutions Germany GmbH, GF: Ivo Totev, HRB 36809, AG Nürnberg

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ