lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Yayd6FkzkKcOZKlc@zn.tnic>
Date:   Sun, 5 Dec 2021 12:09:28 +0100
From:   Borislav Petkov <bp@...e.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v5.16-rc4

Hi Linus,

please pull a bunch of x86/urgent fixes which accumulated in the last
two weeks.

Thx.

---

The following changes since commit c0f2077baa4113f38f008b8e912b9fb3ff8d43df:

  x86/boot: Mark prepare_command_line() __init (2021-11-24 12:20:24 +0100)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v5.16_rc4

for you to fetch changes up to 5c8f6a2e316efebb3ba93d8c1af258155dcf5632:

  x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (2021-12-03 19:21:15 +0100)

----------------------------------------------------------------
- Fix a couple of SWAPGS fencing issues in the x86 entry code

- Use the proper operand types in __{get,put}_user() to prevent
truncation in SEV-ES string io

- Make sure the kernel mappings are present in trampoline_pgd in order
to prevent any potential accesses to unmapped memory after switching to
it

- Fix a trivial list corruption in objtool's pv_ops validation

- Disable the clocksource watchdog for TSC on platforms which claim
that the TSC is constant, doesn't stop in sleep states, CPU has TSC
adjust and the number of sockets of the platform are max 2, to prevent
erroneous markings of the TSC as unstable.

- Make sure TSC adjust is always checked not only when going idle

- Prevent a stack leak by initializing struct _fpx_sw_bytes properly in
the FPU code

- Fix INTEL_FAM6_RAPTORLAKE define naming to adhere to the convention

----------------------------------------------------------------
Feng Tang (2):
      x86/tsc: Add a timer to make sure TSC_adjust is always checked
      x86/tsc: Disable clocksource watchdog for TSC on qualified platorms

Joerg Roedel (1):
      x86/64/mm: Map all kernel memory into trampoline_pgd

Lai Jiangshan (3):
      x86/entry: Add a fence for kernel entry SWAPGS in paranoid_entry()
      x86/entry: Use the correct fence macro after swapgs in kernel CR3
      x86/xen: Add xenpv_restore_regs_and_return_to_usermode()

Marco Elver (1):
      x86/fpu/signal: Initialize sw_bytes in save_xstate_epilog()

Michael Sterritt (1):
      x86/sev: Fix SEV-ES INS/OUTS instructions for word, dword, and qword

Peter Zijlstra (1):
      objtool: Fix pv_ops noinstr validation

Tony Luck (1):
      x86/cpu: Drop spurious underscore from RAPTOR_LAKE #define

 arch/x86/entry/entry_64.S           | 35 +++++++++++------------
 arch/x86/include/asm/intel-family.h |  2 +-
 arch/x86/kernel/fpu/signal.c        |  2 +-
 arch/x86/kernel/sev.c               | 57 +++++++++++++++++++++++++------------
 arch/x86/kernel/tsc.c               | 28 +++++++++++++++---
 arch/x86/kernel/tsc_sync.c          | 41 ++++++++++++++++++++++++++
 arch/x86/realmode/init.c            | 12 +++++++-
 arch/x86/xen/xen-asm.S              | 20 +++++++++++++
 tools/objtool/elf.c                 |  1 +
 tools/objtool/objtool.c             |  4 +++
 10 files changed, 159 insertions(+), 43 deletions(-)

-- 
Regards/Gruss,
    Boris.

SUSE Software Solutions Germany GmbH, GF: Ivo Totev, HRB 36809, AG Nürnberg

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ