lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Y9Z3FMceYzCQ1IXA@zn.tnic>
Date:   Sun, 29 Jan 2023 14:39:32 +0100
From:   Borislav Petkov <bp@...en8.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v6.2-rc6

Hi Linus,

please pull a bunch of urgent x86 fixes for 6.2.

The SEV-SNP patch looks a bit largish and perhaps, at a first glance, not really
urgent material but the intent behind it is to fail gracefully when booting
older kernels on newer hypervisors when latter support features which those
older kernels do not know of yet.

Therefore, it should go to stable so sending it now is as good a time as any.

Please pull,
thanks.

---

The following changes since commit 5dc4c995db9eb45f6373a956eb1f69460e69e6d4:

  Linux 6.2-rc4 (2023-01-15 09:22:43 -0600)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v6.2_rc6

for you to fetch changes up to 27b5de622ea3fe0ad5a31a0ebd9f7a0a276932d1:

  x86/build: Move '-mindirect-branch-cs-prefix' out of GCC-only block (2023-01-22 11:36:45 +0100)

----------------------------------------------------------------
- Start checking for -mindirect-branch-cs-prefix clang support too now that LLVM
  16 will support it

- Fix a NULL ptr deref when suspending with Xen PV

- Have a SEV-SNP guest check explicitly for features enabled by the hypervisor
  and fail gracefully if some are unsupported by the guest instead of failing in
  a non-obvious and hard-to-debug way

- Fix a MSI descriptor leakage under Xen

- Mark Xen's MSI domain as supporting MSI-X

- Prevent legacy PIC interrupts from being resent in software by marking them
  level triggered, as they should be, which lead to a NULL ptr deref

----------------------------------------------------------------
David Woodhouse (1):
      x86/pci/xen: Set MSI_FLAG_PCI_MSIX support in Xen MSI domain

Juergen Gross (1):
      acpi: Fix suspend with Xen PV

Nathan Chancellor (1):
      x86/build: Move '-mindirect-branch-cs-prefix' out of GCC-only block

Nikunj A Dadhania (1):
      x86/sev: Add SEV-SNP guest feature negotiation support

Thomas Gleixner (2):
      x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL
      x86/pci/xen: Fixup fallout from the PCI/MSI overhaul

 Documentation/x86/amd-memory-encryption.rst | 36 +++++++++++++++
 arch/x86/Makefile                           |  2 +-
 arch/x86/boot/compressed/ident_map_64.c     |  6 +++
 arch/x86/boot/compressed/misc.h             |  2 +
 arch/x86/boot/compressed/sev.c              | 70 +++++++++++++++++++++++++++++
 arch/x86/include/asm/acpi.h                 |  8 ++++
 arch/x86/include/asm/msr-index.h            | 20 +++++++++
 arch/x86/include/uapi/asm/svm.h             |  6 +++
 arch/x86/kernel/i8259.c                     |  1 +
 arch/x86/kernel/irqinit.c                   |  4 +-
 arch/x86/pci/xen.c                          |  2 +
 drivers/acpi/sleep.c                        |  6 ++-
 12 files changed, 160 insertions(+), 3 deletions(-)

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ