lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20241120013243.831531-1-dave.hansen@linux.intel.com>
Date: Tue, 19 Nov 2024 17:32:43 -0800
From: Dave Hansen <dave.hansen@...ux.intel.com>
To: torvalds@...ux-foundation.org
Cc: x86@...nel.org,
	linux-kernel@...r.kernel.org,
	Dave Hansen <dave.hansen@...ux.intel.com>
Subject: [GIT PULL] x86/tdx for 6.13-rc1

Hi Linus,

Please pull some x86/tdx changes for 6.13-rc1. These essentially
refine some interactions between TDX guests and VMMs.

The first leverages a new TDX module feature to runtime disable the
ability for a VM to inject #VE exceptions. Before this feature, there
was only a static on/off switch and the guest had to panic if it was
configured in a bad state.

The second lets the guest opt in to be able to access the topology
CPUID leaves. Before this, accesses to those leaves would #VE.

For both of these, it would have been nicest to just change the
default behavior, but some pesky "other" OSes evidently need to retain
the legacy behavior.

--

The following changes since commit 59b723cd2adbac2a34fc8e12c74ae26ae45bf230:

  Linux 6.12-rc6 (2024-11-03 14:05:52 -1000)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_tdx_for_6.13-rc1

for you to fetch changes up to 7ae15e2f69bad06527668b478dff7c099ad2e6ae:

  x86/tdx: Enable CPU topology enumeration (2024-11-07 10:27:45 -0800)

----------------------------------------------------------------
 - Add new infrastructure for reading TDX metadata
 - Use the newly-available metadata to:
  - Disable potentially nasty #VE exceptions
  - Get more complete CPU topology information from the VMM

----------------------------------------------------------------
Kirill A. Shutemov (4):
      x86/tdx: Introduce wrappers to read and write TD metadata
      x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup()
      x86/tdx: Dynamically disable SEPT violations from causing #VEs
      x86/tdx: Enable CPU topology enumeration

 arch/x86/coco/tdx/tdx.c           | 138 ++++++++++++++++++++++++++++++++------
 arch/x86/include/asm/shared/tdx.h |  13 +++-
 2 files changed, 128 insertions(+), 23 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ