lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241208094608.GAZ1Vq4FKYipqWZ5Th@fat_crate.local>
Date: Sun, 8 Dec 2024 10:46:08 +0100
From: Borislav Petkov <bp@...en8.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v6.13-rc2

Hi Linus,

please pull the x86/urgent lineup for v6.13-rc2.

Thx.

---

The following changes since commit 40384c840ea1944d7c5a392e8975ed088ecf0b37:

  Linux 6.13-rc1 (2024-12-01 14:28:56 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip tags/x86_urgent_for_v6.13_rc2

for you to fetch changes up to 492077668fb453b8b16c842fcf3fafc2ebc190e9:

  x86/CPU/AMD: WARN when setting EFER.AUTOIBRS if and only if the WRMSR fails (2024-12-06 19:57:05 +0100)

----------------------------------------------------------------
- Have the Automatic IBRS setting check on AMD does not falsely fire in
  the guest when it has been set already on the host

- Make sure cacheinfo structures memory is allocated to address a boot NULL
  ptr dereference on Intel Meteor Lake which has different numbers of subleafs
  in its CPUID(4) leaf

- Take care of the GDT restoring on the kexec path too, as expected by
  the kernel

- Make sure SMP is not disabled when IO-APIC is disabled on the kernel
  cmdline

- Add a PGD flag _PAGE_NOPTISHADOW to instruct machinery not to propagate
  changes to the kernelmode page tables, to the user portion, in PTI

- Mark Intel Lunar Lake as affected by an issue where MONITOR wakeups can get
  lost and thus user-visible delays happen

- Make sure PKRU is properly restored with XRSTOR on AMD after a PRKU write of
  0 (WRPKRU) which will mark PKRU in its init state and thus lose the
  actual buffer

----------------------------------------------------------------
Aruna Ramakrishna (2):
      x86/pkeys: Change caller of update_pkru_in_sigframe()
      x86/pkeys: Ensure updated PKRU value is XRSTOR'd

David Woodhouse (2):
      x86/mm: Add _PAGE_NOPTISHADOW bit to avoid updating userspace page tables
      x86/kexec: Restore GDT on return from ::preserve_context kexec

Fernando Fernandez Mancera (1):
      x86/cpu/topology: Remove limit of CPUs due to disabled IO/APIC

Len Brown (1):
      x86/cpu: Add Lunar Lake to list of CPUs with a broken MONITOR implementation

Ricardo Neri (2):
      cacheinfo: Allocate memory during CPU hotplug if not done from the primary CPU
      x86/cacheinfo: Delete global num_cache_leaves

Sean Christopherson (1):
      x86/CPU/AMD: WARN when setting EFER.AUTOIBRS if and only if the WRMSR fails

 arch/x86/include/asm/pgtable_types.h |  8 +++++--
 arch/x86/kernel/cpu/amd.c            |  2 +-
 arch/x86/kernel/cpu/cacheinfo.c      | 43 ++++++++++++++++++------------------
 arch/x86/kernel/cpu/intel.c          |  4 +++-
 arch/x86/kernel/cpu/topology.c       |  6 ++---
 arch/x86/kernel/fpu/signal.c         | 20 ++---------------
 arch/x86/kernel/fpu/xstate.h         | 27 +++++++++++++++++++++-
 arch/x86/kernel/relocate_kernel_64.S |  7 ++++++
 arch/x86/mm/ident_map.c              |  6 ++---
 arch/x86/mm/pti.c                    |  2 +-
 drivers/base/cacheinfo.c             | 14 +++++++-----
 11 files changed, 81 insertions(+), 58 deletions(-)


-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ