lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20250616175528.1973014-1-dave.hansen@linux.intel.com>
Date: Mon, 16 Jun 2025 10:55:28 -0700
From: Dave Hansen <dave.hansen@...ux.intel.com>
To: torvalds@...ux-foundation.org
Cc: x86@...nel.org,
	linux-kernel@...r.kernel.org,
	Dave Hansen <dave.hansen@...ux.intel.com>
Subject: [GIT PULL] x86/urgent for 6.16-rc3

Hi Linus,

Please pull some x86/urgent changes for 6.16-rc3.

This is a pretty scattered set of fixes. The majority of them are further
fixups around the recent ITS mitigations. The rest don't really have a
coherent story.

 * Some flavors of Xen PV guests don't support large pages, but the
   set_memory.c code assumes all CPUs support them. Avoid problems with
   a quick CPU feature check.
 * The TDX code has some wrappers to help retry calls to the TDX module.
   They use function pointers to assembly functions and the compiler
   usually generates direct CALLs. But some new compilers, plus -Os
   turned them in to indirect CALLs and the assembly code was not
   annotated for indirect calls. Force inlining of the helper to fix
   it up.
 * Last, a FRED issue showed up when single-stepping. It's fine when
   using an external debugger, but was getting stuck returning from
   a SIGTRAP handler otherwise. Clear the FRED "swevent" bit to ensure
   that forward progress is made.

--

The following changes since commit 19272b37aa4f83ca52bdf9c16d5d81bdd1354494:

  Linux 6.16-rc1 (2025-06-08 13:44:43 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_6.16-rc3

for you to fetch changes up to 7cd9a11dd0c3d1dd225795ed1b5b53132888e7b5:

  Revert "mm/execmem: Unify early execmem_cache behaviour" (2025-06-11 11:20:52 +0200)

----------------------------------------------------------------
 * Further fixups for ITS mitigation
 * Avoid using large pages for kernel mappings when PSE is not enumerated
 * Avoid ever making indirect calls to TDX assembly helpers
 * Fix a FRED single step issue when not using an external debugger

----------------------------------------------------------------
Juergen Gross (1):
      x86/mm/pat: don't collapse pages without PSE set

Kai Huang (1):
      x86/virt/tdx: Avoid indirect calls to TDX assembly functions

Mike Rapoport (Microsoft) (3):
      x86/Kconfig: only enable ROX cache in execmem when STRICT_MODULE_RWX is set
      x86/its: move its_pages array to struct mod_arch_specific
      Revert "mm/execmem: Unify early execmem_cache behaviour"

Peter Zijlstra (Intel) (1):
      x86/its: explicitly manage permissions for ITS pages

Xin Li (Intel) (2):
      x86/fred/signal: Prevent immediate repeat of single step trap on return from SIGTRAP handler
      selftests/x86: Add a test to detect infinite SIGTRAP handler loop

 arch/x86/Kconfig                           |   2 +-
 arch/x86/include/asm/module.h              |   8 +++
 arch/x86/include/asm/sighandling.h         |  22 +++++++
 arch/x86/include/asm/tdx.h                 |   2 +-
 arch/x86/kernel/alternative.c              |  79 +++++++++++++++-------
 arch/x86/kernel/signal_32.c                |   4 ++
 arch/x86/kernel/signal_64.c                |   4 ++
 arch/x86/mm/init_32.c                      |   3 -
 arch/x86/mm/init_64.c                      |   3 -
 arch/x86/mm/pat/set_memory.c               |   3 +
 arch/x86/virt/vmx/tdx/tdx.c                |   5 +-
 include/linux/execmem.h                    |   8 +--
 include/linux/module.h                     |   5 --
 mm/execmem.c                               |  40 +-----------
 tools/testing/selftests/x86/Makefile       |   2 +-
 tools/testing/selftests/x86/sigtrap_loop.c | 101 +++++++++++++++++++++++++++++
 16 files changed, 207 insertions(+), 84 deletions(-)
 create mode 100644 tools/testing/selftests/x86/sigtrap_loop.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ