lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20250622084137.GAaFfBwdb_Ei3zCHN_@fat_crate.local>
Date: Sun, 22 Jun 2025 10:41:37 +0200
From: Borislav Petkov <bp@...en8.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v6.16-rc3

Hi Linus,

please pull the x86/urgent lineup for v6.16-rc3.

Thx.

---

The following changes since commit 9afe652958c3ee88f24df1e4a97f298afce89407:

  Merge tag 'x86_urgent_for_6.16-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip (2025-06-16 11:36:21 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip tags/x86_urgent_for_v6.16_rc3

for you to fetch changes up to 2aebf5ee43bf0ed225a09a30cf515d9f2813b759:

  x86/alternatives: Fix int3 handling failure from broken text_poke array (2025-06-18 13:59:56 +0200)

----------------------------------------------------------------
- Make sure the array tracking which kernel text positions need to be
  alternatives-patched doesn't get mishandled by out-of-order modifications,
  leading to it overflowing and causing page faults when patching

- Avoid an infinite loop when early code does a ranged TLB invalidation before
  the broadcast TLB invalidation count of how many pages it can flush, has
  been read from CPUID

- Fix a CONFIG_MODULES typo

- Disable broadcast TLB invalidation when PTI is enabled to avoid an overflow
  of the bitmap tracking dynamic ASIDs which need to be flushed when the
  kernel switches between the user and kernel address space

- Handle the case of a CPU going offline and thus reporting zeroes when
  reading top-level events in the resctrl code

----------------------------------------------------------------
Dave Hansen (1):
      x86/mm: Disable INVLPGB when PTI is enabled

Lukas Bulwahn (1):
      x86/its: Fix an ifdef typo in its_alloc()

Masami Hiramatsu (Google) (1):
      x86/alternatives: Fix int3 handling failure from broken text_poke array

Qinyun Tan (1):
      x86,fs/resctrl: Remove inappropriate references to cacheinfo in the resctrl subsystem

Rik van Riel (1):
      x86/mm: Fix early boot use of INVPLGB

 arch/x86/kernel/alternative.c      |  4 ++--
 arch/x86/kernel/cpu/amd.c          |  2 +-
 arch/x86/kernel/cpu/resctrl/core.c |  6 ++++--
 arch/x86/mm/pti.c                  |  5 +++++
 fs/resctrl/ctrlmondata.c           | 13 +++++++++----
 fs/resctrl/internal.h              |  4 ++--
 fs/resctrl/monitor.c               |  6 ++++--
 fs/resctrl/rdtgroup.c              |  6 +++---
 include/linux/resctrl.h            |  4 ++--
 9 files changed, 32 insertions(+), 18 deletions(-)


-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ