lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250728200416.GAaIfXwC7ZYKF70_Qg@fat_crate.local>
Date: Mon, 28 Jul 2025 22:04:16 +0200
From: Borislav Petkov <bp@...en8.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/sev for v6.17-rc1

Hi Linus,

please pull the x86/sev lineup for v6.17-rc1.

Thx.

---

The following changes since commit e04c78d86a9699d136910cfc0bdcf01087e3267e:

  Linux 6.16-rc2 (2025-06-15 13:49:41 -0700)

are available in the Git repository at:

  ssh://git@...olite.kernel.org/pub/scm/linux/kernel/git/tip/tip tags/x86_sev_for_v6.17_rc1

for you to fetch changes up to a7549636f67f973474ebe1ad262acc2aa4d1327d:

  x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages too (2025-06-27 14:07:10 +0200)

----------------------------------------------------------------
- Map the SNP calling area pages too so that OVMF EFI fw can issue SVSM
  calls properly with the goal of implementing EFI variable store in the
  SVSM - a component which is trusted by the guest, vs in the firmware, which
  is not

- Allow the kernel to handle #VC exceptions from EFI runtime services
  properly when running as a SNP guest

- Rework and cleanup the SNP guest request issue glue code a bit

----------------------------------------------------------------
Alexey Kardashevskiy (4):
      virt: sev-guest: Contain snp_guest_request_ioctl in sev-guest
      x86/sev: Allocate request in TSC_INFO_REQ on stack
      x86/sev: Document requirement for linear mapping of guest request buffers
      x86/sev: Drop unnecessary parameter in snp_issue_guest_request()

Gerd Hoffmann (2):
      x86/sev/vc: Fix EFI runtime instruction emulation
      x86/sev: Let sev_es_efi_map_ghcbs() map the CA pages too

 arch/x86/coco/sev/core.c                | 89 ++++++++++++++++++---------------
 arch/x86/coco/sev/vc-handle.c           |  9 +++-
 arch/x86/include/asm/sev.h              | 14 +++---
 arch/x86/platform/efi/efi_64.c          |  4 +-
 drivers/virt/coco/sev-guest/sev-guest.c |  9 ++--
 5 files changed, 70 insertions(+), 55 deletions(-)


-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ