[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250817085712.GAaKGZaP83Bp4ghNT7@fat_crate.local>
Date: Sun, 17 Aug 2025 10:57:12 +0200
From: Borislav Petkov <bp@...en8.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v6.17-rc2
Hi Linus,
please pull the x86/urgent lineup for v6.17-rc2.
Thx.
---
The following changes since commit 8f5ae30d69d7543eee0d70083daf4de8fe15d585:
Linux 6.17-rc1 (2025-08-10 19:41:16 +0300)
are available in the Git repository at:
ssh://git@...olite.kernel.org/pub/scm/linux/kernel/git/tip/tip tags/x86_urgent_for_v6.17_rc2
for you to fetch changes up to ed6c4b657bca3b39f7b11cba1405931aeb490f3d:
x86/cpuid: Remove transitional <asm/cpuid.h> header (2025-08-15 17:06:23 +0200)
----------------------------------------------------------------
- Remove a transitional asm/cpuid.h header which was added only as
a fallback during cpuid helpers reorg
- Initialize reserved fields in the SVSM page validation calls structure
to zero in order to allow for future structure extensions
- Have the sev-guest driver's buffers used in encryption operations be
in linear mapping space as the encryption operation can be offloaded
to an accelerator
- Have a read-only MSR write when in an AMD SNP guest trap to the
hypervisor as it is usually done. This makes the guest user experience
better by simply raising a #GP instead of terminating said guest
- Do not output AVX512 elapsed time for kernel threads because the data
is wrong and fix a NULL pointer dereferencing in the process
- Adjust the SRSO mitigation selection to the new attack vectors
----------------------------------------------------------------
Ahmed S. Darwish (1):
x86/cpuid: Remove transitional <asm/cpuid.h> header
David Kaplan (1):
x86/bugs: Select best SRSO mitigation
Fushuai Wang (1):
x86/fpu: Fix NULL dereference in avx512_status()
Nikunj A Dadhania (1):
x86/sev: Improve handling of writes to intercepted TSC MSRs
Tom Lendacky (2):
virt: sev-guest: Satisfy linear mapping requirement in get_derived_key()
x86/sev: Ensure SVSM reserved fields in a page validation entry are initialized to zero
.../admin-guide/hw-vuln/attack_vector_controls.rst | 2 +-
arch/x86/boot/startup/sev-shared.c | 1 +
arch/x86/coco/sev/core.c | 2 ++
arch/x86/coco/sev/vc-handle.c | 31 +++++++++++-----------
arch/x86/include/asm/cpuid.h | 8 ------
arch/x86/kernel/cpu/bugs.c | 13 +++++++--
arch/x86/kernel/fpu/xstate.c | 19 ++++++-------
drivers/virt/coco/sev-guest/sev-guest.c | 27 +++++++++----------
8 files changed, 53 insertions(+), 50 deletions(-)
delete mode 100644 arch/x86/include/asm/cpuid.h
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette
Powered by blists - more mailing lists