lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250817085712.GAaKGZaP83Bp4ghNT7@fat_crate.local>
Date: Sun, 17 Aug 2025 10:57:12 +0200
From: Borislav Petkov <bp@...en8.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v6.17-rc2

Hi Linus,

please pull the x86/urgent lineup for v6.17-rc2.

Thx.

---

The following changes since commit 8f5ae30d69d7543eee0d70083daf4de8fe15d585:

  Linux 6.17-rc1 (2025-08-10 19:41:16 +0300)

are available in the Git repository at:

  ssh://git@...olite.kernel.org/pub/scm/linux/kernel/git/tip/tip tags/x86_urgent_for_v6.17_rc2

for you to fetch changes up to ed6c4b657bca3b39f7b11cba1405931aeb490f3d:

  x86/cpuid: Remove transitional <asm/cpuid.h> header (2025-08-15 17:06:23 +0200)

----------------------------------------------------------------
- Remove a transitional asm/cpuid.h header which was added only as
  a fallback during cpuid helpers reorg

- Initialize reserved fields in the SVSM page validation calls structure
  to zero in order to allow for future structure extensions

- Have the sev-guest driver's buffers used in encryption operations be
  in linear mapping space as the encryption operation can be offloaded
  to an accelerator

- Have a read-only MSR write when in an AMD SNP guest trap to the
  hypervisor as it is usually done. This makes the guest user experience
  better by simply raising a #GP instead of terminating said guest

- Do not output AVX512 elapsed time for kernel threads because the data
  is wrong and fix a NULL pointer dereferencing in the process

- Adjust the SRSO mitigation selection to the new attack vectors

----------------------------------------------------------------
Ahmed S. Darwish (1):
      x86/cpuid: Remove transitional <asm/cpuid.h> header

David Kaplan (1):
      x86/bugs: Select best SRSO mitigation

Fushuai Wang (1):
      x86/fpu: Fix NULL dereference in avx512_status()

Nikunj A Dadhania (1):
      x86/sev: Improve handling of writes to intercepted TSC MSRs

Tom Lendacky (2):
      virt: sev-guest: Satisfy linear mapping requirement in get_derived_key()
      x86/sev: Ensure SVSM reserved fields in a page validation entry are initialized to zero

 .../admin-guide/hw-vuln/attack_vector_controls.rst |  2 +-
 arch/x86/boot/startup/sev-shared.c                 |  1 +
 arch/x86/coco/sev/core.c                           |  2 ++
 arch/x86/coco/sev/vc-handle.c                      | 31 +++++++++++-----------
 arch/x86/include/asm/cpuid.h                       |  8 ------
 arch/x86/kernel/cpu/bugs.c                         | 13 +++++++--
 arch/x86/kernel/fpu/xstate.c                       | 19 ++++++-------
 drivers/virt/coco/sev-guest/sev-guest.c            | 27 +++++++++----------
 8 files changed, 53 insertions(+), 50 deletions(-)
 delete mode 100644 arch/x86/include/asm/cpuid.h


-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ