lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20251001171112.899791-1-dave.hansen@linux.intel.com>
Date: Wed,  1 Oct 2025 10:11:12 -0700
From: Dave Hansen <dave.hansen@...ux.intel.com>
To: torvalds@...ux-foundation.org
Cc: x86@...nel.org,
	linux-kernel@...r.kernel.org,
	Dave Hansen <dave.hansen@...ux.intel.com>
Subject: [GIT PULL] x86/tdx for 6.18-rc1

Hi Linus,

Please pull some x86/tdx changes for 6.18-rc1. The biggest change here
is making TDX and kexec play nicely together. Before this, the memory
encryption hardware (which doesn't respect cache coherency) could
write back old cachelines on top of data in the new kernel, so kexec
and TDX were made mutually exclusive. This removes the limitation.

There is also some work to tighten up a hardware bug workaround and
some MAINTAINERS updates.

--

The following changes since commit c17b750b3ad9f45f2b6f7e6f7f4679844244f0b9:

  Linux 6.17-rc2 (2025-08-17 15:22:10 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_tdx_for_6.18-rc1

for you to fetch changes up to e414b1005891d74bb0c3d27684c58dfbfbd1754b:

  x86/virt/tdx: Use precalculated TDVPR page physical address (2025-09-11 11:38:28 -0700)

----------------------------------------------------------------
 - Make TDX and kexec work together
 - Skip TDX bug workaround when the bug is not present
 - Update maintainers entries

----------------------------------------------------------------
Adrian Hunter (3):
      x86/tdx: Eliminate duplicate code in tdx_clear_page()
      x86/tdx: Tidy reset_pamt functions
      x86/tdx: Skip clearing reclaimed pages unless X86_BUG_TDX_PW_MCE is present

Kai Huang (8):
      x86/kexec: Consolidate relocate_kernel() function parameters
      x86/sme: Use percpu boolean to control WBINVD during kexec
      x86/virt/tdx: Mark memory cache state incoherent when making SEAMCALL
      x86/kexec: Disable kexec/kdump on platforms with TDX partial write erratum
      x86/virt/tdx: Remove the !KEXEC_CORE dependency
      x86/virt/tdx: Update the kexec section in the TDX documentation
      KVM/TDX: Explicitly do WBINVD when no more TDX SEAMCALLs
      x86/virt/tdx: Use precalculated TDVPR page physical address

Kirill A. Shutemov (2):
      MAINTAINERS: Update the file list in the TDX entry.
      MAINTAINERS: Add Rick Edgecombe as a TDX reviewer

Xiaoyao Li (1):
      MAINTAINERS: Add KVM mail list to the TDX entry

 Documentation/arch/x86/tdx.rst       | 14 +++----
 MAINTAINERS                          | 11 ++---
 arch/x86/Kconfig                     |  1 -
 arch/x86/include/asm/kexec.h         | 12 +++++-
 arch/x86/include/asm/processor.h     |  2 +
 arch/x86/include/asm/tdx.h           | 35 +++++++++++++++-
 arch/x86/kernel/cpu/amd.c            | 17 ++++++++
 arch/x86/kernel/machine_kexec_64.c   | 44 ++++++++++++++++----
 arch/x86/kernel/process.c            | 24 +++++------
 arch/x86/kernel/relocate_kernel_64.S | 36 ++++++++++------
 arch/x86/kvm/vmx/tdx.c               | 44 ++++++++++----------
 arch/x86/virt/vmx/tdx/tdx.c          | 80 +++++++++++++++++++++---------------
 12 files changed, 214 insertions(+), 106 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ