linux-loongson/arch/x86
Linus Torvalds 8d561baae5 - Remove a transitional asm/cpuid.h header which was added only as
a fallback during cpuid helpers reorg
 
 - Initialize reserved fields in the SVSM page validation calls structure
   to zero in order to allow for future structure extensions
 
 - Have the sev-guest driver's buffers used in encryption operations be
   in linear mapping space as the encryption operation can be offloaded
   to an accelerator
 
 - Have a read-only MSR write when in an AMD SNP guest trap to the
   hypervisor as it is usually done. This makes the guest user experience
   better by simply raising a #GP instead of terminating said guest
 
 - Do not output AVX512 elapsed time for kernel threads because the data
   is wrong and fix a NULL pointer dereferencing in the process
 
 - Adjust the SRSO mitigation selection to the new attack vectors
 -----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEEzv7L6UO9uDPlPSfHEsHwGGHeVUoFAmihmPcACgkQEsHwGGHe
 VUr6Iw/+KKuQdicPRvdQ8Kv+710oHFHka1CY/LdHuADuuzWWE+Zj6RzwraM0aqIr
 1E4resu05MPVJj3KAzt0rBS4Ch5bbNU0QHQqhuuxe+EZpbY8XNxx53f43E4wHTS8
 bPaZI1GdLZSTh5BUGRj9N0udK5gnd6kbku80PAbP2fqi+aSOZSA8JCqmiUicSi0/
 EbYye7n38q8u1Dh2y9t9CBuxAOZEyzCM6LXRELmK5lya1LGJkKOTGllyb8irzsiv
 HlLW1sN+weeVlvdUd1LvaYgTAetNhSVtiuh71cGMENnpoAyO6HAea+7X8Tg7UHHp
 zsYRVXKg2CENQpo4OsQ3q/O7fnPTets7NFm8DNwSKO0qoCqn3Yf4AD4IeCIqZdM3
 B2an4b1SWN2xtW38YEEGFVKIBIZVLQFzjmwR3yu8wqjhycIW3rNRCiQuI4EvW+ej
 kx5ZXHXHKvThoLuxio/ILce1oWa4O9K+GzV9vEDHtYK283sCUU2XyUOVq3Ntpmoc
 /mzOaBWAjN9nMWJ01DoPRh0bs5nkbN/NQxIOHUiOtLmMkwJX9ls/ed2VagL/iMq1
 Sj1RZqkLEUYSHgE+HOToK8LXhbuDp6QEv1FUL/29pu1fzXRn5cn0PJx56+EKjJWO
 f7b3NWMNGbbD/sIcYAtU73GVNnAOGzUkNA7AjDfmq+YoiC5G+LA=
 =zsPJ
 -----END PGP SIGNATURE-----

Merge tag 'x86_urgent_for_v6.17_rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip

Pull x86 fixes from Borislav Petkov:

 - Remove a transitional asm/cpuid.h header which was added only as a
   fallback during cpuid helpers reorg

 - Initialize reserved fields in the SVSM page validation calls
   structure to zero in order to allow for future structure extensions

 - Have the sev-guest driver's buffers used in encryption operations be
   in linear mapping space as the encryption operation can be offloaded
   to an accelerator

 - Have a read-only MSR write when in an AMD SNP guest trap to the
   hypervisor as it is usually done. This makes the guest user
   experience better by simply raising a #GP instead of terminating said
   guest

 - Do not output AVX512 elapsed time for kernel threads because the data
   is wrong and fix a NULL pointer dereferencing in the process

 - Adjust the SRSO mitigation selection to the new attack vectors

* tag 'x86_urgent_for_v6.17_rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
  x86/cpuid: Remove transitional <asm/cpuid.h> header
  x86/sev: Ensure SVSM reserved fields in a page validation entry are initialized to zero
  virt: sev-guest: Satisfy linear mapping requirement in get_derived_key()
  x86/sev: Improve handling of writes to intercepted TSC MSRs
  x86/fpu: Fix NULL dereference in avx512_status()
  x86/bugs: Select best SRSO mitigation
2025-08-17 06:53:15 -07:00
..
boot - Remove a transitional asm/cpuid.h header which was added only as 2025-08-17 06:53:15 -07:00
coco - Remove a transitional asm/cpuid.h header which was added only as 2025-08-17 06:53:15 -07:00
configs x86/kconfig/32: Refresh defconfig 2025-07-14 16:25:46 +02:00
crypto This update includes the following changes: 2025-07-31 09:45:28 -07:00
entry hardening updates for v6.17-rc1 2025-07-28 17:16:12 -07:00
events perf/x86/intel/uncore: Add iMC freerunning for Panther Lake 2025-07-09 13:40:20 +02:00
hyperv x86/hyperv: Expose hv_map_msi_interrupt() 2025-07-15 06:24:16 +00:00
ia32
include - Remove a transitional asm/cpuid.h header which was added only as 2025-08-17 06:53:15 -07:00
kernel - Remove a transitional asm/cpuid.h header which was added only as 2025-08-17 06:53:15 -07:00
kvm Significant patch series in this pull request: 2025-08-03 16:23:09 -07:00
lib - Add helpers for WB{NO,}INVD with the purpose of using them in KVM and thus 2025-07-29 16:55:29 -07:00
math-emu x86/fpu: Convert task_struct::thread.fpu accesses to use x86_task_fpu() 2025-04-14 08:18:29 +02:00
mm Significant patch series in this pull request: 2025-08-05 16:02:07 +03:00
net bpf: Move bpf_jit_get_prog_name() to core.c 2025-07-26 21:26:51 +02:00
pci pci-v6.16-changes 2025-06-04 11:26:17 -07:00
platform - Map the SNP calling area pages too so that OVMF EFI fw can issue SVSM 2025-07-29 17:18:46 -07:00
power x86/smp: PM/hibernate: Split arch_resume_nosmt() 2025-06-07 14:22:56 +02:00
purgatory Crypto library updates for 6.17 2025-07-28 17:58:52 -07:00
ras
realmode - The 11 patch series "Add folio_mk_pte()" from Matthew Wilcox 2025-05-31 15:44:16 -07:00
tools x86/tools: insn_sanity.c: Emit standard build success messages 2025-07-14 17:04:43 +02:00
um Mostly cleanups, except: 2025-07-29 20:31:45 -07:00
video
virt x86/virt/tdx: Avoid indirect calls to TDX assembly functions 2025-06-10 12:32:52 -07:00
xen x86/xen/msr: Fix uninitialized variable 'err' 2025-05-21 08:44:31 +02:00
.gitignore
Kbuild tracing: Disable branch profiling in noinstr code 2025-03-22 09:49:26 +01:00
Kconfig Summary of significant series in this pull request: 2025-07-31 14:57:54 -07:00
Kconfig.assembler Core x86 updates for v6.16: 2025-05-26 16:04:17 -07:00
Kconfig.cpu x86/kbuild/64: Restrict clang versions that can use '-march=native' 2025-03-25 08:24:06 +01:00
Kconfig.cpufeatures x86/mm/64: Make 5-level paging support unconditional 2025-05-17 10:38:16 +02:00
Kconfig.debug mm: rename GENERIC_PTDUMP and PTDUMP_CORE 2025-03-17 00:05:32 -07:00
Makefile Add the CONFIG_X86_NATIVE_CPU=y build option to locally optimize the kernel 2025-05-26 21:41:14 -07:00
Makefile_32.cpu
Makefile.um um: Pass the correct Rust target and options with gcc 2025-03-18 11:01:02 +01:00