lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20201101092427.3999755-1-pbonzini@redhat.com>
Date:   Sun,  1 Nov 2020 04:24:27 -0500
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for 5.10-rc2

Linus,

The following changes since commit 3650b228f83adda7e5ee532e2b90429c03f7b9ec:

  Linux 5.10-rc1 (2020-10-25 15:14:11 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 9478dec3b5e79a1431e2e2b911e32e52a11c6320:

  KVM: vmx: remove unused variable (2020-10-31 11:38:43 -0400)

----------------------------------------------------------------
ARM:
* selftest fix
* Force PTE mapping on device pages provided via VFIO
* Fix detection of cacheable mapping at S2
* Fallback to PMD/PTE mappings for composite huge pages
* Fix accounting of Stage-2 PGD allocation
* Fix AArch32 handling of some of the debug registers
* Simplify host HYP entry
* Fix stray pointer conversion on nVHE TLB invalidation
* Fix initialization of the nVHE code
* Simplify handling of capabilities exposed to HYP
* Nuke VCPUs caught using a forbidden AArch32 EL0

x86:
* new nested virtualization selftest
* Miscellaneous fixes
* make W=1 fixes
* Reserve new CPUID bit in the KVM leaves

----------------------------------------------------------------
Andrew Jones (1):
      KVM: selftests: Don't require THP to run tests

David Woodhouse (1):
      x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID

Gavin Shan (1):
      KVM: arm64: Use fallback mapping sizes for contiguous huge page sizes

Jim Mattson (1):
      KVM: selftests: test behavior of unmapped L2 APIC-access address

Marc Zyngier (4):
      KVM: arm64: Don't corrupt tpidr_el2 on failed HVC call
      KVM: arm64: Remove leftover kern_hyp_va() in nVHE TLB invalidation
      KVM: arm64: Drop useless PAN setting on host EL1 to EL2 transition
      KVM: arm64: Fix AArch32 handling of DBGD{CCINT,SCRext} and DBGVCR

Mark Rutland (3):
      KVM: arm64: Factor out is_{vhe,nvhe}_hyp_code()
      arm64: cpufeature: reorder cpus_have_{const, final}_cap()
      arm64: cpufeature: upgrade hyp caps to final

Paolo Bonzini (3):
      Merge tag 'kvmarm-fixes-5.10-1' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD
      KVM: x86: replace static const variables with macros
      KVM: vmx: remove unused variable

Qais Yousef (1):
      KVM: arm64: Handle Asymmetric AArch32 systems

Santosh Shukla (1):
      KVM: arm64: Force PTE mapping on fault resulting in a device mapping

Takashi Iwai (1):
      KVM: x86: Fix NULL dereference at kvm_msr_ignored_check()

Vitaly Kuznetsov (1):
      KVM: VMX: eVMCS: make evmcs_sanitize_exec_ctrls() work again

Will Deacon (2):
      KVM: arm64: Allocate stage-2 pgd pages with GFP_KERNEL_ACCOUNT
      KVM: arm64: Fix masks in stage2_pte_cacheable()

 Documentation/virt/kvm/cpuid.rst                   |   4 +
 arch/arm64/include/asm/cpufeature.h                |  40 ++++--
 arch/arm64/include/asm/kvm_host.h                  |   1 +
 arch/arm64/include/asm/virt.h                      |   9 +-
 arch/arm64/kernel/image-vars.h                     |   1 -
 arch/arm64/kvm/arm.c                               |  19 +++
 arch/arm64/kvm/hyp/nvhe/host.S                     |   2 -
 arch/arm64/kvm/hyp/nvhe/hyp-init.S                 |  23 +++-
 arch/arm64/kvm/hyp/nvhe/tlb.c                      |   1 -
 arch/arm64/kvm/hyp/pgtable.c                       |   4 +-
 arch/arm64/kvm/mmu.c                               |  27 +++-
 arch/arm64/kvm/sys_regs.c                          |   6 +-
 arch/x86/include/uapi/asm/kvm_para.h               |   1 +
 arch/x86/kvm/mmu/mmu.c                             |  10 +-
 arch/x86/kvm/mmu/spte.c                            |  16 +--
 arch/x86/kvm/mmu/spte.h                            |  16 +--
 arch/x86/kvm/vmx/evmcs.c                           |   3 +-
 arch/x86/kvm/vmx/evmcs.h                           |   3 +-
 arch/x86/kvm/vmx/vmx.c                             |   6 +-
 arch/x86/kvm/x86.c                                 |   8 +-
 tools/testing/selftests/kvm/.gitignore             |   1 +
 tools/testing/selftests/kvm/Makefile               |   1 +
 tools/testing/selftests/kvm/include/x86_64/vmx.h   |   6 +
 tools/testing/selftests/kvm/lib/kvm_util.c         |  23 +++-
 tools/testing/selftests/kvm/lib/x86_64/vmx.c       |   9 ++
 .../selftests/kvm/x86_64/vmx_apic_access_test.c    | 142 +++++++++++++++++++++
 26 files changed, 306 insertions(+), 76 deletions(-)
 create mode 100644 tools/testing/selftests/kvm/x86_64/vmx_apic_access_test.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ