lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ab1f5612-dd23-3a5a-0bf0-13ab6bdcbfe4@redhat.com>
Date:   Wed, 27 Jan 2021 14:58:25 +0100
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: Re: [GIT PULL] KVM fixes for Linux 5.11-rc6

On 27/01/21 11:22, Paolo Bonzini wrote:
> Linus,
> 
> I sent this yesterday but I cannot find it in the archives (weird),
> so I am resending it.

Nevermind, I now see that you've pulled it already, though I've gotten 
no pr-tracker-bot reply either.  Sorry about the noise.

Paolo

> The following changes since commit 7c53f6b671f4aba70ff15e1b05148b10d58c2837:
> 
>    Linux 5.11-rc3 (2021-01-10 14:34:50 -0800)
> 
> are available in the Git repository at:
> 
>    https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
> 
> for you to fetch changes up to 9a78e15802a87de2b08dfd1bd88e855201d2c8fa:
> 
>    KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX (2021-01-25 18:54:09 -0500)
> 
> ----------------------------------------------------------------
> * x86 bugfixes
> * Documentation fixes
> * Avoid performance regression due to SEV-ES patches
> 
> ARM:
> - Don't allow tagged pointers to point to memslots
> - Filter out ARMv8.1+ PMU events on v8.0 hardware
> - Hide PMU registers from userspace when no PMU is configured
> - More PMU cleanups
> - Don't try to handle broken PSCI firmware
> - More sys_reg() to reg_to_encoding() conversions
> 
> ----------------------------------------------------------------
> Alexandru Elisei (1):
>        KVM: arm64: Use the reg_to_encoding() macro instead of sys_reg()
> 
> David Brazdil (1):
>        KVM: arm64: Allow PSCI SYSTEM_OFF/RESET to return
> 
> Jay Zhou (1):
>        KVM: x86: get smi pending status correctly
> 
> Like Xu (2):
>        KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh()
>        KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[]
> 
> Lorenzo Brescia (1):
>        kvm: tracing: Fix unmatched kvm_entry and kvm_exit events
> 
> Marc Zyngier (4):
>        KVM: arm64: Hide PMU registers from userspace when not available
>        KVM: arm64: Simplify handling of absent PMU system registers
>        KVM: arm64: Filter out v8.1+ events on v8.0 HW
>        KVM: Forbid the use of tagged userspace addresses for memslots
> 
> Maxim Levitsky (1):
>        KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration
> 
> Paolo Bonzini (2):
>        Merge tag 'kvmarm-fixes-5.11-2' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD
>        KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX
> 
> Quentin Perret (1):
>        KVM: Documentation: Fix spec for KVM_CAP_ENABLE_CAP_VM
> 
> Sean Christopherson (3):
>        KVM: x86: Add more protection against undefined behavior in rsvd_bits()
>        KVM: SVM: Unconditionally sync GPRs to GHCB on VMRUN of SEV-ES guest
>        KVM: x86: Revert "KVM: x86: Mark GPRs dirty when written"
> 
> Steven Price (1):
>        KVM: arm64: Compute TPIDR_EL2 ignoring MTE tag
> 
> Zenghui Yu (1):
>        KVM: Documentation: Update description of KVM_{GET,CLEAR}_DIRTY_LOG
> 
>   Documentation/virt/kvm/api.rst       | 21 ++++----
>   arch/arm64/kvm/arm.c                 |  3 +-
>   arch/arm64/kvm/hyp/nvhe/psci-relay.c | 13 ++---
>   arch/arm64/kvm/pmu-emul.c            | 10 ++--
>   arch/arm64/kvm/sys_regs.c            | 93 ++++++++++++++++++++++--------------
>   arch/x86/kvm/kvm_cache_regs.h        | 51 ++++++++++----------
>   arch/x86/kvm/mmu.h                   |  9 +++-
>   arch/x86/kvm/svm/nested.c            |  3 ++
>   arch/x86/kvm/svm/sev.c               | 15 +++---
>   arch/x86/kvm/svm/svm.c               |  2 +
>   arch/x86/kvm/vmx/nested.c            | 44 ++++++++++++-----
>   arch/x86/kvm/vmx/pmu_intel.c         |  6 ++-
>   arch/x86/kvm/vmx/vmx.c               |  2 +
>   arch/x86/kvm/x86.c                   | 11 +++--
>   virt/kvm/kvm_main.c                  |  1 +
>   15 files changed, 172 insertions(+), 112 deletions(-)
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ