lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20210126175612.1533411-1-pbonzini@redhat.com>
Date:   Tue, 26 Jan 2021 12:56:12 -0500
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for Linux 5.11-rc5

Linus,

The following changes since commit 7c53f6b671f4aba70ff15e1b05148b10d58c2837:

  Linux 5.11-rc3 (2021-01-10 14:34:50 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 9a78e15802a87de2b08dfd1bd88e855201d2c8fa:

  KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX (2021-01-25 18:54:09 -0500)

----------------------------------------------------------------
* x86 bugfixes
* Documentation fixes
* Avoid performance regression due to SEV-ES patches

ARM:
- Don't allow tagged pointers to point to memslots
- Filter out ARMv8.1+ PMU events on v8.0 hardware
- Hide PMU registers from userspace when no PMU is configured
- More PMU cleanups
- Don't try to handle broken PSCI firmware
- More sys_reg() to reg_to_encoding() conversions

----------------------------------------------------------------
Alexandru Elisei (1):
      KVM: arm64: Use the reg_to_encoding() macro instead of sys_reg()

David Brazdil (1):
      KVM: arm64: Allow PSCI SYSTEM_OFF/RESET to return

Jay Zhou (1):
      KVM: x86: get smi pending status correctly

Like Xu (2):
      KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh()
      KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[]

Lorenzo Brescia (1):
      kvm: tracing: Fix unmatched kvm_entry and kvm_exit events

Marc Zyngier (4):
      KVM: arm64: Hide PMU registers from userspace when not available
      KVM: arm64: Simplify handling of absent PMU system registers
      KVM: arm64: Filter out v8.1+ events on v8.0 HW
      KVM: Forbid the use of tagged userspace addresses for memslots

Maxim Levitsky (1):
      KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration

Paolo Bonzini (2):
      Merge tag 'kvmarm-fixes-5.11-2' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD
      KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX

Quentin Perret (1):
      KVM: Documentation: Fix spec for KVM_CAP_ENABLE_CAP_VM

Sean Christopherson (3):
      KVM: x86: Add more protection against undefined behavior in rsvd_bits()
      KVM: SVM: Unconditionally sync GPRs to GHCB on VMRUN of SEV-ES guest
      KVM: x86: Revert "KVM: x86: Mark GPRs dirty when written"

Steven Price (1):
      KVM: arm64: Compute TPIDR_EL2 ignoring MTE tag

Zenghui Yu (1):
      KVM: Documentation: Update description of KVM_{GET,CLEAR}_DIRTY_LOG

 Documentation/virt/kvm/api.rst       | 21 ++++----
 arch/arm64/kvm/arm.c                 |  3 +-
 arch/arm64/kvm/hyp/nvhe/psci-relay.c | 13 ++---
 arch/arm64/kvm/pmu-emul.c            | 10 ++--
 arch/arm64/kvm/sys_regs.c            | 93 ++++++++++++++++++++++--------------
 arch/x86/kvm/kvm_cache_regs.h        | 51 ++++++++++----------
 arch/x86/kvm/mmu.h                   |  9 +++-
 arch/x86/kvm/svm/nested.c            |  3 ++
 arch/x86/kvm/svm/sev.c               | 15 +++---
 arch/x86/kvm/svm/svm.c               |  2 +
 arch/x86/kvm/vmx/nested.c            | 44 ++++++++++++-----
 arch/x86/kvm/vmx/pmu_intel.c         |  6 ++-
 arch/x86/kvm/vmx/vmx.c               |  2 +
 arch/x86/kvm/x86.c                   | 11 +++--
 virt/kvm/kvm_main.c                  |  1 +
 15 files changed, 172 insertions(+), 112 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ