lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri,  5 Feb 2021 03:04:56 -0500
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for 5.11-rc7

Linus,

The following changes since commit 9a78e15802a87de2b08dfd1bd88e855201d2c8fa:

  KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX (2021-01-25 18:54:09 -0500)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 031b91a5fe6f1ce61b7617614ddde9ed61e252be:

  KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (2021-02-04 12:59:28 -0500)

----------------------------------------------------------------
x86 has lots of small bugfixes, mostly one liners.  It's quite late in
5.11-rc but none of them are related to this merge window; it's just
bugs coming in at the wrong time.  Of note among the others:
- "KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off"
  (live migration failure seen on distros that hadn't switched to tsx=off
  right away)

ARM:
- Avoid clobbering extra registers on initialisation

----------------------------------------------------------------
Andrew Scull (1):
      KVM: arm64: Don't clobber x4 in __do_hyp_init

Ben Gardon (1):
      KVM: x86/mmu: Fix TDP MMU zap collapsible SPTEs

Michael Roth (1):
      KVM: x86: fix CPUID entries returned by KVM_GET_CPUID2 ioctl

Paolo Bonzini (3):
      Merge tag 'kvmarm-fixes-5.11-3' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD
      KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off
      KVM: x86: cleanup CR3 reserved bits checks

Peter Gonda (1):
      Fix unsynchronized access to sev members through svm_register_enc_region

Sean Christopherson (3):
      KVM: x86: Update emulator context mode if SYSENTER xfers to 64-bit mode
      KVM: SVM: Treat SVM as unsupported when running as an SEV guest
      KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset

Vitaly Kuznetsov (1):
      KVM: x86: Supplement __cr4_reserved_bits() with X86_FEATURE_PCID check

Yu Zhang (1):
      KVM: Documentation: Fix documentation for nested.

Zheng Zhan Liang (1):
      KVM/x86: assign hva with the right value to vm_munmap the pages

 Documentation/virt/kvm/nested-vmx.rst            |  6 +++--
 Documentation/virt/kvm/running-nested-guests.rst |  2 +-
 arch/arm64/kvm/hyp/nvhe/hyp-init.S               | 20 ++++++++-------
 arch/x86/kvm/cpuid.c                             |  2 +-
 arch/x86/kvm/emulate.c                           |  2 ++
 arch/x86/kvm/mmu/tdp_mmu.c                       |  6 ++---
 arch/x86/kvm/svm/nested.c                        | 13 +++-------
 arch/x86/kvm/svm/sev.c                           | 17 +++++++------
 arch/x86/kvm/svm/svm.c                           |  5 ++++
 arch/x86/kvm/svm/svm.h                           |  3 ---
 arch/x86/kvm/vmx/vmx.c                           | 17 ++++++++++---
 arch/x86/kvm/x86.c                               | 31 ++++++++++++++++--------
 arch/x86/kvm/x86.h                               |  2 ++
 arch/x86/mm/mem_encrypt.c                        |  1 +
 14 files changed, 77 insertions(+), 50 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ