lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210715144159.1132260-1-pbonzini@redhat.com>
Date:   Thu, 15 Jul 2021 10:41:59 -0400
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for Linux 5.14-rc2

Linus,

The following changes since commit b8917b4ae44d1b945f6fba3d8ee6777edb44633b:

  Merge tag 'kvmarm-5.14' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD (2021-06-25 11:24:24 -0400)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to d951b2210c1ad2dc08345bb8d97e5a172a15261e:

  KVM: selftests: smm_test: Test SMM enter from L2 (2021-07-15 10:19:44 -0400)

----------------------------------------------------------------
* Allow again loading KVM on 32-bit non-PAE builds

* Fixes for host SMIs on AMD

* Fixes for guest SMIs on AMD

* Fixes for selftests on s390 and ARM

* Fix memory leak

* Enforce no-instrumentation area on vmentry when hardware
  breakpoints are in use.

----------------------------------------------------------------
Christian Borntraeger (2):
      KVM: selftests: introduce P44V64 for z196 and EC12
      KVM: selftests: do not require 64GB in set_memory_region_test

Kefeng Wang (1):
      KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio

Lai Jiangshan (1):
      KVM: X86: Disable hardware breakpoints unconditionally before kvm_x86->run()

Like Xu (1):
      KVM: x86/pmu: Clear anythread deprecated bit when 0xa leaf is unsupported on the SVM

Marc Zyngier (1):
      KVM: selftests: x86: Address missing vm_install_exception_handler conversions

Maxim Levitsky (3):
      KVM: SVM: #SMI interception must not skip the instruction
      KVM: SVM: remove INIT intercept handler
      KVM: SVM: add module param to control the #SMI interception

Paolo Bonzini (1):
      Merge tag 'kvm-s390-master-5.14-1' of git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD

Pavel Skripkin (1):
      kvm: debugfs: fix memory leak in kvm_create_vm_debugfs

Ricardo Koller (1):
      KVM: selftests: Address extra memslot parameters in vm_vaddr_alloc

Sean Christopherson (7):
      Revert "KVM: x86: WARN and reject loading KVM if NX is supported but not enabled"
      KVM: x86: Use guest MAXPHYADDR from CPUID.0x8000_0008 iff TDP is enabled
      KVM: x86: Use kernel's x86_phys_bits to handle reduced MAXPHYADDR
      KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs
      KVM: SVM: Revert clearing of C-bit on GPA in #NPF handler
      KVM: SVM: Return -EFAULT if copy_to_user() for SEV mig packet header fails
      KVM: SVM: Fix sev_pin_memory() error checks in SEV migration utilities

Vitaly Kuznetsov (6):
      KVM: nSVM: Check the value written to MSR_VM_HSAVE_PA
      KVM: nSVM: Check that VM_HSAVE_PA MSR was set before VMRUN
      KVM: nSVM: Introduce svm_copy_vmrun_state()
      KVM: nSVM: Fix L1 state corruption upon return from SMM
      KVM: nSVM: Restore nested control upon leaving SMM
      KVM: selftests: smm_test: Test SMM enter from L2

Yu Zhang (1):
      KVM: VMX: Remove vmx_msr_index from vmx.h

 arch/x86/kvm/cpuid.c                                 | 30 +++++++++--
 arch/x86/kvm/mmu/mmu.c                               |  2 +
 arch/x86/kvm/mmu/paging.h                            | 14 +++++
 arch/x86/kvm/mmu/paging_tmpl.h                       |  4 +-
 arch/x86/kvm/mmu/spte.h                              |  6 ---
 arch/x86/kvm/svm/nested.c                            | 53 +++++++++++-------
 arch/x86/kvm/svm/sev.c                               | 14 ++---
 arch/x86/kvm/svm/svm.c                               | 77 ++++++++++++++++++++++++---
 arch/x86/kvm/svm/svm.h                               |  5 ++
 arch/x86/kvm/vmx/vmx.h                               |  2 -
 arch/x86/kvm/x86.c                                   |  8 +--
 tools/testing/selftests/kvm/include/kvm_util.h       |  3 +-
 tools/testing/selftests/kvm/lib/aarch64/processor.c  |  2 +-
 tools/testing/selftests/kvm/lib/guest_modes.c        | 16 ++++++
 tools/testing/selftests/kvm/lib/kvm_util.c           |  5 ++
 tools/testing/selftests/kvm/set_memory_region_test.c |  3 +-
 tools/testing/selftests/kvm/x86_64/hyperv_features.c |  2 +-
 tools/testing/selftests/kvm/x86_64/mmu_role_test.c   |  2 +-
 tools/testing/selftests/kvm/x86_64/smm_test.c        | 70 +++++++++++++++++++++---
 virt/kvm/coalesced_mmio.c                            |  2 +-
 virt/kvm/kvm_main.c                                  |  2 +-
 21 files changed, 258 insertions(+), 64 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ