lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue,  1 Nov 2022 10:24:31 -0400
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM changes for 6.1-rc4

Linus,

The following changes since commit 9aec606c1609a5da177b579475a73f6c948e034a:

  tools: include: sync include/api/linux/kvm.h (2022-10-22 07:54:19 -0400)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 7353633814f6e5b4899fb9ee1483709d6bb0e1cd:

  KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign() (2022-10-28 06:47:26 -0400)

----------------------------------------------------------------
x86:

- fix lock initialization race in gfn-to-pfn cache (+selftests)

- fix two refcounting errors

- emulator fixes

- mask off reserved bits in CPUID

- fix bug with disabling SGX

RISC-V:

- update MAINTAINERS

----------------------------------------------------------------
Eiichi Tsukata (1):
      KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()

Emanuele Giuseppe Esposito (1):
      KVM: VMX: fully disable SGX if SECONDARY_EXEC_ENCLS_EXITING unavailable

Hou Wenlong (2):
      KVM: x86: Reduce refcount if single_open() fails in kvm_mmu_rmaps_stat_open()
      KVM: debugfs: Return retval of simple_attr_open() if it fails

Jim Mattson (5):
      KVM: x86: Mask off reserved bits in CPUID.80000001H
      KVM: x86: Mask off reserved bits in CPUID.80000006H
      KVM: x86: Mask off reserved bits in CPUID.80000008H
      KVM: x86: Mask off reserved bits in CPUID.8000001AH
      KVM: x86: Mask off reserved bits in CPUID.8000001FH

Maxim Levitsky (5):
      KVM: x86: emulator: em_sysexit should update ctxt->mode
      KVM: x86: emulator: introduce emulator_recalc_and_set_mode
      KVM: x86: emulator: update the emulation mode after rsm
      KVM: x86: emulator: update the emulation mode after CR0 write
      KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format

Michal Luczaj (2):
      KVM: Initialize gfn_to_pfn_cache locks in dedicated helper
      KVM: selftests: Add tests in xen_shinfo_test to detect lock races

Palmer Dabbelt (1):
      MAINTAINERS: git://github -> https://github.com for kvm-riscv

Sean Christopherson (3):
      KVM: x86: Exempt pending triple fault from event injection sanity check
      KVM: Reject attempts to consume or refresh inactive gfn_to_pfn_cache
      KVM: selftests: Mark "guest_saw_irq" as volatile in xen_shinfo_test

 MAINTAINERS                                        |   2 +-
 arch/x86/kvm/cpuid.c                               |  11 +-
 arch/x86/kvm/debugfs.c                             |   7 +-
 arch/x86/kvm/emulate.c                             | 108 +++++++++++-----
 arch/x86/kvm/vmx/vmx.c                             |   5 +
 arch/x86/kvm/x86.c                                 |  27 +++-
 arch/x86/kvm/xen.c                                 |  64 +++++-----
 include/linux/kvm_host.h                           |  24 +++-
 .../testing/selftests/kvm/x86_64/xen_shinfo_test.c | 142 ++++++++++++++++++++-
 virt/kvm/kvm_main.c                                |  13 +-
 virt/kvm/pfncache.c                                |  62 ++++++---
 11 files changed, 362 insertions(+), 103 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ