lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Sun,  6 Nov 2022 03:46:56 -0500
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] More KVM fixes for Linux 6.1-rc4

Linus,

The following changes since commit 8e5423e991e8cd0988d0c4a3f4ac4ca1af7d148a:

  Merge tag 'parisc-for-6.1-2' of git://git.kernel.org/pub/scm/linux/kernel/git/deller/parisc-linux (2022-11-02 11:25:12 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to f4298cac2bfcced49ab308756dc8fef684f3da81:

  Merge tag 'kvmarm-fixes-6.1-3' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD (2022-11-06 03:30:49 -0500)

----------------------------------------------------------------
ARM:

* Fix the pKVM stage-1 walker erronously using the stage-2 accessor

* Correctly convert vcpu->kvm to a hyp pointer when generating
  an exception in a nVHE+MTE configuration

* Check that KVM_CAP_DIRTY_LOG_* are valid before enabling them

* Fix SMPRI_EL1/TPIDR2_EL0 trapping on VHE

* Document the boot requirements for FGT when entering the kernel
  at EL1

x86:

* Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit()

* Make argument order consistent for kvcalloc()

* Userspace API fixes for DEBUGCTL and LBRs

----------------------------------------------------------------
Ben Gardon (1):
      KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit()

Gavin Shan (1):
      KVM: Check KVM_CAP_DIRTY_LOG_{RING, RING_ACQ_REL} prior to enabling them

Liao Chang (1):
      KVM: x86: Fix a typo about the usage of kvcalloc()

Marc Zyngier (1):
      KVM: arm64: Fix SMPRI_EL1/TPIDR2_EL0 trapping on VHE

Mark Brown (1):
      arm64: booting: Document our requirements for fine grained traps with SME

Paolo Bonzini (2):
      Merge branch 'kvm-master' into HEAD
      Merge tag 'kvmarm-fixes-6.1-3' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD

Quentin Perret (1):
      KVM: arm64: Use correct accessor to parse stage-1 PTEs

Ryan Roberts (1):
      KVM: arm64: Fix bad dereference on MTE-enabled systems

Sean Christopherson (3):
      KVM: VMX: Advertise PMU LBRs if and only if perf supports LBRs
      KVM: VMX: Fold vmx_supported_debugctl() into vcpu_supported_debugctl()
      KVM: VMX: Ignore guest CPUID for host userspace writes to DEBUGCTL

 Documentation/arm64/booting.rst         |  8 ++++++++
 arch/arm64/kvm/hyp/exception.c          |  3 ++-
 arch/arm64/kvm/hyp/include/hyp/switch.h | 20 ++++++++++++++++++++
 arch/arm64/kvm/hyp/nvhe/mem_protect.c   |  2 +-
 arch/arm64/kvm/hyp/nvhe/switch.c        | 26 --------------------------
 arch/arm64/kvm/hyp/vhe/switch.c         |  8 --------
 arch/x86/kvm/cpuid.c                    |  2 +-
 arch/x86/kvm/vmx/capabilities.h         | 19 +++----------------
 arch/x86/kvm/vmx/vmx.c                  | 18 +++++++++++-------
 arch/x86/kvm/x86.c                      |  3 +++
 virt/kvm/kvm_main.c                     |  3 +++
 11 files changed, 52 insertions(+), 60 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ