lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221127085316.452610-1-pbonzini@redhat.com>
Date:   Sun, 27 Nov 2022 03:53:16 -0500
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for Linux 6.1-rc7

Linus,

The following changes since commit 6d3085e4d89ad7e6c7f1c6cf929d903393565861:

  KVM: x86/mmu: Block all page faults during kvm_zap_gfn_range() (2022-11-11 07:19:46 -0500)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to fe08e36be9ecbf6b38714a77c97b1d25b7a6e4b0:

  Merge branch 'kvm-dwmw2-fixes' into HEAD (2022-11-23 18:59:45 -0500)

----------------------------------------------------------------
x86:

* Fixes for Xen emulation.  While nobody should be enabling it in
  the kernel (the only public users of the feature are the selftests),
  the bug effectively allows userspace to read arbitrary memory.

* Correctness fixes for nested hypervisors that do not intercept INIT
  or SHUTDOWN on AMD; the subsequent CPU reset can cause a use-after-free
  when it disables virtualization extensions.  While downgrading the panic
  to a WARN is quite easy, the full fix is a bit more laborious; there
  are also tests.  This is the bulk of the pull request.

* Fix race condition due to incorrect mmu_lock use around
  make_mmu_pages_available().

Generic:

* Obey changes to the kvm.halt_poll_ns module parameter in VMs
  not using KVM_CAP_HALT_POLL, restoring behavior from before
  the introduction of the capability

----------------------------------------------------------------
David Matlack (3):
      KVM: Cap vcpu->halt_poll_ns before halting rather than after
      KVM: Avoid re-reading kvm->max_halt_poll_ns during halt-polling
      KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL

David Woodhouse (3):
      KVM: x86/xen: Validate port number in SCHEDOP_poll
      KVM: x86/xen: Only do in-kernel acceleration of hypercalls for guest CPL0
      KVM: Update gfn_to_pfn_cache khva when it moves within the same page

Kazuki Takiguchi (1):
      KVM: x86/mmu: Fix race condition in direct_page_fault

Maxim Levitsky (9):
      KVM: x86: nSVM: leave nested mode on vCPU free
      KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use
      KVM: x86: add kvm_leave_nested
      KVM: x86: forcibly leave nested mode on vCPU reset
      KVM: selftests: move idt_entry to header
      kvm: selftests: add svm nested shutdown test
      KVM: x86: allow L1 to not intercept triple fault
      KVM: selftests: add svm part to triple_fault_test
      KVM: x86: remove exit_int_info warning in svm_handle_exit

Paolo Bonzini (2):
      Merge branch 'kvm-svm-harden' into HEAD
      Merge branch 'kvm-dwmw2-fixes' into HEAD

 arch/x86/kvm/mmu/mmu.c                             | 13 ++--
 arch/x86/kvm/svm/nested.c                          | 12 +++-
 arch/x86/kvm/svm/svm.c                             | 16 +----
 arch/x86/kvm/vmx/nested.c                          |  4 +-
 arch/x86/kvm/x86.c                                 | 29 +++++++--
 arch/x86/kvm/xen.c                                 | 32 +++++++---
 include/linux/kvm_host.h                           |  1 +
 tools/testing/selftests/kvm/.gitignore             |  1 +
 tools/testing/selftests/kvm/Makefile               |  1 +
 .../selftests/kvm/include/x86_64/processor.h       | 13 ++++
 tools/testing/selftests/kvm/lib/x86_64/processor.c | 13 ----
 .../kvm/x86_64/svm_nested_shutdown_test.c          | 67 ++++++++++++++++++++
 .../selftests/kvm/x86_64/triple_fault_event_test.c | 73 +++++++++++++++++-----
 virt/kvm/kvm_main.c                                | 52 ++++++++++++---
 virt/kvm/pfncache.c                                |  7 ++-
 15 files changed, 251 insertions(+), 83 deletions(-)
 create mode 100644 tools/testing/selftests/kvm/x86_64/svm_nested_shutdown_test.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ