lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230327175315.3763370-1-pbonzini@redhat.com>
Date:   Mon, 27 Mar 2023 13:53:15 -0400
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org, maz@...nel.org,
        oliver.upton@...ux.dev, apatel@...tanamicro.com
Subject: [GIT PULL] Non-x86 KVM fixes for Linux 6.3-rc5

Linus,

The following changes since commit eeac8ede17557680855031c6f305ece2378af326:

  Linux 6.3-rc2 (2023-03-12 16:36:44 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 9e347ba03029e10e6405f8c3a7a91a5597943ed9:

  Merge tag 'kvm-riscv-fixes-6.3-1' of https://github.com/kvm-riscv/linux into HEAD (2023-03-27 10:04:07 -0400)

There are also some pending x86 changes will come later this week.

----------------------------------------------------------------
RISC-V:

* Fix VM hang in case of timer delta being zero

ARM:

* Fixes for the MMU:

  * Read the MMU notifier seq before dropping the mmap lock to guard
    against reading a potentially stale VMA

  * Disable interrupts when walking user page tables to protect against
    the page table being freed

  * Read the MTE permissions for the VMA within the mmap lock critical
    section, avoiding the use of a potentally stale VMA pointer

* Fixes for the vPMU:

  * Return the sum of the current perf event value and PMC snapshot for
    reads from userspace

  * Don't save the value of guest writes to PMCR_EL0.{C,P}, which could
    otherwise lead to userspace erroneously resetting the vPMU during VM
    save/restore

----------------------------------------------------------------
David Matlack (1):
      KVM: arm64: Retry fault if vma_lookup() results become invalid

Marc Zyngier (2):
      KVM: arm64: Disable interrupts while walking userspace PTs
      KVM: arm64: Check for kvm_vma_mte_allowed in the critical section

Paolo Bonzini (2):
      Merge tag 'kvmarm-fixes-6.3-2' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
      Merge tag 'kvm-riscv-fixes-6.3-1' of https://github.com/kvm-riscv/linux into HEAD

Rajnesh Kanwal (1):
      riscv/kvm: Fix VM hang in case of timer delta being zero.

Reiji Watanabe (2):
      KVM: arm64: PMU: Fix GET_ONE_REG for vPMC regs to return the current value
      KVM: arm64: PMU: Don't save PMCR_EL0.{C,P} for the vCPU

 arch/arm64/kvm/mmu.c        | 99 +++++++++++++++++++++++++++++----------------
 arch/arm64/kvm/pmu-emul.c   |  3 +-
 arch/arm64/kvm/sys_regs.c   | 21 +++++++++-
 arch/riscv/kvm/vcpu_timer.c |  6 +--
 4 files changed, 87 insertions(+), 42 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ