lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230807135243.3394830-1-pbonzini@redhat.com>
Date:   Mon,  7 Aug 2023 09:52:43 -0400
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org,
        oliver.upton@...ux.dev, seanjc@...gle.com
Subject: [GIT PULL] KVM changes for v6.5-rc6

Linus,

The following changes since commit 5a7591176c47cce363c1eed704241e5d1c42c5a6:

  KVM: selftests: Expand x86's sregs test to cover illegal CR0 values (2023-07-29 11:05:32 -0400)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to d5ad9aae13dcced333c1a7816ff0a4fbbb052466:

  selftests/rseq: Fix build with undefined __weak (2023-08-04 18:10:29 -0400)

I won't be around for the next couple weeks, so while submaintainers are
welcome to send me their merge window pull requests, any bug fixes will have
to go through the architecture trees.  At least for x86 things seem to be in
check, though.

Paolo

----------------------------------------------------------------
x86:

* Fix SEV race condition

ARM:

* Fixes for the configuration of SVE/SME traps when hVHE mode is in use

* Allow use of pKVM on systems with FF-A implementations that are v1.0
  compatible

* Request/release percpu IRQs (arch timer, vGIC maintenance) correctly
  when pKVM is in use

* Fix function prototype after __kvm_host_psci_cpu_entry() rename

* Skip to the next instruction when emulating writes to TCR_EL1 on
  AmpereOne systems

Selftests:

* Fix missing include

----------------------------------------------------------------
Arnd Bergmann (1):
      KVM: arm64: fix __kvm_host_psci_cpu_entry() prototype

Fuad Tabba (7):
      KVM: arm64: Factor out code for checking (h)VHE mode into a macro
      KVM: arm64: Use the appropriate feature trap register for SVE at EL2 setup
      KVM: arm64: Disable SME traps for (h)VHE at setup
      KVM: arm64: Helper to write to appropriate feature trap register based on mode
      KVM: arm64: Use the appropriate feature trap register when activating traps
      KVM: arm64: Fix resetting SVE trap values on reset for hVHE
      KVM: arm64: Fix resetting SME trap values on reset for (h)VHE

Mark Brown (1):
      selftests/rseq: Fix build with undefined __weak

Oliver Upton (3):
      KVM: arm64: Allow pKVM on v1.0 compatible FF-A implementations
      KVM: arm64: Rephrase percpu enable/disable tracking in terms of hyp
      KVM: arm64: Skip instruction after emulating write to TCR_EL1

Paolo Bonzini (4):
      KVM: SEV: snapshot the GHCB before accessing it
      KVM: SEV: only access GHCB fields once
      KVM: SEV: remove ghcb variable declarations
      Merge tag 'kvmarm-fixes-6.5-2' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD

Raghavendra Rao Ananta (1):
      KVM: arm64: Fix hardware enable/disable flows for pKVM

 arch/arm64/include/asm/el2_setup.h      |  44 ++++++++----
 arch/arm64/include/asm/kvm_asm.h        |   2 +-
 arch/arm64/include/asm/kvm_emulate.h    |  21 ++++--
 arch/arm64/kvm/arm.c                    |  61 +++++++---------
 arch/arm64/kvm/hyp/include/hyp/switch.h |   1 +
 arch/arm64/kvm/hyp/nvhe/ffa.c           |  15 +++-
 arch/arm64/kvm/hyp/nvhe/switch.c        |   2 +-
 arch/x86/kvm/svm/sev.c                  | 124 ++++++++++++++++----------------
 arch/x86/kvm/svm/svm.h                  |  26 +++++++
 tools/testing/selftests/rseq/Makefile   |   4 +-
 tools/testing/selftests/rseq/rseq.c     |   2 +
 11 files changed, 182 insertions(+), 120 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ