lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Zsb4kbq6FAfgg4WA@linux.dev>
Date: Thu, 22 Aug 2024 01:36:33 -0700
From: Oliver Upton <oliver.upton@...ux.dev>
To: Catalin Marinas <catalin.marinas@....com>
Cc: Marc Zyngier <maz@...nel.org>, Zenghui Yu <yuzenghui@...wei.com>,
	kvmarm@...ts.linux.dev, Paolo Bonzini <pbonzini@...hat.com>,
	linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] KVM/arm64 fixes for 6.11, round #2

Hi Catalin,

Paolo is on holiday for a few weeks and has asked that KVM arch maintainers
send pulls through the architecture trees in his absence.

So lucky you, here's a pile of kvmarm crap from the past week.

Details can be found in the tag, but this is a set of small fixes
around the shop thanks to syzkaller bringup on KVM/arm64 and a few
recently introduced bugs.

Please pull.

-- 
Thanks,
Oliver

The following changes since commit 9eb18136af9fe4dd688724070f2bfba271bd1542:

  KVM: arm64: vgic: Hold config_lock while tearing down a CPU interface (2024-08-08 16:58:22 +0000)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm.git tags/kvmarm-fixes-6.11-2

for you to fetch changes up to 3e6245ebe7ef341639e9a7e402b3ade8ad45a19f:

  KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 (2024-08-22 08:08:37 +0000)

----------------------------------------------------------------
KVM/arm64 fixes for 6.11, round #2

 - Don't drop references on LPIs that weren't visited by the
   vgic-debug iterator

 - Cure lock ordering issue when unregistering vgic redistributors

 - Fix for misaligned stage-2 mappings when VMs are backed by hugetlb
   pages

 - Treat SGI registers as UNDEFINED if a VM hasn't been configured for
   GICv3

----------------------------------------------------------------
Marc Zyngier (2):
      KVM: arm64: vgic: Don't hold config_lock while unregistering redistributors
      KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3

Oliver Upton (1):
      KVM: arm64: Ensure canonical IPA is hugepage-aligned when handling fault

Zenghui Yu (1):
      KVM: arm64: vgic-debug: Don't put unmarked LPIs

 arch/arm64/kvm/mmu.c             | 9 ++++++++-
 arch/arm64/kvm/sys_regs.c        | 6 ++++++
 arch/arm64/kvm/vgic/vgic-debug.c | 2 +-
 arch/arm64/kvm/vgic/vgic-init.c  | 9 ++++++---
 arch/arm64/kvm/vgic/vgic.c       | 5 +++++
 arch/arm64/kvm/vgic/vgic.h       | 7 +++++++
 6 files changed, 33 insertions(+), 5 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ