lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20250301075732.2438425-1-pbonzini@redhat.com>
Date: Sat,  1 Mar 2025 02:57:32 -0500
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org,
	kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for Linux 6.14-rc5

Linus,

The following changes since commit 0ad2507d5d93f39619fc42372c347d6006b64319:

  Linux 6.14-rc3 (2025-02-16 14:02:44 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 916b7f42b3b3b539a71c204a9b49fdc4ca92cd82:

  kvm: retry nx_huge_page_recovery_thread creation (2025-03-01 02:54:18 -0500)

----------------------------------------------------------------
ARM:

* Fix TCR_EL2 configuration to not use the ASID in TTBR1_EL2
  and not mess-up T1SZ/PS by using the HCR_EL2.E2H==0 layout.

* Bring back the VMID allocation to the vcpu_load phase, ensuring
  that we only setup VTTBR_EL2 once on VHE. This cures an ugly
  race that would lead to running with an unallocated VMID.

RISC-V:

* Fix hart status check in SBI HSM extension

* Fix hart suspend_type usage in SBI HSM extension

* Fix error returned by SBI IPI and TIME extensions for
  unsupported function IDs

* Fix suspend_type usage in SBI SUSP extension

* Remove unnecessary vcpu kick after injecting interrupt
  via IMSIC guest file

x86:

* Fix an nVMX bug where KVM fails to detect that, after nested
  VM-Exit, L1 has a pending IRQ (or NMI).

* To avoid freeing the PIC while vCPUs are still around, which
  would cause a NULL pointer access with the previous patch,
  destroy vCPUs before any VM-level destruction.

* Handle failures to create vhost_tasks

----------------------------------------------------------------
Andrew Jones (5):
      riscv: KVM: Fix hart suspend status check
      riscv: KVM: Fix hart suspend_type use
      riscv: KVM: Fix SBI IPI error generation
      riscv: KVM: Fix SBI TIME error generation
      riscv: KVM: Fix SBI sleep_type use

BillXiang (1):
      riscv: KVM: Remove unnecessary vcpu kick

Keith Busch (2):
      vhost: return task creation error instead of NULL
      kvm: retry nx_huge_page_recovery_thread creation

Oliver Upton (1):
      KVM: arm64: Ensure a VMID is allocated before programming VTTBR_EL2

Paolo Bonzini (2):
      Merge tag 'kvmarm-fixes-6.14-3' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
      Merge tag 'kvm-riscv-fixes-6.14-1' of https://github.com/kvm-riscv/linux into HEAD

Sean Christopherson (2):
      KVM: x86: Free vCPUs before freeing VM state
      KVM: nVMX: Process events on nested VM-Exit if injectable IRQ or NMI is pending

Will Deacon (1):
      KVM: arm64: Fix tcr_el2 initialisation in hVHE mode

 arch/arm64/include/asm/kvm_arm.h  |  2 +-
 arch/arm64/include/asm/kvm_host.h |  2 +-
 arch/arm64/kvm/arm.c              | 37 ++++++++++++++++-----------------
 arch/arm64/kvm/vmid.c             | 11 +++-------
 arch/riscv/kvm/aia_imsic.c        |  1 -
 arch/riscv/kvm/vcpu_sbi_hsm.c     | 11 +++++-----
 arch/riscv/kvm/vcpu_sbi_replace.c | 15 +++++++++++---
 arch/riscv/kvm/vcpu_sbi_system.c  |  3 ++-
 arch/x86/kvm/mmu/mmu.c            | 12 +++++------
 arch/x86/kvm/vmx/nested.c         | 11 ++++++++++
 arch/x86/kvm/x86.c                |  2 +-
 drivers/vhost/vhost.c             |  2 +-
 include/linux/call_once.h         | 43 +++++++++++++++++++++++++++++----------
 kernel/vhost_task.c               |  4 ++--
 14 files changed, 94 insertions(+), 62 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ