lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250710104936.232026-1-pbonzini@redhat.com>
Date: Thu, 10 Jul 2025 06:49:36 -0400
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org,
	kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for Linux 6.16-rc6

Linus,

The following changes since commit 25e8b1dd4883e6c251c3db5b347f3c8ae4ade921:

  KVM: TDX: Exit to userspace for GetTdVmCallInfo (2025-06-20 13:55:47 -0400)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 4578a747f3c7950be3feb93c2db32eb597a3e55b:

  KVM: x86: avoid underflow when scaling TSC frequency (2025-07-09 13:52:50 -0400)

Many patches, pretty much all of them small, that accumulated while I
was on vacation.
----------------------------------------------------------------
ARM:

- Remove the last leftovers of the ill-fated FPSIMD host state
  mapping at EL2 stage-1

- Fix unexpected advertisement to the guest of unimplemented S2 base
  granule sizes

- Gracefully fail initialising pKVM if the interrupt controller isn't
  GICv3

- Also gracefully fail initialising pKVM if the carveout allocation
  fails

- Fix the computing of the minimum MMIO range required for the host on
  stage-2 fault

- Fix the generation of the GICv3 Maintenance Interrupt in nested mode

x86:

- Reject SEV{-ES} intra-host migration if one or more vCPUs are actively
  being created, so as not to create a non-SEV{-ES} vCPU in an SEV{-ES} VM.

- Use a pre-allocated, per-vCPU buffer for handling de-sparsification of
  vCPU masks in Hyper-V hypercalls; fixes a "stack frame too large" issue.

- Allow out-of-range/invalid Xen event channel ports when configuring IRQ
  routing, to avoid dictating a specific ioctl() ordering to userspace.

- Conditionally reschedule when setting memory attributes to avoid soft
  lockups when userspace converts huge swaths of memory to/from private.

- Add back MWAIT as a required feature for the MONITOR/MWAIT selftest.

- Add a missing field in struct sev_data_snp_launch_start that resulted in
  the guest-visible workarounds field being filled at the wrong offset.

- Skip non-canonical address when processing Hyper-V PV TLB flushes to avoid
  VM-Fail on INVVPID.

- Advertise supported TDX TDVMCALLs to userspace.

- Pass SetupEventNotifyInterrupt arguments to userspace.

- Fix TSC frequency underflow.

----------------------------------------------------------------
Binbin Wu (1):
      Documentation: KVM: Fix unexpected unindent warnings

Chenyi Qiang (1):
      KVM: selftests: Add back the missing check of MONITOR/MWAIT availability

David Woodhouse (1):
      KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table.

Liam Merwick (1):
      KVM: Allow CPU to reschedule while setting per-page memory attributes

Manuel Andreas (1):
      KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush

Marc Zyngier (1):
      KVM: arm64: Fix handling of FEAT_GTG for unimplemented granule sizes

Mark Rutland (1):
      KVM: arm64: Remove kvm_arch_vcpu_run_map_fp()

Mostafa Saleh (1):
      KVM: arm64: Fix error path in init_hyp_mode()

Nikunj A Dadhania (1):
      KVM: SVM: Add missing member in SNP_LAUNCH_START command structure

Paolo Bonzini (6):
      KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt
      KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities
      Merge tag 'kvmarm-fixes-6.16-4' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
      Merge tag 'kvmarm-fixes-6.16-5' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
      Merge tag 'kvm-x86-fixes-6.16-rcN' of https://github.com/kvm-x86/linux into HEAD
      KVM: x86: avoid underflow when scaling TSC frequency

Quentin Perret (2):
      KVM: arm64: Adjust range correctly during host stage-2 faults
      KVM: arm64: Don't free hyp pages with pKVM on GICv2

Sean Christopherson (3):
      KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
      KVM: SVM: Initialize vmsa_pa in VMCB to INVALID_PAGE if VMSA page is NULL
      KVM: x86/hyper-v: Use preallocated per-vCPU buffer for de-sparsified vCPU masks

Wei-Lin Chang (1):
      KVM: arm64: nv: Fix MI line level calculation in vgic_v3_nested_update_mi()

 Documentation/virt/kvm/api.rst                     | 35 +++++++++++++---------
 Documentation/virt/kvm/x86/intel-tdx.rst           | 15 +++++++++-
 arch/arm64/include/asm/kvm_host.h                  |  1 -
 arch/arm64/kvm/arm.c                               | 16 ++++++----
 arch/arm64/kvm/fpsimd.c                            | 26 ----------------
 arch/arm64/kvm/hyp/nvhe/mem_protect.c              | 20 ++++++++-----
 arch/arm64/kvm/nested.c                            | 26 ++++++++++++++--
 arch/arm64/kvm/vgic/vgic-v3-nested.c               |  4 +--
 arch/x86/include/asm/kvm_host.h                    |  7 ++++-
 arch/x86/include/asm/shared/tdx.h                  |  1 +
 arch/x86/include/uapi/asm/kvm.h                    |  8 ++++-
 arch/x86/kvm/hyperv.c                              |  5 +++-
 arch/x86/kvm/svm/sev.c                             | 12 ++++++--
 arch/x86/kvm/vmx/tdx.c                             | 30 +++++++++++++++++++
 arch/x86/kvm/x86.c                                 |  4 ++-
 arch/x86/kvm/xen.c                                 | 15 ++++++++--
 include/linux/psp-sev.h                            |  2 ++
 include/uapi/linux/kvm.h                           |  4 +++
 .../testing/selftests/kvm/x86/monitor_mwait_test.c |  1 +
 virt/kvm/kvm_main.c                                |  3 ++
 20 files changed, 165 insertions(+), 70 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ