lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250718145026.179015-1-pbonzini@redhat.com>
Date: Fri, 18 Jul 2025 16:50:26 +0200
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org,
	kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes, and documentation changes, for Linux 6.16-rc7

Linus,

The following changes since commit 347e9f5043c89695b01e66b3ed111755afcf1911:

  Linux 6.16-rc6 (2025-07-13 14:25:58 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 4b7d440de209cb2bb83827c30107ba05884a50c7:

  Merge tag 'kvm-x86-fixes-6.16-rc7' of https://github.com/kvm-x86/linux into HEAD (2025-07-17 17:06:13 +0200)

----------------------------------------------------------------
ARM:

* Fix use of u64_replace_bits() in adjusting the guest's view of
  MDCR_EL2.HPMN

RISC-V:

* Fix an issue related to timer cleanup when exiting to user-space

* Fix a race-condition in updating interrupts enabled for the guest
  when IMSIC is hardware-virtualized

x86:

* Reject KVM_SET_TSC_KHZ for guests with a protected TSC (currently only TDX).

* Ensure struct kvm_tdx_capabilities fields that are not explicitly set by KVM
  are zeroed.

Documentation:

* Explain how KVM contributions should be made testable

* Fix a formatting goof in the TDX documentation.

----------------------------------------------------------------
Anup Patel (2):
      RISC-V: KVM: Disable vstimecmp before exiting to user-space
      RISC-V: KVM: Move HGEI[E|P] CSR access to IMSIC virtualization

Ben Horgan (1):
      KVM: arm64: Fix enforcement of upper bound on MDCR_EL2.HPMN

Binbin Wu (1):
      Documentation: KVM: Fix unexpected unindent warning

Kai Huang (1):
      KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest

Paolo Bonzini (5):
      KVM: Documentation: minimal updates to review-checklist.rst
      KVM: Documentation: document how KVM is tested
      Merge tag 'kvmarm-fixes-6.16-6' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
      Merge tag 'kvm-riscv-fixes-6.16-2' of https://github.com/kvm-riscv/linux into HEAD
      Merge tag 'kvm-x86-fixes-6.16-rc7' of https://github.com/kvm-x86/linux into HEAD

Sean Christopherson (1):
      KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out

Xiaoyao Li (1):
      KVM: TDX: Don't report base TDVMCALLs

 Documentation/virt/kvm/api.rst              | 11 +++-
 Documentation/virt/kvm/review-checklist.rst | 95 ++++++++++++++++++++++++++---
 arch/arm64/kvm/sys_regs.c                   |  2 +-
 arch/riscv/include/asm/kvm_aia.h            |  4 +-
 arch/riscv/include/asm/kvm_host.h           |  3 +
 arch/riscv/kvm/aia.c                        | 51 +++-------------
 arch/riscv/kvm/aia_imsic.c                  | 45 ++++++++++++++
 arch/riscv/kvm/vcpu.c                       | 10 ---
 arch/riscv/kvm/vcpu_timer.c                 | 16 +++++
 arch/x86/kvm/vmx/tdx.c                      |  9 ++-
 arch/x86/kvm/x86.c                          |  4 ++
 11 files changed, 180 insertions(+), 70 deletions(-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ