Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756276AbaJXPHb (ORCPT ); Fri, 24 Oct 2014 11:07:31 -0400 Received: from mx1.redhat.com ([209.132.183.28]:8893 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752865AbaJXPH3 (ORCPT ); Fri, 24 Oct 2014 11:07:29 -0400 From: Paolo Bonzini To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: [PATCH 00/14] KVM changes for 3.18-rc2 Date: Fri, 24 Oct 2014 17:07:11 +0200 Message-Id: <1414163245-18555-1-git-send-email-pbonzini@redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is a pretty large update. I think it is roughly as big as what I usually had for the _whole_ rc period. There are a few bad bugs where the guest can OOPS or crash the host. We have also started looking at attack models for nested virtualization; bugs that usually result in the guest ring 0 crashing itself become more worrisome if you have nested virtualization, because the nested guest might bring down the non-nested guest as well. For current uses of nested virtualization these do not really have a security impact, but you never know and bugs are bugs nevertheless. A lot of these bugs are in 3.17 too, resulting in a large number of stable@ Ccs. I checked that all the patches apply there with no conflicts. I will send this out to Linus in a second. Paolo Andy Honig (2): KVM: x86: Prevent host from panicking on shared MSR writes. KVM: x86: Improve thread safety in pit Michael S. Tsirkin (1): kvm: x86: don't kill guest on unknown exit reason Nadav Amit (8): KVM: x86: Check non-canonical addresses upon WRMSR KVM: x86: Fix wrong masking on relative jump/call KVM: x86: Emulator fixes for eip canonical checks on near branches KVM: x86: Handle errors when RIP is set during far jumps KVM: x86: Decoding guest instructions which cross page boundary may fail KVM: x86: Emulator does not decode clflush well KVM: x86: PREFETCH and HINT_NOP should have SrcMem flag KVM: x86: Wrong assertion on paging_tmpl.h Paolo Bonzini (1): KVM: emulate: avoid accessing NULL ctxt->memopp Petr Matousek (1): kvm: vmx: handle invvpid vm exit gracefully Quentin Casasnovas (1): kvm: fix excessive pages un-pinning in kvm_iommu_map error path. arch/x86/include/asm/kvm_host.h | 15 ++- arch/x86/include/uapi/asm/vmx.h | 2 + arch/x86/kvm/emulate.c | 250 ++++++++++++++++++++++++++++++---------- arch/x86/kvm/i8254.c | 2 + arch/x86/kvm/paging_tmpl.h | 2 +- arch/x86/kvm/svm.c | 8 +- arch/x86/kvm/vmx.c | 24 ++-- arch/x86/kvm/x86.c | 38 +++++- include/linux/kvm_host.h | 1 + virt/kvm/iommu.c | 8 +- 10 files changed, 265 insertions(+), 85 deletions(-) -- 1.8.3.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/