diff options
author | Sasha Levin <sashal@kernel.org> | 2024-03-10 12:48:31 -0400 |
---|---|---|
committer | Sasha Levin <sashal@kernel.org> | 2024-03-10 12:48:31 -0400 |
commit | 8955d973d5ccade2bd303a4cc584a3214adc36d9 (patch) | |
tree | 30ef13557ae625477eb51d4dba21e5b866dabf27 | |
parent | 1eab915635d366db3e057863dc3286e7254072fa (diff) | |
download | deps-8955d973d5ccade2bd303a4cc584a3214adc36d9.tar.gz |
Sun Mar 10 12:48:24 PM EDT 2024
Signed-off-by: Sasha Levin <sashal@kernel.org>
207 files changed, 1534 insertions, 0 deletions
diff --git a/v4.19/2dfd2383034421101300a3b7325cf339a182d218 b/v4.19/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v4.19/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v4.19/422692098c4c53a6b65c2ef235621aee6a38721f b/v4.19/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v4.19/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v4.19/5abf6dceb066f2b02b225fd561440c98a8062681 b/v4.19/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v4.19/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v4.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v4.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..da7194db621 --- /dev/null +++ b/v4.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1,11 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") +19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region") +a8d908b5873c ("KVM: x86: report sev_pin_memory errors with PTR_ERR") +dc42c8ae0a77 ("KVM: SVM: convert get_user_pages() --> pin_user_pages()") +78824fabc72e ("KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()") +996ed22c7a52 ("arch/x86/kvm/svm/sev.c: change flag passed to GUP fast in sev_pin_memory()") +eaf78265a4ab ("KVM: SVM: Move SEV code to separate file") +ef0f64960d01 ("KVM: SVM: Move AVIC code to separate file") +883b0a91f41a ("KVM: SVM: Move Nested SVM Implementation to nested.c") +46a010dd6896 ("kVM SVM: Move SVM related files to own sub-directory") +8c1b724ddb21 ("Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm") diff --git a/v4.19/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v4.19/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v4.19/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v4.19/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v4.19/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..de923a909a5 --- /dev/null +++ b/v4.19/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,5 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") +9de6fe3c28d6 ("KVM: x86: Emulate split-lock access as a write in emulator") +42e35f8072c3 ("KVM/X86: Use kvm_vcpu_map in emulator_cmpxchg_emulated") diff --git a/v4.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v4.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v4.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v4.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v4.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v4.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v4.19/e563592224e02f87048edee3ce3f0da16cceee88 b/v4.19/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v4.19/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.10/2dfd2383034421101300a3b7325cf339a182d218 b/v5.10/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.10/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.10/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.10/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.10/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.10/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.10/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.10/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.10/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.10/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b731bc4095a --- /dev/null +++ b/v5.10/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1,2 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") +19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region") diff --git a/v5.10/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.10/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.10/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.10/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.10/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.10/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.10/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.10/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.10/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.10/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.10/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.10/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.10/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.10/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.10/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.11/2dfd2383034421101300a3b7325cf339a182d218 b/v5.11/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.11/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.11/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.11/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.11/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.11/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.11/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.11/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.11/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.11/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.11/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.11/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.11/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.11/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.11/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.11/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.11/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.11/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.11/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.11/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.11/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.11/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.11/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.11/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.11/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.11/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.12/2dfd2383034421101300a3b7325cf339a182d218 b/v5.12/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.12/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.12/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.12/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.12/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.12/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.12/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.12/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.12/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.12/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.12/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.12/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.12/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.12/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.12/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.12/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.12/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.12/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.12/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.12/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.12/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.12/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.12/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.12/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.12/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.12/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.13/2dfd2383034421101300a3b7325cf339a182d218 b/v5.13/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.13/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.13/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.13/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.13/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.13/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.13/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.13/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.13/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.13/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.13/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.13/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.13/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.13/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.13/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.13/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.13/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.13/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.13/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.13/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.13/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.13/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.13/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.13/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.13/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.13/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.14/2dfd2383034421101300a3b7325cf339a182d218 b/v5.14/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.14/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.14/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.14/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.14/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.14/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.14/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.14/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.14/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.14/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.14/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.14/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.14/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.14/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.14/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.14/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.14/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.14/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.14/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.14/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.14/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.14/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.14/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.14/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.14/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.14/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.15/2dfd2383034421101300a3b7325cf339a182d218 b/v5.15/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.15/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.15/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.15/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.15/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.15/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.15/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.15/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.15/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.15/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.15/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.15/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.15/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.15/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.15/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.15/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.15/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.15/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.15/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.15/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.15/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.15/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.15/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.15/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.15/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.15/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.16/2dfd2383034421101300a3b7325cf339a182d218 b/v5.16/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.16/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.16/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.16/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.16/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.16/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.16/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.16/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.16/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.16/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.16/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.16/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.16/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.16/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.16/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.16/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.16/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.16/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.16/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.16/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.16/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.16/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.16/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.17/2dfd2383034421101300a3b7325cf339a182d218 b/v5.17/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..d7272788c5f --- /dev/null +++ b/v5.17/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,7 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") diff --git a/v5.17/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.17/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.17/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.17/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.17/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.17/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.17/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.17/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.17/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.17/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.17/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..124aa851997 --- /dev/null +++ b/v5.17/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,6 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") diff --git a/v5.17/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.17/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.17/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.17/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.17/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.17/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.17/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.17/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.17/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.17/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.17/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.17/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.18/2dfd2383034421101300a3b7325cf339a182d218 b/v5.18/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..356e3b62c5b --- /dev/null +++ b/v5.18/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,6 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v5.18/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.18/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.18/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.18/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.18/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.18/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.18/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.18/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.18/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.18/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.18/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..53e09897f49 --- /dev/null +++ b/v5.18/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,5 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v5.18/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.18/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.18/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.18/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.18/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.18/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.18/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.18/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.18/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.18/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.18/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.18/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.19/2dfd2383034421101300a3b7325cf339a182d218 b/v5.19/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..356e3b62c5b --- /dev/null +++ b/v5.19/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,6 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v5.19/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.19/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.19/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.19/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.19/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.19/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v5.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v5.19/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.19/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..53e09897f49 --- /dev/null +++ b/v5.19/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,5 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v5.19/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.19/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v5.19/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v5.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.19/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.19/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.19/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.4/2dfd2383034421101300a3b7325cf339a182d218 b/v5.4/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.4/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.4/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.4/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.4/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.4/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.4/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.4/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..da7194db621 --- /dev/null +++ b/v5.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1,11 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") +19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region") +a8d908b5873c ("KVM: x86: report sev_pin_memory errors with PTR_ERR") +dc42c8ae0a77 ("KVM: SVM: convert get_user_pages() --> pin_user_pages()") +78824fabc72e ("KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()") +996ed22c7a52 ("arch/x86/kvm/svm/sev.c: change flag passed to GUP fast in sev_pin_memory()") +eaf78265a4ab ("KVM: SVM: Move SEV code to separate file") +ef0f64960d01 ("KVM: SVM: Move AVIC code to separate file") +883b0a91f41a ("KVM: SVM: Move Nested SVM Implementation to nested.c") +46a010dd6896 ("kVM SVM: Move SVM related files to own sub-directory") +8c1b724ddb21 ("Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm") diff --git a/v5.4/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.4/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.4/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.4/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.4/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..679352b705b --- /dev/null +++ b/v5.4/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,4 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") +9de6fe3c28d6 ("KVM: x86: Emulate split-lock access as a write in emulator") diff --git a/v5.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.4/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.4/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.4/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.7/2dfd2383034421101300a3b7325cf339a182d218 b/v5.7/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.7/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.7/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.7/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.7/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.7/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.7/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.7/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..4452b9a10cd --- /dev/null +++ b/v5.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1,5 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") +19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region") +a8d908b5873c ("KVM: x86: report sev_pin_memory errors with PTR_ERR") +dc42c8ae0a77 ("KVM: SVM: convert get_user_pages() --> pin_user_pages()") +78824fabc72e ("KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()") diff --git a/v5.7/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.7/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.7/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.7/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.7/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.7/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.7/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.7/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.7/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.8/2dfd2383034421101300a3b7325cf339a182d218 b/v5.8/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.8/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.8/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.8/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.8/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.8/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.8/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.8/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.8/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.8/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..4452b9a10cd --- /dev/null +++ b/v5.8/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1,5 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") +19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region") +a8d908b5873c ("KVM: x86: report sev_pin_memory errors with PTR_ERR") +dc42c8ae0a77 ("KVM: SVM: convert get_user_pages() --> pin_user_pages()") +78824fabc72e ("KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()") diff --git a/v5.8/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.8/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.8/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.8/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.8/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.8/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.8/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.8/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.8/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.8/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.8/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.8/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.8/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.8/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.8/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v5.9/2dfd2383034421101300a3b7325cf339a182d218 b/v5.9/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..cd7d08f07f6 --- /dev/null +++ b/v5.9/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,9 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.9/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.9/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v5.9/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.9/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.9/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..3426dc0b009 --- /dev/null +++ b/v5.9/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,6 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") +63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20") diff --git a/v5.9/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.9/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b731bc4095a --- /dev/null +++ b/v5.9/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1,2 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") +19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region") diff --git a/v5.9/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.9/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..48dd6d05479 --- /dev/null +++ b/v5.9/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,8 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") +3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils") +7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h") +1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD") diff --git a/v5.9/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.9/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..ef754c51999 --- /dev/null +++ b/v5.9/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1,3 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") +5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults") +1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses") diff --git a/v5.9/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.9/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v5.9/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v5.9/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.9/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..da15459281a --- /dev/null +++ b/v5.9/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,20 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") +20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*") +65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()") +a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs") +9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs") +a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps") +2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu") +6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()") +5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()") +b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()") +284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()") +b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()") +6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn") +8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages") +a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE") diff --git a/v5.9/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.9/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v5.9/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v6.0/2dfd2383034421101300a3b7325cf339a182d218 b/v6.0/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..356e3b62c5b --- /dev/null +++ b/v6.0/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,6 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.0/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.0/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v6.0/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.0/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.0/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..843ffde46e2 --- /dev/null +++ b/v6.0/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,5 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") diff --git a/v6.0/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.0/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v6.0/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v6.0/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.0/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..53e09897f49 --- /dev/null +++ b/v6.0/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,5 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.0/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.0/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v6.0/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v6.0/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.0/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v6.0/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.0/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.0/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..ce20555700f --- /dev/null +++ b/v6.0/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,6 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") +766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF") +c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()") diff --git a/v6.0/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.0/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v6.0/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v6.1/2dfd2383034421101300a3b7325cf339a182d218 b/v6.1/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..356e3b62c5b --- /dev/null +++ b/v6.1/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,6 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.1/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.1/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v6.1/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.1/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.1/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..843ffde46e2 --- /dev/null +++ b/v6.1/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,5 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") diff --git a/v6.1/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.1/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v6.1/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v6.1/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.1/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..53e09897f49 --- /dev/null +++ b/v6.1/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,5 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.1/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.1/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v6.1/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v6.1/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.1/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v6.1/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.1/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.1/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..74884e5ed07 --- /dev/null +++ b/v6.1/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,2 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") diff --git a/v6.1/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.1/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v6.1/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v6.2/2dfd2383034421101300a3b7325cf339a182d218 b/v6.2/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..356e3b62c5b --- /dev/null +++ b/v6.2/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,6 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.2/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.2/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v6.2/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.2/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.2/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..843ffde46e2 --- /dev/null +++ b/v6.2/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,5 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") diff --git a/v6.2/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.2/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v6.2/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v6.2/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.2/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..53e09897f49 --- /dev/null +++ b/v6.2/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,5 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.2/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.2/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v6.2/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v6.2/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.2/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v6.2/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.2/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.2/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..6e0b95211e8 --- /dev/null +++ b/v6.2/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1,4 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") +354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()") +56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()") +ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()") diff --git a/v6.2/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.2/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v6.2/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v6.3/2dfd2383034421101300a3b7325cf339a182d218 b/v6.3/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..356e3b62c5b --- /dev/null +++ b/v6.3/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,6 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.3/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.3/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v6.3/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.3/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.3/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..843ffde46e2 --- /dev/null +++ b/v6.3/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,5 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") diff --git a/v6.3/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.3/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v6.3/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v6.3/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.3/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..53e09897f49 --- /dev/null +++ b/v6.3/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,5 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.3/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.3/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v6.3/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v6.3/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.3/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v6.3/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.3/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.3/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..c0970523a36 --- /dev/null +++ b/v6.3/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") diff --git a/v6.3/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.3/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v6.3/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v6.4/2dfd2383034421101300a3b7325cf339a182d218 b/v6.4/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..356e3b62c5b --- /dev/null +++ b/v6.4/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,6 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.4/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.4/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v6.4/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.4/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.4/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..843ffde46e2 --- /dev/null +++ b/v6.4/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,5 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") diff --git a/v6.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v6.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v6.4/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.4/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..53e09897f49 --- /dev/null +++ b/v6.4/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,5 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.4/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.4/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v6.4/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v6.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v6.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..c0970523a36 --- /dev/null +++ b/v6.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") diff --git a/v6.4/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.4/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v6.4/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v6.5/2dfd2383034421101300a3b7325cf339a182d218 b/v6.5/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..356e3b62c5b --- /dev/null +++ b/v6.5/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,6 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.5/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.5/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v6.5/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.5/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.5/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..843ffde46e2 --- /dev/null +++ b/v6.5/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1,5 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") +d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES") +c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts") +29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV") +b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header") diff --git a/v6.5/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.5/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v6.5/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v6.5/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.5/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..53e09897f49 --- /dev/null +++ b/v6.5/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,5 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") +5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts") diff --git a/v6.5/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.5/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v6.5/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v6.5/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.5/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v6.5/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.5/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.5/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..c0970523a36 --- /dev/null +++ b/v6.5/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") diff --git a/v6.5/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.5/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v6.5/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v6.6/2dfd2383034421101300a3b7325cf339a182d218 b/v6.6/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..a190cd6395e --- /dev/null +++ b/v6.6/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,5 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") diff --git a/v6.6/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.6/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..153d5040832 --- /dev/null +++ b/v6.6/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,14 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.6/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.6/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..27c52d3de4f --- /dev/null +++ b/v6.6/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") diff --git a/v6.6/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.6/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v6.6/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v6.6/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.6/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..d76f349e852 --- /dev/null +++ b/v6.6/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,4 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") diff --git a/v6.6/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.6/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v6.6/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v6.6/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.6/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..e4c2680fd50 --- /dev/null +++ b/v6.6/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,14 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") +45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD") diff --git a/v6.6/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.6/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..c0970523a36 --- /dev/null +++ b/v6.6/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") diff --git a/v6.6/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.6/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v6.6/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") diff --git a/v6.7/2dfd2383034421101300a3b7325cf339a182d218 b/v6.7/2dfd2383034421101300a3b7325cf339a182d218 new file mode 100644 index 00000000000..a190cd6395e --- /dev/null +++ b/v6.7/2dfd2383034421101300a3b7325cf339a182d218 @@ -0,0 +1,5 @@ +2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive") +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") diff --git a/v6.7/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.7/422692098c4c53a6b65c2ef235621aee6a38721f new file mode 100644 index 00000000000..f2a22b9dd66 --- /dev/null +++ b/v6.7/422692098c4c53a6b65c2ef235621aee6a38721f @@ -0,0 +1,13 @@ +422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") diff --git a/v6.7/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.7/5abf6dceb066f2b02b225fd561440c98a8062681 new file mode 100644 index 00000000000..27c52d3de4f --- /dev/null +++ b/v6.7/5abf6dceb066f2b02b225fd561440c98a8062681 @@ -0,0 +1 @@ +5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default") diff --git a/v6.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 new file mode 100644 index 00000000000..b3a8d55ae85 --- /dev/null +++ b/v6.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 @@ -0,0 +1 @@ +5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()") diff --git a/v6.7/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.7/63e5c5a10559077bb5f32edf783084e7164af9c3 new file mode 100644 index 00000000000..d76f349e852 --- /dev/null +++ b/v6.7/63e5c5a10559077bb5f32edf783084e7164af9c3 @@ -0,0 +1,4 @@ +63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases") +e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms") +5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags") +8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()") diff --git a/v6.7/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.7/910c57dfa4d113aae6571c2a8b9ae8c430975902 new file mode 100644 index 00000000000..7f2b26a263e --- /dev/null +++ b/v6.7/910c57dfa4d113aae6571c2a8b9ae8c430975902 @@ -0,0 +1 @@ +910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty") diff --git a/v6.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 new file mode 100644 index 00000000000..372ba1ab5cd --- /dev/null +++ b/v6.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 @@ -0,0 +1,13 @@ +a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU") +89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory") +eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM") +2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro") +a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory") +5a475554db1e ("KVM: Introduce per-page memory attributes") +16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace") +bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2") +f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER") +4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU") +1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER") +8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry") +c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative") diff --git a/v6.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f new file mode 100644 index 00000000000..c0970523a36 --- /dev/null +++ b/v6.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f @@ -0,0 +1 @@ +d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing") diff --git a/v6.7/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.7/e563592224e02f87048edee3ce3f0da16cceee88 new file mode 100644 index 00000000000..e601c38b4eb --- /dev/null +++ b/v6.7/e563592224e02f87048edee3ce3f0da16cceee88 @@ -0,0 +1 @@ +e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY") |