1. 05 Oct, 2018 7 commits
    • Greg Kroah-Hartman's avatar
      Merge tag 'iommu-fixes-v4.19-rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu · b2e45b46
      Greg Kroah-Hartman authored
      Joerg writes:
        "IOMMU Fix for Linux v4.19-rc6
      
         One important fix:
      	- Fix a memory leak with AMD IOMMU when SME is active and a VM
      	  has assigned devices. In that case the complete guest memory
      	  will be leaked without this fix."
      
      * tag 'iommu-fixes-v4.19-rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu:
        iommu/amd: Clear memory encryption mask from physical address
      b2e45b46
    • Greg Kroah-Hartman's avatar
      Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm · 08b297bb
      Greg Kroah-Hartman authored
      Paolo writes:
        "KVM changes for 4.19-rc7
      
         x86 and PPC bugfixes, mostly introduced in 4.19-rc1."
      
      * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm:
        kvm: nVMX: fix entry with pending interrupt if APICv is enabled
        KVM: VMX: hide flexpriority from guest when disabled at the module level
        KVM: VMX: check for existence of secondary exec controls before accessing
        KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault
        KVM: x86: fix L1TF's MMIO GFN calculation
        tools/kvm_stat: cut down decimal places in update interval dialog
        KVM: nVMX: Fix emulation of VM_ENTRY_LOAD_BNDCFGS
        KVM: x86: Do not use kvm_x86_ops->mpx_supported() directly
        KVM: nVMX: Do not expose MPX VMX controls when guest MPX disabled
        KVM: x86: never trap MSR_KERNEL_GS_BASE
      08b297bb
    • Greg Kroah-Hartman's avatar
      Merge branch 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6 · 4fbeba43
      Greg Kroah-Hartman authored
      Herbert writes:
        "Crypto Fixes for 4.19
      
         This push fixes the following issues:
         - Out-of-bound stack access in qat.
         - Illegal schedule in mxs-dcp.
         - Memory corruption in chelsio.
         - Incorrect pointer computation in caam."
      
      * 'linus' of git://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6:
        crypto: qat - Fix KASAN stack-out-of-bounds bug in adf_probe()
        crypto: mxs-dcp - Fix wait logic on chan threads
        crypto: chelsio - Fix memory corruption in DMA Mapped buffers.
        crypto: caam/jr - fix ablkcipher_edesc pointer arithmetic
      4fbeba43
    • Greg Kroah-Hartman's avatar
      Merge tag '4.19-rc6-smb3-fixes' of git://git.samba.org/sfrench/cifs-2.6 · 087f759a
      Greg Kroah-Hartman authored
      Steve writes:
        "SMB3 fixes
      
         four small SMB3 fixes: one for stable, the others to address a more
         recent regression"
      
      * tag '4.19-rc6-smb3-fixes' of git://git.samba.org/sfrench/cifs-2.6:
        smb3: fix lease break problem introduced by compounding
        cifs: only wake the thread for the very last PDU in a compound
        cifs: add a warning if we try to to dequeue a deleted mid
        smb2: fix missing files in root share directory listing
      087f759a
    • Singh, Brijesh's avatar
      iommu/amd: Clear memory encryption mask from physical address · b3e9b515
      Singh, Brijesh authored
      Boris Ostrovsky reported a memory leak with device passthrough when SME
      is active.
      
      The VFIO driver uses iommu_iova_to_phys() to get the physical address for
      an iova. This physical address is later passed into vfio_unmap_unpin() to
      unpin the memory. The vfio_unmap_unpin() uses pfn_valid() before unpinning
      the memory. The pfn_valid() check was failing because encryption mask was
      part of the physical address returned. This resulted in the memory not
      being unpinned and therefore leaked after the guest terminates.
      
      The memory encryption mask must be cleared from the physical address in
      iommu_iova_to_phys().
      
      Fixes: 2543a786 ("iommu/amd: Allow the AMD IOMMU to work with memory encryption")
      Reported-by: default avatarBoris Ostrovsky <boris.ostrovsky@oracle.com>
      Cc: Tom Lendacky <thomas.lendacky@amd.com>
      Cc: Joerg Roedel <joro@8bytes.org>
      Cc: <iommu@lists.linux-foundation.org>
      Cc: Borislav Petkov <bp@suse.de>
      Cc: Paolo Bonzini <pbonzini@redhat.com>
      Cc: Radim Krčmář <rkrcmar@redhat.com>
      Cc: kvm@vger.kernel.org
      Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>
      Cc: <stable@vger.kernel.org> # 4.14+
      Signed-off-by: default avatarBrijesh Singh <brijesh.singh@amd.com>
      Signed-off-by: default avatarJoerg Roedel <jroedel@suse.de>
      b3e9b515
    • Paolo Bonzini's avatar
      Merge tag 'kvm-ppc-fixes-4.19-3' of... · cc906f07
      Paolo Bonzini authored
      Merge tag 'kvm-ppc-fixes-4.19-3' of git://git.kernel.org/pub/scm/linux/kernel/git/paulus/powerpc into kvm-master
      
      Third set of PPC KVM fixes for 4.19
      
      One patch here, fixing a potential host crash introduced (or at least
      exacerbated) by a previous fix for corruption relating to radix guest
      page faults and THP operations.
      cc906f07
    • Greg Kroah-Hartman's avatar
      Merge tag 'drm-fixes-2018-10-05' of git://anongit.freedesktop.org/drm/drm · befad944
      Greg Kroah-Hartman authored
      Dave writes:
        "amdgpu and two core fixes
      
         Two fixes for amdgpu:
         one corrects a use of process->mm
         one fix for display code race condition that can result in a crash
      
         Two core fixes:
         One for a use-after-free in the leasing code
         One for a cma/fbdev crash."
      
      * tag 'drm-fixes-2018-10-05' of git://anongit.freedesktop.org/drm/drm:
        drm/amdkfd: Fix incorrect use of process->mm
        drm/amd/display: Signal hw_done() after waiting for flip_done()
        drm/cma-helper: Fix crash in fbdev error path
        drm: fix use-after-free read in drm_mode_create_lease_ioctl()
      befad944
  2. 04 Oct, 2018 17 commits
  3. 03 Oct, 2018 16 commits