This is a pretty large update. I think it is roughly as big as what I usually had for the _whole_ rc period. There are a few bad bugs where the guest can OOPS or crash the host. We have also started looking at attack models for nested virtualization; bugs that usually result in the guest ring 0 crashing itself become more worrisome if you have nested virtualization, because the nested guest might bring down the non-nested guest as well. For current uses of nested virtualization these do not really have a security impact, but you never know and bugs are bugs nevertheless. A lot of these bugs are in 3.17 too, resulting in a large number of stable@ Ccs. I checked that all the patches apply there with no conflicts. I will send this out to Linus in a second. Paolo Andy Honig (2): KVM: x86: Prevent host from panicking on shared MSR writes. KVM: x86: Improve thread safety in pit Michael S. Tsirkin (1): kvm: x86: don't kill guest on unknown exit reason Nadav Amit (8): KVM: x86: Check non-canonical addresses upon WRMSR KVM: x86: Fix wrong masking on relative jump/call KVM: x86: Emulator fixes for eip canonical checks on near branches KVM: x86: Handle errors when RIP is set during far jumps KVM: x86: Decoding guest instructions which cross page boundary may fail KVM: x86: Emulator does not decode clflush well KVM: x86: PREFETCH and HINT_NOP should have SrcMem flag KVM: x86: Wrong assertion on paging_tmpl.h Paolo Bonzini (1): KVM: emulate: avoid accessing NULL ctxt->memopp Petr Matousek (1): kvm: vmx: handle invvpid vm exit gracefully Quentin Casasnovas (1): kvm: fix excessive pages un-pinning in kvm_iommu_map error path. arch/x86/include/asm/kvm_host.h | 15 ++- arch/x86/include/uapi/asm/vmx.h | 2 + arch/x86/kvm/emulate.c | 250 ++++++++++++++++++++++++++++++---------- arch/x86/kvm/i8254.c | 2 + arch/x86/kvm/paging_tmpl.h | 2 +- arch/x86/kvm/svm.c | 8 +- arch/x86/kvm/vmx.c | 24 ++-- arch/x86/kvm/x86.c | 38 +++++- include/linux/kvm_host.h | 1 + virt/kvm/iommu.c | 8 +- 10 files changed, 265 insertions(+), 85 deletions(-) -- 1.8.3.1 -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html