1. 04 Aug, 2023 14 commits
  2. 31 Jul, 2023 1 commit
  3. 30 Jul, 2023 21 commits
  4. 29 Jul, 2023 4 commits
    • Sven Joachim's avatar
      arch/*/configs/*defconfig: Replace AUTOFS4_FS by AUTOFS_FS · 1f2190d6
      Sven Joachim authored
      Commit a2225d93 ("autofs: remove left-over autofs4 stubs")
      promised the removal of the fs/autofs/Kconfig fragment for AUTOFS4_FS
      within a couple of releases, but five years later this still has not
      happened yet, and AUTOFS4_FS is still enabled in 63 defconfigs.
      
      Get rid of it mechanically:
      
         git grep -l CONFIG_AUTOFS4_FS -- '*defconfig' |
             xargs sed -i 's/AUTOFS4_FS/AUTOFS_FS/'
      
      Also just remove the AUTOFS4_FS config option stub.  Anybody who hasn't
      regenerated their config file in the last five years will need to just
      get the new name right when they do.
      Signed-off-by: default avatarSven Joachim <svenjoac@gmx.de>
      Acked-by: default avatarIan Kent <raven@themaw.net>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      1f2190d6
    • Linus Torvalds's avatar
      Merge tag 'loongarch-fixes-6.5-1' of... · 12214540
      Linus Torvalds authored
      Merge tag 'loongarch-fixes-6.5-1' of git://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
      
      Pull LoongArch fixes from Huacai Chen:
       "Some bug fixes for build system, builtin cmdline handling, bpf and
        {copy, clear}_user, together with a trivial cleanup"
      
      * tag 'loongarch-fixes-6.5-1' of git://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson:
        LoongArch: Cleanup __builtin_constant_p() checking for cpu_has_*
        LoongArch: BPF: Fix check condition to call lu32id in move_imm()
        LoongArch: BPF: Enable bpf_probe_read{, str}() on LoongArch
        LoongArch: Fix return value underflow in exception path
        LoongArch: Fix CMDLINE_EXTEND and CMDLINE_BOOTLOADER handling
        LoongArch: Fix module relocation error with binutils 2.41
        LoongArch: Only fiddle with CHECKFLAGS if `need-compiler'
      12214540
    • Sean Christopherson's avatar
      KVM: selftests: Expand x86's sregs test to cover illegal CR0 values · 5a759117
      Sean Christopherson authored
      Add coverage to x86's set_sregs_test to verify KVM rejects vendor-agnostic
      illegal CR0 values, i.e. CR0 values whose legality doesn't depend on the
      current VMX mode.  KVM historically has neglected to reject bad CR0s from
      userspace, i.e. would happily accept a completely bogus CR0 via
      KVM_SET_SREGS{2}.
      
      Punt VMX specific subtests to future work, as they would require quite a
      bit more effort, and KVM gets coverage for CR0 checks in general through
      other means, e.g. KVM-Unit-Tests.
      Signed-off-by: default avatarSean Christopherson <seanjc@google.com>
      Message-Id: <20230613203037.1968489-4-seanjc@google.com>
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      5a759117
    • Sean Christopherson's avatar
      KVM: VMX: Don't fudge CR0 and CR4 for restricted L2 guest · c4abd735
      Sean Christopherson authored
      Stuff CR0 and/or CR4 to be compliant with a restricted guest if and only
      if KVM itself is not configured to utilize unrestricted guests, i.e. don't
      stuff CR0/CR4 for a restricted L2 that is running as the guest of an
      unrestricted L1.  Any attempt to VM-Enter a restricted guest with invalid
      CR0/CR4 values should fail, i.e. in a nested scenario, KVM (as L0) should
      never observe a restricted L2 with incompatible CR0/CR4, since nested
      VM-Enter from L1 should have failed.
      
      And if KVM does observe an active, restricted L2 with incompatible state,
      e.g. due to a KVM bug, fudging CR0/CR4 instead of letting VM-Enter fail
      does more harm than good, as KVM will often neglect to undo the side
      effects, e.g. won't clear rmode.vm86_active on nested VM-Exit, and thus
      the damage can easily spill over to L1.  On the other hand, letting
      VM-Enter fail due to bad guest state is more likely to contain the damage
      to L2 as KVM relies on hardware to perform most guest state consistency
      checks, i.e. KVM needs to be able to reflect a failed nested VM-Enter into
      L1 irrespective of (un)restricted guest behavior.
      
      Cc: Jim Mattson <jmattson@google.com>
      Cc: stable@vger.kernel.org
      Fixes: bddd82d1 ("KVM: nVMX: KVM needs to unset "unrestricted guest" VM-execution control in vmcs02 if vmcs12 doesn't set it")
      Signed-off-by: default avatarSean Christopherson <seanjc@google.com>
      Message-Id: <20230613203037.1968489-3-seanjc@google.com>
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      c4abd735