Received: by 10.223.176.46 with SMTP id f43csp1061115wra; Sat, 20 Jan 2018 09:59:38 -0800 (PST) X-Google-Smtp-Source: AH8x224nvhY8WIzlVhc7xPTrKUuf6T758tTNiQhub5BfyI/A+49e0fi38QL4pRJQdH5J1gdlYiWi X-Received: by 2002:a17:902:7c95:: with SMTP id y21-v6mr1224598pll.70.1516471178470; Sat, 20 Jan 2018 09:59:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516471178; cv=none; d=google.com; s=arc-20160816; b=h70Hx4CFnyDAC419KQ9TVdPCNCUqr7nadmpXfNj7dIL2D1KdVwLHit3qIYQw9dZNXB n46mP/ga7m79CsN7QZYqHeR1+aKWirc944kwGENBea31+KBiIdxlYdb/tQl8/cDham3D LUrFKnmxN9DYhYspPDuQah8cPvZHFleFQBaPjOKBAsO8/BFDbT62vDwcSBofYaP0iOSD K3R+4B0jcg6gQyzpzqnsuFgvZlhgT78gsbcuUwWeU2m7UcDET3twKNae/J/QVG/lwdhn FkeeltSxjESaIICSH6njxIQsg9LqucAy89rRcHpThFcF4JKNDHT9fIeKxxACYJPjhtFD bqRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-disposition:mime-version:message-id:subject:cc:to:from:date :arc-authentication-results; bh=i8dY3rSfMsLQazZyHrULaLD5M4Ehw1G7X3WVmm1RNFs=; b=cblF7m2YotsEcFUYDUjogbn9zlFWt1SQennFYlSH1h1IPIP1Y5WetF/756UoIRLeJn gVg/06zqFtVLaLso3+0fDhedbS7liPs+P0s6Xw8Xsjo5OgHp9ks7pEcMjLP+sPR9wnYr tQwA1Zqa9U73SrwWCyd5+yyq78F7vDak0KmAfIh2sXFipmUwFFf/9K4RTgmVHsNYAvzO g7XnygFrwDHtZJGqVKo2rQVdctyVYPso+4kNL84Ml4138dxtos8OoBLlUiCqx8jRxFJY vPVS1Ht3DQRRBKhbWVhveKjk6fKM/pn5b1OVSd+5cAzw4c8CsSuOWl4eJ5mLOc1CV7T1 gaGw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m37-v6si1875909plg.154.2018.01.20.09.59.24; Sat, 20 Jan 2018 09:59:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756624AbeATR5M (ORCPT + 99 others); Sat, 20 Jan 2018 12:57:12 -0500 Received: from mx1.redhat.com ([209.132.183.28]:44662 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756562AbeATR45 (ORCPT ); Sat, 20 Jan 2018 12:56:57 -0500 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CF6535D676; Sat, 20 Jan 2018 17:56:57 +0000 (UTC) Received: from flask (unknown [10.43.2.80]) by smtp.corp.redhat.com (Postfix) with SMTP id 041A260BE5; Sat, 20 Jan 2018 17:56:55 +0000 (UTC) Received: by flask (sSMTP sendmail emulation); Sat, 20 Jan 2018 18:56:52 +0100 Date: Sat, 20 Jan 2018 18:56:52 +0100 From: Radim =?utf-8?B?S3LEjW3DocWZ?= To: Linus Torvalds Cc: Paolo Bonzini , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: [GIT PULL] KVM fixes for Linux 4.15(-rc9) Message-ID: <20180120175652.GA20134@flask> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Sat, 20 Jan 2018 17:56:57 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Linus, the high amount of new code improves situation around CPU vulnerabilities. The following changes since commit a8750ddca918032d6349adbf9a4b6555e7db20da: Linux 4.15-rc8 (2018-01-14 15:32:30 -0800) are available in the Git repository at: git://git.kernel.org/pub/scm/virt/kvm/kvm tags/for-linus for you to fetch changes up to 35b3fde6203b932b2b1a5b53b3d8808abc9c4f60: KVM: s390: wire up bpb feature (2018-01-20 17:30:47 +0100) ---------------------------------------------------------------- KVM fixes for v4.15-rc9 ARM: * fix incorrect huge page mappings on systems using the contiguous hint for hugetlbfs * support alternative GICv4 init sequence * correctly implement the ARM SMCC for HVC and SMC handling PPC: * add KVM IOCTL for reporting vulnerability and workaround status s390: * provide userspace interface for branch prediction changes in firmware x86: * use correct macros for bits ---------------------------------------------------------------- Christian Borntraeger (1): KVM: s390: wire up bpb feature Christoffer Dall (1): KVM: arm64: Fix GICv4 init when called from vgic_its_create Marc Zyngier (1): arm64: KVM: Fix SMCCC handling of unimplemented SMC/HVC calls Paul Mackerras (1): KVM: PPC: Book3S: Provide information about hardware/firmware CVE workarounds Punit Agrawal (1): KVM: arm/arm64: Check pagesize when allocating a hugepage at Stage 2 Radim Krčmář (2): Merge tag 'kvm-arm-fixes-for-v4.15-3-v2' of git://git.kernel.org/.../kvmarm/kvmarm Merge tag 'kvm-ppc-cve-4.15-2' of git://git.kernel.org/.../paulus/powerpc Tianyu Lan (1): KVM/x86: Fix wrong macro references of X86_CR0_PG_BIT and X86_CR4_PAE_BIT in kvm_valid_sregs() Documentation/virtual/kvm/api.txt | 46 +++++++++++++ arch/arm64/kvm/handle_exit.c | 4 +- arch/powerpc/include/uapi/asm/kvm.h | 25 +++++++ arch/powerpc/kvm/powerpc.c | 131 ++++++++++++++++++++++++++++++++++++ arch/s390/include/asm/kvm_host.h | 3 +- arch/s390/include/uapi/asm/kvm.h | 5 +- arch/s390/kvm/kvm-s390.c | 12 ++++ arch/s390/kvm/vsie.c | 10 +++ arch/x86/kvm/x86.c | 4 +- include/uapi/linux/kvm.h | 4 ++ virt/kvm/arm/mmu.c | 2 +- virt/kvm/arm/vgic/vgic-init.c | 8 ++- virt/kvm/arm/vgic/vgic-v4.c | 2 +- 13 files changed, 245 insertions(+), 11 deletions(-)