lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1583089390-36084-1-git-send-email-pbonzini@redhat.com>
Date:   Sun,  1 Mar 2020 20:03:10 +0100
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] Second batch of KVM changes for Linux 5.6-rc4 (or rc5)

Linus,

The following changes since commit a93236fcbe1d0248461b29c0f87cb0b510c94e6f:

  KVM: s390: rstify new ioctls in api.rst (2020-02-24 19:28:40 +0100)

are available in the git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 86f7e90ce840aa1db407d3ea6e9b3a52b2ce923c:

  KVM: VMX: check descriptor table exits on instruction emulation (2020-03-01 19:26:31 +0100)

----------------------------------------------------------------
More bugfixes, including a few remaining "make W=1" issues such
as too large frame sizes on some configurations.  On the
ARM side, the compiler was messing up shadow stacks between
EL1 and EL2 code, which is easily fixed with __always_inline.

----------------------------------------------------------------
Christian Borntraeger (1):
      KVM: let declaration of kvm_get_running_vcpus match implementation

Erwan Velu (1):
      kvm: x86: Limit the number of "kvm: disabled by bios" messages

James Morse (3):
      KVM: arm64: Ask the compiler to __always_inline functions used at HYP
      KVM: arm64: Define our own swab32() to avoid a uapi static inline
      arm64: Ask the compiler to __always_inline functions used by KVM at HYP

Jeremy Cline (1):
      KVM: arm/arm64: Fix up includes for trace.h

Mark Rutland (1):
      kvm: arm/arm64: Fold VHE entry/exit work into kvm_vcpu_run_vhe()

Oliver Upton (1):
      KVM: VMX: check descriptor table exits on instruction emulation

Paolo Bonzini (4):
      KVM: SVM: allocate AVIC data structures based on kvm_amd module parameter
      KVM: allow disabling -Werror
      KVM: x86: avoid useless copy of cpufreq policy
      Merge tag 'kvmarm-fixes-5.6-1' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD

Valdis Kletnieks (1):
      KVM: x86: allow compiling as non-module with W=1

Wanpeng Li (2):
      KVM: Introduce pv check helpers
      KVM: Pre-allocate 1 cpumask variable per cpu for both pv tlb and pv ipis

 arch/arm/include/asm/kvm_host.h          |  3 --
 arch/arm64/include/asm/arch_gicv3.h      |  2 +-
 arch/arm64/include/asm/cache.h           |  2 +-
 arch/arm64/include/asm/cacheflush.h      |  2 +-
 arch/arm64/include/asm/cpufeature.h      | 10 ++---
 arch/arm64/include/asm/io.h              |  4 +-
 arch/arm64/include/asm/kvm_emulate.h     | 48 +++++++++++------------
 arch/arm64/include/asm/kvm_host.h        | 32 ----------------
 arch/arm64/include/asm/kvm_hyp.h         |  7 ++++
 arch/arm64/include/asm/kvm_mmu.h         |  3 +-
 arch/arm64/include/asm/virt.h            |  2 +-
 arch/arm64/kvm/hyp/switch.c              | 39 ++++++++++++++++++-
 arch/arm64/kvm/hyp/vgic-v2-cpuif-proxy.c |  4 +-
 arch/x86/kernel/kvm.c                    | 65 +++++++++++++++++++++-----------
 arch/x86/kvm/Kconfig                     | 13 +++++++
 arch/x86/kvm/Makefile                    |  2 +-
 arch/x86/kvm/svm.c                       |  5 ++-
 arch/x86/kvm/vmx/vmx.c                   | 17 +++++++++
 arch/x86/kvm/x86.c                       | 14 +++----
 include/linux/kvm_host.h                 |  2 +-
 virt/kvm/arm/arm.c                       |  2 -
 virt/kvm/arm/trace.h                     |  1 +
 22 files changed, 171 insertions(+), 108 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ