* [GIT PULL] KVM updates for Linux 5.13-rc2
@ 2021-05-10 18:14 Paolo Bonzini
2021-05-10 19:09 ` Sean Christopherson
2021-05-10 20:12 ` pr-tracker-bot
0 siblings, 2 replies; 3+ messages in thread
From: Paolo Bonzini @ 2021-05-10 18:14 UTC (permalink / raw)
To: torvalds; +Cc: linux-kernel, kvm
Linus,
The following changes since commit 9ccce092fc64d19504fa54de4fd659e279cc92e7:
Merge tag 'for-linus-5.13-ofs-1' of git://git.kernel.org/pub/scm/linux/kernel/git/hubcap/linux (2021-05-02 14:13:46 -0700)
are available in the Git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to ce7ea0cfdc2e9ff31d12da31c3226deddb9644f5:
KVM: SVM: Move GHCB unmapping to fix RCU warning (2021-05-07 06:06:23 -0400)
Thomas Gleixner and Michael Ellerman had some KVM changes in their
late merge window pull requests, but there are no conflicts.
----------------------------------------------------------------
* Lots of bug fixes.
* Fix virtualization of RDPID
* Virtualization of DR6_BUS_LOCK, which on bare metal is new in
the 5.13 merge window
* More nested virtualization migration fixes (nSVM and eVMCS)
* Fix for KVM guest hibernation
* Fix for warning in SEV-ES SRCU usage
* Block KVM from loading on AMD machines with 5-level page tables,
due to the APM not mentioning how host CR4.LA57 exactly impacts
the guest.
----------------------------------------------------------------
Benjamin Segall (1):
kvm: exit halt polling on need_resched() as well
Bill Wendling (1):
selftests: kvm: remove reassignment of non-absolute variables
Chenyi Qiang (1):
KVM: X86: Add support for the emulation of DR6_BUS_LOCK bit
Colin Ian King (1):
KVM: x86: Fix potential fput on a null source_kvm_file
David Matlack (1):
kvm: Cap halt polling at kvm->max_halt_poll_ns
Kai Huang (2):
KVM: x86/mmu: Avoid unnecessary page table allocation in kvm_tdp_mmu_map()
KVM: x86/mmu: Fix kdoc of __handle_changed_spte
Maxim Levitsky (5):
KVM: nSVM: fix a typo in svm_leave_nested
KVM: nSVM: fix few bugs in the vmcb02 caching logic
KVM: nSVM: leave the guest mode prior to loading a nested state
KVM: nSVM: always restore the L1's GIF on migration
KVM: nSVM: remove a warning about vmcb01 VM exit reason
Nicholas Piggin (1):
KVM: PPC: Book3S HV: Fix conversion to gfn-based MMU notifier callbacks
Paolo Bonzini (1):
KVM: X86: Expose bus lock debug exception to guest
Sean Christopherson (17):
KVM: VMX: Do not advertise RDPID if ENABLE_RDTSCP control is unsupported
KVM: x86: Emulate RDPID only if RDTSCP is supported
KVM: SVM: Inject #UD on RDTSCP when it should be disabled in the guest
KVM: x86: Move RDPID emulation intercept to its own enum
KVM: VMX: Disable preemption when probing user return MSRs
KVM: SVM: Probe and load MSR_TSC_AUX regardless of RDTSCP support in host
KVM: x86: Add support for RDPID without RDTSCP
KVM: VMX: Configure list of user return MSRs at module init
KVM: VMX: Use flag to indicate "active" uret MSRs instead of sorting list
KVM: VMX: Use common x86's uret MSR list as the one true list
KVM: VMX: Disable loading of TSX_CTRL MSR the more conventional way
KVM: x86: Export the number of uret MSRs to vendor modules
KVM: x86: Move uret MSR slot management to common x86
KVM: x86: Tie Intel and AMD behavior for MSR_TSC_AUX to guest CPU model
KVM: x86: Hide RDTSCP and RDPID if MSR_TSC_AUX probing failed
KVM: x86: Prevent KVM SVM from loading on kernels with 5-level paging
KVM: SVM: Invert user pointer casting in SEV {en,de}crypt helpers
Shahin, Md Shahadat Hossain (1):
kvm/x86: Fix 'lpages' kvm stat for TDM MMU
Siddharth Chandrasekaran (2):
doc/kvm: Fix wrong entry for KVM_CAP_X86_MSR_FILTER
KVM: x86: Hoist input checks in kvm_add_msr_filter()
Stefan Raspl (1):
tools/kvm_stat: Fix documentation typo
Thomas Gleixner (2):
KVM: x86: Cancel pvclock_gtod_work on module removal
KVM: x86: Prevent deadlock against tk_core.seq
Tom Lendacky (1):
KVM: SVM: Move GHCB unmapping to fix RCU warning
Vitaly Kuznetsov (9):
x86/kvm: Fix pr_info() for async PF setup/teardown
x86/kvm: Teardown PV features on boot CPU as well
x86/kvm: Disable kvmclock on all CPUs on shutdown
x86/kvm: Disable all PV features on crash
x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline()
KVM: nVMX: Always make an attempt to map eVMCS after migration
KVM: selftests: evmcs_test: Check that VMLAUNCH with bogus EVMPTR is causing #UD
KVM: selftests: evmcs_test: Check that VMCS12 is alway properly synced to eVMCS after restore
KVM: nVMX: Properly pad 'struct kvm_vmx_nested_state_hdr'
Wanpeng Li (1):
KVM: LAPIC: Accurately guarantee busy wait for timer to expire when using hv_timer
Documentation/virt/kvm/api.rst | 4 +-
arch/powerpc/include/asm/kvm_book3s.h | 2 +-
arch/powerpc/kvm/book3s_64_mmu_hv.c | 46 +++--
arch/powerpc/kvm/book3s_64_mmu_radix.c | 5 +-
arch/x86/include/asm/kvm_host.h | 15 +-
arch/x86/include/asm/kvm_para.h | 10 +-
arch/x86/include/uapi/asm/kvm.h | 2 +
arch/x86/kernel/kvm.c | 129 ++++++++-----
arch/x86/kernel/kvmclock.c | 26 +--
arch/x86/kvm/cpuid.c | 20 +-
arch/x86/kvm/emulate.c | 2 +-
arch/x86/kvm/kvm_emulate.h | 1 +
arch/x86/kvm/lapic.c | 2 +-
arch/x86/kvm/mmu/mmu.c | 20 +-
arch/x86/kvm/mmu/tdp_mmu.c | 17 +-
arch/x86/kvm/svm/nested.c | 23 ++-
arch/x86/kvm/svm/sev.c | 32 ++--
arch/x86/kvm/svm/svm.c | 62 +++---
arch/x86/kvm/svm/svm.h | 1 +
arch/x86/kvm/vmx/capabilities.h | 3 +
arch/x86/kvm/vmx/nested.c | 29 ++-
arch/x86/kvm/vmx/vmx.c | 220 +++++++++++-----------
arch/x86/kvm/vmx/vmx.h | 12 +-
arch/x86/kvm/x86.c | 153 +++++++++++----
tools/kvm/kvm_stat/kvm_stat.txt | 2 +-
tools/testing/selftests/kvm/lib/x86_64/handlers.S | 4 +-
tools/testing/selftests/kvm/x86_64/evmcs_test.c | 88 +++++++--
virt/kvm/kvm_main.c | 7 +-
28 files changed, 578 insertions(+), 359 deletions(-)
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [GIT PULL] KVM updates for Linux 5.13-rc2
2021-05-10 18:14 [GIT PULL] KVM updates for Linux 5.13-rc2 Paolo Bonzini
@ 2021-05-10 19:09 ` Sean Christopherson
2021-05-10 20:12 ` pr-tracker-bot
1 sibling, 0 replies; 3+ messages in thread
From: Sean Christopherson @ 2021-05-10 19:09 UTC (permalink / raw)
To: Paolo Bonzini; +Cc: torvalds, linux-kernel, kvm
On Mon, May 10, 2021, Paolo Bonzini wrote:
> Linus,
>
> The following changes since commit 9ccce092fc64d19504fa54de4fd659e279cc92e7:
>
> Merge tag 'for-linus-5.13-ofs-1' of git://git.kernel.org/pub/scm/linux/kernel/git/hubcap/linux (2021-05-02 14:13:46 -0700)
>
> are available in the Git repository at:
>
> https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
>
> for you to fetch changes up to ce7ea0cfdc2e9ff31d12da31c3226deddb9644f5:
>
> KVM: SVM: Move GHCB unmapping to fix RCU warning (2021-05-07 06:06:23 -0400)
>
> Thomas Gleixner and Michael Ellerman had some KVM changes in their
> late merge window pull requests, but there are no conflicts.
>
> ----------------------------------------------------------------
> Sean Christopherson (17):
> KVM: VMX: Do not advertise RDPID if ENABLE_RDTSCP control is unsupported
> KVM: x86: Emulate RDPID only if RDTSCP is supported
> KVM: SVM: Inject #UD on RDTSCP when it should be disabled in the guest
> KVM: x86: Move RDPID emulation intercept to its own enum
> KVM: VMX: Disable preemption when probing user return MSRs
> KVM: SVM: Probe and load MSR_TSC_AUX regardless of RDTSCP support in host
> KVM: x86: Add support for RDPID without RDTSCP
> KVM: VMX: Configure list of user return MSRs at module init
I'm guessing I'm too late as usual and the hashes are set in stone, but just in
case I'm not...
This patch (commit b6194b94a2ca, "KVM: VMX: Configure...) has a bug that Maxim
found during code review. The bug is eliminated by the very next patch (commit
e7f5ab87841c), but it will break bisection if bisection involves running a KVM
guest. At a glance, even syzkaller will be affected :-(
> KVM: VMX: Use flag to indicate "active" uret MSRs instead of sorting list
> KVM: VMX: Use common x86's uret MSR list as the one true list
> KVM: VMX: Disable loading of TSX_CTRL MSR the more conventional way
> KVM: x86: Export the number of uret MSRs to vendor modules
> KVM: x86: Move uret MSR slot management to common x86
> KVM: x86: Tie Intel and AMD behavior for MSR_TSC_AUX to guest CPU model
> KVM: x86: Hide RDTSCP and RDPID if MSR_TSC_AUX probing failed
> KVM: x86: Prevent KVM SVM from loading on kernels with 5-level paging
> KVM: SVM: Invert user pointer casting in SEV {en,de}crypt helpers
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [GIT PULL] KVM updates for Linux 5.13-rc2
2021-05-10 18:14 [GIT PULL] KVM updates for Linux 5.13-rc2 Paolo Bonzini
2021-05-10 19:09 ` Sean Christopherson
@ 2021-05-10 20:12 ` pr-tracker-bot
1 sibling, 0 replies; 3+ messages in thread
From: pr-tracker-bot @ 2021-05-10 20:12 UTC (permalink / raw)
To: Paolo Bonzini; +Cc: torvalds, linux-kernel, kvm
The pull request you sent on Mon, 10 May 2021 14:14:41 -0400:
> https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/0aa099a312b6323495a23d758009eb7fc04a7617
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2021-05-10 20:12 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-05-10 18:14 [GIT PULL] KVM updates for Linux 5.13-rc2 Paolo Bonzini
2021-05-10 19:09 ` Sean Christopherson
2021-05-10 20:12 ` pr-tracker-bot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).