From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.6 required=3.0 tests=DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_PASS,T_DKIM_INVALID, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 676B8ECE566 for ; Fri, 21 Sep 2018 14:06:06 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 1300821523 for ; Fri, 21 Sep 2018 14:06:06 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="uqsPjDsZ" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 1300821523 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390208AbeIUTzG (ORCPT ); Fri, 21 Sep 2018 15:55:06 -0400 Received: from mail-wm1-f66.google.com ([209.85.128.66]:38018 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389621AbeIUTzF (ORCPT ); Fri, 21 Sep 2018 15:55:05 -0400 Received: by mail-wm1-f66.google.com with SMTP id t25-v6so3405174wmi.3; Fri, 21 Sep 2018 07:06:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id; bh=Ga9LJBhqKr0+ONXckUCgRW1ZIhEbGgPKpmJ/CUUaDtY=; b=uqsPjDsZDtoWqJFdSwQoPLO4c99Hilldk81la1fH0FsemoNjcPfrYFdxqpTPPBZJQt qunmJkQ4blB00HxjNMA39bWjuF+pwC9n08Zu7DC8+0dLZUlHb7xkZC8toTRosF7BfWYm nxtDFNnG5MOBqnUQo8oge6l883mHQZZIelLLtIp6OzJcPigJyryGXHNBAYjZdyhtwrV5 VP4wrp7yofjTLpB1mKGHw65dudxzSgzyQpO6IO9j4+Nq2/oMKmb2RLZGAt2TPF+OeUnN lTcslPzizgRjL+ayXk6XU8Pr1pvllBBHpb8FaAELq2MZfKL2kYr+uNxpkX0u694dR5ND WnEQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id; bh=Ga9LJBhqKr0+ONXckUCgRW1ZIhEbGgPKpmJ/CUUaDtY=; b=ChGmX2A/h94CYdNyY9Tlw4DLg7TE9BO9sMskjgUcATV94MUg+8efziYYYiH7whqov6 F0QQU44SVJdhGRAobQqi8IPlkt8fFNAkYFgUQniIsihNXP5ZWPRVX1CAjHoqJiCa+wuo ay2IQV23WTLoh5FsHvZURCrSjWA8+7gVsb1Cow/IbYCJQFO5sQmwgjYTfjLfSk1q5APt /V2hvdI9V7F3LXIwZupqdScH1ZyFN1U5tQKFsfojRR6oqsw9wDhW5DQJdLKeODwbtzfn EXmQHkyRecPF6mekKTpb6Tk+mAbDVjHWjUtOwNfPAqVA/vDJ0VVMxWc+PEbixL/3PwQY lhJA== X-Gm-Message-State: ABuFfoiaRnw6OQOrW+IpGZCku++YDiUIaX5A7IPHIe2CROSCLEAVJOiG L0LWsWM2F9ZJomT8aRvMjqW6c02P X-Google-Smtp-Source: ANB0VdaMkxL0RVSE/4s8+pomMyx/mE0ilDSvg2tAYg+e8PPhVNWRQuRzrAbDgG3DT3u6cTeKsAdylQ== X-Received: by 2002:a1c:1203:: with SMTP id 3-v6mr7508969wms.46.1537538760994; Fri, 21 Sep 2018 07:06:00 -0700 (PDT) Received: from 640k.lan (94-36-187-248.adsl-ull.clienti.tiscali.it. [94.36.187.248]) by smtp.gmail.com with ESMTPSA id z80-v6sm11471667wrb.1.2018.09.21.07.05.59 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 21 Sep 2018 07:06:00 -0700 (PDT) From: Paolo Bonzini To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: rkrcmar@redhat.com Subject: [GIT PULL] KVM changes for Linux 4.19-rc5 Date: Fri, 21 Sep 2018 16:05:59 +0200 Message-Id: <1537538759-8160-1-git-send-email-pbonzini@redhat.com> X-Mailer: git-send-email 1.8.3.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Greg, The following changes since commit 7876320f88802b22d4e2daf7eb027dd14175a0f8: Linux 4.19-rc4 (2018-09-16 11:52:37 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus for you to fetch changes up to 26b471c7e2f7befd0f59c35b257749ca57e0ed70: KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs (2018-09-20 18:54:08 +0200) ---------------------------------------------------------------- This pull request is slightly bigger than usual at this stage, but I swear I would have sent it the same to Linus! The main cause for this is that I was on vacation until two weeks ago and it took a while to sort all the pending patches between 4.19 and 4.20, test them and so on. It's mostly small bugfixes and cleanups, mostly around x86 nested virtualization. One important change, not related to nested virtualization, is that the ability for the guest kernel to trap CPUID instructions (in Linux that's the ARCH_SET_CPUID arch_prctl) is now masked by default. This is because the feature is detected through an MSR; a very bad idea that Intel seems to like more and more. Some applications choke if the other fields of that MSR are not initialized as on real hardware, hence we have to disable the whole MSR by default, as was the case before Linux 4.12. ---------------------------------------------------------------- Alexey Kardashevskiy (1): KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode Andy Shevchenko (1): KVM: SVM: Switch to bitmap_zalloc() Drew Schmitt (3): KVM: x86: Turbo bits in MSR_PLATFORM_INFO KVM: x86: Control guest reads of MSR_PLATFORM_INFO kvm: selftests: Add platform_info_test Janosch Frank (2): s390/mm: Check for valid vma before zapping in gmap_discard KVM: s390: Make huge pages unavailable in ucontrol VMs Junaid Shahid (1): kvm: mmu: Don't read PDPTEs when paging is not enabled Krish Sadhukhan (2): nVMX x86: check posted-interrupt descriptor addresss on vmentry of L2 nVMX x86: Check VPID value on vmentry of L2 guests Lei Yang (1): kvm: selftests: use -pthread instead of -lpthread Liran Alon (2): KVM: nVMX: Wake blocked vCPU in guest-mode if pending interrupt in virtual APICv KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs Nicholas Piggin (1): KVM: PPC: Book3S HV: Don't use compound_order to determine host mapping size Paolo Bonzini (3): Merge tag 'kvm-s390-master-4.19-2' of git://git.kernel.org/.../kvms390/linux into HEAD Merge tag 'kvm-ppc-fixes-4.19-2' of git://git.kernel.org/.../paulus/powerpc into HEAD KVM: VMX: check nested state and CR4.VMXE against SMM Sean Christopherson (3): KVM: VMX: immediately mark preemption timer expired only for zero value KVM: VMX: modify preemption timer bit only when arming timer KVM: VMX: use preemption timer to force immediate VMExit Sebastian Andrzej Siewior (1): kvm: x86: make kvm_{load|put}_guest_fpu() static Tianyu Lan (1): KVM/MMU: Fix comment in walk_shadow_page_lockless_end() Vitaly Kuznetsov (2): x86/kvm/lapic: always disable MMIO interface in x2APIC mode x86/hyper-v: rename ipi_arg_{ex,non_ex} structures Wei Yang (1): KVM: x86: don't reset root in kvm_mmu_setup() Documentation/virtual/kvm/api.txt | 12 +- arch/powerpc/include/asm/book3s/64/pgtable.h | 1 - arch/powerpc/include/asm/iommu.h | 2 - arch/powerpc/include/asm/mmu_context.h | 1 + arch/powerpc/kernel/iommu.c | 25 ---- arch/powerpc/kvm/book3s_64_mmu_radix.c | 91 ++++++--------- arch/powerpc/kvm/book3s_64_vio_hv.c | 39 +++++-- arch/powerpc/mm/init_64.c | 49 -------- arch/powerpc/mm/mmu_context_iommu.c | 34 +++++- arch/s390/kvm/kvm-s390.c | 4 +- arch/s390/mm/gmap.c | 4 +- arch/x86/hyperv/hv_apic.c | 8 +- arch/x86/include/asm/hyperv-tlfs.h | 16 +-- arch/x86/include/asm/kvm_host.h | 5 + arch/x86/include/uapi/asm/kvm.h | 1 + arch/x86/kvm/lapic.c | 22 +++- arch/x86/kvm/mmu.c | 9 +- arch/x86/kvm/svm.c | 7 +- arch/x86/kvm/vmx.c | 138 ++++++++++++++++------- arch/x86/kvm/x86.c | 101 +++++++++++------ include/linux/kvm_host.h | 2 - include/uapi/linux/kvm.h | 1 + tools/testing/selftests/kvm/.gitignore | 1 + tools/testing/selftests/kvm/Makefile | 5 +- tools/testing/selftests/kvm/include/kvm_util.h | 4 + tools/testing/selftests/kvm/lib/kvm_util.c | 89 +++++++++++++++ tools/testing/selftests/kvm/platform_info_test.c | 110 ++++++++++++++++++ 27 files changed, 537 insertions(+), 244 deletions(-) create mode 100644 tools/testing/selftests/kvm/platform_info_test.c