From patchwork Sat May 8 13:04:35 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paolo Bonzini X-Patchwork-Id: 12246049 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-21.4 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,INCLUDES_PULL_REQUEST,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F2FBC433ED for ; Sat, 8 May 2021 13:04:48 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3FAF7610A7 for ; Sat, 8 May 2021 13:04:48 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231166AbhEHNFs (ORCPT ); Sat, 8 May 2021 09:05:48 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:22609 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231163AbhEHNFk (ORCPT ); Sat, 8 May 2021 09:05:40 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1620479079; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=skQAYTO3lrX6st7yGY+MvBv6eqI3dj5Prs9fSDNzCCg=; b=LKDanSx4cbrwOx4luiA2djUfPWSAfhiIW9g+lPhmP/MQ1Su0DAfzRXprWCGz5mojfaUKAT 5izqHm71f2d0uRW9vWeEizBHo0Cdtu5osQzH18Tu84BPbffXCHKiJl4f5oB0liTyGGRprE EKWFY18/LzxRdfVmOHxquMxmd+A+KNY= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-586-WRSs63fKMX20D1OlcrG1zw-1; Sat, 08 May 2021 09:04:37 -0400 X-MC-Unique: WRSs63fKMX20D1OlcrG1zw-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 6C39C10066E7; Sat, 8 May 2021 13:04:36 +0000 (UTC) Received: from virtlab701.virt.lab.eng.bos.redhat.com (virtlab701.virt.lab.eng.bos.redhat.com [10.19.152.228]) by smtp.corp.redhat.com (Postfix) with ESMTP id 29499E16B; Sat, 8 May 2021 13:04:36 +0000 (UTC) From: Paolo Bonzini To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: [GIT PULL] Second batch of KVM changes for Linux 5.13 Date: Sat, 8 May 2021 09:04:35 -0400 Message-Id: <20210508130435.201020-1-pbonzini@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org Linus, The following changes since commit 9ccce092fc64d19504fa54de4fd659e279cc92e7: Merge tag 'for-linus-5.13-ofs-1' of git://git.kernel.org/pub/scm/linux/kernel/git/hubcap/linux (2021-05-02 14:13:46 -0700) are available in the Git repository at: https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus for you to fetch changes up to ce7ea0cfdc2e9ff31d12da31c3226deddb9644f5: KVM: SVM: Move GHCB unmapping to fix RCU warning (2021-05-07 06:06:23 -0400) ---------------------------------------------------------------- * Lots of bug fixes. * Fix virtualization of RDPID * Virtualization of DR6_BUS_LOCK * More nested virtualization migration fixes (nSVM and eVMCS) * Fix for KVM guest hibernation * Fix for warning in SEV-ES SRCU usage ---------------------------------------------------------------- Benjamin Segall (1): kvm: exit halt polling on need_resched() as well Bill Wendling (1): selftests: kvm: remove reassignment of non-absolute variables Chenyi Qiang (1): KVM: X86: Add support for the emulation of DR6_BUS_LOCK bit Colin Ian King (1): KVM: x86: Fix potential fput on a null source_kvm_file David Matlack (1): kvm: Cap halt polling at kvm->max_halt_poll_ns Kai Huang (2): KVM: x86/mmu: Avoid unnecessary page table allocation in kvm_tdp_mmu_map() KVM: x86/mmu: Fix kdoc of __handle_changed_spte Maxim Levitsky (5): KVM: nSVM: fix a typo in svm_leave_nested KVM: nSVM: fix few bugs in the vmcb02 caching logic KVM: nSVM: leave the guest mode prior to loading a nested state KVM: nSVM: always restore the L1's GIF on migration KVM: nSVM: remove a warning about vmcb01 VM exit reason Nicholas Piggin (1): KVM: PPC: Book3S HV: Fix conversion to gfn-based MMU notifier callbacks Paolo Bonzini (1): KVM: X86: Expose bus lock debug exception to guest Sean Christopherson (17): KVM: VMX: Do not advertise RDPID if ENABLE_RDTSCP control is unsupported KVM: x86: Emulate RDPID only if RDTSCP is supported KVM: SVM: Inject #UD on RDTSCP when it should be disabled in the guest KVM: x86: Move RDPID emulation intercept to its own enum KVM: VMX: Disable preemption when probing user return MSRs KVM: SVM: Probe and load MSR_TSC_AUX regardless of RDTSCP support in host KVM: x86: Add support for RDPID without RDTSCP KVM: VMX: Configure list of user return MSRs at module init KVM: VMX: Use flag to indicate "active" uret MSRs instead of sorting list KVM: VMX: Use common x86's uret MSR list as the one true list KVM: VMX: Disable loading of TSX_CTRL MSR the more conventional way KVM: x86: Export the number of uret MSRs to vendor modules KVM: x86: Move uret MSR slot management to common x86 KVM: x86: Tie Intel and AMD behavior for MSR_TSC_AUX to guest CPU model KVM: x86: Hide RDTSCP and RDPID if MSR_TSC_AUX probing failed KVM: x86: Prevent KVM SVM from loading on kernels with 5-level paging KVM: SVM: Invert user pointer casting in SEV {en,de}crypt helpers Shahin, Md Shahadat Hossain (1): kvm/x86: Fix 'lpages' kvm stat for TDM MMU Siddharth Chandrasekaran (2): doc/kvm: Fix wrong entry for KVM_CAP_X86_MSR_FILTER KVM: x86: Hoist input checks in kvm_add_msr_filter() Stefan Raspl (1): tools/kvm_stat: Fix documentation typo Thomas Gleixner (2): KVM: x86: Cancel pvclock_gtod_work on module removal KVM: x86: Prevent deadlock against tk_core.seq Tom Lendacky (1): KVM: SVM: Move GHCB unmapping to fix RCU warning Vitaly Kuznetsov (9): x86/kvm: Fix pr_info() for async PF setup/teardown x86/kvm: Teardown PV features on boot CPU as well x86/kvm: Disable kvmclock on all CPUs on shutdown x86/kvm: Disable all PV features on crash x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() KVM: nVMX: Always make an attempt to map eVMCS after migration KVM: selftests: evmcs_test: Check that VMLAUNCH with bogus EVMPTR is causing #UD KVM: selftests: evmcs_test: Check that VMCS12 is alway properly synced to eVMCS after restore KVM: nVMX: Properly pad 'struct kvm_vmx_nested_state_hdr' Wanpeng Li (1): KVM: LAPIC: Accurately guarantee busy wait for timer to expire when using hv_timer Documentation/virt/kvm/api.rst | 4 +- arch/powerpc/include/asm/kvm_book3s.h | 2 +- arch/powerpc/kvm/book3s_64_mmu_hv.c | 46 +++-- arch/powerpc/kvm/book3s_64_mmu_radix.c | 5 +- arch/x86/include/asm/kvm_host.h | 15 +- arch/x86/include/asm/kvm_para.h | 10 +- arch/x86/include/uapi/asm/kvm.h | 2 + arch/x86/kernel/kvm.c | 129 ++++++++----- arch/x86/kernel/kvmclock.c | 26 +-- arch/x86/kvm/cpuid.c | 20 +- arch/x86/kvm/emulate.c | 2 +- arch/x86/kvm/kvm_emulate.h | 1 + arch/x86/kvm/lapic.c | 2 +- arch/x86/kvm/mmu/mmu.c | 20 +- arch/x86/kvm/mmu/tdp_mmu.c | 17 +- arch/x86/kvm/svm/nested.c | 23 ++- arch/x86/kvm/svm/sev.c | 32 ++-- arch/x86/kvm/svm/svm.c | 62 +++--- arch/x86/kvm/svm/svm.h | 1 + arch/x86/kvm/vmx/capabilities.h | 3 + arch/x86/kvm/vmx/nested.c | 29 ++- arch/x86/kvm/vmx/vmx.c | 220 +++++++++++----------- arch/x86/kvm/vmx/vmx.h | 12 +- arch/x86/kvm/x86.c | 153 +++++++++++---- tools/kvm/kvm_stat/kvm_stat.txt | 2 +- tools/testing/selftests/kvm/lib/x86_64/handlers.S | 4 +- tools/testing/selftests/kvm/x86_64/evmcs_test.c | 88 +++++++-- virt/kvm/kvm_main.c | 7 +- 28 files changed, 578 insertions(+), 359 deletions(-)