From patchwork Sun Dec 23 09:14:15 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Paolo Bonzini X-Patchwork-Id: 10741591 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id C6EC8924 for ; Sun, 23 Dec 2018 09:14:40 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id B599D28A37 for ; Sun, 23 Dec 2018 09:14:40 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id A9FEE28AAA; Sun, 23 Dec 2018 09:14:40 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.7 required=2.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,MAILING_LIST_MULTI,RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 2BAE928A37 for ; Sun, 23 Dec 2018 09:14:39 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727054AbeLWJOW (ORCPT ); Sun, 23 Dec 2018 04:14:22 -0500 Received: from mail-wr1-f65.google.com ([209.85.221.65]:42492 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727008AbeLWJOW (ORCPT ); Sun, 23 Dec 2018 04:14:22 -0500 Received: by mail-wr1-f65.google.com with SMTP id q18so9168630wrx.9; Sun, 23 Dec 2018 01:14:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=6m2Uie/+wdqtKH8n8mH8Oub5n1MpBhNkBhZJ6TBuUMY=; b=hYxf3g+yr9p9yD9HyhSAPbzF8esS1Otmq2HrnTm6aOT4sNpWqeFviGC5ZjwmZEy67q DGAu2g7Lm6yFyoSTKjBq3+eVt5JWblGlKyYLdet1D18W7La/osDTSKTsUXv1hgr5GxIU JyiVWtzyG0J5PAiGi9TaRJCycZs7+Fuyzlqi+okv6GecuncJgX0OnW9qWmOpgROpkaaf wA36RVC4F2CVhbv5/OFDWyjL4Hu9va/Gn3QyKoAPu3PMLcYWkkEj0GhWb5Gj4LxBHkpc TkDzpASEC82wy9Rux2jccbqA74DnquGGhe9XXNn1+Ko0uhf9NPjCxXOfhUkqe//dbfxV qS8Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :mime-version:content-transfer-encoding; bh=6m2Uie/+wdqtKH8n8mH8Oub5n1MpBhNkBhZJ6TBuUMY=; b=WjdkQXQ1J4VbNOpBC7zW39BBBPOAdLM5K1puWUw6kaxX+uf6qO3Bpr2qAo+ivzylhL yrKZXugV0eXh5Y3StYEh4CauL3s/0eX3azvqS1frKHo2p0zdNWrequSmK7vuZ+WCaA/I 7OlXEXPWvDyDsdNWOG7OiyUi23WlG9I/ajsaYLmsNDrfT8G3vpdEjL1MrFoTQ9VKp4fP dPjpDKqDmXEyHTKyLkw78yjHwtIfkJxsuy2aqhc3XRfgXK1kUhYraqWjyUImnO5ccGAv 5qVmserNTo4EO78oIjDqvCsKNqUxeufP8As1oRgML+WjK+8S0WPxXyCU8l8WvUC0g6NA KaWA== X-Gm-Message-State: AJcUukffnoUAgY7gvcjAcjfcKR4evR3gTGnNbo5XFw9wZ3na2hAnb2Kl S4tY7LmnEBGBSy32+BFREMG2Ex8g X-Google-Smtp-Source: ALg8bN5nCceDZntqSVNhzaD93DAL0I+G7ro//tWpG+8+/RDfwu1lOnA+EYuI6Ss9qHVKLBYjsYV3CQ== X-Received: by 2002:adf:b6a1:: with SMTP id j33mr8320671wre.55.1545556457815; Sun, 23 Dec 2018 01:14:17 -0800 (PST) Received: from 640k.localdomain ([93.56.166.5]) by smtp.gmail.com with ESMTPSA id x10sm19632546wrn.29.2018.12.23.01.14.16 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 23 Dec 2018 01:14:17 -0800 (PST) From: Paolo Bonzini To: torvalds@linux-foundation.org Cc: linux-kernel@vger.kernel.org, rkrcmar@redhat.com, kvm@vger.kernel.org Subject: [GIT PULL] Changes for KVM 4.21 Date: Sun, 23 Dec 2018 10:14:15 +0100 Message-Id: <1545556455-53839-1-git-send-email-pbonzini@redhat.com> X-Mailer: git-send-email 1.8.3.1 MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Linus, The following changes since commit 40e020c129cfc991e8ab4736d2665351ffd1468d: Linux 4.20-rc6 (2018-12-09 15:31:00 -0800) are available in the git repository at: https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus for you to fetch changes up to a0aea130afebcd091d5396d13f25b9da24c9144a: KVM: x86: Add CPUID support for new instruction WBNOINVD (2018-12-21 14:26:32 +0100) The PT and Hyper-V changes have been acked by the maintainers; since Ingo acked the MPX issue and is going to remove the topic branch, all that is left is two trivial conflicts. One is due to the disintegration of arch/x86/kvm/vmx.c; only one commit in all of linux-next touched that file, so this will be enough to fix it: $ git log --oneline v4.20-rc6..origin/master -- arch/x86/kvm/vmx.c c2dd5146e9fe KVM: Fix UAF in nested posted interrupt processing $ git rm arch/x86/kvm/vmx.c $ git show c2dd5146e9fe | patch arch/x86/kvm/vmx/nested.c patching file arch/x86/kvm/vmx/nested.c Hunk #1 succeeded at 2881 (offset -9104 lines). The second is with the PPC tree, due to commit d7b456152230 in my tree, you can solve it in your sleep but anyway the resolution is after the diffstat. Thanks, Paolo ---------------------------------------------------------------- * ARM: selftests improvements, large PUD support for HugeTLB, single-stepping fixes, improved tracing, various timer and vGIC fixes * x86: Processor Tracing virtualization, STIBP support, some correctness fixes, refactorings and splitting of vmx.c, use the Hyper-V range TLB flush hypercall, reduce order of vcpu struct, WBNOINVD support, do not use -ftrace for __noclone functions, nested guest support for PAUSE filtering on AMD, more Hyper-V enlightenments (direct mode for synthetic timers) * PPC: nested VFIO * s390: bugfixes only this time ---------------------------------------------------------------- Andrew Jones (8): kvm: selftests: x86_64: dirty_log_test: fix -t kvm: selftests: dirty_log_test: don't identity map the test mem kvm: selftests: dirty_log_test: always use -t kvm: selftests: dirty_log_test: reset guest test phys offset kvm: selftests: dirty_log_test: improve mode param management kvm: selftests: add pa-48/va-48 VM modes kvm: selftests: aarch64: dirty_log_test: support greater than 40-bit IPAs kvm: selftests: ucall: fix exit mmio address guessing Bharata B Rao (1): KVM: PPC: Pass change type down to memslot commit function Chao Peng (7): perf/x86/intel/pt: Move Intel PT MSRs bit defines to global header perf/x86/intel/pt: Export pt_cap_get() KVM: x86: Add Intel PT virtualization work mode KVM: x86: Add Intel Processor Trace cpuid emulation KVM: x86: Add Intel PT context switch for each vcpu KVM: x86: Implement Intel PT MSRs read/write emulation KVM: x86: Set intercept for Intel PT MSRs read/write Christoffer Dall (9): KVM: arm/arm64: Fix VMID alloc race by reverting to lock-less KVM: arm/arm64: vgic-v2: Set active_source to 0 when restoring state KVM: arm64: Clarify explanation of STAGE2_PGTABLE_LEVELS KVM: arm/arm64: vgic: Consider priority and active state for pending irq KVM: arm/arm64: Fixup the kvm_exit tracepoint KVM: arm/arm64: Remove arch timer workqueue KVM: arm/arm64: arch_timer: Simplify kvm_timer_vcpu_terminate KVM: arm64: Make vcpu const in vcpu_read_sys_reg KVM: arm/arm64: Fix unintended stage 2 PMD mappings Eduardo Habkost (1): kvm: x86: Report STIBP on GET_SUPPORTED_CPUID Gustavo A. R. Silva (1): KVM: arm/arm64: vgic: Fix off-by-one bug in vgic_get_irq() Jim Mattson (11): KVM: nVMX: Unrestricted guest mode requires EPT kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page kvm: vmx: Set IA32_TSC_AUX for legacy mode guests kvm: vmx: Document the need for MSR_STAR in i386 builds kvm: vmx: Don't set hardware IA32_CSTAR MSR on VM-entry kvm: vmx: Skip all SYSCALL MSRs in setup_msrs() when !EFER.SCE kvm: x86: Don't modify MSR_PLATFORM_INFO on vCPU reset kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init kvm: Change offset in kvm_write_guest_offset_cached to unsigned kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT kvm: vmx: Allow guest read access to IA32_TSC Julien Thierry (1): KVM: arm/arm64: vgic: Do not cond_resched_lock() with IRQs disabled Krish Sadhukhan (8): nVMX x86: Check VMX-preemption timer controls on vmentry of L2 guests KVM nVMX: MSRs should not be stored if VM-entry fails during or after loading guest state KVM: nVMX: Prepend "nested_vmx_" to check_vmentry_{pre,post}reqs() KVM: nVMX: Move the checks for VM-Execution Control Fields to a separate helper function KVM: nVMX: Move the checks for VM-Exit Control Fields to a separate helper function KVM: nVMX: Move the checks for VM-Entry Control Fields to a separate helper function KVM: nVMX: Move the checks for Host Control Registers and MSRs to a separate helper function KVM: nVMX: Move the checks for Guest Non-Register States to a separate helper function Lan Tianyu (10): KVM/VMX: Check ept_pointer before flushing ept tlb KVM: Add tlb_remote_flush_with_range callback in kvm_x86_ops x86/hyper-v: Add HvFlushGuestAddressList hypercall support KVM/VMX: Add hv tlb range flush support KVM/MMU: Add tlb flush with range helper function KVM: Replace old tlb flush function with new one to flush a specified range. KVM: Make kvm_set_spte_hva() return int KVM/MMU: Move tlb flush in kvm_set_pte_rmapp() to kvm_mmu_notifier_change_pte() KVM/MMU: Flush tlb directly in kvm_set_pte_rmapp() KVM/MMU: Flush tlb directly in the kvm_zap_gfn_range() Luwei Kang (5): perf/x86/intel/pt: Introduce intel_pt_validate_cap() perf/x86/intel/pt: Add new bit definitions for PT MSRs perf/x86/intel/pt: add new capability for Intel PT KVM: x86: Introduce a function to initialize the PT configuration KVM: x86: Disable Intel PT when VMXON in L1 guest Marc Orr (2): kvm: x86: Use task structs fpu field for user kvm: x86: Dynamically allocate guest_fpu Marc Zyngier (5): KVM: arm/arm64: vgic: Cap SPIs to the VM-defined maximum arm64: KVM: Add trapped system register access tracepoint arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs arm/arm64: KVM: Add ARM_EXCEPTION_IS_TRAP macro arm: KVM: Add S2_PMD_{MASK,SIZE} constants Mark Rutland (3): arm64: KVM: Skip MMIO insn after emulation arm64: KVM: Consistently advance singlestep when emulating instructions KVM: arm/arm64: Log PSTATE for unhandled sysregs Michael Mueller (2): KVM: s390: unregister debug feature on failing arch init KVM: s390: fix kmsg component kvm-s390 Paolo Bonzini (10): KVM: x86: Trace changes to active TSC offset regardless if vCPU in guest-mode Merge branch 'khdr_fix' of git://git.kernel.org/.../shuah/linux-kselftest into HEAD kvm: make KVM_CAP_ENABLE_CAP_VM architecture agnostic kvm: rename last argument to kvm_get_dirty_log_protect kvm: introduce manual dirty log reprotect kvm: selftests: ucall: improve ucall placement in memory, fix unsigned comparison Merge tag 'kvmarm-for-v4.21' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD Merge tag 'kvm-s390-next-4.21-1' of git://git.kernel.org/.../kvms390/linux into HEAD KVM: x86: fix size of x86_fpu_cache objects Merge tag 'kvm-ppc-next-4.21-2' of git://git.kernel.org/.../paulus/powerpc into kvm-next Paul Mackerras (4): KVM: PPC: Book3S HV: Fix race between kvm_unmap_hva_range and MMU mode switch KVM: PPC: Book3S HV: Map single pages when doing dirty page logging KVM: PPC: Book3S HV: Cleanups - constify memslots, fix comments KVM: PPC: Book3S HV: Flush guest mappings when turning dirty tracking on/off Peng Hao (3): kvm: svm: remove unused struct definition kvm: x86: remove unnecessary recalculate_apic_map x86/kvmclock: convert to SPDX identifiers Punit Agrawal (8): KVM: arm/arm64: Share common code in user_mem_abort() KVM: arm/arm64: Re-factor setting the Stage 2 entry to exec on fault KVM: arm/arm64: Introduce helpers to manipulate page table entries KVM: arm64: Support dirty page tracking for PUD hugepages KVM: arm64: Support PUD hugepage in stage2_is_exec() KVM: arm64: Support handling access faults for PUD hugepages KVM: arm64: Update age handlers to support PUD hugepages KVM: arm64: Add support for creating PUD hugepages at stage 2 Radim Krčmář (1): Merge tag 'kvm-ppc-next-4.21-1' of git://git.kernel.org/.../paulus/powerpc Robert Hoo (1): KVM: x86: Add CPUID support for new instruction WBNOINVD Roman Kagan (2): x86: kvm: hyperv: simplify SynIC message delivery x86: kvm: hyperv: don't retry message delivery for periodic timers Sean Christopherson (35): KVM: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails KVM: nVMX: Allocate and configure VM{READ,WRITE} bitmaps iff enable_shadow_vmcs KVM: VMX: Alphabetize the includes in vmx.c KVM: x86: Add requisite includes to kvm_cache_regs.h KVM: x86: Add requisite includes to hyperv.h KVM: VMX: Move VMX specific files to a "vmx" subdirectory KVM: VMX: rename vmx_shadow_fields.h to vmcs_shadow_fields.h KVM: VMX: Drop the "vmx" prefix from vmx_evmcs.h KVM: VMX: Move caching of MSR_IA32_XSS to hardware_setup() KVM: VMX: Properly handle dynamic VM Entry/Exit controls KVM: VMX: Pass vmx_capability struct to setup_vmcs_config() KVM: VMX: Move capabilities structs and helpers to dedicated file KVM: VMX: Expose various module param vars via capabilities.h KVM: VMX: Move VMCS definitions to dedicated file KVM: nVMX: Move vmcs12 code to dedicated files KVM: VMX: Add vmx.h to hold VMX definitions KVM: VMX: Move eVMCS code to dedicated files KVM: VMX: Move VMX instruction wrappers to a dedicated header file KVM: VMX: Move nested hardware/vcpu {un}setup to helper functions KVM: x86: nVMX: Allow nested_enable_evmcs to be NULL KVM: VMX: Move the hardware {un}setup functions to the bottom KVM: nVMX: Set callbacks for nested functions during hardware setup KVM: nVMX: Call nested_vmx_setup_ctls_msrs() iff @nested is true KVM: nVMX: Move "vmcs12 to shadow/evmcs sync" to helper function KVM: VMX: Expose misc variables needed for nested VMX KVM: VMX: Expose various getters and setters to nested VMX KVM: VMX: Expose nested_vmx_allowed() to nested VMX as a non-inline KVM: nVMX: Move nested code to dedicated files KVM: nVMX: Remove param indirection from nested_vmx_check_msr_switch() KVM: x86: Remove KF() macro placeholder MAINTAINERS: Add arch/x86/kvm sub-directories to existing KVM/x86 entry KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup KVM: VMX: Explicitly reference RCX as the vmx_vcpu pointer in asm blobs KVM: VMX: Move VM-Enter + VM-Exit handling to non-inline sub-routines Revert "compiler-gcc: disable -ftracer for __noclone functions" Shuah Khan (1): selftests: Fix test errors related to lib.mk khdr target Stefan Raspl (1): tools/kvm_stat: switch to python3 Suraj Jitindar Singh (14): KVM: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines KVM: PPC: Book3S HV: Add function kvmhv_vcpu_is_radix() KVM: PPC: Book3S HV: Implement functions to access quadrants 1 & 2 KVM: PPC: Add load_from_eaddr and store_to_eaddr to the kvmppc_ops struct KVM: PPC: Update kvmppc_st and kvmppc_ld to use quadrants KVM: PPC: Book3S HV: Allow passthrough of an emulated device to an L2 guest KVM: PPC: Book3S: Introduce new hcall H_COPY_TOFROM_GUEST to access quadrants 1 & 2 KVM: PPC: Book3S HV: Allow passthrough of an emulated device to an L3 guest KVM: PPC: Book3S HV: Hold kvm->mmu_lock across updating nested pte rc bits KVM: PPC: Book3S HV: Align gfn to L1 page size when inserting nest-rmap entry KVM: PPC: Book3S HV: Apply combination of host and l1 pte rc for nested guest KVM: PPC: Book3S HV: Introduce kvmhv_update_nest_rmap_rc_list() KVM: PPC: Book3S HV: Keep rc bits in shadow pgtable in sync with host Tambe, William (1): KVM: nSVM: Fix nested guest support for PAUSE filtering. Uros Bizjak (2): KVM/nVMX: Remove unneeded forward jump in nested_vmx_check_vmentry_hw asm KVM/x86: Use SVM assembly instruction mnemonics instead of .byte streams Vitaly Kuznetsov (14): x86/hyper-v: Mark TLFS structures packed x86/hyper-v: Do some housekeeping in hyperv-tlfs.h x86/hyper-v: Drop HV_X64_CONFIGURE_PROFILER definition x86/kvm/hyper-v: Introduce nested_get_evmcs_version() helper x86/kvm/hyper-v: Introduce KVM_GET_SUPPORTED_HV_CPUID KVM: selftests: implement an unchecked version of vcpu_ioctl() KVM: selftests: Add hyperv_cpuid test x86/hyper-v: move synic/stimer control structures definitions to hyperv-tlfs.h x86/kvm/hyper-v: use stimer config definition from hyperv-tlfs.h x86/kvm/hyper-v: direct mode for synthetic timers x86/kvm/hyper-v: avoid open-coding stimer_mark_pending() in kvm_hv_notify_acked_sint() x86/hyper-v: Stop caring about EOI for direct stimers KVM: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported selftests: kvm: report failed stage when exit reason is unexpected Wei Huang (1): kvm: vmx: add cpu into VMX preemption timer bug list Wei Yang (1): KVM: fix some typos Will Deacon (1): arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 Yangtao Li (1): KVM: PPC: Book3S HV: Change to use DEFINE_SHOW_ATTRIBUTE macro YueHaibing (1): KVM: VMX: Remove duplicated include from vmx.c Documentation/virtual/kvm/api.txt | 136 +- MAINTAINERS | 1 + arch/arm/include/asm/kvm_asm.h | 4 + arch/arm/include/asm/kvm_host.h | 7 +- arch/arm/include/asm/kvm_mmu.h | 61 + arch/arm/include/asm/stage2_pgtable.h | 8 + arch/arm/kvm/coproc.c | 4 +- arch/arm64/include/asm/kvm_arm.h | 6 +- arch/arm64/include/asm/kvm_asm.h | 7 + arch/arm64/include/asm/kvm_emulate.h | 35 +- arch/arm64/include/asm/kvm_host.h | 5 +- arch/arm64/include/asm/kvm_mmu.h | 48 + arch/arm64/include/asm/pgtable-hwdef.h | 4 + arch/arm64/include/asm/pgtable.h | 9 + arch/arm64/include/asm/stage2_pgtable.h | 16 +- arch/arm64/kvm/debug.c | 21 - arch/arm64/kvm/handle_exit.c | 14 +- arch/arm64/kvm/hyp/switch.c | 43 +- arch/arm64/kvm/hyp/vgic-v2-cpuif-proxy.c | 12 +- arch/arm64/kvm/sys_regs.c | 12 +- arch/arm64/kvm/sys_regs.h | 4 + arch/arm64/kvm/trace.h | 35 + arch/mips/include/asm/kvm_host.h | 2 +- arch/mips/kvm/mips.c | 29 +- arch/mips/kvm/mmu.c | 3 +- arch/powerpc/include/asm/hvcall.h | 1 + arch/powerpc/include/asm/kvm_book3s.h | 23 +- arch/powerpc/include/asm/kvm_book3s_64.h | 18 +- arch/powerpc/include/asm/kvm_host.h | 5 +- arch/powerpc/include/asm/kvm_ppc.h | 10 +- arch/powerpc/kernel/exceptions-64s.S | 9 + arch/powerpc/kvm/book3s.c | 8 +- arch/powerpc/kvm/book3s_64_mmu_hv.c | 12 +- arch/powerpc/kvm/book3s_64_mmu_radix.c | 160 +- arch/powerpc/kvm/book3s_hv.c | 95 +- arch/powerpc/kvm/book3s_hv_nested.c | 190 +- arch/powerpc/kvm/book3s_hv_rm_mmu.c | 2 +- arch/powerpc/kvm/book3s_pr.c | 4 +- arch/powerpc/kvm/book3s_xics.c | 12 +- arch/powerpc/kvm/book3s_xive.c | 12 +- arch/powerpc/kvm/booke.c | 3 +- arch/powerpc/kvm/e500_mmu_host.c | 3 +- arch/powerpc/kvm/powerpc.c | 47 +- arch/powerpc/mm/fault.c | 1 + arch/s390/kvm/kvm-s390.c | 35 +- arch/x86/events/intel/pt.c | 60 +- arch/x86/events/intel/pt.h | 58 - arch/x86/hyperv/nested.c | 80 + arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/hyperv-tlfs.h | 335 +- arch/x86/include/asm/intel_pt.h | 26 + arch/x86/include/asm/kvm_host.h | 25 +- arch/x86/include/asm/mshyperv.h | 15 + arch/x86/include/asm/msr-index.h | 37 + arch/x86/include/asm/svm.h | 7 - arch/x86/include/asm/trace/hyperv.h | 14 + arch/x86/include/asm/vmx.h | 9 + arch/x86/kernel/kvmclock.c | 15 +- arch/x86/kvm/Makefile | 2 +- arch/x86/kvm/cpuid.c | 31 +- arch/x86/kvm/hyperv.c | 305 +- arch/x86/kvm/hyperv.h | 4 + arch/x86/kvm/kvm_cache_regs.h | 2 + arch/x86/kvm/lapic.c | 5 +- arch/x86/kvm/mmu.c | 98 +- arch/x86/kvm/paging_tmpl.h | 3 +- arch/x86/kvm/svm.c | 68 +- arch/x86/kvm/trace.h | 10 +- arch/x86/kvm/vmx.c | 15250 ------------------- arch/x86/kvm/vmx/capabilities.h | 343 + arch/x86/kvm/{vmx_evmcs.h => vmx/evmcs.c} | 78 +- arch/x86/kvm/vmx/evmcs.h | 202 + arch/x86/kvm/vmx/nested.c | 5719 +++++++ arch/x86/kvm/vmx/nested.h | 282 + arch/x86/kvm/vmx/ops.h | 285 + arch/x86/kvm/{ => vmx}/pmu_intel.c | 0 arch/x86/kvm/vmx/vmcs.h | 136 + arch/x86/kvm/vmx/vmcs12.c | 157 + arch/x86/kvm/vmx/vmcs12.h | 462 + .../vmcs_shadow_fields.h} | 0 arch/x86/kvm/vmx/vmenter.S | 57 + arch/x86/kvm/vmx/vmx.c | 7935 ++++++++++ arch/x86/kvm/vmx/vmx.h | 519 + arch/x86/kvm/x86.c | 161 +- drivers/hv/hv.c | 2 +- drivers/hv/hyperv_vmbus.h | 68 - include/kvm/arm_arch_timer.h | 4 - include/linux/compiler_attributes.h | 9 +- include/linux/kvm_host.h | 12 +- include/uapi/linux/kvm.h | 19 + tools/kvm/kvm_stat/kvm_stat | 2 +- tools/testing/selftests/android/Makefile | 2 +- tools/testing/selftests/futex/functional/Makefile | 1 + tools/testing/selftests/gpio/Makefile | 6 +- tools/testing/selftests/kvm/Makefile | 5 +- tools/testing/selftests/kvm/clear_dirty_log_test.c | 2 + tools/testing/selftests/kvm/dirty_log_test.c | 165 +- tools/testing/selftests/kvm/include/kvm_util.h | 8 + .../testing/selftests/kvm/lib/aarch64/processor.c | 18 +- tools/testing/selftests/kvm/lib/kvm_util.c | 67 +- .../testing/selftests/kvm/lib/kvm_util_internal.h | 1 + tools/testing/selftests/kvm/lib/ucall.c | 36 +- tools/testing/selftests/kvm/x86_64/evmcs_test.c | 4 +- tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c | 157 + tools/testing/selftests/kvm/x86_64/state_test.c | 4 +- tools/testing/selftests/lib.mk | 8 +- .../selftests/networking/timestamping/Makefile | 1 + tools/testing/selftests/tc-testing/bpf/Makefile | 1 + tools/testing/selftests/vm/Makefile | 1 + virt/kvm/arm/arch_timer.c | 35 +- virt/kvm/arm/arm.c | 47 +- virt/kvm/arm/hyp/vgic-v3-sr.c | 6 +- virt/kvm/arm/mmio.c | 11 +- virt/kvm/arm/mmu.c | 390 +- virt/kvm/arm/trace.h | 18 +- virt/kvm/arm/vgic/vgic-mmio.c | 44 +- virt/kvm/arm/vgic/vgic.c | 13 +- virt/kvm/async_pf.c | 2 +- virt/kvm/kvm_main.c | 208 +- 119 files changed, 19022 insertions(+), 16327 deletions(-) delete mode 100644 arch/x86/kvm/vmx.c create mode 100644 arch/x86/kvm/vmx/capabilities.h rename arch/x86/kvm/{vmx_evmcs.h => vmx/evmcs.c} (88%) create mode 100644 arch/x86/kvm/vmx/evmcs.h create mode 100644 arch/x86/kvm/vmx/nested.c create mode 100644 arch/x86/kvm/vmx/nested.h create mode 100644 arch/x86/kvm/vmx/ops.h rename arch/x86/kvm/{ => vmx}/pmu_intel.c (100%) create mode 100644 arch/x86/kvm/vmx/vmcs.h create mode 100644 arch/x86/kvm/vmx/vmcs12.c create mode 100644 arch/x86/kvm/vmx/vmcs12.h rename arch/x86/kvm/{vmx_shadow_fields.h => vmx/vmcs_shadow_fields.h} (100%) create mode 100644 arch/x86/kvm/vmx/vmenter.S create mode 100644 arch/x86/kvm/vmx/vmx.c create mode 100644 arch/x86/kvm/vmx/vmx.h create mode 100644 tools/testing/selftests/kvm/clear_dirty_log_test.c create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c diff --cc arch/powerpc/mm/fault.c index c866d9a710fe,2e6fb1d758c3..000000000000 --- a/arch/powerpc/mm/fault.c +++ b/arch/powerpc/mm/fault.c @@@ -650,9 -636,9 +650,10 @@@ void bad_page_fault(struct pt_regs *reg switch (TRAP(regs)) { case 0x300: case 0x380: + case 0xe00: - printk(KERN_ALERT "Unable to handle kernel paging request for " - "data at address 0x%08lx\n", regs->dar); + pr_alert("BUG: %s at 0x%08lx\n", + regs->dar < PAGE_SIZE ? "Kernel NULL pointer dereference" : + "Unable to handle kernel data access", regs->dar); break; case 0x400: case 0x480: