lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1569586082-13995-1-git-send-email-pbonzini@redhat.com>
Date:   Fri, 27 Sep 2019 14:08:02 +0200
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, rkrcmar@...hat.com,
        kvm@...r.kernel.org
Subject: [GIT PULL] Second batch of KVM changes for Linux 5.4 merge window

Linus,

The following changes since commit 4c07e2ddab5b6b57dbcb09aedbda1f484d5940cc:

  Merge tag 'mfd-next-5.4' of git://git.kernel.org/pub/scm/linux/kernel/git/lee/mfd (2019-09-23 19:37:49 -0700)

are available in the git repository at:


  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to fd3edd4a9066f28de99a16685a586d68a9f551f8:

  KVM: nVMX: cleanup and fix host 64-bit mode checks (2019-09-25 19:22:33 +0200)

----------------------------------------------------------------
x86 KVM changes:
* The usual accuracy improvements for nested virtualization
* The usual round of code cleanups from Sean
* Added back optimizations that were prematurely removed in 5.2
  (the bare minimum needed to fix the regression was in 5.3-rc8,
  here comes the rest)
* Support for UMWAIT/UMONITOR/TPAUSE
* Direct L2->L0 TLB flushing when L0 is Hyper-V and L1 is KVM
* Tell Windows guests if SMT is disabled on the host
* More accurate detection of vmexit cost
* Revert a pvqspinlock pessimization

----------------------------------------------------------------
Jim Mattson (3):
      kvm: x86: Add Intel PMU MSRs to msrs_to_save[]
      kvm: x86: Add "significant index" flag to a few CPUID leaves
      kvm: svm: Intercept RDPRU

Krish Sadhukhan (1):
      KVM: nVMX: Check Host Address Space Size on vmentry of nested guests

Marc Orr (1):
      kvm: nvmx: limit atomic switch MSRs

Paolo Bonzini (1):
      KVM: nVMX: cleanup and fix host 64-bit mode checks

Peter Xu (4):
      KVM: selftests: Move vm type into _vm_create() internally
      KVM: selftests: Create VM earlier for dirty log test
      KVM: selftests: Introduce VM_MODE_PXXV48_4K
      KVM: selftests: Remove duplicate guest mode handling

Sean Christopherson (30):
      KVM: x86: Manually flush collapsible SPTEs only when toggling flags
      KVM: x86: Relocate MMIO exit stats counting
      KVM: x86: Clean up handle_emulation_failure()
      KVM: x86: Refactor kvm_vcpu_do_singlestep() to remove out param
      KVM: x86: Don't attempt VMWare emulation on #GP with non-zero error code
      KVM: x86: Move #GP injection for VMware into x86_emulate_instruction()
      KVM: x86: Add explicit flag for forced emulation on #UD
      KVM: x86: Move #UD injection for failed emulation into emulation code
      KVM: x86: Exit to userspace on emulation skip failure
      KVM: x86: Handle emulation failure directly in kvm_task_switch()
      KVM: x86: Move triple fault request into RM int injection
      KVM: VMX: Remove EMULATE_FAIL handling in handle_invalid_guest_state()
      KVM: x86: Remove emulation_result enums, EMULATE_{DONE,FAIL,USER_EXIT}
      KVM: VMX: Handle single-step #DB for EMULTYPE_SKIP on EPT misconfig
      KVM: x86: Add comments to document various emulation types
      KVM: x86/mmu: Treat invalid shadow pages as obsolete
      KVM: x86/mmu: Use fast invalidate mechanism to zap MMIO sptes
      KVM: x86/mmu: Revert "Revert "KVM: MMU: show mmu_valid_gen in shadow page related tracepoints""
      KVM: x86/mmu: Revert "Revert "KVM: MMU: add tracepoint for kvm_mmu_invalidate_all_pages""
      KVM: x86/mmu: Revert "Revert "KVM: MMU: zap pages in batch""
      KVM: x86/mmu: Revert "Revert "KVM: MMU: collapse TLB flushes when zap all pages""
      KVM: x86/mmu: Revert "Revert "KVM: MMU: reclaim the zapped-obsolete page first""
      KVM: x86/mmu: Revert "KVM: x86/mmu: Remove is_obsolete() call"
      KVM: x86/mmu: Explicitly track only a single invalid mmu generation
      KVM: x86/mmu: Skip invalid pages during zapping iff root_count is zero
      KVM: x86: Check kvm_rebooting in kvm_spurious_fault()
      KVM: VMX: Optimize VMX instruction error and fault handling
      KVM: VMX: Add error handling to VMREAD helper
      KVM: x86: Drop ____kvm_handle_fault_on_reboot()
      KVM: x86: Don't check kvm_rebooting in __kvm_handle_fault_on_reboot()

Tao Xu (3):
      KVM: x86: Add support for user wait instructions
      KVM: vmx: Emulate MSR IA32_UMWAIT_CONTROL
      KVM: vmx: Introduce handle_unexpected_vmexit and handle WAITPKG vmexit

Tianyu Lan (2):
      x86/Hyper-V: Fix definition of struct hv_vp_assist_page
      KVM/Hyper-V: Add new KVM capability KVM_CAP_HYPERV_DIRECT_TLBFLUSH

Vitaly Kuznetsov (8):
      KVM/Hyper-V/VMX: Add direct tlb flush support
      KVM: x86: svm: remove unneeded nested_enable_evmcs() hook
      KVM: x86: announce KVM_CAP_HYPERV_ENLIGHTENED_VMCS support only when it is available
      cpu/SMT: create and export cpu_smt_possible()
      KVM: x86: hyper-v: set NoNonArchitecturalCoreSharing CPUID bit when SMT is impossible
      KVM: selftests: hyperv_cpuid: add check for NoNonArchitecturalCoreSharing bit
      KVM: selftests: fix ucall on x86
      KVM: vmx: fix build warnings in hv_enable_direct_tlbflush() on i386

Wanpeng Li (3):
      KVM: hyperv: Fix Direct Synthetic timers assert an interrupt w/o lapic_in_kernel
      KVM: LAPIC: Tune lapic_timer_advance_ns smoothly
      Revert "locking/pvqspinlock: Don't wait if vCPU is preempted"

 Documentation/virt/kvm/api.txt                     |  13 +
 arch/x86/include/asm/hyperv-tlfs.h                 |  31 ++-
 arch/x86/include/asm/kvm_host.h                    |  64 +++--
 arch/x86/include/asm/svm.h                         |   1 +
 arch/x86/include/asm/vmx.h                         |   2 +
 arch/x86/include/uapi/asm/svm.h                    |   1 +
 arch/x86/include/uapi/asm/vmx.h                    |   6 +-
 arch/x86/kernel/cpu/umwait.c                       |   6 +
 arch/x86/kvm/cpuid.c                               |   8 +-
 arch/x86/kvm/hyperv.c                              |  16 +-
 arch/x86/kvm/lapic.c                               |  28 +-
 arch/x86/kvm/lapic.h                               |   1 -
 arch/x86/kvm/mmu.c                                 | 145 +++++-----
 arch/x86/kvm/mmutrace.h                            |  42 ++-
 arch/x86/kvm/svm.c                                 |  79 +++---
 arch/x86/kvm/vmx/capabilities.h                    |   6 +
 arch/x86/kvm/vmx/evmcs.h                           |   2 +
 arch/x86/kvm/vmx/nested.c                          |  70 ++++-
 arch/x86/kvm/vmx/ops.h                             |  93 ++++---
 arch/x86/kvm/vmx/vmx.c                             | 306 ++++++++++++++-------
 arch/x86/kvm/vmx/vmx.h                             |   9 +
 arch/x86/kvm/x86.c                                 | 197 ++++++++-----
 arch/x86/kvm/x86.h                                 |   2 +-
 include/linux/cpu.h                                |   2 +
 include/uapi/linux/kvm.h                           |   1 +
 kernel/cpu.c                                       |  11 +-
 kernel/locking/qspinlock_paravirt.h                |   2 +-
 tools/objtool/check.c                              |   1 -
 tools/testing/selftests/kvm/dirty_log_test.c       |  79 ++----
 tools/testing/selftests/kvm/include/kvm_util.h     |  18 +-
 .../selftests/kvm/include/x86_64/processor.h       |   3 +
 .../testing/selftests/kvm/lib/aarch64/processor.c  |   3 +
 tools/testing/selftests/kvm/lib/kvm_util.c         |  67 ++++-
 tools/testing/selftests/kvm/lib/x86_64/processor.c |  30 +-
 tools/testing/selftests/kvm/lib/x86_64/ucall.c     |   2 +-
 tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c  |  27 ++
 36 files changed, 906 insertions(+), 468 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ