lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20200805182606.12621-1-pbonzini@redhat.com>
Date:   Wed,  5 Aug 2020 14:26:06 -0400
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] First batch of KVM changes for Linux 5.9

Linus,

The following changes since commit 8038a922cf9af5266eaff29ce996a0d1b788fc0d:

  Merge tag 'kvmarm-fixes-5.8-3' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into kvm-master (2020-07-06 13:05:38 -0400)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to f3633c2683545213de4a00a9b0c3fba741321fb2:

  Merge tag 'kvm-s390-next-5.9-1' of git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into kvm-next-5.6 (2020-08-03 14:19:13 -0400)

----------------------------------------------------------------
s390: implement diag318

x86:
* Report last CPU for debugging
* Emulate smaller MAXPHYADDR in the guest than in the host
* .noinstr and tracing fixes from Thomas
* nested SVM page table switching optimization and fixes

Generic:
* Unify shadow MMU cache data structures across architectures

----------------------------------------------------------------

There is a conflict in arch/x86/kernel/kvm.c that git will only
partially report.  idtentry_enter_cond_rcu and idtentry_exit_cond_rcu
have been renamed to idtentry_enter and idtentry_exit and their return
type went from bool to idtentry_state_t.  There are two occurrences
but git will only notice the first one (and only partly so, it misses
the function calls altogether).

The resolution is simple, but I've included it at the end of this message
anyway.

Thanks,

Paolo

Colin Ian King (1):
      KVM: MIPS: fix spelling mistake "Exteneded" -> "Extended"

Collin Walling (2):
      s390/setup: diag 318: refactor struct
      s390/kvm: diagnose 0x318 sync and reset

Dan Carpenter (1):
      KVM: SVM: Fix sev_pin_memory() error handling

Haiwei Li (1):
      KVM: Using macros instead of magic values

Huacai Chen (1):
      MIPS: KVM: Fix build error caused by 'kvm_run' cleanup

Jiaxun Yang (2):
      MIPS: KVM: Limit Trap-and-Emulate to MIPS32R2 only
      MIPS: KVM: Remove outdated README

Jim Mattson (7):
      kvm: svm: Prefer vcpu->cpu to raw_smp_processor_id()
      kvm: svm: Always set svm->last_cpu on VMRUN
      kvm: vmx: Add last_cpu to struct vcpu_vmx
      kvm: x86: Add "last CPU" to some KVM_EXIT information
      kvm: x86: Move last_cpu into kvm_vcpu_arch as last_vmentry_cpu
      kvm: x86: Set last_vmentry_cpu in vcpu_enter_guest
      kvm: x86: Read PDPTEs on CR0.CD and CR0.NW changes

Joerg Roedel (4):
      KVM: SVM: Rename struct nested_state to svm_nested_state
      KVM: SVM: Add vmcb_ prefix to mark_*() functions
      KVM: SVM: Add svm_ prefix to set/clr/is_intercept()
      KVM: SVM: Rename svm_nested_virtualize_tpr() to nested_svm_virtualize_tpr()

John Hubbard (2):
      KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()
      KVM: SVM: convert get_user_pages() --> pin_user_pages()

Krish Sadhukhan (4):
      KVM: x86: Move the check for upper 32 reserved bits of DR6 to separate function
      KVM: nSVM: Check that DR6[63:32] and DR7[64:32] are not set on vmrun of nested guests
      KVM: x86: Create mask for guest CR4 reserved bits in kvm_update_cpuid()
      KVM: nSVM: Check that MBZ bits in CR3 and CR4 are not set on vmrun of nested guests

Like Xu (2):
      kvm: x86: limit the maximum number of vPMU fixed counters to 3
      KVM/x86: pmu: Fix #GP condition check for RDPMC emulation

Maxim Levitsky (1):
      kvm: x86: replace kvm_spec_ctrl_test_value with runtime test on the host

Mohammed Gamal (5):
      KVM: x86: Add helper functions for illegal GPA checking and page fault injection
      KVM: x86: mmu: Move translate_gpa() to mmu.c
      KVM: x86: mmu: Add guest physical address check in translate_gpa()
      KVM: VMX: Add guest physical address check in EPT violation and misconfig
      KVM: x86: Add a capability for GUEST_MAXPHYADDR < HOST_MAXPHYADDR support

Paolo Bonzini (11):
      Merge branch 'kvm-async-pf-int' into HEAD
      Merge branch 'kvm-master' into HEAD
      KVM: x86: report sev_pin_memory errors with PTR_ERR
      KVM: x86: Make CR4.VMXE reserved for the guest
      KVM: MMU: stop dereferencing vcpu->arch.mmu to get the context for MMU init
      KVM: x86: rename update_bp_intercept to update_exception_bitmap
      KVM: x86: update exception bitmap on CPUID changes
      KVM: VMX: introduce vmx_need_pf_intercept
      KVM: VMX: optimize #PF injection when MAXPHYADDR does not match
      KVM: nSVM: remove nonsensical EXITINFO1 adjustment on nested NPF
      Merge tag 'kvm-s390-next-5.9-1' of git://git.kernel.org/.../kvms390/linux into kvm-next-5.6

Peter Xu (2):
      KVM: X86: Move ignore_msrs handling upper the stack
      KVM: X86: Do the same ignore_msrs check for feature msrs

Sean Christopherson (46):
      KVM: x86/mmu: Drop kvm_arch_write_log_dirty() wrapper
      KVM: nVMX: WARN if PML emulation helper is invoked outside of nested guest
      KVM: x86/mmu: Make .write_log_dirty a nested operation
      KVM: nVMX: Wrap VM-Fail valid path in generic VM-Fail helper
      KVM: x86/mmu: Avoid multiple hash lookups in kvm_get_mmu_page()
      KVM: x86/mmu: Optimize MMU page cache lookup for fully direct MMUs
      KVM: x86/mmu: Don't put invalid SPs back on the list of active pages
      KVM: x86/mmu: Batch zap MMU pages when recycling oldest pages
      KVM: x86/mmu: Batch zap MMU pages when shrinking the slab
      KVM: x86/mmu: Exit to userspace on make_mmu_pages_available() error
      KVM: x86/mmu: Move mmu_audit.c and mmutrace.h into the mmu/ sub-directory
      KVM: x86/mmu: Move kvm_mmu_available_pages() into mmu.c
      KVM: x86/mmu: Add MMU-internal header
      KVM: x86/mmu: Make kvm_mmu_page definition and accessor internal-only
      KVM: x86/mmu: Add sptep_to_sp() helper to wrap shadow page lookup
      KVM: x86/mmu: Rename page_header() to to_shadow_page()
      KVM: x86/mmu: Track the associated kmem_cache in the MMU caches
      KVM: x86/mmu: Consolidate "page" variant of memory cache helpers
      KVM: x86/mmu: Use consistent "mc" name for kvm_mmu_memory_cache locals
      KVM: x86/mmu: Remove superfluous gotos from mmu_topup_memory_caches()
      KVM: x86/mmu: Try to avoid crashing KVM if a MMU memory cache is empty
      KVM: x86/mmu: Move fast_page_fault() call above mmu_topup_memory_caches()
      KVM: x86/mmu: Topup memory caches after walking GVA->GPA
      KVM: x86/mmu: Clean up the gorilla math in mmu_topup_memory_caches()
      KVM: x86/mmu: Separate the memory caches for shadow pages and gfn arrays
      KVM: x86/mmu: Make __GFP_ZERO a property of the memory cache
      KVM: x86/mmu: Zero allocate shadow pages (outside of mmu_lock)
      KVM: x86/mmu: Skip filling the gfn cache for guaranteed direct MMU topups
      KVM: x86/mmu: Prepend "kvm_" to memory cache helpers that will be global
      KVM: Move x86's version of struct kvm_mmu_memory_cache to common code
      KVM: Move x86's MMU memory cache helpers to common KVM code
      KVM: arm64: Drop @max param from mmu_topup_memory_cache()
      KVM: arm64: Use common code's approach for __GFP_ZERO with memory caches
      KVM: arm64: Use common KVM implementation of MMU memory caches
      KVM: MIPS: Drop @max param from mmu_topup_memory_cache()
      KVM: MIPS: Account pages used for GPA page tables
      KVM: MIPS: Use common KVM implementation of MMU memory caches
      KVM: nSVM: Correctly set the shadow NPT root level in its MMU role
      KVM: VMX: Drop a duplicate declaration of construct_eptp()
      KVM: x86/mmu: Add separate helper for shadow NPT root page role calc
      KVM: VMX: Make vmx_load_mmu_pgd() static
      KVM: x86: Pull the PGD's level from the MMU instead of recalculating it
      KVM: VXM: Remove temporary WARN on expected vs. actual EPTP level mismatch
      KVM: x86: Dynamically calculate TDP level from max level and MAXPHYADDR
      KVM: x86/mmu: Rename max_page_level to max_huge_page_level
      KVM: x86: Specify max TDP level via kvm_configure_mmu()

Thomas Gleixner (7):
      x86/kvm: Move context tracking where it belongs
      x86/kvm/vmx: Add hardirq tracing to guest enter/exit
      x86/kvm/svm: Add hardirq tracing on guest enter/exit
      x86/kvm/vmx: Move guest enter/exit into .noinstr.text
      x86/kvm/svm: Move guest enter/exit into .noinstr.text
      x86/kvm/svm: Use uninstrumented wrmsrl() to restore GS
      x86/kvm/vmx: Use native read/write_cr2()

Tianjia Zhang (3):
      KVM: s390: clean up redundant 'kvm_run' parameters
      KVM: arm64: clean up redundant 'kvm_run' parameters
      KVM: MIPS: clean up redundant 'kvm_run' parameters

Uros Bizjak (1):
      KVM: x86: Use VMCALL and VMMCALL mnemonics in kvm_para.h

Vitaly Kuznetsov (13):
      KVM: x86: Switch KVM guest to using interrupts for page ready APF delivery
      KVM: x86: drop KVM_PV_REASON_PAGE_READY case from kvm_handle_page_fault()
      KVM: async_pf: change kvm_setup_async_pf()/kvm_arch_setup_async_pf() return type to bool
      KVM: x86: take as_id into account when checking PGD
      KVM: x86: move MSR_IA32_PERF_CAPABILITIES emulation to common x86 code
      KVM: nSVM: split kvm_init_shadow_npt_mmu() from kvm_init_shadow_mmu()
      KVM: nSVM: reset nested_run_pending upon nested_svm_vmrun_msrpm() failure
      KVM: nSVM: prepare to handle errors from enter_svm_guest_mode()
      KVM: nSVM: introduce nested_svm_load_cr3()/nested_npt_enabled()
      KVM: nSVM: move kvm_set_cr3() after nested_svm_uninit_mmu_context()
      KVM: nSVM: implement nested_svm_load_cr3() and use it for host->guest switch
      KVM: nSVM: use nested_svm_load_cr3() on guest->host switch
      KVM: x86: drop superfluous mmu_check_root() from fast_pgd_switch()

Wanpeng Li (1):
      KVM: LAPIC: Set the TDCR settable bits

Xiaoyao Li (9):
      KVM: X86: Reset vcpu->arch.cpuid_nent to 0 if SET_CPUID* fails
      KVM: X86: Go on updating other CPUID leaves when leaf 1 is absent
      KVM: lapic: Use guest_cpuid_has() in kvm_apic_set_version()
      KVM: X86: Move kvm_apic_set_version() to kvm_update_cpuid()
      KVM: x86: Introduce kvm_check_cpuid()
      KVM: x86: Extract kvm_update_cpuid_runtime() from kvm_update_cpuid()
      KVM: x86: Rename kvm_update_cpuid() to kvm_vcpu_after_set_cpuid()
      KVM: x86: Rename cpuid_update() callback to vcpu_after_set_cpuid()
      KVM: x86: Move kvm_x86_ops.vcpu_after_set_cpuid() into kvm_vcpu_after_set_cpuid()

Zhenzhong Duan (4):
      Revert "KVM: X86: Fix setup the virt_spin_lock_key before static key get initialized"
      x86/kvm: Change print code to use pr_*() format
      x86/kvm: Add "nopvspin" parameter to disable PV spinlocks
      xen: Mark "xen_nopvspin" parameter obsolete

 Documentation/admin-guide/kernel-parameters.txt |  10 +-
 Documentation/virt/kvm/api.rst                  |   5 +
 arch/arm64/include/asm/kvm_coproc.h             |  12 +-
 arch/arm64/include/asm/kvm_host.h               |  22 +-
 arch/arm64/include/asm/kvm_mmu.h                |   2 +-
 arch/arm64/include/asm/kvm_types.h              |   8 +
 arch/arm64/kvm/arm.c                            |   8 +-
 arch/arm64/kvm/handle_exit.c                    |  36 +-
 arch/arm64/kvm/mmio.c                           |  11 +-
 arch/arm64/kvm/mmu.c                            |  61 +---
 arch/arm64/kvm/sys_regs.c                       |  13 +-
 arch/mips/Kconfig                               |   1 +
 arch/mips/include/asm/kvm_host.h                |  39 +-
 arch/mips/include/asm/kvm_types.h               |   7 +
 arch/mips/kvm/00README.txt                      |  31 --
 arch/mips/kvm/Kconfig                           |   3 +-
 arch/mips/kvm/emulate.c                         |  65 ++--
 arch/mips/kvm/mips.c                            |  11 +-
 arch/mips/kvm/mmu.c                             |  44 +--
 arch/mips/kvm/trap_emul.c                       | 114 +++---
 arch/mips/kvm/vz.c                              |  26 +-
 arch/powerpc/include/asm/Kbuild                 |   1 +
 arch/s390/include/asm/Kbuild                    |   1 +
 arch/s390/include/asm/diag.h                    |   6 +-
 arch/s390/include/asm/kvm_host.h                |   4 +-
 arch/s390/include/uapi/asm/kvm.h                |   7 +-
 arch/s390/kernel/setup.c                        |   3 +-
 arch/s390/kvm/kvm-s390.c                        |  54 ++-
 arch/s390/kvm/vsie.c                            |   1 +
 arch/x86/Kconfig                                |   1 +
 arch/x86/include/asm/hardirq.h                  |   4 +-
 arch/x86/include/asm/idtentry.h                 |   4 +
 arch/x86/include/asm/kvm_host.h                 |  95 ++---
 arch/x86/include/asm/kvm_para.h                 |   3 +-
 arch/x86/include/asm/kvm_types.h                |   7 +
 arch/x86/include/asm/qspinlock.h                |   1 +
 arch/x86/kernel/kvm.c                           | 118 ++++--
 arch/x86/kvm/cpuid.c                            | 115 +++---
 arch/x86/kvm/cpuid.h                            |   2 +-
 arch/x86/kvm/lapic.c                            |  11 +-
 arch/x86/kvm/mmu.h                              |  34 +-
 arch/x86/kvm/mmu/mmu.c                          | 461 +++++++++++++-----------
 arch/x86/kvm/{ => mmu}/mmu_audit.c              |  12 +-
 arch/x86/kvm/mmu/mmu_internal.h                 |  63 ++++
 arch/x86/kvm/{ => mmu}/mmutrace.h               |   2 +-
 arch/x86/kvm/mmu/page_track.c                   |   2 +-
 arch/x86/kvm/mmu/paging_tmpl.h                  |  19 +-
 arch/x86/kvm/pmu.c                              |   5 +
 arch/x86/kvm/pmu.h                              |   2 +
 arch/x86/kvm/svm/avic.c                         |   2 +-
 arch/x86/kvm/svm/nested.c                       | 142 ++++++--
 arch/x86/kvm/svm/sev.c                          |  47 +--
 arch/x86/kvm/svm/svm.c                          | 262 +++++++++-----
 arch/x86/kvm/svm/svm.h                          |  32 +-
 arch/x86/kvm/svm/vmenter.S                      |   2 +-
 arch/x86/kvm/vmx/nested.c                       | 149 +++++---
 arch/x86/kvm/vmx/ops.h                          |   4 +
 arch/x86/kvm/vmx/pmu_intel.c                    |  17 -
 arch/x86/kvm/vmx/vmenter.S                      |   5 +-
 arch/x86/kvm/vmx/vmx.c                          | 209 ++++++-----
 arch/x86/kvm/vmx/vmx.h                          |  12 +-
 arch/x86/kvm/x86.c                              | 231 +++++++-----
 arch/x86/kvm/x86.h                              |  34 +-
 arch/x86/xen/spinlock.c                         |   4 +-
 include/asm-generic/kvm_types.h                 |   5 +
 include/linux/kvm_host.h                        |  12 +-
 include/linux/kvm_types.h                       |  19 +
 include/uapi/linux/kvm.h                        |   4 +
 kernel/locking/qspinlock.c                      |   7 +
 virt/kvm/async_pf.c                             |  16 +-
 virt/kvm/kvm_main.c                             |  63 ++++
 71 files changed, 1633 insertions(+), 1212 deletions(-)
 create mode 100644 arch/arm64/include/asm/kvm_types.h
 create mode 100644 arch/mips/include/asm/kvm_types.h
 delete mode 100644 arch/mips/kvm/00README.txt
 create mode 100644 arch/x86/include/asm/kvm_types.h
 rename arch/x86/kvm/{ => mmu}/mmu_audit.c (96%)
 create mode 100644 arch/x86/kvm/mmu/mmu_internal.h
 rename arch/x86/kvm/{ => mmu}/mmutrace.h (99%)
 create mode 100644 include/asm-generic/kvm_types.h

diff --cc arch/x86/kernel/kvm.c
index d9995931ea18,3f78482d9496..000000000000
--- a/arch/x86/kernel/kvm.c
+++ b/arch/x86/kernel/kvm.c
@@@ -34,6 -31,6 +34,7 @@@
  #include <asm/apic.h>
  #include <asm/apicdef.h>
  #include <asm/hypervisor.h>
++#include <asm/idtentry.h>
  #include <asm/tlb.h>
  #include <asm/cpuidle_haltpoll.h>
  
@@@ -235,13 -232,18 +236,13 @@@ EXPORT_SYMBOL_GPL(kvm_read_and_reset_ap
  
  noinstr bool __kvm_handle_async_pf(struct pt_regs *regs, u32 token)
  {
 -	u32 reason = kvm_read_and_reset_apf_flags();
 +	u32 flags = kvm_read_and_reset_apf_flags();
- 	bool rcu_exit;
+ 	idtentry_state_t state;
  
 -	switch (reason) {
 -	case KVM_PV_REASON_PAGE_NOT_PRESENT:
 -	case KVM_PV_REASON_PAGE_READY:
 -		break;
 -	default:
 +	if (!flags)
  		return false;
 -	}
  
- 	rcu_exit = idtentry_enter_cond_rcu(regs);
+ 	state = idtentry_enter(regs);
  	instrumentation_begin();
  
  	/*
@@@ -266,27 -268,6 +267,27 @@@
  	return true;
  }
  
 +DEFINE_IDTENTRY_SYSVEC(sysvec_kvm_asyncpf_interrupt)
 +{
 +	struct pt_regs *old_regs = set_irq_regs(regs);
 +	u32 token;
- 	bool rcu_exit;
++	idtentry_state_t rcu_exit;
 +
- 	rcu_exit = idtentry_enter_cond_rcu(regs);
++	rcu_exit = idtentry_enter(regs);
 +
 +	inc_irq_stat(irq_hv_callback_count);
 +
 +	if (__this_cpu_read(apf_reason.enabled)) {
 +		token = __this_cpu_read(apf_reason.token);
 +		kvm_async_pf_task_wake(token);
 +		__this_cpu_write(apf_reason.token, 0);
 +		wrmsrl(MSR_KVM_ASYNC_PF_ACK, 1);
 +	}
 +
- 	idtentry_exit_cond_rcu(regs, rcu_exit);
++	idtentry_exit(regs, rcu_exit);
 +	set_irq_regs(old_regs);
 +}
 +
  static void __init paravirt_ops_setup(void)
  {
  	pv_info.name = "KVM";

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ