lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240719145339.55027-1-pbonzini@redhat.com>
Date: Fri, 19 Jul 2024 10:53:38 -0400
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org,
	kvm@...r.kernel.org
Subject: [GIT PULL] KVM changes for 6.11 merge window

Linus,

The following changes since commit 256abd8e550ce977b728be79a74e1729438b4948:

  Linux 6.10-rc7 (2024-07-07 14:23:46 -0700)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 332d2c1d713e232e163386c35a3ba0c1b90df83f:

  crypto: ccp: Add the SNP_VLEK_LOAD command (2024-07-17 12:46:26 -0400)


Conflicts (fortunately trivial):

- the one in arch/x86/include/asm/sev-common.h is just two branches adding
  macros in the same place

- the slightly more annoying one is in tools/perf/arch/loongarch/util/Build
  and tools/perf/arch/riscv/util/Build, where perf-y has been renamed
  to perf-util-y by commit e467705a9fb3 ("perf util: Make util its own
  library").  The relevant commits in this pull request are

  492ac37fa38f perf kvm: Add kvm-stat for loongarch64
  da7b1b525e97 perf kvm/riscv: Port perf kvm stat to RISC-V


Non-KVM changes:

- a new ioctl for the AMD secure processor driver, which is in charge of
  /dev/sev (sev = secure encrypted virtualization); patch reviewed by
  the maintainer, Tom Lendacky.

- renaming the AS_UNMOVABLE flag, which was added for KVM's guest_memfd,
  to AS_INACCESSIBLE now that it can also be used for hardware-protected
  memory and it protects truncation in addition to page migration.  Acked
  by David Hildenbrand and Vlastimil Babka.

Thanks,

Paolo

----------------------------------------------------------------
ARM:

* Initial infrastructure for shadow stage-2 MMUs, as part of nested
  virtualization enablement

* Support for userspace changes to the guest CTR_EL0 value, enabling
  (in part) migration of VMs between heterogenous hardware

* Fixes + improvements to pKVM's FF-A proxy, adding support for v1.1 of
  the protocol

* FPSIMD/SVE support for nested, including merged trap configuration
  and exception routing

* New command-line parameter to control the WFx trap behavior under KVM

* Introduce kCFI hardening in the EL2 hypervisor

* Fixes + cleanups for handling presence/absence of FEAT_TCRX

* Miscellaneous fixes + documentation updates

LoongArch:

* Add paravirt steal time support.

* Add support for KVM_DIRTY_LOG_INITIALLY_SET.

* Add perf kvm-stat support for loongarch.

RISC-V:

* Redirect AMO load/store access fault traps to guest

* perf kvm stat support

* Use guest files for IMSIC virtualization, when available

ONE_REG support for the Zimop, Zcmop, Zca, Zcf, Zcd, Zcb and Zawrs ISA
extensions is coming through the RISC-V tree.

s390:

* Assortment of tiny fixes which are not time critical

x86:

* Fixes for Xen emulation.

* Add a global struct to consolidate tracking of host values, e.g. EFER

* Add KVM_CAP_X86_APIC_BUS_CYCLES_NS to allow configuring the effective APIC
  bus frequency, because TDX.

* Print the name of the APICv/AVIC inhibits in the relevant tracepoint.

* Clean up KVM's handling of vendor specific emulation to consistently act on
  "compatible with Intel/AMD", versus checking for a specific vendor.

* Drop MTRR virtualization, and instead always honor guest PAT on CPUs
  that support self-snoop.

* Update to the newfangled Intel CPU FMS infrastructure.

* Don't advertise IA32_PERF_GLOBAL_OVF_CTRL as an MSR-to-be-saved, as it reads
  '0' and writes from userspace are ignored.

* Misc cleanups

x86 - MMU:

* Small cleanups, renames and refactoring extracted from the upcoming
  Intel TDX support.

* Don't allocate kvm_mmu_page.shadowed_translation for shadow pages that can't
  hold leafs SPTEs.

* Unconditionally drop mmu_lock when allocating TDP MMU page tables for eager
  page splitting, to avoid stalling vCPUs when splitting huge pages.

* Bug the VM instead of simply warning if KVM tries to split a SPTE that is
  non-present or not-huge.  KVM is guaranteed to end up in a broken state
  because the callers fully expect a valid SPTE, it's all but dangerous
  to let more MMU changes happen afterwards.

x86 - AMD:

* Make per-CPU save_area allocations NUMA-aware.

* Force sev_es_host_save_area() to be inlined to avoid calling into an
  instrumentable function from noinstr code.

* Base support for running SEV-SNP guests.  API-wise, this includes
  a new KVM_X86_SNP_VM type, encrypting/measure the initial image into
  guest memory, and finalizing it before launching it.  Internally,
  there are some gmem/mmu hooks needed to prepare gmem-allocated pages
  before mapping them into guest private memory ranges.

  This includes basic support for attestation guest requests, enough to
  say that KVM supports the GHCB 2.0 specification.

  There is no support yet for loading into the firmware those signing
  keys to be used for attestation requests, and therefore no need yet
  for the host to provide certificate data for those keys.  To support
  fetching certificate data from userspace, a new KVM exit type will be
  needed to handle fetching the certificate from userspace. An attempt to
  define a new KVM_EXIT_COCO/KVM_EXIT_COCO_REQ_CERTS exit type to handle
  this was introduced in v1 of this patchset, but is still being discussed
  by community, so for now this patchset only implements a stub version
  of SNP Extended Guest Requests that does not provide certificate data.

x86 - Intel:

* Remove an unnecessary EPT TLB flush when enabling hardware.

* Fix a series of bugs that cause KVM to fail to detect nested pending posted
  interrupts as valid wake eents for a vCPU executing HLT in L2 (with
  HLT-exiting disable by L1).

* KVM: x86: Suppress MMIO that is triggered during task switch emulation

  Explicitly suppress userspace emulated MMIO exits that are triggered when
  emulating a task switch as KVM doesn't support userspace MMIO during
  complex (multi-step) emulation.  Silently ignoring the exit request can
  result in the WARN_ON_ONCE(vcpu->mmio_needed) firing if KVM exits to
  userspace for some other reason prior to purging mmio_needed.

  See commit 0dc902267cb3 ("KVM: x86: Suppress pending MMIO write exits if
  emulator detects exception") for more details on KVM's limitations with
  respect to emulated MMIO during complex emulator flows.

Generic:

* Rename the AS_UNMOVABLE flag that was introduced for KVM to AS_INACCESSIBLE,
  because the special casing needed by these pages is not due to just
  unmovability (and in fact they are only unmovable because the CPU cannot
  access them).

* New ioctl to populate the KVM page tables in advance, which is useful to
  mitigate KVM page faults during guest boot or after live migration.
  The code will also be used by TDX, but (probably) not through the ioctl.

* Enable halt poll shrinking by default, as Intel found it to be a clear win.

* Setup empty IRQ routing when creating a VM to avoid having to synchronize
  SRCU when creating a split IRQCHIP on x86.

* Rework the sched_in/out() paths to replace kvm_arch_sched_in() with a flag
  that arch code can use for hooking both sched_in() and sched_out().

* Take the vCPU @id as an "unsigned long" instead of "u32" to avoid
  truncating a bogus value from userspace, e.g. to help userspace detect bugs.

* Mark a vCPU as preempted if and only if it's scheduled out while in the
  KVM_RUN loop, e.g. to avoid marking it preempted and thus writing guest
  memory when retrieving guest state during live migration blackout.

Selftests:

* Remove dead code in the memslot modification stress test.

* Treat "branch instructions retired" as supported on all AMD Family 17h+ CPUs.

* Print the guest pseudo-RNG seed only when it changes, to avoid spamming the
  log for tests that create lots of VMs.

* Make the PMU counters test less flaky when counting LLC cache misses by
  doing CLFLUSH{OPT} in every loop iteration.

----------------------------------------------------------------
Alejandro Jimenez (2):
      KVM: x86: Print names of apicv inhibit reasons in traces
      KVM: x86: Keep consistent naming for APICv/AVIC inhibit reasons

Anup Patel (2):
      RISC-V: KVM: Share APLIC and IMSIC defines with irqchip drivers
      RISC-V: KVM: Use IMSIC guest files when available

Ashish Kalra (1):
      KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP

Bibo Mao (10):
      LoongArch: KVM: Sync pending interrupt when getting ESTAT from user mode
      LoongArch: KVM: Delay secondary mmu tlb flush until guest entry
      LoongArch: KVM: Select huge page only if secondary mmu supports it
      LoongArch: KVM: Discard dirty page tracking on readonly memslot
      LoongArch: KVM: Add memory barrier before update pmd entry
      LoongArch: KVM: Add dirty bitmap initially all set support
      LoongArch: KVM: Mark page accessed and dirty with page ref added
      LoongArch: KVM: Add PV steal time support in host side
      LoongArch: KVM: Add PV steal time support in guest side
      perf kvm: Add kvm-stat for loongarch64

Binbin Wu (1):
      KVM: VMX: Remove unused declaration of vmx_request_immediate_exit()

Borislav Petkov (1):
      KVM: Unexport kvm_debugfs_dir

Brijesh Singh (8):
      KVM: SEV: Add initial SEV-SNP support
      KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
      KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
      KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
      KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
      KVM: SEV: Add support to handle RMP nested page faults
      KVM: SVM: Add module parameter to enable SEV-SNP
      KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event

Carlos López (1):
      KVM: x86: Improve documentation for KVM_CAP_X86_BUS_LOCK_EXIT

Changyuan Lyu (3):
      KVM: Documentation: Fix typo `BFD`
      KVM: Documentation: Enumerate allowed value macros of `irq_type`
      KVM: Documentation: Correct the VGIC V2 CPU interface addr space size

Christoffer Dall (2):
      KVM: arm64: nv: Implement nested Stage-2 page table walk logic
      KVM: arm64: nv: Unmap/flush shadow stage 2 page tables

Christoph Schlameuss (1):
      kvm: s390: Reject memory region operations for ucontrol VMs

Claudio Imbrenda (1):
      KVM: s390: remove useless include

Colton Lewis (1):
      KVM: arm64: Add early_param to control WFx trapping

Dan Carpenter (1):
      KVM: Fix a goof where kvm_create_vm() returns 0 instead of -ENOMEM

Dapeng Mi (3):
      KVM: x86/pmu: Change ambiguous _mask suffix to _rsvd in kvm_pmu
      KVM: x86/pmu: Manipulate FIXED_CTR_CTRL MSR with macros
      KVM: x86/pmu: Introduce distinct macros for GP/fixed counter max number

David Matlack (7):
      KVM: x86/mmu: Always drop mmu_lock to allocate TDP MMU SPs for eager splitting
      KVM: x86/mmu: Hard code GFP flags for TDP MMU eager split allocations
      KVM: x86/mmu: Unnest TDP MMU helpers that allocate SPs for eager splitting
      KVM: x86/mmu: Avoid reacquiring RCU if TDP MMU fails to allocate an SP
      KVM: Introduce vcpu->wants_to_run
      KVM: Ensure new code that references immediate_exit gets extra scrutiny
      KVM: Mark a vCPU as preempted/ready iff it's scheduled out while running

Dr. David Alan Gilbert (1):
      KVM: selftests: remove unused struct 'memslot_antagonist_args'

Eric Farman (1):
      KVM: s390: vsie: retry SIE instruction on host intercepts

Hou Wenlong (2):
      KVM: x86/mmu: Only allocate shadowed translation cache for sp->role.level <= KVM_MAX_HUGEPAGE_LEVEL
      KVM: x86: Drop unused check_apicv_inhibit_reasons() callback definition

Isaku Yamahata (8):
      KVM: x86: hyper-v: Calculate APIC bus frequency for Hyper-V
      KVM: x86: Make nanoseconds per APIC bus cycle a VM variable
      KVM: x86: Add a capability to configure bus frequency for APIC timer
      KVM: x86/tdp_mmu: Sprinkle __must_check
      KVM: selftests: Add test for configure of x86 APIC bus frequency
      KVM: Document KVM_PRE_FAULT_MEMORY ioctl
      KVM: Add KVM_PRE_FAULT_MEMORY vcpu ioctl to pre-populate guest memory
      KVM: selftests: x86: Add test for KVM_PRE_FAULT_MEMORY

Jeff Johnson (2):
      KVM: x86: Add missing MODULE_DESCRIPTION() macros
      KVM: Add missing MODULE_DESCRIPTION()

Jia Qingtong (1):
      LoongArch: KVM: always make pte young in page map's fast path

Jim Mattson (1):
      KVM: x86: Remove IA32_PERF_GLOBAL_OVF_CTRL from KVM_GET_MSR_INDEX_LIST

Jintack Lim (1):
      KVM: arm64: nv: Forward FP/ASIMD traps to guest hypervisor

Julian Stecklina (1):
      KVM: fix documentation rendering for KVM_CAP_VM_MOVE_ENC_CONTEXT_FROM

Kai Huang (1):
      KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in vmx_exit()

Li RongQing (3):
      KVM: SVM: remove useless input parameter in snp_safe_alloc_page
      KVM: SVM: not account memory allocation for per-CPU svm_data
      KVM: SVM: Consider NUMA affinity when allocating per-CPU save_area

Liang Chen (1):
      KVM: x86: invalid_list not used anymore in mmu_shrink_scan

Manali Shukla (1):
      KVM: selftests: Treat AMD Family 17h+ as supporting branch insns retired

Marc Zyngier (25):
      KVM: arm64: nv: Fix RESx behaviour of disabled FGTs with negative polarity
      KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
      KVM: arm64: nv: Handle shadow stage 2 page faults
      KVM: arm64: nv: Add Stage-1 EL2 invalidation primitives
      KVM: arm64: nv: Handle EL2 Stage-1 TLB invalidation
      KVM: arm64: nv: Handle TLB invalidation targeting L2 stage-1
      KVM: arm64: nv: Handle TLBI VMALLS12E1{,IS} operations
      KVM: arm64: nv: Handle TLBI ALLE1{,IS} operations
      KVM: arm64: nv: Handle TLBI IPAS2E1{,IS} operations
      KVM: arm64: nv: Handle FEAT_TTL hinted TLB operations
      KVM: arm64: nv: Tag shadow S2 entries with guest's leaf S2 level
      KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
      KVM: arm64: nv: Add handling of outer-shareable TLBI operations
      KVM: arm64: nv: Add handling of range-based TLBI operations
      KVM: arm64: nv: Add handling of NXS-flavoured TLBI operations
      KVM: arm64: nv: Handle CPACR_EL1 traps
      KVM: arm64: nv: Add TCPAC/TTA to CPTR->CPACR conversion helper
      KVM: arm64: nv: Add trap description for CPTR_EL2
      KVM: arm64: nv: Add additional trap setup for CPTR_EL2
      KVM: arm64: Correctly honor the presence of FEAT_TCRX
      KVM: arm64: Get rid of HCRX_GUEST_FLAGS
      KVM: arm64: Make TCR2_EL1 save/restore dependent on the VM features
      KVM: arm64: Make PIR{,E0}_EL1 save/restore conditional on FEAT_TCRX
      KVM: arm64: Honor trap routing for TCR2_EL1
      KVM: arm64: nv: Truely enable nXS TLBI operations

Mathias Krause (4):
      KVM: Reject overly excessive IDs in KVM_CREATE_VCPU
      KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID
      KVM: selftests: Test max vCPU IDs corner cases
      KVM: selftests: Test vCPU boot IDs above 2^32 and MAX_VCPU_ID

Maxim Levitsky (1):
      KVM: selftests: Increase robustness of LLC cache misses in PMU counters test

Michael Roth (15):
      mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
      KVM: guest_memfd: Use AS_INACCESSIBLE when creating guest_memfd inode
      KVM: guest_memfd: Add hook for invalidating memory
      KVM: x86: Add hook for determining max NPT mapping level
      KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is needed
      KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
      KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
      KVM: SEV: Add support to handle Page State Change VMGEXIT
      KVM: SEV: Implement gmem hook for initializing private pages
      KVM: SEV: Implement gmem hook for invalidating private pages
      KVM: x86: Implement hook for determining max NPT mapping level
      KVM: SEV: Automatically switch reclaimed pages to shared
      x86/sev: Move sev_guest.h into common SEV header
      KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
      crypto: ccp: Add the SNP_VLEK_LOAD command

Oliver Upton (28):
      KVM: arm64: nv: Use GFP_KERNEL_ACCOUNT for sysreg_masks allocation
      KVM: arm64: Get sys_reg encoding from descriptor in idregs_debug_show()
      KVM: arm64: Make idregs debugfs iterator search sysreg table directly
      KVM: arm64: Use read-only helper for reading VM ID registers
      KVM: arm64: Add helper for writing ID regs
      KVM: arm64: nv: Use accessors for modifying ID registers
      KVM: arm64: nv: Forward SVE traps to guest hypervisor
      KVM: arm64: nv: Handle ZCR_EL2 traps
      KVM: arm64: nv: Load guest hyp's ZCR into EL1 state
      KVM: arm64: nv: Save guest's ZCR_EL2 when in hyp context
      KVM: arm64: nv: Use guest hypervisor's max VL when running nested guest
      KVM: arm64: nv: Ensure correct VL is loaded before saving SVE state
      KVM: arm64: Spin off helper for programming CPTR traps
      KVM: arm64: nv: Load guest FP state for ZCR_EL2 trap
      KVM: arm64: nv: Honor guest hypervisor's FP/SVE traps in CPTR_EL2
      KVM: arm64: Allow the use of SVE+NV
      KVM: arm64: nv: Unfudge ID_AA64PFR0_EL1 masking
      KVM: selftests: Assert that MPIDR_EL1 is unchanged across vCPU reset
      MAINTAINERS: Include documentation in KVM/arm64 entry
      Revert "KVM: arm64: nv: Fix RESx behaviour of disabled FGTs with negative polarity"
      Merge branch kvm-arm64/misc into kvmarm/next
      Merge branch kvm-arm64/ffa-1p1 into kvmarm/next
      Merge branch kvm-arm64/shadow-mmu into kvmarm/next
      Merge branch kvm-arm64/ctr-el0 into kvmarm/next
      Merge branch kvm-arm64/el2-kcfi into kvmarm/next
      Merge branch kvm-arm64/nv-sve into kvmarm/next
      Merge branch kvm-arm64/nv-tcr2 into kvmarm/next
      Merge branch kvm-arm64/docs into kvmarm/next

Paolo Bonzini (30):
      KVM: guest_memfd: pass error up from filemap_grab_folio
      KVM: guest_memfd: limit overzealous WARN
      KVM: guest_memfd: Add hook for initializing memory
      KVM: guest_memfd: extract __kvm_gmem_get_pfn()
      KVM: guest_memfd: Add interface for populating gmem pages with user data
      Merge branch 'kvm-coco-hooks' into HEAD
      KVM: SEV: Don't WARN() if RMP lookup fails when invalidating gmem pages
      Merge branch 'kvm-fixes-6.10-1' into HEAD
      Merge branch 'kvm-6.11-sev-snp' into HEAD
      KVM: interrupt kvm_gmem_populate() on signals
      Merge branch 'kvm-6.10-fixes' into HEAD
      mm, virt: merge AS_UNMOVABLE and AS_INACCESSIBLE
      Merge branch 'kvm-tdx-prep-1-truncated' into HEAD
      KVM: x86/mmu: Make kvm_mmu_do_page_fault() return mapped level
      KVM: x86: Implement kvm_arch_vcpu_pre_fault_memory()
      Merge branch 'kvm-prefault' into HEAD
      Merge tag 'kvm-riscv-6.11-1' of https://github.com/kvm-riscv/linux into HEAD
      Merge tag 'kvm-s390-next-6.11-1' of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD
      Merge tag 'loongarch-kvm-6.11' of git://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson into HEAD
      Merge tag 'kvmarm-6.11' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
      Merge tag 'kvm-x86-fixes-6.10-11' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-generic-6.11' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-misc-6.11' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-mmu-6.11' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-mtrrs-6.11' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-pmu-6.11' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-selftests-6.11' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-svm-6.11' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-vmx-6.11' of https://github.com/kvm-x86/linux into HEAD
      Merge branch 'kvm-6.11-sev-attestation' into HEAD

Parshuram Sangle (2):
      KVM: Enable halt polling shrink parameter by default
      KVM: Update halt polling documentation to note that KVM has 4 module params

Pei Li (1):
      KVM: Validate hva in kvm_gpc_activate_hva() to fix __kvm_gpc_refresh() WARN

Peng Hao (1):
      KVM: X86: Remove unnecessary GFP_KERNEL_ACCOUNT for temporary variables

Pierre-Clément Tosi (8):
      KVM: arm64: Fix clobbered ELR in sync abort/SError
      KVM: arm64: Fix __pkvm_init_switch_pgd call ABI
      KVM: arm64: nVHE: Simplify invalid_host_el2_vect
      KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32
      KVM: arm64: VHE: Mark __hyp_call_panic __noreturn
      arm64: Introduce esr_brk_comment, esr_is_cfi_brk
      KVM: arm64: Introduce print_nvhe_hyp_panic helper
      KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2

Ravi Bangoria (1):
      KVM: SNP: Fix LBR Virtualization for SNP guest

Reinette Chatre (1):
      KVM: selftests: Add guest udelay() utility for x86

Rick Edgecombe (2):
      KVM: x86/tdp_mmu: Rename REMOVED_SPTE to FROZEN_SPTE
      KVM: x86/tdp_mmu: Take a GFN in kvm_tdp_mmu_fast_pf_get_last_sptep()

Sean Christopherson (42):
      Revert "KVM: async_pf: avoid recursive flushing of work items"
      KVM: x86: Add a struct to consolidate host values, e.g. EFER, XCR0, etc...
      KVM: SVM: Use KVM's snapshot of the host's XCR0 for SEV-ES host state
      KVM: x86/mmu: Snapshot shadow_phys_bits when kvm.ko is loaded
      KVM: x86: Move shadow_phys_bits into "kvm_host", as "maxphyaddr"
      KVM: x86: Remove VMX support for virtualizing guest MTRR memtypes
      KVM: VMX: Drop support for forcing UC memory when guest CR0.CD=1
      KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
      KVM: x86/pmu: Squash period for checkpointed events based on host HLE/RTM
      KVM: x86: Apply Intel's TSC_AUX reserved-bit behavior to Intel compat vCPUs
      KVM: x86: Inhibit code #DBs in MOV-SS shadow for all Intel compat vCPUs
      KVM: x86: Use "is Intel compatible" helper to emulate SYSCALL in !64-bit
      KVM: SVM: Emulate SYSENTER RIP/RSP behavior for all Intel compat vCPUs
      KVM: x86: Allow SYSENTER in Compatibility Mode for all Intel compat vCPUs
      KVM: x86: Open code vendor_intel() in string_registers_quirk()
      KVM: x86: Bury guest_cpuid_is_amd_or_hygon() in cpuid.c
      KVM: x86/pmu: Add a helper to enable bits in FIXED_CTR_CTRL
      KVM: Add a flag to track if a loaded vCPU is scheduled out
      KVM: VMX: Move PLE grow/shrink helpers above vmx_vcpu_load()
      KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load()
      KVM: Delete the now unused kvm_arch_sched_in()
      KVM: x86: Unconditionally set l1tf_flush_l1d during vCPU load
      KVM: x86: Drop now-superflous setting of l1tf_flush_l1d in vcpu_run()
      KVM: x86/mmu: Rephrase comment about synthetic PFERR flags in #PF handler
      KVM: x86: Prevent excluding the BSP on setting max_vcpu_ids
      KVM: selftests: Print the seed for the guest pRNG iff it has changed
      KVM: selftests: Rework macros in PMU counters test to prep for multi-insn loop
      KVM: SVM: Force sev_es_host_save_area() to be inlined (for noinstr usage)
      KVM: SVM: Use sev_es_host_save_area() helper when initializing tsc_aux
      KVM: nVMX: Update VMCS12_REVISION comment to state it should never change
      KVM: VMX: Remove unnecessary INVEPT[GLOBAL] from hardware enable path
      KVM: nVMX: Add a helper to get highest pending from Posted Interrupt vector
      KVM: nVMX: Request immediate exit iff pending nested event needs injection
      KVM: VMX: Split out the non-virtualization part of vmx_interrupt_blocked()
      KVM: nVMX: Check for pending posted interrupts when looking for nested events
      KVM: nVMX: Fold requested virtual interrupt check into has_nested_events()
      KVM: x86: WARN if a vCPU gets a valid wakeup that KVM can't yet inject
      KVM: x86/mmu: Bump pf_taken stat only in the "real" page fault handler
      KVM: x86/mmu: Account pf_{fixed,emulate,spurious} in callers of "do page fault"
      KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE
      KVM: x86/mmu: Clean up make_huge_page_split_spte() definition and intro
      KVM: x86: Suppress MMIO that is triggered during task switch emulation

Sebastian Ene (4):
      KVM: arm64: Trap FFA_VERSION host call in pKVM
      KVM: arm64: Add support for FFA_PARTITION_INFO_GET
      KVM: arm64: Update the identification range for the FF-A smcs
      KVM: arm64: Use FF-A 1.1 with pKVM

Sebastian Ott (5):
      KVM: arm64: unify code to prepare traps
      KVM: arm64: Treat CTR_EL0 as a VM feature ID register
      KVM: arm64: show writable masks for feature registers
      KVM: arm64: rename functions for invariant sys regs
      KVM: selftests: arm64: Test writes to CTR_EL0

Shenlin Liang (2):
      RISCV: KVM: add tracepoints for entry and exit events
      perf kvm/riscv: Port perf kvm stat to RISC-V

Thomas Prescher (1):
      KVM: x86: Add KVM_RUN_X86_GUEST_MODE kvm_run flag

Tom Lendacky (2):
      KVM: SEV: Support SEV-SNP AP Creation NAE event
      KVM: SVM: Remove the need to trigger an UNBLOCK event on AP creation

Tony Luck (2):
      KVM: x86/pmu: Switch to new Intel CPU model defines
      KVM: VMX: Switch to new Intel CPU model infrastructure

Wei Wang (3):
      KVM: x86: Replace static_call_cond() with static_call()
      KVM: x86: Introduce kvm_x86_call() to simplify static calls of kvm_x86_ops
      KVM: x86/pmu: Add kvm_pmu_call() to simplify static calls of kvm_pmu_ops

Yan Zhao (2):
      srcu: Add an API for a memory barrier after SRCU read lock
      KVM: x86: Ensure a full memory barrier is emitted in the VM-Exit path

Yi Wang (3):
      KVM: Setup empty IRQ routing when creating a VM
      KVM: x86: Don't re-setup empty IRQ routing when KVM_CAP_SPLIT_IRQCHIP
      KVM: s390: Don't re-setup dummy routing when KVM_CREATE_IRQCHIP

Yu-Wei Hsu (1):
      RISC-V: KVM: Redirect AMO load/store access fault traps to guest

 Documentation/admin-guide/kernel-parameters.txt    |   24 +-
 Documentation/virt/coco/sev-guest.rst              |   19 +
 Documentation/virt/kvm/api.rst                     |  169 ++-
 Documentation/virt/kvm/devices/arm-vgic.rst        |    2 +-
 Documentation/virt/kvm/halt-polling.rst            |   12 +-
 .../virt/kvm/x86/amd-memory-encryption.rst         |  110 +-
 Documentation/virt/kvm/x86/errata.rst              |   18 +
 MAINTAINERS                                        |    2 +
 arch/arm64/include/asm/esr.h                       |   12 +
 arch/arm64/include/asm/kvm_arm.h                   |    1 -
 arch/arm64/include/asm/kvm_asm.h                   |    2 +
 arch/arm64/include/asm/kvm_emulate.h               |   95 +-
 arch/arm64/include/asm/kvm_host.h                  |   69 +-
 arch/arm64/include/asm/kvm_hyp.h                   |    4 +-
 arch/arm64/include/asm/kvm_mmu.h                   |   26 +
 arch/arm64/include/asm/kvm_nested.h                |  131 +-
 arch/arm64/include/asm/sysreg.h                    |   17 +
 arch/arm64/kernel/asm-offsets.c                    |    1 +
 arch/arm64/kernel/debug-monitors.c                 |    4 +-
 arch/arm64/kernel/traps.c                          |    8 +-
 arch/arm64/kvm/arm.c                               |   88 +-
 arch/arm64/kvm/emulate-nested.c                    |  104 ++
 arch/arm64/kvm/fpsimd.c                            |   19 +-
 arch/arm64/kvm/handle_exit.c                       |   43 +-
 arch/arm64/kvm/hyp/entry.S                         |    8 +
 arch/arm64/kvm/hyp/include/hyp/switch.h            |   29 +-
 arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h         |   35 +-
 arch/arm64/kvm/hyp/include/nvhe/ffa.h              |    2 +-
 arch/arm64/kvm/hyp/nvhe/Makefile                   |    6 +-
 arch/arm64/kvm/hyp/nvhe/ffa.c                      |  286 ++--
 arch/arm64/kvm/hyp/nvhe/gen-hyprel.c               |    6 +
 arch/arm64/kvm/hyp/nvhe/host.S                     |    6 -
 arch/arm64/kvm/hyp/nvhe/hyp-init.S                 |   30 +-
 arch/arm64/kvm/hyp/nvhe/setup.c                    |    4 +-
 arch/arm64/kvm/hyp/vhe/switch.c                    |  202 ++-
 arch/arm64/kvm/hyp/vhe/tlb.c                       |  147 ++
 arch/arm64/kvm/mmu.c                               |  213 ++-
 arch/arm64/kvm/nested.c                            | 1024 +++++++++++--
 arch/arm64/kvm/pmu-emul.c                          |    2 +-
 arch/arm64/kvm/reset.c                             |    6 +
 arch/arm64/kvm/sys_regs.c                          |  593 +++++++-
 arch/loongarch/Kconfig                             |   11 +
 arch/loongarch/include/asm/kvm_host.h              |   14 +-
 arch/loongarch/include/asm/kvm_para.h              |   11 +
 arch/loongarch/include/asm/kvm_vcpu.h              |    5 +
 arch/loongarch/include/asm/loongarch.h             |    1 +
 arch/loongarch/include/asm/paravirt.h              |    5 +
 arch/loongarch/include/uapi/asm/kvm.h              |    4 +
 arch/loongarch/kernel/paravirt.c                   |  145 ++
 arch/loongarch/kernel/time.c                       |    2 +
 arch/loongarch/kvm/Kconfig                         |    1 +
 arch/loongarch/kvm/exit.c                          |   38 +-
 arch/loongarch/kvm/main.c                          |    1 +
 arch/loongarch/kvm/mmu.c                           |   72 +-
 arch/loongarch/kvm/tlb.c                           |    5 +-
 arch/loongarch/kvm/vcpu.c                          |  156 +-
 arch/mips/include/asm/kvm_host.h                   |    1 -
 arch/mips/kvm/mips.c                               |    2 +-
 arch/powerpc/include/asm/kvm_host.h                |    1 -
 arch/powerpc/kvm/powerpc.c                         |    2 +-
 arch/riscv/include/asm/kvm_aia_aplic.h             |   58 -
 arch/riscv/include/asm/kvm_aia_imsic.h             |   38 -
 arch/riscv/include/asm/kvm_host.h                  |    1 -
 arch/riscv/kvm/aia.c                               |   35 +-
 arch/riscv/kvm/aia_aplic.c                         |    2 +-
 arch/riscv/kvm/aia_device.c                        |    2 +-
 arch/riscv/kvm/aia_imsic.c                         |    2 +-
 arch/riscv/kvm/trace.h                             |   67 +
 arch/riscv/kvm/vcpu.c                              |    9 +-
 arch/riscv/kvm/vcpu_exit.c                         |    2 +
 arch/s390/include/asm/kvm_host.h                   |    2 -
 arch/s390/kvm/kvm-s390.c                           |   14 +-
 arch/s390/kvm/vsie.c                               |   24 +-
 arch/x86/include/asm/kvm-x86-ops.h                 |    8 +-
 arch/x86/include/asm/kvm-x86-pmu-ops.h             |    3 +-
 arch/x86/include/asm/kvm_host.h                    |   90 +-
 arch/x86/include/asm/sev-common.h                  |   25 +
 arch/x86/include/asm/sev.h                         |   51 +
 arch/x86/include/asm/svm.h                         |    9 +-
 arch/x86/include/uapi/asm/kvm.h                    |   49 +
 arch/x86/kvm/Kconfig                               |    4 +
 arch/x86/kvm/cpuid.c                               |   14 +-
 arch/x86/kvm/cpuid.h                               |   18 -
 arch/x86/kvm/emulate.c                             |   71 +-
 arch/x86/kvm/hyperv.c                              |    9 +-
 arch/x86/kvm/irq.c                                 |    2 +-
 arch/x86/kvm/irq.h                                 |    1 -
 arch/x86/kvm/irq_comm.c                            |    7 -
 arch/x86/kvm/kvm_cache_regs.h                      |   10 +-
 arch/x86/kvm/kvm_emulate.h                         |    1 +
 arch/x86/kvm/lapic.c                               |   48 +-
 arch/x86/kvm/lapic.h                               |    5 +-
 arch/x86/kvm/mmu.h                                 |   42 +-
 arch/x86/kvm/mmu/mmu.c                             |  206 ++-
 arch/x86/kvm/mmu/mmu_internal.h                    |   26 +-
 arch/x86/kvm/mmu/paging_tmpl.h                     |    3 +-
 arch/x86/kvm/mmu/spte.c                            |   46 +-
 arch/x86/kvm/mmu/spte.h                            |   10 +-
 arch/x86/kvm/mmu/tdp_mmu.c                         |  136 +-
 arch/x86/kvm/mmu/tdp_mmu.h                         |    2 +-
 arch/x86/kvm/mtrr.c                                |  644 +-------
 arch/x86/kvm/pmu.c                                 |   73 +-
 arch/x86/kvm/pmu.h                                 |   10 +-
 arch/x86/kvm/smm.c                                 |   44 +-
 arch/x86/kvm/svm/nested.c                          |    2 +-
 arch/x86/kvm/svm/pmu.c                             |   11 +-
 arch/x86/kvm/svm/sev.c                             | 1564 +++++++++++++++++++-
 arch/x86/kvm/svm/svm.c                             |   78 +-
 arch/x86/kvm/svm/svm.h                             |   70 +-
 arch/x86/kvm/trace.h                               |   55 +-
 arch/x86/kvm/vmx/main.c                            |    5 +-
 arch/x86/kvm/vmx/nested.c                          |   55 +-
 arch/x86/kvm/vmx/pmu_intel.c                       |   52 +-
 arch/x86/kvm/vmx/posted_intr.h                     |   10 +
 arch/x86/kvm/vmx/vmcs12.h                          |   14 +-
 arch/x86/kvm/vmx/vmx.c                             |  205 ++-
 arch/x86/kvm/vmx/vmx.h                             |    3 +-
 arch/x86/kvm/vmx/x86_ops.h                         |    4 -
 arch/x86/kvm/x86.c                                 |  567 +++----
 arch/x86/kvm/x86.h                                 |   25 +-
 arch/x86/kvm/xen.c                                 |    6 +-
 drivers/crypto/ccp/sev-dev.c                       |   36 +
 drivers/virt/coco/sev-guest/sev-guest.c            |    2 -
 drivers/virt/coco/sev-guest/sev-guest.h            |   63 -
 include/linux/arm_ffa.h                            |    3 +
 include/linux/kvm_host.h                           |   53 +-
 include/linux/pagemap.h                            |   13 +-
 include/linux/psp-sev.h                            |    4 +-
 include/linux/srcu.h                               |   14 +
 include/uapi/linux/kvm.h                           |   27 +-
 include/uapi/linux/psp-sev.h                       |   27 +
 include/uapi/linux/sev-guest.h                     |    3 +
 mm/compaction.c                                    |   12 +-
 mm/migrate.c                                       |    2 +-
 mm/truncate.c                                      |    3 +-
 tools/include/uapi/linux/kvm.h                     |   10 +
 tools/perf/arch/loongarch/Makefile                 |    1 +
 tools/perf/arch/loongarch/util/Build               |    2 +
 tools/perf/arch/loongarch/util/header.c            |   96 ++
 tools/perf/arch/loongarch/util/kvm-stat.c          |  139 ++
 tools/perf/arch/riscv/Makefile                     |    1 +
 tools/perf/arch/riscv/util/Build                   |    1 +
 tools/perf/arch/riscv/util/kvm-stat.c              |   78 +
 tools/perf/arch/riscv/util/riscv_exception_types.h |   35 +
 tools/testing/selftests/kvm/Makefile               |    2 +
 tools/testing/selftests/kvm/aarch64/set_id_regs.c  |   17 +
 tools/testing/selftests/kvm/include/x86_64/apic.h  |    8 +
 .../selftests/kvm/include/x86_64/processor.h       |   18 +
 tools/testing/selftests/kvm/lib/kvm_util.c         |    9 +-
 tools/testing/selftests/kvm/lib/x86_64/processor.c |   11 +
 .../kvm/memslot_modification_stress_test.c         |    6 -
 .../testing/selftests/kvm/pre_fault_memory_test.c  |  146 ++
 .../selftests/kvm/x86_64/apic_bus_clock_test.c     |  194 +++
 .../selftests/kvm/x86_64/max_vcpuid_cap_test.c     |   22 +-
 .../selftests/kvm/x86_64/pmu_counters_test.c       |   44 +-
 .../selftests/kvm/x86_64/pmu_event_filter_test.c   |   35 +-
 .../testing/selftests/kvm/x86_64/set_boot_cpu_id.c |   16 +
 virt/kvm/Kconfig                                   |   11 +
 virt/kvm/async_pf.c                                |   13 +-
 virt/kvm/guest_memfd.c                             |  176 ++-
 virt/kvm/irqchip.c                                 |   24 +
 virt/kvm/kvm_main.c                                |  106 +-
 virt/kvm/pfncache.c                                |    3 +
 163 files changed, 7813 insertions(+), 2378 deletions(-)
 delete mode 100644 arch/riscv/include/asm/kvm_aia_aplic.h
 delete mode 100644 arch/riscv/include/asm/kvm_aia_imsic.h
 create mode 100644 arch/riscv/kvm/trace.h
 delete mode 100644 drivers/virt/coco/sev-guest/sev-guest.h
 create mode 100644 tools/perf/arch/loongarch/util/header.c
 create mode 100644 tools/perf/arch/loongarch/util/kvm-stat.c
 create mode 100644 tools/perf/arch/riscv/util/kvm-stat.c
 create mode 100644 tools/perf/arch/riscv/util/riscv_exception_types.h
 create mode 100644 tools/testing/selftests/kvm/pre_fault_memory_test.c
 create mode 100644 tools/testing/selftests/kvm/x86_64/apic_bus_clock_test.c


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ