lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250117010718.2328467-5-seanjc@google.com>
Date: Thu, 16 Jan 2025 17:07:15 -0800
From: Sean Christopherson <seanjc@...gle.com>
To: Paolo Bonzini <pbonzini@...hat.com>
Cc: kvm@...r.kernel.org, linux-kernel@...r.kernel.org, 
	Sean Christopherson <seanjc@...gle.com>
Subject: [GIT PULL] KVM: Selftests changes for 6.14

FYI, the "LLC references/misses" patch exposed a latent failure on SKX/CLX/CPL[*]
(who's brilliant idea was it to use "CPL" for a CPU code name on x86?).  Dapeng
is following up with the uarch folks to understand what's going on.  If -rc1 is
immiment and we don't have a fix, my plan is to have the test only assert that
the count is non-zero, and then go with a more precise fix if one arises.

[*] https://lore.kernel.org/all/202501141009.30c629b4-lkp@intel.com

The following changes since commit 10b2c8a67c4b8ec15f9d07d177f63b563418e948:

  Merge tag 'kvm-x86-fixes-6.13-rcN' of https://github.com/kvm-x86/linux into HEAD (2024-12-22 12:59:33 -0500)

are available in the Git repository at:

  https://github.com/kvm-x86/linux.git tags/kvm-x86-selftests-6.14

for you to fetch changes up to 983820cb53c0e796777caf85bfc2810ad0c8fb22:

  KVM: selftests: Add helpers for locally (un)blocking IRQs on x86 (2025-01-08 12:57:03 -0800)

----------------------------------------------------------------
KVM selftests changes for 6.14:

 - Misc cleanups and prep work.

 - Annotate _no_printf() with "printf" so that pr_debug() statements are
   checked by the compiler for default builds (and pr_info() when QUIET).

 - Attempt to whack the last LLC references/misses mole in the Intel PMU
   counters test by adding a data load and doing CLFLUSH{OPT} on the data
   instead of the code being executed.  The theory is that modern Intel CPUs
   have learned new code prefetching tricks that bypass the PMU counters.

----------------------------------------------------------------
Chen Ni (1):
      KVM: selftests: Remove unneeded semicolon

Colton Lewis (2):
      KVM: selftests: Fix typos in x86's PMU counter test's macro variable use
      KVM: selftests: Add defines for AMD PMU CPUID features and properties

Isaku Yamahata (1):
      KVM: selftests: Add printf attribute to _no_printf()

Sean Christopherson (2):
      KVM: selftests: Use data load to trigger LLC references/misses in Intel PMU
      KVM: selftests: Add helpers for locally (un)blocking IRQs on x86

 .../selftests/kvm/access_tracking_perf_test.c      |  2 +-
 tools/testing/selftests/kvm/include/test_util.h    |  2 +-
 .../testing/selftests/kvm/include/x86/processor.h  | 47 ++++++++++++++++++++++
 tools/testing/selftests/kvm/x86/hyperv_ipi.c       |  6 ++-
 .../testing/selftests/kvm/x86/pmu_counters_test.c  | 15 +++----
 tools/testing/selftests/kvm/x86/svm_int_ctl_test.c |  5 +--
 .../selftests/kvm/x86/ucna_injection_test.c        |  2 +-
 tools/testing/selftests/kvm/x86/xapic_ipi_test.c   |  3 +-
 tools/testing/selftests/kvm/x86/xapic_state_test.c |  4 +-
 tools/testing/selftests/kvm/x86/xen_shinfo_test.c  |  5 +--
 10 files changed, 68 insertions(+), 23 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ