lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20251204180619.33800-1-pbonzini@redhat.com>
Date: Thu,  4 Dec 2025 19:06:19 +0100
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org,
	kvm@...r.kernel.org
Subject: [GIT PULL] KVM changes for Linux 6.19-rc1

Linus,

The following changes since commit ac3fd01e4c1efce8f2c054cdeb2ddd2fc0fb150d:

  Linux 6.18-rc7 (2025-11-23 14:53:16 -0800)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to e0c26d47def7382d7dbd9cad58bc653aed75737a:

  Merge tag 'kvm-s390-next-6.19-1' of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD (2025-12-02 18:58:47 +0100)

A fairly small release, with several nice cleanups and bugfixes; the main
major feature is NUMA support in guest_memfd.

There's only a minor conflict with the tip tree, due to different features
being added to the Linux-defined words of arch/x86/include/asm/cpufeatures.h.

Thanks,

Paolo
----------------------------------------------------------------
ARM:

- Support for userspace handling of synchronous external aborts (SEAs),
  allowing the VMM to potentially handle the abort in a non-fatal
  manner.

- Large rework of the VGIC's list register handling with the goal of
  supporting more active/pending IRQs than available list registers in
  hardware. In addition, the VGIC now supports EOImode==1 style
  deactivations for IRQs which may occur on a separate vCPU than the
  one that acked the IRQ.

- Support for FEAT_XNX (user / privileged execute permissions) and
  FEAT_HAF (hardware update to the Access Flag) in the software page
  table walkers and shadow MMU.

- Allow page table destruction to reschedule, fixing long need_resched
  latencies observed when destroying a large VM.

- Minor fixes to KVM and selftests

Loongarch:

- Get VM PMU capability from HW GCFG register.

- Add AVEC basic support.

- Use 64-bit register definition for EIOINTC.

- Add KVM timer test cases for tools/selftests.

RISC/V:

- SBI message passing (MPXY) support for KVM guest

- Give a new, more specific error subcode for the case when in-kernel
  AIA virtualization fails to allocate IMSIC VS-file

- Support KVM_DIRTY_LOG_INITIALLY_SET, enabling dirty log gradually
  in small chunks

- Fix guest page fault within HLV* instructions

- Flush VS-stage TLB after VCPU migration for Andes cores

s390:

- Always allocate ESCA (Extended System Control Area), instead of
  starting with the basic SCA and converting to ESCA with the
  addition of the 65th vCPU.  The price is increased number of
  exits (and worse performance) on z10 and earlier processor;
  ESCA was introduced by z114/z196 in 2010.

- VIRT_XFER_TO_GUEST_WORK support

- Operation exception forwarding support

- Cleanups

x86:

- Skip the costly "zap all SPTEs" on an MMIO generation wrap if MMIO SPTE
  caching is disabled, as there can't be any relevant SPTEs to zap.

- Relocate a misplaced export.

- Fix an async #PF bug where KVM would clear the completion queue when the
  guest transitioned in and out of paging mode, e.g. when handling an SMI and
  then returning to paged mode via RSM.

- Leave KVM's user-return notifier registered even when disabling
  virtualization, as long as kvm.ko is loaded.  On reboot/shutdown, keeping
  the notifier registered is ok; the kernel does not use the MSRs and the
  callback will run cleanly and restore host MSRs if the CPU manages to
  return to userspace before the system goes down.

- Use the checked version of {get,put}_user().

- Fix a long-lurking bug where KVM's lack of catch-up logic for periodic APIC
  timers can result in a hard lockup in the host.

- Revert the periodic kvmclock sync logic now that KVM doesn't use a
  clocksource that's subject to NTP corrections.

- Clean up KVM's handling of MMIO Stale Data and L1TF, and bury the latter
  behind CONFIG_CPU_MITIGATIONS.

- Context switch XCR0, XSS, and PKRU outside of the entry/exit fast path;
  the only reason they were handled in the fast path was to paper of a bug
  in the core #MC code, and that has long since been fixed.

- Add emulator support for AVX MOV instructions, to play nice with emulated
  devices whose guest drivers like to access PCI BARs with large multi-byte
  instructions.

x86 (AMD):

- Fix a few missing "VMCB dirty" bugs.

- Fix the worst of KVM's lack of EFER.LMSLE emulation.

- Add AVIC support for addressing 4k vCPUs in x2AVIC mode.

- Fix incorrect handling of selective CR0 writes when checking intercepts
  during emulation of L2 instructions.

- Fix a currently-benign bug where KVM would clobber SPEC_CTRL[63:32] on
  VMRUN and #VMEXIT.

- Fix a bug where KVM corrupt the guest code stream when re-injecting a soft
  interrupt if the guest patched the underlying code after the VM-Exit, e.g.
  when Linux patches code with a temporary INT3.

- Add KVM_X86_SNP_POLICY_BITS to advertise supported SNP policy bits to
  userspace, and extend KVM "support" to all policy bits that don't require
  any actual support from KVM.

x86 (Intel):

- Use the root role from kvm_mmu_page to construct EPTPs instead of the
  current vCPU state, partly as worthwhile cleanup, but mostly to pave the
  way for tracking per-root TLB flushes, and elide EPT flushes on pCPU
  migration if the root is clean from a previous flush.

- Add a few missing nested consistency checks.

- Rip out support for doing "early" consistency checks via hardware as the
  functionality hasn't been used in years and is no longer useful in general;
  replace it with an off-by-default module param to WARN if hardware fails
  a check that KVM does not perform.

- Fix a currently-benign bug where KVM would drop the guest's SPEC_CTRL[63:32]
  on VM-Enter.

- Misc cleanups.

- Overhaul the TDX code to address systemic races where KVM (acting on behalf
  of userspace) could inadvertantly trigger lock contention in the TDX-Module;
  KVM was either working around these in weird, ugly ways, or was simply
  oblivious to them (though even Yan's devilish selftests could only break
  individual VMs, not the host kernel)

- Fix a bug where KVM could corrupt a vCPU's cpu_list when freeing a TDX vCPU,
  if creating said vCPU failed partway through.

- Fix a few sparse warnings (bad annotation, 0 != NULL).

- Use struct_size() to simplify copying TDX capabilities to userspace.

- Fix a bug where TDX would effectively corrupt user-return MSR values if the
  TDX Module rejects VP.ENTER and thus doesn't clobber host MSRs as expected.

Selftests:

- Fix a math goof in mmu_stress_test when running on a single-CPU system/VM.

- Forcefully override ARCH from x86_64 to x86 to play nice with specifying
  ARCH=x86_64 on the command line.

- Extend a bunch of nested VMX to validate nested SVM as well.

- Add support for LA57 in the core VM_MODE_xxx macro, and add a test to
  verify KVM can save/restore nested VMX state when L1 is using 5-level
  paging, but L2 is not.

- Clean up the guest paging code in anticipation of sharing the core logic for
  nested EPT and nested NPT.

guest_memfd:

- Add NUMA mempolicy support for guest_memfd, and clean up a variety of
  rough edges in guest_memfd along the way.

- Define a CLASS to automatically handle get+put when grabbing a guest_memfd
  from a memslot to make it harder to leak references.

- Enhance KVM selftests to make it easer to develop and debug selftests like
  those added for guest_memfd NUMA support, e.g. where test and/or KVM bugs
  often result in hard-to-debug SIGBUS errors.

- Misc cleanups.

Generic:

- Use the recently-added WQ_PERCPU when creating the per-CPU workqueue for
  irqfd cleanup.

- Fix a goof in the dirty ring documentation.

- Fix choice of target for directed yield across different calls to
  kvm_vcpu_on_spin(); the function was always starting from the first
  vCPU instead of continuing the round-robin search.

----------------------------------------------------------------
Ackerley Tng (1):
      KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes

Alexandru Elisei (3):
      KVM: arm64: Document KVM_PGTABLE_PROT_{UX,PX}
      KVM: arm64: at: Use correct HA bit in TCR_EL2 when regime is EL2
      KVM: arm64: at: Update AF on software walk only if VM has FEAT_HAFDBS

Andrew Donnellan (2):
      KVM: s390: Add signal_exits counter
      KVM: s390: Use generic VIRT_XFER_TO_GUEST_WORK functions

Anup Patel (4):
      RISC-V: KVM: Convert kvm_riscv_vcpu_sbi_forward() into extension handler
      RISC-V: KVM: Add separate source for forwarded SBI extensions
      RISC-V: KVM: Add SBI MPXY extension support for Guest
      KVM: riscv: selftests: Add SBI MPXY extension to get-reg-list

Bibo Mao (8):
      LoongArch: KVM: Get VM PMU capability from HW GCFG register
      LoongArch: KVM: Use 64-bit register definition for EIOINTC
      KVM: LoongArch: selftests: Add system registers save/restore on exception
      KVM: LoongArch: selftests: Add basic interfaces
      KVM: LoongArch: selftests: Add exception handler register interface
      KVM: LoongArch: selftests: Add timer interrupt test case
      KVM: LoongArch: selftests: Add SW emulated timer test case
      KVM: LoongArch: selftests: Add time counter test case

BillXiang (1):
      RISC-V: KVM: Introduce KVM_EXIT_FAIL_ENTRY_NO_VSFILE

Binbin Wu (1):
      KVM: x86: Add a helper to dedup loading guest/host XCR0 and XSS

Brendan Jackman (2):
      KVM: selftests: Don't fall over in mmu_stress_test when only one CPU is present
      KVM: x86: Unify L1TF flushing under per-CPU variable

Chang S. Bae (1):
      KVM: x86: Refactor REX prefix handling in instruction emulation

Chao Gao (1):
      KVM: x86: Allocate/free user_return_msrs at kvm.ko (un)loading time

Christoph Schlameuss (2):
      KVM: s390: Use ESCA instead of BSCA at VM init
      KVM: S390: Remove sca_lock

Colin Ian King (1):
      KVM: arm64: Fix spelling mistake "Unexpeced" -> "Unexpected"

Dave Hansen (2):
      KVM: TDX: Remove __user annotation from kernel pointer
      KVM: TDX: Fix sparse warnings from using 0 for NULL

Dmytro Maluka (2):
      KVM: x86/mmu: Skip MMIO SPTE invalidation if enable_mmio_caching=0
      KVM: VMX: Remove stale vmx_set_dr6() declaration

Dong Yang (1):
      KVM: riscv: Support enabling dirty log gradually in small chunks

Eric Farman (1):
      KVM: s390: vsie: Check alignment of BSCA header

Fangyu Yu (1):
      RISC-V: KVM: Fix guest page fault within HLV* instructions

Heiko Carstens (1):
      KVM: s390: Enable and disable interrupts in entry code

Hou Wenlong (1):
      KVM: x86: Don't disable IRQs when unregistering user-return notifier

Hui Min Mina Chou (1):
      RISC-V: KVM: Flush VS-stage TLB after VCPU migration for Andes cores

Janosch Frank (2):
      Documentation: kvm: Fix ordering
      KVM: s390: Add capability that forwards operation exceptions

Jiaqi Yan (3):
      KVM: arm64: VM exit to userspace to handle SEA
      KVM: selftests: Test for KVM_EXIT_ARM_SEA
      Documentation: kvm: new UAPI for handling SEA

Jim Mattson (8):
      KVM: SVM: Mark VMCB_PERM_MAP as dirty on nested VMRUN
      KVM: SVM: Mark VMCB_NPT as dirty on nested VMRUN
      KVM: x86: Advertise EferLmsleUnsupported to userspace
      KVM: SVM: Disallow EFER.LMSLE when not supported by hardware
      KVM: selftests: Use a loop to create guest page tables
      KVM: selftests: Use a loop to walk guest page tables
      KVM: selftests: Change VM_MODE_PXXV48_4K to VM_MODE_PXXVYY_4K
      KVM: selftests: Add a VMX test for LA57 nested state

Josephine Pfeiffer (1):
      KVM: s390: Replace sprintf with snprintf for buffer safety

Kai Huang (1):
      KVM: x86/mmu: Move the misplaced export of kvm_zap_gfn_range()

Lei Chen (3):
      Revert "x86: kvm: introduce periodic global clock updates"
      Revert "x86: kvm: rate-limit global clock updates"
      KVM: x86: remove comment about ntp correction sync for

Leonardo Bras (1):
      KVM: Fix VM exit code for full dirty ring in API documentation

Marc Zyngier (51):
      irqchip/gic: Add missing GICH_HCR control bits
      irqchip/gic: Expose CPU interface VA to KVM
      irqchip/apple-aic: Spit out ICH_MISR_EL2 value on spurious vGIC MI
      KVM: arm64: Turn vgic-v3 errata traps into a patched-in constant
      KVM: arm64: vgic-v3: Fix GICv3 trapping in protected mode
      KVM: arm64: GICv3: Detect and work around the lack of ICV_DIR_EL1 trapping
      KVM: arm64: Repack struct vgic_irq fields
      KVM: arm64: Add tracking of vgic_irq being present in a LR
      KVM: arm64: Add LR overflow handling documentation
      KVM: arm64: GICv3: Drop LPI active state when folding LRs
      KVM: arm64: GICv3: Preserve EOIcount on exit
      KVM: arm64: GICv3: Decouple ICH_HCR_EL2 programming from LRs
      KVM: arm64: GICv3: Extract LR folding primitive
      KVM: arm64: GICv3: Extract LR computing primitive
      KVM: arm64: GICv2: Preserve EOIcount on exit
      KVM: arm64: GICv2: Decouple GICH_HCR programming from LRs being loaded
      KVM: arm64: GICv2: Extract LR folding primitive
      KVM: arm64: GICv2: Extract LR computing primitive
      KVM: arm64: Compute vgic state irrespective of the number of interrupts
      KVM: arm64: Eagerly save VMCR on exit
      KVM: arm64: Revamp vgic maintenance interrupt configuration
      KVM: arm64: Turn kvm_vgic_vcpu_enable() into kvm_vgic_vcpu_reset()
      KVM: arm64: Make vgic_target_oracle() globally available
      KVM: arm64: Invert ap_list sorting to push active interrupts out
      KVM: arm64: Move undeliverable interrupts to the end of ap_list
      KVM: arm64: Use MI to detect groups being enabled/disabled
      KVM: arm64: GICv3: Handle LR overflow when EOImode==0
      KVM: arm64: GICv3: Handle deactivation via ICV_DIR_EL1 traps
      KVM: arm64: GICv3: Add GICv2 SGI handling to deactivation primitive
      KVM: arm64: GICv3: Set ICH_HCR_EL2.TDIR when interrupts overflow LR capacity
      KVM: arm64: GICv3: Add SPI tracking to handle asymmetric deactivation
      KVM: arm64: GICv3: Handle in-LR deactivation when possible
      KVM: arm64: GICv3: Avoid broadcast kick on CPUs lacking TDIR
      KVM: arm64: GICv3: nv: Resync LRs/VMCR/HCR early for better MI emulation
      KVM: arm64: GICv3: nv: Plug L1 LR sync into deactivation primitive
      KVM: arm64: GICv3: Force exit to sync ICH_HCR_EL2.En
      KVM: arm64: GICv2: Handle LR overflow when EOImode==0
      KVM: arm64: GICv2: Handle deactivation via GICV_DIR traps
      KVM: arm64: GICv2: Always trap GICV_DIR register
      KVM: arm64: selftests: gic_v3: Add irq group setting helper
      KVM: arm64: selftests: gic_v3: Disable Group-0 interrupts by default
      KVM: arm64: selftests: vgic_irq: Fix GUEST_ASSERT_IAR_EMPTY() helper
      KVM: arm64: selftests: vgic_irq: Change configuration before enabling interrupt
      KVM: arm64: selftests: vgic_irq: Exclude timer-controlled interrupts
      KVM: arm64: selftests: vgic_irq: Remove LR-bound limitation
      KVM: arm64: selftests: vgic_irq: Perform EOImode==1 deactivation in ack order
      KVM: arm64: selftests: vgic_irq: Add asymmetric SPI deaectivation test
      KVM: arm64: selftests: vgic_irq: Add Group-0 enable test
      KVM: arm64: selftests: vgic_irq: Add timer deactivation test
      KVM: arm64: Convert ICH_HCR_EL2_TDIR cap to EARLY_LOCAL_CPU_FEATURE
      KVM: arm64: Add endian casting to kvm_swap_s[12]_desc()

Marco Crivellari (1):
      KVM: Explicitly allocate/setup irqfd cleanup as per-CPU workqueue

Matthew Wilcox (2):
      mm/filemap: Add NUMA mempolicy support to filemap_alloc_folio()
      mm/filemap: Extend __filemap_get_folio() to support NUMA memory policies

Maxim Levitsky (2):
      KVM: x86: Fix a semi theoretical bug in kvm_arch_async_page_present_queued()
      KVM: x86: Don't clear async #PF queue when CR0.PG is disabled (e.g. on #SMI)

Maximilian Dittgen (2):
      KVM: selftests: Assert GICR_TYPER.Processor_Number matches selftest CPU number
      KVM: selftests: SYNC after guest ITS setup in vgic_lpi_stress

Nathan Chancellor (1):
      KVM: arm64: Add break to default case in kvm_pgtable_stage2_pte_prot()

Naveen N Rao (7):
      KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids
      KVM: SVM: Add a helper to look up the max physical ID for AVIC
      KVM: SVM: Replace hard-coded value 0x1FF with the corresponding macro
      KVM: SVM: Expand AVIC_PHYSICAL_MAX_INDEX_MASK to be a 12-bit field
      KVM: SVM: Move AVIC Physical ID table allocation to vcpu_precreate()
      x86/cpufeatures: Add X86_FEATURE_X2AVIC_EXT
      KVM: SVM: Add AVIC support for 4k vCPUs in x2AVIC mode

Oliver Upton (23):
      KVM: arm64: Drop useless __GFP_HIGHMEM from kvm struct allocation
      KVM: arm64: Use kvzalloc() for kvm struct allocation
      KVM: arm64: Only drop references on empty tables in stage2_free_walker
      arm64: Detect FEAT_XNX
      KVM: arm64: Add support for FEAT_XNX stage-2 permissions
      KVM: arm64: nv: Forward FEAT_XNX permissions to the shadow stage-2
      KVM: arm64: Teach ptdump about FEAT_XNX permissions
      KVM: arm64: nv: Advertise support for FEAT_XNX
      KVM: arm64: Call helper for reading descriptors directly
      KVM: arm64: nv: Stop passing vCPU through void ptr in S2 PTW
      KVM: arm64: Handle endianness in read helper for emulated PTW
      KVM: arm64: nv: Use pgtable definitions in stage-2 walk
      KVM: arm64: Add helper for swapping guest descriptor
      KVM: arm64: Propagate PTW errors up to AT emulation
      KVM: arm64: Implement HW access flag management in stage-1 SW PTW
      KVM: arm64: nv: Implement HW access flag management in stage-2 SW PTW
      KVM: arm64: nv: Expose hardware access flag management to NV guests
      KVM: arm64: selftests: Add test for AT emulation
      KVM: arm64: Fix compilation when CONFIG_ARM64_USE_LSE_ATOMICS=n
      Merge branch 'kvm-arm64/misc' into kvmarm/next
      Merge branch 'kvm-arm64/sea-user' into kvmarm/next
      Merge branch 'kvm-arm64/vgic-lr-overflow' into kvmarm/next
      Merge branch 'kvm-arm64/nv-xnx-haf' into kvmarm/next

Omar Sandoval (1):
      KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced

Paolo Bonzini (21):
      KVM: x86: Add support for emulating MOVNTDQA
      KVM: x86: Move Src2Shift up one bit (use bits 36:32 for Src2 in the emulator)
      KVM: x86: Improve formatting of the emulator's flags table
      KVM: x86: Move op_prefix to struct x86_emulate_ctxt (from x86_decode_insn())
      KVM: x86: Share emulator's common register decoding code
      KVM: x86: Add x86_emulate_ops.get_xcr() callback
      KVM: x86: Add AVX support to the emulator's register fetch and writeback
      KVM: x86: Add emulator support for decoding VEX prefixes
      KVM: x86: Enable support for emulating AVX MOV instructions
      Merge tag 'kvm-x86-generic-6.19' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-gmem-6.19' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-misc-6.19' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-selftests-6.19' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-mmu-6.19' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-tdx-6.19' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-vmx-6.19' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'kvm-x86-svm-6.19' of https://github.com/kvm-x86/linux into HEAD
      Merge tag 'loongarch-kvm-6.19' of git://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson into HEAD
      Merge tag 'kvm-riscv-6.19-1' of https://github.com/kvm-riscv/linux into HEAD
      Merge tag 'kvmarm-6.19' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
      Merge tag 'kvm-s390-next-6.19-1' of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD

Pawan Gupta (1):
      x86/bugs: Use VM_CLEAR_CPU_BUFFERS in VMX as well

Pedro Demarchi Gomes (1):
      KVM: guest_memfd: use folio_nr_pages() instead of shift operation

Raghavendra Rao Ananta (2):
      KVM: arm64: Split kvm_pgtable_stage2_destroy()
      KVM: arm64: Reschedule as needed when destroying the stage-2 page-tables

Rick Edgecombe (1):
      KVM: TDX: Take MMU lock around tdh_vp_init()

Sean Christopherson (67):
      KVM: VMX: Hoist construct_eptp() "up" in vmx.c
      KVM: nVMX: Hardcode dummy EPTP used for early nested consistency checks
      KVM: x86/mmu: Move "dummy root" helpers to spte.h
      KVM: VMX: Use kvm_mmu_page role to construct EPTP, not current vCPU state
      KVM: nVMX: Add consistency check for TPR_THRESHOLD[31:4]!=0 without VID
      KVM: nVMX: Add consistency check for TSC_MULTIPLIER=0
      KVM: nVMX: Stuff vmcs02.TSC_MULTIPLIER early on for nested early checks
      KVM: nVMX: Remove support for "early" consistency checks via hardware
      KVM: nVMX: Add an off-by-default module param to WARN on missed consistency checks
      KVM: guest_memfd: Drop a superfluous local var in kvm_gmem_fault_user_mapping()
      KVM: guest_memfd: Rename "struct kvm_gmem" to "struct gmem_file"
      KVM: guest_memfd: Add macro to iterate over gmem_files for a mapping/inode
      KVM: selftests: Define wrappers for common syscalls to assert success
      KVM: selftests: Report stacktraces SIGBUS, SIGSEGV, SIGILL, and SIGFPE by default
      KVM: selftests: Add additional equivalents to libnuma APIs in KVM's numaif.h
      KVM: selftests: Use proper uAPI headers to pick up mempolicy.h definitions
      KVM: guest_memfd: Add gmem_inode.flags field instead of using i_private
      KVM: guest_memfd: Define a CLASS to get+put guest_memfd file from a memslot
      KVM: selftests: Forcefully override ARCH from x86_64 to x86
      KVM: selftests: Use "gpa" and "gva" for local variable names in pre-fault test
      KVM: selftests: Rename "guest_paddr" variables to "gpa"
      KVM: x86: Add a helper to dedup reporting of unhandled VM-Exits
      KVM: Make support for kvm_arch_vcpu_async_ioctl() mandatory
      KVM: Rename kvm_arch_vcpu_async_ioctl() to kvm_arch_vcpu_unlocked_ioctl()
      KVM: TDX: Drop PROVE_MMU=y sanity check on to-be-populated mappings
      KVM: x86/mmu: Add dedicated API to map guest_memfd pfn into TDP MMU
      KVM: x86/mmu: WARN if KVM attempts to map into an invalid TDP MMU root
      Revert "KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU"
      KVM: x86/mmu: Rename kvm_tdp_map_page() to kvm_tdp_page_prefault()
      KVM: TDX: Return -EIO, not -EINVAL, on a KVM_BUG_ON() condition
      KVM: TDX: Fold tdx_sept_drop_private_spte() into tdx_sept_remove_private_spte()
      KVM: x86/mmu: Drop the return code from kvm_x86_ops.remove_external_spte()
      KVM: TDX: WARN if mirror SPTE doesn't have full RWX when creating S-EPT mapping
      KVM: TDX: Avoid a double-KVM_BUG_ON() in tdx_sept_zap_private_spte()
      KVM: TDX: Use atomic64_dec_return() instead of a poor equivalent
      KVM: TDX: Fold tdx_mem_page_record_premap_cnt() into its sole caller
      KVM: TDX: ADD pages to the TD image while populating mirror EPT entries
      KVM: TDX: Fold tdx_sept_zap_private_spte() into tdx_sept_remove_private_spte()
      KVM: TDX: Combine KVM_BUG_ON + pr_tdx_error() into TDX_BUG_ON()
      KVM: TDX: Derive error argument names from the local variable names
      KVM: TDX: Assert that mmu_lock is held for write when removing S-EPT entries
      KVM: TDX: Add macro to retry SEAMCALLs when forcing vCPUs out of guest
      KVM: TDX: Add tdx_get_cmd() helper to get and validate sub-ioctl command
      KVM: TDX: Convert INIT_MEM_REGION and INIT_VCPU to "unlocked" vCPU ioctl
      KVM: TDX: Use guard() to acquire kvm->lock in tdx_vm_ioctl()
      KVM: TDX: Don't copy "cmd" back to userspace for KVM_TDX_CAPABILITIES
      KVM: TDX: Guard VM state transitions with "all" the locks
      KVM: TDX: Bug the VM if extending the initial measurement fails
      KVM: TDX: Explicitly set user-return MSRs that *may* be clobbered by the TDX-Module
      KVM: x86: WARN if user-return MSR notifier is registered on exit
      KVM: x86: Leave user-return notifier registered on reboot/shutdown
      KVM: VMX: Make loaded_vmcs_clear() static in vmx.c
      KVM: TDX: Use struct_size to simplify tdx_get_capabilities()
      KVM: x86: Use "checked" versions of get_user() and put_user()
      KVM: x86: WARN if hrtimer callback for periodic APIC timer fires with period=0
      KVM: x86: Grab lapic_timer in a local variable to cleanup periodic code
      KVM: VMX: Use on-stack copy of @flags in __vmx_vcpu_run()
      x86/bugs: Decouple ALTERNATIVE usage from VERW macro definition
      x86/bugs: Use an x86 feature to track the MMIO Stale Data mitigation
      KVM: VMX: Handle MMIO Stale Data in VM-Enter assembly via ALTERNATIVES_2
      x86/bugs: KVM: Move VM_CLEAR_CPU_BUFFERS into SVM as SVM_CLEAR_CPU_BUFFERS
      KVM: VMX: Bundle all L1 data cache flush mitigation code together
      KVM: VMX: Disable L1TF L1 data cache flush if CONFIG_CPU_MITIGATIONS=n
      KVM: SVM: Handle #MCs in guest outside of fastpath
      KVM: VMX: Handle #MCs on VM-Enter/TD-Enter outside of the fastpath
      KVM: x86: Load guest/host XCR0 and XSS outside of the fastpath run loop
      KVM: x86: Load guest/host PKRU outside of the fastpath run loop

Shivank Garg (7):
      mm/mempolicy: Export memory policy symbols
      KVM: guest_memfd: move kvm_gmem_get_index() and use in kvm_gmem_prepare_folio()
      KVM: guest_memfd: remove redundant gmem variable initialization
      KVM: guest_memfd: Add slab-allocated inode cache
      KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
      KVM: selftests: Add helpers to probe for NUMA support, and multi-node systems
      KVM: selftests: Add guest_memfd tests for mmap and NUMA policy support

Song Gao (1):
      LoongArch: KVM: Add AVEC basic support

Thorsten Blum (3):
      KVM: TDX: Replace kmalloc + copy_from_user with memdup_user in tdx_td_init()
      KVM: s390: Remove unused return variable in kvm_arch_vcpu_ioctl_set_fpu
      KVM: TDX: Check size of user's kvm_tdx_capabilities array before allocating

Tom Lendacky (4):
      KVM: SEV: Consolidate the SEV policy bits in a single header file
      crypto: ccp - Add an API to return the supported SEV-SNP policy bits
      KVM: SEV: Publish supported SEV-SNP policy bits
      KVM: SEV: Add known supported SEV-SNP policy bits

Uros Bizjak (2):
      KVM: VMX: Ensure guest's SPEC_CTRL[63:32] is loaded on VM-Enter
      KVM: SVM: Ensure SPEC_CTRL[63:32] is context switched between guest and host

Wanpeng Li (1):
      KVM: Fix last_boosted_vcpu index assignment bug

Xin Li (1):
      KVM: nVMX: Use vcpu instead of vmx->vcpu when vcpu is available

Yan Zhao (2):
      KVM: TDX: Drop superfluous page pinning in S-EPT management
      KVM: TDX: Fix list_add corruption during vcpu_load()

Yosry Ahmed (13):
      KVM: nSVM: Remove redundant cases in nested_svm_intercept()
      KVM: nSVM: Propagate SVM_EXIT_CR0_SEL_WRITE correctly for LMSW emulation
      KVM: nSVM: Avoid incorrect injection of SVM_EXIT_CR0_SEL_WRITE
      KVM: x86: Document a virtualization gap for GIF on AMD CPUs
      KVM: selftests: Extend vmx_close_while_nested_test to cover SVM
      KVM: selftests: Extend vmx_nested_tsc_scaling_test to cover SVM
      KVM: selftests: Move nested invalid CR3 check to its own test
      KVM: selftests: Extend nested_invalid_cr3_test to cover SVM
      KVM: selftests: Extend vmx_tsc_adjust_test to cover SVM
      KVM: selftests: Stop hardcoding PAGE_SIZE in x86 selftests
      KVM: selftests: Remove the unused argument to prepare_eptp()
      KVM: selftests: Stop using __virt_pg_map() directly in tests
      KVM: selftests: Make sure vm->vpages_mapped is always up-to-date

Yue Haibing (1):
      KVM: x86: Remove unused declaration kvm_mmu_may_ignore_guest_pat()

fuqiang wang (2):
      KVM: x86: Explicitly set new periodic hrtimer expiration in apic_timer_fn()
      KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer

 Documentation/virt/kvm/api.rst                     |  70 +-
 Documentation/virt/kvm/x86/errata.rst              |   9 +-
 arch/arm64/include/asm/kvm_arm.h                   |   1 +
 arch/arm64/include/asm/kvm_asm.h                   |   8 +-
 arch/arm64/include/asm/kvm_host.h                  |   3 +
 arch/arm64/include/asm/kvm_hyp.h                   |   3 +-
 arch/arm64/include/asm/kvm_nested.h                |  40 +-
 arch/arm64/include/asm/kvm_pgtable.h               |  49 +-
 arch/arm64/include/asm/kvm_pkvm.h                  |   4 +-
 arch/arm64/include/asm/virt.h                      |   7 +-
 arch/arm64/kernel/cpufeature.c                     |  59 ++
 arch/arm64/kernel/hyp-stub.S                       |   5 +
 arch/arm64/kernel/image-vars.h                     |   1 +
 arch/arm64/kvm/arm.c                               |  20 +-
 arch/arm64/kvm/at.c                                | 196 ++++-
 arch/arm64/kvm/hyp/nvhe/hyp-main.c                 |   7 +-
 arch/arm64/kvm/hyp/nvhe/pkvm.c                     |   3 +
 arch/arm64/kvm/hyp/nvhe/sys_regs.c                 |   5 +
 arch/arm64/kvm/hyp/pgtable.c                       | 128 +++-
 arch/arm64/kvm/hyp/vgic-v2-cpuif-proxy.c           |   4 +
 arch/arm64/kvm/hyp/vgic-v3-sr.c                    |  96 ++-
 arch/arm64/kvm/mmu.c                               | 132 +++-
 arch/arm64/kvm/nested.c                            | 123 +++-
 arch/arm64/kvm/pkvm.c                              |  11 +-
 arch/arm64/kvm/ptdump.c                            |  35 +-
 arch/arm64/kvm/sys_regs.c                          |  28 +-
 arch/arm64/kvm/vgic/vgic-init.c                    |   9 +-
 arch/arm64/kvm/vgic/vgic-mmio-v2.c                 |  24 +
 arch/arm64/kvm/vgic/vgic-mmio.h                    |   1 +
 arch/arm64/kvm/vgic/vgic-v2.c                      | 295 ++++++--
 arch/arm64/kvm/vgic/vgic-v3-nested.c               | 106 +--
 arch/arm64/kvm/vgic/vgic-v3.c                      | 430 ++++++++---
 arch/arm64/kvm/vgic/vgic-v4.c                      |   5 +-
 arch/arm64/kvm/vgic/vgic.c                         | 304 +++++---
 arch/arm64/kvm/vgic/vgic.h                         |  43 +-
 arch/arm64/tools/cpucaps                           |   2 +
 arch/loongarch/include/asm/kvm_eiointc.h           |  55 +-
 arch/loongarch/include/asm/kvm_host.h              |   8 +
 arch/loongarch/include/asm/kvm_vcpu.h              |   1 +
 arch/loongarch/include/asm/loongarch.h             |   2 +
 arch/loongarch/include/uapi/asm/kvm.h              |   1 +
 arch/loongarch/kvm/Kconfig                         |   1 -
 arch/loongarch/kvm/intc/eiointc.c                  |  80 +-
 arch/loongarch/kvm/interrupt.c                     |  15 +-
 arch/loongarch/kvm/vcpu.c                          |  23 +-
 arch/loongarch/kvm/vm.c                            |  44 +-
 arch/mips/kvm/Kconfig                              |   1 -
 arch/mips/kvm/mips.c                               |   4 +-
 arch/powerpc/kvm/Kconfig                           |   1 -
 arch/powerpc/kvm/powerpc.c                         |   4 +-
 arch/riscv/include/asm/kvm_host.h                  |   6 +
 arch/riscv/include/asm/kvm_tlb.h                   |   1 +
 arch/riscv/include/asm/kvm_vcpu_sbi.h              |   5 +-
 arch/riscv/include/asm/kvm_vmid.h                  |   1 -
 arch/riscv/include/uapi/asm/kvm.h                  |   3 +
 arch/riscv/kvm/Kconfig                             |   1 -
 arch/riscv/kvm/Makefile                            |   1 +
 arch/riscv/kvm/aia_imsic.c                         |   2 +-
 arch/riscv/kvm/main.c                              |  14 +
 arch/riscv/kvm/mmu.c                               |   5 +-
 arch/riscv/kvm/tlb.c                               |  30 +
 arch/riscv/kvm/vcpu.c                              |   6 +-
 arch/riscv/kvm/vcpu_insn.c                         |  22 +
 arch/riscv/kvm/vcpu_sbi.c                          |  10 +-
 arch/riscv/kvm/vcpu_sbi_base.c                     |  28 +-
 arch/riscv/kvm/vcpu_sbi_forward.c                  |  34 +
 arch/riscv/kvm/vcpu_sbi_replace.c                  |  32 -
 arch/riscv/kvm/vcpu_sbi_system.c                   |   4 +-
 arch/riscv/kvm/vcpu_sbi_v01.c                      |   3 +-
 arch/riscv/kvm/vmid.c                              |  23 -
 arch/s390/include/asm/kvm_host.h                   |   8 +-
 arch/s390/include/asm/stacktrace.h                 |   1 +
 arch/s390/kernel/asm-offsets.c                     |   1 +
 arch/s390/kernel/entry.S                           |   2 +
 arch/s390/kvm/Kconfig                              |   2 +-
 arch/s390/kvm/gaccess.c                            |  27 +-
 arch/s390/kvm/intercept.c                          |   3 +
 arch/s390/kvm/interrupt.c                          |  80 +-
 arch/s390/kvm/kvm-s390.c                           | 233 ++----
 arch/s390/kvm/kvm-s390.h                           |   9 +-
 arch/s390/kvm/vsie.c                               |  20 +-
 arch/x86/include/asm/cpufeatures.h                 |   7 +
 arch/x86/include/asm/hardirq.h                     |   4 +-
 arch/x86/include/asm/kvm-x86-ops.h                 |   1 +
 arch/x86/include/asm/kvm_host.h                    |  23 +-
 arch/x86/include/asm/nospec-branch.h               |  30 +-
 arch/x86/include/asm/svm.h                         |   5 +-
 arch/x86/include/uapi/asm/kvm.h                    |   1 +
 arch/x86/kernel/cpu/bugs.c                         |  22 +-
 arch/x86/kernel/cpu/scattered.c                    |   1 +
 arch/x86/kvm/cpuid.c                               |   1 +
 arch/x86/kvm/emulate.c                             | 319 +++++---
 arch/x86/kvm/fpu.h                                 |  66 ++
 arch/x86/kvm/hyperv.c                              |   2 +-
 arch/x86/kvm/kvm_emulate.h                         |  20 +-
 arch/x86/kvm/lapic.c                               |  44 +-
 arch/x86/kvm/mmu.h                                 |   5 +-
 arch/x86/kvm/mmu/mmu.c                             |  94 ++-
 arch/x86/kvm/mmu/mmu_internal.h                    |  10 -
 arch/x86/kvm/mmu/paging_tmpl.h                     |   2 +-
 arch/x86/kvm/mmu/spte.c                            |   2 +-
 arch/x86/kvm/mmu/spte.h                            |  10 +
 arch/x86/kvm/mmu/tdp_mmu.c                         |  50 +-
 arch/x86/kvm/svm/avic.c                            |  86 ++-
 arch/x86/kvm/svm/nested.c                          |  12 +-
 arch/x86/kvm/svm/sev.c                             |  45 +-
 arch/x86/kvm/svm/svm.c                             | 113 +--
 arch/x86/kvm/svm/svm.h                             |   4 +-
 arch/x86/kvm/svm/vmenter.S                         |  53 +-
 arch/x86/kvm/vmx/main.c                            |   9 +
 arch/x86/kvm/vmx/nested.c                          | 173 ++---
 arch/x86/kvm/vmx/run_flags.h                       |  10 +-
 arch/x86/kvm/vmx/tdx.c                             | 801 ++++++++++-----------
 arch/x86/kvm/vmx/tdx.h                             |   9 +-
 arch/x86/kvm/vmx/vmenter.S                         |  49 +-
 arch/x86/kvm/vmx/vmx.c                             | 323 +++++----
 arch/x86/kvm/vmx/vmx.h                             |   2 -
 arch/x86/kvm/vmx/x86_ops.h                         |   2 +-
 arch/x86/kvm/x86.c                                 | 285 ++++----
 arch/x86/kvm/x86.h                                 |  16 +-
 drivers/crypto/ccp/sev-dev.c                       |  37 +
 drivers/irqchip/irq-apple-aic.c                    |   7 +-
 drivers/irqchip/irq-gic.c                          |   3 +
 fs/btrfs/compression.c                             |   4 +-
 fs/btrfs/verity.c                                  |   2 +-
 fs/erofs/zdata.c                                   |   2 +-
 fs/f2fs/compress.c                                 |   2 +-
 include/kvm/arm_vgic.h                             |  29 +-
 include/linux/irqchip/arm-gic.h                    |   6 +
 include/linux/irqchip/arm-vgic-info.h              |   2 +
 include/linux/kvm_host.h                           |  14 +-
 include/linux/pagemap.h                            |  18 +-
 include/linux/psp-sev.h                            |  37 +
 include/uapi/linux/kvm.h                           |  11 +
 include/uapi/linux/magic.h                         |   1 +
 mm/filemap.c                                       |  23 +-
 mm/mempolicy.c                                     |   6 +
 mm/readahead.c                                     |   2 +-
 tools/arch/arm64/include/asm/esr.h                 |   2 +
 tools/testing/selftests/kvm/Makefile               |   2 +-
 tools/testing/selftests/kvm/Makefile.kvm           |  12 +-
 tools/testing/selftests/kvm/arm64/at.c             | 166 +++++
 tools/testing/selftests/kvm/arm64/sea_to_user.c    | 331 +++++++++
 tools/testing/selftests/kvm/arm64/vgic_irq.c       | 287 +++++++-
 .../testing/selftests/kvm/arm64/vgic_lpi_stress.c  |   4 +
 tools/testing/selftests/kvm/guest_memfd_test.c     |  98 +++
 tools/testing/selftests/kvm/include/arm64/gic.h    |   1 +
 .../selftests/kvm/include/arm64/gic_v3_its.h       |   1 +
 tools/testing/selftests/kvm/include/kvm_syscalls.h |  81 +++
 tools/testing/selftests/kvm/include/kvm_util.h     |  45 +-
 .../selftests/kvm/include/loongarch/arch_timer.h   |  85 +++
 .../selftests/kvm/include/loongarch/processor.h    |  81 ++-
 tools/testing/selftests/kvm/include/numaif.h       | 110 +--
 .../testing/selftests/kvm/include/x86/processor.h  |   2 +-
 tools/testing/selftests/kvm/include/x86/vmx.h      |   3 +-
 .../testing/selftests/kvm/kvm_binary_stats_test.c  |   4 +-
 tools/testing/selftests/kvm/lib/arm64/gic.c        |   6 +
 .../testing/selftests/kvm/lib/arm64/gic_private.h  |   1 +
 tools/testing/selftests/kvm/lib/arm64/gic_v3.c     |  22 +
 tools/testing/selftests/kvm/lib/arm64/gic_v3_its.c |  10 +
 tools/testing/selftests/kvm/lib/arm64/processor.c  |   2 +-
 tools/testing/selftests/kvm/lib/kvm_util.c         | 145 ++--
 .../selftests/kvm/lib/loongarch/exception.S        |   6 +
 .../selftests/kvm/lib/loongarch/processor.c        |  47 +-
 tools/testing/selftests/kvm/lib/x86/memstress.c    |   2 +-
 tools/testing/selftests/kvm/lib/x86/processor.c    |  80 +-
 tools/testing/selftests/kvm/lib/x86/vmx.c          |   9 +-
 tools/testing/selftests/kvm/loongarch/arch_timer.c | 200 +++++
 tools/testing/selftests/kvm/mmu_stress_test.c      |  10 +-
 .../testing/selftests/kvm/pre_fault_memory_test.c  |  32 +-
 tools/testing/selftests/kvm/riscv/get-reg-list.c   |   4 +
 tools/testing/selftests/kvm/s390/user_operexec.c   | 140 ++++
 tools/testing/selftests/kvm/x86/hyperv_features.c  |   2 +-
 tools/testing/selftests/kvm/x86/hyperv_ipi.c       |  18 +-
 tools/testing/selftests/kvm/x86/hyperv_tlb_flush.c |   2 +-
 ...while_nested_test.c => nested_close_kvm_test.c} |  42 +-
 .../selftests/kvm/x86/nested_invalid_cr3_test.c    | 116 +++
 ..._tsc_adjust_test.c => nested_tsc_adjust_test.c} |  73 +-
 ...sc_scaling_test.c => nested_tsc_scaling_test.c} |  48 +-
 .../kvm/x86/private_mem_conversions_test.c         |   9 +-
 tools/testing/selftests/kvm/x86/sev_smoke_test.c   |   2 +-
 tools/testing/selftests/kvm/x86/state_test.c       |   2 +-
 .../testing/selftests/kvm/x86/userspace_io_test.c  |   2 +-
 .../testing/selftests/kvm/x86/vmx_dirty_log_test.c |  12 +-
 .../selftests/kvm/x86/vmx_nested_la57_state_test.c | 132 ++++
 tools/testing/selftests/kvm/x86/xapic_ipi_test.c   |   5 +-
 virt/kvm/Kconfig                                   |   3 -
 virt/kvm/eventfd.c                                 |   2 +-
 virt/kvm/guest_memfd.c                             | 373 +++++++---
 virt/kvm/kvm_main.c                                |  15 +-
 virt/kvm/kvm_mm.h                                  |   9 +-
 191 files changed, 6303 insertions(+), 2635 deletions(-)
 create mode 100644 arch/riscv/kvm/vcpu_sbi_forward.c
 create mode 100644 tools/testing/selftests/kvm/arm64/at.c
 create mode 100644 tools/testing/selftests/kvm/arm64/sea_to_user.c
 create mode 100644 tools/testing/selftests/kvm/include/kvm_syscalls.h
 create mode 100644 tools/testing/selftests/kvm/include/loongarch/arch_timer.h
 create mode 100644 tools/testing/selftests/kvm/loongarch/arch_timer.c
 create mode 100644 tools/testing/selftests/kvm/s390/user_operexec.c
 rename tools/testing/selftests/kvm/x86/{vmx_close_while_nested_test.c => nested_close_kvm_test.c} (64%)
 create mode 100644 tools/testing/selftests/kvm/x86/nested_invalid_cr3_test.c
 rename tools/testing/selftests/kvm/x86/{vmx_tsc_adjust_test.c => nested_tsc_adjust_test.c} (61%)
 rename tools/testing/selftests/kvm/x86/{vmx_nested_tsc_scaling_test.c => nested_tsc_scaling_test.c} (83%)
 create mode 100644 tools/testing/selftests/kvm/x86/vmx_nested_la57_state_test.c


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ