Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp477997imm; Sat, 8 Sep 2018 02:46:57 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZUxY4iFt2XRfbypKwiJaRazUhZYzP2Qo58TmgdA69QerIanx1EyKquuEE2hCrMr0k/Koxf X-Received: by 2002:a63:6a06:: with SMTP id f6-v6mr12531329pgc.63.1536400017700; Sat, 08 Sep 2018 02:46:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536400017; cv=none; d=google.com; s=arc-20160816; b=EFwuhIQsnqXLNjGkHj4lCxT7PHZULwyu6iBYBa9niCUD0KCwqiY6oIaY0+PqFTFJKt VWrfhlKh3mXausuiBFDhapQyrQVnNkDsE16siOmyNRoFHbvBzGAgapapPQPgSzMhqMfN Yj0113ldCzqCWzizcV0MKITynilpveyimnyGbkkI5JbbJbHlj0++urm5kFvet0n/w5XT qqbQhYS1v0l5t/+oxtOek2oohTqTuJTCgjYrZL9oMCXvIPiR25LZuHVymYHx1ZxgH0z/ AOc+GTg4LbcO2e0dFJYKWFLt5nrxkQ1mWFKY1KzreDbt7tcpzbOMbzL7Dsb48QXuogHV WeNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-disposition:mime-version:message-id:subject:cc:to:from:date; bh=GZ9sxLAa24YOG1D5OoNp3+/RunKfWOl1PQCMoOj2A3s=; b=L/UrBUihgo8M+U1xg4eGySACGUeoC1xZKImr1ZfeHvvyvO/8Y1Jv3+kDeYZlIPECio LdiTbLs8gRs8kNqIt3V2W2oOkWEj25TgGX5DvmrsvmKh9NosU9JL8ZJlarub0u/Ff9XS BR1LVk+PsDFbPTcINvthsYmrl350GJ6SPsIhN16w1zCP2aCEhl0H9UaPt2AKXl72QsRJ vnlDsPd4QVAwD3J/t11gxNQkB6OEWEks5aUNJ3ZQvPQUuCtFphQTweIgcKIUBG4IYhf2 SupUI/mRpqqEW34cmHpnSj5vIKX+5ITta/wr++WMys0dlE4JWs1HlDAAm+sph9NAw2v3 UVXg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 24-v6si10751873pft.235.2018.09.08.02.46.42; Sat, 08 Sep 2018 02:46:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726766AbeIHOaa (ORCPT + 99 others); Sat, 8 Sep 2018 10:30:30 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:42572 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726549AbeIHOaa (ORCPT ); Sat, 8 Sep 2018 10:30:30 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 0038C4010210; Sat, 8 Sep 2018 09:45:20 +0000 (UTC) Received: from flask (unknown [10.43.2.80]) by smtp.corp.redhat.com (Postfix) with SMTP id 4B87563F63; Sat, 8 Sep 2018 09:45:19 +0000 (UTC) Received: by flask (sSMTP sendmail emulation); Sat, 08 Sep 2018 11:45:18 +0200 Date: Sat, 8 Sep 2018 11:45:18 +0200 From: Radim =?utf-8?B?S3LEjW3DocWZ?= To: Linus Torvalds Cc: Paolo Bonzini , linux-kernel@vger.kernel.org, kvm@vger.kernel.org Subject: [GIT PULL] KVM fixes for Linux 4.19-rc3 Message-ID: <20180908094518.GB29799@flask> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Sat, 08 Sep 2018 09:45:21 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Sat, 08 Sep 2018 09:45:21 +0000 (UTC) for IP:'10.11.54.5' DOMAIN:'int-mx05.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'rkrcmar@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Linus, The following changes since commit 57361846b52bc686112da6ca5368d11210796804: Linux 4.19-rc2 (2018-09-02 14:37:30 -0700) are available in the Git repository at: git://git.kernel.org/pub/scm/virt/kvm/kvm tags/for-linus for you to fetch changes up to bdf7ffc89922a52a4f08a12f7421ea24bb7626a0: KVM: LAPIC: Fix pv ipis out-of-bounds access (2018-09-07 18:38:43 +0200) ---------------------------------------------------------------- KVM fixes for 4.19-rc3 ARM: - Fix a VFP corruption in 32-bit guest - Add missing cache invalidation for CoW pages - Two small cleanups s390: - Fallout from the hugetlbfs support: pfmf interpretion and locking - VSIE: fix keywrapping for nested guests PPC: - Fix a bug where pages might not get marked dirty, causing guest memory corruption on migration, - Fix a bug causing reads from guest memory to use the wrong guest real address for very large HPT guests (>256G of memory), leading to failures in instruction emulation. x86: - Fix out of bound access from malicious pv ipi hypercalls (introduced in rc1) - Fix delivery of pending interrupts when entering a nested guest, preventing arbitrarily late injection - Sanitize kvm_stat output after destroying a guest - Fix infinite loop when emulating a nested guest page fault and improve the surrounding emulation code - Two minor cleanups ---------------------------------------------------------------- Colin Ian King (1): KVM: SVM: remove unused variable dst_vaddr_end Janosch Frank (2): KVM: s390: Fix pfmf and conditional skey emulation KVM: s390: Properly lock mm context allow_gmap_hpage_1m setting Liran Alon (1): KVM: nVMX: Fix loss of pending IRQ/NMI before entering L2 Marc Zyngier (3): KVM: arm/arm64: Clean dcache to PoC when changing PTE due to CoW arm64: KVM: Only force FPEXC32_EL2.EN if trapping FPSIMD KVM: Remove obsolete kvm_unmap_hva notifier backend Paul Mackerras (2): KVM: PPC: Book3S HV: Use correct pagesize in kvm_unmap_radix() KVM: PPC: Book3S HV: Don't truncate HPTE index in xlate function Pierre Morel (1): KVM: s390: vsie: copy wrapping keys to right place Radim Krčmář (3): Merge tag 'kvm-ppc-fixes-4.19-1' of git://git.kernel.org/.../paulus/powerpc Merge tag 'kvm-s390-master-4.19-1' of git://git.kernel.org/.../kvms390/linux Merge tag 'kvm-arm-fixes-for-v4.19-v2' of git://git.kernel.org/.../kvmarm/kvmarm Sean Christopherson (8): KVM: VMX: Do not allow reexecute_instruction() when skipping MMIO instr KVM: x86: SVM: Set EMULTYPE_NO_REEXECUTE for RSM emulation KVM: x86: Invert emulation re-execute behavior to make it opt-in KVM: x86: Merge EMULTYPE_RETRY and EMULTYPE_ALLOW_REEXECUTE KVM: x86: Default to not allowing emulation retry in kvm_mmu_page_fault KVM: x86: Do not re-{try,execute} after failed emulation in L2 KVM: x86: Rename emulate_instruction() to kvm_emulate_instruction() KVM: x86: Unexport x86_emulate_instruction() Stefan Raspl (7): tools/kvm_stat: fix python3 issues tools/kvm_stat: fix handling of invalid paths in debugfs provider tools/kvm_stat: fix updates for dead guests tools/kvm_stat: don't reset stats when setting PID filter for debugfs tools/kvm_stat: handle guest removals more gracefully tools/kvm_stat: indicate dead guests as such tools/kvm_stat: re-animate display of dead guests Steven Price (1): arm64: KVM: Remove pgd_lock Vitaly Kuznetsov (1): KVM: nVMX: avoid redundant double assignment of nested_run_pending Wanpeng Li (1): KVM: LAPIC: Fix pv ipis out-of-bounds access arch/arm/include/asm/kvm_host.h | 1 - arch/arm64/include/asm/kvm_host.h | 4 +-- arch/arm64/kvm/hyp/switch.c | 9 ++++-- arch/mips/include/asm/kvm_host.h | 1 - arch/mips/kvm/mmu.c | 10 ------ arch/powerpc/kvm/book3s_64_mmu_hv.c | 2 +- arch/powerpc/kvm/book3s_64_mmu_radix.c | 6 ++-- arch/s390/include/asm/mmu.h | 8 ++++- arch/s390/kvm/kvm-s390.c | 2 ++ arch/s390/kvm/priv.c | 30 ++++++++++------- arch/s390/kvm/vsie.c | 3 +- arch/x86/include/asm/kvm_host.h | 22 ++++--------- arch/x86/kvm/lapic.c | 27 ++++++++++++---- arch/x86/kvm/mmu.c | 26 ++++++++------- arch/x86/kvm/svm.c | 19 ++++++----- arch/x86/kvm/vmx.c | 43 ++++++++++++++++++------- arch/x86/kvm/x86.c | 28 +++++++++++++--- arch/x86/kvm/x86.h | 2 ++ tools/kvm/kvm_stat/kvm_stat | 59 ++++++++++++++++++++++++++++------ virt/kvm/arm/mmu.c | 21 +++++------- virt/kvm/arm/trace.h | 15 --------- 21 files changed, 204 insertions(+), 134 deletions(-)