Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp589983imm; Fri, 21 Sep 2018 05:14:59 -0700 (PDT) X-Google-Smtp-Source: ANB0VdaI+xJIAFbIH26PlOdSc7uIhJL+ndOhYiuvFnMJ6Vn7zDI30oDIOtx0PaaHEz0TwJLVlR7p X-Received: by 2002:a63:3dc6:: with SMTP id k189-v6mr41100826pga.191.1537532099161; Fri, 21 Sep 2018 05:14:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537532099; cv=none; d=google.com; s=arc-20160816; b=R+RpcfiJaryZM3jLXwmFMHJLAGXbspQyMPY9Km7NqQZoDxjdR9cH3Bm/TzefrMJcMH 2GsDSFuocAvgS7g2QSgXiOg6re2qHzBnv9h14lFw5ewaIFAYlByeD1RiIXg93gCDsmbT Se8NGWi9cpB5Ub87howf0bCmfEjmRohkc9yRzoVwcHZUosSN6QMS2QmQc0FHvSE9E9Mz 6FQ9L2JtRlL0LVM2Yf0JVNxn5qf9oy8jFbSDX8qP8eNTKicy9HeWGWi2npfitEwxtnCm SyVJdqJDLyulKSyX+XCprvZ1F5o/xJzSiDyErtwDlKCLHMAkLr11f+X6BDZmb/z00bC5 dBrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=BVRdKJ2LNGoATOOvzXyoqV7KpRdcxoKytOtPJw6OXas=; b=OWUeA7qvtu3WNO9OC9y5lb51mx2VvK9KPsk+UVCIxOeUvA94k5ed6hxIR9EvxI6dHq l8/uunSkmFOO8HaIxyoSq1g11f9ABUbkVuZoBrS27FButBZsede86W8k4/8gQJpJ/dwe MxrsIFTpeIeUZ0eqJI1gKV5omYeHdwzrh8OfCN7Za2O/2VyjBmlBBi8I3Z7eoY7+HjMj dSeZmh5HxshiGVx/3/9XPOBXEakg5ogdxeb8beeZfotP6A/XRvU7ktDNX+QQL3IgL5JS 4SwzIjyI/mJpzXuAJtBEL5XvcmW3Qpg2A2O9s8vgOCumcpxaRURWPPKzH16zk3XQ8Uhk I+cQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=BtsOyc0K; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 92-v6si28626520plw.81.2018.09.21.05.14.43; Fri, 21 Sep 2018 05:14:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=BtsOyc0K; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389644AbeIUSDL (ORCPT + 99 others); Fri, 21 Sep 2018 14:03:11 -0400 Received: from mail-wm1-f66.google.com ([209.85.128.66]:53424 "EHLO mail-wm1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727697AbeIUSDL (ORCPT ); Fri, 21 Sep 2018 14:03:11 -0400 Received: by mail-wm1-f66.google.com with SMTP id b19-v6so2843074wme.3; Fri, 21 Sep 2018 05:14:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id; bh=BVRdKJ2LNGoATOOvzXyoqV7KpRdcxoKytOtPJw6OXas=; b=BtsOyc0KxFjlnwlV6vBN6twJ4NzOauQwD9qJXlHBYTid9uEk6td8lLp1yH8itHwxnP QTe35r2OcfRZK2g6HlHAHWopJKPYU4xe/mtQQcoJzT9h5VD3ZukYkaFe0O9i5FdvPxBk sgCl6LZ+VI/RcUw3GbdSqoW4Gy8nZs6eb09j0Ldpei2fs0rnZC3assM2C4XIT4GNFG27 b1HShyzNc6XJpEqKUn3Nf4m8JTRo+jq2Vkw3+ayKb0qHsgRxijJQBtA8dZXjhxmGUfk0 A5hCy6zkyr84xgTKeo69XxF2vMo1eeGJjxZsisp89wpKIIEX1mj6PIFt36/d/vg0ACjT AynA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id; bh=BVRdKJ2LNGoATOOvzXyoqV7KpRdcxoKytOtPJw6OXas=; b=nWZCIA/Ivib8fGLFYotvRgbD/T54AAyRiHmJgZGglYG6JFzMEPT59DXcmbGwIY905j 1091TELV+XqHhmJy8MmFzuXt7lK+US7CJHcPEsHkYR1GetT9Lzc/t/s1NWhlYdoyMpZT bwtHn54q2P9+dQn33b/NodV6LhBqYx3qr/1vashyAO+C9QTTzogwDbg9VORd6bK8CpA4 zki1aWwtxfZCrCX1pWZXvu1Jamf/XdJFdOr0zyA5OS/TZNL0lLlw8V5K2IJZGwPgzdwf 0os8ByK93/JFOgs+Hk2mPxcARaZZvbTUXIu/rijS5YJHbiEV5E1xLpF0HIJ55TXMd2X6 eD6A== X-Gm-Message-State: APzg51DN8w3ZRKytqxbJZ66pvmYkkgnzGdIEuDZJtc+dYpQ2FzTRmkjj VRs2V8t7aS0RmTPmsNLXZWg= X-Received: by 2002:a1c:8e81:: with SMTP id q123-v6mr6743086wmd.56.1537532072612; Fri, 21 Sep 2018 05:14:32 -0700 (PDT) Received: from 640k.lan (94-36-187-248.adsl-ull.clienti.tiscali.it. [94.36.187.248]) by smtp.gmail.com with ESMTPSA id g126-v6sm4139081wmg.5.2018.09.21.05.14.30 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 21 Sep 2018 05:14:32 -0700 (PDT) From: Paolo Bonzini To: gregkh@linux-foundation.org Cc: linux-kernel@vger.kernel.org, rkrcmar@redhat.com, kvm@vger.kernel.org Subject: [GIT PULL] KVM changes for Linux 4.20-rc5 Date: Fri, 21 Sep 2018 14:14:27 +0200 Message-Id: <1537532067-42759-1-git-send-email-pbonzini@redhat.com> X-Mailer: git-send-email 1.8.3.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Greg, The following changes since commit 7876320f88802b22d4e2daf7eb027dd14175a0f8: Linux 4.19-rc4 (2018-09-16 11:52:37 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/virt/kvm/kvm.git queue for you to fetch changes up to 26b471c7e2f7befd0f59c35b257749ca57e0ed70: KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs (2018-09-20 18:54:08 +0200) ---------------------------------------------------------------- This pull request is slightly bigger than usual at this stage, but I swear I would have sent it the same to Linus! The main cause for this is that I was on vacation until two weeks ago and it took a while to sort all the pending patches between 4.20 and 4.21, test them and so on. It's mostly small bugfixes and cleanups, mostly around x86 nested virtualization. One important change, not related to nested virtualization, is that the ability for the guest kernel to trap CPUID instructions (in Linux that's the ARCH_SET_CPUID arch_prctl) is now masked by default. This is because the feature is detected through an MSR; a very bad idea that Intel seems to like more and more. Some applications choke if the other fields of that MSR are not initialized as on real hardware, hence we have to disable the whole MSR by default, as was the case before Linux 4.12. ---------------------------------------------------------------- Alexey Kardashevskiy (1): KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode Andy Shevchenko (1): KVM: SVM: Switch to bitmap_zalloc() Drew Schmitt (3): KVM: x86: Turbo bits in MSR_PLATFORM_INFO KVM: x86: Control guest reads of MSR_PLATFORM_INFO kvm: selftests: Add platform_info_test Janosch Frank (2): s390/mm: Check for valid vma before zapping in gmap_discard KVM: s390: Make huge pages unavailable in ucontrol VMs Junaid Shahid (1): kvm: mmu: Don't read PDPTEs when paging is not enabled Krish Sadhukhan (2): nVMX x86: check posted-interrupt descriptor addresss on vmentry of L2 nVMX x86: Check VPID value on vmentry of L2 guests Lei Yang (1): kvm: selftests: use -pthread instead of -lpthread Liran Alon (2): KVM: nVMX: Wake blocked vCPU in guest-mode if pending interrupt in virtual APICv KVM: nVMX: Fix bad cleanup on error of get/set nested state IOCTLs Nicholas Piggin (1): KVM: PPC: Book3S HV: Don't use compound_order to determine host mapping size Paolo Bonzini (3): Merge tag 'kvm-s390-master-4.19-2' of git://git.kernel.org/.../kvms390/linux into HEAD Merge tag 'kvm-ppc-fixes-4.19-2' of git://git.kernel.org/.../paulus/powerpc into HEAD KVM: VMX: check nested state and CR4.VMXE against SMM Sean Christopherson (3): KVM: VMX: immediately mark preemption timer expired only for zero value KVM: VMX: modify preemption timer bit only when arming timer KVM: VMX: use preemption timer to force immediate VMExit Sebastian Andrzej Siewior (1): kvm: x86: make kvm_{load|put}_guest_fpu() static Tianyu Lan (1): KVM/MMU: Fix comment in walk_shadow_page_lockless_end() Vitaly Kuznetsov (2): x86/kvm/lapic: always disable MMIO interface in x2APIC mode x86/hyper-v: rename ipi_arg_{ex,non_ex} structures Wei Yang (1): KVM: x86: don't reset root in kvm_mmu_setup() Documentation/virtual/kvm/api.txt | 12 +- arch/powerpc/include/asm/book3s/64/pgtable.h | 1 - arch/powerpc/include/asm/iommu.h | 2 - arch/powerpc/include/asm/mmu_context.h | 1 + arch/powerpc/kernel/iommu.c | 25 ---- arch/powerpc/kvm/book3s_64_mmu_radix.c | 91 ++++++--------- arch/powerpc/kvm/book3s_64_vio_hv.c | 39 +++++-- arch/powerpc/mm/init_64.c | 49 -------- arch/powerpc/mm/mmu_context_iommu.c | 34 +++++- arch/s390/kvm/kvm-s390.c | 4 +- arch/s390/mm/gmap.c | 4 +- arch/x86/hyperv/hv_apic.c | 8 +- arch/x86/include/asm/hyperv-tlfs.h | 16 +-- arch/x86/include/asm/kvm_host.h | 5 + arch/x86/include/uapi/asm/kvm.h | 1 + arch/x86/kvm/lapic.c | 22 +++- arch/x86/kvm/mmu.c | 9 +- arch/x86/kvm/svm.c | 7 +- arch/x86/kvm/vmx.c | 138 ++++++++++++++++------- arch/x86/kvm/x86.c | 101 +++++++++++------ include/linux/kvm_host.h | 2 - include/uapi/linux/kvm.h | 1 + tools/testing/selftests/kvm/.gitignore | 1 + tools/testing/selftests/kvm/Makefile | 5 +- tools/testing/selftests/kvm/include/kvm_util.h | 4 + tools/testing/selftests/kvm/lib/kvm_util.c | 89 +++++++++++++++ tools/testing/selftests/kvm/platform_info_test.c | 110 ++++++++++++++++++ 27 files changed, 537 insertions(+), 244 deletions(-) create mode 100644 tools/testing/selftests/kvm/platform_info_test.c