# git rev-parse -q --verify 3efc57369a0ce8f76bf0804f7e673982384e4ac9^{commit} 3efc57369a0ce8f76bf0804f7e673982384e4ac9 already have revision, skipping fetch # git checkout -q -f -B kisskb 3efc57369a0ce8f76bf0804f7e673982384e4ac9 # git clean -qxdf # < git log -1 # commit 3efc57369a0ce8f76bf0804f7e673982384e4ac9 # Merge: e08d227840bb efbc6bd090f4 # Author: Linus Torvalds # Date: Sat Sep 28 09:20:14 2024 -0700 # # Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm # # Pull x86 kvm updates from Paolo Bonzini: # "x86: # # - KVM currently invalidates the entirety of the page tables, not just # those for the memslot being touched, when a memslot is moved or # deleted. # # This does not traditionally have particularly noticeable overhead, # but Intel's TDX will require the guest to re-accept private pages # if they are dropped from the secure EPT, which is a non starter. # # Actually, the only reason why this is not already being done is a # bug which was never fully investigated and caused VM instability # with assigned GeForce GPUs, so allow userspace to opt into the new # behavior. # # - Advertise AVX10.1 to userspace (effectively prep work for the # "real" AVX10 functionality that is on the horizon) # # - Rework common MSR handling code to suppress errors on userspace # accesses to unsupported-but-advertised MSRs # # This will allow removing (almost?) all of KVM's exemptions for # userspace access to MSRs that shouldn't exist based on the vCPU # model (the actual cleanup is non-trivial future work) # # - Rework KVM's handling of x2APIC ICR, again, because AMD (x2AVIC) # splits the 64-bit value into the legacy ICR and ICR2 storage, # whereas Intel (APICv) stores the entire 64-bit value at the ICR # offset # # - Fix a bug where KVM would fail to exit to userspace if one was # triggered by a fastpath exit handler # # - Add fastpath handling of HLT VM-Exit to expedite re-entering the # guest when there's already a pending wake event at the time of the # exit # # - Fix a WARN caused by RSM entering a nested guest from SMM with # invalid guest state, by forcing the vCPU out of guest mode prior to # signalling SHUTDOWN (the SHUTDOWN hits the VM altogether, not the # nested guest) # # - Overhaul the "unprotect and retry" logic to more precisely identify # cases where retrying is actually helpful, and to harden all retry # paths against putting the guest into an infinite retry loop # # - Add support for yielding, e.g. to honor NEED_RESCHED, when zapping # rmaps in the shadow MMU # # - Refactor pieces of the shadow MMU related to aging SPTEs in # prepartion for adding multi generation LRU support in KVM # # - Don't stuff the RSB after VM-Exit when RETPOLINE=y and AutoIBRS is # enabled, i.e. when the CPU has already flushed the RSB # # - Trace the per-CPU host save area as a VMCB pointer to improve # readability and cleanup the retrieval of the SEV-ES host save area # # - Remove unnecessary accounting of temporary nested VMCB related # allocations # # - Set FINAL/PAGE in the page fault error code for EPT violations if # and only if the GVA is valid. If the GVA is NOT valid, there is no # guest-side page table walk and so stuffing paging related metadata # is nonsensical # # - Fix a bug where KVM would incorrectly synthesize a nested VM-Exit # instead of emulating posted interrupt delivery to L2 # # - Add a lockdep assertion to detect unsafe accesses of vmcs12 # structures # # - Harden eVMCS loading against an impossible NULL pointer deref # (really truly should be impossible) # # - Minor SGX fix and a cleanup # # - Misc cleanups # # Generic: # # - Register KVM's cpuhp and syscore callbacks when enabling # virtualization in hardware, as the sole purpose of said callbacks # is to disable and re-enable virtualization as needed # # - Enable virtualization when KVM is loaded, not right before the # first VM is created # # Together with the previous change, this simplifies a lot the logic # of the callbacks, because their very existence implies # virtualization is enabled # # - Fix a bug that results in KVM prematurely exiting to userspace for # coalesced MMIO/PIO in many cases, clean up the related code, and # add a testcase # # - Fix a bug in kvm_clear_guest() where it would trigger a buffer # overflow _if_ the gpa+len crosses a page boundary, which thankfully # is guaranteed to not happen in the current code base. Add WARNs in # more helpers that read/write guest memory to detect similar bugs # # Selftests: # # - Fix a goof that caused some Hyper-V tests to be skipped when run on # bare metal, i.e. NOT in a VM # # - Add a regression test for KVM's handling of SHUTDOWN for an SEV-ES # guest # # - Explicitly include one-off assets in .gitignore. Past Sean was # completely wrong about not being able to detect missing .gitignore # entries # # - Verify userspace single-stepping works when KVM happens to handle a # VM-Exit in its fastpath # # - Misc cleanups" # # * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (127 commits) # Documentation: KVM: fix warning in "make htmldocs" # s390: Enable KVM_S390_UCONTROL config in debug_defconfig # selftests: kvm: s390: Add VM run test case # KVM: SVM: let alternatives handle the cases when RSB filling is required # KVM: VMX: Set PFERR_GUEST_{FINAL,PAGE}_MASK if and only if the GVA is valid # KVM: x86/mmu: Use KVM_PAGES_PER_HPAGE() instead of an open coded equivalent # KVM: x86/mmu: Add KVM_RMAP_MANY to replace open coded '1' and '1ul' literals # KVM: x86/mmu: Fold mmu_spte_age() into kvm_rmap_age_gfn_range() # KVM: x86/mmu: Morph kvm_handle_gfn_range() into an aging specific helper # KVM: x86/mmu: Honor NEED_RESCHED when zapping rmaps and blocking is allowed # KVM: x86/mmu: Add a helper to walk and zap rmaps for a memslot # KVM: x86/mmu: Plumb a @can_yield parameter into __walk_slot_rmaps() # KVM: x86/mmu: Move walk_slot_rmaps() up near for_each_slot_rmap_range() # KVM: x86/mmu: WARN on MMIO cache hit when emulating write-protected gfn # KVM: x86/mmu: Detect if unprotect will do anything based on invalid_list # KVM: x86/mmu: Subsume kvm_mmu_unprotect_page() into the and_retry() version # KVM: x86: Rename reexecute_instruction()=>kvm_unprotect_and_retry_on_failure() # KVM: x86: Update retry protection fields when forcing retry on emulation failure # KVM: x86: Apply retry protection to "unprotect on failure" path # KVM: x86: Check EMULTYPE_WRITE_PF_TO_SP before unprotecting gfn # ... # < /opt/cross/kisskb/korg/gcc-13.1.0-nolibc/mips-linux/bin/mips-linux-gcc --version # < /opt/cross/kisskb/korg/gcc-13.1.0-nolibc/mips-linux/bin/mips-linux-ld --version # < git log --format=%s --max-count=1 3efc57369a0ce8f76bf0804f7e673982384e4ac9 # make -s -j 24 ARCH=mips O=/kisskb/build/linus_micro32r2_defconfig_mips-gcc13 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-13.1.0-nolibc/mips-linux/bin/mips-linux- micro32r2_defconfig Using /kisskb/src/arch/mips/configs/generic_defconfig as base Merging /kisskb/src/arch/mips/configs/generic/micro32r2.config Merging /kisskb/src/arch/mips/configs/generic/eb.config Merging /kisskb/src/arch/mips/configs/generic/board-boston.config Merging /kisskb/src/arch/mips/configs/generic/board-litex.config Merging /kisskb/src/arch/mips/configs/generic/board-marduk.config Merging /kisskb/src/arch/mips/configs/generic/board-ocelot.config Merging /kisskb/src/arch/mips/configs/generic/board-ranchu.config Merging /kisskb/src/arch/mips/configs/generic/board-sead-3.config Merging /kisskb/src/arch/mips/configs/generic/board-virt.config # < make -s -j 24 ARCH=mips O=/kisskb/build/linus_micro32r2_defconfig_mips-gcc13 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-13.1.0-nolibc/mips-linux/bin/mips-linux- help # make -s -j 24 ARCH=mips O=/kisskb/build/linus_micro32r2_defconfig_mips-gcc13 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-13.1.0-nolibc/mips-linux/bin/mips-linux- olddefconfig # make -s -j 24 ARCH=mips O=/kisskb/build/linus_micro32r2_defconfig_mips-gcc13 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-13.1.0-nolibc/mips-linux/bin/mips-linux- /kisskb/src/arch/mips/boot/dts/img/boston.dts:128.17-178.5: Warning (interrupt_provider): /pci@14000000/pci2_root@0,0: '#interrupt-cells' found, but node is not an interrupt provider /kisskb/src/arch/mips/boot/dts/img/boston.dts:136.23-177.6: Warning (interrupt_provider): /pci@14000000/pci2_root@0,0/eg20t_bridge@1,0,0: '#interrupt-cells' found, but node is not an interrupt provider arch/mips/boot/dts/img/boston.dtb: Warning (interrupt_map): Failed prerequisite 'interrupt_provider' Completed OK # rm -rf /kisskb/build/linus_micro32r2_defconfig_mips-gcc13 # Build took: 0:03:33.043399