[GIT PULL] KVM fixes for Linux 5.14-rc2
From: Paolo Bonzini
Date: Thu Jul 15 2021 - 10:42:07 EST
Linus,
The following changes since commit b8917b4ae44d1b945f6fba3d8ee6777edb44633b:
Merge tag 'kvmarm-5.14' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD (2021-06-25 11:24:24 -0400)
are available in the Git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to d951b2210c1ad2dc08345bb8d97e5a172a15261e:
KVM: selftests: smm_test: Test SMM enter from L2 (2021-07-15 10:19:44 -0400)
----------------------------------------------------------------
* Allow again loading KVM on 32-bit non-PAE builds
* Fixes for host SMIs on AMD
* Fixes for guest SMIs on AMD
* Fixes for selftests on s390 and ARM
* Fix memory leak
* Enforce no-instrumentation area on vmentry when hardware
breakpoints are in use.
----------------------------------------------------------------
Christian Borntraeger (2):
KVM: selftests: introduce P44V64 for z196 and EC12
KVM: selftests: do not require 64GB in set_memory_region_test
Kefeng Wang (1):
KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
Lai Jiangshan (1):
KVM: X86: Disable hardware breakpoints unconditionally before kvm_x86->run()
Like Xu (1):
KVM: x86/pmu: Clear anythread deprecated bit when 0xa leaf is unsupported on the SVM
Marc Zyngier (1):
KVM: selftests: x86: Address missing vm_install_exception_handler conversions
Maxim Levitsky (3):
KVM: SVM: #SMI interception must not skip the instruction
KVM: SVM: remove INIT intercept handler
KVM: SVM: add module param to control the #SMI interception
Paolo Bonzini (1):
Merge tag 'kvm-s390-master-5.14-1' of git://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD
Pavel Skripkin (1):
kvm: debugfs: fix memory leak in kvm_create_vm_debugfs
Ricardo Koller (1):
KVM: selftests: Address extra memslot parameters in vm_vaddr_alloc
Sean Christopherson (7):
Revert "KVM: x86: WARN and reject loading KVM if NX is supported but not enabled"
KVM: x86: Use guest MAXPHYADDR from CPUID.0x8000_0008 iff TDP is enabled
KVM: x86: Use kernel's x86_phys_bits to handle reduced MAXPHYADDR
KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs
KVM: SVM: Revert clearing of C-bit on GPA in #NPF handler
KVM: SVM: Return -EFAULT if copy_to_user() for SEV mig packet header fails
KVM: SVM: Fix sev_pin_memory() error checks in SEV migration utilities
Vitaly Kuznetsov (6):
KVM: nSVM: Check the value written to MSR_VM_HSAVE_PA
KVM: nSVM: Check that VM_HSAVE_PA MSR was set before VMRUN
KVM: nSVM: Introduce svm_copy_vmrun_state()
KVM: nSVM: Fix L1 state corruption upon return from SMM
KVM: nSVM: Restore nested control upon leaving SMM
KVM: selftests: smm_test: Test SMM enter from L2
Yu Zhang (1):
KVM: VMX: Remove vmx_msr_index from vmx.h
arch/x86/kvm/cpuid.c | 30 +++++++++--
arch/x86/kvm/mmu/mmu.c | 2 +
arch/x86/kvm/mmu/paging.h | 14 +++++
arch/x86/kvm/mmu/paging_tmpl.h | 4 +-
arch/x86/kvm/mmu/spte.h | 6 ---
arch/x86/kvm/svm/nested.c | 53 +++++++++++-------
arch/x86/kvm/svm/sev.c | 14 ++---
arch/x86/kvm/svm/svm.c | 77 ++++++++++++++++++++++++---
arch/x86/kvm/svm/svm.h | 5 ++
arch/x86/kvm/vmx/vmx.h | 2 -
arch/x86/kvm/x86.c | 8 +--
tools/testing/selftests/kvm/include/kvm_util.h | 3 +-
tools/testing/selftests/kvm/lib/aarch64/processor.c | 2 +-
tools/testing/selftests/kvm/lib/guest_modes.c | 16 ++++++
tools/testing/selftests/kvm/lib/kvm_util.c | 5 ++
tools/testing/selftests/kvm/set_memory_region_test.c | 3 +-
tools/testing/selftests/kvm/x86_64/hyperv_features.c | 2 +-
tools/testing/selftests/kvm/x86_64/mmu_role_test.c | 2 +-
tools/testing/selftests/kvm/x86_64/smm_test.c | 70 +++++++++++++++++++++---
virt/kvm/coalesced_mmio.c | 2 +-
virt/kvm/kvm_main.c | 2 +-
21 files changed, 258 insertions(+), 64 deletions(-)