From patchwork Tue Jan 15 07:25:49 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juerg Haefliger X-Patchwork-Id: 1025042 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com (client-ip=91.189.94.19; helo=huckleberry.canonical.com; envelope-from=kernel-team-bounces@lists.ubuntu.com; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=canonical.com Received: from huckleberry.canonical.com (huckleberry.canonical.com [91.189.94.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 43f21y643Yz9sCh; Tue, 15 Jan 2019 18:25:58 +1100 (AEDT) Received: from localhost ([127.0.0.1] helo=huckleberry.canonical.com) by huckleberry.canonical.com with esmtp (Exim 4.86_2) (envelope-from ) id 1gjJ6f-00049l-JT; Tue, 15 Jan 2019 07:25:53 +0000 Received: from youngberry.canonical.com ([91.189.89.112]) by huckleberry.canonical.com with esmtps (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.86_2) (envelope-from ) id 1gjJ6e-000494-5y for kernel-team@lists.ubuntu.com; Tue, 15 Jan 2019 07:25:52 +0000 Received: from mail-ed1-f70.google.com ([209.85.208.70]) by youngberry.canonical.com with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.76) (envelope-from ) id 1gjJ6d-0003SV-Up for kernel-team@lists.ubuntu.com; Tue, 15 Jan 2019 07:25:51 +0000 Received: by mail-ed1-f70.google.com with SMTP id s50so754368edd.11 for ; Mon, 14 Jan 2019 23:25:51 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=ziUxalOositT4fEXMp8aXbNMx34wx2ykUJfWhHBUPlg=; b=ZFA1U9naKj96AoDuUdduxnBxBGYzBLU+kLAwGDqoT84snyQLgaiSayWSU1D82W00Eb NT96VHqnGPU7uXcnXXWYr1/pY+94sjXlK7nJOHJbOOsHyyUmUNCLzP+DZvXx0UcUpVOv XRilaSSFXKQFXjZcB7G3J9d6uEP6ZmUrvsOSJHXuK3GqiFUtISnEV/s3b33jV0ayXaRN SubohObOXWmQLUmch16begh8FVgvVmvxmBoPon4Jhkwz/TaF13Zm2JKH3Q7DDYV6zr7c gnsB9PAqhAtLz6vRNsX/SI9w09BXXjMAcwMBXbzzAclo63/xNAiO9l95abWe16tEVR86 wqjg== X-Gm-Message-State: AJcUukeOIgR2b5CZoMdm8CeGmvkyeclD5appN1E6kHoIePWWWk6g0py5 tADh6ey6/ooS+5+j/tkwk6HDJvy3edN39a1iJ0PO4QVvW4/Bf2A7NYjV1dA7z1v8s9+3zSTIVyI oQAPlntWljdEinBx1OdKoqdfd5mla04c6Qn3admUoxA== X-Received: by 2002:a50:b744:: with SMTP id g62mr2378391ede.14.1547537151369; Mon, 14 Jan 2019 23:25:51 -0800 (PST) X-Google-Smtp-Source: ALg8bN42sv2WYz4zGKbTC4AFRNOLe+8I8R6xABI4q5Spqg1fYYNugXvRkLkePKCER9NAUSMVqYClSg== X-Received: by 2002:a50:b744:: with SMTP id g62mr2378376ede.14.1547537151066; Mon, 14 Jan 2019 23:25:51 -0800 (PST) Received: from gollum.fritz.box ([81.221.192.120]) by smtp.gmail.com with ESMTPSA id l51sm4819949edb.36.2019.01.14.23.25.50 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 14 Jan 2019 23:25:50 -0800 (PST) From: Juerg Haefliger X-Google-Original-From: Juerg Haefliger To: kernel-team@lists.ubuntu.com Subject: [SRU][Xenial][PULL] x86/kvm: Backport fixup and missing commits (LP: #1811646) Date: Tue, 15 Jan 2019 08:25:49 +0100 Message-Id: <20190115072549.10198-1-juergh@canonical.com> X-Mailer: git-send-email 2.19.1 MIME-Version: 1.0 X-BeenThere: kernel-team@lists.ubuntu.com X-Mailman-Version: 2.1.20 Precedence: list List-Id: Kernel team discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: kernel-team-bounces@lists.ubuntu.com Sender: "kernel-team" == SRU Justification == The update to stable 4.4.168 contains a couple of x86/kvm related commits that have later fixup commits in upstream. Also, there are a couple of commits in stable 4.4. that we're missing. == Fix == Cherry-pick or backport the relevant commits. == Regression Potential == Low. The relevant commits have been in upstream for quite a while. == Test Case == Not available. It's unclear what the impact is of not having those fixups but it's clear from upstream's commit messages that they fix real issues. Compile-tested all architectres. Ran release regression tests (locally). Signed-off-by: Juerg Haefliger Acked-by: Stefan Bader Acked-by: Kleber Sacilotto de Souza --- The following changes since commit 6aea40b78942cf00d2c8a9e2e204e7950f988a10: Linux 4.4.170 (2019-01-14 09:43:46 +0100) are available in the Git repository at: git://git.launchpad.net/~juergh/+git/xenial-linux lp1811646 for you to fetch changes up to 04474027f01c02570ab512b0a127ad1e377e220d: UBUNTU: SAUCE: KVM: Move code fragments, cleanup and re-indent (2019-01-14 13:07:48 +0100) ---------------------------------------------------------------- Jim Mattson (4): kvm: nVMX: VMCLEAR an active shadow VMCS after last use kvm: x86: IA32_ARCH_CAPABILITIES is always supported kvm: svm: Ensure an IBPB on all affected CPUs when freeing a vmcb kvm: vmx: Scrub hardware GPRs at VM-exit Juerg Haefliger (2): UBUNTU: SAUCE: [Fix] x86/KVM/VMX: Add L1D flush logic UBUNTU: SAUCE: KVM: Move code fragments, cleanup and re-indent KarimAllah Ahmed (1): X86/nVMX: Properly set spec_ctrl and pred_cmd before merging MSRs Paolo Bonzini (3): KVM: x86: avoid vmalloc(0) in the KVM_SET_CPUID KVM/VMX: Optimize vmx_vcpu_run() and svm_vcpu_run() by marking the RDMSR path as unlikely() KVM: VMX: fixes for vmentry_l1d_flush module parameter Thomas Gleixner (1): KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled Tom Lendacky (1): KVM: SVM: Add MSR-based feature support for serializing LFENCE Wanpeng Li (1): KVM: X86: Allow userspace to define the microcode version arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/cpuid.c | 27 +++++++----- arch/x86/kvm/cpuid.h | 44 ++++++++++---------- arch/x86/kvm/svm.c | 91 ++++++++++++++++++++++++++++++++++------- arch/x86/kvm/vmx.c | 78 +++++++++++++++++++++++------------ arch/x86/kvm/x86.c | 12 +++++- 6 files changed, 179 insertions(+), 74 deletions(-)