aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/tools/perf/scripts/python/export-to-postgresql.py (unfollow)
AgeCommit message (Collapse)AuthorFilesLines
2019-02-11arm64: defconfig: Add IMX2+ watchdogCarlo Caione1-0/+1
It's needed to properly reboot the i.MX8MQ EVK board. Signed-off-by: Carlo Caione <ccaione@baylibre.com> Reviewed-by: Fabio Estevam <festevam@gmail.com> Signed-off-by: Shawn Guo <shawnguo@kernel.org>
2019-02-11arm64: defconfig: Enable PFUZE100 regulatorCarlo Caione1-0/+1
This is needed to boot correctly from eMMC on the i.MX8MQ EVK board. Signed-off-by: Carlo Caione <ccaione@baylibre.com> Reviewed-by: Fabio Estevam <festevam@gmail.com> Signed-off-by: Shawn Guo <shawnguo@kernel.org>
2019-02-11arm64: defconfig: enable NXP FlexSPI driverYogesh Narayan Gaur1-0/+1
Enable driver support of NXP FlexSPI controller. Signed-off-by: Yogesh Narayan Gaur <yogeshnarayan.gaur@nxp.com> Signed-off-by: Shawn Guo <shawnguo@kernel.org>
2019-02-11arm64: defconfig: Add i.MX8MQ boot necessary configsAbel Vesa1-0/+5
Enable all the i.MX8MQ configs necessary to boot. Cc: Catalin Marinas <catalin.marinas@arm.com> Cc: Will Deacon <will.deacon@arm.com> Cc: Shawn Guo <shawnguo@kernel.org> Cc: Sascha Hauer <kernel@pengutronix.de> Cc: Fabio Estevam <fabio.estevam@nxp.com> Signed-off-by: Abel Vesa <abel.vesa@nxp.com> Reviewed-by: Dong Aisheng <aisheng.dong@nxp.com> Reviewed-by: Lucas Stach <l.stach@pengutronix.de> Signed-off-by: Shawn Guo <shawnguo@kernel.org>
2019-02-11arm64: defconfig: add imx8qxp supportAisheng Dong1-0/+10
Enable basic drivers for imx8qxp booting up support: SCU firmware, Mailbox(MU), SCU Power Domain/Pinctrl/Clock, Uart, MMC, FEC. Cc: Catalin Marinas <catalin.marinas@arm.com> Cc: Will Deacon <will.deacon@arm.com> Cc: Shawn Guo <shawnguo@kernel.org> Cc: Sascha Hauer <kernel@pengutronix.de> Cc: Fabio Estevam <fabio.estevam@nxp.com> Signed-off-by: Dong Aisheng <aisheng.dong@nxp.com> Signed-off-by: Shawn Guo <shawnguo@kernel.org>
2019-02-11arm64: defconfig: add i.MX system controller RTC supportAnson Huang1-0/+1
This patch enables CONFIG_RTC_DRV_IMX_SC as module by default. Signed-off-by: Anson Huang <Anson.Huang@nxp.com> Signed-off-by: Shawn Guo <shawnguo@kernel.org>
2019-02-06arm64: defconfig: Enable Tegra TCUThierry Reding1-0/+1
The Tegra Combined UART is used on some Tegra194 devices as a way of multiplexing output from multiple producers onto a single physical UART. Enable this by default so that it can be used as the default console to write kernel messages to. Signed-off-by: Thierry Reding <treding@nvidia.com>
2019-02-06arm64: defconfig: Enable MAX8973 regulatorJoseph Lo1-0/+1
The Tegra210 Smaug board uses MAX77621 for both CPU & GPU rail. Note that max8973 and max77621 share the same driver. So enable this driver for the PMIC. Signed-off-by: Joseph Lo <josephl@nvidia.com> Acked-by: Jon Hunter <jonathanh@nvidia.com> Signed-off-by: Thierry Reding <treding@nvidia.com>
2019-02-04ARM: socfpga_defconfig: enable BLK_DEV_LOOP config optionDinh Nguyen1-14/+11
Add CONFIG_BLK_DEV_LOOP and clean up socfpga_defconfig by make savedefconfig. Signed-off-by: Dinh Nguyen <dinguyen@kernel.org>
2019-02-03ARM: defconfig: lpc32xx: enable DRM simple panel driverVladimir Zapolskiy1-0/+1
Phytec phyCORE-LPC3250 board is equipped with a Sharp LQ035Q7DB03 3.5" QVGA TFT panel, enable simple panel device driver to get it supported in the kernel image by default. Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-02-03ARM: defconfig: lpc32xx: enable fixed voltage regulator supportVladimir Zapolskiy1-0/+2
Fixed voltage regulators are found on Phytec phyCORE-LPC3250 board, enable the correspondent device driver by default. Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-02-01arm64: defconfig: Enable SUN6I Camera sensor interfaceJagan Teki1-0/+2
Enable Camera sensor interface for Allwinner SUN6I SoC's. This support enable V4L2 platform drivers static and VIDEO_SUN6I_CSI as module. Signed-off-by: Jagan Teki <jagan@amarulasolutions.com> Signed-off-by: Maxime Ripard <maxime.ripard@bootlin.com>
2019-02-01arm64: defconfig: Enable I2C_GPIOJagan Teki1-0/+1
The GPIO-based bitbanging I2C driver is required to configure CSI data, clock pins on CSI block in Allwinner A64 SoC. Let build it as module. Signed-off-by: Jagan Teki <jagan@amarulasolutions.com> Signed-off-by: Maxime Ripard <maxime.ripard@bootlin.com>
2019-01-31ARM: omap2plus_defconfig: Update for moved optionsTony Lindgren1-38/+38
These options have just moved around, let's update with make savedefconfig to make patching the file easier. Signed-off-by: Tony Lindgren <tony@atomide.com>
2019-01-31ARM: omap2plus_defconfig: Update for dropped optionsTony Lindgren1-6/+0
These are all now selected by default so we can drop them from omap2plus_defconfig. Signed-off-by: Tony Lindgren <tony@atomide.com>
2019-01-31ARM: omap2plus_defconfig: remove PROVE_LOCKING from defconfigLukasz Luba1-1/+0
PROVE_LOCKING enables LOCKDEP, which causes big overhead on cache and bus transactions. On some ARM big.LITTLE architecutres (Exynos 5433) the overhead is really big. The overhead can be measures using hackbench which will speed up by x3 times (11sec -> 3.4sec). When you check transaction on cache or buses, the results are way higher than normal for the same hackbench test: L1d cache invalidations: 26mln vs 4mln L2u cache invalidations: 42mln vs 12mln bus cyc/access: 30cyc/access vs. 20cyc/access context switch is x3 times cheaper Enable this option only when you have some locking issue to investigate. Signed-off-by: Lukasz Luba <l.luba@partner.samsung.com> Signed-off-by: Tony Lindgren <tony@atomide.com>
2019-01-30ARM: multi_v7_defconfig: enable GCC plugin support and structleak pluginArd Biesheuvel1-0/+2
Enable the base GCC plugin support symbol CONFIG_GCC_PLUGINS for multi_v7_defconfig so that builds hosted on systems that have a supported version of GCC along with the prerequisite headers will allow GCC plugins to be used during the build. At the moment, this will also enable the ARM per-task stack protector plugin, since all its remaining Kconfig dependencies are fulfilled by default. At the same time, enable the structleak plugin. This plugin ensures that local struct type variables are fully initialized, preventing inadvertent leaks of kernel state if such variables are shared with userland. This is a reasonable transformation to apply by default, since it does not adversely affect performance, and does not affect GCC compiler diagnostics regarding the use of uninitialized local variables. Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
2019-01-30arm64: defconfig: Switch to PL11x DRM driverLinus Walleij1-1/+4
This switches out the old fbdev PL11x driver to the new DRM driver in the Aarch64/ARM64 defconfig. Some ARM reference designs use this IP with the Silicon Image SII902x HDMI bridge so activate both. The required DTS changes are already in-tree. Signed-off-by: Linus Walleij <linus.walleij@linaro.org> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
2019-01-30ARM: defconfig: Enable PL11x DRM driver on multi_v7Linus Walleij1-1/+2
This switches the ARMv7 defconfig away from the old fbdev driver to the new DRM driver. All machines are now supported by the new driver. Signed-off-by: Linus Walleij <linus.walleij@linaro.org> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
2019-01-30ARM: defconfig: axm55xx: Drop PL11x graphics driverLinus Walleij1-4/+0
The defconfig for the AXM55xx includes the ARM CLCD (PL11x) PrimeCell framebuffer driver, but the device tree for this platform does not include this hardware, nor do I find it likely that this chip has graphics. Drop these config items. Cc: John Logan <john.logan@intel.com> Cc: Anders Roxell <anders.roxell@linaro.org> Acked-by: Krzysztof Adamski <krzysztof.adamski@nokia.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
2019-01-27Linux 5.0-rc4Linus Torvalds1-1/+1
2019-01-27Revert "block: cover another queue enter recursion via BIO_QUEUE_ENTERED"Jens Axboe2-11/+10
We can't touch a bio after ->make_request_fn(), for all we know it could already have been completed by the time this function returns. This reverts commit 698cef173983b086977e633e46476e0f925ca01e. Reported-by: syzbot+4df6ca820108fd248943@syzkaller.appspotmail.com Signed-off-by: Jens Axboe <axboe@kernel.dk>
2019-01-25qed: Revert error handling changes.David S. Miller18-743/+202
This is new code and not bug fixes. This reverts all changes added by merge commit 8fb18be93efd7292d6ee403b9f61af1008239639 Signed-off-by: David S. Miller <davem@davemloft.net>
2019-01-26ARM: defconfig: lpc32xx: disable superfluous GPIO controllersVladimir Zapolskiy1-8/+0
The change disables a list of GPIO controllers, which to the best knowledge are not found on any supported NXP LPC32xx powered board. Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-26ARM: defconfig: lpc32xx: enable generic SRAM driverVladimir Zapolskiy1-0/+1
NXP LPC32xx SoCs contain an IRAM area, which is supported by the generic MMIO SRAM driver, enable the driver to be built by default. Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-26ARM: defconfig: lpc32xx: enable serial console on HS UARTVladimir Zapolskiy1-0/+1
It is possible to configure NXP LPC32xx powered boards to have serial consoles on HS UARTs, enable this option by default. Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-26ARM: defconfig: lpc32xx: enable panic on oops optionVladimir Zapolskiy1-0/+2
Panic on oops option enabled by by default makes great sense both for debugging and production. Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-26ARM: defconfig: lpc32xx: enable build options for basic debuggingVladimir Zapolskiy1-0/+4
To make a default built kernel image more advanced include support of sysrq, dynamic debug, GDB scripts and printed timestamps in kernel log buffer by default. Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-26ARM: defconfig: lpc32xx: enable NFSv4 supportVladimir Zapolskiy1-0/+3
The change allows to mount rootfs shared on an NFSv4 server. Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-25ARM: defconfig: Switch LPC32xx to use PL11x DRM driverLinus Walleij1-4/+5
None of the LPC32xx device trees contains any display settings, it just defines a device tree node for the CLCD (PL11x) left as "disabled" on lpc3250-ea3250 and "okay" on lpc3250-phy3250 but no panels are attached on any device tree, so the driver will simply bail out. I conclude that the hardware is dormant on existing systems, so we can without any problems switch the defconfig over from the old ARMCLCD frame buffer driver to the new PL11x DRM driver. Cc: Vladimir Zapolskiy <vz@mleia.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org> [vzapolskiy: deselected I2C as selected by DRM; fixed SoC name] Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-25ARM: defconfig: Update LPC32xx defconfigLinus Walleij1-22/+12
This simply updates the LPC32xx defconfig against the current Kconfig structure in the kernel so we can make changed to the defconfig without disturbing noise. Cc: Vladimir Zapolskiy <vz@mleia.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org> Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-25ARM: defconfig: Switch LPC18xx to use PL11x DRM driverLinus Walleij1-3/+4
None of the LPC18xx device trees contains any display settings, it just defines a device tree node for the CLCD (PL11x) set as "disabled" and no panels are attached on any device tree. This I conclude that the hardware is dormant on existing systems, so we can without any problems switch the defconfig over from the old ARMCLCD frame buffer driver to the new PL11x DRM driver. Cc: Vladimir Zapolskiy <vz@mleia.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org> [vzapolskiy: deselected I2C build option as selected by DRM] Signed-off-by: Vladimir Zapolskiy <vz@mleia.com>
2019-01-25KVM: x86: Mark expected switch fall-throughsGustavo A. R. Silva6-4/+10
In preparation to enabling -Wimplicit-fallthrough, mark switch cases where we are expecting to fall through. This patch fixes the following warnings: arch/x86/kvm/lapic.c:1037:27: warning: this statement may fall through [-Wimplicit-fallthrough=] arch/x86/kvm/lapic.c:1876:3: warning: this statement may fall through [-Wimplicit-fallthrough=] arch/x86/kvm/hyperv.c:1637:6: warning: this statement may fall through [-Wimplicit-fallthrough=] arch/x86/kvm/svm.c:4396:6: warning: this statement may fall through [-Wimplicit-fallthrough=] arch/x86/kvm/mmu.c:4372:36: warning: this statement may fall through [-Wimplicit-fallthrough=] arch/x86/kvm/x86.c:3835:6: warning: this statement may fall through [-Wimplicit-fallthrough=] arch/x86/kvm/x86.c:7938:23: warning: this statement may fall through [-Wimplicit-fallthrough=] arch/x86/kvm/vmx/vmx.c:2015:6: warning: this statement may fall through [-Wimplicit-fallthrough=] arch/x86/kvm/vmx/vmx.c:1773:6: warning: this statement may fall through [-Wimplicit-fallthrough=] Warning level 3 was used: -Wimplicit-fallthrough=3 This patch is part of the ongoing efforts to enabling -Wimplicit-fallthrough. Signed-off-by: Gustavo A. R. Silva <gustavo@embeddedor.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25KVM: x86: fix TRACE_INCLUDE_PATH and remove -I. header search pathsMasahiro Yamada2-5/+1
The header search path -I. in kernel Makefiles is very suspicious; it allows the compiler to search for headers in the top of $(srctree), where obviously no header file exists. The reason of having -I. here is to make the incorrectly set TRACE_INCLUDE_PATH working. As the comment block in include/trace/define_trace.h says, TRACE_INCLUDE_PATH should be a relative path to the define_trace.h Fix the TRACE_INCLUDE_PATH, and remove the iffy include paths. Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25KVM: selftests: check returned evmcs version rangeVitaly Kuznetsov1-0/+6
Check that KVM_CAP_HYPERV_ENLIGHTENED_VMCS returns correct version range. Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25x86/kvm/hyper-v: nested_enable_evmcs() sets vmcs_version incorrectlyVitaly Kuznetsov1-3/+4
Commit e2e871ab2f02 ("x86/kvm/hyper-v: Introduce nested_get_evmcs_version() helper") broke EVMCS enablement: to set vmcs_version we now call nested_get_evmcs_version() but this function checks enlightened_vmcs_enabled flag which is not yet set so we end up returning zero. Fix the issue by re-arranging things in nested_enable_evmcs(). Fixes: e2e871ab2f02 ("x86/kvm/hyper-v: Introduce nested_get_evmcs_version() helper") Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25KVM: VMX: Move vmx_vcpu_run()'s VM-Enter asm blob to a helper functionSean Christopherson1-66/+73
...along with the function's STACK_FRAME_NON_STANDARD tag. Moving the asm blob results in a significantly smaller amount of code that is marked with STACK_FRAME_NON_STANDARD, which makes it far less likely that gcc will split the function and trigger a spurious objtool warning. As a bonus, removing STACK_FRAME_NON_STANDARD from vmx_vcpu_run() allows the bulk of code to be properly checked by objtool. Because %rbp is not loaded via VMCS fields, vmx_vcpu_run() must manually save/restore the host's RBP and load the guest's RBP prior to calling vmx_vmenter(). Modifying %rbp triggers objtool's stack validation code, and so vmx_vcpu_run() is tagged with STACK_FRAME_NON_STANDARD since it's impossible to avoid modifying %rbp. Unfortunately, vmx_vcpu_run() is also a gigantic function that gcc will split into separate functions, e.g. so that pieces of the function can be inlined. Splitting the function means that the compiled Elf file will contain one or more vmx_vcpu_run.part.* functions in addition to a vmx_vcpu_run function. Depending on where the function is split, objtool may warn about a "call without frame pointer save/setup" in vmx_vcpu_run.part.* since objtool's stack validation looks for exact names when whitelisting functions tagged with STACK_FRAME_NON_STANDARD. Up until recently, the undesirable function splitting was effectively blocked because vmx_vcpu_run() was tagged with __noclone. At the time, __noclone had an unintended side effect that put vmx_vcpu_run() into a separate optimization unit, which in turn prevented gcc from inlining the function (or any of its own function calls) and thus eliminated gcc's motivation to split the function. Removing the __noclone attribute allowed gcc to optimize vmx_vcpu_run(), exposing the objtool warning. Kudos to Qian Cai for root causing that the fnsplit optimization is what caused objtool to complain. Fixes: 453eafbe65f7 ("KVM: VMX: Move VM-Enter + VM-Exit handling to non-inline sub-routines") Tested-by: Qian Cai <cai@lca.pw> Cc: Josh Poimboeuf <jpoimboe@redhat.com> Reported-by: kbuild test robot <lkp@intel.com> Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25kvm: selftests: Fix region overlap check in kvm_utilBen Gardon1-7/+2
Fix a call to userspace_mem_region_find to conform to its spec of taking an inclusive, inclusive range. It was previously being called with an inclusive, exclusive range. Also remove a redundant region bounds check in vm_userspace_mem_region_add. Region overlap checking is already performed by the call to userspace_mem_region_find. Tested: Compiled tools/testing/selftests/kvm with -static Ran all resulting test binaries on an Intel Haswell test machine All tests passed Signed-off-by: Ben Gardon <bgardon@google.com> Reviewed-by: Jim Mattson <jmattson@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25kvm: vmx: fix some -Wmissing-prototypes warningsYi Wang2-2/+2
We get some warnings when building kernel with W=1: arch/x86/kvm/vmx/vmx.c:426:5: warning: no previous prototype for ‘kvm_fill_hv_flush_list_func’ [-Wmissing-prototypes] arch/x86/kvm/vmx/nested.c:58:6: warning: no previous prototype for ‘init_vmcs_shadow_fields’ [-Wmissing-prototypes] Make them static to fix this. Signed-off-by: Yi Wang <wang.yi59@zte.com.cn> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25KVM: nSVM: clear events pending from svm_complete_interrupts() when exiting to L1Vitaly Kuznetsov1-0/+8
kvm-unit-tests' eventinj "NMI failing on IDT" test results in NMI being delivered to the host (L1) when it's running nested. The problem seems to be: svm_complete_interrupts() raises 'nmi_injected' flag but later we decide to reflect EXIT_NPF to L1. The flag remains pending and we do NMI injection upon entry so it got delivered to L1 instead of L2. It seems that VMX code solves the same issue in prepare_vmcs12(), this was introduced with code refactoring in commit 5f3d5799974b ("KVM: nVMX: Rework event injection and recovery"). Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25svm: Fix AVIC incomplete IPI emulationSuravee Suthikulpanit1-15/+4
In case of incomplete IPI with invalid interrupt type, the current SVM driver does not properly emulate the IPI, and fails to boot FreeBSD guests with multiple vcpus when enabling AVIC. Fix this by update APIC ICR high/low registers, which also emulate sending the IPI. Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25svm: Add warning message for AVIC IPI invalid targetSuravee Suthikulpanit1-0/+2
Print warning message when IPI target ID is invalid due to one of the following reasons: * In logical mode: cluster > max_cluster (64) * In physical mode: target > max_physical (512) * Address is not present in the physical or logical ID tables Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25KVM: x86: WARN_ONCE if sending a PV IPI returns a fatal errorSean Christopherson1-2/+5
KVM hypercalls return a negative value error code in case of a fatal error, e.g. when the hypercall isn't supported or was made with invalid parameters. WARN_ONCE on fatal errors when sending PV IPIs as any such error all but guarantees an SMP system will hang due to a missing IPI. Fixes: aaffcfd1e82d ("KVM: X86: Implement PV IPIs in linux guest") Cc: stable@vger.kernel.org Cc: Wanpeng Li <wanpengli@tencent.com> Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25KVM: x86: Fix PV IPIs for 32-bit KVM hostSean Christopherson1-1/+1
The recognition of the KVM_HC_SEND_IPI hypercall was unintentionally wrapped in "#ifdef CONFIG_X86_64", causing 32-bit KVM hosts to reject any and all PV IPI requests despite advertising the feature. This results in all KVM paravirtualized guests hanging during SMP boot due to IPIs never being delivered. Fixes: 4180bf1b655a ("KVM: X86: Implement "send IPI" hypercall") Cc: stable@vger.kernel.org Cc: Wanpeng Li <wanpengli@tencent.com> Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25x86/kvm/hyper-v: recommend using eVMCS only when it is enabledVitaly Kuznetsov1-1/+2
We shouldn't probably be suggesting using Enlightened VMCS when it's not enabled (not supported from guest's point of view). Hyper-V on KVM seems to be fine either way but let's be consistent. Fixes: 2bc39970e932 ("x86/kvm/hyper-v: Introduce KVM_GET_SUPPORTED_HV_CPUID") Reviewed-by: Liran Alon <liran.alon@oracle.com> Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25x86/kvm/hyper-v: don't recommend doing reset via synthetic MSRVitaly Kuznetsov1-1/+0
System reset through synthetic MSR is not recommended neither by genuine Hyper-V nor my QEMU. Fixes: 2bc39970e932 ("x86/kvm/hyper-v: Introduce KVM_GET_SUPPORTED_HV_CPUID") Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Reviewed-by: Liran Alon <liran.alon@oracle.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25kvm: x86/vmx: Use kzalloc for cached_vmcs12Tom Roeder1-4/+8
This changes the allocation of cached_vmcs12 to use kzalloc instead of kmalloc. This removes the information leak found by Syzkaller (see Reported-by) in this case and prevents similar leaks from happening based on cached_vmcs12. It also changes vmx_get_nested_state to copy out the full 4k VMCS12_SIZE in copy_to_user rather than only the size of the struct. Tested: rebuilt against head, booted, and ran the syszkaller repro https://syzkaller.appspot.com/text?tag=ReproC&x=174efca3400000 without observing any problems. Reported-by: syzbot+ded1696f6b50b615b630@syzkaller.appspotmail.com Fixes: 8fcc4b5923af5de58b80b53a069453b135693304 Cc: stable@vger.kernel.org Signed-off-by: Tom Roeder <tmroeder@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25KVM: VMX: Use the correct field var when clearing VM_ENTRY_LOAD_IA32_PERF_GLOBAL_CTRLSean Christopherson1-1/+1
Fix a recently introduced bug that results in the wrong VMCS control field being updated when applying a IA32_PERF_GLOBAL_CTRL errata. Fixes: c73da3fcab43 ("KVM: VMX: Properly handle dynamic VM Entry/Exit controls") Reported-by: Harald Arnesen <harald@skogtun.org> Tested-by: Harald Arnesen <harald@skogtun.org> Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25KVM: x86: Fix single-step debuggingAlexander Popov1-2/+1
The single-step debugging of KVM guests on x86 is broken: if we run gdb 'stepi' command at the breakpoint when the guest interrupts are enabled, RIP always jumps to native_apic_mem_write(). Then other nasty effects follow. Long investigation showed that on Jun 7, 2017 the commit c8401dda2f0a00cd25c0 ("KVM: x86: fix singlestepping over syscall") introduced the kvm_run.debug corruption: kvm_vcpu_do_singlestep() can be called without X86_EFLAGS_TF set. Let's fix it. Please consider that for -stable. Signed-off-by: Alexander Popov <alex.popov@linux.com> Cc: stable@vger.kernel.org Fixes: c8401dda2f0a00cd25c0 ("KVM: x86: fix singlestepping over syscall") Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-01-25x86/kvm/hyper-v: don't announce GUEST IDLE MSR supportVitaly Kuznetsov1-1/+0
HV_X64_MSR_GUEST_IDLE_AVAILABLE appeared in kvm_vcpu_ioctl_get_hv_cpuid() by mistake: it announces support for HV_X64_MSR_GUEST_IDLE (0x400000F0) which we don't support in KVM (yet). Fixes: 2bc39970e932 ("x86/kvm/hyper-v: Introduce KVM_GET_SUPPORTED_HV_CPUID") Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>