An error occurred fetching the project authors.
  1. 24 May, 2023 1 commit
  2. 13 Apr, 2023 1 commit
  3. 30 Mar, 2023 2 commits
  4. 13 Mar, 2023 1 commit
  5. 11 Feb, 2023 5 commits
  6. 07 Feb, 2023 1 commit
  7. 31 Jan, 2023 1 commit
  8. 26 Jan, 2023 1 commit
  9. 21 Jan, 2023 1 commit
  10. 12 Jan, 2023 1 commit
  11. 29 Dec, 2022 1 commit
    • Sean Christopherson's avatar
      KVM: x86: Unify pr_fmt to use module name for all KVM modules · 8d20bd63
      Sean Christopherson authored
      Define pr_fmt using KBUILD_MODNAME for all KVM x86 code so that printks
      use consistent formatting across common x86, Intel, and AMD code.  In
      addition to providing consistent print formatting, using KBUILD_MODNAME,
      e.g. kvm_amd and kvm_intel, allows referencing SVM and VMX (and SEV and
      SGX and ...) as technologies without generating weird messages, and
      without causing naming conflicts with other kernel code, e.g. "SEV: ",
      "tdx: ", "sgx: " etc.. are all used by the kernel for non-KVM subsystems.
      
      Opportunistically move away from printk() for prints that need to be
      modified anyways, e.g. to drop a manual "kvm: " prefix.
      
      Opportunistically convert a few SGX WARNs that are similarly modified to
      WARN_ONCE; in the very unlikely event that the WARNs fire, odds are good
      that they would fire repeatedly and spam the kernel log without providing
      unique information in each print.
      
      Note, defining pr_fmt yields undesirable results for code that uses KVM's
      printk wrappers, e.g. vcpu_unimpl().  But, that's a pre-existing problem
      as SVM/kvm_amd already defines a pr_fmt, and thankfully use of KVM's
      wrappers is relatively limited in KVM x86 code.
      Signed-off-by: default avatarSean Christopherson <seanjc@google.com>
      Reviewed-by: default avatarPaul Durrant <paul@xen.org>
      Message-Id: <20221130230934.1014142-35-seanjc@google.com>
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      8d20bd63
  12. 12 Dec, 2022 1 commit
  13. 01 Dec, 2022 1 commit
  14. 28 Nov, 2022 2 commits
    • Marc Zyngier's avatar
      KVM: arm64: PMU: Sanitise PMCR_EL0.LP on first vcpu run · 64d6820d
      Marc Zyngier authored
      Userspace can play some dirty tricks on us by selecting a given
      PMU version (such as PMUv3p5), restore a PMCR_EL0 value that
      has PMCR_EL0.LP set, and then switch the PMU version to PMUv3p1,
      for example. In this situation, we end-up with PMCR_EL0.LP being
      set and spreading havoc in the PMU emulation.
      
      This is specially hard as the first two step can be done on
      one vcpu and the third step on another, meaning that we need
      to sanitise *all* vcpus when the PMU version is changed.
      
      In orer to avoid a pretty complicated locking situation,
      defer the sanitisation of PMCR_EL0 to the point where the
      vcpu is actually run for the first tine, using the existing
      KVM_REQ_RELOAD_PMU request that calls into kvm_pmu_handle_pmcr().
      
      There is still an obscure corner case where userspace could
      do the above trick, and then save the VM without running it.
      They would then observe an inconsistent state (PMUv3.1 + LP set),
      but that state will be fixed on the first run anyway whenever
      the guest gets restored on a host.
      Reported-by: default avatarReiji Watanabe <reijiw@google.com>
      Signed-off-by: default avatarMarc Zyngier <maz@kernel.org>
      64d6820d
    • Marc Zyngier's avatar
      KVM: arm64: PMU: Simplify PMCR_EL0 reset handling · 292e8f14
      Marc Zyngier authored
      Resetting PMCR_EL0 is a pretty involved process that includes
      poisoning some of the writable bits, just because we can.
      
      It makes it hard to reason about about what gets configured,
      and just resetting things to 0 seems like a much saner option.
      
      Reduce reset_pmcr() to just preserving PMCR_EL0.N from the host,
      and setting PMCR_EL0.LC if we don't support AArch32.
      Signed-off-by: default avatarMarc Zyngier <maz@kernel.org>
      292e8f14
  15. 19 Nov, 2022 4 commits
  16. 16 Sep, 2022 3 commits
  17. 14 Sep, 2022 5 commits
  18. 09 Sep, 2022 3 commits
  19. 17 Aug, 2022 1 commit
  20. 17 Jul, 2022 4 commits