-
Story
-
Resolution: Done-Errata
-
Undefined
-
None
-
None
-
kernel-5.14.0-557.el9
-
None
-
rhel-sst-virtualization-hwe
-
rhel-sst-virtualization-hwe
-
ssg_virtualization
-
20
-
26
-
2
-
False
-
-
None
-
None
-
Pass
-
-
RegressionOnly
-
None
Backport more patches, mostly from 6.12, that are needed to enable TDX support in KVM. These prerequisites are less self contained, but are enough to have a mostly conflict-free TDX backport.
v6.10-rc1~139^2~4^2~2 81b10f7b2529 KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig v6.10-rc1~139^2~4^2~1 d7ca0121cbc3 KVM: x86: Move nEPT exit_qualification field from kvm_vcpu_arch to x86_exception v6.11-rc1~89^2~15^2~20 76de9c0a9d9a Revert "KVM: async_pf: avoid recursive flushing of work items" v6.11-rc1~89^2~13^2~4 2d0031802370 KVM: x86/mmu: Rephrase comment about synthetic PFERR flags in #PF handler v6.11-rc1~89^2~25 fb201dccdf96 KVM: x86/tdp_mmu: Sprinkle __must_check v6.11-rc1~89^2~22^2 6066bbba4c61 KVM: x86/tdp_mmu: Take a GFN in kvm_tdp_mmu_fast_pf_get_last_sptep() v6.11-rc1~89^2~6 b39002e8a0ea KVM: x86/mmu: Clean up make_huge_page_split_spte() definition and intro v6.11-rc1~89^2~3 9853ccc73635 KVM: x86: Replace static_call_cond() with static_call() v6.11-rc1~89^2~2 cc1dda7e141b KVM: x86: Introduce kvm_x86_call() to simplify static calls of kvm_x86_ops v6.11-rc1~89^2~1 b7eb400fb402 KVM: x86/pmu: Add kvm_pmu_call() to simplify static calls of kvm_pmu_ops v6.11-rc2~19^2^2 e479b53f6d2d KVM: x86/mmu: fix determination of max NPT mapping level for private pages v6.11-rc1~89^2~22^2~1 2b87c22e8ac9 KVM: x86/tdp_mmu: Rename REMOVED_SPTE to FROZEN_SPTE v6.11-rc7~15^2~3^2~5 f014e07e8941 KVM: x86/mmu: Fixup comments missed by the REMOVED_SPTE=>FROZEN_SPTE rename v6.11-rc1~89^2~14^2~24 fb25e16991ba KVM: x86: Add a struct to consolidate host values, e.g. EFER, XCR0, etc... v6.12-rc5~32^2~4 55c9feb1b740 KVM: selftests: x86: Avoid using SSE/AVX instructions v6.12~23^2~4^2~3 e15d906374d6 KVM: selftests: Disable strict aliasing v6.11-rc7~15^2~13 7edc6f9a2418 KVM: SVM: Fix uninitialized variable bug v6.11-rc7~15^2~10 ff51e56ff6a8 KVM: SVM: Fix an error code in sev_gmem_post_populate() v6.12~23^2~2 9f92c1f06920 kvm: svm: Fix gctx page leak on invalid inputs v6.13-rc3~7^2~1 c39a4b737b03 KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init v6.13-rc1~97^2~10^2~29 3b5fc07b315d KVM: x86: Ensure vcpu->mode is loaded from memory in kvm_vcpu_exit_request() v6.13-rc1~97^2~10^2~26 01bffdac7150 KVM: x86: Bypass register cache when querying CPL from kvm_sched_out() v6.13-rc1~97^2~10^2~25 dc743908261f KVM: x86: Add lockdep-guarded asserts on register cache usage v6.13-rc1~97^2~10^2~24 2d99daea5ae5 KVM: x86: Use '0' for guest RIP if PMI encounters protected guest state v6.12-rc1~11^2~9^2~3 a1620395be6d KVM: x86/mmu: Introduce a quirk to control memslot zap behavior v6.12-rc2~3^2~3 c39ca5c40daa KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU v6.12-rc1~11^2~8^2~9 26c04e281007 KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock v6.12-rc1~11^2~8^2~8 09196aa6be4e KVM: Register cpuhp and syscore callbacks when enabling hardware v6.12-rc1~11^2~8^2~7 be7ce3fc3df9 KVM: Rename symbols related to enabling virtualization hardware v6.12-rc1~11^2~8^2~6 dab48c56fc00 KVM: Rename arch hooks related to per-CPU virtualization enabling v6.12-rc1~11^2~8^2~5 c654587d4b5d KVM: MIPS: Rename virtualization {en,dis}abling APIs to match common KVM v6.12-rc1~11^2~8^2~4 b10b5b4c9702 KVM: x86: Rename virtualization {en,dis}abling APIs to match common KVM v6.12-rc1~11^2~8^2~3 92da79f795d8 KVM: Add a module param to allow enabling virtualization when KVM is loaded v6.12-rc1~11^2~8^2~2 c508b8dddbfe KVM: Add arch hooks for enabling/disabling virtualization v6.12-rc1~11^2~8^2~1 1b3e2b968f08 x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef v6.12-rc1~11^2~8^2 215d874053f5 KVM: x86: Register "emergency disable" callbacks when virt is enabled v6.12-rc1~11^2~6^2~23 86fb617f532d KVM: x86: Refactor kvm_x86_ops.get_msr_feature() to avoid kvm_msr_entry v6.12-rc1~11^2~6^2~22 53aab3b11449 KVM: x86: Rename get_msr_feature() APIs to get_feature_msr() v6.12~23^2~1 003c73175037 KVM: x86: Unconditionally set irr_pending when updating APICv state v6.13-rc1~97^2~17^2~84 f8ae3ee5cdc5 KVM: Drop KVM_ERR_PTR_BAD_PAGE and instead return NULL to indicate an error v6.13-rc1~97^2~17^2~83 75d006f844e6 KVM: Allow calling kvm_release_page_{clean,dirty}() on a NULL page pointer v6.13-rc1~97^2~10^2~8 6fe51eaf47b7 KVM: x86: Short-circuit all kvm_lapic_set_base() if MSR value isn't changing v6.13-rc1~97^2~10^2~7 edbb43c3ca72 KVM: x86: Drop superfluous kvm_lapic_set_base() call when setting APIC state v6.13-rc1~97^2~10^2~6 fdb9f6f12aae KVM: x86: Get vcpu->arch.apic_base directly and drop kvm_get_apic_base() v6.13-rc1~97^2~10^2~5 7dc0a62b3729 KVM: x86: Inline kvm_get_apic_mode() in lapic.h v6.13-rc1~97^2~10^2~4 32131fec4f30 KVM: x86: Move kvm_set_apic_base() implementation to lapic.c (from x86.c) v6.12-rc1~11^2~6^2 3ae9e3639aa3 KVM: x86: Remove some unused declarations v6.13-rc1~97^2~10^2~3 30f29cc91e52 KVM: x86: Rename APIC base setters to better capture their relationship v6.13-rc1~97^2~10^2~1 3b37946daef1 KVM: x86: Unpack msr_data structure prior to calling kvm_apic_set_base() v6.13-rc1~97^2~10^2 e676a8de4c7e KVM: x86: Short-circuit all of kvm_apic_set_base() if MSR value is unchanged
- links to
-
RHSA-2024:138410 kernel bug fix and enhancement update