[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20200326200311.28222-1-pbonzini@redhat.com>
Date: Thu, 26 Mar 2020 16:03:11 -0400
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for Linux 5.6 final (or -rc8)
Linus,
The following changes since commit 018cabb694e3923998fdc2908af5268f1d89f48f:
Merge branch 'kvm-null-pointer-fix' into kvm-master (2020-03-14 12:49:37 +0100)
are available in the Git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to e1be9ac8e6014a9b0a216aebae7250f9863e9fc3:
KVM: X86: Narrow down the IPI fastpath to single target IPI (2020-03-26 05:44:21 -0400)
----------------------------------------------------------------
x86 bug fixes.
----------------------------------------------------------------
He Zhe (1):
KVM: LAPIC: Mark hrtimer for period or oneshot mode to expire in hard interrupt context
Nick Desaulniers (1):
KVM: VMX: don't allow memory operands for inline asm that modifies SP
Paolo Bonzini (2):
KVM: x86: remove bogus user-triggerable WARN_ON
KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available
Tom Lendacky (1):
KVM: SVM: Issue WBINVD after deactivating an SEV guest
Wanpeng Li (2):
KVM: LAPIC: Also cancel preemption timer when disarm LAPIC timer
KVM: X86: Narrow down the IPI fastpath to single target IPI
Documentation/virt/kvm/amd-memory-encryption.rst | 25 ++++++++++++++++++++++++
arch/x86/kvm/lapic.c | 8 +++++++-
arch/x86/kvm/svm.c | 25 ++++++++++++++++--------
arch/x86/kvm/vmx/vmx.c | 2 +-
arch/x86/kvm/x86.c | 6 ++++--
5 files changed, 54 insertions(+), 12 deletions(-)
Powered by blists - more mailing lists