[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20200913081125.28980-1-pbonzini@redhat.com>
Date: Sun, 13 Sep 2020 04:11:25 -0400
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM changes for Linux 5.9-rc5
Linus,
The following changes since commit b5331379bc62611d1026173a09c73573384201d9:
KVM: arm64: Only reschedule if MMU_NOTIFIER_RANGE_BLOCKABLE is not set (2020-08-21 18:06:43 -0400)
are available in the Git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to 37f66bbef0920429b8cb5eddba849ec4308a9f8e:
KVM: emulator: more strict rsm checks. (2020-09-12 12:22:55 -0400)
A bit on the bigger side, mostly due to me being on vacation, then busy,
then on parental leave, but there's nothing worrisome.
----------------------------------------------------------------
ARM:
- Multiple stolen time fixes, with a new capability to match x86
- Fix for hugetlbfs mappings when PUD and PMD are the same level
- Fix for hugetlbfs mappings when PTE mappings are enforced
(dirty logging, for example)
- Fix tracing output of 64bit values
x86:
- nSVM state restore fixes
- Async page fault fixes
- Lots of small fixes everywhere
----------------------------------------------------------------
Alexandru Elisei (1):
KVM: arm64: Update page shift if stage 2 block mapping not supported
Andrew Jones (6):
KVM: arm64: pvtime: steal-time is only supported when configured
KVM: arm64: pvtime: Fix potential loss of stolen time
KVM: arm64: Drop type input from kvm_put_guest
KVM: arm64: pvtime: Fix stolen time accounting across migration
KVM: Documentation: Minor fixups
arm64/x86: KVM: Introduce steal-time cap
Chenyi Qiang (1):
KVM: nVMX: Fix the update value of nested load IA32_PERF_GLOBAL_CTRL control
David Rientjes (1):
KVM: SVM: Periodically schedule when unregistering regions on destroy
Haiwei Li (1):
KVM: Check the allocation of pv cpu mask
Huacai Chen (1):
KVM: MIPS: Change the definition of kvm type
Lai Jiangshan (1):
kvm x86/mmu: use KVM_REQ_MMU_SYNC to sync when needed
Marc Zyngier (2):
KVM: arm64: Do not try to map PUDs when they are folded into PMD
KVM: arm64: Fix address truncation in traces
Maxim Levitsky (4):
SVM: nSVM: correctly restore GIF on vmexit from nesting after migration
SVM: nSVM: setup nested msr permission bitmap on nested state load
KVM: nSVM: more strict SMM checks when returning to nested guest
KVM: emulator: more strict rsm checks.
Paolo Bonzini (1):
Merge tag 'kvmarm-fixes-5.9-1' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD
Peter Shier (1):
KVM: nVMX: Update VMCS02 when L2 PAE PDPTE updates detected
Rustam Kovhaev (1):
KVM: fix memory leak in kvm_io_bus_unregister_dev()
Vitaly Kuznetsov (3):
KVM: x86: always allow writing '0' to MSR_KVM_ASYNC_PF_EN
x86/kvm: properly use DEFINE_IDTENTRY_SYSVEC() macro
x86/kvm: don't forget to ACK async PF IRQ
Wanpeng Li (2):
KVM: SVM: avoid emulation with stale next_rip
KVM: VMX: Don't freeze guest when event delivery causes an APIC-access exit
Documentation/virt/kvm/api.rst | 22 ++++++++++++++++++----
arch/arm64/include/asm/kvm_host.h | 2 +-
arch/arm64/kvm/arm.c | 3 +++
arch/arm64/kvm/mmu.c | 8 +++++++-
arch/arm64/kvm/pvtime.c | 29 +++++++++++++----------------
arch/arm64/kvm/trace_arm.h | 16 ++++++++--------
arch/arm64/kvm/trace_handle_exit.h | 6 +++---
arch/mips/kvm/mips.c | 2 ++
arch/x86/kernel/kvm.c | 26 ++++++++++++++++++++------
arch/x86/kvm/emulate.c | 22 +++++++++++++++++-----
arch/x86/kvm/mmu/mmu.c | 2 +-
arch/x86/kvm/svm/nested.c | 7 ++++++-
arch/x86/kvm/svm/sev.c | 1 +
arch/x86/kvm/svm/svm.c | 36 +++++++++++++++++++++---------------
arch/x86/kvm/vmx/nested.c | 10 +++++++++-
arch/x86/kvm/vmx/vmx.c | 5 +++--
arch/x86/kvm/vmx/vmx.h | 1 +
arch/x86/kvm/x86.c | 5 ++++-
include/linux/kvm_host.h | 31 ++++++++++++++++++++++++++-----
include/uapi/linux/kvm.h | 6 ++++--
virt/kvm/kvm_main.c | 21 ++++++++++++---------
21 files changed, 180 insertions(+), 81 deletions(-)
Powered by blists - more mailing lists