[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20210126175612.1533411-1-pbonzini@redhat.com>
Date: Tue, 26 Jan 2021 12:56:12 -0500
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for Linux 5.11-rc5
Linus,
The following changes since commit 7c53f6b671f4aba70ff15e1b05148b10d58c2837:
Linux 5.11-rc3 (2021-01-10 14:34:50 -0800)
are available in the Git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to 9a78e15802a87de2b08dfd1bd88e855201d2c8fa:
KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX (2021-01-25 18:54:09 -0500)
----------------------------------------------------------------
* x86 bugfixes
* Documentation fixes
* Avoid performance regression due to SEV-ES patches
ARM:
- Don't allow tagged pointers to point to memslots
- Filter out ARMv8.1+ PMU events on v8.0 hardware
- Hide PMU registers from userspace when no PMU is configured
- More PMU cleanups
- Don't try to handle broken PSCI firmware
- More sys_reg() to reg_to_encoding() conversions
----------------------------------------------------------------
Alexandru Elisei (1):
KVM: arm64: Use the reg_to_encoding() macro instead of sys_reg()
David Brazdil (1):
KVM: arm64: Allow PSCI SYSTEM_OFF/RESET to return
Jay Zhou (1):
KVM: x86: get smi pending status correctly
Like Xu (2):
KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh()
KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[]
Lorenzo Brescia (1):
kvm: tracing: Fix unmatched kvm_entry and kvm_exit events
Marc Zyngier (4):
KVM: arm64: Hide PMU registers from userspace when not available
KVM: arm64: Simplify handling of absent PMU system registers
KVM: arm64: Filter out v8.1+ events on v8.0 HW
KVM: Forbid the use of tagged userspace addresses for memslots
Maxim Levitsky (1):
KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration
Paolo Bonzini (2):
Merge tag 'kvmarm-fixes-5.11-2' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD
KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX
Quentin Perret (1):
KVM: Documentation: Fix spec for KVM_CAP_ENABLE_CAP_VM
Sean Christopherson (3):
KVM: x86: Add more protection against undefined behavior in rsvd_bits()
KVM: SVM: Unconditionally sync GPRs to GHCB on VMRUN of SEV-ES guest
KVM: x86: Revert "KVM: x86: Mark GPRs dirty when written"
Steven Price (1):
KVM: arm64: Compute TPIDR_EL2 ignoring MTE tag
Zenghui Yu (1):
KVM: Documentation: Update description of KVM_{GET,CLEAR}_DIRTY_LOG
Documentation/virt/kvm/api.rst | 21 ++++----
arch/arm64/kvm/arm.c | 3 +-
arch/arm64/kvm/hyp/nvhe/psci-relay.c | 13 ++---
arch/arm64/kvm/pmu-emul.c | 10 ++--
arch/arm64/kvm/sys_regs.c | 93 ++++++++++++++++++++++--------------
arch/x86/kvm/kvm_cache_regs.h | 51 ++++++++++----------
arch/x86/kvm/mmu.h | 9 +++-
arch/x86/kvm/svm/nested.c | 3 ++
arch/x86/kvm/svm/sev.c | 15 +++---
arch/x86/kvm/svm/svm.c | 2 +
arch/x86/kvm/vmx/nested.c | 44 ++++++++++++-----
arch/x86/kvm/vmx/pmu_intel.c | 6 ++-
arch/x86/kvm/vmx/vmx.c | 2 +
arch/x86/kvm/x86.c | 11 +++--
virt/kvm/kvm_main.c | 1 +
15 files changed, 172 insertions(+), 112 deletions(-)
Powered by blists - more mailing lists