[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20211205081339.8716-1-pbonzini@redhat.com>
Date: Sun, 5 Dec 2021 03:13:39 -0500
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] Second batch of KVM fixes for 5.16-rc4
Linus,
The following changes since commit 7cfc5c653b07782e7059527df8dc1e3143a7591e:
KVM: fix avic_set_running for preemptable kernels (2021-11-30 07:40:48 -0500)
are available in the Git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to ad5b353240c8837109d1bcc6c3a9a501d7f6a960:
KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failure (2021-12-05 03:02:04 -0500)
----------------------------------------------------------------
* Static analysis fix
* New SEV-ES protocol for communicating invalid VMGEXIT requests
* Ensure APICv is considered inactive if there is no APIC
* Fix reserved bits for AMD PerfEvtSeln register
----------------------------------------------------------------
Dan Carpenter (1):
KVM: VMX: Set failure code in prepare_vmcs02()
Like Xu (1):
KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register
Paolo Bonzini (1):
KVM: ensure APICv is considered inactive if there is no APIC
Sean Christopherson (3):
KVM: x86/mmu: Retry page fault if root is invalidated by memslot update
KVM: SEV: Return appropriate error codes if SEV-ES scratch setup fails
KVM: SEV: Fall back to vmalloc for SEV-ES scratch area if necessary
Tom Lendacky (1):
KVM: SVM: Do not terminate SEV-ES guests on GHCB validation failure
arch/x86/include/asm/kvm_host.h | 1 +
arch/x86/include/asm/sev-common.h | 11 ++++
arch/x86/kvm/mmu/mmu.c | 23 ++++++++-
arch/x86/kvm/mmu/paging_tmpl.h | 3 +-
arch/x86/kvm/svm/avic.c | 1 +
arch/x86/kvm/svm/pmu.c | 2 +-
arch/x86/kvm/svm/sev.c | 102 ++++++++++++++++++++++----------------
arch/x86/kvm/vmx/nested.c | 4 +-
arch/x86/kvm/vmx/vmx.c | 1 +
arch/x86/kvm/x86.c | 9 ++--
10 files changed, 106 insertions(+), 51 deletions(-)
Powered by blists - more mailing lists