[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CABgObfaF7Usi=UfreXDwRdnjXZ-zq4PT4bumOXb_Up1cD_UD9A@mail.gmail.com>
Date: Tue, 8 Jul 2025 16:53:24 +0200
From: Paolo Bonzini <pbonzini@...hat.com>
To: Sean Christopherson <seanjc@...gle.com>
Cc: kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [GIT PULL] KVM: x86: Fixes for 6.16-rcN
On Fri, Jun 27, 2025 at 12:31 AM Sean Christopherson <seanjc@...gle.com> wrote:
>
> Please pull a random smattering of fixes for 6.16. Note, the SEV-ES intra-host
> migration commits received your "Queued, thanks", but they never showed up in
> kvm.git.
Ouch, sorry about htat.
> Oh, and there's one more fix that is probably a candidate for 6.16, but I'm
> waiting for a response from the submitter, as I think we can go with a more
> targeted fix: https://lore.kernel.org/all/aFwLpyDYOsHUtCn-@google.com
Yes, I agree with you there. I see no reply from Yuntao, so let's
decide tomorrow what to do about it.
> https://github.com/kvm-x86/linux.git tags/kvm-x86-fixes-6.16-rcN
>
> for you to fetch changes up to fa787ac07b3ceb56dd88a62d1866038498e96230:
>
> KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (2025-06-25 09:15:24 -0700)
Done.
Paolo
> ----------------------------------------------------------------
> KVM x86 fixes for 6.16-rcN
>
> - Reject SEV{-ES} intra-host migration if one or more vCPUs are actively
> being created so as not to create a non-SEV{-ES} vCPU in an SEV{-ES} VM.
>
> - Use a pre-allocated, per-vCPU buffer for handling de-sparsified vCPU masks
> when emulating Hyper-V hypercalls to fix a "stack frame too large" issue.
>
> - Allow out-of-range/invalid Xen event channel ports when configuring IRQ
> routing to avoid dictating a specific ioctl() ordering to userspace.
>
> - Conditionally reschedule when setting memory attributes to avoid soft
> lockups when userspace converts huge swaths of memory to/from private.
>
> - Add back MWAIT as a required feature for the MONITOR/MWAIT selftest.
>
> - Add a missing field in struct sev_data_snp_launch_start that resulted in
> the guest-visible workarounds field being filled at the wrong offset.
>
> - Skip non-canonical address when processing Hyper-V PV TLB flushes to avoid
> VM-Fail on INVVPID.
>
> ----------------------------------------------------------------
> Binbin Wu (1):
> Documentation: KVM: Fix unexpected unindent warnings
>
> Chenyi Qiang (1):
> KVM: selftests: Add back the missing check of MONITOR/MWAIT availability
>
> David Woodhouse (1):
> KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table.
>
> Liam Merwick (1):
> KVM: Allow CPU to reschedule while setting per-page memory attributes
>
> Manuel Andreas (1):
> KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush
>
> Nikunj A Dadhania (1):
> KVM: SVM: Add missing member in SNP_LAUNCH_START command structure
>
> Sean Christopherson (3):
> KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
> KVM: SVM: Initialize vmsa_pa in VMCB to INVALID_PAGE if VMSA page is NULL
> KVM: x86/hyper-v: Use preallocated per-vCPU buffer for de-sparsified vCPU masks
>
> Documentation/virt/kvm/api.rst | 28 +++++++++++-----------
> arch/x86/include/asm/kvm_host.h | 7 +++++-
> arch/x86/kvm/hyperv.c | 5 +++-
> arch/x86/kvm/svm/sev.c | 12 ++++++++--
> arch/x86/kvm/xen.c | 15 ++++++++++--
> include/linux/psp-sev.h | 2 ++
> .../testing/selftests/kvm/x86/monitor_mwait_test.c | 1 +
> virt/kvm/kvm_main.c | 3 +++
> 8 files changed, 53 insertions(+), 20 deletions(-)
>
Powered by blists - more mailing lists