[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250710104936.232026-1-pbonzini@redhat.com>
Date: Thu, 10 Jul 2025 06:49:36 -0400
From: Paolo Bonzini <pbonzini@...hat.com>
To: torvalds@...ux-foundation.org
Cc: linux-kernel@...r.kernel.org,
kvm@...r.kernel.org
Subject: [GIT PULL] KVM fixes for Linux 6.16-rc6
Linus,
The following changes since commit 25e8b1dd4883e6c251c3db5b347f3c8ae4ade921:
KVM: TDX: Exit to userspace for GetTdVmCallInfo (2025-06-20 13:55:47 -0400)
are available in the Git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to 4578a747f3c7950be3feb93c2db32eb597a3e55b:
KVM: x86: avoid underflow when scaling TSC frequency (2025-07-09 13:52:50 -0400)
Many patches, pretty much all of them small, that accumulated while I
was on vacation.
----------------------------------------------------------------
ARM:
- Remove the last leftovers of the ill-fated FPSIMD host state
mapping at EL2 stage-1
- Fix unexpected advertisement to the guest of unimplemented S2 base
granule sizes
- Gracefully fail initialising pKVM if the interrupt controller isn't
GICv3
- Also gracefully fail initialising pKVM if the carveout allocation
fails
- Fix the computing of the minimum MMIO range required for the host on
stage-2 fault
- Fix the generation of the GICv3 Maintenance Interrupt in nested mode
x86:
- Reject SEV{-ES} intra-host migration if one or more vCPUs are actively
being created, so as not to create a non-SEV{-ES} vCPU in an SEV{-ES} VM.
- Use a pre-allocated, per-vCPU buffer for handling de-sparsification of
vCPU masks in Hyper-V hypercalls; fixes a "stack frame too large" issue.
- Allow out-of-range/invalid Xen event channel ports when configuring IRQ
routing, to avoid dictating a specific ioctl() ordering to userspace.
- Conditionally reschedule when setting memory attributes to avoid soft
lockups when userspace converts huge swaths of memory to/from private.
- Add back MWAIT as a required feature for the MONITOR/MWAIT selftest.
- Add a missing field in struct sev_data_snp_launch_start that resulted in
the guest-visible workarounds field being filled at the wrong offset.
- Skip non-canonical address when processing Hyper-V PV TLB flushes to avoid
VM-Fail on INVVPID.
- Advertise supported TDX TDVMCALLs to userspace.
- Pass SetupEventNotifyInterrupt arguments to userspace.
- Fix TSC frequency underflow.
----------------------------------------------------------------
Binbin Wu (1):
Documentation: KVM: Fix unexpected unindent warnings
Chenyi Qiang (1):
KVM: selftests: Add back the missing check of MONITOR/MWAIT availability
David Woodhouse (1):
KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table.
Liam Merwick (1):
KVM: Allow CPU to reschedule while setting per-page memory attributes
Manuel Andreas (1):
KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush
Marc Zyngier (1):
KVM: arm64: Fix handling of FEAT_GTG for unimplemented granule sizes
Mark Rutland (1):
KVM: arm64: Remove kvm_arch_vcpu_run_map_fp()
Mostafa Saleh (1):
KVM: arm64: Fix error path in init_hyp_mode()
Nikunj A Dadhania (1):
KVM: SVM: Add missing member in SNP_LAUNCH_START command structure
Paolo Bonzini (6):
KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt
KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities
Merge tag 'kvmarm-fixes-6.16-4' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
Merge tag 'kvmarm-fixes-6.16-5' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
Merge tag 'kvm-x86-fixes-6.16-rcN' of https://github.com/kvm-x86/linux into HEAD
KVM: x86: avoid underflow when scaling TSC frequency
Quentin Perret (2):
KVM: arm64: Adjust range correctly during host stage-2 faults
KVM: arm64: Don't free hyp pages with pKVM on GICv2
Sean Christopherson (3):
KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
KVM: SVM: Initialize vmsa_pa in VMCB to INVALID_PAGE if VMSA page is NULL
KVM: x86/hyper-v: Use preallocated per-vCPU buffer for de-sparsified vCPU masks
Wei-Lin Chang (1):
KVM: arm64: nv: Fix MI line level calculation in vgic_v3_nested_update_mi()
Documentation/virt/kvm/api.rst | 35 +++++++++++++---------
Documentation/virt/kvm/x86/intel-tdx.rst | 15 +++++++++-
arch/arm64/include/asm/kvm_host.h | 1 -
arch/arm64/kvm/arm.c | 16 ++++++----
arch/arm64/kvm/fpsimd.c | 26 ----------------
arch/arm64/kvm/hyp/nvhe/mem_protect.c | 20 ++++++++-----
arch/arm64/kvm/nested.c | 26 ++++++++++++++--
arch/arm64/kvm/vgic/vgic-v3-nested.c | 4 +--
arch/x86/include/asm/kvm_host.h | 7 ++++-
arch/x86/include/asm/shared/tdx.h | 1 +
arch/x86/include/uapi/asm/kvm.h | 8 ++++-
arch/x86/kvm/hyperv.c | 5 +++-
arch/x86/kvm/svm/sev.c | 12 ++++++--
arch/x86/kvm/vmx/tdx.c | 30 +++++++++++++++++++
arch/x86/kvm/x86.c | 4 ++-
arch/x86/kvm/xen.c | 15 ++++++++--
include/linux/psp-sev.h | 2 ++
include/uapi/linux/kvm.h | 4 +++
.../testing/selftests/kvm/x86/monitor_mwait_test.c | 1 +
virt/kvm/kvm_main.c | 3 ++
20 files changed, 165 insertions(+), 70 deletions(-)
Powered by blists - more mailing lists