Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Pull kvm fixes from Paolo Bonzini: "A bit late... I got sidetracked by back-from-vacation routines and conferences. But most of these patches are already a few weeks old and things look more calm on the mailing list than what this pull request would suggest. x86: - missing TLB flush - nested virtualization fixes for SMM (secure boot on nested hypervisor) and other nested SVM fixes - syscall fuzzing fixes - live migration fix for AMD SEV - mirror VMs now work for SEV-ES too - fixes for reset - possible out-of-bounds access in IOAPIC emulation - fix enlightened VMCS on Windows 2022 ARM: - Add missing FORCE target when building the EL2 object - Fix a PMU probe regression on some platforms Generic: - KCSAN fixes selftests: - random fixes, mostly for clang compilation" * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (43 commits) selftests: KVM: Explicitly use movq to read xmm registers selftests: KVM: Call ucall_init when setting up in rseq_test KVM: Remove tlbs_dirty KVM: X86: Synchronize the shadow pagetable before link it KVM: X86: Fix missed remote tlb flush in rmap_write_protect() KVM: x86: nSVM: don't copy virt_ext from vmcb12 KVM: x86: nSVM: test eax for 4K alignment for GP errata workaround KVM: x86: selftests: test simultaneous uses of V_IRQ from L1 and L0 KVM: x86: nSVM: restore int_vector in svm_clear_vintr kvm: x86: Add AMD PMU MSRs to msrs_to_save_all[] KVM: x86: nVMX: re-evaluate emulation_required on nested VM exit KVM: x86: nVMX: don't fail nested VM entry on invalid guest state if !from_vmentry KVM: x86: VMX: synthesize invalid VM exit when emulating invalid guest state KVM: x86: nSVM: refactor svm_leave_smm and smm_enter_smm KVM: x86: SVM: call KVM_REQ_GET_NESTED_STATE_PAGES on exit from SMM mode KVM: x86: reset pdptrs_from_userspace when exiting smm KVM: x86: nSVM: restore the L1 host state prior to resuming nested guest on SMM exit KVM: nVMX: Filter out all unsupported controls when eVMCS was activated KVM: KVM: Use cpumask_available() to check for NULL cpumask when kicking vCPUs KVM: Clean up benign vcpu->cpu data races when kicking vCPUs ...
Showing
- arch/arm64/kvm/hyp/nvhe/Makefile 1 addition, 1 deletionarch/arm64/kvm/hyp/nvhe/Makefile
- arch/arm64/kvm/perf.c 0 additions, 3 deletionsarch/arm64/kvm/perf.c
- arch/arm64/kvm/pmu-emul.c 8 additions, 1 deletionarch/arm64/kvm/pmu-emul.c
- arch/s390/kvm/interrupt.c 2 additions, 2 deletionsarch/s390/kvm/interrupt.c
- arch/s390/kvm/kvm-s390.c 1 addition, 1 deletionarch/s390/kvm/kvm-s390.c
- arch/s390/kvm/kvm-s390.h 1 addition, 1 deletionarch/s390/kvm/kvm-s390.h
- arch/x86/include/asm/kvm_page_track.h 1 addition, 1 deletionarch/x86/include/asm/kvm_page_track.h
- arch/x86/kvm/emulate.c 1 addition, 1 deletionarch/x86/kvm/emulate.c
- arch/x86/kvm/hyperv.c 3 additions, 4 deletionsarch/x86/kvm/hyperv.c
- arch/x86/kvm/hyperv.h 1 addition, 1 deletionarch/x86/kvm/hyperv.h
- arch/x86/kvm/ioapic.c 5 additions, 5 deletionsarch/x86/kvm/ioapic.c
- arch/x86/kvm/mmu/mmu.c 10 additions, 7 deletionsarch/x86/kvm/mmu/mmu.c
- arch/x86/kvm/mmu/page_track.c 2 additions, 2 deletionsarch/x86/kvm/mmu/page_track.c
- arch/x86/kvm/mmu/paging_tmpl.h 23 additions, 23 deletionsarch/x86/kvm/mmu/paging_tmpl.h
- arch/x86/kvm/svm/nested.c 6 additions, 4 deletionsarch/x86/kvm/svm/nested.c
- arch/x86/kvm/svm/sev.c 62 additions, 30 deletionsarch/x86/kvm/svm/sev.c
- arch/x86/kvm/svm/svm.c 74 additions, 63 deletionsarch/x86/kvm/svm/svm.c
- arch/x86/kvm/svm/svm.h 2 additions, 1 deletionarch/x86/kvm/svm/svm.h
- arch/x86/kvm/vmx/evmcs.c 9 additions, 3 deletionsarch/x86/kvm/vmx/evmcs.c
- arch/x86/kvm/vmx/nested.c 15 additions, 9 deletionsarch/x86/kvm/vmx/nested.c
Loading
Please register or sign in to comment