linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Paolo Bonzini <pbonzini@redhat.com>
To: torvalds@linux-foundation.org
Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org
Subject: [GIT PULL] Second batch of KVM changes for 5.6 merge window
Date: Thu,  6 Feb 2020 16:10:31 +0100	[thread overview]
Message-ID: <1581001831-17609-1-git-send-email-pbonzini@redhat.com> (raw)

Linus,

The following changes since commit e813e65038389b66d2f8dd87588694caf8dc2923:

  Merge tag 'kvm-5.6-1' of git://git.kernel.org/pub/scm/virt/kvm/kvm (2020-01-31 09:30:41 -0800)

are available in the git repository at:


  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/kvm-5.6-2

for you to fetch changes up to a8be1ad01b795bd2a13297ddbaecdb956ab0efd0:

  KVM: vmx: delete meaningless vmx_decache_cr0_guest_bits() declaration (2020-02-05 16:44:06 +0100)

----------------------------------------------------------------
s390:
* fix register corruption
* ENOTSUPP/EOPNOTSUPP mixed
* reset cleanups/fixes
* selftests

x86:
* Bug fixes and cleanups
* AMD support for APIC virtualization even in combination with
  in-kernel PIT or IOAPIC.

MIPS:
* Compilation fix.

Generic:
* Fix refcount overflow for zero page.

----------------------------------------------------------------
Ben Gardon (2):
      kvm: mmu: Replace unsigned with unsigned int for PTE access
      kvm: mmu: Separate generating and setting mmio ptes

Christian Borntraeger (2):
      KVM: s390: ENOTSUPP -> EOPNOTSUPP fixups
      KVM: s390: do not clobber registers during guest reset/store status

Eric Hankland (1):
      KVM: x86: Fix perfctr WRMSR for running counters

Janosch Frank (4):
      KVM: s390: Cleanup initial cpu reset
      KVM: s390: Add new reset vcpu API
      selftests: KVM: Add fpu and one reg set/get library functions
      selftests: KVM: s390x: Add reset tests

Miaohe Lin (2):
      KVM: nVMX: delete meaningless nested_vmx_run() declaration
      KVM: vmx: delete meaningless vmx_decache_cr0_guest_bits() declaration

Paolo Bonzini (7):
      KVM: x86: remove get_enable_apicv from kvm_x86_ops
      KVM: SVM: allow AVIC without split irqchip
      KVM: x86: reorganize pvclock_gtod_data members
      KVM: x86: use raw clock values consistently
      KVM: SVM: relax conditions for allowing MSR_IA32_SPEC_CTRL accesses
      Merge tag 'kvm-s390-next-5.6-1' of git://git.kernel.org/.../kvms390/linux into HEAD
      x86: vmxfeatures: rename features for consistency with KVM and manual

Pierre Morel (1):
      selftests: KVM: testing the local IRQs resets

Sean Christopherson (5):
      KVM: x86: Take a u64 when checking for a valid dr7 value
      KVM: MIPS: Fix a build error due to referencing not-yet-defined function
      KVM: MIPS: Fold comparecount_func() into comparecount_wakeup()
      KVM: nVMX: Remove stale comment from nested_vmx_load_cr3()
      KVM: x86: Mark CR4.UMIP as reserved based on associated CPUID bit

Suravee Suthikulpanit (15):
      kvm: lapic: Introduce APICv update helper function
      kvm: x86: Introduce APICv inhibit reason bits
      kvm: x86: Add support for dynamic APICv activation
      kvm: x86: Add APICv (de)activate request trace points
      kvm: x86: svm: Add support to (de)activate posted interrupts
      KVM: svm: avic: Add support for dynamic setup/teardown of virtual APIC backing page
      kvm: x86: Introduce APICv x86 ops for checking APIC inhibit reasons
      kvm: x86: Introduce x86 ops hook for pre-update APICv
      svm: Add support for dynamic APICv
      kvm: x86: hyperv: Use APICv update request interface
      svm: Deactivate AVIC when launching guest with nested SVM support
      svm: Temporarily deactivate AVIC during ExtINT handling
      kvm: i8254: Deactivate APICv when using in-kernel PIT re-injection mode.
      kvm: ioapic: Refactor kvm_ioapic_update_eoi()
      kvm: ioapic: Lazy update IOAPIC EOI

Thadeu Lima de Souza Cascardo (1):
      x86/kvm: do not setup pv tlb flush when not paravirtualized

Vitaly Kuznetsov (2):
      x86/kvm/hyper-v: move VMX controls sanitization out of nested_enable_evmcs()
      x86/kvm/hyper-v: don't allow to turn on unsupported VMX controls for nested guests

Zhuang Yanying (1):
      KVM: fix overflow of zero page refcount with ksm running

 Documentation/virt/kvm/api.txt                 |  43 ++++++
 arch/mips/kvm/mips.c                           |  37 ++---
 arch/s390/include/asm/kvm_host.h               |   5 +
 arch/s390/kvm/interrupt.c                      |   6 +-
 arch/s390/kvm/kvm-s390.c                       |  92 +++++++-----
 arch/x86/include/asm/kvm_host.h                |  18 ++-
 arch/x86/include/asm/vmx.h                     |   6 +-
 arch/x86/include/asm/vmxfeatures.h             |   6 +-
 arch/x86/kernel/kvm.c                          |   3 +
 arch/x86/kvm/hyperv.c                          |   5 +-
 arch/x86/kvm/i8254.c                           |  12 ++
 arch/x86/kvm/ioapic.c                          | 149 ++++++++++++-------
 arch/x86/kvm/lapic.c                           |  22 ++-
 arch/x86/kvm/lapic.h                           |   1 +
 arch/x86/kvm/mmu/mmu.c                         |  37 +++--
 arch/x86/kvm/svm.c                             | 166 ++++++++++++++++++---
 arch/x86/kvm/trace.h                           |  19 +++
 arch/x86/kvm/vmx/evmcs.c                       |  85 ++++++++++-
 arch/x86/kvm/vmx/evmcs.h                       |   3 +
 arch/x86/kvm/vmx/nested.c                      |  13 +-
 arch/x86/kvm/vmx/pmu_intel.c                   |   9 +-
 arch/x86/kvm/vmx/vmx.c                         |  34 +++--
 arch/x86/kvm/x86.c                             | 139 +++++++++++------
 arch/x86/kvm/x86.h                             |   2 +-
 include/uapi/linux/kvm.h                       |   5 +
 tools/testing/selftests/kvm/Makefile           |   1 +
 tools/testing/selftests/kvm/include/kvm_util.h |   6 +
 tools/testing/selftests/kvm/lib/kvm_util.c     |  36 +++++
 tools/testing/selftests/kvm/s390x/resets.c     | 197 +++++++++++++++++++++++++
 virt/kvm/kvm_main.c                            |   1 +
 30 files changed, 925 insertions(+), 233 deletions(-)
 create mode 100644 tools/testing/selftests/kvm/s390x/resets.c

             reply	other threads:[~2020-02-06 15:10 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-02-06 15:10 Paolo Bonzini [this message]
2020-02-06 17:20 ` [GIT PULL] Second batch of KVM changes for 5.6 merge window pr-tracker-bot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1581001831-17609-1-git-send-email-pbonzini@redhat.com \
    --to=pbonzini@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).