All of lore.kernel.org
 help / color / mirror / Atom feed
From: Paolo Bonzini <pbonzini@redhat.com>
To: torvalds@linux-foundation.org
Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org
Subject: [GIT PULL] Second batch of KVM changes for Linux 5.12
Date: Thu, 25 Feb 2021 15:59:12 -0500	[thread overview]
Message-ID: <20210225205912.61184-1-pbonzini@redhat.com> (raw)

Linus,

The following changes since commit 8c6e67bec3192f16fa624203c8131e10cc4814ba:

  Merge tag 'kvmarm-5.12' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD (2021-02-12 11:23:44 -0500)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 2df8d3807ce7f75bb975f1aeae8fc6757527c62d:

  KVM: SVM: Fix nested VM-Exit on #GP interception handling (2021-02-25 05:13:05 -0500)

----------------------------------------------------------------
x86:
- take into account HVA before retrying on MMU notifier race
- fixes for nested AMD guests without NPT
- allow INVPCID in guest without PCID
- disable PML in hardware when not in use
- MMU code cleanups

----------------------------------------------------------------
David Stevens (1):
      KVM: x86/mmu: Consider the hva in mmu_notifier retry

Ignacio Alvarado (1):
      selftests: kvm: add hardware_disable test

Like Xu (1):
      KVM: vmx/pmu: Fix dummy check if lbr_desc->event is created

Lukas Bulwahn (1):
      KVM: Documentation: rectify rst markup in KVM_GET_SUPPORTED_HV_CPUID

Makarand Sonare (1):
      KVM: VMX: Dynamically enable/disable PML based on memslot dirty logging

Maxim Levitsky (2):
      KVM: VMX: read idt_vectoring_info a bit earlier
      KVM: nSVM: move nested vmrun tracepoint to enter_svm_guest_mode

Paolo Bonzini (4):
      selftests: kvm: avoid uninitialized variable warning
      KVM: nSVM: fix running nested guests when npt=0
      KVM: nVMX: no need to undo inject_page_fault change on nested vmexit
      KVM: nSVM: prepare guest save area while is_guest_mode is true

Sean Christopherson (17):
      KVM: SVM: Intercept INVPCID when it's disabled to inject #UD
      KVM: x86: Advertise INVPCID by default
      KVM: VMX: Allow INVPCID in guest without PCID
      KVM: x86/mmu: Expand collapsible SPTE zap for TDP MMU to ZONE_DEVICE and HugeTLB pages
      KVM: x86/mmu: Split out max mapping level calculation to helper
      KVM: x86/mmu: Pass the memslot to the rmap callbacks
      KVM: x86/mmu: Consult max mapping level when zapping collapsible SPTEs
      KVM: nVMX: Disable PML in hardware when running L2
      KVM: x86/mmu: Expand on the comment in kvm_vcpu_ad_need_write_protect()
      KVM: x86/mmu: Make dirty log size hook (PML) a value, not a function
      KVM: x86: Move MMU's PML logic to common code
      KVM: x86: Further clarify the logic and comments for toggling log dirty
      KVM: x86/mmu: Don't set dirty bits when disabling dirty logging w/ PML
      KVM: x86: Fold "write-protect large" use case into generic write-protect
      KVM: x86/mmu: Remove a variety of unnecessary exports
      KVM: x86/mmu: Skip mmu_notifier check when handling MMIO page fault
      KVM: SVM: Fix nested VM-Exit on #GP interception handling

 Documentation/virt/kvm/api.rst                     |   2 +
 arch/powerpc/kvm/book3s_64_mmu_hv.c                |   2 +-
 arch/powerpc/kvm/book3s_64_mmu_radix.c             |   2 +-
 arch/x86/include/asm/kvm-x86-ops.h                 |   6 +-
 arch/x86/include/asm/kvm_host.h                    |  36 +---
 arch/x86/kvm/cpuid.c                               |   2 +-
 arch/x86/kvm/mmu/mmu.c                             | 224 ++++++++-------------
 arch/x86/kvm/mmu/mmu_internal.h                    |   7 +-
 arch/x86/kvm/mmu/paging_tmpl.h                     |  14 +-
 arch/x86/kvm/mmu/tdp_mmu.c                         |  66 +-----
 arch/x86/kvm/mmu/tdp_mmu.h                         |   3 +-
 arch/x86/kvm/svm/nested.c                          |  48 +++--
 arch/x86/kvm/svm/svm.c                             |  22 +-
 arch/x86/kvm/vmx/nested.c                          |  37 ++--
 arch/x86/kvm/vmx/pmu_intel.c                       |   4 +-
 arch/x86/kvm/vmx/vmx.c                             | 112 ++++-------
 arch/x86/kvm/vmx/vmx.h                             |   2 +
 arch/x86/kvm/x86.c                                 | 143 +++++++------
 include/linux/kvm_host.h                           |  25 ++-
 tools/testing/selftests/kvm/.gitignore             |   1 +
 tools/testing/selftests/kvm/Makefile               |   1 +
 .../testing/selftests/kvm/hardware_disable_test.c  | 165 +++++++++++++++
 tools/testing/selftests/kvm/lib/x86_64/processor.c |   3 +-
 virt/kvm/kvm_main.c                                |  29 ++-
 24 files changed, 533 insertions(+), 423 deletions(-)
 create mode 100644 tools/testing/selftests/kvm/hardware_disable_test.c


             reply	other threads:[~2021-02-25 21:11 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-02-25 20:59 Paolo Bonzini [this message]
2021-02-26 18:32 ` [GIT PULL] Second batch of KVM changes for Linux 5.12 pr-tracker-bot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20210225205912.61184-1-pbonzini@redhat.com \
    --to=pbonzini@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.