* [GIT PULL] KVM fixes for Linux 6.16-rc6
@ 2025-07-10 10:49 Paolo Bonzini
2025-07-10 17:03 ` pr-tracker-bot
0 siblings, 1 reply; 2+ messages in thread
From: Paolo Bonzini @ 2025-07-10 10:49 UTC (permalink / raw)
To: torvalds; +Cc: linux-kernel, kvm
Linus,
The following changes since commit 25e8b1dd4883e6c251c3db5b347f3c8ae4ade921:
KVM: TDX: Exit to userspace for GetTdVmCallInfo (2025-06-20 13:55:47 -0400)
are available in the Git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to 4578a747f3c7950be3feb93c2db32eb597a3e55b:
KVM: x86: avoid underflow when scaling TSC frequency (2025-07-09 13:52:50 -0400)
Many patches, pretty much all of them small, that accumulated while I
was on vacation.
----------------------------------------------------------------
ARM:
- Remove the last leftovers of the ill-fated FPSIMD host state
mapping at EL2 stage-1
- Fix unexpected advertisement to the guest of unimplemented S2 base
granule sizes
- Gracefully fail initialising pKVM if the interrupt controller isn't
GICv3
- Also gracefully fail initialising pKVM if the carveout allocation
fails
- Fix the computing of the minimum MMIO range required for the host on
stage-2 fault
- Fix the generation of the GICv3 Maintenance Interrupt in nested mode
x86:
- Reject SEV{-ES} intra-host migration if one or more vCPUs are actively
being created, so as not to create a non-SEV{-ES} vCPU in an SEV{-ES} VM.
- Use a pre-allocated, per-vCPU buffer for handling de-sparsification of
vCPU masks in Hyper-V hypercalls; fixes a "stack frame too large" issue.
- Allow out-of-range/invalid Xen event channel ports when configuring IRQ
routing, to avoid dictating a specific ioctl() ordering to userspace.
- Conditionally reschedule when setting memory attributes to avoid soft
lockups when userspace converts huge swaths of memory to/from private.
- Add back MWAIT as a required feature for the MONITOR/MWAIT selftest.
- Add a missing field in struct sev_data_snp_launch_start that resulted in
the guest-visible workarounds field being filled at the wrong offset.
- Skip non-canonical address when processing Hyper-V PV TLB flushes to avoid
VM-Fail on INVVPID.
- Advertise supported TDX TDVMCALLs to userspace.
- Pass SetupEventNotifyInterrupt arguments to userspace.
- Fix TSC frequency underflow.
----------------------------------------------------------------
Binbin Wu (1):
Documentation: KVM: Fix unexpected unindent warnings
Chenyi Qiang (1):
KVM: selftests: Add back the missing check of MONITOR/MWAIT availability
David Woodhouse (1):
KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table.
Liam Merwick (1):
KVM: Allow CPU to reschedule while setting per-page memory attributes
Manuel Andreas (1):
KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush
Marc Zyngier (1):
KVM: arm64: Fix handling of FEAT_GTG for unimplemented granule sizes
Mark Rutland (1):
KVM: arm64: Remove kvm_arch_vcpu_run_map_fp()
Mostafa Saleh (1):
KVM: arm64: Fix error path in init_hyp_mode()
Nikunj A Dadhania (1):
KVM: SVM: Add missing member in SNP_LAUNCH_START command structure
Paolo Bonzini (6):
KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt
KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities
Merge tag 'kvmarm-fixes-6.16-4' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
Merge tag 'kvmarm-fixes-6.16-5' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
Merge tag 'kvm-x86-fixes-6.16-rcN' of https://github.com/kvm-x86/linux into HEAD
KVM: x86: avoid underflow when scaling TSC frequency
Quentin Perret (2):
KVM: arm64: Adjust range correctly during host stage-2 faults
KVM: arm64: Don't free hyp pages with pKVM on GICv2
Sean Christopherson (3):
KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
KVM: SVM: Initialize vmsa_pa in VMCB to INVALID_PAGE if VMSA page is NULL
KVM: x86/hyper-v: Use preallocated per-vCPU buffer for de-sparsified vCPU masks
Wei-Lin Chang (1):
KVM: arm64: nv: Fix MI line level calculation in vgic_v3_nested_update_mi()
Documentation/virt/kvm/api.rst | 35 +++++++++++++---------
Documentation/virt/kvm/x86/intel-tdx.rst | 15 +++++++++-
arch/arm64/include/asm/kvm_host.h | 1 -
arch/arm64/kvm/arm.c | 16 ++++++----
arch/arm64/kvm/fpsimd.c | 26 ----------------
arch/arm64/kvm/hyp/nvhe/mem_protect.c | 20 ++++++++-----
arch/arm64/kvm/nested.c | 26 ++++++++++++++--
arch/arm64/kvm/vgic/vgic-v3-nested.c | 4 +--
arch/x86/include/asm/kvm_host.h | 7 ++++-
arch/x86/include/asm/shared/tdx.h | 1 +
arch/x86/include/uapi/asm/kvm.h | 8 ++++-
arch/x86/kvm/hyperv.c | 5 +++-
arch/x86/kvm/svm/sev.c | 12 ++++++--
arch/x86/kvm/vmx/tdx.c | 30 +++++++++++++++++++
arch/x86/kvm/x86.c | 4 ++-
arch/x86/kvm/xen.c | 15 ++++++++--
include/linux/psp-sev.h | 2 ++
include/uapi/linux/kvm.h | 4 +++
.../testing/selftests/kvm/x86/monitor_mwait_test.c | 1 +
virt/kvm/kvm_main.c | 3 ++
20 files changed, 165 insertions(+), 70 deletions(-)
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [GIT PULL] KVM fixes for Linux 6.16-rc6
2025-07-10 10:49 [GIT PULL] KVM fixes for Linux 6.16-rc6 Paolo Bonzini
@ 2025-07-10 17:03 ` pr-tracker-bot
0 siblings, 0 replies; 2+ messages in thread
From: pr-tracker-bot @ 2025-07-10 17:03 UTC (permalink / raw)
To: Paolo Bonzini; +Cc: torvalds, linux-kernel, kvm
The pull request you sent on Thu, 10 Jul 2025 06:49:36 -0400:
> https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/73d7cf07109e79b093d1a1fb57a88d4048cd9b4b
Thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/prtracker.html
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2025-07-10 17:02 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-07-10 10:49 [GIT PULL] KVM fixes for Linux 6.16-rc6 Paolo Bonzini
2025-07-10 17:03 ` pr-tracker-bot
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).