kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [GIT PULL] KVM: x86: Fixes for 6.16-rcN
@ 2025-06-26 22:31 Sean Christopherson
  2025-07-08 14:53 ` Paolo Bonzini
  0 siblings, 1 reply; 2+ messages in thread
From: Sean Christopherson @ 2025-06-26 22:31 UTC (permalink / raw)
  To: Paolo Bonzini; +Cc: kvm, linux-kernel, Sean Christopherson

Please pull a random smattering of fixes for 6.16.  Note, the SEV-ES intra-host
migration commits received your "Queued, thanks", but they never showed up in
kvm.git.

Oh, and there's one more fix that is probably a candidate for 6.16, but I'm
waiting for a response from the submitter, as I think we can go with a more
targeted fix: https://lore.kernel.org/all/aFwLpyDYOsHUtCn-@google.com

The following changes since commit 28224ef02b56fceee2c161fe2a49a0bb197e44f5:

  KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (2025-06-20 14:20:20 -0400)

are available in the Git repository at:

  https://github.com/kvm-x86/linux.git tags/kvm-x86-fixes-6.16-rcN

for you to fetch changes up to fa787ac07b3ceb56dd88a62d1866038498e96230:

  KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (2025-06-25 09:15:24 -0700)

----------------------------------------------------------------
KVM x86 fixes for 6.16-rcN

 - Reject SEV{-ES} intra-host migration if one or more vCPUs are actively
   being created so as not to create a non-SEV{-ES} vCPU in an SEV{-ES} VM.

 - Use a pre-allocated, per-vCPU buffer for handling de-sparsified vCPU masks
   when emulating Hyper-V hypercalls to fix a "stack frame too large" issue.

 - Allow out-of-range/invalid Xen event channel ports when configuring IRQ
   routing to avoid dictating a specific ioctl() ordering to userspace.

 - Conditionally reschedule when setting memory attributes to avoid soft
   lockups when userspace converts huge swaths of memory to/from private.

 - Add back MWAIT as a required feature for the MONITOR/MWAIT selftest.

 - Add a missing field in struct sev_data_snp_launch_start that resulted in
   the guest-visible workarounds field being filled at the wrong offset.

 - Skip non-canonical address when processing Hyper-V PV TLB flushes to avoid
   VM-Fail on INVVPID.

----------------------------------------------------------------
Binbin Wu (1):
      Documentation: KVM: Fix unexpected unindent warnings

Chenyi Qiang (1):
      KVM: selftests: Add back the missing check of MONITOR/MWAIT availability

David Woodhouse (1):
      KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table.

Liam Merwick (1):
      KVM: Allow CPU to reschedule while setting per-page memory attributes

Manuel Andreas (1):
      KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush

Nikunj A Dadhania (1):
      KVM: SVM: Add missing member in SNP_LAUNCH_START command structure

Sean Christopherson (3):
      KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
      KVM: SVM: Initialize vmsa_pa in VMCB to INVALID_PAGE if VMSA page is NULL
      KVM: x86/hyper-v: Use preallocated per-vCPU buffer for de-sparsified vCPU masks

 Documentation/virt/kvm/api.rst                     | 28 +++++++++++-----------
 arch/x86/include/asm/kvm_host.h                    |  7 +++++-
 arch/x86/kvm/hyperv.c                              |  5 +++-
 arch/x86/kvm/svm/sev.c                             | 12 ++++++++--
 arch/x86/kvm/xen.c                                 | 15 ++++++++++--
 include/linux/psp-sev.h                            |  2 ++
 .../testing/selftests/kvm/x86/monitor_mwait_test.c |  1 +
 virt/kvm/kvm_main.c                                |  3 +++
 8 files changed, 53 insertions(+), 20 deletions(-)

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [GIT PULL] KVM: x86: Fixes for 6.16-rcN
  2025-06-26 22:31 [GIT PULL] KVM: x86: Fixes for 6.16-rcN Sean Christopherson
@ 2025-07-08 14:53 ` Paolo Bonzini
  0 siblings, 0 replies; 2+ messages in thread
From: Paolo Bonzini @ 2025-07-08 14:53 UTC (permalink / raw)
  To: Sean Christopherson; +Cc: kvm, linux-kernel

On Fri, Jun 27, 2025 at 12:31 AM Sean Christopherson <seanjc@google.com> wrote:
>
> Please pull a random smattering of fixes for 6.16.  Note, the SEV-ES intra-host
> migration commits received your "Queued, thanks", but they never showed up in
> kvm.git.

Ouch, sorry about htat.

> Oh, and there's one more fix that is probably a candidate for 6.16, but I'm
> waiting for a response from the submitter, as I think we can go with a more
> targeted fix: https://lore.kernel.org/all/aFwLpyDYOsHUtCn-@google.com

Yes, I agree with you there.  I see no reply from Yuntao, so let's
decide tomorrow what to do about it.

>   https://github.com/kvm-x86/linux.git tags/kvm-x86-fixes-6.16-rcN
>
> for you to fetch changes up to fa787ac07b3ceb56dd88a62d1866038498e96230:
>
>   KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (2025-06-25 09:15:24 -0700)

Done.

Paolo

> ----------------------------------------------------------------
> KVM x86 fixes for 6.16-rcN
>
>  - Reject SEV{-ES} intra-host migration if one or more vCPUs are actively
>    being created so as not to create a non-SEV{-ES} vCPU in an SEV{-ES} VM.
>
>  - Use a pre-allocated, per-vCPU buffer for handling de-sparsified vCPU masks
>    when emulating Hyper-V hypercalls to fix a "stack frame too large" issue.
>
>  - Allow out-of-range/invalid Xen event channel ports when configuring IRQ
>    routing to avoid dictating a specific ioctl() ordering to userspace.
>
>  - Conditionally reschedule when setting memory attributes to avoid soft
>    lockups when userspace converts huge swaths of memory to/from private.
>
>  - Add back MWAIT as a required feature for the MONITOR/MWAIT selftest.
>
>  - Add a missing field in struct sev_data_snp_launch_start that resulted in
>    the guest-visible workarounds field being filled at the wrong offset.
>
>  - Skip non-canonical address when processing Hyper-V PV TLB flushes to avoid
>    VM-Fail on INVVPID.
>
> ----------------------------------------------------------------
> Binbin Wu (1):
>       Documentation: KVM: Fix unexpected unindent warnings
>
> Chenyi Qiang (1):
>       KVM: selftests: Add back the missing check of MONITOR/MWAIT availability
>
> David Woodhouse (1):
>       KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table.
>
> Liam Merwick (1):
>       KVM: Allow CPU to reschedule while setting per-page memory attributes
>
> Manuel Andreas (1):
>       KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush
>
> Nikunj A Dadhania (1):
>       KVM: SVM: Add missing member in SNP_LAUNCH_START command structure
>
> Sean Christopherson (3):
>       KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight
>       KVM: SVM: Initialize vmsa_pa in VMCB to INVALID_PAGE if VMSA page is NULL
>       KVM: x86/hyper-v: Use preallocated per-vCPU buffer for de-sparsified vCPU masks
>
>  Documentation/virt/kvm/api.rst                     | 28 +++++++++++-----------
>  arch/x86/include/asm/kvm_host.h                    |  7 +++++-
>  arch/x86/kvm/hyperv.c                              |  5 +++-
>  arch/x86/kvm/svm/sev.c                             | 12 ++++++++--
>  arch/x86/kvm/xen.c                                 | 15 ++++++++++--
>  include/linux/psp-sev.h                            |  2 ++
>  .../testing/selftests/kvm/x86/monitor_mwait_test.c |  1 +
>  virt/kvm/kvm_main.c                                |  3 +++
>  8 files changed, 53 insertions(+), 20 deletions(-)
>


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2025-07-08 14:53 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-06-26 22:31 [GIT PULL] KVM: x86: Fixes for 6.16-rcN Sean Christopherson
2025-07-08 14:53 ` Paolo Bonzini

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).