public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Sean Christopherson <seanjc@google.com>
To: Paolo Bonzini <pbonzini@redhat.com>
Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org,
	 Sean Christopherson <seanjc@google.com>
Subject: [GIT PULL] KVM: x86: Misc changes for 7.1
Date: Fri, 10 Apr 2026 16:58:22 -0700	[thread overview]
Message-ID: <20260410235832.2312342-4-seanjc@google.com> (raw)
In-Reply-To: <20260410235832.2312342-1-seanjc@google.com>

A truly misc bundle of changes.  A few minor fixes, some cleanups, some
hardening, and one new feature (AVX512 BMM on AMD).

The following changes since commit 11439c4635edd669ae435eec308f4ab8a0804808:

  Linux 7.0-rc2 (2026-03-01 15:39:31 -0800)

are available in the Git repository at:

  https://github.com/kvm-x86/linux.git tags/kvm-x86-misc-7.1

for you to fetch changes up to de0bfdc7137d5132b71dd1fe7aa3ca3df4d68241:

  KVM: x86: Advertise AVX512 Bit Matrix Multiply (BMM) to userspace (2026-03-12 10:56:36 -0700)

----------------------------------------------------------------
KVM x86 misc changes for 7.1

 - Advertise support for AVX512 Bit Matrix Multiply (BMM) when it's present in
   hardware (no additional emulation/virtualization required).

 - Immediately fail the build if a required #define is missing in one of KVM's
   headers that is included multiple times.

 - Reject SET_GUEST_DEBUG with -EBUSY if there's an already injected exception,
   mostly to prevent syzkaller from abusing the uAPI to trigger WARNs, but also
   because it can help prevent userspace from unintentionally crashing the VM.

 - Exempt SMM from CPUID faulting on Intel, as per the spec.

 - Misc hardening and cleanup changes.

----------------------------------------------------------------
Anel Orazgaliyeva (1):
      KVM: X86: Fix array_index_nospec protection in __pv_send_ipi

Carlos López (1):
      KVM: x86/pmu: annotate struct kvm_x86_pmu_event_filter with __counted_by()

Jim Mattson (1):
      KVM: x86: Ignore cpuid faulting in SMM

Li RongQing (2):
      KVM: Mark halt poll and other module parameters with appropriate memory attributes
      KVM: SVM: Mark module parameters as __ro_after_init for security and performance

Nikunj A Dadhania (1):
      KVM: x86: Advertise AVX512 Bit Matrix Multiply (BMM) to userspace

Sean Christopherson (1):
      KVM: x86: Immediately fail the build when possible if required #define is missing

Uros Bizjak (1):
      KVM: x86: Zero-initialize temporary fxregs_state buffers in FXSAVE emulation

Yosry Ahmed (4):
      KVM: x86: Check for injected exceptions before queuing a debug exception
      KVM: x86: Drop redundant call to kvm_deliver_exception_payload()
      KVM: x86: Move some EFER bits enablement to common code
      KVM: x86: Use kvm_cpu_cap_has() for EFER bits enablement checks

xuanqingshi (1):
      KVM: x86: Add LAPIC guard in kvm_apic_write_nodecode()

 arch/x86/include/asm/cpufeatures.h     |  1 +
 arch/x86/include/asm/kvm-x86-ops.h     | 10 +++++----
 arch/x86/include/asm/kvm-x86-pmu-ops.h |  8 ++++---
 arch/x86/include/asm/kvm_host.h        |  2 +-
 arch/x86/kvm/cpuid.c                   |  6 ++++--
 arch/x86/kvm/emulate.c                 | 10 ++++-----
 arch/x86/kvm/lapic.c                   | 13 +++++++-----
 arch/x86/kvm/pmu.c                     |  2 +-
 arch/x86/kvm/svm/avic.c                |  4 ++--
 arch/x86/kvm/svm/sev.c                 |  8 +++----
 arch/x86/kvm/svm/svm.c                 | 39 ++++++++++++++--------------------
 arch/x86/kvm/vmx/vmcs_shadow_fields.h  |  5 +++--
 arch/x86/kvm/vmx/vmx.c                 |  4 ----
 arch/x86/kvm/x86.c                     | 26 +++++++++++++++++------
 virt/kvm/kvm_main.c                    | 12 +++++------
 15 files changed, 81 insertions(+), 69 deletions(-)

  parent reply	other threads:[~2026-04-10 23:58 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-10 23:58 [GIT PULL] KVM: x86 pull requests for 7.1 Sean Christopherson
2026-04-10 23:58 ` [GIT PULL] KVM: x86: A lonely fix " Sean Christopherson
2026-04-11 12:07   ` Paolo Bonzini
2026-04-10 23:58 ` [GIT PULL] KVM: guest_memfd change " Sean Christopherson
2026-04-10 23:58 ` Sean Christopherson [this message]
2026-04-10 23:58 ` [GIT PULL] KVM: x86: Emulated MMIO changes " Sean Christopherson
2026-04-10 23:58 ` [GIT PULL] KVM: x86: MMU " Sean Christopherson
2026-04-10 23:58 ` [GIT PULL] KVM: x86: Nested SVM " Sean Christopherson
2026-04-10 23:58 ` [GIT PULL] KVM: Selftests " Sean Christopherson
2026-04-10 23:58 ` [GIT PULL] KVM: x86: SVM+SEV changes Sean Christopherson
2026-04-10 23:58 ` [GIT PULL] KVM: x86: SVM changes for 7.1 (short version) Sean Christopherson
2026-04-10 23:58 ` [GIT PULL] KVM: x86: VMX changes for 7.1 Sean Christopherson
2026-04-10 23:58 ` [GIT PULL] KVM: x86: VMXON and EFER.SVME extraction " Sean Christopherson
2026-04-11  0:02   ` Sean Christopherson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260410235832.2312342-4-seanjc@google.com \
    --to=seanjc@google.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox