Linus, The following changes since commit 7c53f6b671f4aba70ff15e1b05148b10d58c2837: Linux 5.11-rc3 (2021-01-10 14:34:50 -0800) are available in the Git repository at: https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus for you to fetch changes up to 9a78e15802a87de2b08dfd1bd88e855201d2c8fa: KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX (2021-01-25 18:54:09 -0500) ---------------------------------------------------------------- * x86 bugfixes * Documentation fixes * Avoid performance regression due to SEV-ES patches ARM: - Don't allow tagged pointers to point to memslots - Filter out ARMv8.1+ PMU events on v8.0 hardware - Hide PMU registers from userspace when no PMU is configured - More PMU cleanups - Don't try to handle broken PSCI firmware - More sys_reg() to reg_to_encoding() conversions ---------------------------------------------------------------- Alexandru Elisei (1): KVM: arm64: Use the reg_to_encoding() macro instead of sys_reg() David Brazdil (1): KVM: arm64: Allow PSCI SYSTEM_OFF/RESET to return Jay Zhou (1): KVM: x86: get smi pending status correctly Like Xu (2): KVM: x86/pmu: Fix UBSAN shift-out-of-bounds warning in intel_pmu_refresh() KVM: x86/pmu: Fix HW_REF_CPU_CYCLES event pseudo-encoding in intel_arch_events[] Lorenzo Brescia (1): kvm: tracing: Fix unmatched kvm_entry and kvm_exit events Marc Zyngier (4): KVM: arm64: Hide PMU registers from userspace when not available KVM: arm64: Simplify handling of absent PMU system registers KVM: arm64: Filter out v8.1+ events on v8.0 HW KVM: Forbid the use of tagged userspace addresses for memslots Maxim Levitsky (1): KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration Paolo Bonzini (2): Merge tag 'kvmarm-fixes-5.11-2' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD KVM: x86: allow KVM_REQ_GET_NESTED_STATE_PAGES outside guest mode for VMX Quentin Perret (1): KVM: Documentation: Fix spec for KVM_CAP_ENABLE_CAP_VM Sean Christopherson (3): KVM: x86: Add more protection against undefined behavior in rsvd_bits() KVM: SVM: Unconditionally sync GPRs to GHCB on VMRUN of SEV-ES guest KVM: x86: Revert "KVM: x86: Mark GPRs dirty when written" Steven Price (1): KVM: arm64: Compute TPIDR_EL2 ignoring MTE tag Zenghui Yu (1): KVM: Documentation: Update description of KVM_{GET,CLEAR}_DIRTY_LOG Documentation/virt/kvm/api.rst | 21 ++++---- arch/arm64/kvm/arm.c | 3 +- arch/arm64/kvm/hyp/nvhe/psci-relay.c | 13 ++--- arch/arm64/kvm/pmu-emul.c | 10 ++-- arch/arm64/kvm/sys_regs.c | 93 ++++++++++++++++++++++-------------- arch/x86/kvm/kvm_cache_regs.h | 51 ++++++++++---------- arch/x86/kvm/mmu.h | 9 +++- arch/x86/kvm/svm/nested.c | 3 ++ arch/x86/kvm/svm/sev.c | 15 +++--- arch/x86/kvm/svm/svm.c | 2 + arch/x86/kvm/vmx/nested.c | 44 ++++++++++++----- arch/x86/kvm/vmx/pmu_intel.c | 6 ++- arch/x86/kvm/vmx/vmx.c | 2 + arch/x86/kvm/x86.c | 11 +++-- virt/kvm/kvm_main.c | 1 + 15 files changed, 172 insertions(+), 112 deletions(-)