Re: [GIT PULL] KVM: x86: VMX changes for 6.5

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jun 27, 2023 at 2:33 AM Sean Christopherson <seanjc@xxxxxxxxxx> wrote:
>
> KVM VMX changes for 6.5.  The highlight is moving away from .invalidate_range()
> for the APIC-access page, which you've already reviewed.  Everything else is
> minor fixes and cleanups.
>
> The following changes since commit b9846a698c9aff4eb2214a06ac83638ad098f33f:
>
>   KVM: VMX: add MSR_IA32_TSX_CTRL into msrs_to_save (2023-05-21 04:05:51 -0400)
>
> are available in the Git repository at:
>
>   https://github.com/kvm-x86/linux.git tags/kvm-x86-vmx-6.5
>
> for you to fetch changes up to 0a3869e14d4a5e1016aad6bc6c5b70f82bc0dbbe:
>
>   KVM: x86/mmu: Trigger APIC-access page reload iff vendor code cares (2023-06-06 15:07:05 -0700)

Pulled all of them, thanks.

Paolo

>
> ----------------------------------------------------------------
> KVM VMX changes for 6.5:
>
>  - Fix missing/incorrect #GP checks on ENCLS
>
>  - Use standard mmu_notifier hooks for handling APIC access page
>
>  - Misc cleanups
>
> ----------------------------------------------------------------
> Jinrong Liang (1):
>       KVM: x86/pmu: Remove redundant check for MSR_IA32_DS_AREA set handler
>
> Jon Kohler (1):
>       KVM: VMX: restore vmx_vmexit alignment
>
> Sean Christopherson (7):
>       KVM: VMX: Treat UMIP as emulated if and only if the host doesn't have UMIP
>       KVM: VMX: Use proper accessor to read guest CR4 in handle_desc()
>       KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0)
>       KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported
>       KVM: VMX: Retry APIC-access page reload if invalidation is in-progress
>       KVM: x86: Use standard mmu_notifier invalidate hooks for APIC access page
>       KVM: x86/mmu: Trigger APIC-access page reload iff vendor code cares
>
> Xiaoyao Li (2):
>       KVM: VMX: Use kvm_read_cr4() to get cr4 value
>       KVM: VMX: Move the comment of CR4.MCE handling right above the code
>
>  arch/x86/kvm/mmu/mmu.c          |  4 +++
>  arch/x86/kvm/vmx/capabilities.h |  4 +--
>  arch/x86/kvm/vmx/nested.c       |  3 +-
>  arch/x86/kvm/vmx/pmu_intel.c    |  2 --
>  arch/x86/kvm/vmx/sgx.c          | 15 ++++++----
>  arch/x86/kvm/vmx/vmenter.S      |  2 +-
>  arch/x86/kvm/vmx/vmx.c          | 66 ++++++++++++++++++++++++++++++++++-------
>  arch/x86/kvm/x86.c              | 14 ---------
>  include/linux/kvm_host.h        |  3 --
>  virt/kvm/kvm_main.c             | 18 -----------
>  10 files changed, 73 insertions(+), 58 deletions(-)
>





[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux