-
- Downloads
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Pull kvm fixes from Paolo Bonzini: "ARM: - Correctly clean the BSS to the PoC before allowing EL2 to access it on nVHE/hVHE/protected configurations - Propagate ownership of debug registers in protected mode after the rework that landed in 6.14-rc1 - Stop pretending that we can run the protected mode without a GICv3 being present on the host - Fix a use-after-free situation that can occur if a vcpu fails to initialise the NV shadow S2 MMU contexts - Always evaluate the need to arm a background timer for fully emulated guest timers - Fix the emulation of EL1 timers in the absence of FEAT_ECV - Correctly handle the EL2 virtual timer, specially when HCR_EL2.E2H==0 s390: - move some of the guest page table (gmap) logic into KVM itself, inching towards the final goal of completely removing gmap from the non-kvm memory management code. As an initial set of cleanups, move some code from mm/gmap into kvm and start using __kvm_faultin_pfn() to fault-in pages as needed; but especially stop abusing page->index and page->lru to aid in the pgdesc conversion. x86: - Add missing check in the fix to defer starting the huge page recovery vhost_task - SRSO_USER_KERNEL_NO does not need SYNTHESIZED_F" * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (31 commits) KVM: x86/mmu: Ensure NX huge page recovery thread is alive before waking KVM: remove kvm_arch_post_init_vm KVM: selftests: Fix spelling mistake "initally" -> "initially" kvm: x86: SRSO_USER_KERNEL_NO is not synthesized KVM: arm64: timer: Don't adjust the EL2 virtual timer offset KVM: arm64: timer: Correctly handle EL1 timer emulation when !FEAT_ECV KVM: arm64: timer: Always evaluate the need for a soft timer KVM: arm64: Fix nested S2 MMU structures reallocation KVM: arm64: Fail protected mode init if no vgic hardware is present KVM: arm64: Flush/sync debug state in protected mode KVM: s390: selftests: Streamline uc_skey test to issue iske after sske KVM: s390: remove the last user of page->index KVM: s390: move PGSTE softbits KVM: s390: remove useless page->index usage KVM: s390: move gmap_shadow_pgt_lookup() into kvm KVM: s390: stop using lists to keep track of used dat tables KVM: s390: stop using page->index for non-shadow gmaps KVM: s390: move some gmap shadowing functions away from mm/gmap.c KVM: s390: get rid of gmap_translate() KVM: s390: get rid of gmap_fault() ...
Showing
- Documentation/virt/kvm/api.rst 1 addition, 1 deletionDocumentation/virt/kvm/api.rst
- arch/arm64/kvm/arch_timer.c 11 additions, 38 deletionsarch/arm64/kvm/arch_timer.c
- arch/arm64/kvm/arm.c 20 additions, 0 deletionsarch/arm64/kvm/arm.c
- arch/arm64/kvm/hyp/nvhe/hyp-main.c 24 additions, 0 deletionsarch/arm64/kvm/hyp/nvhe/hyp-main.c
- arch/arm64/kvm/nested.c 5 additions, 4 deletionsarch/arm64/kvm/nested.c
- arch/arm64/kvm/sys_regs.c 13 additions, 3 deletionsarch/arm64/kvm/sys_regs.c
- arch/s390/include/asm/gmap.h 6 additions, 14 deletionsarch/s390/include/asm/gmap.h
- arch/s390/include/asm/kvm_host.h 5 additions, 1 deletionarch/s390/include/asm/kvm_host.h
- arch/s390/include/asm/pgtable.h 18 additions, 3 deletionsarch/s390/include/asm/pgtable.h
- arch/s390/include/asm/uv.h 3 additions, 3 deletionsarch/s390/include/asm/uv.h
- arch/s390/kernel/uv.c 29 additions, 263 deletionsarch/s390/kernel/uv.c
- arch/s390/kvm/Makefile 1 addition, 1 deletionarch/s390/kvm/Makefile
- arch/s390/kvm/gaccess.c 43 additions, 1 deletionarch/s390/kvm/gaccess.c
- arch/s390/kvm/gmap-vsie.c 142 additions, 0 deletionsarch/s390/kvm/gmap-vsie.c
- arch/s390/kvm/gmap.c 212 additions, 0 deletionsarch/s390/kvm/gmap.c
- arch/s390/kvm/gmap.h 39 additions, 0 deletionsarch/s390/kvm/gmap.h
- arch/s390/kvm/intercept.c 4 additions, 3 deletionsarch/s390/kvm/intercept.c
- arch/s390/kvm/interrupt.c 11 additions, 8 deletionsarch/s390/kvm/interrupt.c
- arch/s390/kvm/kvm-s390.c 197 additions, 40 deletionsarch/s390/kvm/kvm-s390.c
- arch/s390/kvm/kvm-s390.h 19 additions, 0 deletionsarch/s390/kvm/kvm-s390.h
Loading
Please register or sign in to comment