Linus,
The following changes since commit 40e020c129cfc991e8ab4736d2665351ffd1468d:
Linux 4.20-rc6 (2018-12-09 15:31:00 -0800)
are available in the git repository at:
https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus
for you to fetch changes up to a0aea130afebcd091d5396d13f25b9da24c9144a:
KVM: x86: Add CPUID support for new instruction WBNOINVD (2018-12-21 14:26:32
+0100)
The PT and Hyper-V changes have been acked by the maintainers; since
Ingo acked the MPX issue and is going to remove the topic branch, all that
is left is two trivial conflicts.
One is due to the disintegration of arch/x86/kvm/vmx.c; only one commit
in all of linux-next touched that file, so this will be enough to fix it:
$ git log --oneline v4.20-rc6..origin/master -- arch/x86/kvm/vmx.c
c2dd5146e9fe KVM: Fix UAF in nested posted interrupt processing
$ git rm arch/x86/kvm/vmx.c
$ git show c2dd5146e9fe | patch arch/x86/kvm/vmx/nested.c
patching file arch/x86/kvm/vmx/nested.c
Hunk #1 succeeded at 2881 (offset -9104 lines).
The second is with the PPC tree, due to commit d7b456152230 in my tree, you
can solve it in your sleep but anyway the resolution is after the diffstat.
Thanks,
Paolo
* ARM: selftests improvements, large PUD support for HugeTLB,
single-stepping fixes, improved tracing, various timer and vGIC
fixes
* x86: Processor Tracing virtualization, STIBP support, some correctness fixes,
refactorings and splitting of vmx.c, use the Hyper-V range TLB flush hypercall,
reduce order of vcpu struct, WBNOINVD support, do not use -ftrace for __noclone
functions, nested guest support for PAUSE filtering on AMD, more Hyper-V
enlightenments (direct mode for synthetic timers)
* PPC: nested VFIO
* s390: bugfixes only this time
Andrew Jones (8):
kvm: selftests: x86_64: dirty_log_test: fix -t
kvm: selftests: dirty_log_test: don't identity map the test mem
kvm: selftests: dirty_log_test: always use -t
kvm: selftests: dirty_log_test: reset guest test phys offset
kvm: selftests: dirty_log_test: improve mode param management
kvm: selftests: add pa-48/va-48 VM modes
kvm: selftests: aarch64: dirty_log_test: support greater than 40-bit IPAs
kvm: selftests: ucall: fix exit mmio address guessing
Bharata B Rao (1):
KVM: PPC: Pass change type down to memslot commit function
Chao Peng (7):
perf/x86/intel/pt: Move Intel PT MSRs bit defines to global header
perf/x86/intel/pt: Export pt_cap_get()
KVM: x86: Add Intel PT virtualization work mode
KVM: x86: Add Intel Processor Trace cpuid emulation
KVM: x86: Add Intel PT context switch for each vcpu
KVM: x86: Implement Intel PT MSRs read/write emulation
KVM: x86: Set intercept for Intel PT MSRs read/write
Christoffer Dall (9):
KVM: arm/arm64: Fix VMID alloc race by reverting to lock-less
KVM: arm/arm64: vgic-v2: Set active_source to 0 when restoring state
KVM: arm64: Clarify explanation of STAGE2_PGTABLE_LEVELS
KVM: arm/arm64: vgic: Consider priority and active state for pending irq
KVM: arm/arm64: Fixup the kvm_exit tracepoint
KVM: arm/arm64: Remove arch timer workqueue
KVM: arm/arm64: arch_timer: Simplify kvm_timer_vcpu_terminate
KVM: arm64: Make vcpu const in vcpu_read_sys_reg
KVM: arm/arm64: Fix unintended stage 2 PMD mappings
Eduardo Habkost (1):
kvm: x86: Report STIBP on GET_SUPPORTED_CPUID
Gustavo A. R. Silva (1):
KVM: arm/arm64: vgic: Fix off-by-one bug in vgic_get_irq()
Jim Mattson (11):
KVM: nVMX: Unrestricted guest mode requires EPT
kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page
kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
kvm: vmx: Document the need for MSR_STAR in i386 builds
kvm: vmx: Don't set hardware IA32_CSTAR MSR on VM-entry
kvm: vmx: Skip all SYSCALL MSRs in setup_msrs() when !EFER.SCE
kvm: x86: Don't modify MSR_PLATFORM_INFO on vCPU reset
kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init
kvm: Change offset in kvm_write_guest_offset_cached to unsigned
kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT
kvm: vmx: Allow guest read access to IA32_TSC
Julien Thierry (1):
KVM: arm/arm64: vgic: Do not cond_resched_lock() with IRQs disabled
Krish Sadhukhan (8):
nVMX x86: Check VMX-preemption timer controls on vmentry of L2 guests
KVM nVMX: MSRs should not be stored if VM-entry fails during or after
loading guest state
KVM: nVMX: Prepend "nested_vmx_" to check_vmentry_{pre,post}reqs()
KVM: nVMX: Move the checks for VM-Execution Control Fields to a separate
helper function
KVM: nVMX: Move the checks for VM-Exit Control Fields to a separate
helper function
KVM: nVMX: