diff options
author | 2025-07-08 10:49:19 -0400 | |
---|---|---|
committer | 2025-07-08 10:49:19 -0400 | |
commit | 5383fc057a0ea18e8eb9a0472ea853c24b59ee5e (patch) | |
tree | 9f501b24f29983a8ac4061109c0efc2a96e65dab /tools/perf/scripts/python | |
parent | Merge tag 'kvmarm-fixes-6.16-5' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD (diff) | |
parent | KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (diff) | |
download | wireguard-linux-5383fc057a0ea18e8eb9a0472ea853c24b59ee5e.tar.xz wireguard-linux-5383fc057a0ea18e8eb9a0472ea853c24b59ee5e.zip |
Merge tag 'kvm-x86-fixes-6.16-rcN' of https://github.com/kvm-x86/linux into HEAD
KVM x86 fixes for 6.16-rcN
- Reject SEV{-ES} intra-host migration if one or more vCPUs are actively
being created so as not to create a non-SEV{-ES} vCPU in an SEV{-ES} VM.
- Use a pre-allocated, per-vCPU buffer for handling de-sparsified vCPU masks
when emulating Hyper-V hypercalls to fix a "stack frame too large" issue.
- Allow out-of-range/invalid Xen event channel ports when configuring IRQ
routing to avoid dictating a specific ioctl() ordering to userspace.
- Conditionally reschedule when setting memory attributes to avoid soft
lockups when userspace converts huge swaths of memory to/from private.
- Add back MWAIT as a required feature for the MONITOR/MWAIT selftest.
- Add a missing field in struct sev_data_snp_launch_start that resulted in
the guest-visible workarounds field being filled at the wrong offset.
- Skip non-canonical address when processing Hyper-V PV TLB flushes to avoid
VM-Fail on INVVPID.
- Advertise supported TDX TDVMCALLs to userspace.
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions