diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2022-06-08 09:16:31 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2022-06-08 09:16:31 -0700 |
commit | 34f4335c16a5f4bb7da6c8d2d5e780b6a163846a (patch) | |
tree | bc50b2cf371c99dc2adc61f9d88207ff70372d7e /kernel | |
parent | 32d380a7ef0254d65763408b955a5aa6848ea49c (diff) | |
parent | 6cd88243c7e03845a450795e134b488fc2afb736 (diff) | |
download | linux-stable-34f4335c16a5f4bb7da6c8d2d5e780b6a163846a.tar.gz linux-stable-34f4335c16a5f4bb7da6c8d2d5e780b6a163846a.tar.bz2 linux-stable-34f4335c16a5f4bb7da6c8d2d5e780b6a163846a.zip |
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Pull KVM fixes from Paolo Bonzini:
- syzkaller NULL pointer dereference
- TDP MMU performance issue with disabling dirty logging
- 5.14 regression with SVM TSC scaling
- indefinite stall on applying live patches
- unstable selftest
- memory leak from wrong copy-and-paste
- missed PV TLB flush when racing with emulation
* tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm:
KVM: x86: do not report a vCPU as preempted outside instruction boundaries
KVM: x86: do not set st->preempted when going back to user space
KVM: SVM: fix tsc scaling cache logic
KVM: selftests: Make hyperv_clock selftest more stable
KVM: x86/MMU: Zap non-leaf SPTEs when disabling dirty logging
x86: drop bogus "cc" clobber from __try_cmpxchg_user_asm()
KVM: x86/mmu: Check every prev_roots in __kvm_mmu_free_obsolete_roots()
entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set
KVM: Don't null dereference ops->destroy
Diffstat (limited to 'kernel')
-rw-r--r-- | kernel/entry/kvm.c | 6 |
1 files changed, 0 insertions, 6 deletions
diff --git a/kernel/entry/kvm.c b/kernel/entry/kvm.c index 9d09f489b60e..2e0f75bcb7fd 100644 --- a/kernel/entry/kvm.c +++ b/kernel/entry/kvm.c @@ -9,12 +9,6 @@ static int xfer_to_guest_mode_work(struct kvm_vcpu *vcpu, unsigned long ti_work) int ret; if (ti_work & (_TIF_SIGPENDING | _TIF_NOTIFY_SIGNAL)) { - clear_notify_signal(); - if (task_work_pending(current)) - task_work_run(); - } - - if (ti_work & _TIF_SIGPENDING) { kvm_handle_signal_exit(vcpu); return -EINTR; } |