This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 4d66020dcef8 Merge tag 'trace-v5.17' of git://git.kernel.org/pub/scm/li [...] new 1a5e91d8375f swiotlb: Add swiotlb bounce buffer remap function for HV IVM new c789b90a6904 x86/hyper-v: Add hyperv Isolation VM check in the cc_platf [...] new 062a5c4260cd hyper-v: Enable swiotlb bounce buffer for Isolation VM new 743b237c3a7b scsi: storvsc: Add Isolation VM support for storvsc driver new 846da38de0e8 net: netvsc: Add Isolation VM support for netvsc driver new db3c65bc3a13 Drivers: hv: Fix definition of hypercall input & output ar [...] new e1878402ab2d x86/hyperv: Fix definition of hv_ghcb_pg variable new 2deb55d9f57b swiotlb: Add CONFIG_HAS_IOMEM check around swiotlb_mem_remap() new 0bd2fbee9d0b scsi: storvsc: Fix unsigned comparison to zero new 6a27e396ebb1 Drivers: hv: vmbus: Initialize request offers message for [...] new 51500b71d500 x86/hyperv: Properly deal with empty cpumasks in hyperv_fl [...] new 4eea5332d67d scsi: storvsc: Fix storvsc_queuecommand() memory leak new cb3f09f9afe5 Merge tag 'hyperv-next-signed-20220114' of git://git.kerne [...] new dc1ce45575b3 KVM: MMU: update comment on the number of page role combinations new 27592ae8dbe4 KVM: Move wiping of the kvm->vcpus array to common code new 75a9869f314d KVM: mips: Use kvm_get_vcpu() instead of open-coded access new 113d10bca23c KVM: s390: Use kvm_get_vcpu() instead of open-coded access new c5b077549136 KVM: Convert the kvm->vcpus array to a xarray new 46808a4cb897 KVM: Use 'unsigned long' as kvm_for_each_vcpu()'s index new 214bd3a6f469 KVM: Convert kvm_for_each_vcpu() to using xa_for_each_range() new afa319a54a8c KVM: Require total number of memslot pages to fit in an un [...] new 47ea7d900b1c KVM: Open code kvm_delete_memslot() into its only caller new 4e4d30cb9b87 KVM: Resync only arch fields when slots_arch_lock gets reacquired new ce5f0215620c KVM: Use "new" memslot's address space ID instead of dedic [...] new 537a17b31493 KVM: Let/force architectures to deal with arch specific me [...] new 509c594ca2dc KVM: arm64: Use "new" memslot instead of userspace memory region new 3b1816177bfe KVM: MIPS: Drop pr_debug from memslot commit to avoid using "mem" new eaaaed137ecc KVM: PPC: Avoid referencing userspace memory region in mem [...] new cf5b486922dc KVM: s390: Use "new" memslot instead of userspace memory region new 9d7d18ee3f48 KVM: x86: Use "new" memslot instead of userspace memory region new d01495d4cffb KVM: RISC-V: Use "new" memslot instead of userspace memory region new 6a99c6e3f52a KVM: Stop passing kvm_userspace_memory_region to arch mems [...] new 07921665a651 KVM: Use prepare/commit hooks to handle generic memslot me [...] new 77aedf26fe5d KVM: x86: Don't assume old/new memslots are non-NULL at me [...] new ec5c86976674 KVM: s390: Skip gfn/size sanity checks on memslot DELETE o [...] new 7cd08553ab10 KVM: Don't make a full copy of the old memslot in __kvm_se [...] new e0c2b6338ac8 KVM: x86: Don't call kvm_mmu_change_mmu_pages() if the cou [...] new f5756029eef5 KVM: x86: Use nr_memslot_pages to avoid traversing the mem [...] new c928bfc2632f KVM: Integrate gfn_to_memslot_approx() into search_memslots() new 1e8617d37fc3 KVM: Move WARN on invalid memslot index to update_memslots() new 26b8345abc75 KVM: Resolve memslot ID via a hash table instead of via a [...] new ed922739c919 KVM: Use interval tree to do fast hva lookup in memslots new 6a656832aa75 KVM: s390: Introduce kvm_s390_get_gfn_end() new a54d806688fe KVM: Keep memslots in tree-based structures instead of arr [...] new bcb63dcde829 KVM: Call kvm_arch_flush_shadow_memslot() on the old slot [...] new f4209439b522 KVM: Optimize gfn lookup in kvm_zap_gfn_range() new 44401a204734 KVM: Optimize overlapping memslots check new 0f9bdef3d933 KVM: Wait 'til the bitter end to initialize the "new" memslot new 244893fa2859 KVM: Dynamically allocate "new" memslots from the get-go new 907afa48e9d0 KVM: nSVM: move nested_vmcb_check_cr3_cr4 logic in nested_ [...] new f2740a8d851a KVM: nSVM: introduce svm->nested.save to cache save area b [...] new 7907160dbf1a KVM: nSVM: rename nested_load_control_from_vmcb12 in neste [...] new b7a3d8b6f433 KVM: nSVM: use vmcb_save_area_cached in nested_vmcb_valid_sregs() new 355d0473b1a1 KVM: nSVM: use svm->nested.save to load vmcb12 registers a [...] new bd95926c2b2b KVM: nSVM: split out __nested_vmcb_check_controls new 8fc78909c05d KVM: nSVM: introduce struct vmcb_ctrl_area_cached new ce92ef7604ff KVM: x86/mmu: Use shadow page role to detect PML-unfriendl [...] new 9d395a0a7aca KVM: x86/mmu: Remove need for a vcpu from kvm_slot_page_tr [...] new 4d78d0b39ad0 KVM: x86/mmu: Remove need for a vcpu from mmu_try_to_unsync_pages new 8283e36abfff KVM: x86/mmu: Propagate memslot const qualifier new fb43496c8362 KVM: x86/MMU: Simplify flow of vmx_get_mt_mask new aefdc2ed445e KVM: Avoid atomic operations when kicking the running vCPU new 98a26b69d8c3 KVM: x86: change TLB flush indicator to bool new 1831fa44df74 KVM: VMX: Don't unblock vCPU w/ Posted IRQ if IRQs are dis [...] new 91b018950717 KVM: SVM: Ensure target pCPU is read once when signalling [...] new 6f390916c4fb KVM: s390: Ensure kvm_arch_no_poll() is read once when blo [...] new 510958e99721 KVM: Force PPC to define its own rcuwait object new 8df6a61c0403 KVM: Update halt-polling stats if and only if halt-polling [...] new 29e72893cec3 KVM: Refactor and document halt-polling stats update helper new 30c9434717fd KVM: Reconcile discrepancies in halt-polling stats new 75c89e5272fb KVM: s390: Clear valid_wakeup in kvm_s390_handle_wait(), n [...] new 6109c5a6ab7f KVM: arm64: Move vGIC v4 handling for WFI out arch callback hook new f6c60d081e2c KVM: Don't block+unblock when halt-polling is successful new 1460179dcd76 KVM: x86: Tweak halt emulation helper names to free up kvm [...] new 005467e06b16 KVM: Drop obsolete kvm_arch_vcpu_block_finish() new 91b99ea70657 KVM: Rename kvm_vcpu_block() => kvm_vcpu_halt() new fac426889439 KVM: Split out a kvm_vcpu_block() helper from kvm_vcpu_halt() new c3858335c711 KVM: stats: Add stat to detect if vcpu is currently blocking new 109a98260b53 KVM: Don't redo ktime_get() when calculating halt-polling [...] new c91d44971459 KVM: x86: Directly block (instead of "halting") UNINITIALI [...] new cdafece4b964 KVM: x86: Invoke kvm_vcpu_block() directly for non-HALTED [...] new d92a5d1c6c75 KVM: Add helpers to wake/query blocking vCPU new 057aa61bc992 KVM: VMX: Skip Posted Interrupt updates if APICv is hard disabled new c95717218add KVM: VMX: Drop unnecessary PI logic to handle impossible c [...] new 74ba5bc872d3 KVM: VMX: Use boolean returns for Posted Interrupt "test" helpers new 29802380b679 KVM: VMX: Drop pointless PI.NDST update when blocking new 89ef0f21cf96 KVM: VMX: Save/restore IRQs (instead of CLI/STI) during PI [...] new cfb0e1306a37 KVM: VMX: Read Posted Interrupt "control" exactly once per [...] new 724b3962ef80 KVM: VMX: Move Posted Interrupt ndst computation out of wr [...] new baed82c8e489 KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV new b1d66dad65dc KVM: x86/svm: Add module param to control PMU virtualization new 2c5653caecc4 KVM: X86: Ensure that dirty PDPTRs are loaded new c0d6956e4305 KVM: VMX: Mark VCPU_EXREG_PDPTR available in ept_save_pdptrs() new 40e49c4f5fb0 KVM: SVM: Track dirtiness of PDPTRs even if NPT is disabled new 5ec60aad547f KVM: VMX: Add and use X86_CR4_TLBFLUSH_BITS when !enable_ept new a37ebdce168f KVM: VMX: Add and use X86_CR4_PDPTR_BITS when !enable_ept new e63f315d74ee KVM: X86: Move CR0 pdptr_bits into header file as X86_CR0_ [...] new 8f29bf12a378 KVM: SVM: Remove outdated comment in svm_load_mmu_pgd() new aec9c2402f74 KVM: SVM: Remove references to VCPU_EXREG_CR3 new 3883bc9d28ed KVM: X86: Mark CR3 dirty when vcpu->arch.cr3 is changed new c62c7bd4f95b KVM: VMX: Update vmcs.GUEST_CR3 only when the guest CR3 is dirty new 41e68b6964eb KVM: vmx, svm: clean up mass updates to regs_avail/regs_di [...] new 2e9ebd55096f KVM: X86: Remove kvm_register_clear_available() new 24cd19a28cb7 KVM: X86: Update mmu->pdptrs only when it is changed new 6ab8a4053f71 KVM: VMX: Avoid to rdmsrl(MSR_IA32_SYSENTER_ESP) new 3ab4ac877cfa KVM: VMX: Update msr value after kvm_set_user_return_msr() [...] new 15ad9762d69f KVM: VMX: Save HOST_CR3 in vmx_prepare_switch_to_guest() new ed07ef5a66e4 KVM: VMX: Use kvm_set_msr_common() for MSR_IA32_TSC_ADJUST [...] new fe26f91d30fb KVM: VMX: Change comments about vmx_get_msr() new 1af4a1199a41 KVM: SVM: Rename get_max_npt_level() to get_npt_level() new 58356767107a KVM: SVM: Allocate sd->save_area with __GFP_ZERO new 27f4fca29f9c KVM: X86: Skip allocating pae_root for vcpu->arch.guest_mm [...] new 84432316cd9a KVM: X86: Fix comment in __kvm_mmu_create() new 42f34c20a113 KVM: X86: Remove unused declaration of __kvm_mmu_free_some [...] new 41e35604eaff KVM: X86: Remove useless code to set role.gpte_is_8_bytes [...] new b46a13cb7ea1 KVM: X86: Calculate quadrant when !role.gpte_is_8_bytes new 1f5a21ee8400 KVM: X86: Add parameter struct kvm_mmu *mmu into mmu->gva_ [...] new c59a0f57fa32 KVM: X86: Remove mmu->translate_gpa new 84ea5c09a66d KVM: X86: Add huge_page_level to __reset_rsvds_bits_mask_ept() new cc022ae144c1 KVM: X86: Add parameter huge_page_level to kvm_init_shadow [...] new f8cd457f061d KVM: VMX: Use ept_caps_to_lpage_level() in hardware_setup() new bb3b394d35e8 KVM: X86: Rename gpte_is_8_bytes to has_4_byte_gpte and in [...] new 2df4a5eb6c5a KVM: X86: Remove mmu parameter from load_pdptrs() new ce5977b181c1 KVM: x86: don't print when fail to read/write pv eoi memory new 51b1209c6125 KVM: Clear pv eoi pending bit only when it is set new 5e854864ee43 KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with [...] new 906fa90416fd KVM: x86: Add an emulation type to handle completion of us [...] new d2f7d49826ae KVM: x86: Use different callback if msr access comes from [...] new adbfb12d4c45 KVM: x86: Exit to userspace if emulation prepared a comple [...] new 93b350f884c4 Merge branch 'kvm-on-hv-msrbm-fix' into HEAD new b84155c38076 KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper new ed2a4800ae9d KVM: nVMX: Track whether changes in L0 require MSR bitmap [...] new 502d2bf5f2fd KVM: nVMX: Implement Enlightened MSR Bitmap feature new 8e819d75cbcf KVM: x86: add a tracepoint for APICv/AVIC interrupt delivery new 83c98007d9fb KVM: nVMX: Ensure vCPU honors event request if posting nes [...] new 45af1bb99b72 KVM: VMX: Clean up PI pre/post-block WARNs new dc70ec217cec KVM: Introduce CONFIG_HAVE_KVM_DIRTY_RING new 6f2cdbdba43e KVM: Add Makefile.kvm for common files, use it for x86 new f786ab1bf17a KVM: s390: Use Makefile.kvm for common files new ae1b606e6207 KVM: mips: Use Makefile.kvm for common files new 3e3aa26fd4c4 KVM: RISC-V: Use Makefile.kvm for common files new 5f33868af8f4 KVM: powerpc: Use Makefile.kvm for common files new d8f6ef45a623 KVM: arm64: Use Makefile.kvm for common files new 5a213b9220e0 Merge branch 'topic/ppc-kvm' of https://git.kernel.org/pub [...] new 855fb0384a3d Merge remote-tracking branch 'kvm/master' into HEAD new 49ae248b61ae KVM: s390: Fix names of skey constants in api documentation new 416e7f0c9d61 KVM: s390: gaccess: Refactor gpa and length calculation new 7faa543df19b KVM: s390: gaccess: Refactor access address range check new bad13799e030 KVM: s390: gaccess: Cleanup access to guest pages new 3c724f1a1caa s390: uv: Add offset comments to UV query struct and fix naming new 812de04661c4 KVM: s390: Clarify SIGP orders versus STOP/RESTART new 5e4e84f1124a Merge tag 'kvm-s390-next-5.17-1' of git://git.kernel.org/p [...] new bff01a61af3c KVM: arm64: Move SVE state mapping at HYP to finalize-time new 052f064d42b7 KVM: arm64: Move kvm_arch_vcpu_run_pid_change() out of line new 1408e73d21fe KVM: arm64: Restructure the point where has_run_once is ad [...] new b5aa368abfbf KVM: arm64: Merge kvm_arch_vcpu_run_pid_change() and kvm_v [...] new cc5705fb1bf1 KVM: arm64: Drop vcpu->arch.has_run_once for vcpu->pid new e525523c1989 Merge branch kvm-arm64/vcpu-first-run into kvmarm-master/next new 892fd259cbf6 KVM: arm64: Reorder vcpu flag definitions new 8383741ab2e7 KVM: arm64: Get rid of host SVE tracking/saving new e66425fc9ba3 KVM: arm64: Remove unused __sve_save_state new af9a0e21d817 KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE new bee14bca735a KVM: arm64: Stop mapping current thread_info at EL2 new 31aa126de88e arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM new 2d761dbf7ff4 Merge branch kvm-arm64/fpsimd-tracking into kvmarm-master/next new 7e04f05984dd arm64: Add missing include of asm/cpufeature.h to asm/mmu.h new ed4ed15d5710 KVM: arm64: Generate hyp_constants.h for the host new 9429f4b0412d KVM: arm64: Move host EL1 code out of hyp/ directory new 370a17f531f1 Merge branch kvm-arm64/hyp-header-split into kvmarm-master/next new 00e228b31596 KVM: arm64: Add minimal handling for the ARMv8.7 PMU new 636dcd020459 KVM: arm64: Constify kvm_io_gic_ops new f0e6e6fa41b3 KVM: Drop stale kvm_is_transparent_hugepage() declaration new 94b4a6d52173 Merge branch kvm-arm64/misc-5.17 into kvmarm-master/next new 34b43a884922 KVM: arm64: pkvm: Fix hyp_pool max order new a770ee80e662 KVM: arm64: pkvm: Disable GICv2 support new 53a563b01fa2 KVM: arm64: Make the hyp memory pool static new 473a3efbafaa KVM: arm64: Make __io_map_base static new bff01cb6b1bf KVM: arm64: pkvm: Stub io map functions new 64a1fbda59f4 KVM: arm64: pkvm: Make kvm_host_owns_hyp_mappings() robust to VHE new 7b6871f67002 Merge branch kvm-arm64/pkvm-cleanups-5.17 into kvmarm-master/next new c95b1d7ca794 KVM: arm64: vgic-v3: Fix vcpu index comparison new 440523b92be6 KVM: arm64: vgic: Demote userspace-triggered console print [...] new ce5b5b05c168 Merge branch kvm-arm64/vgic-fixes-5.17 into kvmarm-master/next new 1fac3cfb9cc6 KVM: arm64: Provide {get,put}_page() stubs for early hyp a [...] new 2ea2ff91e822 KVM: arm64: Refcount hyp stage-1 pgtable pages new d6b4bd3f4897 KVM: arm64: Fixup hyp stage-1 refcount new 34ec7cbf1ee0 KVM: arm64: Hook up ->page_count() for hypervisor stage-1 [...] new 82bb02445de5 KVM: arm64: Implement kvm_pgtable_hyp_unmap() at EL2 new 3f868e142c0b KVM: arm64: Introduce kvm_share_hyp() new a83e2191b7f1 KVM: arm64: pkvm: Refcount the pages shared with EL2 new 3d467f7b8c0a KVM: arm64: Extend pkvm_page_state enumeration to handle a [...] new 61d99e33e757 KVM: arm64: Introduce wrappers for host and hyp spin lock [...] new e82edcc75c4e KVM: arm64: Implement do_share() helper for sharing memory new 1ee32109fd78 KVM: arm64: Implement __pkvm_host_share_hyp() using do_share() new 376a240f0379 KVM: arm64: Implement do_unshare() helper for unsharing memory new b8cc6eb5bded KVM: arm64: Expose unshare hypercall to the host new 52b28657ebd7 KVM: arm64: pkvm: Unshare guest structs during teardown new 43d8ac22125e Merge branch kvm-arm64/pkvm-hyp-sharing into kvmarm-master/next new cb7c4f364abd KVM: selftests: arm64: Initialise default guest mode at te [...] new 357c628e1248 KVM: selftests: arm64: Introduce a variable default IPA size new 0303ffdb9ecf KVM: selftests: arm64: Check for supported page sizes new 2f41a61c54fb KVM: selftests: arm64: Rework TCR_EL1 configuration new e7f58a6bd28b KVM: selftests: arm64: Add support for VM_MODE_P36V48_{4K,64K} new aa674de1dc3d KVM: selftests: arm64: Add support for various modes with [...] new 089606c0de9e Merge branch kvm-arm64/selftest/ipa into kvmarm-master/next new 33a1ca736e74 KVM: selftests: aarch64: Move gic_v3.h to shared headers new 745068367ccb KVM: selftests: aarch64: Add function for accessing GICv3 [...] new 17ce617bf76a KVM: selftests: aarch64: Add GICv3 register accessor libra [...] new 227895ed6d03 KVM: selftests: Add kvm_irq_line library function new e95def3a904d KVM: selftests: aarch64: Add vGIC library functions to dea [...] new 50b020cdb7f7 KVM: selftests: aarch64: Add vgic_irq to test userspace IR [...] new e1cb399eed1e KVM: selftests: aarch64: Abstract the injection functions [...] new e5410ee2806d KVM: selftests: aarch64: Cmdline arg to set number of IRQs [...] new 8a35b2877d9a KVM: selftests: aarch64: Cmdline arg to set EOI mode in vgic_irq new 0ad3ff4a6adc KVM: selftests: aarch64: Add preemption tests in vgic_irq new 92f2cc4aa796 KVM: selftests: aarch64: Level-sensitive interrupts tests [...] new 6830fa915912 KVM: selftests: aarch64: Add tests for LEVEL_INFO in vgic_irq new 90f50acac9ee KVM: selftests: aarch64: Add test_inject_fail to vgic_irq new 88209c104e9b KVM: selftests: Add IRQ GSI routing library functions new 6a5a47188cac KVM: selftests: aarch64: Add tests for IRQFD in vgic_irq new bebd8f3f8693 KVM: selftests: aarch64: Add ISPENDR write tests in vgic_irq new 728fcc46d2c2 KVM: selftests: aarch64: Add test for restoring active IRQs new ad7937dc7745 Merge branch kvm-arm64/selftest/irq-injection into kvmarm- [...] new 142ff9bddbde KVM: arm64: Drop unused workaround_flags vcpu field new 9d8604b28575 KVM: arm64: Rework kvm_pgtable initialisation new 500ca5241bf8 KVM: arm64: Use defined value for SCTLR_ELx_EE new a080e323be8d KVM: arm64: Fix comment for kvm_reset_vcpu() new dda0190d7ff7 KVM: arm64: Fix comment on barrier in kvm_psci_vcpu_on() new f15dcf1b5853 KVM: arm64: selftests: get-reg-list: Add pauth configuration new e938eddbeb85 KVM: arm64: Fix comment typo in kvm_vcpu_finalize_sve() new 6c9eeb5f4a9b KVM: arm64: vgic: Replace kernel.h with the necessary inclusions new 1c53a1ae3612 Merge branch kvm-arm64/misc-5.17 into kvmarm-master/next new 7fd55a02a426 Merge tag 'kvmarm-5.17' of git://git.kernel.org/pub/scm/li [...] new cc4f602bc436 KVM: RISC-V: Use common KVM implementation of MMU memory caches new cf70be9d214c RISC-V: KVM: Mark the existing SBI implementation as v0.1 new a046c2d8578c RISC-V: KVM: Reorganize SBI code by moving SBI v0.1 to its [...] new c62a76859723 RISC-V: KVM: Add SBI v0.2 base extension new 5f862df5585c RISC-V: KVM: Add v0.1 replacement SBI extensions defined in v0.2 new 3e1d86569c21 RISC-V: KVM: Add SBI HSM extension in KVM new 4abed558b2ce MAINTAINERS: Update Atish's email address new 637ad6551b28 RISC-V: KVM: make kvm_riscv_vcpu_fp_clean() static new ef8949a986f0 RISC-V: KVM: Forward SBI experimental and vendor extensions new a457fd5660ef RISC-V: KVM: Add VM capability to allow userspace get GPA bits new 788490e798a7 KVM: selftests: Add EXTRA_CFLAGS in top-level Makefile new 3e06cdf10520 KVM: selftests: Add initial support for RISC-V 64-bit new 33e5b5746cc2 KVM: RISC-V: Avoid spurious virtual interrupts after clear [...] new 497685f2c743 MAINTAINERS: Update Anup's email address new 1b0c9d00aa2c Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-ris [...] new 4c66b56781eb selftests: KVM: sev_migrate_tests: Fix test_sev_mirror() new 427d046a41bb selftests: KVM: sev_migrate_tests: Fix sev_ioctl() new a6fec53947cf selftests: KVM: sev_migrate_tests: Add mirror command tests new 46cbc0400f85 Revert "KVM: X86: Update mmu->pdptrs only when it is changed" new a9f2705ec844 KVM: VMX: Save HOST_CR3 in vmx_set_host_fs_gs() new 6b123c3a89a9 KVM: x86/mmu: Reconstruct shadow page root if the guest PD [...] new 5b61178cd2fd KVM: VMX: Mark VCPU_EXREG_CR3 dirty when !CR0_PG -> CR0_PG [...] new 006a0f0607e1 KVM: x86: avoid out of bounds indices for fixed performanc [...] new 761875634a5e KVM: x86/pmu: Setup pmc->eventsel for fixed PMCs new 7c174f305cbe KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id() new 6ed1298eb0bf KVM: x86/pmu: Reuse pmc_perf_hw_id() and drop find_fixed_event() new 40ccb96d5483 KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{ [...] new 9cd803d496e7 KVM: x86: Update vPMCs when retiring instructions new 018d70ffcfec KVM: x86: Update vPMCs when retiring branch instructions new f3f26dae05e3 x86/kvm: Silence per-cpu pr_info noise about KVM clocks an [...] new 2efd61a608b0 KVM: Warn if mark_page_dirty() is called without an active vCPU new 982ed0de4753 KVM: Reinstate gfn_to_pfn_cache with invalidation support new 1cfc9c4b9d46 KVM: x86/xen: Maintain valid mapping of Xen shared_info page new 14243b387137 KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event cha [...] new 55749769fe60 KVM: x86: Fix wall clock writes in Xen shared_info not to [...] new 907d139318b5 KVM: VMX: Provide vmread version using asm-goto-with-outputs new 405329fc9aee KVM: SVM: include CR3 in initial VMSA state for SEV-ES guests new 7d9a662ed9f0 kvm: selftests: move base kvm_util.h declarations to kvm_u [...] new 96c1a6285568 kvm: selftests: move ucall declarations into ucall_common.h new 980fe2fddcff x86/fpu: Extend fpu_xstate_prctl() with guest permissions new 36487e6228c4 x86/fpu: Prepare guest FPU for dynamically enabled FPU features new cc04b6a21d43 kvm: x86: Fix xstate_required_size() to follow XSTATE alig [...] new 445ecdf79be0 kvm: x86: Exclude unpermitted xfeatures at KVM_GET_SUPPORT [...] new b0237dad2d7f x86/fpu: Make XFD initialization in __fpstate_reset() a fu [...] new c270ce393dfd x86/fpu: Add guest support to xfd_enable_feature() new 0781d60f658e x86/fpu: Provide fpu_enable_guest_xfd_features() for KVM new 5ab2f45bba48 kvm: x86: Enable dynamic xfeatures at KVM_SET_CPUID2 new 8eb9a48ac1e8 x86/fpu: Provide fpu_update_guest_xfd() for IA32_XFD emulation new 820a6ee944e7 kvm: x86: Add emulation for IA32_XFD new 1df4fd834e8e x86/fpu: Prepare xfd_err in struct fpu_guest new ec5be88ab29f kvm: x86: Intercept #NM for saving IA32_XFD_ERR new 548e83650a51 kvm: x86: Emulate IA32_XFD_ERR for guest new 61f208134a87 kvm: x86: Disable RDMSR interception of IA32_XFD_ERR new 86aff7a47992 kvm: x86: Add XCR0 support for Intel AMX new 690a757d610e kvm: x86: Add CPUID support for Intel AMX new c60427dd50ba x86/fpu: Add uabi_size to guest_fpu new be50b2065dfa kvm: x86: Add support for getting/setting expanded xstate buffer new 415a3c33e847 kvm: selftests: Add support for KVM_CAP_XSAVE2 new 5429cead0119 x86/fpu: Provide fpu_sync_guest_vmexit_xfd_state() new b5274b1b7ba8 kvm: x86: Disable interception for IA32_XFD on demand new 551447cfa5dc selftest: kvm: Reorder vcpu_load_state steps for AMX new 6559b4a523cd selftest: kvm: Move struct kvm_x86_state to header new bf70636d9443 selftest: kvm: Add amx selftest new c862dcd19975 x86/fpu: Fix inline prefix warnings new 79e06c4c4950 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 298 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: .mailmap | 2 + Documentation/virt/kvm/api.rst | 85 +- Documentation/virt/kvm/mmu.rst | 8 +- MAINTAINERS | 4 +- arch/arm64/include/asm/kvm_asm.h | 1 + arch/arm64/include/asm/kvm_emulate.h | 4 +- arch/arm64/include/asm/kvm_host.h | 47 +- arch/arm64/include/asm/kvm_hyp.h | 1 - arch/arm64/include/asm/kvm_mmu.h | 2 + arch/arm64/include/asm/kvm_pgtable.h | 30 +- .../include/nvhe/mm.h => include/asm/kvm_pkvm.h} | 45 +- arch/arm64/include/asm/mmu.h | 1 + arch/arm64/include/asm/sysreg.h | 1 + arch/arm64/kernel/asm-offsets.c | 1 - arch/arm64/kernel/fpsimd.c | 6 +- arch/arm64/kvm/.gitignore | 2 + arch/arm64/kvm/Kconfig | 1 + arch/arm64/kvm/Makefile | 24 +- arch/arm64/kvm/arch_timer.c | 13 +- arch/arm64/kvm/arm.c | 128 ++- arch/arm64/kvm/fpsimd.c | 79 +- arch/arm64/kvm/handle_exit.c | 5 +- arch/arm64/kvm/hyp/Makefile | 2 +- arch/arm64/kvm/hyp/fpsimd.S | 6 - arch/arm64/kvm/hyp/hyp-constants.c | 10 + arch/arm64/kvm/hyp/include/hyp/switch.h | 30 +- arch/arm64/kvm/hyp/include/nvhe/mem_protect.h | 6 + arch/arm64/kvm/hyp/include/nvhe/mm.h | 59 -- arch/arm64/kvm/hyp/nvhe/early_alloc.c | 5 + arch/arm64/kvm/hyp/nvhe/hyp-main.c | 8 + arch/arm64/kvm/hyp/nvhe/mem_protect.c | 505 ++++++++-- arch/arm64/kvm/hyp/nvhe/mm.c | 4 +- arch/arm64/kvm/hyp/nvhe/page_alloc.c | 2 +- arch/arm64/kvm/hyp/nvhe/setup.c | 25 +- arch/arm64/kvm/hyp/nvhe/switch.c | 1 - arch/arm64/kvm/hyp/pgtable.c | 108 +- arch/arm64/kvm/hyp/vhe/switch.c | 1 - arch/arm64/kvm/mmu.c | 177 +++- arch/arm64/kvm/{hyp/reserved_mem.c => pkvm.c} | 8 +- arch/arm64/kvm/pmu-emul.c | 3 +- arch/arm64/kvm/psci.c | 10 +- arch/arm64/kvm/reset.c | 30 +- arch/arm64/kvm/vgic/vgic-init.c | 12 +- arch/arm64/kvm/vgic/vgic-kvm-device.c | 2 +- arch/arm64/kvm/vgic/vgic-mmio-v2.c | 3 +- arch/arm64/kvm/vgic/vgic-mmio-v3.c | 15 +- arch/arm64/kvm/vgic/vgic-mmio.c | 2 +- arch/arm64/kvm/vgic/vgic-mmio.h | 2 +- arch/arm64/kvm/vgic/vgic-v2.c | 9 +- arch/arm64/kvm/vgic/vgic-v3.c | 10 +- arch/arm64/kvm/vgic/vgic-v4.c | 5 +- arch/arm64/kvm/vgic/vgic.c | 2 +- arch/mips/include/asm/kvm_host.h | 1 - arch/mips/kvm/Kconfig | 1 + arch/mips/kvm/Makefile | 3 +- arch/mips/kvm/emulate.c | 2 +- arch/mips/kvm/loongson_ipi.c | 4 +- arch/mips/kvm/mips.c | 32 +- arch/powerpc/include/asm/kvm_host.h | 2 +- arch/powerpc/include/asm/kvm_ppc.h | 14 +- arch/powerpc/kvm/Kconfig | 1 + arch/powerpc/kvm/Makefile | 8 +- arch/powerpc/kvm/book3s.c | 14 +- arch/powerpc/kvm/book3s_32_mmu.c | 2 +- arch/powerpc/kvm/book3s_64_mmu.c | 2 +- arch/powerpc/kvm/book3s_64_mmu_hv.c | 4 +- arch/powerpc/kvm/book3s_hv.c | 36 +- arch/powerpc/kvm/book3s_hv_nested.c | 4 +- arch/powerpc/kvm/book3s_hv_uvmem.c | 14 +- arch/powerpc/kvm/book3s_pr.c | 13 +- arch/powerpc/kvm/book3s_pr_papr.c | 2 +- arch/powerpc/kvm/book3s_xics.c | 6 +- arch/powerpc/kvm/book3s_xics.h | 2 +- arch/powerpc/kvm/book3s_xive.c | 15 +- arch/powerpc/kvm/book3s_xive.h | 4 +- arch/powerpc/kvm/book3s_xive_native.c | 8 +- arch/powerpc/kvm/booke.c | 9 +- arch/powerpc/kvm/e500_emulate.c | 2 +- arch/powerpc/kvm/powerpc.c | 24 +- arch/riscv/include/asm/kvm_host.h | 12 +- arch/riscv/include/asm/kvm_types.h | 2 +- arch/riscv/include/asm/kvm_vcpu_sbi.h | 33 + arch/riscv/include/asm/sbi.h | 9 + arch/riscv/kvm/Makefile | 10 +- arch/riscv/kvm/main.c | 8 + arch/riscv/kvm/mmu.c | 102 +- arch/riscv/kvm/vcpu.c | 28 +- arch/riscv/kvm/vcpu_exit.c | 2 +- arch/riscv/kvm/vcpu_fp.c | 2 +- arch/riscv/kvm/vcpu_sbi.c | 213 ++-- arch/riscv/kvm/vcpu_sbi_base.c | 99 ++ arch/riscv/kvm/vcpu_sbi_hsm.c | 105 ++ arch/riscv/kvm/vcpu_sbi_replace.c | 135 +++ arch/riscv/kvm/{vcpu_sbi.c => vcpu_sbi_v01.c} | 121 +-- arch/riscv/kvm/vm.c | 13 +- arch/riscv/kvm/vmid.c | 2 +- arch/s390/include/asm/kvm_host.h | 2 - arch/s390/include/asm/uv.h | 34 +- arch/s390/kvm/Kconfig | 1 + arch/s390/kvm/Makefile | 8 +- arch/s390/kvm/gaccess.c | 158 +-- arch/s390/kvm/interrupt.c | 12 +- arch/s390/kvm/kvm-s390.c | 161 ++- arch/s390/kvm/kvm-s390.h | 19 +- arch/s390/kvm/pv.c | 4 +- arch/s390/kvm/sigp.c | 28 + arch/x86/hyperv/hv_init.c | 14 +- arch/x86/hyperv/ivm.c | 28 + arch/x86/hyperv/mmu.c | 19 +- arch/x86/include/asm/cpufeatures.h | 2 + arch/x86/include/asm/fpu/api.h | 11 + arch/x86/include/asm/fpu/types.h | 32 + arch/x86/include/asm/kvm-x86-ops.h | 1 + arch/x86/include/asm/kvm_host.h | 65 +- arch/x86/include/asm/kvm_page_track.h | 6 +- arch/x86/include/asm/mshyperv.h | 2 +- arch/x86/include/uapi/asm/kvm.h | 16 +- arch/x86/include/uapi/asm/prctl.h | 26 +- arch/x86/kernel/cc_platform.c | 8 + arch/x86/kernel/cpu/mshyperv.c | 15 +- arch/x86/kernel/fpu/core.c | 99 +- arch/x86/kernel/fpu/xstate.c | 147 ++- arch/x86/kernel/fpu/xstate.h | 19 +- arch/x86/kernel/kvm.c | 6 +- arch/x86/kernel/kvmclock.c | 2 +- arch/x86/kernel/process.c | 2 + arch/x86/kvm/Kconfig | 3 + arch/x86/kvm/Makefile | 7 +- arch/x86/kvm/cpuid.c | 88 +- arch/x86/kvm/cpuid.h | 2 + arch/x86/kvm/debugfs.c | 6 +- arch/x86/kvm/emulate.c | 55 +- arch/x86/kvm/hyperv.c | 9 +- arch/x86/kvm/i8254.c | 2 +- arch/x86/kvm/i8259.c | 5 +- arch/x86/kvm/ioapic.c | 4 +- arch/x86/kvm/irq_comm.c | 19 +- arch/x86/kvm/kvm_cache_regs.h | 20 +- arch/x86/kvm/kvm_emulate.h | 1 + arch/x86/kvm/kvm_onhyperv.c | 3 +- arch/x86/kvm/lapic.c | 63 +- arch/x86/kvm/mmu.h | 16 +- arch/x86/kvm/mmu/mmu.c | 151 ++- arch/x86/kvm/mmu/mmu_internal.h | 9 +- arch/x86/kvm/mmu/mmutrace.h | 2 +- arch/x86/kvm/mmu/page_track.c | 8 +- arch/x86/kvm/mmu/paging_tmpl.h | 48 +- arch/x86/kvm/mmu/spte.c | 6 +- arch/x86/kvm/mmu/spte.h | 2 +- arch/x86/kvm/mmu/tdp_mmu.c | 2 +- arch/x86/kvm/pmu.c | 128 ++- arch/x86/kvm/pmu.h | 5 +- arch/x86/kvm/svm/avic.c | 16 +- arch/x86/kvm/svm/nested.c | 262 +++-- arch/x86/kvm/svm/pmu.c | 23 +- arch/x86/kvm/svm/sev.c | 9 +- arch/x86/kvm/svm/svm.c | 66 +- arch/x86/kvm/svm/svm.h | 71 +- arch/x86/kvm/trace.h | 24 + arch/x86/kvm/vmx/capabilities.h | 9 + arch/x86/kvm/vmx/nested.c | 65 +- arch/x86/kvm/vmx/pmu_intel.c | 49 +- arch/x86/kvm/vmx/posted_intr.c | 159 +-- arch/x86/kvm/vmx/posted_intr.h | 6 +- arch/x86/kvm/vmx/vmcs.h | 5 + arch/x86/kvm/vmx/vmx.c | 216 ++-- arch/x86/kvm/vmx/vmx.h | 44 +- arch/x86/kvm/vmx/vmx_ops.h | 27 + arch/x86/kvm/x86.c | 405 +++++--- arch/x86/kvm/x86.h | 1 - arch/x86/kvm/xen.c | 341 ++++++- arch/x86/kvm/xen.h | 9 + drivers/hv/channel_mgmt.c | 2 +- drivers/hv/hv_common.c | 15 +- drivers/hv/vmbus_drv.c | 4 + drivers/net/hyperv/hyperv_net.h | 5 + drivers/net/hyperv/netvsc.c | 136 ++- drivers/net/hyperv/netvsc_drv.c | 1 + drivers/net/hyperv/rndis_filter.c | 2 + drivers/scsi/storvsc_drv.c | 54 +- include/asm-generic/mshyperv.h | 6 +- include/kvm/arm_vgic.h | 4 +- include/linux/hyperv.h | 6 + include/linux/kvm_dirty_ring.h | 14 +- include/linux/kvm_host.h | 432 ++++++-- include/linux/kvm_types.h | 19 + include/linux/swiotlb.h | 6 + include/uapi/linux/kvm.h | 16 + kernel/dma/swiotlb.c | 50 +- tools/arch/x86/include/uapi/asm/kvm.h | 16 +- tools/include/uapi/linux/kvm.h | 3 + tools/testing/selftests/kvm/.gitignore | 1 + tools/testing/selftests/kvm/Makefile | 16 +- tools/testing/selftests/kvm/aarch64/arch_timer.c | 2 +- tools/testing/selftests/kvm/aarch64/get-reg-list.c | 50 + tools/testing/selftests/kvm/aarch64/vgic_irq.c | 853 ++++++++++++++++ tools/testing/selftests/kvm/include/aarch64/gic.h | 26 + .../kvm/{lib => include}/aarch64/gic_v3.h | 12 + .../selftests/kvm/include/aarch64/processor.h | 3 + tools/testing/selftests/kvm/include/aarch64/vgic.h | 18 +- tools/testing/selftests/kvm/include/kvm_util.h | 409 +------- .../kvm/include/{kvm_util.h => kvm_util_base.h} | 89 +- .../selftests/kvm/include/riscv/processor.h | 135 +++ tools/testing/selftests/kvm/include/ucall_common.h | 59 ++ .../selftests/kvm/include/x86_64/processor.h | 26 +- tools/testing/selftests/kvm/lib/aarch64/gic.c | 66 ++ .../selftests/kvm/lib/aarch64/gic_private.h | 11 + tools/testing/selftests/kvm/lib/aarch64/gic_v3.c | 206 +++- .../testing/selftests/kvm/lib/aarch64/processor.c | 82 +- tools/testing/selftests/kvm/lib/aarch64/vgic.c | 103 +- tools/testing/selftests/kvm/lib/guest_modes.c | 59 +- tools/testing/selftests/kvm/lib/kvm_util.c | 126 +++ tools/testing/selftests/kvm/lib/riscv/processor.c | 362 +++++++ tools/testing/selftests/kvm/lib/riscv/ucall.c | 87 ++ tools/testing/selftests/kvm/lib/x86_64/processor.c | 95 +- tools/testing/selftests/kvm/x86_64/amx_test.c | 448 ++++++++ tools/testing/selftests/kvm/x86_64/evmcs_test.c | 2 +- .../selftests/kvm/x86_64/sev_migrate_tests.c | 59 +- tools/testing/selftests/kvm/x86_64/smm_test.c | 2 +- tools/testing/selftests/kvm/x86_64/state_test.c | 2 +- .../kvm/x86_64/vmx_preemption_timer_test.c | 2 +- .../testing/selftests/kvm/x86_64/xen_shinfo_test.c | 184 +++- virt/kvm/Kconfig | 6 + virt/kvm/Makefile.kvm | 14 + virt/kvm/async_pf.c | 2 +- virt/kvm/dirty_ring.c | 11 +- virt/kvm/kvm_main.c | 1066 ++++++++++++-------- virt/kvm/kvm_mm.h | 44 + virt/kvm/mmu_lock.h | 23 - virt/kvm/pfncache.c | 337 +++++++ 230 files changed, 8851 insertions(+), 3133 deletions(-) copy arch/arm64/{kvm/hyp/include/nvhe/mm.h => include/asm/kvm_pkvm.h} (53%) create mode 100644 arch/arm64/kvm/.gitignore create mode 100644 arch/arm64/kvm/hyp/hyp-constants.c rename arch/arm64/kvm/{hyp/reserved_mem.c => pkvm.c} (94%) create mode 100644 arch/riscv/include/asm/kvm_vcpu_sbi.h create mode 100644 arch/riscv/kvm/vcpu_sbi_base.c create mode 100644 arch/riscv/kvm/vcpu_sbi_hsm.c create mode 100644 arch/riscv/kvm/vcpu_sbi_replace.c copy arch/riscv/kvm/{vcpu_sbi.c => vcpu_sbi_v01.c} (50%) create mode 100644 tools/testing/selftests/kvm/aarch64/vgic_irq.c rename tools/testing/selftests/kvm/{lib => include}/aarch64/gic_v3.h (80%) copy tools/testing/selftests/kvm/include/{kvm_util.h => kvm_util_base.h} (87%) create mode 100644 tools/testing/selftests/kvm/include/riscv/processor.h create mode 100644 tools/testing/selftests/kvm/include/ucall_common.h create mode 100644 tools/testing/selftests/kvm/lib/riscv/processor.c create mode 100644 tools/testing/selftests/kvm/lib/riscv/ucall.c create mode 100644 tools/testing/selftests/kvm/x86_64/amx_test.c create mode 100644 virt/kvm/Makefile.kvm create mode 100644 virt/kvm/kvm_mm.h delete mode 100644 virt/kvm/mmu_lock.h create mode 100644 virt/kvm/pfncache.c