This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gcc_bootstrap/release-aarch64-bootstrap_ubsan
in repository toolchain/ci/base-artifacts.
from 9d35d63dfaf 38: onsuccess: #145: 2: Success after binutils/gcc: 16 commits
new 2ac7de1dcdb 39: onsuccess: #146: 2: Success after binutils/gcc: 11 commits
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1744 -> 1740 bytes
02-prepare_abe/console.log.xz | Bin 2788 -> 2760 bytes
04-build_abe-binutils/console.log.xz | Bin 40012 -> 38388 bytes
05-build_abe-bootstrap_ubsan/console.log.xz | Bin 322480 -> 323648 bytes
06-check_regression/console.log.xz | Bin 2836 -> 2848 bytes
dashboard/dashboard-generate.sh | 2 +-
git/binutils_rev | 2 +-
git/gcc_rev | 2 +-
mail/jira-body.txt | 2 +-
mail/mail-body.txt | 2 +-
mail/mail-subject.txt | 2 +-
manifest.sh | 18 +++++++++---------
12 files changed, 15 insertions(+), 15 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository binutils-gdb.
from 2e55fbce03a Move streq and compare_cstrings to gdbsupport
new 69de4313924 gdb/testsuite: don't delete command files in gdb.base/commands.exp
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
gdb/testsuite/gdb.base/commands.exp | 14 ++++----------
1 file changed, 4 insertions(+), 10 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository gcc.
from 38304846d18 c++: partial ordering with memfn ptr cst [PR108104]
new be124477b38 c++: local alias in typename in lambda [PR105518]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
gcc/cp/pt.cc | 111 ++++++++++++++--------
gcc/testsuite/g++.dg/cpp0x/lambda/lambda-alias1.C | 23 +++++
2 files changed, 92 insertions(+), 42 deletions(-)
create mode 100644 gcc/testsuite/g++.dg/cpp0x/lambda/lambda-alias1.C
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository gcc.
from 12abd5a7d13 IRA: Check that reg classes contain a hard reg of given mod [...]
new 38304846d18 c++: partial ordering with memfn ptr cst [PR108104]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
gcc/cp/pt.cc | 2 +-
gcc/testsuite/g++.dg/template/ptrmem33.C | 30 ++++++++++++++++++++++++++++++
2 files changed, 31 insertions(+), 1 deletion(-)
create mode 100644 gcc/testsuite/g++.dg/template/ptrmem33.C
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gnu_native_fast_check_gdb/master-arm
in repository toolchain/ci/base-artifacts.
from 66f21f9e250 40: onsuccess: #47: 1: Success after binutils/gcc/linux/gli [...]
new 270c7d9a622 41: onsuccess: #48: 1: Success after binutils/gcc/linux/gli [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1800 -> 1784 bytes
02-prepare_abe/console.log.xz | Bin 2756 -> 2752 bytes
03-build_abe-binutils/console.log.xz | Bin 52828 -> 53236 bytes
04-build_abe-gcc/console.log.xz | Bin 236088 -> 236152 bytes
05-clean_sysroot/console.log.xz | Bin 316 -> 316 bytes
06-build_abe-linux/console.log.xz | Bin 8616 -> 11396 bytes
07-build_abe-glibc/console.log.xz | Bin 234380 -> 236728 bytes
08-build_abe-gdb/console.log.xz | Bin 50612 -> 52188 bytes
09-build_abe-dejagnu/console.log.xz | Bin 3828 -> 3836 bytes
10-build_abe-check_gdb/console.log.xz | Bin 2576 -> 2728 bytes
11-check_regression/console.log.xz | Bin 6072 -> 6092 bytes
11-check_regression/results.compare | 4 ++--
11-check_regression/results.compare2 | 6 +++---
dashboard/dashboard-generate.sh | 2 +-
git/binutils_rev | 2 +-
git/gcc_rev | 2 +-
git/gdb_rev | 2 +-
git/glibc_rev | 2 +-
git/linux_rev | 2 +-
mail/jira-body.txt | 2 +-
mail/mail-body.txt | 2 +-
mail/mail-subject.txt | 2 +-
manifest.sh | 36 +++++++++++++++++-----------------
sumfiles/gdb.log.xz | Bin 14464 -> 14536 bytes
sumfiles/gdb.sum | 34 ++++++++++++++++----------------
25 files changed, 49 insertions(+), 49 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/llvm-master-aarch64-next-allnoconfig
in repository toolchain/ci/base-artifacts.
from f49b0015571 27: onsuccess: #484: boot: Success after binutils/llvm/linu [...]
new d96443a86e6 28: onsuccess: #485: boot: Success after binutils/llvm/linu [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1744 -> 1764 bytes
02-prepare_abe/console.log.xz | Bin 2776 -> 2768 bytes
03-build_abe-binutils/console.log.xz | Bin 31744 -> 32288 bytes
04-build_kernel_llvm/console.log.xz | Bin 64656 -> 67260 bytes
05-build_abe-qemu/console.log.xz | Bin 30640 -> 31716 bytes
06-build_linux/console.log.xz | Bin 3096 -> 3140 bytes
07-boot_linux/console.log.xz | Bin 504 -> 504 bytes
08-check_regression/console.log.xz | Bin 3776 -> 4296 bytes
dashboard/dashboard-generate.sh | 2 +-
git/binutils_rev | 2 +-
git/linux_rev | 2 +-
git/llvm_rev | 2 +-
git/qemu_rev | 2 +-
mail/jira-body.txt | 2 +-
mail/mail-body.txt | 2 +-
mail/mail-subject.txt | 2 +-
manifest.sh | 30 +++++++++++++++---------------
17 files changed, 23 insertions(+), 23 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_kernel/llvm-release-aarch64-next-defconfig
in repository toolchain/ci/base-artifacts.
from 92cf878dc47 29: onsuccess: #494: boot: Success after binutils/linux: 95 [...]
new b69e802ca5c 30: onsuccess: #495: boot: Success after binutils/linux/qem [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1764 -> 1804 bytes
02-prepare_abe/console.log.xz | Bin 2776 -> 2792 bytes
03-build_abe-binutils/console.log.xz | Bin 30332 -> 30740 bytes
04-build_kernel_llvm/console.log.xz | Bin 64320 -> 66132 bytes
05-build_abe-qemu/console.log.xz | Bin 30632 -> 32152 bytes
06-build_linux/console.log.xz | Bin 3644 -> 3192 bytes
07-boot_linux/console.log.xz | Bin 6192 -> 6236 bytes
08-check_regression/console.log.xz | Bin 3296 -> 3764 bytes
08-check_regression/mail-body.txt | 2 +-
dashboard/dashboard-generate.sh | 2 +-
git/binutils_rev | 2 +-
git/linux_rev | 2 +-
git/qemu_rev | 2 +-
mail/jira-body.txt | 2 +-
mail/mail-body.txt | 4 ++--
mail/mail-subject.txt | 2 +-
manifest.sh | 26 +++++++++++++-------------
results | 2 +-
18 files changed, 23 insertions(+), 23 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from 057b40f43ce4 Merge tag 'acpi-6.2-rc1-2' of git://git.kernel.org/pub/scm [...]
new 0b9ca98b7229 perf/x86/core: Zero @lbr instead of returning -1 in x86_pe [...]
new bec46859fb9d KVM: x86: Track supported PERF_CAPABILITIES in kvm_caps
new 6c6f82bea96f KVM: x86: Init vcpu->arch.perf_capabilities in common x86 code
new 5fe9805dc2f5 KVM: x86: Handle PERF_CAPABILITIES in common x86's kvm_get [...]
new 686e0f0324f0 KVM: x86: Directly query supported PERF_CAPABILITIES for W [...]
new 0f9edb8cab29 KVM: x86: remove obsolete kvm_mmu_gva_to_gpa_fetch()
new fa3e42037ef5 KVM: x86/mmu: fix some comment typos
new 3adbdf810388 KVM: x86/mmu: use helper macro SPTE_ENT_PER_PAGE
new bb5c8abea094 KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD
new 00009406f0db x86/kvm: Remove unused virt to phys translation in kvm_gue [...]
new 07a368b3f55a bug: introduce ASSERT_STRUCT_OFFSET
new d08b48585309 KVM: SVM: Name and check reserved fields with structs offset
new b0b42197b5c6 KVM: x86: start moving SMM-related functions to new files
new c53da4f3af6e KVM: x86: move SMM entry to a new file
new f1554150d3c6 KVM: x86: move SMM exit to a new file
new 1d0da94cdafe KVM: x86: do not go through ctxt->ops when emulating rsm
new 4b8e1b32013d KVM: allow compiling out SMM support
new 31e83e21cf00 KVM: x86: compile out vendor-specific code if SMM is disabled
new ba97bb07e0b2 KVM: x86: remove SMRAM address space if SMM is not supported
new cf7316d0361c KVM: x86: do not define KVM_REQ_SMI if SMM disabled
new 85672346a707 KVM: zero output of KVM_GET_VCPU_EVENTS before filling in [...]
new a7662aa5e56f KVM: x86: do not define SMM-related constants if SMM disabled
new 89dccf82e99e KVM: x86: smm: check for failures on smm entry
new 09779c16e3ed KVM: x86: smm: add structs for KVM's smram layout
new 58c1d206d545 KVM: x86: smm: use smram structs in the common code
new f34bdf4c1707 KVM: x86: smm: use smram struct for 32 bit smram load/restore
new 8bcda1dee95a KVM: x86: smm: use smram struct for 64 bit smram load/restore
new e6a82199b610 KVM: svm: drop explicit return value of kvm_vcpu_map
new dd5045fed588 KVM: x86: SVM: use smram structs
new 95504c7c981b KVM: x86: SVM: don't save SVM state to SMRAM when VM is no [...]
new fb28875fd7da KVM: x86: smm: preserve interrupt shadow in SMRAM
new 93c5c61d9e58 mm/gup: Add FOLL_INTERRUPTIBLE
new fe5ed56c7973 kvm: Add KVM_PFN_ERR_SIGPENDING
new c8b88b332bed kvm: Add interruptible flag to __gfn_to_pfn_memslot()
new 766576874b97 kvm: x86: Allow to respond to generic signals during slow PF
new be83794210e7 KVM: x86: Disallow the use of KVM_MSR_FILTER_DEFAULT_ALLOW [...]
new db205f7e1edc KVM: x86: Add a VALID_MASK for the MSR exit reason flags
new c1340fe3590e KVM: x86: Add a VALID_MASK for the flag in kvm_msr_filter
new 8aff460f2167 KVM: x86: Add a VALID_MASK for the flags in kvm_msr_filter_range
new f7d647727123 selftests: kvm/x86: Test the flags in MSR filtering and MS [...]
new 428e921611bc KVM: x86/mmu: Tag disallowed NX huge pages even if they're [...]
new 55c510e26ab6 KVM: x86/mmu: Rename NX huge pages fields/functions for co [...]
new b5b0977f4aa2 KVM: x86/mmu: Properly account NX huge page workaround for [...]
new 61f94478547b KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU befor [...]
new d25ceb926436 KVM: x86/mmu: Track the number of TDP MMU pages, but not t [...]
new 5e3edd7e8b7e KVM: x86/mmu: Add helper to convert SPTE value to its shadow page
new 76901e56fb51 KVM: x86/mmu: explicitly check nx_hugepage in disallowed_h [...]
new 3a0567572225 KVM: x86/mmu: WARN if TDP MMU SP disallows hugepage after [...]
new f1c5651fda43 KVM: x86/pmu: Force reprogramming of all counters on PMU f [...]
new dcbb816a2842 KVM: x86/pmu: Clear "reprogram" bit if counter is disabled [...]
new 68fb4757e867 KVM: x86/pmu: Defer reprogram_counter() to kvm_pmu_handle_event()
new de0f619564f4 KVM: x86/pmu: Defer counter emulated overflow via pmc->pre [...]
new d663b8a28598 KVM: replace direct irq.h inclusion
new c5c4f72ad4fa KVM: selftests: Add missing break between -e and -g option [...]
new 0eb88a412186 KVM: selftests: Put command line options in alphabetical o [...]
new 018ea2d71a43 KVM: selftests: Add atoi_paranoid() to catch errors missed [...]
new 69a62e2004b8 KVM: selftests: Use SZ_* macros from sizes.h in max_guest_ [...]
new c15bdebb32dd KVM: selftests: Shorten the test args in memslot_modificat [...]
new 0001725d0f9b KVM: selftests: Add atoi_positive() and atoi_non_negative( [...]
new d886724ea81c KVM: selftests: Allowing running dirty_log_perf_test on sp [...]
new b31f21a7e97e KVM: selftests: implement random number generator for guest code
new f11aa24bdbc6 KVM: selftests: create -r argument to specify random seed
new 6864c6442f4d KVM: selftests: randomize which pages are written vs read
new c967a4752ac6 KVM: selftests: randomize page access order
new 9fda6753c9dd KVM: selftests: Rename perf_test_util.[ch] to memstress.[ch]
new a008a3351fea KVM: selftests: Rename pta (short for perf_test_args) to args
new 7812d80c0f89 KVM: selftests: Rename perf_test_util symbols to memstress
new 1cec8bbc1764 KVM: arm64: selftests: Disable single-step with correct KV [...]
new b3d937722de0 KVM: arm64: selftests: Disable single-step without relying [...]
new 7046638192d5 KVM: selftests: Consolidate common code for populating uca [...]
new ef38871eb228 KVM: selftests: Consolidate boilerplate code in get_ucall()
new dc88244bf548 KVM: selftests: Automatically do init_ucall() for non-bare [...]
new cf4694be2b2c tools: Add atomic_test_and_set_bit()
new 03b4750533fc KVM: selftests: Make arm64's MMIO ucall multi-VM friendly
new 28a65567acb5 KVM: selftests: Drop now-unnecessary ucall_uninit()
new 426729b2cf2e KVM: selftests: Add ucall pool based implementation
new 9a6418dacd24 KVM: selftests: Fix spelling mistake "begining" -> "beginning"
new 816c54b74742 KVM: selftests: Drop helpers to read/write page table entries
new 751f280017b6 KVM: selftests: Drop reserved bit checks from PTE accessor
new 91add12d384c KVM: selftests: Remove useless shifts when creating guest [...]
new ed0b58fc6f0b KVM: selftests: Verify parent PTE is PRESENT when getting [...]
new 99d51c6eef2d KVM: selftests: Use virt_get_pte() when getting PTE pointer
new efe91dc307d0 KVM: selftests: Use vm_get_page_table_entry() in addr_arch [...]
new 96b69958c77d KVM: selftests: Play nice with huge pages when getting PTEs/GPAs
new 197ebb713ad0 KVM: selftests: move common startup logic to kvm_util.c
new e1ab31245c4e KVM: selftests: Add arch specific initialization
new 2115713cfab0 KVM: selftests: Add arch specific post vm creation hook
new 376bc1b458c9 KVM: selftests: Don't assume vcpu->id is '0' in xAPIC state test
new 52d3a4fb5be1 KVM: selftests: Rename emulator_error_test to smaller_maxp [...]
new 48e59373398a KVM: selftests: Explicitly require instructions bytes
new 50824c6eee39 KVM: selftests: Delete dead ucall code
new 19a2b32f5d24 KVM: selftests: Move flds instruction emulation failure ha [...]
new d6ecfe976ac3 KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks
new 77f7813cc2b9 KVM: selftests: Copy KVM PFERR masks into selftests
new f2e5b53b4ba9 KVM: selftests: Avoid JMP in non-faulting path of KVM_ASM_SAFE()
new b9635930f0a7 KVM: selftests: Provide error code as a KVM_ASM_SAFE() output
new a323845d6c3d KVM: selftests: Expect #PF(RSVD) when TDP is disabled
new 3ae5b759c3c0 KVM: selftests: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE
new 3bd396353d18 KVM: selftests: Add X86_FEATURE_PAE and use it calc "fallb [...]
new ee3795536664 KVM: selftests: Refactor X86_FEATURE_* framework to prep f [...]
new 53a7dc0f215e KVM: selftests: Add X86_PROPERTY_* framework to retrieve C [...]
new d80ddad2a8e0 KVM: selftests: Use X86_PROPERTY_MAX_KVM_LEAF in CPUID test
new a29e6e383b0d KVM: selftests: Refactor kvm_cpuid_has() to prep for X86_P [...]
new 40854713e325 KVM: selftests: Add kvm_cpu_*() support for X86_PROPERTY_*
new 5dc19f1c7dd3 KVM: selftests: Convert AMX test to use X86_PROPRETY_XXX
new 4feb9d21a407 KVM: selftests: Convert vmx_pmu_caps_test to use X86_PROPERTY_*
new 5228c02a4c54 KVM: selftests: Add PMU feature framework, use in PMU even [...]
new 24f3f9898e3c KVM: selftests: Add dedicated helpers for getting x86 Fami [...]
new 074e9d4c9c60 KVM: selftests: Add and use KVM helpers for x86 Family and Model
new b941ba2380cc KVM: selftests: Drop helpers for getting specific KVM supp [...]
new ecb89a51724b KVM: selftests: Check for KVM nEPT support using "feature" MSRs
new 5c107f7085f4 KVM: selftests: Assert in prepare_eptp() that nEPT is supported
new 92292c1de21d Merge tag 'kvm-selftests-6.2-1' of https://github.com/kvm- [...]
new c4b33d28ea51 KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
new 63d28a25e04c KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has [...]
new eb298605705a KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
new 771a579c6e74 Merge branch 'kvm-svm-harden' into HEAD
new 6c7b2202e4d1 KVM: x86: avoid memslot check in NX hugepage recovery if i [...]
new 089fe572a2e0 x86/hyperv: Move VMCB enlightenment definitions to hyperv-tlfs.h
new 381fc63ac075 KVM: selftests: Move "struct hv_enlightenments" to x86_64/svm.h
new 68ae7c7bc56a KVM: SVM: Add a proper field for Hyper-V VMCB enlightenments
new 26b516bb3921 x86/hyperv: KVM: Rename "hv_enlightenments" to "hv_vmcb_en [...]
new b83237ad2167 KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tl [...]
new a789aeba4196 KVM: VMX: Rename "vmx/evmcs.{ch}" to "vmx/hyperv.{ch}"
new e94cea093019 KVM: x86: Move clearing of TLB_FLUSH_CURRENT to kvm_vcpu_f [...]
new adc43caa0a25 KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
new 0823570f0198 KVM: x86: hyper-v: Introduce TLB flush fifo
new 56b5354fd8f9 KVM: x86: hyper-v: Add helper to read hypercall data for array
new 260970862c88 KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIS [...]
new f84fcb66568c KVM: x86: hyper-v: Expose support for extended gva ranges [...]
new aee738236dca KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
new bd19c94a19b0 x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PE [...]
new ca7372aca7f4 KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_P [...]
new b6c2c22fa701 KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in [...]
new 53ca765a041d KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
new 7d5e88d301f8 KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_ [...]
new 38edb4523183 KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
new e45aa2444d28 KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
new b0c9c25e4625 KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_f [...]
new 3c9eb0655fc0 KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
new c58a318f6090 KVM: x86: hyper-v: L2 TLB flush
new d4baf1a9a572 KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tl [...]
new 046f5756c491 KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
new c30e9bc8b606 KVM: nVMX: hyper-v: Enable L2 TLB flush
new b415d8d417bb KVM: x86: Make kvm_hv_get_assist_page() return 0/-errno
new 3f4a812edf5c KVM: nSVM: hyper-v: Enable L2 TLB flush
new f4de6a1fa3ee KVM: x86: Expose Hyper-V L2 TLB flush feature
new 676a863ce605 KVM: selftests: Better XMM read/write helpers
new c05a0a71c5d0 KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a co [...]
new caf4110fbaa8 KVM: selftests: Move the function doing Hyper-V hypercall [...]
new 998489245d84 KVM: selftests: Hyper-V PV IPI selftest
new 56fc7732031d KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_m [...]
new 2d4a5f91837f KVM: selftests: Export vm_vaddr_unused_gap() to make it po [...]
new 9e7726a8a08a KVM: selftests: Hyper-V PV TLB flush selftest
new 1ad51c0c0cdd KVM: selftests: Sync 'struct hv_enlightened_vmcs' definiti [...]
new d7b14a868ac2 KVM: selftests: Sync 'struct hv_vp_assist_page' definition [...]
new e8f3d23c02d0 KVM: selftests: Move Hyper-V VP assist page enablement out [...]
new cd8f11bd6bbd KVM: selftests: Split off load_evmcs() from load_vmcs()
new 2dc458b86221 KVM: selftests: Create a vendor independent helper to allo [...]
new 6c15c3c46520 KVM: selftests: Allocate Hyper-V partition assist page
new 8fda37cf3d41 KVM: selftests: Stuff RAX/RCX with 'safe' values in vmmcal [...]
new 75ee7505feae KVM: selftests: Introduce rdmsr_from_l2() and use it for M [...]
new 4b5d8b222bf1 KVM: selftests: evmcs_test: Introduce L2 TLB flush test
new 9c2e881945dc KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
new 0fa32dad1e78 KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
new 79268e9c62ec Merge branch 'kvm-dwmw2-fixes' into HEAD
new 3ca9d84e722e KVM: always declare prototype for kvm_arch_irqchip_in_kernel
new c3f3719952b9 KVM: x86/xen: Add CPL to Xen hypercall tracepoint
new 7927e27549d3 MAINTAINERS: Add KVM x86/xen maintainer list
new c4690d016182 KVM: x86: Add BUILD_BUG_ON() to detect bad usage of "scatt [...]
new 047c72299061 KVM: x86: Update KVM-only leaf handling to allow for 100% [...]
new 6a19d7aa5821 x86: KVM: Advertise CMPccXADD CPUID to user space
new af2872f62254 x86: KVM: Advertise AMX-FP16 CPUID to user space
new 5e85c4ebf206 x86: KVM: Advertise AVX-IFMA CPUID to user space
new 24d74b9f5f2a KVM: x86: Advertise AVX-VNNI-INT8 CPUID to user space
new 9977f0877de7 KVM: x86: Advertise AVX-NE-CONVERT CPUID to user space
new 29c46979b25d KVM: x86: Advertise PREFETCHIT0/1 CPUID to user space
new 079f0c21ef6d s390/mm: gmap: sort out physical vs virtual pointers usage
new 6b33e68ab309 s390/entry: sort out physical vs virtual pointers usage in sie64a
new fe0ef0030463 KVM: s390: sort out physical vs virtual pointers usage
new b99f4512197a KVM: s390: sida: sort out physical vs virtual pointers usage
new 4435b79a3664 KVM: s390: pv: sort out physical vs virtual pointers usage
new 77b533411595 KVM: s390: VSIE: sort out virtual/physical address in pin_ [...]
new 58635d6615f1 s390/mm: fix virtual-physical address confusion for swiotlb
new fb491d5500a7 KVM: s390: pv: asynchronous destroy for reboot
new d9459922a15c KVM: s390: pv: api documentation for asynchronous destroy
new 8c516b25d6e9 KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
new afe20eb8df91 KVM: s390: pv: avoid export before import if possible
new f7866f582b1c KVM: s390: pv: support for Destroy fast UVC
new cc726886079f KVM: s390: pv: module parameter to fence asynchronous destroy
new dbec280045f8 s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
new 99b63f55dc51 KVM: s390: remove unused gisa_clear_ipm_gisc() function
new 1e79a9e3ab96 Merge tag 'kvm-s390-next-6.2-1' of https://git.kernel.org/ [...]
new 3bfadb232589 KVM: selftests: memslot_perf_test: Use data->nslots in pre [...]
new 2aae5e6795e1 KVM: selftests: memslot_perf_test: Consolidate loop condit [...]
new 34396437b11f KVM: selftests: memslot_perf_test: Probe memory slots for once
new 8675c6f22698 KVM: selftests: memslot_perf_test: Support variable guest [...]
new 88a64e65484e KVM: selftests: memslot_perf_test: Consolidate memory
new a69170c65acd KVM: selftests: memslot_perf_test: Report optimal memory slots
new f8faf02fb3e5 Merge branch kvm-arm64/selftest/memslot-fixes into kvmarm- [...]
new 1a6182033f2d KVM: arm64: selftests: Use FIELD_GET() to extract ID regis [...]
new f6d02aa28ae2 KVM: arm64: selftests: Add write_dbg{b,w}{c,v}r helpers in [...]
new 700b8860e02c KVM: arm64: selftests: Remove the hard-coded {b,w}pn#0 fro [...]
new 152880d8edf5 KVM: arm64: selftests: Add helpers to enable debug exceptions
new 948f439c9d00 KVM: arm64: selftests: Stop unnecessary test stage trackin [...]
new 5dd544e882d9 KVM: arm64: selftests: Change debug_version() to take ID_A [...]
new 142365932f5f KVM: arm64: selftests: Add a test case for a linked breakpoint
new 5ced4e533b67 KVM: arm64: selftests: Add a test case for a linked watchpoint
new ebb8cc10316d KVM: arm64: selftests: Test with every breakpoint/watchpoint
new 02f6fdd44dbf Merge branch kvm-arm64/selftest/linked-bps into kvmarm-mas [...]
new a93871d0ea9f KVM: selftests: Add a userfaultfd library
new 228f324dc718 KVM: selftests: aarch64: Add virt_get_pte_hva() library function
new b6b03b86c025 KVM: selftests: Add missing close and munmap in __vm_mem_r [...]
new 41f5189ea9c0 KVM: selftests: aarch64: Construct DEFAULT_MAIR_EL1 using [...]
new 590b949597b1 tools: Copy bitfield.h from the kernel sources
new bd3ed7e1a47e KVM: selftests: Stash backing_src_type in struct userspace [...]
new 290c5b54012b KVM: selftests: Add vm->memslots[] and enum kvm_mem_region_type
new 5485e822e31a KVM: selftests: Fix alignment in virt_arch_pgd_alloc() and [...]
new 1446e331432d KVM: selftests: Use the right memslot for code, page-table [...]
new 35c581015712 KVM: selftests: aarch64: Add aarch64/page_fault_test
new 3b1d915659c6 KVM: selftests: aarch64: Add userfaultfd tests into page_f [...]
new a4edf25b3e25 KVM: selftests: aarch64: Add dirty logging tests into page [...]
new 45acde40f538 KVM: selftests: aarch64: Add readonly memslot tests into p [...]
new ff2b5509e1d2 KVM: selftests: aarch64: Add mix of tests into page_fault_test
new adde0476aff9 Merge branch kvm-arm64/selftest/s2-faults into kvmarm-master/next
new 9ec1eb1bccee KVM: selftests: Have perf_test_util signal when to stop vCPUs
new 4568180411e0 KVM: selftests: Build access_tracking_perf_test for arm64
new b1d10ee1565a Merge branch kvm-arm64/selftest/access-tracking into kvmar [...]
new 579d7ebe90a3 KVM: arm64: Fix kvm init failure when mode!=vhe and VA_BITS=52.
new a0d37784bfd7 KVM: arm64: Fix PAR_TO_HPFAR() to work independently of PA_BITS.
new 219072c09abd KVM: arm64: Fix benign bug with incorrect use of VA_BITS
new 3bbcc8cce27a Merge branch kvm-arm64/52bit-fixes into kvmarm-master/next
new 590925a178a3 Merge tag 'kvmarm-fixes-6.1-3' into kvm-arm64/dirty-ring
new cf87ac739e48 KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
new e8a18565e593 KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_d [...]
new 86bdf3ebcfe1 KVM: Support dirty ring in conjunction with bitmap
new 9cb1096f8590 KVM: arm64: Enable ring-based dirty memory tracking
new a737f5ffb1e8 KVM: selftests: Use host page size to map ring buffer in d [...]
new 7167190ddb86 KVM: selftests: Clear dirty ring states between two modes [...]
new dc6df7d4d063 KVM: selftests: Automate choosing dirty ring size in dirty [...]
new c57351a75d01 KVM: Push dirty information unconditionally to backup bitmap
new a937f37d85f3 Merge branch kvm-arm64/dirty-ring into kvmarm-master/next
new dfc7a7769ab7 KVM: arm64: Combine visitor arguments into a context structure
new 83844a2317ec KVM: arm64: Stash observed pte value in visitor context
new 2a611c7f87f2 KVM: arm64: Pass mm_ops through the visitor context
new fa002e8e79b3 KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
new 8e94e1252cc0 KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees
new 6b91b8f95cad KVM: arm64: Use an opaque type for pteps
new 5c359cca1faf KVM: arm64: Tear down unlinked stage-2 subtree after break [...]
new c3119ae45dfb KVM: arm64: Protect stage-2 traversal with RCU
new ca5de2448c3b KVM: arm64: Atomically update stage 2 leaf attributes in p [...]
new 331aa3a0547d KVM: arm64: Split init and set for table PTE
new 0ab12f3574db KVM: arm64: Make block->table PTE changes parallel-aware
new 946fbfdf336b KVM: arm64: Make leaf->leaf PTE changes parallel-aware
new af87fc03cfdf KVM: arm64: Make table->block changes parallel-aware
new 1577cb5823ce KVM: arm64: Handle stage-2 faults in parallel
new 3a5154c723ba KVM: arm64: Take a pointer to walker data in kvm_dereferen [...]
new b7833bf202e3 KVM: arm64: Don't acquire RCU read lock for exclusive table walks
new 5e806c5812e8 KVM: arm64: Reject shared table walks in the hyp code
new fe8e3f44c587 Merge branch kvm-arm64/parallel-faults into kvmarm-master/next
new 0f4f7ae10ee4 KVM: arm64: Move hyp refcount manipulation helpers to comm [...]
new 72a5bc0f153c KVM: arm64: Allow attaching of non-coalescable pages to a [...]
new 8e6bcc3a4502 KVM: arm64: Back the hypervisor 'struct hyp_page' array fo [...]
new 0d16d12eb26e KVM: arm64: Fix-up hyp stage-1 refcounts for all pages map [...]
new 33bc332d4061 KVM: arm64: Unify identifiers used to distinguish host and [...]
new 1ed5c24c26f4 KVM: arm64: Implement do_donate() helper for donating memory
new 43c1ff8b7501 KVM: arm64: Prevent the donation of no-map pages
new 9926cfce8dcb KVM: arm64: Add helpers to pin memory shared with the hype [...]
new 4d968b12e6bb KVM: arm64: Include asm/kvm_mmu.h in nvhe/mem_protect.h
new 1c80002e3264 KVM: arm64: Add hyp_spinlock_t static initializer
new 5304002dc375 KVM: arm64: Rename 'host_kvm' to 'host_mmu'
new a1ec5c70d3f6 KVM: arm64: Add infrastructure to create and track pKVM in [...]
new 9d0c063a4d1d KVM: arm64: Instantiate pKVM hypervisor VM and vCPU struct [...]
new aa6948f82f0b KVM: arm64: Add per-cpu fixmap infrastructure at EL2
new 6c165223e9a6 KVM: arm64: Initialise hypervisor copies of host symbols u [...]
new 13e248aab73d KVM: arm64: Provide I-cache invalidation by virtual addres [...]
new 717a7eebac10 KVM: arm64: Add generic hyp_memcache helpers
new 315775ff7c6d KVM: arm64: Consolidate stage-2 initialisation into a sing [...]
new 60dfe093ec13 KVM: arm64: Instantiate guest stage-2 page-tables at EL2
new f41dff4efb91 KVM: arm64: Return guest memory from EL2 via dedicated tea [...]
new fe41a7f8c0ee KVM: arm64: Unmap 'kvm_arm_hyp_percpu_base' from the host
new 73f38ef2ae53 KVM: arm64: Maintain a copy of 'kvm_arm_vmid_bits' at EL2
new 27eb26bfff5d KVM: arm64: Explicitly map 'kvm_vgic_global_state' at EL2
new 169cd0f8238f KVM: arm64: Don't unnecessarily map host kernel sections at EL2
new be66e67f1750 KVM: arm64: Use the pKVM hyp vCPU structure in handle___kv [...]
new cfa72993d133 Merge branch kvm-arm64/pkvm-vcpu-state into kvmarm-master/next
new b0284cd29a95 mm: Do not enable PG_arch_2 for all 64-bit architectures
new e059853d14ca arm64: mte: Fix/clarify the PG_mte_tagged semantics
new 2dbf12ae132c KVM: arm64: Simplify the sanitise_mte_tags() logic
new ef6458b1b6ca mm: Add PG_arch_3 page flag
new d77e59a8fccd arm64: mte: Lock a page for MTE tag initialisation
new d89585fbb308 KVM: arm64: unify the tests for VMAs in memslots when MTE [...]
new c911f0d46879 KVM: arm64: permit all VM_MTE_ALLOWED mappings with MTE enabled
new a4baf8d2639f Documentation: document the ABI changes for KVM_CAP_ARM_MTE
new 382b5b87a97d Merge branch kvm-arm64/mte-map-shared into kvmarm-master/next
new d017eeabd509 arm64: Add ID_DFR0_EL1.PerfMon values for PMUv3p7 and IMP_DEF
new bead02204e98 KVM: arm64: PMU: Align chained counter implementation with [...]
new acdd8a4e13a0 KVM: arm64: PMU: Always advertise the CHAIN event
new c82d28cbf1d4 KVM: arm64: PMU: Distinguish between 64bit counter and 64b [...]
new 001d85bd6c03 KVM: arm64: PMU: Narrow the overflow checking when required
new 0f1e172b54f7 KVM: arm64: PMU: Only narrow counters that are not 64bit wide
new 0cb9c3c87a9d KVM: arm64: PMU: Add counter_index_to_*reg() helpers
new 9917264d74d9 KVM: arm64: PMU: Simplify setting a counter to a specific value
new 26d2d0594d70 KVM: arm64: PMU: Do not let AArch32 change the counters' t [...]
new 3d0dba5764b9 KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to [...]
new 60e651ff1f48 KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set fr [...]
new d82e0dfdfda7 KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from [...]
new 11af4c37165e KVM: arm64: PMU: Implement PMUv3p5 long counter support
new 1f7c97828285 KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
new 9bad925dd741 KVM: arm64: PMU: Simplify vcpu computation on perf overflo [...]
new d56bdce586e7 KVM: arm64: PMU: Make kvm_pmc the main data structure
new 86815735aa57 KVM: arm64: PMU: Replace version number '0' with ID_AA64DF [...]
new 292e8f149476 KVM: arm64: PMU: Simplify PMCR_EL0 reset handling
new 64d6820d64c0 KVM: arm64: PMU: Sanitise PMCR_EL0.LP on first vcpu run
new 58ff6569bc6e KVM: arm64: PMU: Fix period computation for 64bit counters [...]
new 118bc846d4de Merge branch kvm-arm64/pmu-unchained into kvmarm-master/next
new 83f8a81dece8 KVM: arm64: Fix pvtime documentation
new e1b325334002 KVM: arm64: Fix typo in comment
new 86f27d849b47 Merge branch kvm-arm64/misc-6.2 into kvmarm-master/next
new 753d734f3f34 Merge remote-tracking branch 'arm64/for-next/sysregs' into [...]
new eb5618911af0 Merge tag 'kvmarm-6.2' of https://git.kernel.org/pub/scm/l [...]
new e8b9a055fa04 KVM: arm64: selftests: Align VA space allocator with TTBR0
new 2afc1fbbdab2 KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
new 5ec3289b31ab KVM: x86/xen: Compatibility fixes for shared runstate area
new d8ba8ba4c801 KVM: x86/xen: Allow XEN_RUNSTATE_UPDATE flag behaviour to [...]
new 8acc35186ed6 KVM: x86/xen: Add runstate tests for 32-bit mode and cross [...]
new aba3caef5862 KVM: Shorten gfn_to_pfn_cache function names
new c1a81f3bd9b4 KVM: x86: Remove unused argument in gpc_unmap_khva()
new df0bb47baa95 KVM: x86: fix uninitialized variable use on KVM_REQ_TRIPLE_FAULT
new 61e15f871241 KVM: Delete all references to removed KVM_SET_MEMORY_REGION ioctl
new 66a9221d73e7 KVM: Delete all references to removed KVM_SET_MEMORY_ALIAS ioctl
new 30ee198ce42d KVM: Reference to kvm_userspace_memory_region in doc and comments
new 10c5e80b2c4d KVM: Add missing arch for KVM_CREATE_DEVICE and KVM_{SET,G [...]
new a33004e844e4 KVM: selftests: Fix inverted "warning" in access tracking [...]
new 8fcee0421386 KVM: selftests: Restore assert for non-nested VMs in acces [...]
new 18eee7bfd18d KVM: selftests: Move XFD CPUID checking out of __vm_xsave_ [...]
new 2ceade1d363c KVM: selftests: Move __vm_xsave_require_permission() below [...]
new cd5f3d210095 KVM: selftests: Disallow "get supported CPUID" before REQ_ [...]
new 553d1652b861 KVM: selftests: Do kvm_cpu_has() checks before creating VM+vCPU
new 0c3265235fc1 KVM: selftests: Define and use a custom static assert in l [...]
new 44bc6115d887 Merge tag 'kvm-selftests-6.2-2' of https://github.com/kvm- [...]
new eb3992e833d3 KVM: VMX: Resume guest immediately when injecting #GP on ECREATE
new 4265df667bbd KVM: x86: Keep the lock order consistent between SRCU and [...]
new 17122c06b86c KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception
new 5c30e8101e8d KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid
new a8a12c0069b9 KVM: SVM: Replace kmap_atomic() with kmap_local_page()
new 9cc409325ddd KVM: nVMX: Inject #GP, not #UD, if "generic" VMXON CR0/CR4 [...]
new 4f209989586c KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely
new 2e7eab81425a KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
new 5c8c0b327382 KVM: x86: Delete documentation for READ|WRITE in KVM_X86_S [...]
new b93d2ec34ef3 KVM: x86: Reword MSR filtering docs to more precisely defi [...]
new 1f158147181b KVM: x86: Clean up KVM_CAP_X86_USER_SPACE_MSR documentation
new 4a8fd4a720f8 KVM: nVMX: Reword comments about generating nested CR0/4 r [...]
new 0b5e7a16a0a7 KVM: VMX: Make vmread_error_trampoline() uncallable from C code
new d2a00af2061d KVM: VMX: Allow userspace to set all supported FEATURE_CON [...]
new 2d6cd68636d6 KVM: VMX: Move MSR_IA32_FEAT_CTL.LOCKED check into "is val [...]
new b80732fdc9b2 KVM: selftests: Verify userspace can stuff IA32_FEATURE_CO [...]
new 3ebcbd2244f5 KVM: x86: Use current rather than snapshotted TSC frequenc [...]
new b376144595b4 Merge tag 'kvm-x86-fixes-6.2-1' of https://github.com/kvm- [...]
new dd03cc90e09d KVM: Remove stale comment about KVM_REQ_UNHALT
new ef40757743b4 KVM: x86: fix APICv/x2AVIC disabled when vm reboot by itself
new ef16b2dff4d1 KVM: arm64: selftests: Enable single-step without a "full" [...]
new 7f2b47f22b82 tools: Take @bit as an "unsigned long" in {clear,set}_bit( [...]
new 75d7ba32f982 perf tools: Use dedicated non-atomic clear/set bit helpers
new 03a0c819e717 KVM: selftests: Use non-atomic clear/set bit helpers in KVM tests
new 7f32a6cf8b5a tools: Drop conflicting non-atomic test_and_{clear,set}_bi [...]
new 36293352ff43 tools: Drop "atomic_" prefix from atomic test_and_set_bit()
new bb056c0f080a tools: KVM: selftests: Convert clear/set_bit() to actual atomics
new 4bf46e35826d KVM: selftests: Fix spelling mistake "probabalistic" -> "p [...]
new 0c2a04128f50 KVM: x86: remove unnecessary exports
new 74bee0cad8dc KVM: x86: Advertise that the SMM_CTL MSR is not supported
new 214b0a88c46d KVM: x86/xen: add support for 32-bit guests in SCHEDOP_poll
new 8c82a0b3ba1a KVM: Store immutable gfn_to_pfn_cache properties
new e308c24a358d KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_check()
new 2a0b128a906a KVM: Clean up hva_to_pfn_retry()
new 0318f207d1c2 KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_refresh()
new 9f87791d686d KVM: Drop KVM's API to allow temporarily unmapping gfn=>pfn cache
new 5762cb102357 KVM: Do not partially reinitialize gfn=>pfn cache during a [...]
new 58f5ee5fedd9 KVM: Drop @gpa from exported gfn=>pfn cache check() and re [...]
new 06e155c44aa0 KVM: Skip unnecessary "unmap" if gpc is already valid duri [...]
new 5656374b168c Merge branch 'gpc-fixes' of git://git.infradead.org/users/ [...]
new 9352e7470a1b Merge remote-tracking branch 'kvm/queue' into HEAD
new 549a715b98a1 KVM: x86: Add proper ReST tables for userspace MSR exits/flags
new 8fa590bf3448 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 384 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/virt/kvm/api.rst | 274 +++--
Documentation/virt/kvm/arm/pvtime.rst | 14 +-
Documentation/virt/kvm/devices/arm-vgic-its.rst | 5 +-
Documentation/virt/kvm/devices/vcpu.rst | 2 +
MAINTAINERS | 10 +
arch/arm64/Kconfig | 1 +
arch/arm64/include/asm/kvm_arm.h | 8 +-
arch/arm64/include/asm/kvm_asm.h | 7 +-
arch/arm64/include/asm/kvm_host.h | 76 +-
arch/arm64/include/asm/kvm_hyp.h | 3 +
arch/arm64/include/asm/kvm_mmu.h | 2 +-
arch/arm64/include/asm/kvm_pgtable.h | 175 ++-
arch/arm64/include/asm/kvm_pkvm.h | 38 +
arch/arm64/include/asm/mte.h | 65 +-
arch/arm64/include/asm/pgtable.h | 4 +-
arch/arm64/include/uapi/asm/kvm.h | 1 +
arch/arm64/kernel/cpufeature.c | 4 +-
arch/arm64/kernel/elfcore.c | 2 +-
arch/arm64/kernel/hibernate.c | 2 +-
arch/arm64/kernel/image-vars.h | 15 -
arch/arm64/kernel/mte.c | 21 +-
arch/arm64/kvm/Kconfig | 2 +
arch/arm64/kvm/arm.c | 95 +-
arch/arm64/kvm/guest.c | 18 +-
arch/arm64/kvm/hyp/hyp-constants.c | 3 +
arch/arm64/kvm/hyp/include/nvhe/mem_protect.h | 25 +-
arch/arm64/kvm/hyp/include/nvhe/memory.h | 27 +
arch/arm64/kvm/hyp/include/nvhe/mm.h | 18 +-
arch/arm64/kvm/hyp/include/nvhe/pkvm.h | 68 ++
arch/arm64/kvm/hyp/include/nvhe/spinlock.h | 10 +-
arch/arm64/kvm/hyp/nvhe/cache.S | 11 +
arch/arm64/kvm/hyp/nvhe/hyp-main.c | 110 +-
arch/arm64/kvm/hyp/nvhe/hyp-smp.c | 2 +
arch/arm64/kvm/hyp/nvhe/mem_protect.c | 521 ++++++++-
arch/arm64/kvm/hyp/nvhe/mm.c | 167 ++-
arch/arm64/kvm/hyp/nvhe/page_alloc.c | 29 +-
arch/arm64/kvm/hyp/nvhe/pkvm.c | 436 ++++++++
arch/arm64/kvm/hyp/nvhe/setup.c | 98 +-
arch/arm64/kvm/hyp/pgtable.c | 652 ++++++------
arch/arm64/kvm/hyp/vhe/Makefile | 2 +-
arch/arm64/kvm/irq.h | 16 -
arch/arm64/kvm/mmu.c | 195 ++--
arch/arm64/kvm/pkvm.c | 138 ++-
arch/arm64/kvm/pmu-emul.c | 482 ++++-----
arch/arm64/kvm/reset.c | 29 -
arch/arm64/kvm/sys_regs.c | 157 ++-
arch/arm64/kvm/vgic/vgic-its.c | 20 +
arch/arm64/mm/copypage.c | 7 +-
arch/arm64/mm/fault.c | 4 +-
arch/arm64/mm/mteswap.c | 16 +-
arch/powerpc/kvm/book3s_64_mmu_hv.c | 2 +-
arch/powerpc/kvm/book3s_64_mmu_radix.c | 2 +-
arch/powerpc/kvm/irq.h | 22 -
arch/powerpc/kvm/powerpc.c | 18 +-
arch/s390/include/asm/kvm_host.h | 14 +-
arch/s390/include/asm/mem_encrypt.h | 4 +-
arch/s390/include/asm/stacktrace.h | 1 +
arch/s390/include/asm/uv.h | 10 +
arch/s390/kernel/asm-offsets.c | 1 +
arch/s390/kernel/entry.S | 26 +-
arch/s390/kernel/uv.c | 7 +
arch/s390/kvm/intercept.c | 9 +-
arch/s390/kvm/interrupt.c | 5 -
arch/s390/kvm/irq.h | 19 -
arch/s390/kvm/kvm-s390.c | 116 +-
arch/s390/kvm/kvm-s390.h | 8 +-
arch/s390/kvm/priv.c | 3 +-
arch/s390/kvm/pv.c | 357 ++++++-
arch/s390/kvm/vsie.c | 4 +-
arch/s390/mm/gmap.c | 147 +--
arch/s390/mm/init.c | 12 +-
arch/x86/events/intel/lbr.c | 6 +-
arch/x86/include/asm/cpufeatures.h | 3 +
arch/x86/include/asm/hyperv-tlfs.h | 37 +
arch/x86/include/asm/kvm-x86-ops.h | 4 +-
arch/x86/include/asm/kvm_host.h | 145 ++-
arch/x86/include/asm/perf_event.h | 6 +-
arch/x86/include/asm/svm.h | 100 +-
arch/x86/include/uapi/asm/kvm.h | 13 +-
arch/x86/kernel/kvm.c | 2 +-
arch/x86/kvm/Kconfig | 11 +
arch/x86/kvm/Makefile | 6 +-
arch/x86/kvm/cpuid.c | 33 +-
arch/x86/kvm/emulate.c | 355 +------
arch/x86/kvm/hyperv.c | 353 +++++--
arch/x86/kvm/hyperv.h | 64 +-
arch/x86/kvm/irq.c | 7 +-
arch/x86/kvm/kvm_cache_regs.h | 5 -
arch/x86/kvm/kvm_emulate.h | 48 +-
arch/x86/kvm/lapic.c | 16 +-
arch/x86/kvm/lapic.h | 2 +-
arch/x86/kvm/mmu/mmu.c | 176 ++-
arch/x86/kvm/mmu/mmu_internal.h | 33 +-
arch/x86/kvm/mmu/paging_tmpl.h | 6 +-
arch/x86/kvm/mmu/spte.c | 12 +
arch/x86/kvm/mmu/spte.h | 19 +-
arch/x86/kvm/mmu/tdp_mmu.c | 114 +-
arch/x86/kvm/mmu/tdp_mmu.h | 2 +
arch/x86/kvm/pmu.c | 90 +-
arch/x86/kvm/pmu.h | 6 +-
arch/x86/kvm/reverse_cpuid.h | 25 +-
arch/x86/kvm/smm.c | 649 ++++++++++++
arch/x86/kvm/smm.h | 168 +++
arch/x86/kvm/svm/hyperv.c | 18 +
arch/x86/kvm/svm/hyperv.h | 50 +-
arch/x86/kvm/svm/nested.c | 52 +-
arch/x86/kvm/svm/pmu.c | 4 +-
arch/x86/kvm/svm/sev.c | 6 +-
arch/x86/kvm/svm/svm.c | 63 +-
arch/x86/kvm/svm/svm.h | 5 +-
arch/x86/kvm/svm/svm_onhyperv.c | 8 +-
arch/x86/kvm/svm/svm_onhyperv.h | 25 +-
arch/x86/kvm/trace.h | 36 +-
arch/x86/kvm/vmx/capabilities.h | 24 -
arch/x86/kvm/vmx/{evmcs.c => hyperv.c} | 45 +-
arch/x86/kvm/vmx/{evmcs.h => hyperv.h} | 12 +-
arch/x86/kvm/vmx/nested.c | 108 +-
arch/x86/kvm/vmx/nested.h | 7 +-
arch/x86/kvm/vmx/pmu_intel.c | 11 +-
arch/x86/kvm/vmx/sgx.c | 4 +-
arch/x86/kvm/vmx/vmcs12.h | 5 +-
arch/x86/kvm/vmx/vmenter.S | 2 +
arch/x86/kvm/vmx/vmx.c | 104 +-
arch/x86/kvm/vmx/vmx_ops.h | 20 +-
arch/x86/kvm/x86.c | 533 +++-------
arch/x86/kvm/x86.h | 1 +
arch/x86/kvm/xen.c | 505 ++++++---
arch/x86/kvm/xen.h | 13 +-
drivers/s390/crypto/vfio_ap_ops.c | 2 +-
fs/proc/page.c | 3 +-
include/asm-generic/hyperv-tlfs.h | 5 +
include/asm-generic/mshyperv.h | 11 +-
include/kvm/arm_pmu.h | 15 +-
include/kvm/arm_vgic.h | 1 +
include/linux/build_bug.h | 9 +
include/linux/kernel-page-flags.h | 1 +
include/linux/kvm_dirty_ring.h | 20 +-
include/linux/kvm_host.h | 107 +-
include/linux/kvm_types.h | 1 +
include/linux/mm.h | 1 +
include/linux/page-flags.h | 3 +-
include/trace/events/mmflags.h | 9 +-
include/uapi/linux/kvm.h | 31 +-
mm/Kconfig | 8 +
mm/gup.c | 33 +-
mm/huge_memory.c | 3 +-
mm/hugetlb.c | 5 +-
tools/arch/x86/include/asm/atomic.h | 11 +
tools/arch/x86/include/uapi/asm/kvm.h | 8 -
tools/include/asm-generic/atomic-gcc.h | 23 +
tools/include/asm-generic/bitops/atomic.h | 15 +-
tools/include/linux/bitfield.h | 176 +++
tools/include/linux/bitmap.h | 34 -
tools/include/uapi/linux/kvm.h | 20 +-
tools/perf/bench/find-bit-bench.c | 2 +-
tools/perf/builtin-c2c.c | 6 +-
tools/perf/builtin-kwork.c | 6 +-
tools/perf/builtin-record.c | 6 +-
tools/perf/builtin-sched.c | 2 +-
tools/perf/tests/bitmap.c | 2 +-
tools/perf/tests/mem2node.c | 2 +-
tools/perf/util/affinity.c | 4 +-
tools/perf/util/header.c | 8 +-
tools/perf/util/mmap.c | 6 +-
tools/perf/util/pmu.c | 2 +-
.../perf/util/scripting-engines/trace-event-perl.c | 2 +-
.../util/scripting-engines/trace-event-python.c | 2 +-
tools/perf/util/session.c | 2 +-
tools/perf/util/svghelper.c | 2 +-
tools/testing/selftests/kvm/.gitignore | 8 +-
tools/testing/selftests/kvm/Makefile | 16 +-
.../selftests/kvm/aarch64/aarch32_id_regs.c | 6 +-
tools/testing/selftests/kvm/aarch64/arch_timer.c | 31 +-
.../selftests/kvm/aarch64/debug-exceptions.c | 360 +++++--
tools/testing/selftests/kvm/aarch64/hypercalls.c | 3 -
.../selftests/kvm/aarch64/page_fault_test.c | 1117 ++++++++++++++++++++
tools/testing/selftests/kvm/aarch64/psci_test.c | 1 -
tools/testing/selftests/kvm/aarch64/vgic_init.c | 2 -
tools/testing/selftests/kvm/aarch64/vgic_irq.c | 10 +-
.../selftests/kvm/access_tracking_perf_test.c | 52 +-
tools/testing/selftests/kvm/demand_paging_test.c | 250 +----
tools/testing/selftests/kvm/dirty_log_perf_test.c | 130 ++-
tools/testing/selftests/kvm/dirty_log_test.c | 90 +-
.../selftests/kvm/include/aarch64/processor.h | 35 +-
.../testing/selftests/kvm/include/kvm_util_base.h | 75 +-
tools/testing/selftests/kvm/include/memstress.h | 75 ++
.../testing/selftests/kvm/include/perf_test_util.h | 63 --
tools/testing/selftests/kvm/include/test_util.h | 25 +
tools/testing/selftests/kvm/include/ucall_common.h | 18 +-
.../selftests/kvm/include/userfaultfd_util.h | 45 +
tools/testing/selftests/kvm/include/x86_64/evmcs.h | 48 +-
.../testing/selftests/kvm/include/x86_64/hyperv.h | 103 ++
.../selftests/kvm/include/x86_64/processor.h | 442 ++++++--
tools/testing/selftests/kvm/include/x86_64/svm.h | 26 +-
.../selftests/kvm/include/x86_64/svm_util.h | 14 +
tools/testing/selftests/kvm/include/x86_64/vmx.h | 25 +-
tools/testing/selftests/kvm/kvm_page_table_test.c | 6 +-
.../testing/selftests/kvm/lib/aarch64/processor.c | 83 +-
tools/testing/selftests/kvm/lib/aarch64/ucall.c | 102 +-
tools/testing/selftests/kvm/lib/elf.c | 5 +-
tools/testing/selftests/kvm/lib/kvm_util.c | 193 +++-
.../kvm/lib/{perf_test_util.c => memstress.c} | 136 ++-
tools/testing/selftests/kvm/lib/riscv/processor.c | 29 +-
tools/testing/selftests/kvm/lib/riscv/ucall.c | 42 +-
tools/testing/selftests/kvm/lib/s390x/processor.c | 8 +-
tools/testing/selftests/kvm/lib/s390x/ucall.c | 39 +-
tools/testing/selftests/kvm/lib/test_util.c | 36 +
tools/testing/selftests/kvm/lib/ucall_common.c | 103 ++
tools/testing/selftests/kvm/lib/userfaultfd_util.c | 186 ++++
tools/testing/selftests/kvm/lib/x86_64/hyperv.c | 46 +
.../lib/x86_64/{perf_test_util.c => memstress.c} | 37 +-
tools/testing/selftests/kvm/lib/x86_64/processor.c | 314 +++---
tools/testing/selftests/kvm/lib/x86_64/ucall.c | 39 +-
tools/testing/selftests/kvm/lib/x86_64/vmx.c | 56 +-
.../testing/selftests/kvm/max_guest_memory_test.c | 21 +-
.../kvm/memslot_modification_stress_test.c | 44 +-
tools/testing/selftests/kvm/memslot_perf_test.c | 339 +++---
tools/testing/selftests/kvm/rseq_test.c | 4 -
tools/testing/selftests/kvm/s390x/memop.c | 2 -
tools/testing/selftests/kvm/s390x/resets.c | 2 -
tools/testing/selftests/kvm/s390x/sync_regs_test.c | 3 -
.../testing/selftests/kvm/set_memory_region_test.c | 5 +-
tools/testing/selftests/kvm/steal_time.c | 1 -
.../selftests/kvm/system_counter_offset_test.c | 1 -
tools/testing/selftests/kvm/x86_64/amx_test.c | 112 +-
tools/testing/selftests/kvm/x86_64/cpuid_test.c | 11 +-
.../selftests/kvm/x86_64/cr4_cpuid_sync_test.c | 3 -
.../selftests/kvm/x86_64/emulator_error_test.c | 193 ----
.../kvm/x86_64/exit_on_emulation_failure_test.c | 45 +
.../testing/selftests/kvm/x86_64/flds_emulation.h | 55 +
tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c | 3 -
.../kvm/x86_64/{evmcs_test.c => hyperv_evmcs.c} | 100 +-
.../testing/selftests/kvm/x86_64/hyperv_features.c | 25 +-
tools/testing/selftests/kvm/x86_64/hyperv_ipi.c | 314 ++++++
.../testing/selftests/kvm/x86_64/hyperv_svm_test.c | 103 +-
.../selftests/kvm/x86_64/hyperv_tlb_flush.c | 690 ++++++++++++
.../selftests/kvm/x86_64/nx_huge_pages_test.c | 5 +-
.../selftests/kvm/x86_64/platform_info_test.c | 3 -
.../selftests/kvm/x86_64/pmu_event_filter_test.c | 77 +-
.../testing/selftests/kvm/x86_64/set_sregs_test.c | 3 -
.../kvm/x86_64/smaller_maxphyaddr_emulation_test.c | 111 ++
tools/testing/selftests/kvm/x86_64/smm_test.c | 2 +
.../kvm/x86_64/svm_nested_soft_inject_test.c | 3 -
.../testing/selftests/kvm/x86_64/sync_regs_test.c | 3 -
.../selftests/kvm/x86_64/userspace_io_test.c | 3 -
.../selftests/kvm/x86_64/userspace_msr_exit_test.c | 88 +-
.../selftests/kvm/x86_64/vmx_dirty_log_test.c | 1 +
tools/testing/selftests/kvm/x86_64/vmx_msrs_test.c | 47 +
.../selftests/kvm/x86_64/vmx_pmu_caps_test.c | 19 +-
.../selftests/kvm/x86_64/xapic_state_test.c | 4 +-
.../testing/selftests/kvm/x86_64/xen_shinfo_test.c | 141 ++-
virt/kvm/Kconfig | 6 +
virt/kvm/dirty_ring.c | 46 +-
virt/kvm/irqchip.c | 3 +-
virt/kvm/kvm_main.c | 107 +-
virt/kvm/kvm_mm.h | 4 +-
virt/kvm/pfncache.c | 114 +-
257 files changed, 12068 insertions(+), 4988 deletions(-)
create mode 100644 arch/arm64/kvm/hyp/include/nvhe/pkvm.h
delete mode 100644 arch/arm64/kvm/irq.h
delete mode 100644 arch/powerpc/kvm/irq.h
delete mode 100644 arch/s390/kvm/irq.h
create mode 100644 arch/x86/kvm/smm.c
create mode 100644 arch/x86/kvm/smm.h
create mode 100644 arch/x86/kvm/svm/hyperv.c
rename arch/x86/kvm/vmx/{evmcs.c => hyperv.c} (95%)
rename arch/x86/kvm/vmx/{evmcs.h => hyperv.h} (95%)
create mode 100644 tools/include/linux/bitfield.h
create mode 100644 tools/testing/selftests/kvm/aarch64/page_fault_test.c
create mode 100644 tools/testing/selftests/kvm/include/memstress.h
delete mode 100644 tools/testing/selftests/kvm/include/perf_test_util.h
create mode 100644 tools/testing/selftests/kvm/include/userfaultfd_util.h
rename tools/testing/selftests/kvm/lib/{perf_test_util.c => memstress.c} (62%)
create mode 100644 tools/testing/selftests/kvm/lib/ucall_common.c
create mode 100644 tools/testing/selftests/kvm/lib/userfaultfd_util.c
create mode 100644 tools/testing/selftests/kvm/lib/x86_64/hyperv.c
rename tools/testing/selftests/kvm/lib/x86_64/{perf_test_util.c => memstress.c} (68%)
delete mode 100644 tools/testing/selftests/kvm/x86_64/emulator_error_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/exit_on_emulation_failure_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/flds_emulation.h
rename tools/testing/selftests/kvm/x86_64/{evmcs_test.c => hyperv_evmcs.c} (66%)
create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_ipi.c
create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_tlb_flush.c
create mode 100644 tools/testing/selftests/kvm/x86_64/smaller_maxphyaddr_emulation_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.