This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gnu_native_check_gcc/master-arm
in repository toolchain/ci/base-artifacts.
discards 1779630c2 0: update: binutils-gcc-linux-glibc-gdb: 1
new 8670e0274 0: update: binutils-gcc-linux-glibc-gdb: 1
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (1779630c2)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_gnu_native_check_gcc/mas [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1620 -> 1624 bytes
02-prepare_abe/console.log.xz | Bin 2724 -> 2728 bytes
03-build_abe-binutils/console.log.xz | Bin 51424 -> 51476 bytes
04-build_abe-gcc/console.log.xz | Bin 233684 -> 233608 bytes
05-clean_sysroot/console.log.xz | Bin 316 -> 316 bytes
06-build_abe-linux/console.log.xz | Bin 8936 -> 9112 bytes
07-build_abe-glibc/console.log.xz | Bin 232304 -> 232972 bytes
08-build_abe-gdb/console.log.xz | Bin 49872 -> 50188 bytes
09-build_abe-dejagnu/console.log.xz | Bin 3800 -> 3832 bytes
10-build_abe-check_gcc/console.log.xz | Bin 2724 -> 2444 bytes
11-check_regression/console.log.xz | Bin 3776 -> 3784 bytes
11-check_regression/extra-bisect-params | 2 +-
11-check_regression/fails.sum | 25 +-
11-check_regression/results.compare | 52 +-
11-check_regression/results.compare2 | 172 +-
11-check_regression/results.regressions | 52 +-
12-update_baseline/console.log | 650 +++--
12-update_baseline/extra-bisect-params | 2 +-
12-update_baseline/fails.sum | 25 +-
12-update_baseline/results.compare | 52 +-
12-update_baseline/results.compare2 | 172 +-
12-update_baseline/results.regressions | 52 +-
jenkins/manifest.sh | 24 +-
sumfiles/g++.log.xz | Bin 2870972 -> 2884168 bytes
sumfiles/g++.sum | 157 +-
sumfiles/gcc.log.xz | Bin 2489780 -> 2487968 bytes
sumfiles/gcc.sum | 4598 ++++++++++++++++---------------
sumfiles/gfortran.log.xz | Bin 937188 -> 938600 bytes
sumfiles/gfortran.sum | 49 +-
sumfiles/libatomic.log.xz | Bin 2256 -> 2256 bytes
sumfiles/libatomic.sum | 4 +-
sumfiles/libgomp.log.xz | Bin 215328 -> 214820 bytes
sumfiles/libgomp.sum | 16 +-
sumfiles/libitm.log.xz | Bin 2668 -> 2672 bytes
sumfiles/libitm.sum | 6 +-
sumfiles/libstdc++.log.xz | Bin 463516 -> 466000 bytes
sumfiles/libstdc++.sum | 30 +-
37 files changed, 3040 insertions(+), 3100 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch linaro-local/ci/tcwg_gcc_bootstrap/master-aarch64-bootstrap_O3
in repository toolchain/ci/base-artifacts.
discards 0b6582759 0: update: binutils-gcc: 2
new 73bf8a87c 0: update: binutils-gcc: 2
This update added new revisions after undoing existing revisions.
That is to say, some revisions that were in the old version of the
branch are not in the new version. This situation occurs
when a user --force pushes a change and generates a repository
containing something like this:
* -- * -- B -- O -- O -- O (0b6582759)
\
N -- N -- N refs/heads/linaro-local/ci/tcwg_gcc_bootstrap/master-aar [...]
You should already have received notification emails for all of the O
revisions, and so the following emails describe only the N revisions
from the common base, B.
Any revisions marked "omits" are not gone; other references still
refer to them. Any revisions marked "discards" are gone forever.
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
01-reset_artifacts/console.log.xz | Bin 1604 -> 1608 bytes
02-prepare_abe/console.log.xz | Bin 2720 -> 2724 bytes
04-build_abe-binutils/console.log.xz | Bin 37860 -> 37944 bytes
05-build_abe-bootstrap_O3/console.log.xz | Bin 274952 -> 271928 bytes
06-check_regression/console.log.xz | Bin 416 -> 420 bytes
07-update_baseline/console.log | 16 ++++++++--------
jenkins/manifest.sh | 12 ++++++------
7 files changed, 14 insertions(+), 14 deletions(-)
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from c1c76700a0d6 Merge tag 'spdx-6.0-rc1' of git://git.kernel.org/pub/scm/l [...]
new f0a892f599c4 drm/amd/amdgpu: fix build failure due to implicit declaration
new 9bfd900beeec RISC-V: KVM: Improve ISA extension by using a bitmap
new 6259d2f834f2 RISC-V: KVM: Fix variable spelling mistake
new cca986fab9e8 RISC-V: KVM: Make kvm_riscv_guest_timer_init a void function
new fe283e5fa1ed RISC-V: KVM: move preempt_disable() call in kvm_arch_vcpu_ [...]
new b91f0e4cb8a3 RISC-V: KVM: Factor-out instruction emulation into separat [...]
new 1222b55cee23 RISC-V: KVM: Add extensible system instruction emulation f [...]
new 8a061562e2f2 RISC-V: KVM: Add extensible CSR emulation framework
new 4ab0e470c06d KVM: Add gfp_custom flag in struct kvm_mmu_memory_cache
new c9d57373fc87 RISC-V: KVM: Add G-stage ioremap() and iounmap() functions
new 659ad6d82c31 RISC-V: KVM: Use PAGE_KERNEL_IO in kvm_riscv_gstage_ioremap()
new 6bb2e00ea304 RISC-V: KVM: Add support for Svpbmt inside Guest/VM
new 2e2e91158feb Merge tag 'kvm-riscv-5.20-1' of https://github.com/kvm-ris [...]
new a280e358465b Merge branch 'kvm-5.19-early-fixes' into HEAD
new 8e39efd840b8 KVM: VMX: Print VM-instruction error when it may be helpful
new cc07e60b0811 KVM: VMX: Print VM-instruction error as unsigned
new 0471a7bd1bca KVM: set_msr_mce: Permit guests to ignore single-bit ECC errors
new 345b0fd6fe5f KVM: Drop unused @gpa param from gfn=>pfn cache's __releas [...]
new 3dddf65b4f4c KVM: Put the extra pfn reference when reusing a pfn in the [...]
new 3ba2c95ea180 KVM: Do not incorporate page offset into gfn=>pfn cache us [...]
new 93984f19e7bc KVM: Fully serialize gfn=>pfn cache refresh via mutex
new 58cd407ca4c6 KVM: Fix multiple races in gfn=>pfn cache refresh
new 85165781c5d9 KVM: Do not pin pages tracked by gfn=>pfn caches
new b31455e96f00 Merge branch 'kvm-5.20-early-patches' into HEAD
new ac640db3a026 s390/uv: Add SE hdr query information
new 38c218259d4c s390/uv: Add dump fields to query
new 35d02493dba1 KVM: s390: pv: Add query interface
new 06eb3388e703 KVM: s390: pv: Add dump support definitions
new fe9a93e07ba4 KVM: s390: pv: Add query dump information
new 0460eb35b443 KVM: s390: Add configuration dump functionality
new 8aba09588d2a KVM: s390: Add CPU dump functionality
new e9bf3acb23f0 KVM: s390: Add KVM_CAP_S390_PROTECTED_DUMP
new 660a28653d83 Documentation: virt: Protected virtual machine dumps
new 437cfd714db9 Documentation/virt/kvm/api.rst: Add protvirt dump/info api [...]
new b0f46280d3fc Documentation/virt/kvm/api.rst: Explain rc/rrc delivery
new 97da92c0ff92 KVM: s390: selftests: Use TAP interface in the memop test
new 17e48d8a1ef0 KVM: s390: selftests: Use TAP interface in the sync_regs test
new 0c073227df50 KVM: s390: selftests: Use TAP interface in the tprot test
new b1edf7f159a6 KVM: s390: selftests: Use TAP interface in the reset test
new 5552de7b928d Merge tag 'kvm-s390-next-5.19-2' of git://git.kernel.org/p [...]
new 00f08d99dd7d KVM: nSVM: Sync next_rip field from vmcb12 to vmcb02
new f17c31c48e5c KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0
new cd9e6da8048c KVM: SVM: Unwind "speculative" RIP advancement if INTn inj [...]
new 3741aec4c38f KVM: SVM: Stuff next_rip on emulated INT3 injection if NRI [...]
new 6ef88d6e36c2 KVM: SVM: Re-inject INT3/INTO instead of retrying the instruction
new 7e5b5ef8dca3 KVM: SVM: Re-inject INTn instead of retrying the insn on " [...]
new a61d7c5432ac KVM: x86: Trace re-injected exceptions
new 21d4c575eb4a KVM: x86: Print error code in exception injection tracepoi [...]
new 2d61391270a3 KVM: x86: Differentiate Soft vs. Hard IRQs vs. reinjected [...]
new 159fc6fa3b7d KVM: nSVM: Transparently handle L1 -> L2 NMI re-injection
new d8969871253a KVM: selftests: nSVM: Add svm_nested_soft_inject_test
new 9fb3565743d5 KVM: x86/mmu: Drop RWX=0 SPTEs during ept_sync_page()
new b8b9156ec6ef KVM: x86/mmu: Comment FNAME(sync_page) to document TLB flu [...]
new 465932db25f3 x86/cpu: Add new VMX feature, Tertiary VM-Execution control
new ed3905ba6038 KVM: VMX: Extend BUILD_CONTROLS_SHADOW macro to support 64 [...]
new 1ad4e5438c67 KVM: VMX: Detect Tertiary VM-Execution control when setup [...]
new 0b85baa5f46d KVM: VMX: Report tertiary_exec_control field in dump_vmcs()
new 5413bcba7ed5 KVM: x86: Add support for vICR APIC-write VM-Exits in x2APIC mode
new f08a06c9a357 KVM: VMX: Clean up vmx_refresh_apicv_exec_ctrl()
new 1d5e740d518e KVM: Move kvm_arch_vcpu_precreate() under kvm->lock
new 35875316384b KVM: x86: Allow userspace to set maximum VCPU id for VM
new 753dcf7a8686 kvm: selftests: Add KVM_CAP_MAX_VCPU_ID cap test
new d588bb9be1da KVM: VMX: enable IPI virtualization
new fb358e0b811e perf/x86/intel: Add EPT-Friendly PEBS for Ice Lake Server
new 69e575dd4fba perf/x86/intel: Handle guest PEBS overflow PMI for KVM guest
new 39a4d779546a perf/x86/core: Pass "struct kvm_pmu *" to determine the gu [...]
new bef6ecca46ac KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU [...]
new 2c985527dd8d KVM: x86/pmu: Introduce the ctrl_mask value for fixed counter
new 0d23dc34a7ce x86/perf/core: Add pebs_capable to store valid PEBS_COUNTE [...]
new c59a1f106f5c KVM: x86/pmu: Add IA32_PEBS_ENABLE MSR emulation for exten [...]
new 79f3e3b58386 KVM: x86/pmu: Reprogram PEBS event to emulate guest PEBS counter
new 6ebe44366bde KVM: x86/pmu: Adjust precise_ip to emulate Ice Lake guest [...]
new 8183a538cd95 KVM: x86/pmu: Add IA32_DS_AREA MSR emulation to support guest DS
new 902caeb6841a KVM: x86/pmu: Add PEBS_DATA_CFG MSR emulation to support a [...]
new d10551738f6a KVM: x86: Set PEBS_UNAVAIL in IA32_MISC_ENABLE when PEBS i [...]
new 63f21f326fc9 KVM: x86/pmu: Move pmc_speculative_in_use() to arch/x86/kvm/pmu.h
new 854250329c02 KVM: x86/pmu: Disable guest PEBS temporarily in two rare s [...]
new 968635abd5f5 KVM: x86/pmu: Add kvm_pmu_cap to optimize perf_get_x86_pmu [...]
new 59cc99f6e971 KVM: x86/cpuid: Refactor host/guest CPU model consistency check
new cf8e55fe50df KVM: x86/pmu: Expose CPUIDs feature bits PDCM, DS, DTES64
new 5d9cd8b55cdc selftests: kvm: replace ternary operator with min()
new 43d62d108af8 KVM: x86/pmu: Move the vmx_icl_pebs_cpu[] definition out o [...]
new ec4036edf924 KVM: x86/pmu: remove useless prototype
new c49467a45fe0 KVM: x86/pmu: Don't overwrite the pmu->global_ctrl when re [...]
new 98defd2e1780 KVM: x86/pmu: Ignore pmu->global_ctrl check if vPMU doesn' [...]
new bfb088d9fb5a KVM: vmx, pmu: accept 0 for host-initiated write to MSR_IA [...]
new d1c88a402056 KVM: x86: always allow host-initiated writes to PMU MSRs
new a33095f4937b KVM: x86/pmu: Update comments for AMD gp counters
new 89cb454ea984 KVM: x86/pmu: Extract check_pmu_event_filter() handling bo [...]
new a40239b4cf33 KVM: x86/pmu: Pass only "struct kvm_pmc *pmc" to reprogram [...]
new fb121aaf19cd KVM: x86/pmu: Drop "u64 eventsel" for reprogram_gp_counter()
new 76d287b2342e KVM: x86/pmu: Drop "u8 ctrl, int idx" for reprogram_fixed_ [...]
new e99fae6edebc KVM: x86/pmu: Use only the uniform interface reprogram_counter()
new 02791a5c362b KVM: x86/pmu: Use PERF_TYPE_RAW to merge reprogram_{gp,fix [...]
new dc852ff5bb41 perf: x86/core: Add interface to query perfmon_event_map[] [...]
new 08dca7a8e73a KVM: x86/pmu: Replace pmc_perf_hw_id() with perf_get_hw_ev [...]
new 7aadaa988c5e KVM: x86/pmu: Drop amd_event_mapping[] in the KVM context
new ed2351174e38 KVM: x86: Extend KVM_{G,S}ET_VCPU_EVENTS to support pendin [...]
new 30267b43c5b0 KVM: selftests: Add a test to get/set triple fault event
new 938c8745bcf2 KVM: x86: Introduce "struct kvm_caps" to track misc caps/settings
new 2f4073e08f4c KVM: VMX: Enable Notify VM exit
new 92d80178a35b perf/x86/intel: Fix the comment about guest LBR support on KVM
new 916e3a4f950e x86: events: Do not return bogus capabilities if PMU is broken
new d7808f739162 KVM: x86/pmu: Update global enable_pmu when PMU is undetected
new b9181c8ef356 KVM: x86/pmu: Avoid exposing Intel BTS feature
new 6ef25aa0a961 KVM: x86/pmu: Restrict advanced features based on module e [...]
new 8e6a58e28b34 KVM: x86/pmu: Accept 0 for absent PMU MSRs when host-initi [...]
new f5a81d0eb01e KVM: VMX: Sanitize VM-Entry/VM-Exit control pairs at kvm_i [...]
new 3dbec44d9c94 KVM: VMX: Reject kvm_intel if an inconsistent VMCS config [...]
new b172862241b4 KVM: x86: PIT: Preserve state of speaker port data bit
new e15f5e6fa6ca Merge branch 'kvm-5.20-early'
new 61d9c412d041 KVM: x86: Grab regs_dirty in local 'unsigned long'
new dfe21e6bc05a KVM: x86: Harden _regs accesses to guard against buggy input
new a5ba67b42f07 KVM: x86: Omit VCPU_REGS_RIP from emulator's _regs array
new 0cbc60d44c35 KVM: x86: Use 16-bit fields to track dirty/valid emulator GPRs
new b443183a25ab KVM: x86: Reduce the number of emulator GPRs to '8' for 32 [...]
new 1cca2f8c501f KVM: x86: Bug the VM if the emulator accesses a non-existent GPR
new 49a1431d3bea KVM: x86: Bug the VM if the emulator generates a bogus exc [...]
new d38ea9579ce3 KVM: x86: Bug the VM on an out-of-bounds data read
new 8deb03e75f60 KVM: Fix references to non-existent KVM_CAP_TRIPLE_FAULT_EVENT
new 1ca378f65378 KVM: selftests: Fix buggy-but-benign check in test_v3_new_ [...]
new ff624e57d8df KVM: selftests: Fix typo in vgic_init test
new d379749fdab6 KVM: selftests: Drop stale declarations from kvm_util_base.h
new ccc82ba6bea4 KVM: selftests: Always open VM file descriptors with O_RDWR
new 2b38a7398f20 KVM: selftests: Add another underscore to inner ioctl() helpers
new 02e04c15caee KVM: selftests: Make vcpu_ioctl() a wrapper to pretty prin [...]
new 2ab2c307c734 KVM: selftests: Drop @mode from common vm_create() helper
new 1d438b3bc25e KVM: selftests: Split vcpu_set_nested_state() into two helpers
new ffb7c77fd503 KVM: sefltests: Use vcpu_ioctl() and __vcpu_ioctl() helpers
new 38d4a385a345 KVM: selftests: Add __vcpu_run() helper
new caf12f3b1d62 KVM: selftests: Use vcpu_access_device_attr() in arm64 code
new 21c6ee2b3ac2 KVM: selftests: Remove vcpu_get_fd()
new 47a7c924b62d KVM: selftests: Add vcpu_get() to retrieve and assert on v [...]
new 71ab5a6fea49 KVM: selftests: Make vm_ioctl() a wrapper to pretty print [...]
new 10825b55b9d5 KVM: sefltests: Use vm_ioctl() and __vm_ioctl() helpers
new 2de1b7b127da KVM: selftests: Make kvm_ioctl() a wrapper to pretty print [...]
new f9725f89dc50 KVM: selftests: Use kvm_ioctl() helpers
new f17cf5674a1e KVM: selftests: Use __KVM_SYSCALL_ERROR() to handle non-KV [...]
new b938cafdde4e KVM: selftests: Make x86-64's register dump helpers static
new b530eba14c70 KVM: selftests: Get rid of kvm_util_internal.h
new a78593fd8717 KVM: selftests: Use KVM_IOCTL_ERROR() for one-off arm64 ioctls
new f3165dc02212 KVM: selftests: Drop @test param from kvm_create_device()
new 98f94ce42ac6 KVM: selftests: Move KVM_CREATE_DEVICE_TEST code to separa [...]
new 279eacbefad5 KVM: selftests: Multiplex return code and fd in __kvm_crea [...]
new 9367504f77eb KVM: selftests: Rename KVM_HAS_DEVICE_ATTR helpers for con [...]
new d2752e2eb331 KVM: selftests: Drop 'int' return from asserting *_has_dev [...]
new 4091818426d9 KVM: selftests: Split get/set device_attr helpers
new 114eef6e461a KVM: selftests: Dedup vgic_init's asserts and improve erro [...]
new c472df1ac318 KVM: selftests: Add a VM backpointer to 'struct vcpu'
new ac71220934a9 KVM: selftests: Consolidate KVM_ENABLE_CAP usage
new a12c86c447f4 KVM: selftests: Simplify KVM_ENABLE_CAP helper APIs
new c095cb609b3a KVM: selftests: Cache list of MSRs to save/restore
new 0ce74180f306 KVM: selftests: Harden and comment XSS / KVM_SET_MSRS interaction
new 2128e30b0186 KVM: selftests: Dedup MSR index list helpers, simplify ded [...]
new 877bd3997c50 KVM: selftests: Rename MP_STATE and GUEST_DEBUG helpers fo [...]
new 6ebfef83f03f KVM: selftest: Add proper helpers for x86-specific save/re [...]
new f17686aac61f KVM: selftests: Add vm_create_*() variants to expose/retur [...]
new 0c276ff22c7e KVM: selftests: Push vm_adjust_num_guest_pages() into "w/o [...]
new bb47ed8b71d0 KVM: selftests: Use vm_create_without_vcpus() in set_boot_cpu_id
new 4acefa385c82 KVM: selftests: Use vm_create_without_vcpus() in dirty_log_test
new 3c16181b2652 KVM: selftests: Use vm_create_without_vcpus() in hardware_ [...]
new 47b1e0ec2e14 KVM: selftests: Use vm_create_without_vcpus() in psci_test
new eb0adbc03aaf KVM: selftests: Avoid memory allocations when adding vCPU [...]
new 95fb04607197 KVM: selftests: Rename vm_create() => vm_create_barebones( [...]
new cfe122db3ea6 KVM: selftests: Rename vm_create_without_vcpus() => vm_create()
new 3f44e7fdca4e KVM: selftests: Make vm_create() a wrapper that specifies [...]
new 70ca149be61d KVM: selftests: Rename xAPIC state test's vcpu struct
new 1079c3d4e452 KVM: selftests: Rename vcpu.state => vcpu.run
new 0cc64b08096c KVM: selftests: Rename 'struct vcpu' to 'struct kvm_vcpu'
new e3763d3aebea KVM: selftests: Return the created vCPU from vm_vcpu_add()
new e82e630ba965 KVM: selftests: Convert memslot_perf_test away from VCPU_ID
new 2494a6d80fb5 KVM: selftests: Convert rseq_test away from VCPU_ID
new 58606e602553 KVM: selftests: Convert xss_msr_test away from VCPU_ID
new b1bc990406be KVM: selftests: Convert vmx_preemption_timer_test away fro [...]
new d8b5b5d13271 KVM: selftests: Convert vmx_pmu_msrs_test away from VCPU_ID
new 4bc87470858d KVM: selftests: Convert vmx_set_nested_state_test away fro [...]
new 5581ed8762fc KVM: selftests: Convert vmx_tsc_adjust_test away from VCPU_ID
new 5478431f984e KVM: selftests: Convert mmu_role_test away from VCPU_ID
new a2d5d774919e KVM: selftests: Convert pmu_event_filter_test away from VCPU_ID
new 20092699759b KVM: selftests: Convert smm_test away from VCPU_ID
new 90b13cdde1fa KVM: selftests: Convert state_test away from VCPU_ID
new cb4d9608af03 KVM: selftests: Convert svm_int_ctl_test away from VCPU_ID
new 91520c512156 KVM: selftests: Convert svm_vmcall_test away from VCPU_ID
new 0184323acbc4 KVM: selftests: Convert sync_regs_test away from VCPU_ID
new 5c6e31b3bc4b KVM: selftests: Convert hyperv_cpuid away from VCPU_ID
new f323dbce3ba1 KVM: selftests: Convert kvm_pv_test away from VCPU_ID
new 1cc1a9f38da4 KVM: selftests: Convert platform_info_test away from VCPU_ID
new 6f96628f8290 KVM: selftests: Convert vmx_nested_tsc_scaling_test away f [...]
new d31e15005dde KVM: selftests: Convert set_sregs_test away from VCPU_ID
new ec7b769a7320 KVM: selftests: Convert vmx_dirty_log_test away from VCPU_ID
new 706aaa4fedd9 KVM: selftests: Convert vmx_close_while_nested_test away f [...]
new 21c602e67175 KVM: selftests: Convert vmx_apic_access_test away from VCPU_ID
new b4694260299a KVM: selftests: Convert userspace_msr_exit_test away from VCPU_ID
new 709fd88491a8 KVM: selftests: Convert vmx_exception_with_invalid_guest_s [...]
new f7024348d7ea KVM: selftests: Convert tsc_msrs_test away from VCPU_ID
new 5e7cb71570b9 KVM: selftests: Convert kvm_clock_test away from VCPU_ID
new a1918c0fbeea KVM: selftests: Convert hyperv_svm_test away from VCPU_ID
new d96b959600e5 KVM: selftests: Convert hyperv_features away from VCPU_ID
new a85816371175 KVM: selftests: Convert hyperv_clock away from VCPU_ID
new be0dff8610b1 KVM: selftests: Convert evmcs_test away from VCPU_ID
new 42975c219975 KVM: selftests: Convert emulator_error_test away from VCPU_ID
new 28039449b83e KVM: selftests: Convert debug_regs away from VCPU_ID
new 2571bcdb136a KVM: selftests: Add proper helper for advancing RIP in debug_regs
new 39839c1a68ce KVM: selftests: Convert amx_test away from VCPU_ID
new 50630b80eb8f KVM: selftests: Convert cr4_cpuid_sync_test away from VCPU_ID
new 87f1b5b3c0cd KVM: selftests: Convert cpuid_test away from VCPU_ID
new ada1bf4d6531 KVM: selftests: Convert userspace_io_test away from VCPU_ID
new 35b6cb825abd KVM: selftests: Convert vmx_invalid_nested_guest_state awa [...]
new 928970166977 KVM: selftests: Convert xen_vmcall_test away from VCPU_ID
new 0037727b3989 KVM: selftests: Convert xen_shinfo_test away from VCPU_ID
new c09aee348495 KVM: selftests: Convert dirty_log_test away from VCPU_ID
new d7828144d465 KVM: selftests: Convert set_memory_region_test away from VCPU_ID
new 10f0b222ea7e KVM: selftests: Convert system_counter_offset_test away fr [...]
new ee7f7d9e988e KVM: selftests: Track kvm_vcpu object in tsc_scaling_sync
new 20a7eb990ae8 KVM: selftests: Convert xapic_state_test away from hardcod [...]
new e5d86c7a0323 KVM: selftests: Convert debug-exceptions away from VCPU_ID
new afcda3dcb378 KVM: selftests: Convert fix_hypercall_test away from VCPU_ID
new fd04edc3560c KVM: selftests: Convert vgic_irq away from VCPU_ID
new 033899489062 KVM: selftests: Make arm64's guest_get_vcpuid() declaratio [...]
new b8592448370b KVM: selftests: Move vm_is_unrestricted_guest() to x86-64
new 9931be3fc62e KVM: selftests: Add "arch" to common utils that have arch [...]
new 1422efd6bb75 KVM: selftests: Return created vcpu from vm_vcpu_add_default()
new f742d94ff4e5 KVM: selftests: Rename vm_vcpu_add* helpers to better show [...]
new 682b11a012b8 KVM: selftests: Convert set_boot_cpu_id away from global VCPU_IDs
new b093da659f3d KVM: selftests: Convert psci_test away from VCPU_ID
new 0750388ca711 KVM: selftests: Convert hardware_disable_test to pass arou [...]
new 0ffc70eab775 KVM: selftests: Add VM creation helper that "returns" vCPUs
new 998016048221 KVM: selftests: Convert steal_time away from VCPU_ID
new 7a5e4ae3db64 KVM: selftests: Convert arch_timer away from VCPU_ID
new 08ce0888c1f4 KVM: selftests: Convert svm_nested_soft_inject_test away f [...]
new f3443bed2989 KVM: selftests: Convert triple_fault_event_test away from VCPU_ID
new 45f568084a7a KVM: selftests: Convert vgic_init away from vm_create_defa [...]
new bfff0f60db89 KVM: selftests: Consolidate KVM_{G,S}ET_ONE_REG helpers
new f05427faedff KVM: selftests: Sync stage before VM is freed in hypercalls test
new 8a093ea0d104 KVM: selftests: Convert hypercalls test away from vm_creat [...]
new ebca1b8056da KVM: selftests: Convert xapic_ipi_test away from *_VCPU_ID
new e5b77cdef9e3 KVM: selftests: Convert sync_regs_test away from VCPU_ID
new 371dfb2e90d9 KVM: selftests: Convert s390's "resets" test away from VCPU_ID
new 5241904f2eb6 KVM: selftests: Convert memop away from VCPU_ID
new 7cdcdfe50d8d KVM: selftests: Convert s390x/diag318_test_handler away fr [...]
new 6a9d37efa2cf KVM: selftests: Convert tprot away from VCPU_ID
new 46647c65e1e6 KVM: selftests: Use vm_create() in tsc_scaling_sync
new 3468fd7d8831 KVM: selftests: Use vm_create_with_vcpus() in max_guest_me [...]
new 82ba83cbb76a KVM: selftests: Drop vm_create_default* helpers
new 5114c3e2f1b9 KVM: selftests: Drop @vcpuids param from VM creators
new 0f678e732099 KVM: selftests: Convert kvm_page_table_test away from reli [...]
new e813129a3dea KVM: selftests: Convert kvm_binary_stats_test away from vCPU IDs
new 3cc3eeb165a0 KVM: selftests: Convert get-reg-list away from its "VCPU_ID"
new 376851f8953a KVM: selftests: Stop hardcoding vCPU IDs in vcpu_width_config
new df84cef531ca KVM: selftests: Stop conflating vCPU index and ID in perf tests
new 64a1aacc8970 KVM: selftests: Remove vcpu_get() usage from dirty_log_test
new 5260db3eb8f9 KVM: selftests: Require vCPU output array when creating VM [...]
new 768e9a61856b KVM: selftests: Purge vm+vcpu_id == vcpu silliness
new fce542992b5d KVM: selftests: Drop vcpu_get(), rename vcpu_find() => vcp [...]
new 96a96e1ad06f KVM: selftests: Remove vcpu_state() helper
new 68c1b3e910c0 KVM: selftests: Open code and drop 'struct kvm_vm' accessors
new 3222d0264fb6 KVM: selftests: Drop @slot0_mem_pages from __vm_create_wit [...]
new acaf50ad6dcb KVM: selftests: Drop @num_percpu_pages from __vm_create_wi [...]
new 6e1d13bf3815 KVM: selftests: Move per-VM/per-vCPU nr pages calculation [...]
new 38081d28835c KVM: selftests: Trust that MAXPHYADDR > memslot0 in vmx_ap [...]
new 032604529827 KVM: selftests: Drop DEFAULT_GUEST_PHY_PAGES, open code th [...]
new d8ba3f14a50e KVM: selftests: Return an 'unsigned int' from kvm_check_cap()
new 3ea9b809650b KVM: selftests: Add kvm_has_cap() to provide syntactic sugar
new 7ed397d107d4 KVM: selftests: Add TEST_REQUIRE macros to reduce skipping [...]
new 5321270b2362 KVM: selftests: Use TAP-friendly ksft_exit_skip() in __TES [...]
new fcba483e8246 KVM: selftests: Sanity check input to ioctls() at build time
new b3b7c6a6e80d KVM: selftests: kvm_binary_stats_test: Fix index expressions
new 4f48e2e73745 KVM: selftests: Add a missing apostrophe in comment to sho [...]
new ad125f309850 KVM: selftests: Call a dummy helper in VM/vCPU ioctls() to [...]
new 96f113c40d28 KVM: selftests: Drop a duplicate TEST_ASSERT() in vm_nr_pa [...]
new 9393cb13fa5d KVM: selftests: Use kvm_has_cap(), not kvm_check_cap(), wh [...]
new 1cb67e25f9a8 KVM: selftests: Remove the mismatched parameter comments
new 5bdae49fc2f6 KVM: SEV: fix misplaced closing parenthesis
new e5380f6d7586 KVM: SVM: Hide SEV migration lockdep goo behind CONFIG_PRO [...]
new 37f80a7c9987 KVM: s390: selftests: Fix memop extension capability check
new fc10020ac9ec KVM: X86/MMU: Remove unused PT32_DIR_BASE_ADDR_MASK from mmu.c
new f24b44e48d26 KVM: Rename ack_flush() to ack_kick()
new 024c3c3304ca KVM: X86/MMU: Remove useless mmu_topup_memory_caches() in [...]
new 78c7d9001be7 KVM: X86/SVM: Use root_level in svm_load_mmu_pgd()
new 007a369fba3c KVM: x86/mmu: Drop unused CMPXCHG macro from paging_tmpl.h
new d895f28ed6da KVM: VMX: Skip filter updates for MSRs that KVM is already [...]
new aee98a6838d5 KVM: x86/mmu: Use try_cmpxchg64 in tdp_mmu_set_spte_atomic
new 0ac304de73b3 KVM: VMX: Use try_cmpxchg64 in pi_try_set_control
new 2db2f46fdfc2 KVM: x86/mmu: Use try_cmpxchg64 in fast_pf_fix_direct_spte
new fa578398a0ba KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_p [...]
new 764643a6be07 KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_ [...]
new 5d76b1f8c793 KVM: nVMX: Rename nested.vmcs01_* fields to nested.pre_vmenter_*
new 308a4fffeb36 KVM: nVMX: Save BNDCFGS to vmcs12 iff relevant controls ar [...]
new 913d6c9b8fe4 KVM: nVMX: Update vmcs12 on BNDCFGS write, not at vmcs02=> [...]
new ec1d7e6ab9ff KVM: SVM: Drop unused AVIC / kvm_x86_ops declarations
new d39850f57d21 KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr [...]
new ae801e1303e9 KVM: x86: Check for in-kernel xAPIC when querying APICv fo [...]
new ce0a58f4756c KVM: x86: Move "apicv_active" into "struct kvm_lapic"
new b8e1b9626746 KVM: x86: Use lapic_in_kernel() to query in-kernel APIC in [...]
new 1ae20e0b975c KVM: VMX: Refactor 32-bit PSE PT creation to avoid using M [...]
new b3fcdb04a980 KVM: x86/mmu: Bury 32-bit PSE paging helpers in paging_tmpl.h
new 42c88ff893f0 KVM: x86/mmu: Dedup macros for computing various page table masks
new 2ca3129e8045 KVM: x86/mmu: Use separate namespaces for guest PTEs and s [...]
new f6b8ea6d4364 KVM: x86/mmu: Use common macros to compute 32/64-bit paging masks
new f7384b8866b0 KVM: x86/mmu: Truncate paging32's PT_BASE_ADDR_MASK to 32 bits
new 70e41c31bc77 KVM: x86/mmu: Use common logic for computing the 32/64-bit [...]
new 28b85ae06f64 KVM: Drop bogus "pfn != 0" guard from kvm_release_pfn()
new a1040b0d42ac KVM: Don't set Accessed/Dirty bits for ZERO_PAGE
new 8e1c69149f27 KVM: Avoid pfn_to_page() and vice versa when releasing pages
new fe1911aa443e KVM: nVMX: Use kvm_vcpu_map() to get/pin vmcs12's APIC-acc [...]
new 6573a6910ce4 KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn
new b1624f99aa8f KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()
new 284dc4930773 KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()
new b14b2690c50e KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_r [...]
new 5d49f08c2e08 KVM: x86/mmu: Shove refcounted page dependency into host_p [...]
new 943dfea8f166 KVM: Do not zero initialize 'pfn' in hva_to_pfn()
new e20918f6d112 x86: kvm: remove NULL check before kfree
new 9fc222967a39 KVM: x86: Give host userspace full control of MSR_IA32_MIS [...]
new 0f4a7185270c KVM: VMX: Give host userspace full control of MSR_IA32_PER [...]
new 5d4283df5a0f Revert "KVM: x86/pmu: Accept 0 for absent PMU MSRs when ho [...]
new 545feb96c052 Revert "KVM: x86: always allow host-initiated writes to PMU MSRs"
new 3f7999b988bd KVM: VMX: Use vcpu_get_perf_capabilities() to get guest-vi [...]
new 157fc497b54f KVM: x86: Ignore benign host accesses to "unsupported" PEB [...]
new ff81a90f45ce KVM: x86: Ignore benign host writes to "unsupported" F15H_ [...]
new bfbcc81bb82c KVM: x86: Add a quirk for KVM's "MONITOR/MWAIT are NOPs!" [...]
new 3b23054cd3f5 KVM: selftests: Add x86-64 support for exception fixup
new 9f88d062c3db KVM: selftests: Mostly fix broken Hyper-V Features test
new cc5851c6be86 KVM: selftests: Use exception fixup for #UD/#GP Hyper-V MS [...]
new 2325d4dd7321 KVM: selftests: Add MONITOR/MWAIT quirk test
new fcd48a213f0a KVM: selftests: Remove dynamic memory allocation for stats header
new 32faa0647cea KVM: selftests: Read binary stats header in lib
new 4d0a05941570 KVM: selftests: Read binary stats desc in lib
new 143e7eea3d66 KVM: selftests: Clean up coding style in binary stats test
new ed6b53ec9090 KVM: selftests: Read binary stat data in lib
new 1c4dc57328bf KVM: x86: Fix errant brace in KVM capability handling
new 084cc29f8bbb KVM: x86/MMU: Allow NX huge pages to be disabled on a per- [...]
new 8448ec5993be KVM: selftests: Add NX huge pages test
new b774da3f2e57 KVM: selftests: Test disabling NX hugepages on a VM
new 83f6e109f562 KVM: selftests: Cache binary stats metadata for duration of test
new bb924ca69f71 KVM: x86/mmu: Optimize MMU page cache lookup for all direct SPs
new 27a59d57f073 KVM: x86/mmu: Use a bool for direct
new 86938ab6925b KVM: x86/mmu: Stop passing "direct" to mmu_alloc_root()
new 2e65e842c57d KVM: x86/mmu: Derive shadow MMU page role from parent
new 7f49777550e5 KVM: x86/mmu: Always pass 0 for @quadrant when gptes are 8 bytes
new 94c8136448c8 KVM: x86/mmu: Decompose kvm_mmu_get_page() into separate f [...]
new c306aec81ae1 KVM: x86/mmu: Consolidate shadow page allocation and initi [...]
new 876546436db9 KVM: x86/mmu: Rename shadow MMU functions that deal with s [...]
new be911771330a KVM: x86/mmu: Move guest PT write-protection to account_sh [...]
new 2f8b1b539be3 KVM: x86/mmu: Pass memory caches to allocate SPs separately
new 336081fb3f26 KVM: x86/mmu: Replace vcpu with kvm in kvm_mmu_alloc_shado [...]
new 3cc736b35799 KVM: x86/mmu: Pass kvm pointer separately from vcpu to kvm [...]
new cbd858b17e37 KVM: x86/mmu: Allow NULL @vcpu in kvm_mmu_find_shadow_page()
new 6ec6509eea39 KVM: x86/mmu: Pass const memslot to rmap_add()
new 2ff9039a75a8 KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() f [...]
new 81cb4657e9f0 KVM: x86/mmu: Update page stats in __rmap_add()
new 6a97575d5cff KVM: x86/mmu: Cache the access bits of shadowed translations
new 47855da0555a KVM: x86/mmu: Extend make_huge_page_split_spte() for the s [...]
new 20d49186c030 KVM: x86/mmu: Zap collapsible SPTEs in shadow MMU at all p [...]
new 0cd8dc739833 KVM: x86/mmu: pull call to drop_large_spte() into __link_s [...]
new 837f66c71207 KVM: Allow for different capacities in kvm_mmu_memory_cach [...]
new ada51a9de737 KVM: x86/mmu: Extend Eager Page Splitting to nested MMUs
new 0378739401cf KVM: x86/mmu: Avoid unnecessary flush on eager page split
new 951ceb94ede3 KVM: x86: Make APIC_VERSION capture only the magic 0x14UL.
new 1d8c681fb6ed KVM: x86: Fill apic_lvt_mask with enums / explicit entries.
new 987f625e0799 KVM: x86: Add APIC_LVTx() macro.
new 4b903561ec49 KVM: x86: Add Corrected Machine Check Interrupt (CMCI) emu [...]
new 087acc4e1847 KVM: x86: Use kcalloc to allocate the mce_banks array.
new 281b52780b57 KVM: x86: Add emulation for MSR_IA32_MCx_CTL2 MSRs.
new aebc3ca19063 KVM: x86: Enable CMCI capability by default and handle inj [...]
new eede2065cacc KVM: selftests: Add a self test for CMCI and UCNA emulations.
new 4b88b1a518b3 KVM: selftests: Enhance handling WRMSR ICR register in x2A [...]
new 4de5c54f8c80 KVM: nVMX: clean up posted interrupt descriptor try_cmpxchg
new e36de87d34a7 KVM: debugfs: expose pid of vcpu threads
new aae99a7c9ab3 x86/cpufeatures: Introduce x2AVIC CPUID bit
new bf348f667ed3 KVM: x86: lapic: Rename [GET/SET]_APIC_DEST_FIELD to [GET/ [...]
new 4bdec12aa8d6 KVM: SVM: Detect X2APIC virtualization (x2AVIC) support
new d2fe6bf5b881 KVM: SVM: Update max number of vCPUs supported for x2AVIC mode
new c514d3a348ac KVM: SVM: Update avic_kick_target_vcpus to support 32-bit APIC ID
new ab1b1dc131cd KVM: SVM: Do not support updating APIC ID when in x2APIC mode
new 5c127c85472c KVM: SVM: Adding support for configuring x2APIC MSRs interception
new 8fc9c7a3079e KVM: x86: Deactivate APICv on vCPU with APIC disabled
new 05c4fe8c1bd9 KVM: SVM: Refresh AVIC configuration when changing APIC mode
new 7a8f7c1f3434 KVM: x86: nSVM: always intercept x2apic msrs
new 4d1d7942e36a KVM: SVM: Introduce logic to (de)activate x2AVIC mode
new c0caeee65af3 KVM: SVM: Do not throw warning when calling avic_vcpu_load [...]
new 0e311d33bfbe KVM: SVM: Introduce hybrid-AVIC mode
new f8d8ac215919 KVM: x86: Warning APICv inconsistency only when vcpu APIC [...]
new 8c9e639da435 KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when [...]
new 39b6b8c35cf3 KVM: SVM: Add AVIC doorbell tracepoint
new 091abbf578f9 KVM: x86: nSVM: optimize svm_set_x2apic_msr_interception
new 7a6177d6f344 KVM: x86: complete fast IN directly with complete_emulator [...]
new 0f87ac234d98 KVM: x86: inline kernel_pio into its sole caller
new 35ab3b77a0ae KVM: x86: drop PIO from unregistered devices
new 30d583fd4e1e KVM: x86: move all vcpu->arch.pio* setup in emulator_pio_in_out()
new 0c05e10bce52 KVM: x86: wean in-kernel PIO from vcpu->arch.pio*
new dc7a4bfde507 KVM: x86: wean fast IN from emulator_pio_in
new f35cee4adb54 KVM: x86: de-underscorify __emulator_pio_in
new db209369d48e KVM: SEV-ES: reuse advance_sev_es_emulated_ins for OUT too
new 72ae5822b81a KVM: x86/mmu: Use "unsigned int", not "u32", for SPTEs' @a [...]
new b9b71f43683a KVM: x86/mmu: Buffer nested MMU split_desc_cache only by d [...]
new 2368048bf5c2 KVM: x86: Signal #GP, not -EPERM, on bad WRMSR(MCi_CTL/STATUS)
new f5223a332f36 KVM: x86: Use explicit case-statements for MCx banks in {g [...]
new 54ad60ba9d26 KVM: x86: Add helpers to identify CTL and STATUS MCi MSRs
new 4a627b0b162b Merge branch 'kvm-5.20-msr-eperm'
new 03d84f968906 KVM: x86: Initialize number of APIC LVT entries during API [...]
new f83894b24c2a KVM: x86: Fix handling of APIC LVT updates when userspace [...]
new 159e037d2e36 KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_p [...]
new 156b9d76e882 KVM: nVMX: Always enable TSC scaling for L2 when it was en [...]
new 6e1d2a3f25d5 KVM: x86/mmu: Replace UNMAPPED_GVA with INVALID_GPA for gv [...]
new 79f772b9e800 KVM: x86: Query vcpu->vcpu_idx directly and drop its acces [...]
new 874190fd4ee8 KVM: selftests: Test MONITOR and MWAIT, not just MONITOR f [...]
new b624ae35418c KVM: selftests: Provide valid inputs for MONITOR/MWAIT regs
new 14fd95bf145d KVM: selftests: Use "a" and "d" to set EAX/EDX for wrmsr_safe()
new 43bb9e000ea4 KVM: x86: Tweak name of MONITOR/MWAIT #UD quirk to make it [...]
new ec6e4d863258 KVM: x86: Mark TSS busy during LTR emulation _after_ all f [...]
new 2626206963ac KVM: x86: Set error code to segment selector on LLDT/LTR n [...]
new 0bc273266112 KVM: x86: WARN only once if KVM leaves a dangling userspac [...]
new 8fb2638a568d KVM: selftests: enumerate GUEST_ASSERT arguments
new fc573fa4f38a KVM: selftests: Increase UCALL_MAX_ARGS to 7
new ddcb57afd581 KVM: selftests: Write REPORT_GUEST_ASSERT macros to pair w [...]
new 594a1c271c15 KVM: selftests: Fix filename reporting in guest asserts
new 4c16fa3ee945 KVM: selftests: Set KVM's supported CPUID as vCPU's CPUID [...]
new 683edfd42bc2 KVM: sefltests: Use CPUID_* instead of X86_FEATURE_* for o [...]
new 61d76b8a6943 KVM: selftests: Add framework to query KVM CPUID bits
new c5c5b827f129 KVM: selftests: Use kvm_cpu_has() in the SEV migration test
new f21940a3bb5c KVM: selftests: Use kvm_cpu_has() for nested SVM checks
new 1ecbb337fa10 KVM: selftests: Use kvm_cpu_has() for nested VMX checks
new ea129d22541e KVM: selftests: Use kvm_cpu_has() to query PDCM in PMU selftest
new 50445ea2337a KVM: selftests: Drop redundant vcpu_set_cpuid() from PMU selftest
new fdd1e2788c41 KVM: selftests: Use kvm_cpu_has() for XSAVES in XSS MSR test
new 2697646bd343 KVM: selftests: Check for _both_ XTILE data and cfg in AMX test
new 8fea056eeb0c KVM: selftests: Use kvm_cpu_has() in AMX test
new 045520e4755b KVM: selftests: Use kvm_cpu_has() for XSAVE in cr4_cpuid_s [...]
new b046f4ee9cb6 KVM: selftests: Remove the obsolete/dead MMU role test
new 601c067f3815 KVM: selftests: Use kvm_cpu_has() for KVM's PV steal time
new 3c67f8208451 KVM: selftests: Use kvm_cpu_has() for nSVM soft INT inject [...]
new 71bcb951c68b KVM: selftests: Verify that kvm_cpuid2.entries layout is u [...]
new fc66963d7b01 KVM: selftests: Split out kvm_cpuid2_size() from allocate_ [...]
new 7fbc6038acba KVM: selftests: Cache CPUID in struct kvm_vcpu
new d838b313aadc KVM: selftests: Don't use a static local in vcpu_get_suppo [...]
new 8b02674103e6 KVM: selftests: Rename and tweak get_cpuid() to get_cpuid_entry()
new 662162fed261 KVM: selftests: Use get_cpuid_entry() in kvm_get_supported [...]
new c41880b5f040 KVM: selftests: Add helpers to get and modify a vCPU's CPU [...]
new 7af7161d8738 KVM: selftests: Use vm->pa_bits to generate reserved PA bits
new 1940af0b8179 KVM: selftests: Add and use helper to set vCPU's CPUID maxphyaddr
new b78843be7796 KVM: selftests: Use vcpu_clear_cpuid_feature() in monitor_ [...]
new 3a5d36b32bd2 KVM: selftests: Use vcpu_get_cpuid_entry() in PV features [...]
new 4dcd130c9b3d KVM: selftests: Use vCPU's CPUID directly in Hyper-V test
new 49f6876a2e1e KVM: selftests: Use vcpu_get_cpuid_entry() in CPUID test
new 4ee315231e3d KVM: selftests: Use vcpu_{set,clear}_cpuid_feature() in nV [...]
new 7ed5a54e8282 KVM: selftests: Use vcpu_clear_cpuid_feature() to clear x2APIC
new 813e38cd6d7b KVM: selftests: Make get_supported_cpuid() returns "const"
new 8fe09d6a91be KVM: selftests: Set input function/index in raw CPUID helper(s)
new 48ce3ed052e8 KVM: selftests: Add this_cpu_has() to query X86_FEATURE_* [...]
new 2b424a76d02c KVM: selftests: Use this_cpu_has() in CR4/CPUID sync test
new 05c2b6e5facc KVM: selftests: Use this_cpu_has() to detect SVM support in L1
new 446ab76a0f7a KVM: selftests: Drop unnecessary use of kvm_get_supported_ [...]
new 28e09d321035 KVM: selftests: Rename kvm_get_supported_cpuid_index() to [...]
new d04019274d13 KVM: selftests: Inline "get max CPUID leaf" helpers
new 7fbb653e01fd KVM: selftests: Check KVM's supported CPUID, not host CPUI [...]
new d4c94ee8121c KVM: selftests: Skip AMX test if ARCH_REQ_XCOMP_GUEST_PERM [...]
new 090cd45b21cd KVM: selftests: Clean up requirements for XFD-aware XSAVE [...]
new 12a985aeb406 KVM: selftests: Use the common cpuid() helper in cpu_vendo [...]
new 3d5f8d03786f KVM: selftests: Drop unused SVM_CPUID_FUNC macro
new b184b35d06b2 KVM: VMX: Update PT MSR intercepts during filter change if [...]
new 79e48cec6cba KVM: x86/mmu: Add optimized helper to retrieve an SPTE's index
new 39944ab99c2f KVM: x86/mmu: Expand quadrant comment for PG_LEVEL_4K shad [...]
new dfd4eb444e5c KVM: x86/mmu: Fix typo and tweak comment for split_desc_ca [...]
new bdc2d7ad1072 KVM: SVM: fix task switch emulation on INTn instruction.
new 277ad7d58611 KVM: x86: Add dedicated helper to get CPUID entry with sig [...]
new ba28401bb93e KVM: x86: Restrict get_mt_mask() to a u8, use KVM_X86_OP_O [...]
new fbccc4f5c2b1 Merge commit 'kvm-vmx-nested-tsc-fix' into kvm-next-5.20
new 8031d87aa995 KVM: x86: Check target, not vCPU's x2APIC ID, when applyin [...]
new e3d27b62110c s390/sclp: detect the zPCI load/store interpretation facility
new 9db153f45230 s390/sclp: detect the AISII facility
new efef0db77c93 s390/sclp: detect the AENI facility
new b05a870c5e4e s390/sclp: detect the AISI facility
new d2197485a188 s390/airq: pass more TPI info to airq handlers
new 932b646727f9 s390/airq: allow for airq structure that uses an input vector
new 062f002485d4 s390/pci: externalize the SIC operation controls and routine
new c68468ed3416 s390/pci: stash associated GISA designation
new d10384677630 s390/pci: stash dtsm and maxstbl
new c435c54639aa vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM
new 6438e30714ab KVM: s390: pci: add basic kvm_zdev structure
new 98b1d33dac5f KVM: s390: pci: do initial setup for AEN interpretation
new 73f91b004321 KVM: s390: pci: enable host forwarding of Adapter Event No [...]
new 3f4bbb4342ec KVM: s390: mechanism to enable guest zPCI Interpretation
new 3c5a1b6f0a18 KVM: s390: pci: provide routines for enabling/disabling in [...]
new 09340b2fca00 KVM: s390: pci: add routines to start/stop interpretive execution
new 8061d1c31f1a vfio-pci/zdev: add open/close device hooks
new faf3bfcb8950 vfio-pci/zdev: add function handle to clp base capability
new ba6090ff8ae0 vfio-pci/zdev: different maxstbl for interpreted devices
new db1c875e0539 KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices
new 4ac34b94a534 MAINTAINERS: additional files related kvm s390 pci passthrough
new d41b5e0176a6 Merge tag 'kvm-s390-pci-5.20' into kernelorgnext
new b9df116cb765 KVM: s390: drop unexpected word 'and' in the comments
new 1b6abe95b522 s390: Add attestation query information
new 6131fd198099 KVM: s390/pci: fix include duplicates
new 5efab5cdf06b Documentation: kvm: extend KVM_S390_ZPCI_OP subheading underline
new c0da6efc74b4 KVM: s390: Add facility 197 to the allow list
new faa2f72cb356 KVM: s390: pv: leak the topmost page table when destroy fails
new a52c25848e31 KVM: s390: pv: handle secure storage violations for protec [...]
new b108f7f0a29b KVM: s390: pv: handle secure storage exceptions for normal guests
new 6f73517d0a99 KVM: s390: pv: refactor s390_reset_acc
new 07fbdf7f9347 KVM: s390: pv: usage counter instead of flag
new 72b1daff2671 KVM: s390: pv: add export before import
new e40df9efd68a KVM: s390: pv: clear the state without memset
new be48d86f77f0 KVM: s390: pv: Add kvm_s390_cpus_from_pv to kvm-s390.h and [...]
new ca2fd0609b5d KVM: s390: pv: add mmu_notifier
new 9bf811dae443 s390/mm: KVM: pv: when tearing down, try to destroy protec [...]
new da15fbc646f3 KVM: s390: pv: refactoring of kvm_s390_pv_deinit_vm
new 7746f735f552 KVM: s390: pv: destroy the configuration before its memory
new c3f0e5fd2d33 KVM: s390: pv: don't present the ecall interrupt twice
new 0130337ec45b KVM: s390: Cleanup ipte lock access and SIIF facility checks
new 24fe0195bc19 KVM: s390: guest support for topology function
new f5ecfee94493 KVM: s390: resetting the Topology-Change-Report
new a4850b5590d0 Merge tag 'kvm-s390-next-5.20-1' of https://git.kernel.org [...]
new da0b93d65e5b KVM: nSVM: Pull CS.Base from actual VMCB12 for soft int/ex [...]
new 35d539c3e44f KVM: x86/mmu: Return a u64 (the old SPTE) from mmu_spte_cl [...]
new a42989e7fbb0 KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps
new aed02fe3cae4 KVM: x86/mmu: Drop the "p is for pointer" from rmap helpers
new 2833eda0e296 KVM: x86/mmu: Rename __kvm_zap_rmaps() to align with other [...]
new f8480721a74b KVM: x86/mmu: Rename rmap zap helpers to eliminate "unmap" [...]
new 9202aee816c8 KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show t [...]
new 3c2e10373ec7 KVM: x86/mmu: Remove underscores from __pte_list_remove()
new 01e69cef63f8 KVM: SVM: Fix x2APIC MSRs interception
new 94bda2f4cd86 KVM: x86: Reject loading KVM if host.PAT[0] != WB
new 82ffad2ddf5d KVM: x86: Drop unnecessary goto+label in kvm_arch_init()
new 38bf9d7bf277 KVM: x86/mmu: Add shadow mask for effective host MTRR memtype
new d5e90a699875 KVM: x86/mmu: Restrict mapping level based on guest MTRR i [...]
new a8ac499bb6ab KVM: x86/mmu: Don't require refcounted "struct page" to cr [...]
new 65e3b446bcce KVM: x86/mmu: Document the "rules" for using host_pfn_mapp [...]
new 85f44f8cc07b KVM: x86/mmu: Don't bottom out on leafs when zapping colla [...]
new cfe12e64b065 KVM: selftests: Add an option to run vCPUs while disabling [...]
new c33f6f2228fe KVM: x86: Split kvm_is_valid_cr4() and export only the non [...]
new ca58f3aa53d1 KVM: nVMX: Account for KVM reserved CR4 bits in consistenc [...]
new c7d855c2aff2 KVM: nVMX: Inject #UD if VMXON is attempted with incompati [...]
new a645c2b506fb KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}()
new f8ae08f9789a KVM: nVMX: Let userspace set nVMX MSR to any _host_ suppor [...]
new 8805875aa473 Revert "KVM: nVMX: Do not expose MPX VMX controls when gue [...]
new 93255bf92939 KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if [...]
new b663f0b5f3d6 KVM: VMX: Add helper to check if the guest PMU has PERF_GL [...]
new 4496a6f9b45e KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer i [...]
new 9389d5774aca Revert "KVM: nVMX: Expose load IA32_PERF_GLOBAL_CTRL VM-{E [...]
new a910b5ab6b25 KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP
new ce30d8b976b4 KVM: selftests: Verify VMX MSRs can be restored to KVM-sup [...]
new 0a8735a6acf3 KVM: SVM: Do not virtualize MSR accesses for APIC LVTT register
new 1bd9dfec9fd4 KVM: x86: Do not block APIC write for non ICR registers
new 6c6ab524cfae KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT
new 6fac42f127b8 KVM: SVM: Dump Virtual Machine Save Area (VMSA) to klog
new 7edc3a68038a KVM, x86/mmu: Fix the comment around kvm_tdp_mmu_zap_leafs()
new 63f4b210414b Merge remote-tracking branch 'kvm/next' into kvm-next-5.20
new e9ada6c208c1 KVM: arm64: Drop FP_FOREIGN_STATE from the hypervisor code
new f8077b0d5923 KVM: arm64: Move FP state ownership from flag to a tristate
new e87abb73e594 KVM: arm64: Add helpers to manipulate vcpu flags among a set
new 690bacb83bc3 KVM: arm64: Add three sets of flags to the vcpu state
new 4c0680d394d8 KVM: arm64: Move vcpu configuration flags into their own set
new 699bb2e0c6f3 KVM: arm64: Move vcpu PC/Exception flags to the input flag set
new b1da49088ac6 KVM: arm64: Move vcpu debug/SPE/TRBE flags to the input flag set
new 0affa37fcd1d KVM: arm64: Move vcpu SVE/SME flags to the state flag set
new aff3ccd7320e KVM: arm64: Move vcpu ON_UNSUPPORTED_CPU flag to the state [...]
new eebc538d8e07 KVM: arm64: Move vcpu WFIT flag to the state flag set
new 781e3ae148fd KVM: arm64: Kill unused vcpu flags field
new 30b6ab45f813 KVM: arm64: Convert vcpu sysregs_loaded_on_cpu to a state flag
new e19f2c6cd146 KVM: arm64: Warn when PENDING_EXCEPTION and INCREMENT_PC a [...]
new 5a3984f4ec73 KVM: arm64: Add build-time sanity checks for flags
new 54ddda919c4b KVM: arm64: Reduce the size of the vcpu flag members
new 0fa4a3137e94 KVM: arm64: Document why pause cannot be turned into a flag
new b4da91879e98 KVM: arm64: Move the handling of !FP outside of the fast path
new dc94f89ae68f Merge branch kvm-arm64/burn-the-flags into kvmarm-master/next
new 3d5697f95e49 KVM: arm64: nvhe: Rename confusing obj-y
new 40c56bd8e1ae KVM: arm64: nvhe: Add intermediates to 'targets' instead o [...]
new 1c3ace2b8b39 KVM: arm64: Don't return from void function
new 6a4f7fcd7504 KVM: arm64: selftests: Add support for GICv2 on v3
new ed6313a93fd1 KVM: arm64: Fix hypervisor address symbolization
new aeb7942b64cc Merge branch kvm-arm64/misc-5.20 into kvmarm-master/next
new da8d120fbafe KVM: arm64: Add get_reg_by_id() as a sys_reg_desc retrievi [...]
new 1deeffb55966 KVM: arm64: Reorder handling of invariant sysregs from userspace
new ba23aec9f4f2 KVM: arm64: Introduce generic get_user/set_user helpers fo [...]
new e48407ff9796 KVM: arm64: Rely on index_to_param() for size checks on us [...]
new 978ceeb3e40a KVM: arm64: Consolidate sysreg userspace accesses
new 5a420ed9646a KVM: arm64: Get rid of reg_from/to_user()
new b61fc0857a3a KVM: arm64: vgic-v3: Simplify vgic_v3_has_cpu_sysregs_attr()
new db25081e147c KVM: arm64: vgic-v3: Push user access into vgic_v3_cpu_sys [...]
new cbcf14dd23bc KVM: arm64: vgic-v3: Make the userspace accessors use sysreg API
new 71c3c7753c72 KVM: arm64: vgic-v3: Convert userspace accessors over to F [...]
new 38cf0bb7625a KVM: arm64: vgic-v3: Use u32 to manage the line level from [...]
new e1246f3f2df7 KVM: arm64: vgic-v3: Consolidate userspace access for MMIO [...]
new 7e9f723c2a90 KVM: arm64: vgic-v2: Consolidate userspace access for MMIO [...]
new d7df6f282db6 KVM: arm64: vgic: Use {get,put}_user() instead of copy_{fr [...]
new 9f968c9266aa KVM: arm64: vgic-v2: Add helper for legacy dist/cpuif base [...]
new 4b85080f4e37 KVM: arm64: vgic: Consolidate userspace access for base ad [...]
new 619064afa9b6 KVM: arm64: vgic: Tidy-up calls to vgic_{get,set}_common_attr()
new f6dddbb25572 KVM: arm64: Get rid of find_reg_by_id()
new c5332898dc35 KVM: arm64: Descope kvm_arm_sys_reg_{get,set}_reg()
new 4274d42716d8 KVM: arm64: Get rid or outdated comments
new ae98a4a98993 Merge branch kvm-arm64/sysreg-cleanup-5.20 into kvmarm-mas [...]
new 6bf212c89c48 arm64: stacktrace: Add shared header for common stack unwi [...]
new 15a59f19a015 arm64: stacktrace: Factor out on_accessible_stack_common()
new be63c647fd28 arm64: stacktrace: Factor out unwind_next_common()
new 5b1b08619f50 arm64: stacktrace: Handle frame pointer from different add [...]
new f51e71467405 arm64: stacktrace: Factor out common unwind()
new 051ece6758cc arm64: stacktrace: Add description of stacktrace/common.h
new 548ec3336f32 KVM: arm64: On stack overflow switch to hyp overflow_stack
new 573e1e8275f7 KVM: arm64: Stub implementation of non-protected nVHE HYP [...]
new 879e5ac7b2e4 KVM: arm64: Prepare non-protected nVHE hypervisor stacktrace
new db129d486ebd KVM: arm64: Implement non-protected nVHE hyp stack unwinder
new 314a61dc3184 KVM: arm64: Introduce hyp_dump_backtrace()
new 72adac1bd234 KVM: arm64: Add PROTECTED_NVHE_STACKTRACE Kconfig
new 6928bcc84bc4 KVM: arm64: Allocate shared pKVM hyp stacktrace buffers
new 25aa73b6db18 KVM: arm64: Stub implementation of pKVM HYP stack unwinder
new 871c5d931417 KVM: arm64: Save protected-nVHE (pKVM) hyp stacktrace
new 75e9459e48d4 KVM: arm64: Implement protected nVHE hyp stack unwinder
new 3a7e1b55aad4 KVM: arm64: Introduce pkvm_dump_backtrace()
new 03fe9cd05b9f KVM: arm64: Move PROTECTED_NVHE_STACKTRACE around
new 9f5fee05f689 KVM: arm64: Move nVHE stacktrace unwinding into its own co [...]
new 4e00532f3736 KVM: arm64: Make unwind()/on_accessible_stack() per-unwind [...]
new 0e773da1e688 KVM: arm64: Move nVHE-only helpers into kvm/stacktrace.c
new 62ae21627aa9 KVM: arm64: Don't open code ARRAY_SIZE()
new a4c750e2328a arm64: Update 'unwinder howto'
new 0982c8d859f8 Merge branch kvm-arm64/nvhe-stacktrace into kvmarm-master/next
new c4edb2babc75 Merge tag 'kvmarm-5.20' of git://git.kernel.org/pub/scm/li [...]
new 31f6e3832a0f KVM: x86/mmu: remove unused variable
new ad5b072716e9 selftests: KVM: Check stat name before other fields
new 7eebae78bc97 selftests: KVM: Provide descriptive assertions in kvm_bina [...]
new dd4d1c3bb3f1 selftests: KVM: Add exponent check for boolean stats
new 281106f938d3 selftests: kvm: set rax before vmcall
new 7c5c3a6177fa Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
new 67f43c9c6a47 xen/manage: Use orderly_reboot() to reboot
new 8441dac05e7f xen: Fix spelling mistake
new a603002eea82 virtio: replace restricted mem access flag with callback
new a870544ca9d2 kernel: remove platform_has() infrastructure
new 251e90e7e346 xen: don't require virtio with grants for non-PV guests
new 7447691ef994 Merge tag 'for-linus-6.0-rc1-tag' of git://git.kernel.org/ [...]
new 300a596590e4 dma:dw: remove reference to AVR32 architecture in core.c
new 53291cb23c91 mfd: remove reference to AVR32 architecture in atmel-smc.c
new 62bf2fa70b68 misc: update maintainer email address and description for [...]
new 8bfdfbb25891 net: remove cdns,at32ap7000-macb device tree entry
new 0a2fd172b4ba sound:spi: remove reference to AVR32 in Atmel AT73C213 DAC driver
new 93dd2f713ad2 usb:udc: remove reference to AVR32 architecture in Atmel U [...]
new 4492b0c08970 video: remove support for non-existing atmel,at32ap-lcdc i [...]
new 2fb0ec4ae563 video:backlight: remove reference to AVR32 architecture in [...]
new 25e6bed5a648 Merge branch 'for-linus' of git://git.kernel.org/pub/scm/l [...]
new a2310c74d418 csky/kprobe: reclaim insn_slot on kprobe unregistration
new 49a1a3cf7316 csky: Use the bitmap API to allocate bitmaps
new f54af50d7b6f csky: Correct position of _stext
new 01ab4649ef5a csky: Move HEAD_TEXT_SECTION out of __init_begin-end
new 4e8bb4ba5a55 csky: Add jump-label implementation
new 45e15c1a375e csky: Add qspinlock support
new 7f8030cea330 csky: Enable ARCH_INLINE_READ*/WRITE*/SPIN*
new f940dc0f2251 csky: cmpxchg: Coding convention for BUILD_BUG()
new 45fef4c4b9c9 csky: abiv1: Fixup compile error
new 7df9075e232e Merge tag 'csky-for-linus-6.0-rc1' of https://github.com/c [...]
new 565cbaad83d8 ARM: 9202/1: kasan: support CONFIG_KASAN_VMALLOC
new 8fa7ea40bf56 ARM: 9203/1: kconfig: fix MODULE_PLTS for KASAN with KASAN [...]
new b97abb4d0e23 ARM: 9217/1: add definition of arch_irq_work_raise()
new 3437021484dd ARM: 9218/1: dma-mapping: fix pointer/integer warning
new fe520635ddc4 ARM: 9219/1: fix undeclared soft_restart
new f2d3b9a46e0e ARM: 9220/1: amba: Remove deferred device addition
new 995177a4c75e Merge tag 'for-linus' of git://git.armlinux.org.uk/~rmk/linux-arm
new 039133490793 xtensa: iss/network: drop 'devices' list
new 8864fb835968 xtensa: iss/network: provide release() callback
new 628ccfc8f5f7 xtensa: iss: fix handling error cases in iss_net_configure()
new c49731a04e7c xtensa: enable KCOV support
new 0847d167d0f9 xtensa: enable ARCH_HAS_GCOV_PROFILE_ALL
new c040862bfbd9 Merge tag 'xtensa-20220804' of https://github.com/jcmvbkbc [...]
The 661 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/admin-guide/kernel-parameters.txt | 3 +-
.../devicetree/bindings/display/atmel,lcdc.txt | 1 -
.../devicetree/bindings/net/cdns,macb.yaml | 3 +-
.../debug/gcov-profile-all/arch-support.txt | 2 +-
Documentation/features/debug/kcov/arch-support.txt | 2 +-
Documentation/virt/kvm/api.rst | 344 +++++-
Documentation/virt/kvm/s390/index.rst | 1 +
Documentation/virt/kvm/s390/s390-pv-dump.rst | 64 ++
MAINTAINERS | 9 +-
arch/arm/Kconfig | 2 +
arch/arm/include/asm/irq_work.h | 2 +
arch/arm/kernel/reboot.c | 1 +
arch/arm/mm/dma-mapping.c | 2 +-
arch/arm/mm/kasan_init.c | 6 +-
arch/arm/xen/enlighten.c | 4 +-
arch/arm64/include/asm/kvm_asm.h | 16 +
arch/arm64/include/asm/kvm_emulate.h | 11 +-
arch/arm64/include/asm/kvm_host.h | 205 +++-
arch/arm64/include/asm/memory.h | 8 +
arch/arm64/include/asm/stacktrace.h | 62 +-
arch/arm64/include/asm/stacktrace/common.h | 199 ++++
arch/arm64/include/asm/stacktrace/nvhe.h | 55 +
arch/arm64/kernel/stacktrace.c | 125 +-
arch/arm64/kvm/Kconfig | 13 +
arch/arm64/kvm/Makefile | 2 +-
arch/arm64/kvm/arch_timer.c | 2 +-
arch/arm64/kvm/arm.c | 25 +-
arch/arm64/kvm/debug.c | 25 +-
arch/arm64/kvm/fpsimd.c | 39 +-
arch/arm64/kvm/handle_exit.c | 10 +-
arch/arm64/kvm/hyp/exception.c | 23 +-
arch/arm64/kvm/hyp/include/hyp/debug-sr.h | 6 +-
arch/arm64/kvm/hyp/include/hyp/switch.h | 24 +-
arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h | 4 +-
arch/arm64/kvm/hyp/nvhe/Makefile | 14 +-
arch/arm64/kvm/hyp/nvhe/debug-sr.c | 8 +-
arch/arm64/kvm/hyp/nvhe/host.S | 9 +-
arch/arm64/kvm/hyp/nvhe/stacktrace.c | 160 +++
arch/arm64/kvm/hyp/nvhe/switch.c | 14 +-
arch/arm64/kvm/hyp/nvhe/sys_regs.c | 4 +-
arch/arm64/kvm/hyp/vhe/switch.c | 6 +-
arch/arm64/kvm/hyp/vhe/sysreg-sr.c | 4 +-
arch/arm64/kvm/inject_fault.c | 17 +-
arch/arm64/kvm/mmu.c | 2 +-
arch/arm64/kvm/reset.c | 6 +-
arch/arm64/kvm/stacktrace.c | 218 ++++
arch/arm64/kvm/sys_regs.c | 294 ++---
arch/arm64/kvm/sys_regs.h | 18 +-
arch/arm64/kvm/vgic-sys-reg-v3.c | 462 ++++----
arch/arm64/kvm/vgic/vgic-kvm-device.c | 342 +++---
arch/arm64/kvm/vgic/vgic-mmio-v3.c | 10 +-
arch/arm64/kvm/vgic/vgic-mmio.c | 6 +-
arch/arm64/kvm/vgic/vgic-mmio.h | 4 +-
arch/arm64/kvm/vgic/vgic.h | 9 +-
arch/csky/Kconfig | 29 +
arch/csky/abiv1/inc/abi/string.h | 6 +
arch/csky/include/asm/Kbuild | 4 +-
arch/csky/include/asm/cmpxchg.h | 31 +-
arch/csky/include/asm/jump_label.h | 47 +
arch/csky/include/asm/sections.h | 10 +
arch/csky/include/asm/spinlock.h | 12 +
arch/csky/include/asm/spinlock_types.h | 9 +
arch/csky/kernel/Makefile | 1 +
arch/csky/kernel/jump_label.c | 54 +
arch/csky/kernel/probes/kprobes.c | 4 +
arch/csky/kernel/setup.c | 4 +-
arch/csky/kernel/vmlinux.lds.S | 15 +-
arch/csky/mm/asid.c | 5 +-
arch/riscv/include/asm/csr.h | 16 +
arch/riscv/include/asm/kvm_host.h | 24 +-
arch/riscv/include/asm/kvm_vcpu_fp.h | 8 +-
arch/riscv/include/asm/kvm_vcpu_insn.h | 48 +
arch/riscv/include/asm/kvm_vcpu_timer.h | 2 +-
arch/riscv/include/uapi/asm/kvm.h | 1 +
arch/riscv/kvm/Makefile | 1 +
arch/riscv/kvm/mmu.c | 35 +-
arch/riscv/kvm/vcpu.c | 203 ++--
arch/riscv/kvm/vcpu_exit.c | 496 +-------
arch/riscv/kvm/vcpu_fp.c | 27 +-
arch/riscv/kvm/{vcpu_exit.c => vcpu_insn.c} | 563 ++++-----
arch/riscv/kvm/vcpu_timer.c | 4 +-
arch/riscv/kvm/vm.c | 4 +-
arch/s390/boot/uv.c | 6 +
arch/s390/include/asm/airq.h | 7 +-
arch/s390/include/asm/gmap.h | 39 +-
arch/s390/include/asm/kvm_host.h | 44 +-
arch/s390/include/asm/mmu.h | 2 +-
arch/s390/include/asm/mmu_context.h | 2 +-
arch/s390/include/asm/pci.h | 11 +
arch/s390/include/asm/pci_clp.h | 9 +-
arch/s390/include/asm/pci_insn.h | 29 +-
arch/s390/include/asm/pgtable.h | 21 +-
arch/s390/include/asm/sclp.h | 4 +
arch/s390/include/asm/tpi.h | 13 +
arch/s390/include/asm/uv.h | 51 +-
arch/s390/include/uapi/asm/kvm.h | 1 +
arch/s390/kernel/uv.c | 156 +++
arch/s390/kvm/Kconfig | 1 +
arch/s390/kvm/Makefile | 1 +
arch/s390/kvm/gaccess.c | 96 +-
arch/s390/kvm/gaccess.h | 6 +-
arch/s390/kvm/intercept.c | 15 +
arch/s390/kvm/interrupt.c | 98 +-
arch/s390/kvm/kvm-s390.c | 482 +++++++-
arch/s390/kvm/kvm-s390.h | 16 +
arch/s390/kvm/pci.c | 690 +++++++++++
arch/s390/kvm/pci.h | 87 ++
arch/s390/kvm/priv.c | 26 +-
arch/s390/kvm/pv.c | 269 ++++-
arch/s390/kvm/sigp.c | 4 +-
arch/s390/kvm/vsie.c | 8 +
arch/s390/mm/fault.c | 23 +-
arch/s390/mm/gmap.c | 177 ++-
arch/s390/mm/init.c | 4 +-
arch/s390/pci/pci.c | 16 +
arch/s390/pci/pci_clp.c | 7 +
arch/s390/pci/pci_insn.c | 4 +-
arch/s390/pci/pci_irq.c | 48 +-
arch/s390/tools/gen_facilities.c | 1 +
arch/x86/events/core.c | 28 +-
arch/x86/events/intel/core.c | 160 ++-
arch/x86/events/perf_event.h | 6 +-
arch/x86/hyperv/hv_apic.c | 2 +-
arch/x86/include/asm/apicdef.h | 4 +-
arch/x86/include/asm/cpufeatures.h | 1 +
arch/x86/include/asm/kvm-x86-ops.h | 3 +-
arch/x86/include/asm/kvm-x86-pmu-ops.h | 2 +-
arch/x86/include/asm/kvm_host.h | 90 +-
arch/x86/include/asm/msr-index.h | 7 +
arch/x86/include/asm/perf_event.h | 11 +-
arch/x86/include/asm/svm.h | 16 +-
arch/x86/include/asm/vmx.h | 18 +
arch/x86/include/asm/vmxfeatures.h | 6 +-
arch/x86/include/uapi/asm/kvm.h | 10 +-
arch/x86/include/uapi/asm/vmx.h | 4 +-
arch/x86/kernel/apic/apic.c | 2 +-
arch/x86/kernel/apic/ipi.c | 2 +-
arch/x86/kernel/cpu/feat_ctl.c | 9 +-
arch/x86/kernel/kvm.c | 3 +-
arch/x86/kvm/cpuid.c | 115 +-
arch/x86/kvm/cpuid.h | 21 +-
arch/x86/kvm/debugfs.c | 4 +-
arch/x86/kvm/emulate.c | 49 +-
arch/x86/kvm/hyperv.c | 8 +-
arch/x86/kvm/i8254.c | 10 +-
arch/x86/kvm/i8254.h | 1 -
arch/x86/kvm/kvm_emulate.h | 28 +-
arch/x86/kvm/lapic.c | 181 ++-
arch/x86/kvm/lapic.h | 20 +-
arch/x86/kvm/mmu.h | 10 -
arch/x86/kvm/mmu/mmu.c | 967 +++++++++++-----
arch/x86/kvm/mmu/mmu_internal.h | 40 +-
arch/x86/kvm/mmu/paging.h | 14 -
arch/x86/kvm/mmu/paging_tmpl.h | 126 +-
arch/x86/kvm/mmu/spte.c | 43 +-
arch/x86/kvm/mmu/spte.h | 38 +-
arch/x86/kvm/mmu/tdp_iter.c | 15 +-
arch/x86/kvm/mmu/tdp_iter.h | 1 -
arch/x86/kvm/mmu/tdp_mmu.c | 87 +-
arch/x86/kvm/pmu.c | 212 ++--
arch/x86/kvm/pmu.h | 45 +-
arch/x86/kvm/svm/avic.c | 170 ++-
arch/x86/kvm/svm/nested.c | 72 +-
arch/x86/kvm/svm/pmu.c | 62 +-
arch/x86/kvm/svm/sev.c | 20 +-
arch/x86/kvm/svm/svm.c | 273 +++--
arch/x86/kvm/svm/svm.h | 39 +-
arch/x86/kvm/trace.h | 51 +-
arch/x86/kvm/vmx/capabilities.h | 57 +-
arch/x86/kvm/vmx/evmcs.c | 2 +
arch/x86/kvm/vmx/evmcs.h | 1 +
arch/x86/kvm/vmx/nested.c | 197 ++--
arch/x86/kvm/vmx/nested.h | 5 +-
arch/x86/kvm/vmx/pmu_intel.c | 198 +++-
arch/x86/kvm/vmx/posted_intr.c | 30 +-
arch/x86/kvm/vmx/posted_intr.h | 2 +
arch/x86/kvm/vmx/sgx.c | 10 +-
arch/x86/kvm/vmx/vmcs.h | 1 +
arch/x86/kvm/vmx/vmx.c | 367 ++++--
arch/x86/kvm/vmx/vmx.h | 95 +-
arch/x86/kvm/x86.c | 704 ++++++++----
arch/x86/kvm/x86.h | 35 +-
arch/x86/kvm/xen.c | 10 +-
arch/x86/mm/mem_encrypt_amd.c | 4 +-
arch/x86/xen/enlighten_hvm.c | 4 +-
arch/x86/xen/enlighten_pv.c | 5 +-
arch/xtensa/Kconfig | 2 +
arch/xtensa/boot/lib/Makefile | 2 +
arch/xtensa/platforms/iss/network.c | 63 +-
drivers/amba/bus.c | 313 +++--
drivers/dma/dw/core.c | 3 -
drivers/gpu/drm/amd/amdgpu/psp_v13_0.c | 1 +
drivers/mfd/atmel-smc.c | 4 +-
drivers/misc/atmel-ssc.c | 4 +-
drivers/net/ethernet/cadence/macb_main.c | 1 -
drivers/s390/char/sclp_early.c | 4 +
drivers/s390/cio/airq.c | 12 +-
drivers/s390/cio/qdio_thinint.c | 6 +-
drivers/s390/crypto/ap_bus.c | 9 +-
drivers/s390/virtio/virtio_ccw.c | 6 +-
drivers/usb/gadget/udc/Kconfig | 4 +-
drivers/vfio/pci/Kconfig | 11 +
drivers/vfio/pci/Makefile | 2 +-
drivers/vfio/pci/vfio_pci_core.c | 10 +-
drivers/vfio/pci/vfio_pci_zdev.c | 35 +-
drivers/video/backlight/ltv350qv.c | 3 +-
drivers/virtio/Kconfig | 4 +
drivers/virtio/Makefile | 1 +
drivers/virtio/virtio.c | 4 +-
drivers/virtio/virtio_anchor.c | 18 +
drivers/xen/Kconfig | 9 +
drivers/xen/grant-dma-ops.c | 10 +
drivers/xen/manage.c | 2 +-
drivers/xen/xen-front-pgdir-shbuf.c | 4 +-
include/asm-generic/Kbuild | 1 -
include/asm-generic/platform-feature.h | 8 -
include/kvm/arm_vgic.h | 2 +-
include/linux/kvm_host.h | 20 +-
include/linux/kvm_types.h | 9 +-
include/linux/platform-feature.h | 19 -
include/linux/sched/user.h | 3 +-
include/linux/vfio_pci_core.h | 12 +-
include/linux/virtio_anchor.h | 19 +
include/uapi/linux/kvm.h | 108 ++
include/uapi/linux/vfio_zdev.h | 7 +
include/xen/xen-ops.h | 9 +
include/xen/xen.h | 8 -
kernel/Makefile | 2 +-
kernel/platform-feature.c | 27 -
sound/spi/Kconfig | 2 +-
tools/testing/selftests/kvm/.gitignore | 10 +-
tools/testing/selftests/kvm/Makefile | 17 +-
tools/testing/selftests/kvm/aarch64/arch_timer.c | 88 +-
.../selftests/kvm/aarch64/debug-exceptions.c | 26 +-
tools/testing/selftests/kvm/aarch64/get-reg-list.c | 30 +-
tools/testing/selftests/kvm/aarch64/hypercalls.c | 97 +-
tools/testing/selftests/kvm/aarch64/psci_test.c | 72 +-
.../selftests/kvm/aarch64/vcpu_width_config.c | 71 +-
tools/testing/selftests/kvm/aarch64/vgic_init.c | 446 ++++----
tools/testing/selftests/kvm/aarch64/vgic_irq.c | 44 +-
.../selftests/kvm/access_tracking_perf_test.c | 92 +-
tools/testing/selftests/kvm/demand_paging_test.c | 49 +-
tools/testing/selftests/kvm/dirty_log_perf_test.c | 81 +-
tools/testing/selftests/kvm/dirty_log_test.c | 95 +-
.../testing/selftests/kvm/hardware_disable_test.c | 29 +-
.../selftests/kvm/include/aarch64/processor.h | 28 +-
tools/testing/selftests/kvm/include/aarch64/vgic.h | 6 +-
.../testing/selftests/kvm/include/kvm_util_base.h | 823 +++++++++----
.../testing/selftests/kvm/include/perf_test_util.h | 7 +-
.../selftests/kvm/include/riscv/processor.h | 20 -
tools/testing/selftests/kvm/include/test_util.h | 7 +
tools/testing/selftests/kvm/include/ucall_common.h | 65 +-
tools/testing/selftests/kvm/include/x86_64/apic.h | 1 +
tools/testing/selftests/kvm/include/x86_64/evmcs.h | 2 +-
tools/testing/selftests/kvm/include/x86_64/mce.h | 25 +
.../selftests/kvm/include/x86_64/processor.h | 474 +++++++-
tools/testing/selftests/kvm/include/x86_64/svm.h | 2 -
.../selftests/kvm/include/x86_64/svm_util.h | 27 +-
tools/testing/selftests/kvm/include/x86_64/vmx.h | 2 -
.../testing/selftests/kvm/kvm_binary_stats_test.c | 183 +--
tools/testing/selftests/kvm/kvm_create_max_vcpus.c | 10 +-
tools/testing/selftests/kvm/kvm_page_table_test.c | 66 +-
.../testing/selftests/kvm/lib/aarch64/processor.c | 81 +-
tools/testing/selftests/kvm/lib/aarch64/ucall.c | 13 +-
tools/testing/selftests/kvm/lib/aarch64/vgic.c | 54 +-
tools/testing/selftests/kvm/lib/elf.c | 1 -
tools/testing/selftests/kvm/lib/guest_modes.c | 6 +-
tools/testing/selftests/kvm/lib/kvm_util.c | 1207 +++++---------------
.../testing/selftests/kvm/lib/kvm_util_internal.h | 128 ---
tools/testing/selftests/kvm/lib/perf_test_util.c | 92 +-
tools/testing/selftests/kvm/lib/riscv/processor.c | 111 +-
tools/testing/selftests/kvm/lib/riscv/ucall.c | 16 +-
.../selftests/kvm/lib/s390x/diag318_test_handler.c | 11 +-
tools/testing/selftests/kvm/lib/s390x/processor.c | 44 +-
tools/testing/selftests/kvm/lib/s390x/ucall.c | 10 +-
.../selftests/kvm/lib/x86_64/perf_test_util.c | 11 +-
tools/testing/selftests/kvm/lib/x86_64/processor.c | 811 +++++--------
tools/testing/selftests/kvm/lib/x86_64/svm.c | 17 -
tools/testing/selftests/kvm/lib/x86_64/ucall.c | 12 +-
tools/testing/selftests/kvm/lib/x86_64/vmx.c | 26 +-
.../testing/selftests/kvm/max_guest_memory_test.c | 53 +-
.../kvm/memslot_modification_stress_test.c | 13 +-
tools/testing/selftests/kvm/memslot_perf_test.c | 32 +-
tools/testing/selftests/kvm/rseq_test.c | 22 +-
tools/testing/selftests/kvm/s390x/memop.c | 182 ++-
tools/testing/selftests/kvm/s390x/resets.c | 178 +--
tools/testing/selftests/kvm/s390x/sync_regs_test.c | 121 +-
tools/testing/selftests/kvm/s390x/tprot.c | 68 +-
.../testing/selftests/kvm/set_memory_region_test.c | 46 +-
tools/testing/selftests/kvm/steal_time.c | 123 +-
.../selftests/kvm/system_counter_offset_test.c | 38 +-
tools/testing/selftests/kvm/x86_64/amx_test.c | 91 +-
tools/testing/selftests/kvm/x86_64/cpuid_test.c | 105 +-
.../selftests/kvm/x86_64/cr4_cpuid_sync_test.c | 43 +-
tools/testing/selftests/kvm/x86_64/debug_regs.c | 77 +-
.../selftests/kvm/x86_64/emulator_error_test.c | 85 +-
tools/testing/selftests/kvm/x86_64/evmcs_test.c | 65 +-
.../selftests/kvm/x86_64/fix_hypercall_test.c | 47 +-
.../selftests/kvm/x86_64/get_msr_index_features.c | 117 +-
tools/testing/selftests/kvm/x86_64/hyperv_clock.c | 28 +-
tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c | 48 +-
.../testing/selftests/kvm/x86_64/hyperv_features.c | 406 +++----
.../testing/selftests/kvm/x86_64/hyperv_svm_test.c | 28 +-
.../testing/selftests/kvm/x86_64/kvm_clock_test.c | 32 +-
tools/testing/selftests/kvm/x86_64/kvm_pv_test.c | 117 +-
.../selftests/kvm/x86_64/max_vcpuid_cap_test.c | 44 +
.../selftests/kvm/x86_64/mmio_warning_test.c | 16 +-
tools/testing/selftests/kvm/x86_64/mmu_role_test.c | 147 ---
.../selftests/kvm/x86_64/monitor_mwait_test.c | 131 +++
.../selftests/kvm/x86_64/nx_huge_pages_test.c | 269 +++++
.../selftests/kvm/x86_64/nx_huge_pages_test.sh | 59 +
.../selftests/kvm/x86_64/platform_info_test.c | 51 +-
.../selftests/kvm/x86_64/pmu_event_filter_test.c | 117 +-
.../testing/selftests/kvm/x86_64/set_boot_cpu_id.c | 95 +-
.../testing/selftests/kvm/x86_64/set_sregs_test.c | 75 +-
.../selftests/kvm/x86_64/sev_migrate_tests.c | 131 +--
tools/testing/selftests/kvm/x86_64/smm_test.c | 46 +-
tools/testing/selftests/kvm/x86_64/state_test.c | 39 +-
.../selftests/kvm/x86_64/svm_int_ctl_test.c | 25 +-
.../kvm/x86_64/svm_nested_soft_inject_test.c | 211 ++++
.../testing/selftests/kvm/x86_64/svm_vmcall_test.c | 20 +-
.../testing/selftests/kvm/x86_64/sync_regs_test.c | 62 +-
.../selftests/kvm/x86_64/triple_fault_event_test.c | 90 ++
tools/testing/selftests/kvm/x86_64/tsc_msrs_test.c | 39 +-
.../selftests/kvm/x86_64/tsc_scaling_sync.c | 25 +-
.../selftests/kvm/x86_64/ucna_injection_test.c | 316 +++++
.../selftests/kvm/x86_64/userspace_io_test.c | 22 +-
.../selftests/kvm/x86_64/userspace_msr_exit_test.c | 188 ++-
.../selftests/kvm/x86_64/vmx_apic_access_test.c | 32 +-
.../kvm/x86_64/vmx_close_while_nested_test.c | 21 +-
.../selftests/kvm/x86_64/vmx_dirty_log_test.c | 18 +-
.../vmx_exception_with_invalid_guest_state.c | 68 +-
.../kvm/x86_64/vmx_invalid_nested_guest_state.c | 22 +-
tools/testing/selftests/kvm/x86_64/vmx_msrs_test.c | 84 ++
.../kvm/x86_64/vmx_nested_tsc_scaling_test.c | 33 +-
.../selftests/kvm/x86_64/vmx_pmu_caps_test.c | 54 +-
.../kvm/x86_64/vmx_preemption_timer_test.c | 38 +-
.../kvm/x86_64/vmx_set_nested_state_test.c | 105 +-
.../selftests/kvm/x86_64/vmx_tsc_adjust_test.c | 17 +-
.../testing/selftests/kvm/x86_64/xapic_ipi_test.c | 48 +-
.../selftests/kvm/x86_64/xapic_state_test.c | 82 +-
.../testing/selftests/kvm/x86_64/xen_shinfo_test.c | 75 +-
.../testing/selftests/kvm/x86_64/xen_vmcall_test.c | 27 +-
tools/testing/selftests/kvm/x86_64/xss_msr_test.c | 56 +-
virt/kvm/kvm_main.c | 217 +++-
virt/kvm/pfncache.c | 231 ++--
346 files changed, 14753 insertions(+), 9184 deletions(-)
create mode 100644 Documentation/virt/kvm/s390/s390-pv-dump.rst
create mode 100644 arch/arm64/include/asm/stacktrace/common.h
create mode 100644 arch/arm64/include/asm/stacktrace/nvhe.h
create mode 100644 arch/arm64/kvm/hyp/nvhe/stacktrace.c
create mode 100644 arch/arm64/kvm/stacktrace.c
create mode 100644 arch/csky/include/asm/jump_label.h
create mode 100644 arch/csky/include/asm/sections.h
create mode 100644 arch/csky/include/asm/spinlock.h
create mode 100644 arch/csky/include/asm/spinlock_types.h
create mode 100644 arch/csky/kernel/jump_label.c
create mode 100644 arch/riscv/include/asm/kvm_vcpu_insn.h
copy arch/riscv/kvm/{vcpu_exit.c => vcpu_insn.c} (63%)
create mode 100644 arch/s390/kvm/pci.c
create mode 100644 arch/s390/kvm/pci.h
delete mode 100644 arch/x86/kvm/mmu/paging.h
create mode 100644 drivers/virtio/virtio_anchor.c
delete mode 100644 include/asm-generic/platform-feature.h
delete mode 100644 include/linux/platform-feature.h
create mode 100644 include/linux/virtio_anchor.h
delete mode 100644 kernel/platform-feature.c
create mode 100644 tools/testing/selftests/kvm/include/x86_64/mce.h
delete mode 100644 tools/testing/selftests/kvm/lib/kvm_util_internal.h
create mode 100644 tools/testing/selftests/kvm/x86_64/max_vcpuid_cap_test.c
delete mode 100644 tools/testing/selftests/kvm/x86_64/mmu_role_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/monitor_mwait_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.c
create mode 100755 tools/testing/selftests/kvm/x86_64/nx_huge_pages_test.sh
create mode 100644 tools/testing/selftests/kvm/x86_64/svm_nested_soft_inject_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/triple_fault_event_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/ucna_injection_test.c
create mode 100644 tools/testing/selftests/kvm/x86_64/vmx_msrs_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.