This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master
in repository linux.
from 4a0fc73da97e Merge tag 's390-6.6-2' of git://git.kernel.org/pub/scm/lin [...]
new ea55d5a2cf7c KVM: arm64: Delete pointless switch statement in kvm_reset_vcpu()
new c8a67729b8a3 KVM: arm64: Remove pointless check for changed init target
new ef9840603676 KVM: arm64: Replace vCPU target with a configuration flag
new 5346f7e13e5e KVM: arm64: Always return generic v8 as the preferred target
new 319d1a957cbe Merge branch kvm-arm64/6.6/generic-vcpu into kvmarm-master/next
new 21f74a513737 arm64: Add missing VA CMO encodings
new 464f2164da7e arm64: Add missing ERX*_EL1 encodings
new 6ddea24dfd59 arm64: Add missing DC ZVA/GVA/GZVA encodings
new fb1926cccd70 arm64: Add TLBI operation encodings
new 2b97411fef8f arm64: Add AT operation encodings
new 57596c8f991c arm64: Add debug registers affected by HDFGxTR_EL2
new 2b062ed483eb arm64: Add missing BRB/CFP/DVP/CPP instructions
new cc24f656f7cf arm64: Add HDFGRTR_EL2 and HDFGWTR_EL2 layouts
new b206a708cbfb arm64: Add feature detection for fine grained traps
new 484f86824a3d KVM: arm64: Correctly handle ACCDATA_EL1 traps
new 3ea84b4fe446 KVM: arm64: Add missing HCR_EL2 trap bits
new 50d2fe4648c5 KVM: arm64: nv: Add FGT registers
new e930694e6145 KVM: arm64: Restructure FGT register switching
new e58ec47bf68d KVM: arm64: nv: Add trap forwarding infrastructure
new d0fc0a2519a6 KVM: arm64: nv: Add trap forwarding for HCR_EL2
new a0b70fb00db8 KVM: arm64: nv: Expose FEAT_EVT to nested guests
new cb31632c4452 KVM: arm64: nv: Add trap forwarding for MDCR_EL2
new e880bd336323 KVM: arm64: nv: Add trap forwarding for CNTHCTL_EL2
new 15b4d82d69d7 KVM: arm64: nv: Add fine grained trap forwarding infrastructure
new 5a24ea786985 KVM: arm64: nv: Add trap forwarding for HFGxTR_EL2
new 039f9f12de5f KVM: arm64: nv: Add trap forwarding for HFGITR_EL2
new d0be0b2ede13 KVM: arm64: nv: Add trap forwarding for HDFGxTR_EL2
new a77b31dce437 KVM: arm64: nv: Add SVC trap forwarding
new ea3b27d8dea0 KVM: arm64: nv: Expand ERET trap forwarding to handle FGT
new d4d2dacc7cdd KVM: arm64: nv: Add switching support for HFGxTR/HDFGxTR
new 0a5d28433ad9 KVM: arm64: nv: Expose FGT to nested guests
new a63cf31139b7 KVM: arm64: Move HCRX_EL2 switch to load/put on VHE systems
new 03fb54d0aa73 KVM: arm64: nv: Add support for HCRX_EL2
new 60046980bf60 KVM: arm64: nv: Select XARRAY_MULTI to fix build error
new c948a0a2f5dc KVM: arm64: nv: Add trap description for SPSR_EL2 and ELR_EL2
new c1907626dddc Merge branch kvm-arm64/nv-trap-forwarding into kvmarm-master/next
new a1342c802728 KVM: Rename kvm_arch_flush_remote_tlb() to kvm_arch_flush_ [...]
new cfb0c08e8012 KVM: Declare kvm_arch_flush_remote_tlbs() globally
new 32121c813818 KVM: arm64: Use kvm_arch_flush_remote_tlbs()
new eddd21481011 KVM: Remove CONFIG_HAVE_KVM_ARCH_TLB_FLUSH_ALL
new d4788996051e KVM: Allow range-based TLB invalidation from common code
new 619b5072443c KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
new 360839027a6e arm64: tlb: Refactor the core flush algorithm of __flush_t [...]
new 4d73a9c13aaa arm64: tlb: Implement __flush_s2_tlb_range_op()
new 6354d15052ec KVM: arm64: Implement __kvm_tlb_flush_vmid_range()
new 117940aa6e5f KVM: arm64: Define kvm_tlb_flush_vmid_range()
new c42b6f0b1cde KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
new 3756b6f2bb3a KVM: arm64: Flush only the memslot after write-protect
new defc8cc7abf0 KVM: arm64: Invalidate the table entries upon a range
new 7657ea920c54 KVM: arm64: Use TLBI range-based instructions for unmap
new d58335d10fd7 Merge branch kvm-arm64/tlbi-range into kvmarm-master/next
new ec3eb9ed6081 KVM: arm64: PMU: Disallow vPMU on non-uniform PMUVer
new 335ca49ff31f KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
new 8c694f557fd8 KVM: arm64: PMU: Don't advertise the STALL_SLOT event
new 64b81000b60b KVM: arm64: PMU: Don't advertise STALL_SLOT_{FRONTEND,BACKEND}
new b1f778a223a2 KVM: arm64: pmu: Resync EL0 state on counter rotation
new 9b80b9676be9 KVM: arm64: pmu: Guard PMU emulation definitions with CONFIG_KVM
new 50a40ff7d311 Merge branch kvm-arm64/6.6/pmu-fixes into kvmarm-master/next
new 1ba11daef0a9 KVM: arm64: Use the known cpu id instead of smp_processor_id()
new e21f3905f98f KVM: arm64: Drop HCR_VIRT_EXCP_MASK
new 4460a7dc77d0 KVM: arm64: Remove redundant kvm_set_pfn_accessed() from u [...]
new a6b33d009fc1 KVM: arm64: Remove unused declarations
new f156a7d13fc3 KVM: arm64: Remove size-order align in the nVHE hyp privat [...]
new 1f66f1246bfa Merge branch kvm-arm64/6.6/misc into kvmarm-master/next
new e0fb12c673e5 Merge tag 'kvmarm-6.6' of git://git.kernel.org/pub/scm/lin [...]
new 3e1efe2b67d3 KVM: Wrap kvm_{gfn,hva}_range.pte in a per-action union
new 1f8403953f05 KVM: Remove unused kvm_device_{get,put}() declarations
new 458933d33af2 KVM: Remove unused kvm_make_cpus_request_mask() declaration
new 0d15bf966d7d Merge tag 'kvm-x86-generic-6.6' of https://github.com/kvm- [...]
new 0d033770d43a KVM: x86: Fix KVM_CAP_SYNC_REGS's sync_regs() TOCTOU issues
new ae895cbe613a KVM: selftests: Extend x86's sync_regs_test to check for C [...]
new 60c4063b4752 KVM: selftests: Extend x86's sync_regs_test to check for e [...]
new 0de704d2d6c8 KVM: selftests: Extend x86's sync_regs_test to check for e [...]
new b859b018aadf KVM: selftests: use unified time type for comparison
new 7e4966e6e13d KVM: selftests: Remove superfluous variable assignment
new 6d85f51a1f08 KVM: selftests: Rename the ASSERT_EQ macro
new b145c58d95ff KVM: selftests: Make TEST_ASSERT_EQ() output look like nor [...]
new 6783ca4105a7 KVM: selftests: Add a shameful hack to preserve/clobber GP [...]
new a1c1b55e116c KVM: selftests: Add strnlen() to the string overrides
new e5119382499c KVM: selftests: Add guest_snprintf() to KVM selftests
new 215a681710a5 KVM: selftests: Add additional pages to the guest to accom [...]
new 57e5c1fef5ec KVM: selftests: Add string formatting options to ucall
new 289c2b4db8f3 KVM: selftests: Add formatted guest assert support in ucal [...]
new b35f4c73d389 KVM: selftests: Add arch ucall.h and inline simple arch hooks
new edb5b700f9f8 KVM: selftests: Add #define of expected KVM exit reason for ucall
new 5d1d46f9d56f KVM: selftests: Add a selftest for guest prints and format [...]
new db44e1c871bc KVM: selftests: Convert aarch_timer to printf style GUEST_ASSERT
new bac9aeecc387 KVM: selftests: Convert debug-exceptions to printf style G [...]
new af5b41b97f1c KVM: selftests: Convert ARM's hypercalls test to printf st [...]
new df27f6b45454 KVM: selftests: Convert ARM's page fault test to printf st [...]
new d0ad3bacc523 KVM: selftests: Convert ARM's vGIC IRQ test to printf styl [...]
new c55a475d5fc4 KVM: selftests: Convert the memslot performance test to pr [...]
new 428c76c769fa KVM: selftests: Convert s390's memop test to printf style [...]
new 5f82bbab84ad KVM: selftests: Convert s390's tprot test to printf style [...]
new 9291c9cef5b5 KVM: selftests: Convert set_memory_region_test to printf-b [...]
new 3d9bd831175e KVM: selftests: Convert steal_time test to printf style GU [...]
new 06b651d250e5 KVM: selftests: Convert x86's CPUID test to printf style G [...]
new 82cb0ed66d4e KVM: selftests: Convert the Hyper-V extended hypercalls te [...]
new 8d1d3ce604e5 KVM: selftests: Convert the Hyper-V feature test to printf [...]
new bf6c760b9df3 KVM: selftests: Convert x86's KVM paravirt test to printf [...]
new 0f52e4aaa614 KVM: selftests: Convert the MONITOR/MWAIT test to use prin [...]
new b13a307ce3c6 KVM: selftests: Convert x86's nested exceptions test to pr [...]
new 40b319d6b4e1 KVM: selftests: Convert x86's set BSP ID test to printf st [...]
new a925f7994281 KVM: selftests: Convert the nSVM software interrupt test t [...]
new 847ae0795514 KVM: selftests: Convert x86's TSC MSRs test to use printf [...]
new 417bfd0c820f KVM: selftests: Convert the x86 userspace I/O test to prin [...]
new 30a6e0b4553d KVM: selftests: Convert VMX's PMU capabilities test to pri [...]
new 4e15c38a1aca KVM: selftests: Convert x86's XCR0 test to use printf-base [...]
new 7ce7f8e75418 KVM: selftests: Rip out old, param-based guest assert macros
new 6f321017c84b KVM: selftests: Print out guest RIP on unhandled exception
new a05c4c2bd8b5 KVM: selftests: Use GUEST_FAIL() in ARM's arch timer helpers
new cf6d80c0eb95 KVM: selftests: Add x86 properties for Intel PMU in processor.h
new c853be2265cc KVM: selftests: Drop the return of remove_event()
new de527b1daf69 KVM: selftests: Introduce "struct __kvm_pmu_event_filter" [...]
new 86ab6af8b96a KVM: selftests: Add test cases for unsupported PMU event f [...]
new d4e36166820a KVM: selftests: Test if event filter meets expectations on [...]
new 740d087e7fff KVM: selftests: Test gp event filters don't affect fixed e [...]
new 5002b112a5ad KVM: selftests: Reload "good" vCPU state if vCPU hits shutdown
new 02dc2543e379 KVM: selftests: Explicit set #UD when *potentially* inject [...]
new c92b922a8c52 KVM: x86: Update MAINTAINTERS to include selftests
new 1814db83c049 Merge tag 'kvm-x86-selftests-6.6' of https://github.com/kv [...]
new ede6d0b2031e Merge tag 'kvm-x86-selftests-immutable-6.6' into next
new 16631c42e6ff KVM: s390: interrupt: Fix single-stepping into interrupt handlers
new 74a439ef7b67 KVM: s390: interrupt: Fix single-stepping into program int [...]
new ba853a4e1c7a KVM: s390: interrupt: Fix single-stepping kernel-emulated [...]
new 1ad1fa820e64 KVM: s390: interrupt: Fix single-stepping userspace-emulat [...]
new fdbeb55ebdf1 KVM: s390: interrupt: Fix single-stepping keyless mode exits
new 642dbc0312d6 KVM: s390: selftests: Add selftest for single-stepping
new 5d0545abee3a Merge remote-tracking branch 'vfio-ap' into next
new b1e428615f15 KVM: s390: pv: relax WARN_ONCE condition for destroy fast
new 59a881402cc8 s390/uv: UV feature check utility
new 19c654bf05ae KVM: s390: Add UV feature negotiation
new 899e2206f46a KVM: s390: pv: Allow AP-instructions for pv-guests
new 69fd3876a464 Merge tag 'kvm-s390-next-6.6-1' of https://git.kernel.org/ [...]
new e98b1085be79 RISC-V: KVM: Factor-out ONE_REG related code to its own so [...]
new 613029442a4b RISC-V: KVM: Extend ONE_REG to enable/disable multiple ISA [...]
new 41716861e425 RISC-V: KVM: Allow Zba and Zbs extensions for Guest/VM
new 043cba064ecd RISC-V: KVM: Allow Zicntr, Zicsr, Zifencei, and Zihpm for [...]
new d2064d4a6e3a RISC-V: KVM: Sort ISA extensions alphabetically in ONE_REG [...]
new 2776421e6839 RISC-V: KVM: provide UAPI for host SATP mode
new 2a88f38cd58d RISC-V: KVM: return ENOENT in *_one_reg() when reg is unknown
new a044ef71043e RISC-V: KVM: use ENOENT in *_one_reg() when extension is u [...]
new e29f57911d61 RISC-V: KVM: do not EOPNOTSUPP in set_one_reg() zicbo(m|z)
new 432a8b35cc23 RISC-V: KVM: do not EOPNOTSUPP in set KVM_REG_RISCV_TIMER_REG
new d57304bbfb74 RISC-V: KVM: use EBUSY when !vcpu->arch.ran_atleast_once
new bea8d23713a2 RISC-V: KVM: avoid EBUSY when writing same ISA val
new 63bd660657ef RISC-V: KVM: avoid EBUSY when writing the same machine ID val
new 1099c80906d3 RISC-V: KVM: avoid EBUSY when writing the same isa_ext val
new 1deaf754f531 RISC-V: KVM: Improve vector save/restore errors
new e47f3c2843c2 docs: kvm: riscv: document EBUSY in KVM_SET_ONE_REG
new 630b4cee9c37 RISC-V: KVM: Improve vector save/restore functions
new dfaf20af7649 KVM: arm64: selftests: Replace str_with_index with strdup_printf
new 265386081294 KVM: arm64: selftests: Drop SVE cap check in print_reg
new c2b5aa7aebba KVM: arm64: selftests: Remove print_reg's dependency on vc [...]
new 9177b715cdcc KVM: arm64: selftests: Rename vcpu_config and add to kvm_util.h
new 0ace6bda5701 KVM: arm64: selftests: Delete core_reg_fixup
new 17da79e009c3 KVM: arm64: selftests: Split get-reg-list test code
new be4c58060c3e KVM: arm64: selftests: Finish generalizing get-reg-list
new 90a6bcbc542d KVM: arm64: selftests: Move reject_set check logic to a function
new e85660338f2b KVM: arm64: selftests: Move finalize_vcpu back to run_test
new c47467712e8b KVM: selftests: Only do get/set tests on present blessed list
new cbc0daa67c62 KVM: selftests: Add skip_set facility to get_reg_list test
new 031f9efafc08 KVM: riscv: Add KVM_GET_REG_LIST API support
new 477069398ed6 KVM: riscv: selftests: Add get-reg-list test
new e43ae8b689f0 Merge tag 'kvm-riscv-6.6-1' of https://github.com/kvm-risc [...]
new 0033fa354916 KVM: x86/pmu: Use enums instead of hardcoded magic for arc [...]
new bc9658999b3e KVM: x86/pmu: Simplify intel_hw_event_available()
new 6d88d0ee5de1 KVM: x86/pmu: Require nr fixed_pmc_events to match nr max [...]
new 6de2ccc16968 KVM: x86/pmu: Move .hw_event_available() check out of PMC [...]
new 8783790a5e77 Merge tag 'kvm-x86-pmu-6.6' of https://github.com/kvm-x86/ [...]
new 775bc098657b KVM: VMX: Drop manual TLB flush when migrating vmcs.APIC_A [...]
new 7d18eef13622 KVM: VMX: Rename vmx_get_max_tdp_level() to vmx_get_max_ep [...]
new 9ca0c1a1265c KVM: VMX: Delete ancient pr_warn() about KVM_SET_TSS_ADDR [...]
new 50011c2a2457 KVM: VMX: Refresh available regs and IDT vectoring info be [...]
new 755e732dde23 Merge tag 'kvm-x86-vmx-6.6' of https://github.com/kvm-x86/ [...]
new b265ee7bae11 KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from th [...]
new 29de732cc95c KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV
new f8d808ed1ba0 KVM: SVM: Rewrite sev_es_prepare_switch_to_guest()'s comme [...]
new 2837dd00f8fc KVM: SEV-ES: explicitly disable debug
new c2690b5f0194 KVM: SVM/SEV/SEV-ES: Rework intercepts
new d1f85fbe836e KVM: SEV: Enable data breakpoints in SEV-ES
new 90cbf6d914ad KVM: SEV-ES: Eliminate #DB intercept when DebugSwap enabled
new 389fbbec261b KVM: SVM: Don't defer NMI unblocking until next exit for S [...]
new a6bb57090297 KVM: SVM: Don't try to pointlessly single-step SEV-ES gues [...]
new d518f8cc10af KVM: SVM: Fix dead KVM_BUG() code in LBR MSR virtualization
new 41dfb5f13ed9 KVM: SVM: Clean up handling of LBR virtualization enabled
new a85cd52d7205 KVM: SVM: Use svm_get_lbr_vmcb() helper to handle writes t [...]
new 4c08e737f056 KVM: SVM: Take and hold ir_list_lock when updating vCPU's [...]
new f3cebc75e742 KVM: SVM: Set target pCPU during IRTE update if target vCP [...]
new f67063414c0e KVM: SVM: correct the size of spec_ctrl field in VMCB save area
new f1187ef24eb8 KVM: SVM: Get source vCPUs from source VM for SEV-ES intra [...]
new 1952e74da96f KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL
new cb49631ad111 KVM: SVM: Don't inject #UD if KVM attempts to skip SEV guest insn
new 80d0f521d59e KVM: SVM: Require nrips support for SEV guests (and beyond)
new bd7fe98b353b Merge tag 'kvm-x86-svm-6.6' of https://github.com/kvm-x86/ [...]
new 1d6664fadda3 KVM: x86: Use sysfs_emit() instead of sprintf()
new 7f717f54845c KVM: x86: Remove x86_emulate_ops::guest_has_long_mode
new af8e2ccfa6f1 KVM: x86: Advertise host CPUID 0x80000005 in KVM_GET_SUPPO [...]
new a2fd5d02bad6 KVM: x86: Snapshot host's MSR_IA32_ARCH_CAPABILITIES
new 550ba57faa04 KVM: VMX: Drop unnecessary vmx_fb_clear_ctrl_available "cache"
new 41e90a69a49b KVM: x86: Retry APIC optimized map recalc if vCPU is added [...]
new b23c83ad2c63 x86/reboot: VMCLEAR active VMCSes before emergency reboot
new 5e408396c60c x86/reboot: Harden virtualization hooks for emergency reboot
new 119b5cb4ffd0 x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
new baeb4de7ad12 x86/reboot: KVM: Disable SVM during reboot via virt/KVM re [...]
new ad93c1a7c010 x86/reboot: Assert that IRQs are disabled when turning off [...]
new edc8deb087d8 x86/reboot: Hoist "disable virt" helpers above "emergency [...]
new 59765db5fc82 x86/reboot: Disable virtualization during reboot iff callb [...]
new 261cd5ed934e x86/reboot: Expose VMCS crash hooks if and only if KVM_{IN [...]
new b6a6af0d19ce x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
new 22e420e12739 x86/virt: KVM: Move VMXOFF helpers into KVM VMX
new 554856b69e3d KVM: SVM: Make KVM_AMD depend on CPU_SUP_AMD or CPU_SUP_HYGON
new 5df8ecfe3632 x86/virt: Drop unnecessary check on extended CPUID level i [...]
new 85fd29dd5fe4 x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_sup [...]
new c4db4f20f3bf KVM: SVM: Check that the current CPU supports SVM in kvm_i [...]
new f9a8866040fc KVM: VMX: Ensure CPU is stable when probing basic VMX support
new 76ab8161083b x86/virt: KVM: Move "disable SVM" helper into KVM SVM
new 6ae44e012f4c KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
new 2e6b9bd49b70 KVM: SVM: Use "standard" stgi() helper when disabling SVM
new a788fbb763b5 KVM: VMX: Skip VMCLEAR logic during emergency reboots if C [...]
new 99b668545356 KVM: x86: Advertise AMX-COMPLEX CPUID to userspace
new 7cafe9b8e22b KVM: nSVM: Check instead of asserting on nested TSC scalin [...]
new 0c94e2468491 KVM: nSVM: Load L1's TSC multiplier based on L1 state, not [...]
new c0dc39bd2c58 KVM: nSVM: Use the "outer" helper for writing multiplier t [...]
new 229725acfaea KVM: SVM: Clean up preemption toggling related to MSR_AMD6 [...]
new 2d63699099ac KVM: x86: Always write vCPU's current TSC offset/ratio in [...]
new 223f93d4d88a KVM: nSVM: Skip writes to MSR_AMD64_TSC_RATIO if guest sta [...]
new 765da7fe0e76 KVM: x86: Remove break statements that will never be executed
new 7b0151caf73a KVM: x86: Remove WARN sanity check on hypervisor timer vs. [...]
new 392a53246257 x86: kvm: x86: Remove unnecessary initial values of variables
new 42764413d195 KVM: x86: Add a framework for enabling KVM-governed x86 features
new ccf31d6e6cc5 KVM: x86/mmu: Use KVM-governed feature framework to track [...]
new 1143c0b85c07 KVM: VMX: Recompute "XSAVES enabled" only after CPUID update
new 0497d2ac9b26 KVM: VMX: Check KVM CPU caps, not just VMX MSR support, fo [...]
new 662f6815786e KVM: VMX: Rename XSAVES control to follow KVM's preferred [...]
new fe60e8f65f79 KVM: x86: Use KVM-governed feature framework to track "XSA [...]
new 1c18efdaa314 KVM: nVMX: Use KVM-governed feature framework to track "ne [...]
new 7a6a6a3bf5d8 KVM: nSVM: Use KVM-governed feature framework to track "NR [...]
new 4365a45571c7 KVM: nSVM: Use KVM-governed feature framework to track "TS [...]
new 4d2a1560ffc2 KVM: nSVM: Use KVM-governed feature framework to track "vV [...]
new e183d17ac362 KVM: nSVM: Use KVM-governed feature framework to track "LB [...]
new 59d67fc1f0db KVM: nSVM: Use KVM-governed feature framework to track "Pa [...]
new b89456aee78d KVM: nSVM: Use KVM-governed feature framework to track "vG [...]
new ee785c870d6f KVM: nSVM: Use KVM-governed feature framework to track "vN [...]
new 9717efbe5ba3 KVM: x86: Disallow guest CPUID lookups when IRQs are disabled
new 6d5e3c318a33 Merge tag 'kvm-x86-misc-6.6' of https://github.com/kvm-x86 [...]
new 91303f800e76 KVM: x86/mmu: Move the lockdep_assert of mmu_lock to insid [...]
new d09f711233a4 KVM: x86/mmu: Guard against collision with KVM-defined PFE [...]
new a98b889492a6 KVM: x86/mmu: Delete pgprintk() and all its usage
new 350c49fdea22 KVM: x86/mmu: Delete rmap_printk() and all its usage
new c4f92cfe021d KVM: x86/mmu: Delete the "dbg" module param
new 242a6dd8dadd KVM: x86/mmu: Avoid pointer arithmetic when iterating over SPTEs
new 58da926caad9 KVM: x86/mmu: Cleanup sanity check of SPTEs at SP free
new 0fe6370eb3d5 KVM: x86/mmu: Rename MMU_WARN_ON() to KVM_MMU_WARN_ON()
new 20ba462dfda6 KVM: x86/mmu: Convert "runtime" WARN_ON() assertions to WA [...]
new 72e2fb24a0b0 KVM: x86/mmu: Bug the VM if a vCPU ends up in long mode wi [...]
new 870d4d4ed827 KVM: x86/mmu: Replace MMU_DEBUG with proper KVM_PROVE_MMU Kconfig
new 3328dfe0eac3 KVM: x86/mmu: Use BUILD_BUG_ON_INVALID() for KVM_MMU_WARN_ [...]
new 069f30c61979 KVM: x86/mmu: Plumb "struct kvm" all the way to pte_list_remove()
new 52e322eda3d4 KVM: x86/mmu: BUG() in rmap helpers iff CONFIG_BUG_ON_DATA [...]
new f046923af791 drm/i915/gvt: Verify pfn is "valid" before dereferencing " [...]
new 1e557c1cd054 drm/i915/gvt: remove interface intel_gvt_is_valid_gfn
new adc7b226b7d6 drm/i915/gvt: Verify hugepages are contiguous in physical [...]
new a15e61f3371b drm/i915/gvt: Don't try to unpin an empty page range
new 708e49583d7d drm/i915/gvt: Put the page reference obtained by KVM's gfn [...]
new 96b138cd23e9 drm/i915/gvt: Explicitly check that vGPU is attached befor [...]
new 241f0aadb857 drm/i915/gvt: Error out on an attempt to shadowing an unkn [...]
new ba193f62c075 drm/i915/gvt: Don't rely on KVM's gfn_to_pfn() to query po [...]
new 16735297fdce drm/i915/gvt: Use an "unsigned long" to iterate over memslot gfns
new a90c367e5af6 drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt()
new 3cca6b262876 drm/i915/gvt: Protect gfn hash table with vgpu_lock
new db0d70e61082 KVM: x86/mmu: Move kvm_arch_flush_shadow_{all,memslot}() to mmu.c
new eeb87272a364 KVM: x86/mmu: Don't rely on page-track mechanism to flush [...]
new 932844462ae3 KVM: x86/mmu: Don't bounce through page-track mechanism fo [...]
new b271e17defb0 KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hook
new c70934e0ab2d KVM: x86: Reject memslot MOVE operations if KVMGT is attached
new 2ee05a4c275a drm/i915/gvt: Don't bother removing write-protection on to [...]
new b83ab124ded3 KVM: x86: Add a new page-track hook to handle memslot deletion
new c15fcf12ffb3 drm/i915/gvt: switch from ->track_flush_slot() to ->track_ [...]
new d104d5bbbc2d KVM: x86: Remove the unused page-track hook track_flush_slot()
new 58ea7cf700ca KVM: x86/mmu: Move KVM-only page-track declarations to int [...]
new e998fb1a3013 KVM: x86/mmu: Use page-track notifiers iff there are exter [...]
new 338068b5bec4 KVM: x86/mmu: Drop infrastructure for multiple page-track modes
new 7b574863e718 KVM: x86/mmu: Rename page-track APIs to reflect the new reality
new e18c5429e0c4 KVM: x86/mmu: Assert that correct locks are held for page [...]
new 427c76aed29e KVM: x86/mmu: Bug the VM if write-tracking is used but not [...]
new 96316a06700f KVM: x86/mmu: Drop @slot param from exported/external page [...]
new f22b1e8500b4 KVM: x86/mmu: Handle KVM bookkeeping in page-track APIs, n [...]
new 09c8726ffa4a drm/i915/gvt: Drop final dependencies on KVM internal details
new c5f2d5645f9b KVM: x86/mmu: Add helper to convert root hpa to shadow page
new c30e000e690a KVM: x86/mmu: Harden new PGD against roots without shadow pages
new 2c6d4c27b92d KVM: x86/mmu: Harden TDP MMU iteration against root w/o sh [...]
new b5b359ac30d4 KVM: x86/mmu: Disallow guest from using !visible slots for [...]
new 0e3223d8d00a KVM: x86/mmu: Use dummy root, backed by zero page, for !vi [...]
new d10f3780bc2f KVM: x86/mmu: Include mmu.h in spte.h
new d011151616e7 Merge branch 'kvm-x86-mmu-6.6' into HEAD
new 0c02183427b4 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
new 171f8a49f212 spi: sun6i: reduce DMA RX transfer width to single byte
new 1f11f4202caf spi: sun6i: fix race between DMA RX transfer completion an [...]
new 32904dec06ad Merge tag 'spi-fix-v6.6-merge-window' of git://git.kernel. [...]
new c69290557c75 regulator: tps6287x: Fix n_voltages
new ca0e36e3e39a regulator: tps6594-regulator: Fix random kernel crash
new d9b9ea589b47 Merge tag 'regulator-fix-v6.6-merge-window' of git://git.k [...]
The 303 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
Documentation/virt/kvm/api.rst | 4 +-
MAINTAINERS | 2 +
arch/arm/include/asm/arm_pmuv3.h | 2 +
arch/arm64/include/asm/kvm_arm.h | 51 +-
arch/arm64/include/asm/kvm_asm.h | 3 +
arch/arm64/include/asm/kvm_host.h | 24 +-
arch/arm64/include/asm/kvm_mmu.h | 1 +
arch/arm64/include/asm/kvm_nested.h | 2 +
arch/arm64/include/asm/kvm_pgtable.h | 10 +
arch/arm64/include/asm/sysreg.h | 268 ++-
arch/arm64/include/asm/tlbflush.h | 124 +-
arch/arm64/kernel/cpufeature.c | 7 +
arch/arm64/kvm/Kconfig | 2 +-
arch/arm64/kvm/arm.c | 65 +-
arch/arm64/kvm/emulate-nested.c | 1852 ++++++++++++++++++++
arch/arm64/kvm/guest.c | 15 -
arch/arm64/kvm/handle_exit.c | 29 +-
arch/arm64/kvm/hyp/include/hyp/switch.h | 127 +-
arch/arm64/kvm/hyp/include/nvhe/mm.h | 1 +
arch/arm64/kvm/hyp/nvhe/hyp-main.c | 11 +
arch/arm64/kvm/hyp/nvhe/mm.c | 83 +-
arch/arm64/kvm/hyp/nvhe/setup.c | 27 +-
arch/arm64/kvm/hyp/nvhe/switch.c | 2 +-
arch/arm64/kvm/hyp/nvhe/tlb.c | 30 +
arch/arm64/kvm/hyp/pgtable.c | 63 +-
arch/arm64/kvm/hyp/vhe/tlb.c | 28 +
arch/arm64/kvm/mmu.c | 104 +-
arch/arm64/kvm/nested.c | 11 +-
arch/arm64/kvm/pmu-emul.c | 37 +-
arch/arm64/kvm/pmu.c | 18 +
arch/arm64/kvm/reset.c | 25 +-
arch/arm64/kvm/sys_regs.c | 15 +
arch/arm64/kvm/trace_arm.h | 26 +
arch/arm64/kvm/vgic/vgic.h | 2 -
arch/arm64/tools/cpucaps | 1 +
arch/arm64/tools/sysreg | 129 ++
arch/mips/include/asm/kvm_host.h | 3 +-
arch/mips/kvm/mips.c | 12 +-
arch/mips/kvm/mmu.c | 2 +-
arch/riscv/include/asm/csr.h | 2 +
arch/riscv/include/asm/kvm_host.h | 9 +
arch/riscv/include/asm/kvm_vcpu_vector.h | 6 +-
arch/riscv/include/uapi/asm/kvm.h | 16 +
arch/riscv/kvm/Makefile | 1 +
arch/riscv/kvm/aia.c | 4 +-
arch/riscv/kvm/mmu.c | 8 +-
arch/riscv/kvm/vcpu.c | 547 +-----
arch/riscv/kvm/vcpu_fp.c | 12 +-
arch/riscv/kvm/vcpu_onereg.c | 1051 +++++++++++
arch/riscv/kvm/vcpu_sbi.c | 16 +-
arch/riscv/kvm/vcpu_timer.c | 11 +-
arch/riscv/kvm/vcpu_vector.c | 72 +-
arch/s390/include/asm/kvm_host.h | 2 +
arch/s390/include/asm/uv.h | 19 +-
arch/s390/include/uapi/asm/kvm.h | 16 +
arch/s390/kernel/uv.c | 2 +-
arch/s390/kvm/intercept.c | 38 +-
arch/s390/kvm/interrupt.c | 14 +
arch/s390/kvm/kvm-s390.c | 102 +-
arch/s390/kvm/pv.c | 9 +-
arch/s390/mm/fault.c | 2 +-
arch/x86/include/asm/cpufeatures.h | 1 +
arch/x86/include/asm/kexec.h | 2 -
arch/x86/include/asm/kvm_host.h | 46 +-
arch/x86/include/asm/kvm_page_track.h | 67 +-
arch/x86/include/asm/reboot.h | 7 +
arch/x86/include/asm/svm.h | 5 +-
arch/x86/include/asm/virtext.h | 154 --
arch/x86/include/asm/vmx.h | 2 +-
arch/x86/kernel/crash.c | 31 -
arch/x86/kernel/reboot.c | 66 +-
arch/x86/kvm/Kconfig | 15 +-
arch/x86/kvm/cpuid.c | 40 +-
arch/x86/kvm/cpuid.h | 46 +
arch/x86/kvm/emulate.c | 2 -
arch/x86/kvm/governed_features.h | 21 +
arch/x86/kvm/hyperv.c | 1 -
arch/x86/kvm/kvm_emulate.h | 1 -
arch/x86/kvm/lapic.c | 29 +-
arch/x86/kvm/mmu.h | 2 +
arch/x86/kvm/mmu/mmu.c | 371 ++--
arch/x86/kvm/mmu/mmu_internal.h | 27 +-
arch/x86/kvm/mmu/page_track.c | 252 +--
arch/x86/kvm/mmu/page_track.h | 58 +
arch/x86/kvm/mmu/paging_tmpl.h | 41 +-
arch/x86/kvm/mmu/spte.c | 6 +-
arch/x86/kvm/mmu/spte.h | 21 +-
arch/x86/kvm/mmu/tdp_iter.c | 11 +-
arch/x86/kvm/mmu/tdp_mmu.c | 37 +-
arch/x86/kvm/pmu.c | 4 +-
arch/x86/kvm/reverse_cpuid.h | 1 +
arch/x86/kvm/svm/avic.c | 59 +-
arch/x86/kvm/svm/nested.c | 57 +-
arch/x86/kvm/svm/sev.c | 100 +-
arch/x86/kvm/svm/svm.c | 327 ++--
arch/x86/kvm/svm/svm.h | 61 +-
arch/x86/kvm/vmx/capabilities.h | 2 +-
arch/x86/kvm/vmx/hyperv.c | 2 +-
arch/x86/kvm/vmx/nested.c | 13 +-
arch/x86/kvm/vmx/nested.h | 2 +-
arch/x86/kvm/vmx/pmu_intel.c | 81 +-
arch/x86/kvm/vmx/vmx.c | 228 +--
arch/x86/kvm/vmx/vmx.h | 3 +-
arch/x86/kvm/x86.c | 83 +-
arch/x86/kvm/x86.h | 1 +
drivers/gpu/drm/i915/gvt/gtt.c | 102 +-
drivers/gpu/drm/i915/gvt/gtt.h | 1 -
drivers/gpu/drm/i915/gvt/gvt.h | 3 +-
drivers/gpu/drm/i915/gvt/kvmgt.c | 120 +-
drivers/gpu/drm/i915/gvt/page_track.c | 10 +-
drivers/perf/arm_pmuv3.c | 2 +
drivers/regulator/tps6287x-regulator.c | 2 +-
drivers/regulator/tps6594-regulator.c | 31 +-
drivers/spi/spi-sun6i.c | 31 +-
include/kvm/arm_pmu.h | 4 +-
include/linux/kvm_host.h | 53 +-
tools/arch/x86/include/asm/cpufeatures.h | 1 +
tools/testing/selftests/kvm/Makefile | 20 +-
.../selftests/kvm/aarch64/aarch32_id_regs.c | 8 +-
tools/testing/selftests/kvm/aarch64/arch_timer.c | 22 +-
.../selftests/kvm/aarch64/debug-exceptions.c | 8 +-
tools/testing/selftests/kvm/aarch64/get-reg-list.c | 554 +-----
tools/testing/selftests/kvm/aarch64/hypercalls.c | 20 +-
.../selftests/kvm/aarch64/page_fault_test.c | 17 +-
tools/testing/selftests/kvm/aarch64/vgic_irq.c | 3 +-
tools/testing/selftests/kvm/get-reg-list.c | 401 +++++
tools/testing/selftests/kvm/guest_print_test.c | 219 +++
.../selftests/kvm/include/aarch64/arch_timer.h | 12 +-
.../testing/selftests/kvm/include/aarch64/ucall.h | 20 +
.../testing/selftests/kvm/include/kvm_util_base.h | 21 +
.../selftests/kvm/include/riscv/processor.h | 3 +
tools/testing/selftests/kvm/include/riscv/ucall.h | 20 +
tools/testing/selftests/kvm/include/s390x/ucall.h | 19 +
tools/testing/selftests/kvm/include/test_util.h | 20 +-
tools/testing/selftests/kvm/include/ucall_common.h | 98 +-
.../selftests/kvm/include/x86_64/processor.h | 5 +
tools/testing/selftests/kvm/include/x86_64/ucall.h | 13 +
tools/testing/selftests/kvm/kvm_page_table_test.c | 8 +-
tools/testing/selftests/kvm/lib/aarch64/ucall.c | 11 +-
tools/testing/selftests/kvm/lib/guest_sprintf.c | 307 ++++
tools/testing/selftests/kvm/lib/kvm_util.c | 6 +-
tools/testing/selftests/kvm/lib/riscv/ucall.c | 11 -
tools/testing/selftests/kvm/lib/s390x/ucall.c | 10 -
tools/testing/selftests/kvm/lib/sparsebit.c | 1 -
tools/testing/selftests/kvm/lib/string_override.c | 9 +
tools/testing/selftests/kvm/lib/test_util.c | 15 +
tools/testing/selftests/kvm/lib/ucall_common.c | 44 +
tools/testing/selftests/kvm/lib/x86_64/processor.c | 18 +-
tools/testing/selftests/kvm/lib/x86_64/ucall.c | 36 +-
.../testing/selftests/kvm/max_guest_memory_test.c | 2 +-
tools/testing/selftests/kvm/memslot_perf_test.c | 4 +-
tools/testing/selftests/kvm/riscv/get-reg-list.c | 872 +++++++++
tools/testing/selftests/kvm/s390x/cmma_test.c | 62 +-
tools/testing/selftests/kvm/s390x/debug_test.c | 160 ++
tools/testing/selftests/kvm/s390x/memop.c | 13 +-
tools/testing/selftests/kvm/s390x/tprot.c | 11 +-
.../testing/selftests/kvm/set_memory_region_test.c | 21 +-
tools/testing/selftests/kvm/steal_time.c | 20 +-
tools/testing/selftests/kvm/x86_64/cpuid_test.c | 12 +-
.../kvm/x86_64/dirty_log_page_splitting_test.c | 18 +-
.../kvm/x86_64/exit_on_emulation_failure_test.c | 2 +-
.../kvm/x86_64/hyperv_extended_hypercalls.c | 3 +-
.../testing/selftests/kvm/x86_64/hyperv_features.c | 29 +-
tools/testing/selftests/kvm/x86_64/kvm_pv_test.c | 8 +-
.../selftests/kvm/x86_64/monitor_mwait_test.c | 35 +-
.../selftests/kvm/x86_64/nested_exceptions_test.c | 16 +-
.../selftests/kvm/x86_64/pmu_event_filter_test.c | 317 +++-
.../selftests/kvm/x86_64/recalc_apic_map_test.c | 6 +-
.../testing/selftests/kvm/x86_64/set_boot_cpu_id.c | 6 +-
.../kvm/x86_64/svm_nested_soft_inject_test.c | 22 +-
.../testing/selftests/kvm/x86_64/sync_regs_test.c | 132 ++
tools/testing/selftests/kvm/x86_64/tsc_msrs_test.c | 34 +-
.../selftests/kvm/x86_64/userspace_io_test.c | 10 +-
.../vmx_exception_with_invalid_guest_state.c | 2 +-
.../selftests/kvm/x86_64/vmx_pmu_caps_test.c | 31 +-
.../selftests/kvm/x86_64/xapic_state_test.c | 8 +-
.../testing/selftests/kvm/x86_64/xcr0_cpuid_test.c | 29 +-
.../testing/selftests/kvm/x86_64/xen_vmcall_test.c | 20 +-
virt/kvm/Kconfig | 3 -
virt/kvm/kvm_main.c | 54 +-
180 files changed, 8718 insertions(+), 3146 deletions(-)
create mode 100644 arch/riscv/kvm/vcpu_onereg.c
delete mode 100644 arch/x86/include/asm/virtext.h
create mode 100644 arch/x86/kvm/governed_features.h
create mode 100644 arch/x86/kvm/mmu/page_track.h
create mode 100644 tools/testing/selftests/kvm/get-reg-list.c
create mode 100644 tools/testing/selftests/kvm/guest_print_test.c
create mode 100644 tools/testing/selftests/kvm/include/aarch64/ucall.h
create mode 100644 tools/testing/selftests/kvm/include/riscv/ucall.h
create mode 100644 tools/testing/selftests/kvm/include/s390x/ucall.h
create mode 100644 tools/testing/selftests/kvm/include/x86_64/ucall.h
create mode 100644 tools/testing/selftests/kvm/lib/guest_sprintf.c
create mode 100644 tools/testing/selftests/kvm/riscv/get-reg-list.c
create mode 100644 tools/testing/selftests/kvm/s390x/debug_test.c
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.
This is an automated email from the git hooks/post-receive script.
tcwg-buildslave pushed a change to branch master
in repository toolchain/ci/interesting-commits.
from df7e36c5 Add entry 668d43502f465d48adbc1fe2956b979f36657e5f from https [...]
new a7243117 Add entry 6f19cf7526168f840fd22f6af3f0cb67efb90dc8 from https [...]
The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails. The revisions
listed as "adds" were already present in the repository and have only
been added to this reference.
Summary of changes:
gcc/sha1/6f19cf7526168f840fd22f6af3f0cb67efb90dc8/jira/description | 2 +-
gcc/sha1/6f19cf7526168f840fd22f6af3f0cb67efb90dc8/status.txt | 2 +-
.../master-aarch64-check_bootstrap_lto}/details.txt | 0
.../reproduction_instructions.txt | 4 ++--
.../master-aarch64-check_bootstrap_lto/status.txt | 6 +++---
.../master-aarch64-check_bootstrap_lto/summary.txt | 1 -
.../tcwg_bootstrap_check/status.txt | 2 +-
7 files changed, 8 insertions(+), 9 deletions(-)
copy gcc/sha1/6f19cf7526168f840fd22f6af3f0cb67efb90dc8/{tcwg_gcc_check/master-aarc [...]
copy gcc/sha1/{4ede915d5dde935a16df2c6640aee5ab22348d30 => 6f19cf7526168f840fd22f6 [...]
delete mode 100644 gcc/sha1/6f19cf7526168f840fd22f6af3f0cb67efb90dc8/tcwg_bootstra [...]
--
To stop receiving notification emails like this one, please contact
the administrator of this repository.