This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 01687e7c935e Merge tag 'riscv-for-linus-6.3-mw1' of git://git.kernel.or [...] new a2ad080b4dfd KVM: nVMX: Sanitize primary processor-based VM-execution c [...] new 96d6955d215e KVM: nVMX: Invert 'unsupported by eVMCSv1' check new c128d3fd389b KVM: nVMX: Prepare to sanitize tertiary execution controls [...] new 80edc49f6a75 KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V new c4a488685b84 kvm: x86/mmu: Warn on linking when sp->unsync_children new 8125b6cda9b1 KVM: selftests: Use TAP interface in the kvm_binary_stats_test new 79edd5504952 KVM: selftests: x86: Use TAP interface in the tsc_msrs_test new 1f98f2bd8ec4 KVM: x86/mmu: Change tdp_mmu to a read-only parameter new 09732d2b4dc5 KVM: x86/mmu: Move TDP MMU VM init/uninit behind tdp_mmu_enabled new ba6e3fe25543 KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn() new 56c3a4e4a2d5 KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn() new cd08d178ff45 KVM: x86/mmu: Avoid memslot lookup during KVM_PFN_ERR_HWPO [...] new 354c908c068e KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn() new e5e6f8d254a2 KVM: x86/mmu: Initialize fault.{gfn,slot} earlier for direct MMUs new 9aa8ab43b381 KVM: x86/mmu: Split out TDP MMU page fault handling new 9f33697ac7ff KVM: x86/mmu: Stop needlessly making MMU pages available f [...] new 6c882ef4fc7b KVM: x86/mmu: Rename __direct_map() to direct_map() new de0322f575be KVM: x86/mmu: Replace open coded usage of tdp_mmu_page wit [...] new 78fdd2f09fb1 KVM: x86/mmu: Pivot on "TDP MMU enabled" to check if activ [...] new dfe0ecc6f5d3 KVM: x86/mmu: Pivot on "TDP MMU enabled" when handling dir [...] new b961aa757f94 x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define new 0fcf86f05af2 KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX new 2be1bd3a70c8 KVM: x86: Hyper-V invariant TSC control new 67b16f180541 KVM: selftests: Rename 'msr->available' to 'msr->fault_exe [...] new 2f10428ace91 KVM: selftests: Convert hyperv_features test to using KVM_ [...] new 91a0b5478aab KVM: selftests: Test that values written to Hyper-V MSRs a [...] new bd827bd77537 KVM: selftests: Test Hyper-V invariant TSC control new fc471e831016 Merge branch 'kvm-late-6.1' into HEAD new 2b0128127373 KVM: Register /dev/kvm as the _very_ last thing during ini [...] new 5910ccf03de4 KVM: Initialize IRQ FD after arch hardware setup new c9650228efba KVM: Allocate cpus_hardware_enabled after arch hardware setup new 73b8dc04132c KVM: Teardown VFIO ops earlier in kvm_exit() new b801ef42149f KVM: s390: Unwind kvm_arch_init() piece-by-piece() if a st [...] new e43f576225cf KVM: s390: Move hardware setup/unsetup to init/exit new 1935542a04cc KVM: x86: Do timer initialization after XCR0 configuration new b7483387e374 KVM: x86: Move hardware setup/unsetup to init/exit new 63a1bd8ad1ac KVM: Drop arch hardware (un)setup hooks new 2916b70fc342 KVM: VMX: Reset eVMCS controls in VP assist page during ha [...] new da66de44b01e KVM: VMX: Don't bother disabling eVMCS static key on module exit new 451d39e80061 KVM: VMX: Move Hyper-V eVMCS initialization to helper new 4f8396b96a9f KVM: x86: Move guts of kvm_arch_init() to standalone helper new e32b120071ea KVM: VMX: Do _all_ initialization before exposing /dev/kvm [...] new 3af4a9e61e71 KVM: x86: Serialize vendor module initialization (hardware setup) new 466d27e48d7c KVM: arm64: Simplify the CPUHP logic new 6baaeda87844 KVM: arm64: Free hypervisor allocations if vector slot init fails new 78b3bf485d5c KVM: arm64: Unregister perf callbacks if hypervisor finali [...] new 1dc0f02d5338 KVM: arm64: Do arm/arch initialization without bouncing th [...] new 53bf620a2cdf KVM: arm64: Mark kvm_arm_init() and its unique descendants [...] new 1cfc1c7bf56c KVM: MIPS: Hardcode callbacks to hardware virtualization e [...] new 3fb8e89aa2a0 KVM: MIPS: Setup VZ emulation? directly from kvm_mips_init() new eed9fcdf5761 KVM: MIPS: Register die notifier prior to kvm_init() new 20deee32f553 KVM: RISC-V: Do arch init directly in riscv_kvm_init() new 45b66dc139e3 KVM: RISC-V: Tag init functions and data with __init, __ro [...] new ae19b15d9178 KVM: PPC: Move processor compatibility check to module init new b8449265915d KVM: s390: Do s390 specific init without bouncing through [...] new 6c30cd2ef43d KVM: s390: Mark __kvm_s390_init() and its descendants as __init new a578a0a9e352 KVM: Drop kvm_arch_{init,exit}() hooks new 58ca1930310a KVM: VMX: Make VMCS configuration/capabilities structs rea [...] new 3045c483eeee KVM: x86: Do CPU compatibility checks in x86 code new 81a1cf9f89a6 KVM: Drop kvm_arch_check_processor_compat() hook new 08a9d59c6ad9 KVM: x86: Use KBUILD_MODNAME to specify vendor module name new 8d20bd638167 KVM: x86: Unify pr_fmt to use module name for all KVM modules new 462689b37f08 KVM: VMX: Use current CPU's info to perform "disabled by B [...] new d41931324975 KVM: x86: Do VMX/SVM support checks directly in vendor code new 8504ef2139e2 KVM: VMX: Shuffle support checks and hardware enabling cod [...] new 325fc9579c2e KVM: SVM: Check for SVM support in CPU compatibility checks new d83420c2d74e KVM: x86: Move CPU compat checks hook to kvm_x86_ops (from [...] new c82a5c5c53c5 KVM: x86: Do compatibility checks when onlining CPU new aaf12a7b4323 KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section new e4aa7f88af1a KVM: Disable CPU hotplug during hardware enabling/disabling new 2c106f29004d KVM: Ensure CPU is stable during low level hardware enable [...] new 0bf50497f03b KVM: Drop kvm_count_lock and instead protect kvm_usage_cou [...] new 667a83bf6a30 KVM: Remove on_each_cpu(hardware_disable_nolock) in kvm_exit() new 37d258818562 KVM: Use a per-CPU variable to track which CPUs have enabl [...] new e6fb7d6eb421 KVM: Make hardware_enable_failed a local variable in the " [...] new 35774a9f94db KVM: Register syscore (suspend/resume) ops early in kvm_init() new 441f7bfa99fe KVM: Opt out of generic hardware enabling on s390 and PPC new 9f1a4c004869 KVM: Clean up error labels in kvm_init() new edd731d73221 Merge branch 'kvm-hw-enable-refactor' into HEAD new dc7c31e92278 Merge branch 'kvm-v6.2-rc4-fixes' into HEAD new bbbaf8cd1735 KVM: nVMX: Sanitize primary processor-based VM-execution c [...] new 70b31e50fb5f KVM: nVMX: Invert 'unsupported by eVMCSv1' check new 746b1833919e KVM: nVMX: Prepare to sanitize tertiary execution controls [...] new 1567037614af KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V new 641e6808586d kvm: x86/mmu: Warn on linking when sp->unsync_children new d324a733a934 KVM: selftests: Use TAP interface in the kvm_binary_stats_test new de4af61ee3c4 KVM: selftests: x86: Use TAP interface in the tsc_msrs_test new 3af15ff47c4d KVM: x86/mmu: Change tdp_mmu to a read-only parameter new 991c8047b740 KVM: x86/mmu: Move TDP MMU VM init/uninit behind tdp_mmu_enabled new 90c54c19f802 KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn() new 7bd9645348ca KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn() new 897e4526e5e0 KVM: x86/mmu: Avoid memslot lookup during KVM_PFN_ERR_HWPO [...] new f09948ec1ff3 KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn() new 2d75ce03005d KVM: x86/mmu: Initialize fault.{gfn,slot} earlier for direct MMUs new a158127f55b9 KVM: x86/mmu: Split out TDP MMU page fault handling new 1290f90e7718 KVM: x86/mmu: Stop needlessly making MMU pages available f [...] new 362871d74ff6 KVM: x86/mmu: Rename __direct_map() to direct_map() new aeb568a1a604 KVM: x86/mmu: Replace open coded usage of tdp_mmu_page wit [...] new f2e4535c273a KVM: x86/mmu: Pivot on "TDP MMU enabled" to check if activ [...] new 94fbbfbbdffd KVM: x86/mmu: Pivot on "TDP MMU enabled" when handling dir [...] new 916dde51a418 x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define new 24652b741cf6 KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX new 4e5bf89f2794 KVM: x86: Hyper-V invariant TSC control new 8b0a62fd3843 KVM: selftests: Rename 'msr->available' to 'msr->fault_exe [...] new e03b7b51e9a5 KVM: selftests: Convert hyperv_features test to using KVM_ [...] new d8589154363f KVM: selftests: Test that values written to Hyper-V MSRs a [...] new c04ec04c0d15 KVM: selftests: Test Hyper-V invariant TSC control new 0a19807b464f KVM: x86: Blindly get current x2APIC reg value on "nodecod [...] new 97a71c444a14 KVM: x86: Purge "highest ISR" cache when updating APICv state new 0ccf3e7cb95a KVM: SVM: Flush the "current" TLB when activating AVIC new 5aede752a839 KVM: SVM: Process ICR on AVIC IPI delivery failure due to [...] new a58a66afc464 KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if [...] new f651a0089548 KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is [...] new e0bead97e759 KVM: SVM: Don't put/load AVIC when setting virtual APIC mode new 1459f5c6b8b8 KVM: x86: Handle APICv updates for APIC "mode" changes via [...] new c482f2cebe2d KVM: x86: Move APIC access page helper to common x86 code new 2008fab34530 KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled new f628a34a9d52 KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean new a879a88e05f3 KVM: SVM: Compute dest based on sender's x2APIC status for [...] new da3fb46d226a KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_ [...] new f9829c907661 Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IR [...] new 8578e4512d87 KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch new 1d22a597b3e9 KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU new 6ea567ca003a KVM: x86: Explicitly skip optimized logical map setup if v [...] new 35366901017c KVM: x86: Explicitly track all possibilities for APIC map' [...] new 76e527509d37 KVM: x86: Skip redundant x2APIC logical mode optimized clu [...] new 2bf934aadcac KVM: x86: Disable APIC logical map if logical ID covers mu [...] new 2970052481b9 KVM: x86: Disable APIC logical map if vCPUs are aliased in [...] new 5b84b0291702 KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs new 5063c41bebac KVM: x86: Inhibit APICv/AVIC if the optimized physical map [...] new 9a364857ab4f KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode new 1ba59a445467 KVM: SVM: Always update local APIC on writes to logical de [...] new 4f160b7bd481 KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad" new 1808c950955d KVM: SVM: Require logical ID to be power-of-2 for AVIC entry new bbfc7aa62a4a KVM: SVM: Handle multiple logical targets in AVIC kick fastpath new a790e338c7c4 KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps new e2ed3e64a2bd Revert "KVM: SVM: Do not throw warning when calling avic_v [...] new b3f257a84696 KVM: x86: Track required APICv inhibits with variable, not [...] new d471bd853d38 KVM: x86: Allow APICv APIC ID inhibit to be cleared new 72c70ceeaf59 KVM: x86: Add helpers to recalc physical vs. logical optim [...] new f15a87c00690 Merge branch 'kvm-lapic-fix-and-cleanup' into HEAD new 7cb79f433e75 KVM: PPC: Fix refactoring goof in kvmppc_e500mc_init() new b1cd16330c8c KVM: account allocation in generic version of kvm_arch_alloc_vm() new b9926482ab91 kvm_host.h: fix spelling typo in function declaration new b1cb1fac22ab KVM: Destroy target device if coalesced MMIO unregistration fails new 5bad5d55d884 KVM: update code comment in struct kvm_vcpu new cf8e6cf6e7d6 Merge tag 'kvm-x86-generic-6.3' of https://github.com/kvm- [...] new f8df91e73a68 x86/cpufeatures: Add macros for Intel's new fast rep strin [...] new 2a4209d6a9cb KVM: x86: Advertise fast REP string features inherent to the CPU new 6213b701a9df KVM: x86: Replace 0-length arrays with flexible arrays new ee661d8ea94e KVM: x86: Replace cpu_dirty_logging_count with nr_memslots [...] new 48639df8a9e3 KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and [...] new f422f853af03 KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leave [...] new 26044aff37a5 x86/crash: Disable virt in core NMI crash handler to avoid [...] new 6a3236580b0b x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) new d81f952aa657 x86/reboot: Disable virtualization in an emergency if SVM [...] new a2b07fa7b933 x86/reboot: Disable SVM, not just VMX, when stopping CPUs new 2eb398df77a1 KVM: x86: Replace IS_ERR() with IS_ERR_VALUE() new 1a9df3262a63 KVM: x86: hyper-v: Use common code for hypercall userspace exit new db9cf24cea69 KVM: x86: hyper-v: Add extended hypercall support in Hyper-v new c4a46627e5a8 KVM: selftests: Test Hyper-V extended hypercall enablement new f65092015a83 KVM: selftests: Replace hardcoded Linux OS id with HYPERV_ [...] new 60325261235a KVM: selftests: Test Hyper-V extended hypercall exit to userspace new 0735d1c34e49 KVM: x86/emulator: Fix segment load privilege level validation new 096691e0d2a1 KVM: x86/emulator: Fix comment in __load_segment_descriptor() new 95744a90db18 KVM: x86: Optimize kvm->lock and SRCU interaction (KVM_SET [...] new 708f799d22fe KVM: x86: Optimize kvm->lock and SRCU interaction (KVM_X86 [...] new 4d85cfcaa82f KVM: x86: Simplify msr_filter update new 1fdefb8bd862 KVM: x86: Explicitly state lockdep condition of msr_filter update new 4559e6cf45b5 KVM: x86: Remove unnecessary initialization in kvm_vm_ioct [...] new e73ba25fdc24 KVM: x86: Simplify msr_io() new 4f2a5a6b96a0 Merge tag 'kvm-x86-misc-6.3' of https://github.com/kvm-x86 [...] new dc1ae59fc431 kvm: x86/mmu: Rename SPTE_TDP_AD_ENABLED_MASK to SPTE_TDP_ [...] new 9e3fbdfd9b89 kvm: x86/mmu: Don't clear write flooding for direct SP new a7e48ef77ff2 KVM: x86/mmu: fix an incorrect comment in kvm_mmu_new_pgd() new c667a3baeddc KVM: x86/mmu: Move round_gfn_for_level() helper into mmu_i [...] new 9ffe9265375c KVM: x86/mmu: Fix wrong gfn range of tlb flushing in kvm_s [...] new 1e203847aa92 KVM: x86/mmu: Reduce gfn range of tlb flushing in tdp_mmu_ [...] new 1b2dc7360463 KVM: x86/mmu: Fix wrong start gfn of tlb flushing with range new 3cdf93746f9a KVM: x86/mmu: Fix wrong gfn range of tlb flushing in valid [...] new 4ad980aea7f5 KVM: x86/mmu: Cleanup range-based flushing for given page new 11b36fe7d450 KVM: x86/mmu: Use kstrtobool() instead of strtobool() new 1c5ec0d433b4 Merge tag 'kvm-x86-mmu-6.3' of https://github.com/kvm-x86/ [...] new 6a5cba7bed35 KVM: x86/pmu: Correct the mask used in a pmu event filter lookup new 8589827fd534 KVM: x86/pmu: Remove impossible events from the pmu event filter new c5a287fa0dcc KVM: x86/pmu: prepare the pmu event filter for masked events new 14329b825ffb KVM: x86/pmu: Introduce masked events to the pmu event filter new f1e06fa10e37 KVM: selftests: Add flags when creating a pmu event filter new 7b7027937d01 KVM: selftests: Add testing for KVM_SET_PMU_EVENT_FILTER new 647ffac11ebb KVM: selftests: Test masked events in PMU filter new 2a3003e9507c KVM: x86/pmu: Drop event_type and rename "struct kvm_event [...] new 8911ce66697e KVM: x86/pmu: Cap kvm_pmu_cap.num_counters_gp at KVM's int [...] new e76ae52747a8 KVM: x86/pmu: Gate all "unimplemented MSR" prints on repor [...] new 2374b7310b66 KVM: x86/pmu: Use separate array for defining "PMU MSRs to save" new c3531edc79a7 KVM: x86/pmu: Don't tell userspace to save PMU MSRs if PMU [...] new e33b6d79acac KVM: x86/pmu: Don't tell userspace to save MSRs for non-ex [...] new 2de154f541fc KVM: x86/pmu: Provide "error" semantics for unsupported-bu [...] new 974850be0125 KVM: x86/pmu: Add PRIR++ and PDist support for SPR and lat [...] new 13738a364736 perf/x86/intel: Expose EPT-friendly PEBS for SPR and futur [...] new 157ed9cb0430 Merge tag 'kvm-x86-pmu-6.3' of https://github.com/kvm-x86/ [...] new bf10993313e9 KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should [...] new ca1789969351 KVM: selftests: Fix a typo in the vcpu_msrs_set assert new e99b0d4cc2b6 KVM: selftests: x86: Use "this_cpu" prefix for cpu vendor queries new e6df2ae3f57c KVM: selftests: x86: Cache host CPU vendor (AMD vs. Intel) new ea25ace7710b KVM: selftests: x86: Use host's native hypercall instructi [...] new 96e78ebbe8e4 KVM: x86/xen: Remove unneeded semicolon new 78332517a5da KVM: selftests: Stop assuming stats are contiguous in kvm_ [...] new e5b426879fc3 KVM: selftests: Remove duplicate VM creation in memslot_perf_test new 45f679550d72 KVM: selftests: Assign guest page size in sync area early [...] new 7ae69d7087a9 selftests: KVM: Replace optarg with arg in guest_modes_cmdline new 6c77ae716d54 KVM: selftests: Clean up misnomers in xen_shinfo_test new 695fa5a64cf5 KVM: selftests: Remove duplicate macro definition new e84183f68edb Merge tag 'kvm-x86-selftests-6.3' of https://github.com/kv [...] new 5f6015b26ba2 KVM: SVM: remove redundant ret variable new 36b0256789a7 KVM: svm/avic: Drop "struct kvm_x86_ops" for avic_hardware [...] new a31b531cd2fa KVM: SVM: Account scratch allocations used to decrypt SEV [...] new 8957cbcfed0a KVM: nSVM: Don't sync tlb_ctl back to vmcb12 on nested VM-Exit new c760e86f27fe KVM: x86: Move HF_GIF_MASK into "struct vcpu_svm" as "guest_gif" new 916b54a7688b KVM: x86: Move HF_NMI_MASK and HF_IRET_MASK into "struct v [...] new 32e69f232db4 KVM: x86: Use emulator callbacks instead of duplicating "h [...] new f94f053aa3a5 KVM: SVM: Fix potential overflow in SEV's send|receive_upd [...] new 4bc6dcaa159b Merge tag 'kvm-x86-svm-6.3' of https://github.com/kvm-x86/ [...] new 5a7a64779e7a KVM: VMX: Access @flags as a 32-bit value in __vmx_vcpu_run() new e8733482f59e KVM: VMX: don't use "unsigned long" in vmx_vcpu_enter_exit() new fc9465be8aad KVM: x86: Make vmx_get_exit_qual() and vmx_get_intr_info() [...] new 8578f59657c5 KVM: VMX: Allow VM-Fail path of VMREAD helper to be instrumented new 11633f69506d KVM: VMX: Always inline eVMCS read/write helpers new 432727f1cb6e KVM: VMX: Always inline to_vmx() and to_kvm_vmx() new 54a3b70a75dc x86/entry: KVM: Use dedicated VMX NMI entry for 32-bit ker [...] new 4f76e86f7e0d KVM: VMX: Provide separate subroutines for invoking NMI vs [...] new 11df586d774f KVM: VMX: Handle NMI VM-Exits in noinstr region new 41acdd419735 KVM: VMX: Do not trap VMFUNC instructions for L1 guests. new 496c917b0989 KVM: nVMX: Simplify the setting of SECONDARY_EXEC_ENABLE_V [...] new 93827a0a3639 KVM: VMX: Fix crash due to uninitialized current_vmcs new 27b025ebb0f6 Merge tag 'kvm-x86-vmx-6.3' of https://github.com/kvm-x86/ [...] new c25a6dddc62c KVM: RISC-V: Fix wrong usage of PGDIR_SIZE to check page sizes new 06723e124fcb RISC-V: KVM: Fix privilege mode setting in kvm_riscv_vcpu_ [...] new cdeb59bbf19f RISC-V: KVM: Redirect illegal instruction traps to guest new 585e351ff359 perf: RISC-V: Define helper functions expose hpm counter w [...] new 8929283a687b perf: RISC-V: Improve privilege mode filtering for perf new 2723fb7b1e3d RISC-V: Improve SBI PMU extension related definitions new 026bac4574b5 RISC-V: KVM: Define a probe function for SBI extension dat [...] new 8cdb8a53857d RISC-V: KVM: Return correct code for hsm stop function new bae0dfd74e01 RISC-V: KVM: Modify SBI extension handler to return SBI er [...] new 8f0153ecd3bf RISC-V: KVM: Add skeleton support for perf new cbddc4c4cb9e RISC-V: KVM: Add SBI PMU extension support new 470926a2900c RISC-V: KVM: Make PMU functionality depend on Sscofpmf new f04bafb52f58 RISC-V: KVM: Disable all hpmcounter access for VS/VU mode new a9ac6c37521f RISC-V: KVM: Implement trap & emulate for hpmcounters new 0cb74b65d2e5 RISC-V: KVM: Implement perf support without sampling new badc386869e2 RISC-V: KVM: Support firmware events new c39cea6f38ee RISC-V: KVM: Increment firmware pmu events new 33436335e93a Merge tag 'kvm-riscv-6.3-1' of https://github.com/kvm-risc [...] new a2ce98d69fab Merge remote-tracking branch 'l390-korg/cmpxchg_user_key' [...] new f2d3155e2a6b KVM: s390: disable migration mode when dirty tracking is disabled new d7b9dc14031b KVM: selftests: Compile s390 tests with -march=z10 new 7d42b38de992 KVM: s390: selftest: memop: Pass mop_desc via pointer new 12d27074193b KVM: s390: selftest: memop: Replace macros by functions new de14e014a7c6 KVM: s390: selftest: memop: Move testlist into main new 06e5da81c66c KVM: s390: selftest: memop: Add bad address test new 76a2ee43ed9a KVM: s390: selftest: memop: Fix typo new 12c12a9924b4 KVM: s390: selftest: memop: Fix wrong address being used in test new dc55ceaef616 KVM: s390: selftest: memop: Fix integer literal new a41f505e9f7f KVM: s390: Move common code of mem_op functions into function new 8550bcb754bc KVM: s390: Dispatch to implementing function at top level [...] new 0d6d4d23955c KVM: s390: Refactor absolute vm mem_op function new 701422b34382 KVM: s390: Refactor vcpu mem_op function new 3fd49805d19d KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg new a7b041732802 Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG new 0dd714bfd200 KVM: s390: selftest: memop: Add cmpxchg tests new 1abb32697a0d KVM: s390: GISA: sort out physical vs virtual pointers usage new 5fc5b94a2736 s390/virtio: sort out physical vs virtual pointers usage new e4922088f8e9 Merge tag 'kvm-s390-next-6.3-1' of https://git.kernel.org/ [...] new 7f604e92fb80 KVM: x86/mmu: Make tdp_mmu_allowed static new 92425e058ab6 Merge branch kvm/kvm-hw-enable-refactor into kvmarm/next new 619cec00857f Merge branch arm64/for-next/sme2 into kvmarm/next new e2c0b51f1c9d arm64: Allow the definition of UNKNOWN system register fields new d1a0eb124c44 arm64/sysreg: Convert CCSIDR_EL1 to automatic generation new 8f407d6a15f3 arm64/sysreg: Add CCSIDR2_EL1 new 805e6ec1c5e0 arm64/cache: Move CLIDR macro definitions new 8cc6dedaff42 KVM: arm64: Always set HCR_TID2 new bf48040cd9b0 KVM: arm64: Mask FEAT_CCIDX new 7af0c2534f4c KVM: arm64: Normalize cache configuration new 5f623a598d12 KVM: arm64: Mark some VM-scoped allocations as __GFP_ACCOUNT new e8789ab7047a Merge branch kvm-arm64/virtual-cache-geometry into kvmarm/next new 9a7ad19ac804 KVM: arm64: Use KVM's pte type/helpers in handle_access_fault() new ddcadb297ce5 KVM: arm64: Ignore EAGAIN for walks outside of a fault new 76259cca4795 KVM: arm64: Return EAGAIN for invalid PTE in attr walker new 7d29a2407df6 KVM: arm64: Don't serialize if the access flag isn't set new fc61f554e694 KVM: arm64: Handle access faults behind the read lock new 1dfc3e905089 KVM: arm64: Condition HW AF updates on config option new 52b603628a2c Merge branch kvm-arm64/parallel-access-faults into kvmarm/next new 58817be46762 MAINTAINERS: Add Oliver Upton as co-maintainer of KVM/arm64 new 960c3028a1d5 KVM: arm64: Drop Columbia-hosted mailing list new 073988eb3247 Merge branch kvm-arm64/MAINTAINERS into kvmarm/next new 4d74ecfa6458 KVM: arm64: Don't arm a hrtimer for an already pending timer new fc6ee952cf00 KVM: arm64: Reduce overhead of trapped timer sysreg accesses new ba82e06cf7f4 KVM: arm64: timers: Don't BUG() on unhandled timer trap new 1b915210d9be Merge branch kvm-arm64/nv-timer-improvements into kvmarm/next new 8669651ce0d9 KVM: arm64: Provide sanitized SYS_ID_AA64SMFR0_EL1 to nVHE new e2d4f5ae1771 KVM: arm64: Introduce finalise_el2_state macro new 3c4cc31537ec KVM: arm64: Use sanitized values in __check_override in nVHE new 6f10f2ec61c7 KVM: arm64: Finalise EL2 state from pKVM PSCI relay new 3f1a14af5e17 Merge branch kvm-arm64/psci-relay-fixes into kvmarm/next new 43c5c868bddc KVM: arm64: vgic: Allow registration of a non-maskable mai [...] new 13aad0c00bb1 irqchip/apple-aic: Register vgic maintenance interrupt with KVM new ad818e6010ef irqchip/apple-aic: Correctly map the vgic maintenance interrupt new e4f7417e9680 Merge branch kvm-arm64/apple-vgic-mi into kvmarm/next new 7a5e9c8f0b2d KVM: arm64: Kill CPACR_EL1_TTA definition new 59d78a2ec0e9 KVM: arm64: Synchronize SMEN on vcpu schedule out new fd2b165ce2cc KVM: arm64: vgic-v3: Limit IPI-ing when accessing GICR_{C, [...] new 016cbbd2ba55 KVM: arm64: vgic-v3: Use kstrtobool() instead of strtobool() new cecafc0a830f KVM: MMU: Make the definition of 'INVALID_GPA' common new 242b6f34b5b5 arm64/sysreg: clean up some inconsistent indenting new 6043829fdb71 KVM: selftests: Remove redundant setbuf() new d23650547819 KVM: selftests: Enable USERFAULTFD new 67d953d4d7be KVM: arm64: Fix non-kerneldoc comments new 022d3f080068 Merge branch kvm-arm64/misc into kvmarm/next new 675cabc89900 arm64: Add ARM64_HAS_NESTED_VIRT cpufeature new 8531bd63a8dc KVM: arm64: Use the S2 MMU context to iterate over S2 table new 89b0e7de3451 KVM: arm64: nv: Introduce nested virtualization VCPU feature new 2fb32357ae67 KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested [...] new 1d05d51bac78 KVM: arm64: nv: Allow userspace to set PSR_MODE_EL2x new 5305cc2c3400 KVM: arm64: nv: Add EL2 system registers to vcpu context new 0043b29038e2 KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 V [...] new 6ff9dc238a53 KVM: arm64: nv: Handle HCR_EL2.NV system register traps new 47f3a2fc765a KVM: arm64: nv: Support virtual EL2 exceptions new 93c33702cd2b KVM: arm64: nv: Inject HVC exceptions to the virtual EL2 new 6898a55ce38c KVM: arm64: nv: Handle trapped ERET from virtual EL2 new bd36b1a9eb5a KVM: arm64: nv: Handle SMCs taken from virtual EL2 new 9da117eec924 KVM: arm64: nv: Add accessors for SPSR_EL1, ELR_EL1 and VB [...] new d9552fe133f9 KVM: arm64: nv: Emulate PSTATE.M for a guest hypervisor new e6b367db0f91 KVM: arm64: nv: Allow a sysreg to be hidden from userspace only new 280b748e871e KVM: arm64: nv: Emulate EL12 register accesses from the vi [...] new 9f75b6d447d7 KVM: arm64: nv: Filter out unsupported features from ID regs new 191e0e155521 KVM: arm64: nv: Only toggle cache for virtual EL2 when SCT [...] new 3fb901cdc9e4 KVM: arm64: nv: Use reg_to_encoding() to get sysreg ID new 0d3b2b4d2364 Merge branch kvm-arm64/nv-prefix into kvmarm/next new 96a4627dbbd4 Merge tag ' https://github.com/oupton/linux tags/kvmarm-6. [...] new 4090871d7726 Merge tag 'kvmarm-6.3' of git://git.kernel.org/pub/scm/lin [...] new 85e64d09f793 KVM: x86: remove redundant ret variable new ba5838abb053 KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI new ab52be1b310b KVM: x86: Inject #GP on x2APIC WRMSR that sets reserved bi [...] new b223649576fc KVM: x86: Mark x2APIC DFR reg as non-existent for x2APIC new b5fcc59be72a KVM: x86: Split out logic to generate "readable" APIC regs [...] new c39857ce8daa KVM: VMX: Always intercept accesses to unsupported "extend [...] new 02efd818a6c0 KVM: VMX: Intercept reads to invalid and write-only x2APIC [...] new 8e6ed96cdd50 KVM: x86: fire timer when it is migrated and expired, and [...] new 052c3b99cbc8 KVM: x86: Reinitialize xAPIC ID when userspace forces x2AP [...] new eb9819257631 KVM: selftests: Verify APIC_ID is set when forcing x2APIC= [...] new ddad47bfb955 Merge tag 'kvm-x86-apic-6.3' of https://github.com/kvm-x86 [...] new 45dd9bc75d9a KVM: SVM: hyper-v: placate modpost section mismatch error new 49d575926890 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...] new 0e84f918fac8 vdpa_sim: not reset state in vdpasim_queue_ready new d5ff73bbb03e virtio_pmem: populate numa information new d16c0cd27331 docs: driver-api: virtio: virtio on Linux new 95bfec41bd3d virtio-blk: add support for zoned block devices new 04e5421e6f61 virtio_blk: temporary variable type tweak new 2a9c844e896b virtio_blk: zone append in header type tweak new b16a1756c716 virtio_blk: mark all zone fields LE new 72c67e9b904c vdpa/mlx5: Move some definitions to a new header file new 294221004322 vdpa/mlx5: Add debugfs subtree new 0a59975088d3 vdpa/mlx5: Add RX counters to debugfs new d59f633dd059 vDPA/ifcvf: decouple hw features manipulators from the adapter new af8eb69a62b7 vDPA/ifcvf: decouple config space ops from the adapter new 66e3970b16d1 vDPA/ifcvf: alloc the mgmt_dev before the adapter new 004cbcabab46 vDPA/ifcvf: decouple vq IRQ releasers from the adapter new 23dac55cec3a vDPA/ifcvf: decouple config IRQ releaser from the adapter new f9a9ffb2e4db vDPA/ifcvf: decouple vq irq requester from the adapter new a70d833e696e vDPA/ifcvf: decouple config/dev IRQ requester and vectors [...] new 7cfd36b7e8be vDPA/ifcvf: ifcvf_request_irq works on ifcvf_hw new 6a3b2f179b49 vDPA/ifcvf: manage ifcvf_hw in the mgmt_dev new 93139037b582 vDPA/ifcvf: allocate the adapter in dev_add() new 267000e98089 vDPA/ifcvf: retire ifcvf_private_to_vf new 46fc0917bbab vDPA/ifcvf: implement features provisioning new d8b3832a788d vdpa_sim_net: Offer VIRTIO_NET_F_STATUS new db6c4dee4c10 PCI: Add SolidRun vendor ID new d089d69cc1f8 PCI: Avoid FLR for SolidRun SNET DPU rev 1 new 51a8f9d7f587 virtio: vdpa: new SolidNET DPU driver. new 1538a8a49ecb vdpa: Add resume operation new 69106b6fb3d7 vhost-vdpa: Introduce RESUME backend feature bit new 3b688d7a086d vhost-vdpa: uAPI to resume the device new f9d9f57ef048 vdpa_sim: Implement resume vdpa op new fb25d45694f3 docs: driver-api: virtio: parenthesize external reference targets new ae8d2247af6f docs: driver-api: virtio: slightly reword virtqueues alloc [...] new 2b034e82ffc5 docs: driver-api: virtio: commentize spec version checking new 489e18f3d732 virtio-blk: set req->state to MQ_RQ_COMPLETE after polling [...] new 07b679f70d73 virtio-blk: support completion batching for the IRQ path new 2f8200efe730 vdpa_sim: use weak barriers new 0497f23e73ec vdpa_sim: switch to use __vdpa_alloc_device() new bb105d514a25 vdpasim: customize allocation size new 5dbb063a3ebf vdpa_sim: support vendor statistics new 0899774cb360 vdpa_sim_net: vendor satistics new 6c3d329e6486 vdpa_sim: get rid of DMA ops new 62b763ad7653 vhost-test: remove meaningless debug info new 759aba1e6e7d vhost: remove unused paramete new 2713ea3c7d93 virtio_ring: per virtqueue dma device new 25da258fa61b vdpa: introduce get_vq_dma_device() new a1baedb11ed4 virtio-vdpa: support per vq dma device new 99fb2b838f44 vdpa: set dma mask for vDPA device new 36871fb92b70 vdpa: mlx5: support per virtqueue dma device new b3d4f02ee7a2 vhost-scsi: convert sysfs snprintf and sprintf to sysfs_emit new 313389be06ff vhost-net: support VIRTIO_F_RING_RESET new 699209fcc55c vdpa: Fix a couple of spelling mistakes in some messages new 08707b5c3344 scsi: virtio_scsi: fix handling of kmalloc failure new 6830a6aba9d4 vhost-vdpa: print warning when vhost_vdpa_alloc_domain fails new 2e44ca3f1f0b vringh: fix a typo in comments for vringh_kiov new 0d0ed4006127 tools/virtio: enable to build with retpoline new 446062e6adc4 vdpa/mlx5: Directly assign memory key new aef24311bd2d vdpa/mlx5: Don't clear mr struct on destroy MR new c04e2145b8c9 vdpa/mlx5: Initialize CVQ iotlb spinlock new 275487b4be89 vdpa: fix improper error message when adding vdpa dev new 6e6d39830bc6 vdpa: conditionally read STATUS in config space new e7d09cd1d4a2 vdpa: validate provisioned device features against specifi [...] new dbb6f1c42ade vdpa: validate device feature provisioning against support [...] new 033779a708f0 vdpa/mlx5: make MTU/STATUS presence conditional on feature bits new deeacf35c922 vdpa/mlx5: support device features provisioning new 84cc6674b76b Merge tag 'for_linus' of git://git.kernel.org/pub/scm/linu [...] new b7f1a141f3cf MAINTAINERS: step down as vfio reviewer new 7141790b5dd4 vfio: platform: No need to check res again new 6b182403ee45 vfio-mdev: allow building the samples into the kernel new 8bf8c5ee1f38 vfio-mdev: turn VFIO_MDEV into a selectable symbol new 0030d7d6ce31 vfio-mdev: move the mtty usage documentation new 3232868133ea vfio-mdev: remove an non-existing driver from vfio-mediate [...] new c9c4c070e0fe vfio/mlx5: Fix UBSAN note new 83ff6095ecf8 vfio/mlx5: Allow loading of larger images than 512 MB new 0886196ca881 vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations new cb8285b89f2c vfio/hisi: Use GFP_KERNEL_ACCOUNT for userspace persistent [...] new 4a6c971a06ff vfio/fsl-mc: Use GFP_KERNEL_ACCOUNT for userspace persiste [...] new 7658aeda334a vfio/platform: Use GFP_KERNEL_ACCOUNT for userspace persis [...] new de858a05c9d8 vfio-mdev: add back CONFIG_VFIO dependency new 038ef0a4765e vfio/mdev: Use sysfs_emit() to instead of sprintf() new e951eaaf8399 samples: fix the prompt about SAMPLE_VFIO_MDEV_MBOCHS new caf094b5a156 vfio/mlx5: Check whether VF is migratable new b04e2e86e919 vfio/mlx5: Improve the source side flow upon pre_copy new f4f0c25e5d72 vfio/mlx5: Improve the target side flow to reduce downtime new 168a9c91fe0a vfio: platform: ignore missing reset if disabled at module init new ef3a3f6a294b vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR new 046eca5018f8 vfio/type1: prevent underflow of locked_vm via exec() new 18e292705ba2 vfio/type1: track locked_vm per dma new 90fdd158a695 vfio/type1: restore locked_vm new da4f1c2e1c9c vfio/type1: revert "block on invalid vaddr" new a5ac1f816563 vfio/type1: revert "implement notify callback" new e592296cd6e1 vfio: revert "iommu driver notify callback" new 2b48f52f2bff vfio: fix deadlock between group lock and kvm lock new b0d2d5697e4c vfio: no need to pass kvm pointer during device open new ce06a7000f0e vfio/mlx5: Fix range size calculation upon tracker creation new fae906802218 vfio: Update the kdoc for vfio_device_ops new c55365a09302 docs: vfio: Update vfio.rst per latest interfaces new d649c34cb916 vfio: Fix NULL pointer dereference caused by uninitialized [...] new cac85e4616b1 Merge tag 'vfio-v6.3-rc1' of https://github.com/awilliam/l [...]
The 451 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/admin-guide/kernel-parameters.txt | 7 +- Documentation/driver-api/index.rst | 1 + Documentation/driver-api/vfio-mediated-device.rst | 108 +- Documentation/driver-api/vfio.rst | 82 +- Documentation/driver-api/virtio/index.rst | 11 + Documentation/driver-api/virtio/virtio.rst | 145 +++ .../driver-api/virtio/writing_virtio_drivers.rst | 197 ++++ Documentation/s390/vfio-ap.rst | 1 - Documentation/virt/kvm/api.rst | 124 ++- Documentation/virt/kvm/devices/vm.rst | 4 + Documentation/virt/kvm/locking.rst | 25 +- Documentation/virt/kvm/x86/errata.rst | 11 + MAINTAINERS | 9 +- arch/arm64/include/asm/cache.h | 9 + arch/arm64/include/asm/el2_setup.h | 99 ++ arch/arm64/include/asm/esr.h | 4 + arch/arm64/include/asm/kvm_arm.h | 23 +- arch/arm64/include/asm/kvm_emulate.h | 70 +- arch/arm64/include/asm/kvm_host.h | 67 +- arch/arm64/include/asm/kvm_hyp.h | 1 + arch/arm64/include/asm/kvm_mmu.h | 15 +- arch/arm64/include/asm/kvm_nested.h | 20 + arch/arm64/include/asm/kvm_pgtable.h | 8 + arch/arm64/include/asm/sysreg.h | 39 +- arch/arm64/include/uapi/asm/kvm.h | 1 + arch/arm64/kernel/cacheinfo.c | 5 - arch/arm64/kernel/cpufeature.c | 25 + arch/arm64/kernel/hyp-stub.S | 86 +- arch/arm64/kvm/Kconfig | 1 + arch/arm64/kvm/Makefile | 2 +- arch/arm64/kvm/arch_timer.c | 106 +- arch/arm64/kvm/arm.c | 109 +- arch/arm64/kvm/emulate-nested.c | 203 ++++ arch/arm64/kvm/fpsimd.c | 1 + arch/arm64/kvm/guest.c | 6 + arch/arm64/kvm/handle_exit.c | 47 +- arch/arm64/kvm/hyp/exception.c | 48 +- arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h | 21 +- arch/arm64/kvm/hyp/nvhe/hyp-init.S | 1 + arch/arm64/kvm/hyp/nvhe/sys_regs.c | 1 + arch/arm64/kvm/hyp/pgtable.c | 43 +- arch/arm64/kvm/hyp/vhe/switch.c | 26 +- arch/arm64/kvm/hypercalls.c | 2 +- arch/arm64/kvm/inject_fault.c | 61 +- arch/arm64/kvm/mmu.c | 46 +- arch/arm64/kvm/nested.c | 161 +++ arch/arm64/kvm/pvtime.c | 8 +- arch/arm64/kvm/reset.c | 25 +- arch/arm64/kvm/sys_regs.c | 459 ++++++-- arch/arm64/kvm/sys_regs.h | 14 +- arch/arm64/kvm/trace_arm.h | 59 ++ arch/arm64/kvm/vgic/vgic-init.c | 21 +- arch/arm64/kvm/vgic/vgic-mmio.c | 13 +- arch/arm64/kvm/vgic/vgic-v3.c | 9 +- arch/arm64/kvm/vmid.c | 6 +- arch/arm64/tools/cpucaps | 1 + arch/arm64/tools/gen-sysreg.awk | 20 +- arch/arm64/tools/sysreg | 17 + arch/mips/include/asm/kvm_host.h | 3 +- arch/mips/kvm/Kconfig | 1 + arch/mips/kvm/Makefile | 2 +- arch/mips/kvm/callback.c | 14 - arch/mips/kvm/mips.c | 34 +- arch/mips/kvm/vz.c | 7 +- arch/powerpc/include/asm/kvm_host.h | 3 - arch/powerpc/include/asm/kvm_ppc.h | 1 - arch/powerpc/kvm/book3s.c | 12 +- arch/powerpc/kvm/booke.c | 2 +- arch/powerpc/kvm/e500.c | 6 +- arch/powerpc/kvm/e500mc.c | 8 +- arch/powerpc/kvm/powerpc.c | 20 - arch/riscv/include/asm/kvm_host.h | 11 +- arch/riscv/include/asm/kvm_vcpu_pmu.h | 107 ++ arch/riscv/include/asm/kvm_vcpu_sbi.h | 13 +- arch/riscv/include/asm/sbi.h | 7 +- arch/riscv/kvm/Kconfig | 1 + arch/riscv/kvm/Makefile | 1 + arch/riscv/kvm/main.c | 26 +- arch/riscv/kvm/mmu.c | 20 +- arch/riscv/kvm/tlb.c | 4 + arch/riscv/kvm/vcpu.c | 7 + arch/riscv/kvm/vcpu_exit.c | 9 + arch/riscv/kvm/vcpu_insn.c | 4 +- arch/riscv/kvm/vcpu_pmu.c | 633 +++++++++++ arch/riscv/kvm/vcpu_sbi.c | 72 +- arch/riscv/kvm/vcpu_sbi_base.c | 27 +- arch/riscv/kvm/vcpu_sbi_hsm.c | 28 +- arch/riscv/kvm/vcpu_sbi_pmu.c | 86 ++ arch/riscv/kvm/vcpu_sbi_replace.c | 50 +- arch/riscv/kvm/vcpu_sbi_v01.c | 17 +- arch/riscv/kvm/vmid.c | 4 +- arch/s390/Kconfig | 8 +- arch/s390/configs/debug_defconfig | 1 - arch/s390/configs/defconfig | 1 - arch/s390/include/asm/kvm_host.h | 1 - arch/s390/kvm/gaccess.c | 109 ++ arch/s390/kvm/gaccess.h | 3 + arch/s390/kvm/interrupt.c | 13 +- arch/s390/kvm/kvm-s390.c | 348 +++--- arch/s390/kvm/kvm-s390.h | 2 +- arch/s390/kvm/pci.c | 2 +- arch/s390/kvm/pci.h | 2 +- arch/x86/events/intel/core.c | 1 + arch/x86/events/intel/ds.c | 4 +- arch/x86/include/asm/cpufeatures.h | 3 + arch/x86/include/asm/hyperv-tlfs.h | 3 + arch/x86/include/asm/idtentry.h | 16 +- arch/x86/include/asm/kvm-x86-ops.h | 2 +- arch/x86/include/asm/kvm_host.h | 109 +- arch/x86/include/asm/reboot.h | 2 + arch/x86/include/asm/virtext.h | 16 +- arch/x86/include/asm/xen/hypervisor.h | 4 +- arch/x86/include/uapi/asm/kvm.h | 34 +- arch/x86/kernel/cpu/mshyperv.c | 2 +- arch/x86/kernel/crash.c | 17 +- arch/x86/kernel/nmi.c | 8 +- arch/x86/kernel/reboot.c | 88 +- arch/x86/kernel/smp.c | 6 +- arch/x86/kvm/Kconfig | 1 + arch/x86/kvm/cpuid.c | 43 +- arch/x86/kvm/debugfs.c | 2 + arch/x86/kvm/emulate.c | 18 +- arch/x86/kvm/hyperv.c | 85 +- arch/x86/kvm/hyperv.h | 27 + arch/x86/kvm/i8254.c | 4 +- arch/x86/kvm/i8259.c | 4 +- arch/x86/kvm/ioapic.c | 1 + arch/x86/kvm/irq.c | 1 + arch/x86/kvm/irq_comm.c | 7 +- arch/x86/kvm/kvm_cache_regs.h | 12 + arch/x86/kvm/kvm_emulate.h | 7 +- arch/x86/kvm/kvm_onhyperv.c | 1 + arch/x86/kvm/lapic.c | 404 +++++-- arch/x86/kvm/lapic.h | 4 + arch/x86/kvm/mmu.h | 6 +- arch/x86/kvm/mmu/mmu.c | 320 +++--- arch/x86/kvm/mmu/mmu_internal.h | 22 +- arch/x86/kvm/mmu/page_track.c | 1 + arch/x86/kvm/mmu/paging_tmpl.h | 25 +- arch/x86/kvm/mmu/spte.c | 10 +- arch/x86/kvm/mmu/spte.h | 20 +- arch/x86/kvm/mmu/tdp_iter.c | 12 +- arch/x86/kvm/mmu/tdp_mmu.c | 20 +- arch/x86/kvm/mmu/tdp_mmu.h | 25 +- arch/x86/kvm/mtrr.c | 1 + arch/x86/kvm/pmu.c | 290 ++++- arch/x86/kvm/pmu.h | 13 +- arch/x86/kvm/reverse_cpuid.h | 7 + arch/x86/kvm/smm.c | 3 +- arch/x86/kvm/svm/avic.c | 374 +++---- arch/x86/kvm/svm/nested.c | 5 +- arch/x86/kvm/svm/pmu.c | 4 + arch/x86/kvm/svm/sev.c | 7 +- arch/x86/kvm/svm/svm.c | 131 ++- arch/x86/kvm/svm/svm.h | 58 +- arch/x86/kvm/svm/svm_onhyperv.c | 1 + arch/x86/kvm/svm/svm_onhyperv.h | 8 +- arch/x86/kvm/vmx/capabilities.h | 4 +- arch/x86/kvm/vmx/hyperv.c | 87 +- arch/x86/kvm/vmx/hyperv.h | 128 ++- arch/x86/kvm/vmx/nested.c | 24 +- arch/x86/kvm/vmx/pmu_intel.c | 28 +- arch/x86/kvm/vmx/posted_intr.c | 2 + arch/x86/kvm/vmx/sgx.c | 5 +- arch/x86/kvm/vmx/vmcs.h | 4 +- arch/x86/kvm/vmx/vmcs12.c | 1 + arch/x86/kvm/vmx/vmenter.S | 80 +- arch/x86/kvm/vmx/vmx.c | 624 +++++------ arch/x86/kvm/vmx/vmx.h | 18 +- arch/x86/kvm/vmx/vmx_ops.h | 6 +- arch/x86/kvm/x86.c | 557 +++++----- arch/x86/kvm/x86.h | 18 +- arch/x86/kvm/xen.c | 27 + arch/x86/kvm/xen.h | 7 + drivers/block/virtio_blk.c | 468 ++++++++- drivers/gpu/drm/i915/Kconfig | 3 +- drivers/irqchip/irq-apple-aic.c | 53 +- drivers/nvdimm/virtio_pmem.c | 11 +- drivers/pci/quirks.c | 8 + drivers/perf/riscv_pmu_sbi.c | 64 +- drivers/s390/virtio/virtio_ccw.c | 46 +- drivers/scsi/virtio_scsi.c | 14 +- drivers/vdpa/Kconfig | 30 + drivers/vdpa/Makefile | 1 + drivers/vdpa/ifcvf/ifcvf_base.c | 32 +- drivers/vdpa/ifcvf/ifcvf_base.h | 10 +- drivers/vdpa/ifcvf/ifcvf_main.c | 162 ++- drivers/vdpa/mlx5/Makefile | 2 +- drivers/vdpa/mlx5/core/mr.c | 1 - drivers/vdpa/mlx5/core/resources.c | 3 +- drivers/vdpa/mlx5/net/debug.c | 152 +++ drivers/vdpa/mlx5/net/mlx5_vnet.c | 259 +++-- drivers/vdpa/mlx5/net/mlx5_vnet.h | 94 ++ drivers/vdpa/solidrun/Makefile | 6 + drivers/vdpa/solidrun/snet_hwmon.c | 188 ++++ drivers/vdpa/solidrun/snet_main.c | 1111 ++++++++++++++++++++ drivers/vdpa/solidrun/snet_vdpa.h | 194 ++++ drivers/vdpa/vdpa.c | 110 +- drivers/vdpa/vdpa_sim/vdpa_sim.c | 233 ++-- drivers/vdpa/vdpa_sim/vdpa_sim.h | 7 +- drivers/vdpa/vdpa_sim/vdpa_sim_blk.c | 1 + drivers/vdpa/vdpa_sim/vdpa_sim_net.c | 219 +++- drivers/vfio/container.c | 7 +- drivers/vfio/fsl-mc/vfio_fsl_mc.c | 2 +- drivers/vfio/fsl-mc/vfio_fsl_mc_intr.c | 4 +- drivers/vfio/group.c | 46 +- drivers/vfio/mdev/Kconfig | 8 +- drivers/vfio/mdev/mdev_sysfs.c | 2 +- drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c | 4 +- drivers/vfio/pci/mlx5/cmd.c | 79 +- drivers/vfio/pci/mlx5/cmd.h | 28 +- drivers/vfio/pci/mlx5/main.c | 261 ++++- drivers/vfio/pci/vfio_pci_config.c | 6 +- drivers/vfio/pci/vfio_pci_core.c | 7 +- drivers/vfio/pci/vfio_pci_igd.c | 2 +- drivers/vfio/pci/vfio_pci_intrs.c | 10 +- drivers/vfio/pci/vfio_pci_rdwr.c | 2 +- drivers/vfio/platform/vfio_platform_common.c | 12 +- drivers/vfio/platform/vfio_platform_irq.c | 8 +- drivers/vfio/vfio.h | 25 +- drivers/vfio/vfio_iommu_type1.c | 248 ++--- drivers/vfio/vfio_main.c | 70 +- drivers/vfio/virqfd.c | 2 +- drivers/vhost/net.c | 5 +- drivers/vhost/scsi.c | 6 +- drivers/vhost/test.c | 3 - drivers/vhost/vdpa.c | 39 +- drivers/vhost/vhost.c | 2 +- drivers/vhost/vhost.h | 2 +- drivers/vhost/vsock.c | 2 +- drivers/virtio/virtio_ring.c | 133 ++- drivers/virtio/virtio_vdpa.c | 13 +- include/kvm/arm_arch_timer.h | 6 +- include/kvm/arm_vgic.h | 4 + include/linux/cpuhotplug.h | 5 +- include/linux/kvm_host.h | 19 +- include/linux/kvm_types.h | 2 +- include/linux/pci_ids.h | 2 + include/linux/perf/riscv_pmu.h | 5 + include/linux/vdpa.h | 12 +- include/linux/vfio.h | 6 +- include/linux/virtio_config.h | 8 +- include/linux/virtio_ring.h | 16 + include/linux/vringh.h | 2 +- include/uapi/linux/kvm.h | 9 + include/uapi/linux/vfio.h | 15 +- include/uapi/linux/vhost.h | 8 + include/uapi/linux/vhost_types.h | 2 + include/uapi/linux/virtio_blk.h | 105 ++ samples/Kconfig | 19 +- samples/vfio-mdev/README.rst | 100 ++ tools/testing/selftests/kvm/Makefile | 4 + .../selftests/kvm/aarch64/page_fault_test.c | 2 - tools/testing/selftests/kvm/config | 1 + .../testing/selftests/kvm/include/x86_64/hyperv.h | 149 ++- .../selftests/kvm/include/x86_64/processor.h | 31 +- .../testing/selftests/kvm/kvm_binary_stats_test.c | 21 +- tools/testing/selftests/kvm/lib/elf.c | 2 + tools/testing/selftests/kvm/lib/guest_modes.c | 2 +- tools/testing/selftests/kvm/lib/kvm_util.c | 4 +- tools/testing/selftests/kvm/lib/x86_64/processor.c | 46 +- tools/testing/selftests/kvm/memslot_perf_test.c | 5 +- tools/testing/selftests/kvm/s390x/memop.c | 672 +++++++++--- .../kvm/x86_64/exit_on_emulation_failure_test.c | 3 - .../selftests/kvm/x86_64/fix_hypercall_test.c | 4 +- tools/testing/selftests/kvm/x86_64/hyperv_clock.c | 2 +- .../kvm/x86_64/hyperv_extended_hypercalls.c | 97 ++ .../testing/selftests/kvm/x86_64/hyperv_features.c | 339 +++--- .../selftests/kvm/x86_64/mmio_warning_test.c | 2 +- .../selftests/kvm/x86_64/pmu_event_filter_test.c | 385 ++++++- tools/testing/selftests/kvm/x86_64/tsc_msrs_test.c | 16 +- .../vmx_exception_with_invalid_guest_state.c | 2 +- .../selftests/kvm/x86_64/xapic_state_test.c | 55 + .../testing/selftests/kvm/x86_64/xen_shinfo_test.c | 15 +- tools/virtio/Makefile | 2 +- virt/kvm/Kconfig | 3 + virt/kvm/coalesced_mmio.c | 8 +- virt/kvm/kvm_main.c | 297 +++--- 278 files changed, 11565 insertions(+), 3852 deletions(-) create mode 100644 Documentation/driver-api/virtio/index.rst create mode 100644 Documentation/driver-api/virtio/virtio.rst create mode 100644 Documentation/driver-api/virtio/writing_virtio_drivers.rst create mode 100644 arch/arm64/include/asm/kvm_nested.h create mode 100644 arch/arm64/kvm/emulate-nested.c create mode 100644 arch/arm64/kvm/nested.c delete mode 100644 arch/mips/kvm/callback.c create mode 100644 arch/riscv/include/asm/kvm_vcpu_pmu.h create mode 100644 arch/riscv/kvm/vcpu_pmu.c create mode 100644 arch/riscv/kvm/vcpu_sbi_pmu.c create mode 100644 drivers/vdpa/mlx5/net/debug.c create mode 100644 drivers/vdpa/mlx5/net/mlx5_vnet.h create mode 100644 drivers/vdpa/solidrun/Makefile create mode 100644 drivers/vdpa/solidrun/snet_hwmon.c create mode 100644 drivers/vdpa/solidrun/snet_main.c create mode 100644 drivers/vdpa/solidrun/snet_vdpa.h create mode 100644 samples/vfio-mdev/README.rst create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_extended_hypercalls.c