This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 0d86c2395390 Merge tag 'ras_core_for_v6.15' of git://git.kernel.org/pub [...] new 751b3d8d886e m68k: sun3: Use str_read_write() helper in mmu_emu_handle_fault() new 723be3c6ab31 m68k: sun3: Fix DEBUG_MMU_EMU build new 3c4e4ec957b6 m68k: setup: Remove size argument when calling strscpy() new c94cf023dce3 m68k: defconfig: Update defconfigs for v6.14-rc1 new 27bd3ce4038b Merge tag 'm68k-for-v6.15-tag1' of git://git.kernel.org/pu [...] new 1c405b42171e LoongArch: KVM: Remove unnecessary header include path new 062ac0cb8383 LoongArch: KVM: Remove PGD saving during VM context switch new 6a16e448e551 LoongArch: KVM: Add stub for kvm_arch_vcpu_preempted_in_kernel() new 2bf463d7619a LoongArch: KVM: Implement arch-specific functions for guest perf new 6bfb3a715de9 LoongArch: KVM: Register perf callbacks for guest new e335300095c3 Merge tag 'loongarch-kvm-6.15' of git://git.kernel.org/pub [...] new 374ccd63600b KVM: Rename kvm_handle_hva_range() new aa34b811650c KVM: Allow lockless walk of SPTEs when handing aging mmu_n [...] new e29b74920e6f KVM: x86/mmu: Factor out spte atomic bit clearing routine new 61d65f2dc766 KVM: x86/mmu: Don't force atomic update if only the Access [...] new 928c54b1c4ca KVM: x86/mmu: Always update A/D-disabled SPTEs atomically new b146a9b34aed KVM: x86/mmu: Age TDP MMU SPTEs without holding mmu_lock new e25c2332346f KVM: x86/mmu: Skip shadow MMU test_young if TDP MMU report [...] new 8c403cf23119 KVM: x86/mmu: Only check gfn age in shadow MMU if indirect [...] new 9fb13ba6b5ff KVM: x86/mmu: Refactor low level rmap helpers to prep for [...] new 4834eaded91e KVM: x86/mmu: Add infrastructure to allow walking rmaps ou [...] new bb6c7749ccee KVM: x86/mmu: Add support for lockless walks of rmap SPTEs new af3b6a9eba48 KVM: x86/mmu: Walk rmaps (shadow MMU) without holding mmu_ [...] new 0dab791f05ce KVM: x86/tdp_mmu: Remove tdp_mmu_for_each_pte() new 4286a3ec2595 Merge tag 'kvm-x86-mmu-6.15' of https://github.com/kvm-x86 [...] new dfcbcd864edc KVM: x86: Remove unused iommu_domain and iommu_noncoherent [...] new 4cad9f87876a KVM: x86: Wake vCPU for PIC interrupt injection iff a vali [...] new 82c470121c7b KVM: x86: Use kvfree_rcu() to free old optimized APIC map new c9e5f3fa9039 KVM: x86: Introduce kvm_set_mp_state() new e9cb61055fee KVM: x86: Clear pv_unhalted on all transitions to KVM_MP_S [...] new a11128ce1636 KVM: x86/cpuid: add type suffix to decimal const 48 fix bu [...] new aa93b6f96f64 KVM: x86: Use for-loop to iterate over XSTATE size entries new 7e9f735e7ac4 KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vC [...] new a487f6797c88 KVM: x86: Query X86_FEATURE_MWAIT iff userspace owns the C [...] new 93da6af3ae56 KVM: x86: Defer runtime updates of dynamic CPUID bits unti [...] new f002a97ec8c9 KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on [...] new c8e612bfedff KVM: nSVM: Pass next RIP, not current RIP, for nested VM-E [...] new 3244616aac8d KVM: nVMX: Allow emulating RDPID on behalf of L2 new f43f7a215af0 KVM: nVMX: Emulate HLT in L2 if it's not intercepted new 08e3d89eb330 KVM: nVMX: Consolidate missing X86EMUL_INTERCEPTED logic i [...] new 407d03fe924c KVM: x86: Plumb the src/dst operand types through to .chec [...] new 9aeb9d8a6738 KVM: x86: Plumb the emulator's starting RIP into nested in [...] new d4aea23fd0ff KVM: x86: Add a #define for the architectural max instruct [...] new fbd1e0f19546 KVM: nVMX: Allow the caller to provide instruction length [...] new 79a14afc6090 KVM: nVMX: Synthesize nested VM-Exit for supported emulati [...] new 2428865bf0af KVM: selftests: Add a nested (forced) emulation intercept [...] new b9595d1ddef8 KVM: x86: Don't inject PV async #PF if SEND_ALWAYS=0 and g [...] new 4fa0efb43a78 KVM: x86: Rename and invert async #PF's send_user_only fla [...] new b50cb2b1555d KVM: x86: Use a dedicated flow for queueing re-injected ex [...] new 2a289aed3fcd KVM: x86: Always set mp_state to RUNNABLE on wakeup from HLT new e6c8728a8e2d KVM: x86: Remove the unreachable case for 0x80000022 leaf [...] new 4d9a677596af Merge tag 'kvm-x86-misc-6.15' of https://github.com/kvm-x8 [...] new 97d0d1655ea8 KVM: selftests: Fix typos in x86's PMU counter test's macr [...] new c76a92382805 KVM: selftests: Add defines for AMD PMU CPUID features and [...] new 3cd19f150ac6 KVM: selftests: Remove unneeded semicolon new bd7791078ac2 KVM: selftests: Add printf attribute to _no_printf() new 7803339fa929 KVM: selftests: Use data load to trigger LLC references/mi [...] new 983820cb53c0 KVM: selftests: Add helpers for locally (un)blocking IRQs on x86 new 933178ddf73a KVM: selftests: Make Intel arch events globally available [...] new 8752e2b4a2b7 KVM: selftests: Only validate counts for hardware-supporte [...] new e327630e2a0c KVM: selftests: Remove dead code in Intel PMU counters test new 0e6714735c01 KVM: selftests: Drop the "feature event" param from guest [...] new 54108e733444 KVM: selftests: Print out the actual Top-Down Slots count [...] new 9b47f288eb67 Merge tag 'kvm-x86-selftests_6.15-1' of https://github.com [...] new 89ea56a4043a KVM: selftests: Actually emit forced emulation prefix for [...] new fe49f8005257 KVM: selftests: Support multiple write retires in dirty_log_test new 67428ee7b746 KVM: selftests: Sync dirty_log_test iteration to guest *be [...] new ff0efc77bc96 KVM: selftests: Drop signal/kick from dirty ring testcase new 1230907864d7 KVM: selftests: Drop stale srandom() initialization from d [...] new af2d85d34d15 KVM: selftests: Precisely track number of dirty/clear page [...] new f2228aa08324 KVM: selftests: Read per-page value into local var when ve [...] new 9b1feec83e1a KVM: selftests: Continuously reap dirty ring while vCPU is [...] new deb8b8400e31 KVM: selftests: Limit dirty_log_test's s390x workaround to s390x new f3629c0ef167 KVM: selftests: Honor "stop" request in dirty ring test new 0a818b3541af KVM: selftests: Keep dirty_log_test vCPU in guest until it [...] new 9a91f6542435 KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_ [...] new c616f36a1002 KVM: selftests: Use continue to handle all "pass" scenario [...] new 24b9a2a61377 KVM: selftests: Print (previous) last_page on dirty page v [...] new d0bd72cb9160 KVM: selftests: Collect *all* dirty entries in each dirty_ [...] new 485e27ed208f KVM: sefltests: Verify value of dirty_log_test last page i [...] new 73eaa2aa14b7 KVM: selftests: Ensure guest writes min number of pages in [...] new 2020d3b77a5a KVM: selftests: Tighten checks around prev iter's last dir [...] new 2680dcfb34e2 KVM: selftests: Set per-iteration variables at the start o [...] new 7f225650e099 KVM: selftests: Fix an off-by-one in the number of dirty_l [...] new dae7d81e8d58 KVM: selftests: Allow running a single iteration of dirty_ [...] new fd546aba1967 KVM: selftests: Fix mostly theoretical leak of VM's binary [...] new f7f232a01f3d KVM: selftests: Close VM's binary stats FD when releasing VM new eead13d493af KVM: selftests: Assert that __vm_get_stat() actually finds a stat new b0c3f5df9291 KVM: selftests: Macrofy vm_get_stat() to auto-generate sta [...] new e65faf71bd54 KVM: selftests: Add struct and helpers to wrap binary stats cache new ea7179f99514 KVM: selftests: Get VM's binary stats FD when opening VM new 9b56532b8a59 KVM: selftests: Adjust number of files rlimit for all "sta [...] new 16fc7cb406a5 KVM: selftests: Add infrastructure for getting vCPU binary stats new 75418e222e30 KVM: selftests: Fix spelling mistake "UFFDIO_CONINUE" -> " [...] new 62838fa5eade KVM: selftests: Relax assertion on HLT exits if CPU suppor [...] new 783e9cd05cd0 Merge tag 'kvm-x86-selftests-6.15' of https://github.com/k [...] new 3ef0df3f760f KVM: VMX: Don't modify guest XFD_ERR if CR0.TS=1 new d62c02af7a96 KVM: VMX: Pass XFD_ERR as pseudo-payload when injecting #NM new fa6c8fc2d267 KVM: VMX: Remove EPT_VIOLATIONS_ACC_*_BIT defines new 61146f67e4cb KVM: nVMX: Decouple EPT RWX bits from EPT Violation protec [...] new 64c947a1cf35 KVM: VMX: Reject KVM_RUN if userspace forces emulation dur [...] new 0c3566b63de8 KVM: VMX: Extract checks on entry/exit control pairs to a [...] new a24dbf986b17 Merge tag 'kvm-x86-vmx-6.15' of https://github.com/kvm-x86 [...] new 8a01902a0168 KVM: SEV: Use to_kvm_sev_info() for fetching kvm_sev_info struct new f73542501f8c crypto: ccp: Add external API interface for PSP module ini [...] new a6136669da63 KVM: SVM: Ensure PSP module is initialized if KVM module i [...] new 7e066cb9b71a KVM: SEV: Use long-term pin when registering encrypted mem [...] new ea4c2f2f5ed3 KVM: SVM: Convert plain error code numbers to defines new c3392d0ab714 KVM: SVM: Provide helpers to set the error code new 70792aed1455 x86/cpufeatures: Add CPUID feature bit for Idle HLT intercept new fa662c908073 KVM: SVM: Add Idle HLT intercept support new d4b69c3d1471 KVM: SVM: Inject #GP if memory operand for INVPCID is non- [...] new 72d12715edcd KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest has [...] new d26638bfcdfc KVM: SVM: Don't change target vCPU state on AP Creation VM [...] new 745ff82199b1 KVM: SVM: Require AP's "requested" SEV_FEATURES to match K [...] new c6e129fb2ad2 KVM: SVM: Simplify request+kick logic in SNP AP Creation handling new 46332437e1c5 KVM: SVM: Use guard(mutex) to simplify SNP AP Creation err [...] new e268beee4a25 KVM: SVM: Mark VMCB dirty before processing incoming snp_vmsa_gpa new 5279d6f7e43d KVM: SVM: Use guard(mutex) to simplify SNP vCPU state updates new 4e96f010afb2 KVM: SVM: Invalidate "next" SNP VMSA GPA even on failure new 9b093f5b86fb Merge tag 'kvm-x86-svm-6.15' of https://github.com/kvm-x86 [...] new d9c5ed0a9b52 KVM: x86: Don't take kvm->lock when iterating over vCPUs i [...] new 4198f38aed24 KVM: x86: Eliminate "handling" of impossible errors during [...] new aceb04f571e9 KVM: x86: Drop local pvclock_flags variable in kvm_guest_t [...] new 6c4927a4b7b8 KVM: x86: Process "guest stopped request" once per guest t [...] new ca28aa63918b KVM: x86/xen: Use guest's copy of pvclock when starting timer new 24c166378026 KVM: x86: Don't bleed PVCLOCK_GUEST_STOPPED across PV clocks new 93fb0b10e712 KVM: x86: Set PVCLOCK_GUEST_STOPPED only for kvmclock, not [...] new 46aed4d4a7db KVM: x86: Pass reference pvclock as a param to kvm_setup_g [...] new 39d61b46adfd KVM: x86: Remove per-vCPU "cache" of its reference pvclock new 847d68abf10c KVM: x86: Setup Hyper-V TSC page before Xen PV clocks (dur [...] new 1b3c38050b5c KVM: x86: Override TSC_STABLE flag for Xen PV clocks in kv [...] new fcce7c1e7d39 Merge tag 'kvm-x86-pvclock-6.15' of https://github.com/kvm [...] new 3617c0ee7dec KVM: x86/xen: Only write Xen hypercall page for guest writ [...] new 5c17848134ab KVM: x86/xen: Restrict hypercall MSR to unofficial synthet [...] new bb0978d95a55 KVM: x86/xen: Add an #ifdef'd helper to detect writes to Xen MSR new a5d7700af6b0 KVM: x86/xen: Consult kvm_xen_enabled when checking for Xe [...] new 69e5a7dde965 KVM: x86/xen: Bury xen_hvm_config behind CONFIG_KVM_XEN=y new 26e228ec1695 KVM: x86/xen: Move kvm_xen_hvm_config field into kvm_xen new a2b00f85d783 KVM: x86: Update Xen TSC leaves during CPUID emulation new 3ecf162a3162 Merge tag 'kvm-x86-xen-6.15' of https://github.com/kvm-x86 [...] new bbb622488749 RISC-V: KVM: Disable the kernel perf counter during configure new 1f6bbe125560 KVM: riscv: selftests: Do not start the counter in the ove [...] new 4b506adfea90 KVM: riscv: selftests: Change command line option new ee4e778c5802 KVM: riscv: selftests: Allow number of interrupts to be co [...] new 2d117e67f318 RISC-V: KVM: Teardown riscv specific bits after kvm_exit new b3f263a98d30 RISC-V: KVM: Optimize comments in kvm_riscv_vcpu_isa_disab [...] new c0f99fb4e55d Merge tag 'kvm-riscv-6.15-1' of https://github.com/kvm-ris [...] new a0d7e2fc61ab KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs new d0b79563fd60 KVM: arm64: vgic-v4: Only WARN for HW IRQ mismatch when un [...] new 5c57533eb8c1 KVM: arm64: vgic-v4: Fall back to software irqbypass if LP [...] new d766d87cf4a0 KVM: arm64: Document ordering requirements for irqbypass new 250f25367b58 KVM: arm64: Tear down vGIC on failed vCPU creation new 3ed0dc03f65d Merge branch 'kvm-arm64/misc' into kvmarm/next new 22513c0d2ad8 arm64: sysreg: Add layout for ICH_HCR_EL2 new 5815fb82dc67 arm64: sysreg: Add layout for ICH_VTR_EL2 new b7a252e881f3 arm64: sysreg: Add layout for ICH_MISR_EL2 new 16abeb60be62 KVM: arm64: nv: Load timer before the GIC new 182f1596941e KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg new 96c2f03311de KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses new 21d29cd814d7 KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses new 146a050f2d8c KVM: arm64: nv: Nested GICv3 emulation new 4b1b97f0d7cf KVM: arm64: nv: Handle L2->L1 transition on interrupt injection new 201c8d40dde9 KVM: arm64: nv: Add Maintenance Interrupt emulation new 69c9176c3862 KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting new 93078ae63f20 KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2 new 7682c023212e KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts new 89896cc15911 KVM: arm64: nv: Fold GICv3 host trapping requirements into [...] new faf7714a47a2 KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ new 83c6cb20147b KVM: arm64: nv: Fail KVM init if asking for NV without GICv3 new 56e3e5c8f7ec Merge branch 'kvm-arm64/nv-vgic' into kvmarm/next new 88aea41b9bc5 arm64: cpufeature: Handle NV_frac as a synonym of NV2 new 9d6745572899 KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace new d9f943f76506 KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH [...] new 8f8d6084f5b5 KVM: arm64: Mark HCR.EL2.{NV*,AT} RES0 when ID_AA64MMFR4_E [...] new 2cd9542a375a KVM: arm64: Advertise NV2 in the boot messages new 57e7de2650c8 KVM: arm64: Consolidate idreg callbacks new 179fd7e30f04 KVM: arm64: Make ID_REG_LIMIT_FIELD_ENUM() more widely available new e7ef6ed4583e KVM: arm64: Enforce NV limits on a per-idregs basis new 94f296dcd6d9 KVM: arm64: Move NV-specific capping to idreg sanitisation new f83c41fb3ddd KVM: arm64: Allow userspace to limit NV support to nVHE new 642c23ea8b45 KVM: arm64: Make ID_AA64MMFR4_EL1.NV_frac writable new 8b0b98ebf34d KVM: arm64: Advertise FEAT_ECV when possible new 3f1e07275341 KVM: arm64: Allow userspace to write ID_AA64MMFR0_EL1.TGRAN*_2 new edfd826b8be7 KVM: arm64: selftests: Test that TGRAN*_2 fields are writable new 13f64f6d215c Merge branch 'kvm-arm64/nv-idregs' into kvmarm/next new e3121298c7fc arm64: Modify _midr_range() functions to read MIDR/REVIDR [...] new 57e5cc9b8a39 KVM: arm64: Specify hypercall ABI for retrieving target im [...] new c0000e58c74e KVM: arm64: Introduce KVM_REG_ARM_VENDOR_HYP_BMAP_2 new c8c2647e69be arm64: Make _midr_in_range_list() an exported function new 86edf6bdcf05 smccc/kvm_guest: Enable errata based on implementation CPUs new f69656656fa7 KVM: selftests: Add test for KVM_REG_ARM_VENDOR_HYP_BMAP_2 new 44ff44cadbd1 smccc: kvm_guest: Fix kernel builds for 32 bit arm new d300b0168ea8 Merge branch 'kvm-arm64/pv-cpuid' into kvmarm/next new 93b01528586b KVM: arm64: Compute PMCEID from arm_pmu's event bitmaps new ed335722b457 KVM: arm64: Always support SW_INCR PMU event new 6f34024d185e KVM: arm64: Use a cpucap to determine if system supports F [...] new a38b67d15183 KVM: arm64: Drop kvm_arm_pmu_available static key new 3d6d9172128e KVM: arm64: Use guard() to cleanup usage of arm_pmus_lock new 56290316a443 KVM: arm64: Move PMUVer filtering into KVM code new 2c433f70dccc KVM: arm64: Compute synthetic sysreg ESR for Apple PMUv3 traps new bed9b8ec8c71 KVM: arm64: Advertise PMUv3 if IMPDEF traps are present new 1e7dcbfa4b7c KVM: arm64: Remap PMUv3 events onto hardware new 2d00cab849be drivers/perf: apple_m1: Provide helper for mapping PMUv3 events new 1b92e65f5006 KVM: arm64: Provide 1 event counter on IMPDEF hardware new e1231aacb065 arm64: Enable IMP DEF PMUv3 traps on Apple M* new 1b1d1b17b877 Merge branch 'kvm-arm64/pmuv3-asahi' into kvmarm/next new 4cd48565b0e5 KVM: arm64: Set HCR_EL2.TID1 unconditionally new b4043e7cb78b KVM: arm64: Maintain per-VM copy of implementation ID regs new d0d81e03e629 KVM: arm64: Load VPIDR_EL2 with the VM's MIDR_EL1 value new 3adaee783061 KVM: arm64: Allow userspace to change the implementation I [...] new a88c7c224479 KVM: selftests: arm64: Test writes to MIDR,REVIDR,AIDR new 9d9122736433 KVM: arm64: Copy guest CTR_EL0 into hyp VM new 03e1b89d051f KVM: arm64: Copy MIDR_EL1 into hyp VM when it is writable new 5980a6937012 KVM: arm64: Fix documentation for KVM_CAP_ARM_WRITABLE_IMP [...] new 4f2774c57a3e Merge branch 'kvm-arm64/writable-midr' into kvmarm/next new cf2d228da9a8 KVM: arm64: Add flags to kvm_hyp_memcache new 8c0d7d14c5cd KVM: arm64: Distinct pKVM teardown memcache for stage-2 new 79ea66231599 KVM: arm64: Count pKVM stage-2 usage in secondary pagetable stats new 44f979bf434e KVM: arm64: Factor out setting HCRX_EL2 traps into separat [...] new 066daa8d3bc2 KVM: arm64: Initialize HCRX_EL2 traps in pKVM new 8b21fb47c778 KVM: arm64: Factor out pKVM hyp vcpu creation to separate [...] new 1eab115486c5 KVM: arm64: Create each pKVM hyp vcpu after its correspond [...] new ca19dd4323fa Merge branch 'kvm-arm64/pkvm-6.15' into kvmarm/next new f2aeb7bbd574 KVM: arm64: PMU: Set raw values from user to PM{C,I}NTEN{S [...] new be5ccac3f15e KVM: arm64: PMU: Assume PMU presence in pmu-emul.c new 64074ca8ca92 KVM: arm64: PMU: Fix SET_ONE_REG for vPMC regs new 1db4aaa05589 KVM: arm64: PMU: Reload when user modifies registers new fe53538069bb KVM: arm64: PMU: Reload when resetting new 369c0122682c Merge branch 'kvm-arm64/pmu-fixes' into kvmarm/next new 0afd104fb352 Merge tag 'kvmarm-6.15' of https://git.kernel.org/pub/scm/ [...] new ed09b50b5411 KVM: x86: Don't load/put vCPU when unloading its MMU durin [...] new ed8f966331d6 KVM: Assert that a destroyed/freed vCPU is no longer visible new e447212593a0 KVM: x86: Unload MMUs during vCPU destruction, not before new fd21732682e2 KVM: x86: Fold guts of kvm_arch_sync_events() into kvm_arc [...] new b2aba529bf77 KVM: Drop kvm_arch_sync_events() now that all implementati [...] new 361da275e5ce Merge branch 'kvm-nvmx-and-vm-teardown' into HEAD new 46c49372e10e KVM: x86: move vm_destroy callback at end of kvm_arch_destroy_vm new 5f3b30b2b0d9 KVM: x86: Push down setting vcpu.arch.user_set_tsc new adafea110600 KVM: x86: Add infrastructure for secure TSC new 74c1807f6c4f KVM: x86: block KVM_CAP_SYNC_REGS if guest state is protected new 782f9feaa951 Merge branch 'kvm-pre-tdx' into HEAD new edb0e8f6e2e1 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...] new 2356f15caefc xen: Add support for XenServer 6.1 platform device new 1c3dfc7c6b0f xen/mcelog: Add __nonstring annotations for unterminated strings new 5c4e79e29a9f xenfs/xensyms: respect hypervisor's "next" indication new 421d62f47b7a xen/pciback: Remove unused pcistub_get_pci_dev new 5ccf1b8ae76d xen/pci: Do not register devices with segments >= 0x10000 new 6c4d5aadf5df PCI: vmd: Disable MSI remapping bypass under Xen new c3164d2e0d18 PCI/MSI: Convert pci_msi_ignore_mask to per MSI domain flag new dce3ab4c57e6 Merge tag 'for-linus-6.15-rc1-tag' of git://git.kernel.org [...] new e96204e5e96e hyperv: Move hv_current_partition_id to arch-generic code new 0222eb30a357 hyperv: Move arch/x86/hyperv/hv_proc.c to drivers/hv new 7c0db8a4f59d cpu: export lockdep_assert_cpus_held() new 5e4304ff8cd9 drivers/hv: introduce vmbus_channel_set_cpu() new 3a7f7785eae7 drivers/hv: add CPU offlining support new 9d8731a1757b hyperv: Convert hypercall statuses to linux error codes new db912b8954c2 hyperv: Change hv_root_partition into a function new 461fbbd036b1 hyperv: Add CONFIG_MSHV_ROOT to gate root partition support new fe1426269552 hyperv: Remove unused union and structs new ced518ad55b4 x86/hyperv: Add VTL mode emergency restart callback new 07b74192e617 x86/hyperv: Add VTL mode callback for restarting the system new e792d843aa3c x86/hyperv: Fix check of return value from snp_set_vmsa() new 3817854ba892 hyperv: Log hypercall status codes as strings new 8cac51796ecb x86/mshyperv: Add support for extended Hyper-V features new feba84c2c981 arm64/hyperv: Add some missing functions to arm64 new af37bc759f10 hyperv: Introduce hv_recommend_using_aeoi() new 4ee23f3a4a46 acpi: numa: Export node_to_pxm() new 21050f619720 Drivers: hv: Export some functions for use by root partiti [...] new 04df7ac39943 Drivers: hv: Introduce per-cpu event ring tail new e2575ffe57ac x86: hyperv: Add mshv_handler() irq handler and setup function new 0bd921a4b4d9 hyperv: Add definitions for root partition driver to hv headers new 621191d709b1 Drivers: hv: Introduce mshv_root module to expose /dev/msh [...] new 999ad14259a0 x86/hyperv: Add comments about hv_vpset and var size hyper [...] new 628cc040b3a2 x86/hyperv: fix an indentation issue in mshyperv.h new a5b3d8660b04 Merge tag 'hyperv-next-signed-20250324' of git://git.kerne [...]
The 276 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/userspace-api/ioctl/ioctl-number.rst | 2 + Documentation/virt/kvm/api.rst | 22 + Documentation/virt/kvm/arm/fw-pseudo-registers.rst | 15 +- Documentation/virt/kvm/arm/hypercalls.rst | 59 + Documentation/virt/kvm/devices/arm-vgic-its.rst | 5 +- Documentation/virt/kvm/devices/arm-vgic-v3.rst | 12 +- Documentation/virt/kvm/locking.rst | 4 +- arch/arm64/hyperv/hv_core.c | 17 + arch/arm64/hyperv/mshyperv.c | 6 + arch/arm64/include/asm/cpucaps.h | 2 + arch/arm64/include/asm/cpufeature.h | 28 +- arch/arm64/include/asm/cputype.h | 40 +- arch/arm64/include/asm/hypervisor.h | 1 + arch/arm64/include/asm/kvm_arm.h | 4 +- arch/arm64/include/asm/kvm_emulate.h | 37 + arch/arm64/include/asm/kvm_host.h | 67 +- arch/arm64/include/asm/kvm_hyp.h | 2 + arch/arm64/include/asm/kvm_nested.h | 1 + arch/arm64/include/asm/kvm_pkvm.h | 1 + arch/arm64/include/asm/mmu.h | 3 +- arch/arm64/include/asm/mshyperv.h | 13 + arch/arm64/include/asm/sysreg.h | 30 - arch/arm64/include/uapi/asm/kvm.h | 14 + arch/arm64/kernel/cpu_errata.c | 117 +- arch/arm64/kernel/cpufeature.c | 53 +- arch/arm64/kernel/image-vars.h | 6 +- arch/arm64/kernel/proton-pack.c | 20 +- arch/arm64/kvm/Makefile | 2 +- arch/arm64/kvm/arm.c | 76 +- arch/arm64/kvm/emulate-nested.c | 24 +- arch/arm64/kvm/handle_exit.c | 6 +- arch/arm64/kvm/hyp/include/hyp/switch.h | 4 +- arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h | 14 +- arch/arm64/kvm/hyp/include/nvhe/mem_protect.h | 2 +- arch/arm64/kvm/hyp/include/nvhe/pkvm.h | 6 - arch/arm64/kvm/hyp/nvhe/mem_protect.c | 2 +- arch/arm64/kvm/hyp/nvhe/pkvm.c | 79 +- arch/arm64/kvm/hyp/nvhe/sysreg-sr.c | 4 +- arch/arm64/kvm/hyp/vgic-v3-sr.c | 16 +- arch/arm64/kvm/hyp/vhe/switch.c | 22 + arch/arm64/kvm/hyp/vhe/sysreg-sr.c | 28 +- arch/arm64/kvm/hypercalls.c | 13 + arch/arm64/kvm/mmu.c | 22 +- arch/arm64/kvm/nested.c | 298 +-- arch/arm64/kvm/pkvm.c | 75 +- arch/arm64/kvm/pmu-emul.c | 194 +- arch/arm64/kvm/pmu.c | 10 +- arch/arm64/kvm/reset.c | 3 - arch/arm64/kvm/sys_regs.c | 478 ++-- arch/arm64/kvm/sys_regs.h | 10 + arch/arm64/kvm/vgic-sys-reg-v3.c | 8 +- arch/arm64/kvm/vgic/vgic-init.c | 29 + arch/arm64/kvm/vgic/vgic-kvm-device.c | 29 +- arch/arm64/kvm/vgic/vgic-v3-nested.c | 409 ++++ arch/arm64/kvm/vgic/vgic-v3.c | 46 +- arch/arm64/kvm/vgic/vgic-v4.c | 35 +- arch/arm64/kvm/vgic/vgic.c | 38 + arch/arm64/kvm/vgic/vgic.h | 6 + arch/arm64/tools/cpucaps | 2 + arch/arm64/tools/sysreg | 48 + arch/loongarch/include/asm/kvm_host.h | 7 +- arch/loongarch/kernel/asm-offsets.c | 1 + arch/loongarch/kvm/Kconfig | 1 + arch/loongarch/kvm/Makefile | 2 - arch/loongarch/kvm/main.c | 3 + arch/loongarch/kvm/switch.S | 12 +- arch/loongarch/kvm/vcpu.c | 37 + arch/m68k/configs/amiga_defconfig | 2 +- arch/m68k/configs/apollo_defconfig | 2 +- arch/m68k/configs/atari_defconfig | 2 +- arch/m68k/configs/bvme6000_defconfig | 2 +- arch/m68k/configs/hp300_defconfig | 2 +- arch/m68k/configs/mac_defconfig | 2 +- arch/m68k/configs/multi_defconfig | 2 +- arch/m68k/configs/mvme147_defconfig | 2 +- arch/m68k/configs/mvme16x_defconfig | 2 +- arch/m68k/configs/q40_defconfig | 2 +- arch/m68k/configs/sun3_defconfig | 2 +- arch/m68k/configs/sun3x_defconfig | 2 +- arch/m68k/include/asm/processor.h | 14 + arch/m68k/kernel/setup_mm.c | 3 +- arch/m68k/sun3/mmu_emu.c | 7 +- arch/mips/include/asm/kvm_host.h | 1 - arch/powerpc/include/asm/kvm_host.h | 1 - arch/riscv/include/asm/kvm_host.h | 2 - arch/riscv/kvm/main.c | 4 +- arch/riscv/kvm/vcpu_onereg.c | 2 +- arch/riscv/kvm/vcpu_pmu.c | 1 + arch/s390/include/asm/kvm_host.h | 1 - arch/x86/hyperv/Makefile | 2 +- arch/x86/hyperv/hv_apic.c | 5 + arch/x86/hyperv/hv_init.c | 35 +- arch/x86/hyperv/hv_vtl.c | 34 + arch/x86/hyperv/irqdomain.c | 6 +- arch/x86/hyperv/ivm.c | 2 +- arch/x86/hyperv/mmu.c | 4 + arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/kvm_host.h | 21 +- arch/x86/include/asm/mshyperv.h | 8 +- arch/x86/include/asm/sev-common.h | 12 +- arch/x86/include/asm/svm.h | 5 +- arch/x86/include/asm/vmx.h | 28 +- arch/x86/include/uapi/asm/kvm.h | 3 + arch/x86/include/uapi/asm/svm.h | 2 + arch/x86/kernel/cpu/mshyperv.c | 40 +- arch/x86/kvm/Kconfig | 1 + arch/x86/kvm/cpuid.c | 70 +- arch/x86/kvm/cpuid.h | 9 +- arch/x86/kvm/emulate.c | 5 +- arch/x86/kvm/i8259.c | 2 +- arch/x86/kvm/kvm_emulate.h | 7 +- arch/x86/kvm/lapic.c | 17 +- arch/x86/kvm/mmu/mmu.c | 365 +++- arch/x86/kvm/mmu/paging_tmpl.h | 3 +- arch/x86/kvm/mmu/spte.c | 31 +- arch/x86/kvm/mmu/spte.h | 2 +- arch/x86/kvm/mmu/tdp_iter.h | 34 +- arch/x86/kvm/mmu/tdp_mmu.c | 45 +- arch/x86/kvm/smm.c | 2 +- arch/x86/kvm/svm/nested.c | 2 +- arch/x86/kvm/svm/sev.c | 373 ++-- arch/x86/kvm/svm/svm.c | 56 +- arch/x86/kvm/svm/svm.h | 39 +- arch/x86/kvm/trace.h | 14 +- arch/x86/kvm/vmx/nested.c | 18 +- arch/x86/kvm/vmx/nested.h | 22 +- arch/x86/kvm/vmx/vmx.c | 224 +- arch/x86/kvm/x86.c | 342 +-- arch/x86/kvm/x86.h | 8 + arch/x86/kvm/xen.c | 121 +- arch/x86/kvm/xen.h | 30 +- arch/x86/pci/xen.c | 8 +- drivers/acpi/numa/srat.c | 1 + drivers/clocksource/arm_arch_timer.c | 2 +- drivers/clocksource/hyperv_timer.c | 4 +- drivers/firmware/smccc/kvm_guest.c | 66 + drivers/hv/Kconfig | 17 + drivers/hv/Makefile | 4 + drivers/hv/hv.c | 94 +- drivers/hv/hv_common.c | 198 +- {arch/x86/hyperv => drivers/hv}/hv_proc.c | 27 +- drivers/hv/mshv.h | 30 + drivers/hv/mshv_common.c | 161 ++ drivers/hv/mshv_eventfd.c | 833 +++++++ drivers/hv/mshv_eventfd.h | 71 + drivers/hv/mshv_irq.c | 124 ++ drivers/hv/mshv_portid_table.c | 83 + drivers/hv/mshv_root.h | 311 +++ drivers/hv/mshv_root_hv_call.c | 849 +++++++ drivers/hv/mshv_root_main.c | 2307 ++++++++++++++++++++ drivers/hv/mshv_synic.c | 665 ++++++ drivers/hv/vmbus_drv.c | 54 +- drivers/hwtracing/coresight/coresight-etm4x-core.c | 2 +- drivers/iommu/hyperv-iommu.c | 8 +- drivers/irqchip/irq-apple-aic.c | 8 +- drivers/pci/controller/vmd.c | 20 + drivers/pci/msi/msi.c | 37 +- drivers/perf/apple_m1_cpu_pmu.c | 35 + drivers/xen/pci.c | 32 + drivers/xen/platform-pci.c | 4 + drivers/xen/xen-pciback/pci_stub.c | 20 - drivers/xen/xen-pciback/pciback.h | 2 - drivers/xen/xenfs/xensyms.c | 4 +- include/asm-generic/mshyperv.h | 72 +- include/hyperv/hvgdk_mini.h | 83 +- include/hyperv/hvhdk.h | 132 +- include/hyperv/hvhdk_mini.h | 91 + include/kvm/arm_pmu.h | 17 +- include/kvm/arm_vgic.h | 10 + include/linux/arm-smccc.h | 15 + include/linux/hyperv.h | 57 +- include/linux/kvm_host.h | 2 +- include/linux/msi.h | 3 +- include/linux/perf/arm_pmu.h | 4 + include/uapi/linux/kvm.h | 1 + include/uapi/linux/mshv.h | 291 +++ include/xen/interface/xen-mca.h | 2 +- kernel/cpu.c | 1 + kernel/irq/msi.c | 2 +- tools/arch/arm/include/uapi/asm/kvm.h | 1 + tools/arch/arm64/include/asm/sysreg.h | 30 - tools/arch/arm64/include/uapi/asm/kvm.h | 12 + tools/testing/selftests/kvm/Makefile.kvm | 1 + .../selftests/kvm/access_tracking_perf_test.c | 2 +- tools/testing/selftests/kvm/arm64/get-reg-list.c | 1 + tools/testing/selftests/kvm/arm64/hypercalls.c | 46 +- tools/testing/selftests/kvm/arm64/set_id_regs.c | 40 +- tools/testing/selftests/kvm/dirty_log_test.c | 523 +++-- tools/testing/selftests/kvm/include/kvm_util.h | 33 +- tools/testing/selftests/kvm/include/test_util.h | 2 +- .../testing/selftests/kvm/include/x86/processor.h | 50 +- tools/testing/selftests/kvm/kvm_create_max_vcpus.c | 28 +- tools/testing/selftests/kvm/lib/kvm_util.c | 114 +- tools/testing/selftests/kvm/lib/userfaultfd_util.c | 2 +- tools/testing/selftests/kvm/riscv/sbi_pmu_test.c | 81 +- .../kvm/x86/dirty_log_page_splitting_test.c | 6 +- tools/testing/selftests/kvm/x86/hyperv_ipi.c | 6 +- .../selftests/kvm/x86/nested_emulation_test.c | 146 ++ .../testing/selftests/kvm/x86/nx_huge_pages_test.c | 4 +- .../testing/selftests/kvm/x86/pmu_counters_test.c | 158 +- tools/testing/selftests/kvm/x86/svm_int_ctl_test.c | 5 +- .../selftests/kvm/x86/ucna_injection_test.c | 2 +- tools/testing/selftests/kvm/x86/xapic_ipi_test.c | 16 +- tools/testing/selftests/kvm/x86/xapic_state_test.c | 4 +- tools/testing/selftests/kvm/x86/xen_shinfo_test.c | 5 +- virt/kvm/Kconfig | 4 + virt/kvm/kvm_main.c | 64 +- 207 files changed, 10755 insertions(+), 2287 deletions(-) create mode 100644 arch/arm64/kvm/vgic/vgic-v3-nested.c rename {arch/x86/hyperv => drivers/hv}/hv_proc.c (90%) create mode 100644 drivers/hv/mshv.h create mode 100644 drivers/hv/mshv_common.c create mode 100644 drivers/hv/mshv_eventfd.c create mode 100644 drivers/hv/mshv_eventfd.h create mode 100644 drivers/hv/mshv_irq.c create mode 100644 drivers/hv/mshv_portid_table.c create mode 100644 drivers/hv/mshv_root.h create mode 100644 drivers/hv/mshv_root_hv_call.c create mode 100644 drivers/hv/mshv_root_main.c create mode 100644 drivers/hv/mshv_synic.c create mode 100644 include/uapi/linux/mshv.h create mode 100644 tools/testing/selftests/kvm/x86/nested_emulation_test.c