This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 057b40f43ce4 Merge tag 'acpi-6.2-rc1-2' of git://git.kernel.org/pub/scm [...] new 0b9ca98b7229 perf/x86/core: Zero @lbr instead of returning -1 in x86_pe [...] new bec46859fb9d KVM: x86: Track supported PERF_CAPABILITIES in kvm_caps new 6c6f82bea96f KVM: x86: Init vcpu->arch.perf_capabilities in common x86 code new 5fe9805dc2f5 KVM: x86: Handle PERF_CAPABILITIES in common x86's kvm_get [...] new 686e0f0324f0 KVM: x86: Directly query supported PERF_CAPABILITIES for W [...] new 0f9edb8cab29 KVM: x86: remove obsolete kvm_mmu_gva_to_gpa_fetch() new fa3e42037ef5 KVM: x86/mmu: fix some comment typos new 3adbdf810388 KVM: x86/mmu: use helper macro SPTE_ENT_PER_PAGE new bb5c8abea094 KVM: x86: Insert "AMD" in KVM_X86_FEATURE_PSFD new 00009406f0db x86/kvm: Remove unused virt to phys translation in kvm_gue [...] new 07a368b3f55a bug: introduce ASSERT_STRUCT_OFFSET new d08b48585309 KVM: SVM: Name and check reserved fields with structs offset new b0b42197b5c6 KVM: x86: start moving SMM-related functions to new files new c53da4f3af6e KVM: x86: move SMM entry to a new file new f1554150d3c6 KVM: x86: move SMM exit to a new file new 1d0da94cdafe KVM: x86: do not go through ctxt->ops when emulating rsm new 4b8e1b32013d KVM: allow compiling out SMM support new 31e83e21cf00 KVM: x86: compile out vendor-specific code if SMM is disabled new ba97bb07e0b2 KVM: x86: remove SMRAM address space if SMM is not supported new cf7316d0361c KVM: x86: do not define KVM_REQ_SMI if SMM disabled new 85672346a707 KVM: zero output of KVM_GET_VCPU_EVENTS before filling in [...] new a7662aa5e56f KVM: x86: do not define SMM-related constants if SMM disabled new 89dccf82e99e KVM: x86: smm: check for failures on smm entry new 09779c16e3ed KVM: x86: smm: add structs for KVM's smram layout new 58c1d206d545 KVM: x86: smm: use smram structs in the common code new f34bdf4c1707 KVM: x86: smm: use smram struct for 32 bit smram load/restore new 8bcda1dee95a KVM: x86: smm: use smram struct for 64 bit smram load/restore new e6a82199b610 KVM: svm: drop explicit return value of kvm_vcpu_map new dd5045fed588 KVM: x86: SVM: use smram structs new 95504c7c981b KVM: x86: SVM: don't save SVM state to SMRAM when VM is no [...] new fb28875fd7da KVM: x86: smm: preserve interrupt shadow in SMRAM new 93c5c61d9e58 mm/gup: Add FOLL_INTERRUPTIBLE new fe5ed56c7973 kvm: Add KVM_PFN_ERR_SIGPENDING new c8b88b332bed kvm: Add interruptible flag to __gfn_to_pfn_memslot() new 766576874b97 kvm: x86: Allow to respond to generic signals during slow PF new be83794210e7 KVM: x86: Disallow the use of KVM_MSR_FILTER_DEFAULT_ALLOW [...] new db205f7e1edc KVM: x86: Add a VALID_MASK for the MSR exit reason flags new c1340fe3590e KVM: x86: Add a VALID_MASK for the flag in kvm_msr_filter new 8aff460f2167 KVM: x86: Add a VALID_MASK for the flags in kvm_msr_filter_range new f7d647727123 selftests: kvm/x86: Test the flags in MSR filtering and MS [...] new 428e921611bc KVM: x86/mmu: Tag disallowed NX huge pages even if they're [...] new 55c510e26ab6 KVM: x86/mmu: Rename NX huge pages fields/functions for co [...] new b5b0977f4aa2 KVM: x86/mmu: Properly account NX huge page workaround for [...] new 61f94478547b KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU befor [...] new d25ceb926436 KVM: x86/mmu: Track the number of TDP MMU pages, but not t [...] new 5e3edd7e8b7e KVM: x86/mmu: Add helper to convert SPTE value to its shadow page new 76901e56fb51 KVM: x86/mmu: explicitly check nx_hugepage in disallowed_h [...] new 3a0567572225 KVM: x86/mmu: WARN if TDP MMU SP disallows hugepage after [...] new f1c5651fda43 KVM: x86/pmu: Force reprogramming of all counters on PMU f [...] new dcbb816a2842 KVM: x86/pmu: Clear "reprogram" bit if counter is disabled [...] new 68fb4757e867 KVM: x86/pmu: Defer reprogram_counter() to kvm_pmu_handle_event() new de0f619564f4 KVM: x86/pmu: Defer counter emulated overflow via pmc->pre [...] new d663b8a28598 KVM: replace direct irq.h inclusion new c5c4f72ad4fa KVM: selftests: Add missing break between -e and -g option [...] new 0eb88a412186 KVM: selftests: Put command line options in alphabetical o [...] new 018ea2d71a43 KVM: selftests: Add atoi_paranoid() to catch errors missed [...] new 69a62e2004b8 KVM: selftests: Use SZ_* macros from sizes.h in max_guest_ [...] new c15bdebb32dd KVM: selftests: Shorten the test args in memslot_modificat [...] new 0001725d0f9b KVM: selftests: Add atoi_positive() and atoi_non_negative( [...] new d886724ea81c KVM: selftests: Allowing running dirty_log_perf_test on sp [...] new b31f21a7e97e KVM: selftests: implement random number generator for guest code new f11aa24bdbc6 KVM: selftests: create -r argument to specify random seed new 6864c6442f4d KVM: selftests: randomize which pages are written vs read new c967a4752ac6 KVM: selftests: randomize page access order new 9fda6753c9dd KVM: selftests: Rename perf_test_util.[ch] to memstress.[ch] new a008a3351fea KVM: selftests: Rename pta (short for perf_test_args) to args new 7812d80c0f89 KVM: selftests: Rename perf_test_util symbols to memstress new 1cec8bbc1764 KVM: arm64: selftests: Disable single-step with correct KV [...] new b3d937722de0 KVM: arm64: selftests: Disable single-step without relying [...] new 7046638192d5 KVM: selftests: Consolidate common code for populating uca [...] new ef38871eb228 KVM: selftests: Consolidate boilerplate code in get_ucall() new dc88244bf548 KVM: selftests: Automatically do init_ucall() for non-bare [...] new cf4694be2b2c tools: Add atomic_test_and_set_bit() new 03b4750533fc KVM: selftests: Make arm64's MMIO ucall multi-VM friendly new 28a65567acb5 KVM: selftests: Drop now-unnecessary ucall_uninit() new 426729b2cf2e KVM: selftests: Add ucall pool based implementation new 9a6418dacd24 KVM: selftests: Fix spelling mistake "begining" -> "beginning" new 816c54b74742 KVM: selftests: Drop helpers to read/write page table entries new 751f280017b6 KVM: selftests: Drop reserved bit checks from PTE accessor new 91add12d384c KVM: selftests: Remove useless shifts when creating guest [...] new ed0b58fc6f0b KVM: selftests: Verify parent PTE is PRESENT when getting [...] new 99d51c6eef2d KVM: selftests: Use virt_get_pte() when getting PTE pointer new efe91dc307d0 KVM: selftests: Use vm_get_page_table_entry() in addr_arch [...] new 96b69958c77d KVM: selftests: Play nice with huge pages when getting PTEs/GPAs new 197ebb713ad0 KVM: selftests: move common startup logic to kvm_util.c new e1ab31245c4e KVM: selftests: Add arch specific initialization new 2115713cfab0 KVM: selftests: Add arch specific post vm creation hook new 376bc1b458c9 KVM: selftests: Don't assume vcpu->id is '0' in xAPIC state test new 52d3a4fb5be1 KVM: selftests: Rename emulator_error_test to smaller_maxp [...] new 48e59373398a KVM: selftests: Explicitly require instructions bytes new 50824c6eee39 KVM: selftests: Delete dead ucall code new 19a2b32f5d24 KVM: selftests: Move flds instruction emulation failure ha [...] new d6ecfe976ac3 KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks new 77f7813cc2b9 KVM: selftests: Copy KVM PFERR masks into selftests new f2e5b53b4ba9 KVM: selftests: Avoid JMP in non-faulting path of KVM_ASM_SAFE() new b9635930f0a7 KVM: selftests: Provide error code as a KVM_ASM_SAFE() output new a323845d6c3d KVM: selftests: Expect #PF(RSVD) when TDP is disabled new 3ae5b759c3c0 KVM: selftests: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE new 3bd396353d18 KVM: selftests: Add X86_FEATURE_PAE and use it calc "fallb [...] new ee3795536664 KVM: selftests: Refactor X86_FEATURE_* framework to prep f [...] new 53a7dc0f215e KVM: selftests: Add X86_PROPERTY_* framework to retrieve C [...] new d80ddad2a8e0 KVM: selftests: Use X86_PROPERTY_MAX_KVM_LEAF in CPUID test new a29e6e383b0d KVM: selftests: Refactor kvm_cpuid_has() to prep for X86_P [...] new 40854713e325 KVM: selftests: Add kvm_cpu_*() support for X86_PROPERTY_* new 5dc19f1c7dd3 KVM: selftests: Convert AMX test to use X86_PROPRETY_XXX new 4feb9d21a407 KVM: selftests: Convert vmx_pmu_caps_test to use X86_PROPERTY_* new 5228c02a4c54 KVM: selftests: Add PMU feature framework, use in PMU even [...] new 24f3f9898e3c KVM: selftests: Add dedicated helpers for getting x86 Fami [...] new 074e9d4c9c60 KVM: selftests: Add and use KVM helpers for x86 Family and Model new b941ba2380cc KVM: selftests: Drop helpers for getting specific KVM supp [...] new ecb89a51724b KVM: selftests: Check for KVM nEPT support using "feature" MSRs new 5c107f7085f4 KVM: selftests: Assert in prepare_eptp() that nEPT is supported new 92292c1de21d Merge tag 'kvm-selftests-6.2-1' of https://github.com/kvm- [...] new c4b33d28ea51 KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault new 63d28a25e04c KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has [...] new eb298605705a KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages new 771a579c6e74 Merge branch 'kvm-svm-harden' into HEAD new 6c7b2202e4d1 KVM: x86: avoid memslot check in NX hugepage recovery if i [...] new 089fe572a2e0 x86/hyperv: Move VMCB enlightenment definitions to hyperv-tlfs.h new 381fc63ac075 KVM: selftests: Move "struct hv_enlightenments" to x86_64/svm.h new 68ae7c7bc56a KVM: SVM: Add a proper field for Hyper-V VMCB enlightenments new 26b516bb3921 x86/hyperv: KVM: Rename "hv_enlightenments" to "hv_vmcb_en [...] new b83237ad2167 KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tl [...] new a789aeba4196 KVM: VMX: Rename "vmx/evmcs.{ch}" to "vmx/hyperv.{ch}" new e94cea093019 KVM: x86: Move clearing of TLB_FLUSH_CURRENT to kvm_vcpu_f [...] new adc43caa0a25 KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag new 0823570f0198 KVM: x86: hyper-v: Introduce TLB flush fifo new 56b5354fd8f9 KVM: x86: hyper-v: Add helper to read hypercall data for array new 260970862c88 KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIS [...] new f84fcb66568c KVM: x86: hyper-v: Expose support for extended gva ranges [...] new aee738236dca KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs new bd19c94a19b0 x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PE [...] new ca7372aca7f4 KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_P [...] new b6c2c22fa701 KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in [...] new 53ca765a041d KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush new 7d5e88d301f8 KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_ [...] new 38edb4523183 KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use new e45aa2444d28 KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id new b0c9c25e4625 KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_f [...] new 3c9eb0655fc0 KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall() new c58a318f6090 KVM: x86: hyper-v: L2 TLB flush new d4baf1a9a572 KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tl [...] new 046f5756c491 KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv' new c30e9bc8b606 KVM: nVMX: hyper-v: Enable L2 TLB flush new b415d8d417bb KVM: x86: Make kvm_hv_get_assist_page() return 0/-errno new 3f4a812edf5c KVM: nSVM: hyper-v: Enable L2 TLB flush new f4de6a1fa3ee KVM: x86: Expose Hyper-V L2 TLB flush feature new 676a863ce605 KVM: selftests: Better XMM read/write helpers new c05a0a71c5d0 KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a co [...] new caf4110fbaa8 KVM: selftests: Move the function doing Hyper-V hypercall [...] new 998489245d84 KVM: selftests: Hyper-V PV IPI selftest new 56fc7732031d KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_m [...] new 2d4a5f91837f KVM: selftests: Export vm_vaddr_unused_gap() to make it po [...] new 9e7726a8a08a KVM: selftests: Hyper-V PV TLB flush selftest new 1ad51c0c0cdd KVM: selftests: Sync 'struct hv_enlightened_vmcs' definiti [...] new d7b14a868ac2 KVM: selftests: Sync 'struct hv_vp_assist_page' definition [...] new e8f3d23c02d0 KVM: selftests: Move Hyper-V VP assist page enablement out [...] new cd8f11bd6bbd KVM: selftests: Split off load_evmcs() from load_vmcs() new 2dc458b86221 KVM: selftests: Create a vendor independent helper to allo [...] new 6c15c3c46520 KVM: selftests: Allocate Hyper-V partition assist page new 8fda37cf3d41 KVM: selftests: Stuff RAX/RCX with 'safe' values in vmmcal [...] new 75ee7505feae KVM: selftests: Introduce rdmsr_from_l2() and use it for M [...] new 4b5d8b222bf1 KVM: selftests: evmcs_test: Introduce L2 TLB flush test new 9c2e881945dc KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test new 0fa32dad1e78 KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs' new 79268e9c62ec Merge branch 'kvm-dwmw2-fixes' into HEAD new 3ca9d84e722e KVM: always declare prototype for kvm_arch_irqchip_in_kernel new c3f3719952b9 KVM: x86/xen: Add CPL to Xen hypercall tracepoint new 7927e27549d3 MAINTAINERS: Add KVM x86/xen maintainer list new c4690d016182 KVM: x86: Add BUILD_BUG_ON() to detect bad usage of "scatt [...] new 047c72299061 KVM: x86: Update KVM-only leaf handling to allow for 100% [...] new 6a19d7aa5821 x86: KVM: Advertise CMPccXADD CPUID to user space new af2872f62254 x86: KVM: Advertise AMX-FP16 CPUID to user space new 5e85c4ebf206 x86: KVM: Advertise AVX-IFMA CPUID to user space new 24d74b9f5f2a KVM: x86: Advertise AVX-VNNI-INT8 CPUID to user space new 9977f0877de7 KVM: x86: Advertise AVX-NE-CONVERT CPUID to user space new 29c46979b25d KVM: x86: Advertise PREFETCHIT0/1 CPUID to user space new 079f0c21ef6d s390/mm: gmap: sort out physical vs virtual pointers usage new 6b33e68ab309 s390/entry: sort out physical vs virtual pointers usage in sie64a new fe0ef0030463 KVM: s390: sort out physical vs virtual pointers usage new b99f4512197a KVM: s390: sida: sort out physical vs virtual pointers usage new 4435b79a3664 KVM: s390: pv: sort out physical vs virtual pointers usage new 77b533411595 KVM: s390: VSIE: sort out virtual/physical address in pin_ [...] new 58635d6615f1 s390/mm: fix virtual-physical address confusion for swiotlb new fb491d5500a7 KVM: s390: pv: asynchronous destroy for reboot new d9459922a15c KVM: s390: pv: api documentation for asynchronous destroy new 8c516b25d6e9 KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE new afe20eb8df91 KVM: s390: pv: avoid export before import if possible new f7866f582b1c KVM: s390: pv: support for Destroy fast UVC new cc726886079f KVM: s390: pv: module parameter to fence asynchronous destroy new dbec280045f8 s390/vfio-ap: GISA: sort out physical vs virtual pointers usage new 99b63f55dc51 KVM: s390: remove unused gisa_clear_ipm_gisc() function new 1e79a9e3ab96 Merge tag 'kvm-s390-next-6.2-1' of https://git.kernel.org/ [...] new 3bfadb232589 KVM: selftests: memslot_perf_test: Use data->nslots in pre [...] new 2aae5e6795e1 KVM: selftests: memslot_perf_test: Consolidate loop condit [...] new 34396437b11f KVM: selftests: memslot_perf_test: Probe memory slots for once new 8675c6f22698 KVM: selftests: memslot_perf_test: Support variable guest [...] new 88a64e65484e KVM: selftests: memslot_perf_test: Consolidate memory new a69170c65acd KVM: selftests: memslot_perf_test: Report optimal memory slots new f8faf02fb3e5 Merge branch kvm-arm64/selftest/memslot-fixes into kvmarm- [...] new 1a6182033f2d KVM: arm64: selftests: Use FIELD_GET() to extract ID regis [...] new f6d02aa28ae2 KVM: arm64: selftests: Add write_dbg{b,w}{c,v}r helpers in [...] new 700b8860e02c KVM: arm64: selftests: Remove the hard-coded {b,w}pn#0 fro [...] new 152880d8edf5 KVM: arm64: selftests: Add helpers to enable debug exceptions new 948f439c9d00 KVM: arm64: selftests: Stop unnecessary test stage trackin [...] new 5dd544e882d9 KVM: arm64: selftests: Change debug_version() to take ID_A [...] new 142365932f5f KVM: arm64: selftests: Add a test case for a linked breakpoint new 5ced4e533b67 KVM: arm64: selftests: Add a test case for a linked watchpoint new ebb8cc10316d KVM: arm64: selftests: Test with every breakpoint/watchpoint new 02f6fdd44dbf Merge branch kvm-arm64/selftest/linked-bps into kvmarm-mas [...] new a93871d0ea9f KVM: selftests: Add a userfaultfd library new 228f324dc718 KVM: selftests: aarch64: Add virt_get_pte_hva() library function new b6b03b86c025 KVM: selftests: Add missing close and munmap in __vm_mem_r [...] new 41f5189ea9c0 KVM: selftests: aarch64: Construct DEFAULT_MAIR_EL1 using [...] new 590b949597b1 tools: Copy bitfield.h from the kernel sources new bd3ed7e1a47e KVM: selftests: Stash backing_src_type in struct userspace [...] new 290c5b54012b KVM: selftests: Add vm->memslots[] and enum kvm_mem_region_type new 5485e822e31a KVM: selftests: Fix alignment in virt_arch_pgd_alloc() and [...] new 1446e331432d KVM: selftests: Use the right memslot for code, page-table [...] new 35c581015712 KVM: selftests: aarch64: Add aarch64/page_fault_test new 3b1d915659c6 KVM: selftests: aarch64: Add userfaultfd tests into page_f [...] new a4edf25b3e25 KVM: selftests: aarch64: Add dirty logging tests into page [...] new 45acde40f538 KVM: selftests: aarch64: Add readonly memslot tests into p [...] new ff2b5509e1d2 KVM: selftests: aarch64: Add mix of tests into page_fault_test new adde0476aff9 Merge branch kvm-arm64/selftest/s2-faults into kvmarm-master/next new 9ec1eb1bccee KVM: selftests: Have perf_test_util signal when to stop vCPUs new 4568180411e0 KVM: selftests: Build access_tracking_perf_test for arm64 new b1d10ee1565a Merge branch kvm-arm64/selftest/access-tracking into kvmar [...] new 579d7ebe90a3 KVM: arm64: Fix kvm init failure when mode!=vhe and VA_BITS=52. new a0d37784bfd7 KVM: arm64: Fix PAR_TO_HPFAR() to work independently of PA_BITS. new 219072c09abd KVM: arm64: Fix benign bug with incorrect use of VA_BITS new 3bbcc8cce27a Merge branch kvm-arm64/52bit-fixes into kvmarm-master/next new 590925a178a3 Merge tag 'kvmarm-fixes-6.1-3' into kvm-arm64/dirty-ring new cf87ac739e48 KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL new e8a18565e593 KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_d [...] new 86bdf3ebcfe1 KVM: Support dirty ring in conjunction with bitmap new 9cb1096f8590 KVM: arm64: Enable ring-based dirty memory tracking new a737f5ffb1e8 KVM: selftests: Use host page size to map ring buffer in d [...] new 7167190ddb86 KVM: selftests: Clear dirty ring states between two modes [...] new dc6df7d4d063 KVM: selftests: Automate choosing dirty ring size in dirty [...] new c57351a75d01 KVM: Push dirty information unconditionally to backup bitmap new a937f37d85f3 Merge branch kvm-arm64/dirty-ring into kvmarm-master/next new dfc7a7769ab7 KVM: arm64: Combine visitor arguments into a context structure new 83844a2317ec KVM: arm64: Stash observed pte value in visitor context new 2a611c7f87f2 KVM: arm64: Pass mm_ops through the visitor context new fa002e8e79b3 KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data new 8e94e1252cc0 KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees new 6b91b8f95cad KVM: arm64: Use an opaque type for pteps new 5c359cca1faf KVM: arm64: Tear down unlinked stage-2 subtree after break [...] new c3119ae45dfb KVM: arm64: Protect stage-2 traversal with RCU new ca5de2448c3b KVM: arm64: Atomically update stage 2 leaf attributes in p [...] new 331aa3a0547d KVM: arm64: Split init and set for table PTE new 0ab12f3574db KVM: arm64: Make block->table PTE changes parallel-aware new 946fbfdf336b KVM: arm64: Make leaf->leaf PTE changes parallel-aware new af87fc03cfdf KVM: arm64: Make table->block changes parallel-aware new 1577cb5823ce KVM: arm64: Handle stage-2 faults in parallel new 3a5154c723ba KVM: arm64: Take a pointer to walker data in kvm_dereferen [...] new b7833bf202e3 KVM: arm64: Don't acquire RCU read lock for exclusive table walks new 5e806c5812e8 KVM: arm64: Reject shared table walks in the hyp code new fe8e3f44c587 Merge branch kvm-arm64/parallel-faults into kvmarm-master/next new 0f4f7ae10ee4 KVM: arm64: Move hyp refcount manipulation helpers to comm [...] new 72a5bc0f153c KVM: arm64: Allow attaching of non-coalescable pages to a [...] new 8e6bcc3a4502 KVM: arm64: Back the hypervisor 'struct hyp_page' array fo [...] new 0d16d12eb26e KVM: arm64: Fix-up hyp stage-1 refcounts for all pages map [...] new 33bc332d4061 KVM: arm64: Unify identifiers used to distinguish host and [...] new 1ed5c24c26f4 KVM: arm64: Implement do_donate() helper for donating memory new 43c1ff8b7501 KVM: arm64: Prevent the donation of no-map pages new 9926cfce8dcb KVM: arm64: Add helpers to pin memory shared with the hype [...] new 4d968b12e6bb KVM: arm64: Include asm/kvm_mmu.h in nvhe/mem_protect.h new 1c80002e3264 KVM: arm64: Add hyp_spinlock_t static initializer new 5304002dc375 KVM: arm64: Rename 'host_kvm' to 'host_mmu' new a1ec5c70d3f6 KVM: arm64: Add infrastructure to create and track pKVM in [...] new 9d0c063a4d1d KVM: arm64: Instantiate pKVM hypervisor VM and vCPU struct [...] new aa6948f82f0b KVM: arm64: Add per-cpu fixmap infrastructure at EL2 new 6c165223e9a6 KVM: arm64: Initialise hypervisor copies of host symbols u [...] new 13e248aab73d KVM: arm64: Provide I-cache invalidation by virtual addres [...] new 717a7eebac10 KVM: arm64: Add generic hyp_memcache helpers new 315775ff7c6d KVM: arm64: Consolidate stage-2 initialisation into a sing [...] new 60dfe093ec13 KVM: arm64: Instantiate guest stage-2 page-tables at EL2 new f41dff4efb91 KVM: arm64: Return guest memory from EL2 via dedicated tea [...] new fe41a7f8c0ee KVM: arm64: Unmap 'kvm_arm_hyp_percpu_base' from the host new 73f38ef2ae53 KVM: arm64: Maintain a copy of 'kvm_arm_vmid_bits' at EL2 new 27eb26bfff5d KVM: arm64: Explicitly map 'kvm_vgic_global_state' at EL2 new 169cd0f8238f KVM: arm64: Don't unnecessarily map host kernel sections at EL2 new be66e67f1750 KVM: arm64: Use the pKVM hyp vCPU structure in handle___kv [...] new cfa72993d133 Merge branch kvm-arm64/pkvm-vcpu-state into kvmarm-master/next new b0284cd29a95 mm: Do not enable PG_arch_2 for all 64-bit architectures new e059853d14ca arm64: mte: Fix/clarify the PG_mte_tagged semantics new 2dbf12ae132c KVM: arm64: Simplify the sanitise_mte_tags() logic new ef6458b1b6ca mm: Add PG_arch_3 page flag new d77e59a8fccd arm64: mte: Lock a page for MTE tag initialisation new d89585fbb308 KVM: arm64: unify the tests for VMAs in memslots when MTE [...] new c911f0d46879 KVM: arm64: permit all VM_MTE_ALLOWED mappings with MTE enabled new a4baf8d2639f Documentation: document the ABI changes for KVM_CAP_ARM_MTE new 382b5b87a97d Merge branch kvm-arm64/mte-map-shared into kvmarm-master/next new d017eeabd509 arm64: Add ID_DFR0_EL1.PerfMon values for PMUv3p7 and IMP_DEF new bead02204e98 KVM: arm64: PMU: Align chained counter implementation with [...] new acdd8a4e13a0 KVM: arm64: PMU: Always advertise the CHAIN event new c82d28cbf1d4 KVM: arm64: PMU: Distinguish between 64bit counter and 64b [...] new 001d85bd6c03 KVM: arm64: PMU: Narrow the overflow checking when required new 0f1e172b54f7 KVM: arm64: PMU: Only narrow counters that are not 64bit wide new 0cb9c3c87a9d KVM: arm64: PMU: Add counter_index_to_*reg() helpers new 9917264d74d9 KVM: arm64: PMU: Simplify setting a counter to a specific value new 26d2d0594d70 KVM: arm64: PMU: Do not let AArch32 change the counters' t [...] new 3d0dba5764b9 KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to [...] new 60e651ff1f48 KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set fr [...] new d82e0dfdfda7 KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from [...] new 11af4c37165e KVM: arm64: PMU: Implement PMUv3p5 long counter support new 1f7c97828285 KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest new 9bad925dd741 KVM: arm64: PMU: Simplify vcpu computation on perf overflo [...] new d56bdce586e7 KVM: arm64: PMU: Make kvm_pmc the main data structure new 86815735aa57 KVM: arm64: PMU: Replace version number '0' with ID_AA64DF [...] new 292e8f149476 KVM: arm64: PMU: Simplify PMCR_EL0 reset handling new 64d6820d64c0 KVM: arm64: PMU: Sanitise PMCR_EL0.LP on first vcpu run new 58ff6569bc6e KVM: arm64: PMU: Fix period computation for 64bit counters [...] new 118bc846d4de Merge branch kvm-arm64/pmu-unchained into kvmarm-master/next new 83f8a81dece8 KVM: arm64: Fix pvtime documentation new e1b325334002 KVM: arm64: Fix typo in comment new 86f27d849b47 Merge branch kvm-arm64/misc-6.2 into kvmarm-master/next new 753d734f3f34 Merge remote-tracking branch 'arm64/for-next/sysregs' into [...] new eb5618911af0 Merge tag 'kvmarm-6.2' of https://git.kernel.org/pub/scm/l [...] new e8b9a055fa04 KVM: arm64: selftests: Align VA space allocator with TTBR0 new 2afc1fbbdab2 KVM: selftests: Allocate ucall pool from MEM_REGION_DATA new 5ec3289b31ab KVM: x86/xen: Compatibility fixes for shared runstate area new d8ba8ba4c801 KVM: x86/xen: Allow XEN_RUNSTATE_UPDATE flag behaviour to [...] new 8acc35186ed6 KVM: x86/xen: Add runstate tests for 32-bit mode and cross [...] new aba3caef5862 KVM: Shorten gfn_to_pfn_cache function names new c1a81f3bd9b4 KVM: x86: Remove unused argument in gpc_unmap_khva() new df0bb47baa95 KVM: x86: fix uninitialized variable use on KVM_REQ_TRIPLE_FAULT new 61e15f871241 KVM: Delete all references to removed KVM_SET_MEMORY_REGION ioctl new 66a9221d73e7 KVM: Delete all references to removed KVM_SET_MEMORY_ALIAS ioctl new 30ee198ce42d KVM: Reference to kvm_userspace_memory_region in doc and comments new 10c5e80b2c4d KVM: Add missing arch for KVM_CREATE_DEVICE and KVM_{SET,G [...] new a33004e844e4 KVM: selftests: Fix inverted "warning" in access tracking [...] new 8fcee0421386 KVM: selftests: Restore assert for non-nested VMs in acces [...] new 18eee7bfd18d KVM: selftests: Move XFD CPUID checking out of __vm_xsave_ [...] new 2ceade1d363c KVM: selftests: Move __vm_xsave_require_permission() below [...] new cd5f3d210095 KVM: selftests: Disallow "get supported CPUID" before REQ_ [...] new 553d1652b861 KVM: selftests: Do kvm_cpu_has() checks before creating VM+vCPU new 0c3265235fc1 KVM: selftests: Define and use a custom static assert in l [...] new 44bc6115d887 Merge tag 'kvm-selftests-6.2-2' of https://github.com/kvm- [...] new eb3992e833d3 KVM: VMX: Resume guest immediately when injecting #GP on ECREATE new 4265df667bbd KVM: x86: Keep the lock order consistent between SRCU and [...] new 17122c06b86c KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception new 5c30e8101e8d KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid new a8a12c0069b9 KVM: SVM: Replace kmap_atomic() with kmap_local_page() new 9cc409325ddd KVM: nVMX: Inject #GP, not #UD, if "generic" VMXON CR0/CR4 [...] new 4f209989586c KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely new 2e7eab81425a KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS new 5c8c0b327382 KVM: x86: Delete documentation for READ|WRITE in KVM_X86_S [...] new b93d2ec34ef3 KVM: x86: Reword MSR filtering docs to more precisely defi [...] new 1f158147181b KVM: x86: Clean up KVM_CAP_X86_USER_SPACE_MSR documentation new 4a8fd4a720f8 KVM: nVMX: Reword comments about generating nested CR0/4 r [...] new 0b5e7a16a0a7 KVM: VMX: Make vmread_error_trampoline() uncallable from C code new d2a00af2061d KVM: VMX: Allow userspace to set all supported FEATURE_CON [...] new 2d6cd68636d6 KVM: VMX: Move MSR_IA32_FEAT_CTL.LOCKED check into "is val [...] new b80732fdc9b2 KVM: selftests: Verify userspace can stuff IA32_FEATURE_CO [...] new 3ebcbd2244f5 KVM: x86: Use current rather than snapshotted TSC frequenc [...] new b376144595b4 Merge tag 'kvm-x86-fixes-6.2-1' of https://github.com/kvm- [...] new dd03cc90e09d KVM: Remove stale comment about KVM_REQ_UNHALT new ef40757743b4 KVM: x86: fix APICv/x2AVIC disabled when vm reboot by itself new ef16b2dff4d1 KVM: arm64: selftests: Enable single-step without a "full" [...] new 7f2b47f22b82 tools: Take @bit as an "unsigned long" in {clear,set}_bit( [...] new 75d7ba32f982 perf tools: Use dedicated non-atomic clear/set bit helpers new 03a0c819e717 KVM: selftests: Use non-atomic clear/set bit helpers in KVM tests new 7f32a6cf8b5a tools: Drop conflicting non-atomic test_and_{clear,set}_bi [...] new 36293352ff43 tools: Drop "atomic_" prefix from atomic test_and_set_bit() new bb056c0f080a tools: KVM: selftests: Convert clear/set_bit() to actual atomics new 4bf46e35826d KVM: selftests: Fix spelling mistake "probabalistic" -> "p [...] new 0c2a04128f50 KVM: x86: remove unnecessary exports new 74bee0cad8dc KVM: x86: Advertise that the SMM_CTL MSR is not supported new 214b0a88c46d KVM: x86/xen: add support for 32-bit guests in SCHEDOP_poll new 8c82a0b3ba1a KVM: Store immutable gfn_to_pfn_cache properties new e308c24a358d KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_check() new 2a0b128a906a KVM: Clean up hva_to_pfn_retry() new 0318f207d1c2 KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_refresh() new 9f87791d686d KVM: Drop KVM's API to allow temporarily unmapping gfn=>pfn cache new 5762cb102357 KVM: Do not partially reinitialize gfn=>pfn cache during a [...] new 58f5ee5fedd9 KVM: Drop @gpa from exported gfn=>pfn cache check() and re [...] new 06e155c44aa0 KVM: Skip unnecessary "unmap" if gpc is already valid duri [...] new 5656374b168c Merge branch 'gpc-fixes' of git://git.infradead.org/users/ [...] new 9352e7470a1b Merge remote-tracking branch 'kvm/queue' into HEAD new 549a715b98a1 KVM: x86: Add proper ReST tables for userspace MSR exits/flags new 8fa590bf3448 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 384 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/virt/kvm/api.rst | 274 +++-- Documentation/virt/kvm/arm/pvtime.rst | 14 +- Documentation/virt/kvm/devices/arm-vgic-its.rst | 5 +- Documentation/virt/kvm/devices/vcpu.rst | 2 + MAINTAINERS | 10 + arch/arm64/Kconfig | 1 + arch/arm64/include/asm/kvm_arm.h | 8 +- arch/arm64/include/asm/kvm_asm.h | 7 +- arch/arm64/include/asm/kvm_host.h | 76 +- arch/arm64/include/asm/kvm_hyp.h | 3 + arch/arm64/include/asm/kvm_mmu.h | 2 +- arch/arm64/include/asm/kvm_pgtable.h | 175 ++- arch/arm64/include/asm/kvm_pkvm.h | 38 + arch/arm64/include/asm/mte.h | 65 +- arch/arm64/include/asm/pgtable.h | 4 +- arch/arm64/include/uapi/asm/kvm.h | 1 + arch/arm64/kernel/cpufeature.c | 4 +- arch/arm64/kernel/elfcore.c | 2 +- arch/arm64/kernel/hibernate.c | 2 +- arch/arm64/kernel/image-vars.h | 15 - arch/arm64/kernel/mte.c | 21 +- arch/arm64/kvm/Kconfig | 2 + arch/arm64/kvm/arm.c | 95 +- arch/arm64/kvm/guest.c | 18 +- arch/arm64/kvm/hyp/hyp-constants.c | 3 + arch/arm64/kvm/hyp/include/nvhe/mem_protect.h | 25 +- arch/arm64/kvm/hyp/include/nvhe/memory.h | 27 + arch/arm64/kvm/hyp/include/nvhe/mm.h | 18 +- arch/arm64/kvm/hyp/include/nvhe/pkvm.h | 68 ++ arch/arm64/kvm/hyp/include/nvhe/spinlock.h | 10 +- arch/arm64/kvm/hyp/nvhe/cache.S | 11 + arch/arm64/kvm/hyp/nvhe/hyp-main.c | 110 +- arch/arm64/kvm/hyp/nvhe/hyp-smp.c | 2 + arch/arm64/kvm/hyp/nvhe/mem_protect.c | 521 ++++++++- arch/arm64/kvm/hyp/nvhe/mm.c | 167 ++- arch/arm64/kvm/hyp/nvhe/page_alloc.c | 29 +- arch/arm64/kvm/hyp/nvhe/pkvm.c | 436 ++++++++ arch/arm64/kvm/hyp/nvhe/setup.c | 98 +- arch/arm64/kvm/hyp/pgtable.c | 652 ++++++------ arch/arm64/kvm/hyp/vhe/Makefile | 2 +- arch/arm64/kvm/irq.h | 16 - arch/arm64/kvm/mmu.c | 195 ++-- arch/arm64/kvm/pkvm.c | 138 ++- arch/arm64/kvm/pmu-emul.c | 482 ++++----- arch/arm64/kvm/reset.c | 29 - arch/arm64/kvm/sys_regs.c | 157 ++- arch/arm64/kvm/vgic/vgic-its.c | 20 + arch/arm64/mm/copypage.c | 7 +- arch/arm64/mm/fault.c | 4 +- arch/arm64/mm/mteswap.c | 16 +- arch/powerpc/kvm/book3s_64_mmu_hv.c | 2 +- arch/powerpc/kvm/book3s_64_mmu_radix.c | 2 +- arch/powerpc/kvm/irq.h | 22 - arch/powerpc/kvm/powerpc.c | 18 +- arch/s390/include/asm/kvm_host.h | 14 +- arch/s390/include/asm/mem_encrypt.h | 4 +- arch/s390/include/asm/stacktrace.h | 1 + arch/s390/include/asm/uv.h | 10 + arch/s390/kernel/asm-offsets.c | 1 + arch/s390/kernel/entry.S | 26 +- arch/s390/kernel/uv.c | 7 + arch/s390/kvm/intercept.c | 9 +- arch/s390/kvm/interrupt.c | 5 - arch/s390/kvm/irq.h | 19 - arch/s390/kvm/kvm-s390.c | 116 +- arch/s390/kvm/kvm-s390.h | 8 +- arch/s390/kvm/priv.c | 3 +- arch/s390/kvm/pv.c | 357 ++++++- arch/s390/kvm/vsie.c | 4 +- arch/s390/mm/gmap.c | 147 +-- arch/s390/mm/init.c | 12 +- arch/x86/events/intel/lbr.c | 6 +- arch/x86/include/asm/cpufeatures.h | 3 + arch/x86/include/asm/hyperv-tlfs.h | 37 + arch/x86/include/asm/kvm-x86-ops.h | 4 +- arch/x86/include/asm/kvm_host.h | 145 ++- arch/x86/include/asm/perf_event.h | 6 +- arch/x86/include/asm/svm.h | 100 +- arch/x86/include/uapi/asm/kvm.h | 13 +- arch/x86/kernel/kvm.c | 2 +- arch/x86/kvm/Kconfig | 11 + arch/x86/kvm/Makefile | 6 +- arch/x86/kvm/cpuid.c | 33 +- arch/x86/kvm/emulate.c | 355 +------ arch/x86/kvm/hyperv.c | 353 +++++-- arch/x86/kvm/hyperv.h | 64 +- arch/x86/kvm/irq.c | 7 +- arch/x86/kvm/kvm_cache_regs.h | 5 - arch/x86/kvm/kvm_emulate.h | 48 +- arch/x86/kvm/lapic.c | 16 +- arch/x86/kvm/lapic.h | 2 +- arch/x86/kvm/mmu/mmu.c | 176 ++- arch/x86/kvm/mmu/mmu_internal.h | 33 +- arch/x86/kvm/mmu/paging_tmpl.h | 6 +- arch/x86/kvm/mmu/spte.c | 12 + arch/x86/kvm/mmu/spte.h | 19 +- arch/x86/kvm/mmu/tdp_mmu.c | 114 +- arch/x86/kvm/mmu/tdp_mmu.h | 2 + arch/x86/kvm/pmu.c | 90 +- arch/x86/kvm/pmu.h | 6 +- arch/x86/kvm/reverse_cpuid.h | 25 +- arch/x86/kvm/smm.c | 649 ++++++++++++ arch/x86/kvm/smm.h | 168 +++ arch/x86/kvm/svm/hyperv.c | 18 + arch/x86/kvm/svm/hyperv.h | 50 +- arch/x86/kvm/svm/nested.c | 52 +- arch/x86/kvm/svm/pmu.c | 4 +- arch/x86/kvm/svm/sev.c | 6 +- arch/x86/kvm/svm/svm.c | 63 +- arch/x86/kvm/svm/svm.h | 5 +- arch/x86/kvm/svm/svm_onhyperv.c | 8 +- arch/x86/kvm/svm/svm_onhyperv.h | 25 +- arch/x86/kvm/trace.h | 36 +- arch/x86/kvm/vmx/capabilities.h | 24 - arch/x86/kvm/vmx/{evmcs.c => hyperv.c} | 45 +- arch/x86/kvm/vmx/{evmcs.h => hyperv.h} | 12 +- arch/x86/kvm/vmx/nested.c | 108 +- arch/x86/kvm/vmx/nested.h | 7 +- arch/x86/kvm/vmx/pmu_intel.c | 11 +- arch/x86/kvm/vmx/sgx.c | 4 +- arch/x86/kvm/vmx/vmcs12.h | 5 +- arch/x86/kvm/vmx/vmenter.S | 2 + arch/x86/kvm/vmx/vmx.c | 104 +- arch/x86/kvm/vmx/vmx_ops.h | 20 +- arch/x86/kvm/x86.c | 533 +++------- arch/x86/kvm/x86.h | 1 + arch/x86/kvm/xen.c | 505 ++++++--- arch/x86/kvm/xen.h | 13 +- drivers/s390/crypto/vfio_ap_ops.c | 2 +- fs/proc/page.c | 3 +- include/asm-generic/hyperv-tlfs.h | 5 + include/asm-generic/mshyperv.h | 11 +- include/kvm/arm_pmu.h | 15 +- include/kvm/arm_vgic.h | 1 + include/linux/build_bug.h | 9 + include/linux/kernel-page-flags.h | 1 + include/linux/kvm_dirty_ring.h | 20 +- include/linux/kvm_host.h | 107 +- include/linux/kvm_types.h | 1 + include/linux/mm.h | 1 + include/linux/page-flags.h | 3 +- include/trace/events/mmflags.h | 9 +- include/uapi/linux/kvm.h | 31 +- mm/Kconfig | 8 + mm/gup.c | 33 +- mm/huge_memory.c | 3 +- mm/hugetlb.c | 5 +- tools/arch/x86/include/asm/atomic.h | 11 + tools/arch/x86/include/uapi/asm/kvm.h | 8 - tools/include/asm-generic/atomic-gcc.h | 23 + tools/include/asm-generic/bitops/atomic.h | 15 +- tools/include/linux/bitfield.h | 176 +++ tools/include/linux/bitmap.h | 34 - tools/include/uapi/linux/kvm.h | 20 +- tools/perf/bench/find-bit-bench.c | 2 +- tools/perf/builtin-c2c.c | 6 +- tools/perf/builtin-kwork.c | 6 +- tools/perf/builtin-record.c | 6 +- tools/perf/builtin-sched.c | 2 +- tools/perf/tests/bitmap.c | 2 +- tools/perf/tests/mem2node.c | 2 +- tools/perf/util/affinity.c | 4 +- tools/perf/util/header.c | 8 +- tools/perf/util/mmap.c | 6 +- tools/perf/util/pmu.c | 2 +- .../perf/util/scripting-engines/trace-event-perl.c | 2 +- .../util/scripting-engines/trace-event-python.c | 2 +- tools/perf/util/session.c | 2 +- tools/perf/util/svghelper.c | 2 +- tools/testing/selftests/kvm/.gitignore | 8 +- tools/testing/selftests/kvm/Makefile | 16 +- .../selftests/kvm/aarch64/aarch32_id_regs.c | 6 +- tools/testing/selftests/kvm/aarch64/arch_timer.c | 31 +- .../selftests/kvm/aarch64/debug-exceptions.c | 360 +++++-- tools/testing/selftests/kvm/aarch64/hypercalls.c | 3 - .../selftests/kvm/aarch64/page_fault_test.c | 1117 ++++++++++++++++++++ tools/testing/selftests/kvm/aarch64/psci_test.c | 1 - tools/testing/selftests/kvm/aarch64/vgic_init.c | 2 - tools/testing/selftests/kvm/aarch64/vgic_irq.c | 10 +- .../selftests/kvm/access_tracking_perf_test.c | 52 +- tools/testing/selftests/kvm/demand_paging_test.c | 250 +---- tools/testing/selftests/kvm/dirty_log_perf_test.c | 130 ++- tools/testing/selftests/kvm/dirty_log_test.c | 90 +- .../selftests/kvm/include/aarch64/processor.h | 35 +- .../testing/selftests/kvm/include/kvm_util_base.h | 75 +- tools/testing/selftests/kvm/include/memstress.h | 75 ++ .../testing/selftests/kvm/include/perf_test_util.h | 63 -- tools/testing/selftests/kvm/include/test_util.h | 25 + tools/testing/selftests/kvm/include/ucall_common.h | 18 +- .../selftests/kvm/include/userfaultfd_util.h | 45 + tools/testing/selftests/kvm/include/x86_64/evmcs.h | 48 +- .../testing/selftests/kvm/include/x86_64/hyperv.h | 103 ++ .../selftests/kvm/include/x86_64/processor.h | 442 ++++++-- tools/testing/selftests/kvm/include/x86_64/svm.h | 26 +- .../selftests/kvm/include/x86_64/svm_util.h | 14 + tools/testing/selftests/kvm/include/x86_64/vmx.h | 25 +- tools/testing/selftests/kvm/kvm_page_table_test.c | 6 +- .../testing/selftests/kvm/lib/aarch64/processor.c | 83 +- tools/testing/selftests/kvm/lib/aarch64/ucall.c | 102 +- tools/testing/selftests/kvm/lib/elf.c | 5 +- tools/testing/selftests/kvm/lib/kvm_util.c | 193 +++- .../kvm/lib/{perf_test_util.c => memstress.c} | 136 ++- tools/testing/selftests/kvm/lib/riscv/processor.c | 29 +- tools/testing/selftests/kvm/lib/riscv/ucall.c | 42 +- tools/testing/selftests/kvm/lib/s390x/processor.c | 8 +- tools/testing/selftests/kvm/lib/s390x/ucall.c | 39 +- tools/testing/selftests/kvm/lib/test_util.c | 36 + tools/testing/selftests/kvm/lib/ucall_common.c | 103 ++ tools/testing/selftests/kvm/lib/userfaultfd_util.c | 186 ++++ tools/testing/selftests/kvm/lib/x86_64/hyperv.c | 46 + .../lib/x86_64/{perf_test_util.c => memstress.c} | 37 +- tools/testing/selftests/kvm/lib/x86_64/processor.c | 314 +++--- tools/testing/selftests/kvm/lib/x86_64/ucall.c | 39 +- tools/testing/selftests/kvm/lib/x86_64/vmx.c | 56 +- .../testing/selftests/kvm/max_guest_memory_test.c | 21 +- .../kvm/memslot_modification_stress_test.c | 44 +- tools/testing/selftests/kvm/memslot_perf_test.c | 339 +++--- tools/testing/selftests/kvm/rseq_test.c | 4 - tools/testing/selftests/kvm/s390x/memop.c | 2 - tools/testing/selftests/kvm/s390x/resets.c | 2 - tools/testing/selftests/kvm/s390x/sync_regs_test.c | 3 - .../testing/selftests/kvm/set_memory_region_test.c | 5 +- tools/testing/selftests/kvm/steal_time.c | 1 - .../selftests/kvm/system_counter_offset_test.c | 1 - tools/testing/selftests/kvm/x86_64/amx_test.c | 112 +- tools/testing/selftests/kvm/x86_64/cpuid_test.c | 11 +- .../selftests/kvm/x86_64/cr4_cpuid_sync_test.c | 3 - .../selftests/kvm/x86_64/emulator_error_test.c | 193 ---- .../kvm/x86_64/exit_on_emulation_failure_test.c | 45 + .../testing/selftests/kvm/x86_64/flds_emulation.h | 55 + tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c | 3 - .../kvm/x86_64/{evmcs_test.c => hyperv_evmcs.c} | 100 +- .../testing/selftests/kvm/x86_64/hyperv_features.c | 25 +- tools/testing/selftests/kvm/x86_64/hyperv_ipi.c | 314 ++++++ .../testing/selftests/kvm/x86_64/hyperv_svm_test.c | 103 +- .../selftests/kvm/x86_64/hyperv_tlb_flush.c | 690 ++++++++++++ .../selftests/kvm/x86_64/nx_huge_pages_test.c | 5 +- .../selftests/kvm/x86_64/platform_info_test.c | 3 - .../selftests/kvm/x86_64/pmu_event_filter_test.c | 77 +- .../testing/selftests/kvm/x86_64/set_sregs_test.c | 3 - .../kvm/x86_64/smaller_maxphyaddr_emulation_test.c | 111 ++ tools/testing/selftests/kvm/x86_64/smm_test.c | 2 + .../kvm/x86_64/svm_nested_soft_inject_test.c | 3 - .../testing/selftests/kvm/x86_64/sync_regs_test.c | 3 - .../selftests/kvm/x86_64/userspace_io_test.c | 3 - .../selftests/kvm/x86_64/userspace_msr_exit_test.c | 88 +- .../selftests/kvm/x86_64/vmx_dirty_log_test.c | 1 + tools/testing/selftests/kvm/x86_64/vmx_msrs_test.c | 47 + .../selftests/kvm/x86_64/vmx_pmu_caps_test.c | 19 +- .../selftests/kvm/x86_64/xapic_state_test.c | 4 +- .../testing/selftests/kvm/x86_64/xen_shinfo_test.c | 141 ++- virt/kvm/Kconfig | 6 + virt/kvm/dirty_ring.c | 46 +- virt/kvm/irqchip.c | 3 +- virt/kvm/kvm_main.c | 107 +- virt/kvm/kvm_mm.h | 4 +- virt/kvm/pfncache.c | 114 +- 257 files changed, 12068 insertions(+), 4988 deletions(-) create mode 100644 arch/arm64/kvm/hyp/include/nvhe/pkvm.h delete mode 100644 arch/arm64/kvm/irq.h delete mode 100644 arch/powerpc/kvm/irq.h delete mode 100644 arch/s390/kvm/irq.h create mode 100644 arch/x86/kvm/smm.c create mode 100644 arch/x86/kvm/smm.h create mode 100644 arch/x86/kvm/svm/hyperv.c rename arch/x86/kvm/vmx/{evmcs.c => hyperv.c} (95%) rename arch/x86/kvm/vmx/{evmcs.h => hyperv.h} (95%) create mode 100644 tools/include/linux/bitfield.h create mode 100644 tools/testing/selftests/kvm/aarch64/page_fault_test.c create mode 100644 tools/testing/selftests/kvm/include/memstress.h delete mode 100644 tools/testing/selftests/kvm/include/perf_test_util.h create mode 100644 tools/testing/selftests/kvm/include/userfaultfd_util.h rename tools/testing/selftests/kvm/lib/{perf_test_util.c => memstress.c} (62%) create mode 100644 tools/testing/selftests/kvm/lib/ucall_common.c create mode 100644 tools/testing/selftests/kvm/lib/userfaultfd_util.c create mode 100644 tools/testing/selftests/kvm/lib/x86_64/hyperv.c rename tools/testing/selftests/kvm/lib/x86_64/{perf_test_util.c => memstress.c} (68%) delete mode 100644 tools/testing/selftests/kvm/x86_64/emulator_error_test.c create mode 100644 tools/testing/selftests/kvm/x86_64/exit_on_emulation_failure_test.c create mode 100644 tools/testing/selftests/kvm/x86_64/flds_emulation.h rename tools/testing/selftests/kvm/x86_64/{evmcs_test.c => hyperv_evmcs.c} (66%) create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_ipi.c create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_tlb_flush.c create mode 100644 tools/testing/selftests/kvm/x86_64/smaller_maxphyaddr_emulation_test.c