This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from cc0356d6a02e Merge tag 'x86_core_for_v5.16_rc1' of git://git.kernel.org [...] new 0e96dc47b95a ahci: remove duplicated PCI device IDs new 8c0ff6af6823 Add AHCI support for ASM1062+JBM575 cards new f971a85439bd libata: fix checking of DMA state new 6ac586f2e716 libata-scsi: fix checking of DMA state new 47b320498c3b pata_ali: fix checking of DMA state new 2367ad63a131 pata_amd: fix checking of DMA state new 492402ce7077 pata_optidma: fix checking of DMA state new 1af5f7af2484 pata_radisys: fix checking of DMA state new 61f90a8e8068 Merge tag 'libata-5.16-rc1' of git://git.kernel.org/pub/sc [...] new eb0782bbdfd0 ima: fix deadlock when traversing "ima_default_rules". new 30d8764a744f ima: fix uid code style problems new 40224c41661b ima: add gid support new 61868acb0728 ima_policy: Remove duplicate 'the' in docs comment new cc4299ea0399 ima: Use strscpy instead of strlcpy new 32ba540f3c2a evm: mark evm_fixmode as __ro_after_init new c150d66bd514 Merge tag 'integrity-v5.16' of git://git.kernel.org/pub/sc [...] new 9980c4251f8d printk: use kvmalloc instead of kmalloc for devkmsg_user new 5aa7eea9316c printk: avoid -Wsometimes-uninitialized warning new 264a750472ea printk: use gnu_printf format attribute for printk_sprint() new c15b5fc054c3 ia64: don't do IA64_CMPXCHG_DEBUG without CONFIG_PRINTK new 24a1dffbecaf lib/vsprintf.c: Amend static asserts for format specifier flags new c666d447e091 test_printf: Make pft array const new a25a0854a226 test_printf: Remove separate page_flags variable new 5b358b0de963 test_printf: Remove custom appending of '|' new 507f98603607 test_printf: Append strings more efficiently new 23efd0804c0a vsprintf: Make %pGp print the hex value new 6a7ca80f4033 vsprintf: Update %pGp documentation about that it prints h [...] new 40e64a88dadc Merge branch 'for-5.16-vsprintf-pgp' into for-linus new 0aaa58eca65a Merge tag 'printk-for-5.16' of git://git.kernel.org/pub/sc [...] new 7117dccaa014 Merge remote-tracking branch 'tip/x86/sev' into hyperv-next new e82f2069b52f Merge remote-tracking branch 'tip/x86/cc' into hyperv-next new 0cc4f6d9f0b9 x86/hyperv: Initialize GHCB page in Isolation VM new af788f355e34 x86/hyperv: Initialize shared memory boundary in the Isola [...] new 810a52126502 x86/hyperv: Add new hvcall guest address host visibility support new d4dccf353db8 Drivers: hv: vmbus: Mark vmbus ring buffer visible to host [...] new faff44069ff5 x86/hyperv: Add Write/Read MSR registers via ghcb page new 20c89a559e00 x86/hyperv: Add ghcb hvcall support for SNP VM new f2f136c05fb6 Drivers: hv: vmbus: Add SNP support for VMbus channel init [...] new 9a8797722e42 Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM new 20cf6616ccd5 Drivers: hv: vmbus: Remove unused code to check for subchannels new c5989b92fdd0 x86/hyperv: Remove duplicated include in hv_init new 0b9060852344 x86/hyperv: Remove duplicate include new 01ccca3cb50d Drivers: hv : vmbus: Adding NULL pointer check new 285f68afa8b2 x86/hyperv: Protect set_hv_tscchange_cb() against getting [...] new 44261f8e287d Merge tag 'hyperv-next-signed-20211102' of git://git.kerne [...] new 64c785082c21 KVM: nVMX: Use INVALID_GPA for pointers used in nVMX. new feb3162f9deb KVM: nVMX: Reset vmxon_ptr upon VMXOFF emulation. new 11476d277e06 KVM: use vma_pages() helper new 6470accc7ba9 KVM: x86: hyper-v: Avoid calling kvm_make_vcpus_request_ma [...] new ae0946cd3601 KVM: Optimize kvm_make_vcpus_request_mask() a bit new 381cecc5d7b7 KVM: Drop 'except' parameter from kvm_make_vcpus_request_mask() new baff59ccdc65 KVM: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() new 620b2438abf9 KVM: Make kvm_make_vcpus_request_mask() use pre-allocated [...] new 1e254d0d86a0 Revert "x86/kvm: fix vcpu-id indexed array sizes" new a1c42ddedf35 kvm: rename KVM_MAX_VCPU_ID to KVM_MAX_VCPU_IDS new 15cabbc259f2 KVM: x86: Subsume nested GPA read helper into load_pdptrs() new 94c641ba7a89 KVM: x86: Simplify retrieving the page offset when loading PDTPRs new ff8828c84f93 KVM: x86: Do not mark all registers as avail/dirty during [...] new 5ebbc470d7f3 KVM: x86: Remove defunct setting of CR0.ET for guests duri [...] new e8f65b9bb483 KVM: x86: Remove defunct setting of XCR0 for guest during [...] new 583d369b36a9 KVM: x86: Fold fx_init() into kvm_arch_vcpu_create() new d06567353e12 KVM: VMX: Drop explicit zeroing of MSR guest values at vCP [...] new 06692e4b8055 KVM: VMX: Move RESET emulation to vmx_vcpu_reset() new 9ebe530b9f5d KVM: SVM: Move RESET emulation to svm_vcpu_reset() new 62dd57dd67d7 KVM: x86: WARN on non-zero CRs at RESET to detect improper [...] new 25b9784586a4 KVM: x86: Manually retrieve CPUID.0x1 when getting FMS for [...] new d22869aff4dc kvm: selftests: Fix spelling mistake "missmatch" -> "mismatch" new 22d7108ce472 KVM: selftests: Fix kvm_vm_free() in cr4_cpuid_sync and vm [...] new c6cecc4b9324 KVM: x86/mmu: Complete prefetch for trailing SPTEs for dir [...] new bd047e544089 KVM: X86: Don't flush current tlb on shadow page modification new 06152b2dec3e KVM: X86: Remove kvm_mmu_flush_or_zap() new c3e5e415bc1e KVM: X86: Change kvm_sync_page() to return true when remot [...] new 5591c0694d85 KVM: X86: Zap the invalid list after remote tlb flushing new cc2a8e66bbcd KVM: X86: Remove FNAME(update_pte) new f1c4a88c41ea KVM: X86: Don't unsync pagetables when speculative new 8b8f9d753b84 KVM: X86: Don't check unsync if the original spte is writible new 515a0c79e796 kvm: irqfd: avoid update unmodified entries of the routing new 0226a45c468f KVM: x86: nSVM: don't copy pause related settings new 4c84926e229e KVM: x86: SVM: add module param to control LBR virtualization new 36e8194dcd74 KVM: x86: SVM: don't set VMLOAD/VMSAVE intercepts on vCPU reset new f800650a4ed2 KVM: x86: SVM: add module param to control TSC scaling new 5228eb96a487 KVM: x86: nSVM: implement nested TSC scaling new 3e44dce4d0ae KVM: X86: Move PTE present check from loop body to __shado [...] new 6b6fcd2804a2 kvm: x86: abstract locking around pvclock_update_vm_gtod_copy new 45e6c2fac097 KVM: x86: extract KVM_GET_CLOCK/KVM_SET_CLOCK to separate [...] new 55c0cefbdbda KVM: x86: Fix potential race in KVM_GET_CLOCK new d055f028a533 KVM: MMU: pass unadulterated gpa to direct_page_fault new 6defd9bb178c KVM: MMU: Introduce struct kvm_page_fault new c501040abc42 KVM: MMU: change mmu->page_fault() arguments to kvm_page_fault new 4326e57ef40a KVM: MMU: change direct_page_fault() arguments to kvm_page_fault new b8a5d5511515 KVM: MMU: change page_fault_handle_page_track() arguments [...] new 3647cd04b7d0 KVM: MMU: change kvm_faultin_pfn() arguments to kvm_page_fault new 3a13f4fea3c1 KVM: MMU: change handle_abnormal_pfn() arguments to kvm_pa [...] new 43b74355ef8b KVM: MMU: change __direct_map() arguments to kvm_page_fault new 9c03b1821a89 KVM: MMU: change FNAME(fetch)() arguments to kvm_page_fault new 2f6305dd5676 KVM: MMU: change kvm_tdp_mmu_map() arguments to kvm_page_fault new cdc47767a039 KVM: MMU: change tdp_mmu_map_handle_target_level() argumen [...] new 3c8ad5a675d9 KVM: MMU: change fast_page_fault() arguments to kvm_page_fault new 73a3c659478a KVM: MMU: change kvm_mmu_hugepage_adjust() arguments to kv [...] new 536f0e6ace95 KVM: MMU: change disallowed_hugepage_adjust() arguments to [...] new f0066d94c92d KVM: MMU: change tracepoints arguments to kvm_page_fault new b1a429fb1801 KVM: x86/mmu: Verify shadow walk doesn't terminate early i [...] new 68be1306caea KVM: x86/mmu: Fold rmap_recycle into rmap_add new bcc4f2bc5026 KVM: MMU: mark page dirty in make_spte new 6ccf44388206 KVM: MMU: unify tdp_mmu_map_set_spte_atomic and tdp_mmu_se [...] new e710c5f6be0e KVM: x86/mmu: Pass the memslot around via struct kvm_page_fault new 888104138cb8 KVM: x86/mmu: Avoid memslot lookup in page_fault_handle_pa [...] new d786c7783b01 KVM: MMU: inline set_spte in mmu_set_spte new 4758d47e0d68 KVM: MMU: inline set_spte in FNAME(sync_page) new ad67e4806e4c KVM: MMU: clean up make_spte return value new eb5cd7ffe142 KVM: MMU: remove unnecessary argument to mmu_set_spte new 87e888eafd5b KVM: MMU: set ad_disabled in TDP MMU role new 7158bee4b475 KVM: MMU: pass kvm_mmu_page struct to make_spte new a12f43818b3f KVM: MMU: pass struct kvm_page_fault to mmu_set_spte new 8a9f566ae4a4 KVM: x86/mmu: Avoid memslot lookup in rmap_add new 53597858dbf8 KVM: x86/mmu: Avoid memslot lookup in make_spte and mmu_tr [...] new b73a54321ad8 KVM: x86: Expose Predictive Store Forwarding Disable new 78b497f2e62d kvm: use kvfree() in kvm_arch_free_vm() new 174a921b6975 nSVM: Check for reserved encodings of TLB_CONTROL in nested VMCB new e9d0c0c4f7ea KVM: x86: add config for non-kvm users of page tracking new deae4a10f166 KVM: x86: only allocate gfn_track when necessary new 3f2401f47d29 RISC-V: Add hypervisor extension related CSR defines new 99cdc6c18c2d RISC-V: Add initial skeletal KVM support new a33c72faf2d7 RISC-V: KVM: Implement VCPU create, init and destroy functions new cce69aff689e RISC-V: KVM: Implement VCPU interrupts and requests handling new 92ad82002c39 RISC-V: KVM: Implement KVM_GET_ONE_REG/KVM_SET_ONE_REG ioctls new 34bde9d8b9e6 RISC-V: KVM: Implement VCPU world-switch new 9f7013265112 RISC-V: KVM: Handle MMIO exits for VCPU new 5a5d79acd7da RISC-V: KVM: Handle WFI exits for VCPU new fd7bb4a251df RISC-V: KVM: Implement VMID allocator new 9d05c1fee837 RISC-V: KVM: Implement stage2 page table programming new 9955371cc014 RISC-V: KVM: Implement MMU notifiers new 3a9f66cb25e1 RISC-V: KVM: Add timer functionality new 5de52d4a23ad RISC-V: KVM: FP lazy save/restore new 4d9c5c072f03 RISC-V: KVM: Implement ONE REG interface for FP registers new dea8ee31a039 RISC-V: KVM: Add SBI v0.1 support new da40d8580593 RISC-V: KVM: Document RISC-V specific parts of KVM API new 24b699d12c34 RISC-V: KVM: Add MAINTAINERS entry new 542a2640a2f4 Merge tag 'kvm-riscv-5.16-1' of git://github.com/kvm-riscv [...] new a7cc099f2ec3 KVM: x86/mmu: kvm_faultin_pfn has to return false if pfh i [...] new a25c78d04c1b Merge commit 'kvm-pagedata-alloc-fixes' into HEAD new 3d5e7a28b1ea KVM: x86: avoid warning with -Wbitwise-instead-of-logical new c68dc1b577ea KVM: x86: Report host tsc and realtime values in KVM_GET_CLOCK new 869b44211adc kvm: x86: protect masterclock with a seqcount new 58d4277be9b6 KVM: x86: Refactor tsc synchronization code new 828ca89628bf KVM: x86: Expose TSC offset controls to userspace new 500065393400 tools: arch: x86: pull in pvclock headers new 61fb1c54853d selftests: KVM: Add test for KVM_{GET,SET}_CLOCK new c1901feef5bb selftests: KVM: Fix kvm device helper ioctl assertions new c89551345326 selftests: KVM: Add helpers for vCPU device attributes new 3f9808cac06c selftests: KVM: Introduce system counter offset test new 1e76a3ce0d3c KVM: cleanup allocation of rmaps and page tracking data new 2839180ce5bb KVM: x86/mmu: clean up prefetch/prefault/speculative naming new 2e6e0d683b77 KVM: VMX: Restore host's MSR_IA32_RTIT_CTL when it's not zero new ba51d627230f KVM: VMX: Use precomputed vmx->pt_desc.addr_range new f4d3a902a558 KVM: VMX: Rename pt_desc.addr_range to pt_desc.num_address_ranges new e099f3eb0e91 KVM: VMX: RTIT_CTL_BRANCH_EN has no dependency on other CPUID bit new 610265ea3da1 KVM: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k new 540c7abe61cc KVM: vPMU: Fill get_msr MSR_CORE_PERF_GLOBAL_OVF_CTRL w/ 0 new 4dfe4f40d845 kvm: x86: mmu: Make NX huge page recovery period configurable new 9dadfc4a6145 KVM: x86: Add vendor name to kvm_x86_ops, use it for error [...] new 9ae7f6c9b51e KVM: emulate: Comment on difference between RDPMC implemen [...] new 413eaa4ecd0f KVM: selftests: set CPUID before setting sregs in vcpu creation new 552617382c19 KVM: X86: Don't reset mmu context when X86_CR4_PCIDE 1->0 new a91a7c709600 KVM: X86: Don't reset mmu context when toggling X86_CR4_PGE new e45e9e3998f0 KVM: X86: Fix tlb flush for tdp in kvm_invalidate_pcid() new 509bfe3d9796 KVM: X86: Cache CR3 in prev_roots when PCID is disabled new 264d3dc1d3dc KVM: X86: pair smp_wmb() of mmu_try_to_unsync_pages() with [...] new 61b05a9fd4ae KVM: X86: Don't unload MMU in kvm_vcpu_flush_tlb_guest() new bc3b3c1002ea KVM: x86/mmu: Drop a redundant, broken remote TLB flush new e8be2a5ba86c KVM: x86/mmu: Drop a redundant remote TLB flush in kvm_zap [...] new 21fa324654e4 KVM: x86/mmu: Extract zapping of rmaps for gfn range to se [...] new 9b4eb77099f6 riscv: do not select non-existing config ANON_INODES new ee49a8932971 KVM: x86: Move SVM's APICv sanity check to common x86 new 187c8833def8 KVM: x86: Use rw_semaphore for APICv lock to allow vCPU pa [...] new 6ff53f6a438f x86/irq: Ensure PI wakeup handler is unregistered before m [...] new ec5a4919fa7b KVM: VMX: Unregister posted interrupt wakeup handler on ha [...] new dfd3c713a9c8 kvm: x86: Remove stale declaration of kvm_no_apic_vcpu new ed290e1c20da KVM: selftests: Fix nested SVM tests when built with clang new a9d496d8e08c KVM: x86: Clarify the kvm_run.emulation_failure structure layout new 0a62a0319abb KVM: x86: Get exit_reason as part of kvm_x86_ops.get_exit_info new e615e355894e KVM: x86: On emulation failure, convey the exit reason, et [...] new 0d7d84498fb4 KVM: x86: SGX must obey the KVM_INTERNAL_ERROR_EMULATION protocol new e59f3e5d4521 Merge branch 'kvm-pvclock-raw-spinlock' into HEAD new a78738ed1d9b KVM: arm64: Turn __KVM_HOST_SMCCC_FUNC_* into an enum (mostly) new 8f4566f18db5 arm64: Prevent kexec and hibernation if is_protected_kvm_e [...] new 8579a185baca KVM: arm64: Reject stub hypercalls after pKVM has been ini [...] new 2f2e1a506967 KVM: arm64: Propagate errors from __pkvm_prot_finalize hypercall new 07036cffe17e KVM: arm64: Prevent re-finalisation of pKVM for a given CPU new 057bed206f70 KVM: arm64: Disable privileged hypercalls after pKVM finalisation new 3864d17f177e Merge branch kvm-arm64/pkvm/restrict-hypercalls into kvmar [...] new f25c5e4dafd8 kvm: arm64: vgic: Introduce vgic_check_iorange new 4612d98f58c7 KVM: arm64: vgic-v3: Check redist region is not above the [...] new c56a87da0a7f KVM: arm64: vgic-v2: Check cpu interface region is not abo [...] new 2ec02f6c64f0 KVM: arm64: vgic-v3: Check ITS region is not above the VM [...] new 96e903896969 KVM: arm64: vgic: Drop vgic_check_ioaddr() new 3f4db37e203b KVM: arm64: selftests: Make vgic_init gic version agnostic new 46fb941bc04d KVM: arm64: selftests: Make vgic_init/vm_gic_create versio [...] new c44df5f9ff31 KVM: arm64: selftests: Add some tests for GICv2 in vgic_init new 2dcd9aa1c3a5 KVM: arm64: selftests: Add tests for GIC redist/cpuif part [...] new 188345863897 KVM: arm64: selftests: Add test for legacy GICv3 REDIST ba [...] new 3e197f17b23b KVM: arm64: selftests: Add init ITS device test new 15f9017c28a8 Merge branch kvm-arm64/vgic-ipa-checks into kvmarm-master/next new b6a68b97af23 KVM: arm64: Allow KVM to be disabled from the command line new c8f1e9673406 KVM: arm64: Unconditionally include generic KVM's Kconfig new e26bb75aa2f1 KVM: arm64: Depend on HAVE_KVM instead of OF new a049cf7e63e7 Merge branch kvm-arm64/misc-5.16 into kvmarm-master/next new 00d5101b254b KVM: arm64: Return early from read_id_reg() if register is RAZ new 5a4309762356 KVM: arm64: Use get_raz_reg() for userspace reads of PMSWINC_EL0 new ebf6aa8c0473 KVM: arm64: Replace get_raz_id_reg() with get_raz_reg() new 1eb07f4b6853 Merge branch kvm-arm64/raz-sysregs into kvmarm-master/next new 53e8ce137f7b Documentation: admin-guide: Document side effects when pKV [...] new cd67e9af7724 Merge branch kvm-arm64/pkvm/restrict-hypercalls into kvmar [...] new 69adec18e94f KVM: arm64: Fix reporting of endianess when the access ori [...] new 2a6bf5139e28 Merge branch kvm-arm64/misc-5.16 into kvmarm-master/next new 562e530fd770 KVM: arm64: Force ID_AA64PFR0_EL1.GIC=1 when exposing a vi [...] new df652bcf1136 KVM: arm64: vgic-v3: Work around GICv3 locally generated SErrors new 0924729b21bf KVM: arm64: vgic-v3: Reduce common group trapping to ICV_D [...] new f87ab6827222 KVM: arm64: vgic-v3: Don't advertise ICC_CTLR_EL1.SEIS new 9d449c71bd8f KVM: arm64: vgic-v3: Align emulated cpuif LPI state machin [...] new 20a304307596 Merge branch kvm-arm64/vgic-fixes-5.16 into kvmarm-master/next new 88ec7e258b70 KVM: arm64: selftests: Add MMIO readl/writel support new 272a067df3c8 tools: arm64: Import sysreg.h new b3c79c6130bc KVM: arm64: selftests: Introduce ARM64_SYS_KVM_REG new 740826ec02a6 KVM: arm64: selftests: Add support for cpu_relax new d977ed399402 KVM: arm64: selftests: Add basic support for arch_timers new 801669046559 KVM: arm64: selftests: Add basic support to generate delays new 5c636d585cfd KVM: arm64: selftests: Add support to disable and enable l [...] new 0226cd531c58 KVM: arm64: selftests: Maintain consistency for vcpuid type new 17229bdc86c9 KVM: arm64: selftests: Add guest support to get the vcpuid new 414de89df1ec KVM: arm64: selftests: Add light-weight spinlock support new 28281652f90a KVM: arm64: selftests: Add basic GICv3 support new 250b8d6cb3b0 KVM: arm64: selftests: Add host support for vGIC new 4959d8650e9f KVM: arm64: selftests: Add arch_timer test new 61f6fadbf9bd KVM: arm64: selftests: arch_timer: Support vCPU migration new 551a13346e59 Merge branch kvm-arm64/selftest/timer into kvmarm-master/next new 3ef231670b9e KVM: arm64: vgic: Add memcg accounting to vgic allocations new 115bae923ac8 KVM: arm64: Add memcg accounting to KVM allocations new 5f8b2591decb Merge branch kvm-arm64/memory-accounting into kvmarm-master/next new 7dd9b5a15748 KVM: arm64: Move __get_fault_info() and co into their own [...] new cc1e6fdfa92b KVM: arm64: Don't include switch.h into nvhe/kvm-main.c new 8fb2046180a0 KVM: arm64: Move early handlers to per-EC handlers new 3b1a690eda0d KVM: arm64: Pass struct kvm to per-EC handlers new 538683907782 KVM: arm64: Add missing field descriptor for MDCR_EL2 new 16dd1fbb12f7 KVM: arm64: Simplify masking out MTE in feature id reg new 6c30bfb18d0b KVM: arm64: Add handlers for protected VM System Registers new 2a0c343386ae KVM: arm64: Initialize trap registers for protected VMs new 72e1be120eaa KVM: arm64: Move sanitized copies of CPU features new 1423afcb4117 KVM: arm64: Trap access to pVM restricted features new 5f39efc42052 KVM: arm64: Handle protected guests at 32 bits new 8a049862c38f KVM: arm64: Fix early exit ptrauth handling new ce75916749b8 KVM: arm64: pkvm: Use a single function to expose all id-regs new 8ffb41888334 KVM: arm64: pkvm: Make the ERR/ERX*_EL1 registers RAZ/WI new 3c90cb15e2e6 KVM: arm64: pkvm: Drop AArch32-specific registers new f3d5ccabab20 KVM: arm64: pkvm: Drop sysregs that should never be routed [...] new cbca19738472 KVM: arm64: pkvm: Handle GICv3 traps as required new 271b7286058d KVM: arm64: pkvm: Preserve pending SError on exit from AArch32 new 3061725d162c KVM: arm64: pkvm: Consolidate include files new 746bdeadc53b KVM: arm64: pkvm: Move kvm_handle_pvm_restricted around new 0c7639cc8382 KVM: arm64: pkvm: Pass vpcu instead of kvm to kvm_get_exit [...] new 07305590114a KVM: arm64: pkvm: Give priority to standard traps over pvm [...] new be08c3cf3c5a Merge branch kvm-arm64/pkvm/fixed-features into kvmarm-mas [...] new ffb4ce3c4936 KVM: selftests: Make memslot_perf_test arch independent new 358928fd5264 KVM: selftests: Build the memslot tests for arm64 new 5a2acbbb0179 Merge branch kvm/selftests/memslot into kvmarm-master/next new 4e3386843325 Merge tag 'kvmarm-5.16' of git://git.kernel.org/pub/scm/li [...] new 0a86512dc113 RISC-V: KVM: Factor-out FP virtualization into separate sources new 7c8de080d476 RISC-V: KVM: Fix GPA passed to __kvm_riscv_hfence_gvma_xyz [...] new 2d8fb8f3914b s390/gmap: validate VMA in __gmap_zap() new b159f94c86b4 s390/gmap: don't unconditionally call pte_unmap_unlock() i [...] new fe3d10024073 s390/mm: validate VMA in PGSTE manipulation functions new 949f5c1244ee s390/mm: fix VMA and page table handling code in storage k [...] new 46c22ffd2772 s390/uv: fully validate the VMA before calling follow_page() new 8318c404cf8c s390/mm: no need for pte_alloc_map_lock() if we know the p [...] new 7cb70266b0e3 s390/mm: optimize set_guest_storage_key() new 14ea40e22c41 s390/mm: optimize reset_guest_reference_bit() new 57c5df13eca4 KVM: s390: pv: add macros for UVC CC values new d4074324b07a KVM: s390: pv: avoid double free of sida page new 1e2aa46de526 KVM: s390: pv: avoid stalls for kvm_s390_pv_init_vm new f0a1a0615a6f KVM: s390: pv: avoid stalls when making pages secure new 8eeba194a32e KVM: s390: Simplify SIGP Set Arch handling new 67cf68b6a5cc KVM: s390: Add a routine for setting userspace CPU state new 85f517b29418 KVM: s390: Fix handle_sske page fault handling new 380d97bd02fc KVM: s390: pv: properly handle page flags for protected guests new 3fd8417f2c72 KVM: s390: add debug statement for diag 318 CPNC data new 9c6eb531e760 Merge tag 'kvm-s390-next-5.16-1' of git://git.kernel.org/p [...] new 7b161d9cab5d RISC-V: KVM: remove unneeded semicolon new bbd5ba8db766 RISC-V: KVM: fix boolreturn.cocci warnings new 52cf891d8dbd Merge tag 'kvm-riscv-5.16-2' of https://github.com/kvm-ris [...] new d7e0a795bf37 Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...] new dfbdcda280eb gcc-plugins: arm-ssp: Prepare for THREAD_INFO_IN_TASK support new 19f29aebd929 ARM: smp: Pass task to secondary_start_kernel new 3855ab614df4 ARM: smp: Free up the TLS register while running in the kernel new 50596b7559bf ARM: smp: Store current pointer in TPIDRURO register if available new 18ed1c01a7dd ARM: smp: Enable THREAD_INFO_IN_TASK new 13a695aa50de Merge tag 'pr-arm32-ti-in-task' of git://git.kernel.org/pu [...] new fa191b711c32 ARM: 9150/1: Fix PID_IN_CONTEXTIDR regression when THREAD_ [...] new c1e42efacb9b ARM: 9151/1: Thumb2: avoid __builtin_thread_pointer() on Clang new 9d6361922489 ARM: 9125/1: fix incorrect use of get_kernel_nofault() new 54f5b3615f19 ARM: 9121/1: amba: Drop unused functions about APB/AHB dev [...] new eb4f75691587 ARM: 9120/1: Revert "amba: make use of -1 IRQs warn" new 854f695c3d41 ARM: 9119/1: amba: Properly handle device probe without IR [...] new 1c1838757611 ARM: 9123/1: scoop: Drop if with an always false condition new 48342ae751c7 ARM: 9124/1: uncompress: Parse "linux,usable-memory-range" [...] new b8bc0e50a32a ARM: add __arm_iomem_set_ro() to write-protect ioremapped area new 4aede550f104 ARM: imx6: mark OCRAM mapping read-only new caed89dab0ca ARM: 9128/1: mm: Refactor the __do_page_fault() new 488cab12c371 ARM: 9129/1: mm: Kill task_struct argument for __do_page_fault() new f177b06ed7d5 ARM: 9127/1: mm: Cleanup access_error() new 93d204384401 ARM: 9126/1: mm: Kill page table base print in show_pte() new 2e707106fac7 ARM: 9130/1: mm: Provide die_kernel_fault() helper new abc25bbcb55c ARM: 9131/1: mm: Fix PXN process with LPAE feature new 20a451f8db4a ARM: 9101/1: sa1100/assabet: convert LEDs to gpiod APIs new 3583ab228a30 ARM: 9135/1: kprobes: address gcc -Wempty-body warning new 345dac33f588 ARM: 9136/1: ARMv7-M uses BE-8, not BE-32 new 8b5bd5adf9e6 ARM: 9137/1: disallow CONFIG_THUMB with ARMv4 new 336fe1d6c218 ARM: 9140/1: allow compile-testing without machine record new c2e6df3eaaf1 ARM: 9142/1: kasan: work around LPAE build warning new c6e77bb61a55 ARM: 9143/1: add CONFIG_PHYS_OFFSET default values new ecb108e3e3f7 ARM: 9144/1: forbid ftrace with clang and thumb2_kernel new ae3d6978aa84 ARM: 9145/1: patch: fix BE32 compilation new 2abd6e34fcf3 ARM: 9146/1: RiscPC needs older gcc version new 0e52fc2e7ddd ARM: 9147/1: add printf format attribute to early_print() new 11779842dd6f Merge branches 'devel-stable' and 'misc' into for-linus new ab2e7f4b46bf Merge tag 'for-linus' of git://git.armlinux.org.uk/~rmk/linux-arm
The 325 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/ABI/testing/ima_policy | 8 +- Documentation/admin-guide/kernel-parameters.txt | 15 +- Documentation/core-api/printk-formats.rst | 2 +- Documentation/virt/kvm/api.rst | 241 +++++- Documentation/virt/kvm/devices/vcpu.rst | 70 ++ Documentation/virt/kvm/devices/xics.rst | 2 +- Documentation/virt/kvm/devices/xive.rst | 2 +- MAINTAINERS | 12 + arch/arm/Kconfig | 19 +- arch/arm/Makefile | 9 +- arch/arm/boot/compressed/fdt_check_mem_start.c | 48 +- arch/arm/common/scoop.c | 3 - arch/arm/include/asm/assembler.h | 29 + arch/arm/include/asm/current.h | 55 ++ arch/arm/include/asm/io.h | 1 + arch/arm/include/asm/opcodes.h | 9 +- arch/arm/include/asm/setup.h | 2 +- arch/arm/include/asm/smp.h | 3 +- arch/arm/include/asm/stackprotector.h | 2 - arch/arm/include/asm/switch_to.h | 16 + arch/arm/include/asm/thread_info.h | 26 +- arch/arm/include/asm/tls.h | 10 +- arch/arm/kernel/asm-offsets.c | 6 +- arch/arm/kernel/entry-armv.S | 5 + arch/arm/kernel/entry-common.S | 1 + arch/arm/kernel/entry-header.S | 8 + arch/arm/kernel/head-common.S | 5 + arch/arm/kernel/head-nommu.S | 1 + arch/arm/kernel/head.S | 5 +- arch/arm/kernel/process.c | 8 +- arch/arm/kernel/smp.c | 13 +- arch/arm/kernel/vmlinux-xip.lds.S | 2 + arch/arm/kernel/vmlinux.lds.S | 2 + arch/arm/mach-imx/pm-imx6.c | 2 + arch/arm/mach-sa1100/assabet.c | 24 +- arch/arm/mm/Kconfig | 4 +- arch/arm/mm/context.c | 2 +- arch/arm/mm/fault.c | 119 +-- arch/arm/mm/fault.h | 4 + arch/arm/mm/ioremap.c | 6 + arch/arm/mm/kasan_init.c | 2 +- arch/arm/mm/proc-macros.S | 3 +- arch/arm/probes/kprobes/test-core.h | 2 +- arch/arm64/Kconfig | 1 + arch/arm64/include/asm/kvm_arm.h | 1 + arch/arm64/include/asm/kvm_asm.h | 48 +- arch/arm64/include/asm/kvm_emulate.h | 5 +- arch/arm64/include/asm/kvm_host.h | 4 +- arch/arm64/include/asm/kvm_hyp.h | 5 + arch/arm64/include/asm/sysreg.h | 3 + arch/arm64/kernel/smp.c | 3 +- arch/arm64/kvm/Kconfig | 10 +- arch/arm64/kvm/arm.c | 102 ++- arch/arm64/kvm/hyp/include/hyp/fault.h | 75 ++ arch/arm64/kvm/hyp/include/hyp/switch.h | 235 +++--- arch/arm64/kvm/hyp/include/nvhe/fixed_config.h | 200 +++++ arch/arm64/kvm/hyp/include/nvhe/trap_handler.h | 2 + arch/arm64/kvm/hyp/nvhe/Makefile | 2 +- arch/arm64/kvm/hyp/nvhe/host.S | 26 +- arch/arm64/kvm/hyp/nvhe/hyp-main.c | 48 +- arch/arm64/kvm/hyp/nvhe/mem_protect.c | 11 +- arch/arm64/kvm/hyp/nvhe/pkvm.c | 185 +++++ arch/arm64/kvm/hyp/nvhe/setup.c | 3 + arch/arm64/kvm/hyp/nvhe/switch.c | 99 +++ arch/arm64/kvm/hyp/nvhe/sys_regs.c | 487 ++++++++++++ arch/arm64/kvm/hyp/vgic-v3-sr.c | 22 +- arch/arm64/kvm/hyp/vhe/switch.c | 16 + arch/arm64/kvm/mmu.c | 2 +- arch/arm64/kvm/pmu-emul.c | 2 +- arch/arm64/kvm/reset.c | 2 +- arch/arm64/kvm/sys_regs.c | 41 +- arch/arm64/kvm/vgic/vgic-init.c | 2 +- arch/arm64/kvm/vgic/vgic-irqfd.c | 2 +- arch/arm64/kvm/vgic/vgic-its.c | 18 +- arch/arm64/kvm/vgic/vgic-kvm-device.c | 25 +- arch/arm64/kvm/vgic/vgic-mmio-v3.c | 8 +- arch/arm64/kvm/vgic/vgic-v3.c | 27 +- arch/arm64/kvm/vgic/vgic-v4.c | 2 +- arch/arm64/kvm/vgic/vgic.h | 5 +- arch/ia64/Kconfig.debug | 2 +- arch/mips/kvm/mips.c | 2 +- arch/powerpc/include/asm/kvm_book3s.h | 2 +- arch/powerpc/include/asm/kvm_host.h | 4 +- arch/powerpc/kvm/book3s_xive.c | 2 +- arch/powerpc/kvm/powerpc.c | 2 +- arch/riscv/Kconfig | 2 + arch/riscv/Makefile | 1 + arch/riscv/include/asm/csr.h | 87 +++ arch/riscv/include/asm/kvm_host.h | 264 +++++++ arch/riscv/include/asm/kvm_types.h | 7 + arch/riscv/include/asm/kvm_vcpu_fp.h | 59 ++ arch/riscv/include/asm/kvm_vcpu_timer.h | 44 ++ arch/riscv/include/uapi/asm/kvm.h | 128 ++++ arch/riscv/kernel/asm-offsets.c | 156 ++++ arch/riscv/kvm/Kconfig | 35 + arch/riscv/kvm/Makefile | 26 + arch/riscv/kvm/main.c | 118 +++ arch/riscv/kvm/mmu.c | 802 ++++++++++++++++++++ arch/riscv/kvm/tlb.S | 74 ++ arch/riscv/kvm/vcpu.c | 825 +++++++++++++++++++++ arch/riscv/kvm/vcpu_exit.c | 701 +++++++++++++++++ arch/riscv/kvm/vcpu_fp.c | 167 +++++ arch/riscv/kvm/vcpu_sbi.c | 185 +++++ arch/riscv/kvm/vcpu_switch.S | 400 ++++++++++ arch/riscv/kvm/vcpu_timer.c | 225 ++++++ arch/riscv/kvm/vm.c | 97 +++ arch/riscv/kvm/vmid.c | 120 +++ arch/s390/include/asm/pgtable.h | 9 +- arch/s390/include/asm/uv.h | 15 +- arch/s390/kernel/uv.c | 65 +- arch/s390/kvm/intercept.c | 5 + arch/s390/kvm/kvm-s390.c | 7 +- arch/s390/kvm/kvm-s390.h | 9 + arch/s390/kvm/priv.c | 2 + arch/s390/kvm/pv.c | 21 +- arch/s390/kvm/sigp.c | 14 +- arch/s390/mm/gmap.c | 15 +- arch/s390/mm/pgtable.c | 109 ++- arch/x86/hyperv/Makefile | 2 +- arch/x86/hyperv/hv_init.c | 82 +- arch/x86/hyperv/ivm.c | 289 ++++++++ arch/x86/include/asm/hyperv-tlfs.h | 17 + arch/x86/include/asm/kvm_host.h | 48 +- arch/x86/include/asm/kvm_page_track.h | 11 +- arch/x86/include/asm/mshyperv.h | 70 +- arch/x86/include/uapi/asm/kvm.h | 4 + arch/x86/kernel/cpu/mshyperv.c | 5 + arch/x86/kernel/irq.c | 4 +- arch/x86/kvm/Kconfig | 3 + arch/x86/kvm/cpuid.c | 10 +- arch/x86/kvm/emulate.c | 5 + arch/x86/kvm/hyperv.c | 22 +- arch/x86/kvm/ioapic.c | 2 +- arch/x86/kvm/ioapic.h | 4 +- arch/x86/kvm/mmu.h | 114 ++- arch/x86/kvm/mmu/mmu.c | 702 +++++++++--------- arch/x86/kvm/mmu/mmu_internal.h | 21 +- arch/x86/kvm/mmu/mmutrace.h | 18 +- arch/x86/kvm/mmu/page_track.c | 49 +- arch/x86/kvm/mmu/paging_tmpl.h | 168 ++--- arch/x86/kvm/mmu/spte.c | 34 +- arch/x86/kvm/mmu/spte.h | 21 +- arch/x86/kvm/mmu/tdp_mmu.c | 119 +-- arch/x86/kvm/mmu/tdp_mmu.h | 6 +- arch/x86/kvm/svm/nested.c | 52 +- arch/x86/kvm/svm/sev.c | 6 +- arch/x86/kvm/svm/svm.c | 168 +++-- arch/x86/kvm/svm/svm.h | 9 +- arch/x86/kvm/trace.h | 9 +- arch/x86/kvm/vmx/nested.c | 63 +- arch/x86/kvm/vmx/pmu_intel.c | 6 +- arch/x86/kvm/vmx/sgx.c | 16 +- arch/x86/kvm/vmx/vmx.c | 136 ++-- arch/x86/kvm/vmx/vmx.h | 2 +- arch/x86/kvm/x86.c | 800 ++++++++++++-------- arch/x86/kvm/x86.h | 2 - arch/x86/mm/pat/set_memory.c | 23 +- drivers/amba/bus.c | 100 +-- drivers/ata/ahci.c | 13 +- drivers/ata/libata-core.c | 2 +- drivers/ata/libata-scsi.c | 4 +- drivers/ata/pata_ali.c | 4 +- drivers/ata/pata_amd.c | 2 +- drivers/ata/pata_optidma.c | 4 +- drivers/ata/pata_radisys.c | 4 +- drivers/clocksource/timer-riscv.c | 9 + drivers/gpu/drm/i915/Kconfig | 1 + drivers/hv/Kconfig | 1 + drivers/hv/channel.c | 72 +- drivers/hv/channel_mgmt.c | 34 - drivers/hv/connection.c | 101 ++- drivers/hv/hv.c | 82 +- drivers/hv/hv_common.c | 12 + drivers/hv/hyperv_vmbus.h | 2 + drivers/hv/ring_buffer.c | 57 +- drivers/net/hyperv/hyperv_net.h | 5 +- drivers/net/hyperv/netvsc.c | 15 +- drivers/of/platform.c | 6 +- drivers/uio/uio_hv_generic.c | 18 +- include/asm-generic/hyperv-tlfs.h | 1 + include/asm-generic/mshyperv.h | 20 +- include/clocksource/timer-riscv.h | 16 + include/linux/amba/bus.h | 18 - include/linux/hyperv.h | 25 +- include/linux/kvm_host.h | 18 +- include/uapi/linux/kvm.h | 29 +- kernel/printk/index.c | 5 +- kernel/printk/printk.c | 5 +- lib/test_printf.c | 61 +- lib/vsprintf.c | 11 +- mm/debug.c | 2 +- mm/memory-failure.c | 8 +- mm/page_owner.c | 4 +- mm/slub.c | 4 +- scripts/gcc-plugins/arm_ssp_per_task_plugin.c | 27 +- security/integrity/evm/evm_main.c | 2 +- security/integrity/ima/ima_api.c | 2 +- security/integrity/ima/ima_policy.c | 243 ++++-- {arch => tools/arch}/arm64/include/asm/sysreg.h | 50 +- {arch => tools/arch}/x86/include/asm/pvclock-abi.h | 0 tools/arch/x86/include/asm/pvclock.h | 103 +++ tools/testing/selftests/kvm/.gitignore | 3 + tools/testing/selftests/kvm/Makefile | 7 +- tools/testing/selftests/kvm/aarch64/arch_timer.c | 479 ++++++++++++ .../selftests/kvm/aarch64/debug-exceptions.c | 30 +- .../selftests/kvm/aarch64/psci_cpu_on_test.c | 2 +- tools/testing/selftests/kvm/aarch64/vgic_init.c | 369 ++++++--- .../selftests/kvm/include/aarch64/arch_timer.h | 142 ++++ .../testing/selftests/kvm/include/aarch64/delay.h | 25 + tools/testing/selftests/kvm/include/aarch64/gic.h | 21 + .../selftests/kvm/include/aarch64/processor.h | 90 ++- .../selftests/kvm/include/aarch64/spinlock.h | 13 + tools/testing/selftests/kvm/include/aarch64/vgic.h | 20 + tools/testing/selftests/kvm/include/kvm_util.h | 13 + tools/testing/selftests/kvm/kvm_create_max_vcpus.c | 2 +- tools/testing/selftests/kvm/lib/aarch64/gic.c | 95 +++ .../selftests/kvm/lib/aarch64/gic_private.h | 21 + tools/testing/selftests/kvm/lib/aarch64/gic_v3.c | 240 ++++++ tools/testing/selftests/kvm/lib/aarch64/gic_v3.h | 70 ++ .../testing/selftests/kvm/lib/aarch64/processor.c | 24 +- tools/testing/selftests/kvm/lib/aarch64/spinlock.c | 27 + tools/testing/selftests/kvm/lib/aarch64/vgic.c | 70 ++ tools/testing/selftests/kvm/lib/kvm_util.c | 46 +- tools/testing/selftests/kvm/lib/sparsebit.c | 2 +- tools/testing/selftests/kvm/lib/x86_64/processor.c | 4 +- tools/testing/selftests/kvm/lib/x86_64/svm.c | 14 +- tools/testing/selftests/kvm/memslot_perf_test.c | 56 +- .../selftests/kvm/system_counter_offset_test.c | 132 ++++ .../selftests/kvm/x86_64/cr4_cpuid_sync_test.c | 3 +- .../testing/selftests/kvm/x86_64/kvm_clock_test.c | 203 +++++ .../selftests/kvm/x86_64/vmx_tsc_adjust_test.c | 2 +- virt/kvm/eventfd.c | 15 +- virt/kvm/kvm_main.c | 127 ++-- 233 files changed, 11728 insertions(+), 2308 deletions(-) create mode 100644 arch/arm/include/asm/current.h create mode 100644 arch/arm64/kvm/hyp/include/hyp/fault.h create mode 100644 arch/arm64/kvm/hyp/include/nvhe/fixed_config.h create mode 100644 arch/arm64/kvm/hyp/nvhe/pkvm.c create mode 100644 arch/arm64/kvm/hyp/nvhe/sys_regs.c create mode 100644 arch/riscv/include/asm/kvm_host.h create mode 100644 arch/riscv/include/asm/kvm_types.h create mode 100644 arch/riscv/include/asm/kvm_vcpu_fp.h create mode 100644 arch/riscv/include/asm/kvm_vcpu_timer.h create mode 100644 arch/riscv/include/uapi/asm/kvm.h create mode 100644 arch/riscv/kvm/Kconfig create mode 100644 arch/riscv/kvm/Makefile create mode 100644 arch/riscv/kvm/main.c create mode 100644 arch/riscv/kvm/mmu.c create mode 100644 arch/riscv/kvm/tlb.S create mode 100644 arch/riscv/kvm/vcpu.c create mode 100644 arch/riscv/kvm/vcpu_exit.c create mode 100644 arch/riscv/kvm/vcpu_fp.c create mode 100644 arch/riscv/kvm/vcpu_sbi.c create mode 100644 arch/riscv/kvm/vcpu_switch.S create mode 100644 arch/riscv/kvm/vcpu_timer.c create mode 100644 arch/riscv/kvm/vm.c create mode 100644 arch/riscv/kvm/vmid.c create mode 100644 arch/x86/hyperv/ivm.c create mode 100644 include/clocksource/timer-riscv.h copy {arch => tools/arch}/arm64/include/asm/sysreg.h (97%) copy {arch => tools/arch}/x86/include/asm/pvclock-abi.h (100%) create mode 100644 tools/arch/x86/include/asm/pvclock.h create mode 100644 tools/testing/selftests/kvm/aarch64/arch_timer.c create mode 100644 tools/testing/selftests/kvm/include/aarch64/arch_timer.h create mode 100644 tools/testing/selftests/kvm/include/aarch64/delay.h create mode 100644 tools/testing/selftests/kvm/include/aarch64/gic.h create mode 100644 tools/testing/selftests/kvm/include/aarch64/spinlock.h create mode 100644 tools/testing/selftests/kvm/include/aarch64/vgic.h create mode 100644 tools/testing/selftests/kvm/lib/aarch64/gic.c create mode 100644 tools/testing/selftests/kvm/lib/aarch64/gic_private.h create mode 100644 tools/testing/selftests/kvm/lib/aarch64/gic_v3.c create mode 100644 tools/testing/selftests/kvm/lib/aarch64/gic_v3.h create mode 100644 tools/testing/selftests/kvm/lib/aarch64/spinlock.c create mode 100644 tools/testing/selftests/kvm/lib/aarch64/vgic.c create mode 100644 tools/testing/selftests/kvm/system_counter_offset_test.c create mode 100644 tools/testing/selftests/kvm/x86_64/kvm_clock_test.c