This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from a5f2bd479f58 Merge branch 'parisc-4.21-1' of git://git.kernel.org/pub/s [...] new 7733607fb3aa xen/pvh: Split CONFIG_XEN_PVH into CONFIG_PVH and CONFIG_XEN_PVH new fcd474769815 xen/pvh: Move PVH entry code out of Xen specific tree new 4df7363e5210 xen/pvh: Create a new file for Xen specific PVH code new 8cee3974b35b xen/pvh: Move Xen specific PVH VM initialization out of co [...] new a43fb7da5300 xen/pvh: Move Xen code for getting mem map via hcall out o [...] new d907be2b5b04 xen/pvh: Add memory map pointer to hvm_start_info struct new 716ff017a39e KVM: x86: Allow Qemu/KVM to use PVH entry point new bf9445a33ae6 kprobes/x86/xen: blacklist non-attachable xen interrupt functions new 1669907e3d1a xen/pciback: Check dev_data before using it new b3383974fee2 xen: Introduce shared buffer helpers for page directory... new 5641f19bdfc4 drm/xen-front: Use Xen common shared buffer implementation new 58f9d806d16a ALSA: xen-front: Use Xen common shared buffer implementation new 460023a5d1d2 Merge tag 'for-linus-4.21-rc1-tag' of git://git.kernel.org [...] new 45c3af974ec6 KVM: x86: Trace changes to active TSC offset regardless if [...] new 09f70c3b70e7 tools/kvm_stat: switch to python3 new 88656040b0c0 KVM: nVMX: Unrestricted guest mode requires EPT new 00df9181de2a KVM/nVMX: Remove unneeded forward jump in nested_vmx_check [...] new 14aa61d0a9eb nVMX x86: Check VMX-preemption timer controls on vmentry o [...] new fca91f6d60b6 kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page new 211929fd3f7c selftests: Fix test errors related to lib.mk khdr target new bb22dc14a2c2 Merge branch 'khdr_fix' of git://git.kernel.org/pub/scm/li [...] new e5d83c74a580 kvm: make KVM_CAP_ENABLE_CAP_VM architecture agnostic new 8fe65a8299f9 kvm: rename last argument to kvm_get_dirty_log_protect new 2a31b9db1535 kvm: introduce manual dirty log reprotect new 1b3ab5ad1b8a KVM: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_ar [...] new dfae3c03b89f KVM: nVMX: Allocate and configure VM{READ,WRITE} bitmaps i [...] new 199b118ab3d5 KVM: VMX: Alphabetize the includes in vmx.c new 8ba2e525ecd7 KVM: x86: Add requisite includes to kvm_cache_regs.h new 3592cda6bc27 KVM: x86: Add requisite includes to hyperv.h new a821bab2d1ee KVM: VMX: Move VMX specific files to a "vmx" subdirectory new e0123119a564 KVM: VMX: rename vmx_shadow_fields.h to vmcs_shadow_fields.h new 4cebd747d785 KVM: VMX: Drop the "vmx" prefix from vmx_evmcs.h new 71d9409e2093 KVM: VMX: Move caching of MSR_IA32_XSS to hardware_setup() new c73da3fcab43 KVM: VMX: Properly handle dynamic VM Entry/Exit controls new 7caaa7110867 KVM: VMX: Pass vmx_capability struct to setup_vmcs_config() new 3077c1910882 KVM: VMX: Move capabilities structs and helpers to dedicated file new 2c4fd91d2664 KVM: VMX: Expose various module param vars via capabilities.h new cb1d474b3225 KVM: VMX: Move VMCS definitions to dedicated file new 609363cf81fc KVM: nVMX: Move vmcs12 code to dedicated files new 8373d25d25d1 KVM: VMX: Add vmx.h to hold VMX definitions new 75edce8a4548 KVM: VMX: Move eVMCS code to dedicated files new 89b0c9f58350 KVM: VMX: Move VMX instruction wrappers to a dedicated hea [...] new 944c3464538d KVM: VMX: Move nested hardware/vcpu {un}setup to helper functions new 5158917c7b01 KVM: x86: nVMX: Allow nested_enable_evmcs to be NULL new a3203381ca95 KVM: VMX: Move the hardware {un}setup functions to the bottom new e4027cfafd78 KVM: nVMX: Set callbacks for nested functions during hardw [...] new 3e8eacccae9d KVM: nVMX: Call nested_vmx_setup_ctls_msrs() iff @nested is true new ff241486ac90 KVM: nVMX: Move "vmcs12 to shadow/evmcs sync" to helper function new cf3646eb3adf KVM: VMX: Expose misc variables needed for nested VMX new 97b7ead39263 KVM: VMX: Expose various getters and setters to nested VMX new 7c97fcb3b68c KVM: VMX: Expose nested_vmx_allowed() to nested VMX as a n [...] new 55d2375e58a6 KVM: nVMX: Move nested code to dedicated files new 0023ef39dc35 kvm: vmx: Set IA32_TSC_AUX for legacy mode guests new 898a811f1486 kvm: vmx: Document the need for MSR_STAR in i386 builds new db31c8f5af7d kvm: vmx: Don't set hardware IA32_CSTAR MSR on VM-entry new 84c8c5b8f82f kvm: vmx: Skip all SYSCALL MSRs in setup_msrs() when !EFER.SCE new b2227ddec1cc kvm: svm: remove unused struct definition new eb1ff0a913ca kvm: x86: remove unnecessary recalculate_apic_map new 3a0e7731724f x86: kvm: hyperv: simplify SynIC message delivery new 7deec5e0df74 x86: kvm: hyperv: don't retry message delivery for periodi [...] new ec084491727b x86/hyper-v: Mark TLFS structures packed new a4987defc1e6 x86/hyper-v: Do some housekeeping in hyperv-tlfs.h new 220d6586ecb4 x86/hyper-v: Drop HV_X64_CONFIGURE_PROFILER definition new e2e871ab2f02 x86/kvm/hyper-v: Introduce nested_get_evmcs_version() helper new 2bc39970e932 x86/kvm/hyper-v: Introduce KVM_GET_SUPPORTED_HV_CPUID new 7e50c424f8e2 KVM: selftests: implement an unchecked version of vcpu_ioctl() new 7edcb7343327 KVM: selftests: Add hyperv_cpuid test new 0aa67255f54d x86/hyper-v: move synic/stimer control structures definiti [...] new 6a058a1eadc3 x86/kvm/hyper-v: use stimer config definition from hyperv-tlfs.h new 8644f771e07c x86/kvm/hyper-v: direct mode for synthetic timers new 08a800ac257a x86/kvm/hyper-v: avoid open-coding stimer_mark_pending() i [...] new 87a8d795b2f1 x86/hyper-v: Stop caring about EOI for direct stimers new d7b09c827a6c kvm: x86: Report STIBP on GET_SUPPORTED_CPUID new 3d82c565a7a2 kvm: vmx: add cpu into VMX preemption timer bug list new e53d88af63ab kvm: x86: Don't modify MSR_PLATFORM_INFO on vCPU reset new a0d4f8034446 KVM nVMX: MSRs should not be stored if VM-entry fails duri [...] new 53963a70ac26 KVM/VMX: Check ept_pointer before flushing ept tlb new 16322a3b5e7c KVM: nVMX: Prepend "nested_vmx_" to check_vmentry_{pre,pos [...] new 461b4ba4c7ad KVM: nVMX: Move the checks for VM-Execution Control Fields [...] new f9b245e182ac KVM: nVMX: Remove param indirection from nested_vmx_check_ [...] new 61446ba75e9a KVM: nVMX: Move the checks for VM-Exit Control Fields to a [...] new 5fbf963400a3 KVM: nVMX: Move the checks for VM-Entry Control Fields to [...] new 254b2f3b0f7b KVM: nVMX: Move the checks for Host Control Registers and [...] new 4e445aee9654 KVM: nVMX: Move the checks for Guest Non-Register States t [...] new 240c35a3783a kvm: x86: Use task structs fpu field for user new b666a4b69739 kvm: x86: Dynamically allocate guest_fpu new 5132411985e1 kvm: selftests: ucall: improve ucall placement in memory, [...] new 0d640732dbeb arm64: KVM: Skip MMIO insn after emulation new bd7d95cafb49 arm64: KVM: Consistently advance singlestep when emulating [...] new fb544d1ca65a KVM: arm/arm64: Fix VMID alloc race by reverting to lock-less new d1878af3a5a6 KVM: arm/arm64: Log PSTATE for unhandled sysregs new 60c3ab30d8c2 KVM: arm/arm64: vgic-v2: Set active_source to 0 when resto [...] new 3f58bf634555 KVM: arm/arm64: Share common code in user_mem_abort() new 6396b852e46e KVM: arm/arm64: Re-factor setting the Stage 2 entry to exe [...] new f8df73388ee2 KVM: arm/arm64: Introduce helpers to manipulate page table [...] new 4ea5af531140 KVM: arm64: Support dirty page tracking for PUD hugepages new 86d1c55ea605 KVM: arm64: Support PUD hugepage in stage2_is_exec() new eb3f0624ea08 KVM: arm64: Support handling access faults for PUD hugepages new 35a63966194d KVM: arm64: Update age handlers to support PUD hugepages new b8e0ba7c8bea KVM: arm64: Add support for creating PUD hugepages at stage 2 new 2e2f6c3c0b08 KVM: arm/arm64: vgic: Do not cond_resched_lock() with IRQs [...] new 6992195cc6c6 KVM: arm64: Clarify explanation of STAGE2_PGTABLE_LEVELS new bea2ef803ade KVM: arm/arm64: vgic: Cap SPIs to the VM-defined maximum new c23b2e6fc4ca KVM: arm/arm64: vgic: Fix off-by-one bug in vgic_get_irq() new 9009782a4937 KVM: arm/arm64: vgic: Consider priority and active state f [...] new 71a7e47f39a2 KVM: arm/arm64: Fixup the kvm_exit tracepoint new 8a411b060f82 KVM: arm/arm64: Remove arch timer workqueue new 6e14ef1d12dc KVM: arm/arm64: arch_timer: Simplify kvm_timer_vcpu_terminate new da6f16662a6e KVM: arm64: Make vcpu const in vcpu_read_sys_reg new 599d79dcd18f arm64: KVM: Add trapped system register access tracepoint new 107352a24900 arm/arm64: KVM: vgic: Force VM halt when changing the acti [...] new 6794ad5443a2 KVM: arm/arm64: Fix unintended stage 2 PMD mappings new df655b75c43f arm64: KVM: Avoid setting the upper 32 bits of VTCR_EL2 to 1 new 58466766cd35 arm/arm64: KVM: Add ARM_EXCEPTION_IS_TRAP macro new 8c33df1afd86 arm: KVM: Add S2_PMD_{MASK,SIZE} constants new 8c5e14f438b8 Merge tag 'kvmarm-for-v4.21' of git://git.kernel.org/pub/s [...] new 308c3e6673b0 KVM: s390: unregister debug feature on failing arch init new 7aedd9d48f2a KVM: s390: fix kmsg component kvm-s390 new e9f2e05a5f19 Merge tag 'kvm-s390-next-4.21-1' of git://git.kernel.org/p [...] new 234ff0b729ad KVM: PPC: Book3S HV: Fix race between kvm_unmap_hva_range [...] new 0f6ddf34be2a KVM: PPC: Book3S HV: Change to use DEFINE_SHOW_ATTRIBUTE macro new 6142236cd9f7 KVM: PPC: Book3S PR: Set hflag to indicate that POWER9 sup [...] new f032b73459ee KVM: PPC: Pass change type down to memslot commit function new f460f6791a02 KVM: PPC: Book3S HV: Map single pages when doing dirty pag [...] new c43c3a8683fe KVM: PPC: Book3S HV: Cleanups - constify memslots, fix comments new 5af3e9d06d83 KVM: PPC: Book3S HV: Flush guest mappings when turning dir [...] new 693ac10a88a2 KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on po [...] new d232afebf971 KVM: PPC: Book3S HV: Add function kvmhv_vcpu_is_radix() new d7b456152230 KVM: PPC: Book3S HV: Implement functions to access quadran [...] new dceadcf91b2e KVM: PPC: Add load_from_eaddr and store_to_eaddr to the kv [...] new cc6929cc842c KVM: PPC: Update kvmppc_st and kvmppc_ld to use quadrants new 873db2cd9a6d KVM: PPC: Book3S HV: Allow passthrough of an emulated devi [...] new 6ff887b8bd0d KVM: PPC: Book3S: Introduce new hcall H_COPY_TOFROM_GUEST [...] new 95d386c2d2e7 KVM: PPC: Book3S HV: Allow passthrough of an emulated devi [...] new cfdfaf4a8640 Merge tag 'kvm-ppc-next-4.21-1' of git://git.kernel.org/pu [...] new ed8e48122728 KVM: x86: fix size of x86_fpu_cache objects new e87555e550ce KVM: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported new b85c32dd2749 selftests: kvm: report failed stage when exit reason is un [...] new ba7424b200d3 KVM: VMX: Remove duplicated include from vmx.c new f1b9dd5eb86c kvm: Disallow wraparound in kvm_gfn_to_hva_cache_init new 7a86dab8cf2f kvm: Change offset in kvm_write_guest_offset_cached to unsigned new e081354d6aa7 KVM: nSVM: Fix nested guest support for PAUSE filtering. new 9ebdfe5230f2 kvm: nVMX: NMI-window and interrupt-window exiting should [...] new 788fc1e9ad8e kvm: vmx: Allow guest read access to IA32_TSC new 9b7ebff23cb8 KVM: x86: Remove KF() macro placeholder new 649472a1694f x86/kvmclock: convert to SPDX identifiers new bdd303cb1bdb KVM: fix some typos new b442324b5815 kvm: selftests: x86_64: dirty_log_test: fix -t new d4df5a15602e kvm: selftests: dirty_log_test: don't identity map the test mem new 6498e1da84da kvm: selftests: dirty_log_test: always use -t new fd3f6f813976 kvm: selftests: dirty_log_test: reset guest test phys offset new 696ade770f08 kvm: selftests: dirty_log_test: improve mode param management new cdbd24284824 kvm: selftests: add pa-48/va-48 VM modes new 8cee58161eff kvm: selftests: aarch64: dirty_log_test: support greater t [...] new 887eda13b570 perf/x86/intel/pt: Move Intel PT MSRs bit defines to globa [...] new f6d079ce867d perf/x86/intel/pt: Export pt_cap_get() new 61be2998ca54 perf/x86/intel/pt: Introduce intel_pt_validate_cap() new 69843a913fc8 perf/x86/intel/pt: Add new bit definitions for PT MSRs new e0018afec50a perf/x86/intel/pt: add new capability for Intel PT new f99e3daf94ff KVM: x86: Add Intel PT virtualization work mode new 86f5201df0d3 KVM: x86: Add Intel Processor Trace cpuid emulation new 2ef444f1600b KVM: x86: Add Intel PT context switch for each vcpu new 6c0f0bba85a0 KVM: x86: Introduce a function to initialize the PT configuration new bf8c55d8dc09 KVM: x86: Implement Intel PT MSRs read/write emulation new b08c28960f25 KVM: x86: Set intercept for Intel PT MSRs read/write new ee85dec2fe9c KVM: x86: Disable Intel PT when VMXON in L1 guest new a49b96352e68 KVM: Add tlb_remote_flush_with_range callback in kvm_x86_ops new cc4edae4b924 x86/hyper-v: Add HvFlushGuestAddressList hypercall support new 1f3a3e46cc49 KVM/VMX: Add hv tlb range flush support new 40ef75a758b2 KVM/MMU: Add tlb flush with range helper function new c3134ce240ee KVM: Replace old tlb flush function with new one to flush [...] new 748c0e312fce KVM: Make kvm_set_spte_hva() return int new 0cf853c5e238 KVM/MMU: Move tlb flush in kvm_set_pte_rmapp() to kvm_mmu_ [...] new 3cc5ea94de5f KVM/MMU: Flush tlb directly in kvm_set_pte_rmapp() new 71883a62fcd6 KVM/MMU: Flush tlb directly in the kvm_zap_gfn_range() new ac5ffda2447f KVM/x86: Use SVM assembly instruction mnemonics instead of [...] new c2a7fad5fcd3 MAINTAINERS: Add arch/x86/kvm sub-directories to existing [...] new e81434995081 KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup new bec6e03b5ea5 KVM: PPC: Book3S HV: Hold kvm->mmu_lock across updating ne [...] new 8400f8740651 KVM: PPC: Book3S HV: Align gfn to L1 page size when insert [...] new 8b23eee4e55a KVM: PPC: Book3S HV: Apply combination of host and l1 pte [...] new 90165d3da076 KVM: PPC: Book3S HV: Introduce kvmhv_update_nest_rmap_rc_list() new ae59a7e1945b KVM: PPC: Book3S HV: Keep rc bits in shadow pgtable in syn [...] new c6ad45973380 Merge tag 'kvm-ppc-next-4.21-2' of git://git.kernel.org/pu [...] new 051a2d3e59e5 KVM: VMX: Explicitly reference RCX as the vmx_vcpu pointer [...] new 453eafbe65f7 KVM: VMX: Move VM-Enter + VM-Exit handling to non-inline s [...] new 2bcbd406715d Revert "compiler-gcc: disable -ftracer for __noclone functions" new 57d5edfe640e kvm: selftests: ucall: fix exit mmio address guessing new a0aea130afeb KVM: x86: Add CPUID support for new instruction WBNOINVD new 42b00f122cfb Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 190 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/virtual/kvm/api.txt | 136 +- MAINTAINERS | 2 + arch/arm/include/asm/kvm_asm.h | 4 + arch/arm/include/asm/kvm_host.h | 7 +- arch/arm/include/asm/kvm_mmu.h | 61 + arch/arm/include/asm/stage2_pgtable.h | 8 + arch/arm/kvm/coproc.c | 4 +- arch/arm64/include/asm/kvm_arm.h | 6 +- arch/arm64/include/asm/kvm_asm.h | 7 + arch/arm64/include/asm/kvm_emulate.h | 35 +- arch/arm64/include/asm/kvm_host.h | 5 +- arch/arm64/include/asm/kvm_mmu.h | 48 + arch/arm64/include/asm/pgtable-hwdef.h | 4 + arch/arm64/include/asm/pgtable.h | 9 + arch/arm64/include/asm/stage2_pgtable.h | 16 +- arch/arm64/kvm/debug.c | 21 - arch/arm64/kvm/handle_exit.c | 14 +- arch/arm64/kvm/hyp/switch.c | 43 +- arch/arm64/kvm/hyp/vgic-v2-cpuif-proxy.c | 12 +- arch/arm64/kvm/sys_regs.c | 12 +- arch/arm64/kvm/sys_regs.h | 4 + arch/arm64/kvm/trace.h | 35 + arch/mips/include/asm/kvm_host.h | 2 +- arch/mips/kvm/mips.c | 29 +- arch/mips/kvm/mmu.c | 3 +- arch/powerpc/include/asm/hvcall.h | 1 + arch/powerpc/include/asm/kvm_book3s.h | 23 +- arch/powerpc/include/asm/kvm_book3s_64.h | 18 +- arch/powerpc/include/asm/kvm_host.h | 5 +- arch/powerpc/include/asm/kvm_ppc.h | 10 +- arch/powerpc/kernel/exceptions-64s.S | 9 + arch/powerpc/kvm/book3s.c | 8 +- arch/powerpc/kvm/book3s_64_mmu_hv.c | 12 +- arch/powerpc/kvm/book3s_64_mmu_radix.c | 160 +- arch/powerpc/kvm/book3s_hv.c | 95 +- arch/powerpc/kvm/book3s_hv_nested.c | 190 +- arch/powerpc/kvm/book3s_hv_rm_mmu.c | 2 +- arch/powerpc/kvm/book3s_pr.c | 4 +- arch/powerpc/kvm/book3s_xics.c | 12 +- arch/powerpc/kvm/book3s_xive.c | 12 +- arch/powerpc/kvm/booke.c | 3 +- arch/powerpc/kvm/e500_mmu_host.c | 3 +- arch/powerpc/kvm/powerpc.c | 47 +- arch/powerpc/mm/fault.c | 1 + arch/s390/kvm/kvm-s390.c | 35 +- arch/x86/Kbuild | 2 + arch/x86/Kconfig | 6 + arch/x86/events/intel/pt.c | 60 +- arch/x86/events/intel/pt.h | 58 - arch/x86/hyperv/nested.c | 80 + arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/hyperv-tlfs.h | 335 +- arch/x86/include/asm/intel_pt.h | 26 + arch/x86/include/asm/kvm_host.h | 25 +- arch/x86/include/asm/mshyperv.h | 15 + arch/x86/include/asm/msr-index.h | 37 + arch/x86/include/asm/svm.h | 7 - arch/x86/include/asm/trace/hyperv.h | 14 + arch/x86/include/asm/vmx.h | 9 + arch/x86/kernel/head_64.S | 2 +- arch/x86/kernel/kvmclock.c | 15 +- arch/x86/kvm/Makefile | 2 +- arch/x86/kvm/cpuid.c | 31 +- arch/x86/kvm/hyperv.c | 305 +- arch/x86/kvm/hyperv.h | 4 + arch/x86/kvm/kvm_cache_regs.h | 2 + arch/x86/kvm/lapic.c | 5 +- arch/x86/kvm/mmu.c | 98 +- arch/x86/kvm/paging_tmpl.h | 3 +- arch/x86/kvm/svm.c | 68 +- arch/x86/kvm/trace.h | 10 +- arch/x86/kvm/vmx.c | 15252 ------------------- arch/x86/kvm/vmx/capabilities.h | 343 + arch/x86/kvm/{vmx_evmcs.h => vmx/evmcs.c} | 78 +- arch/x86/kvm/vmx/evmcs.h | 202 + arch/x86/kvm/vmx/nested.c | 5721 +++++++ arch/x86/kvm/vmx/nested.h | 282 + arch/x86/kvm/vmx/ops.h | 285 + arch/x86/kvm/{ => vmx}/pmu_intel.c | 0 arch/x86/kvm/vmx/vmcs.h | 136 + arch/x86/kvm/vmx/vmcs12.c | 157 + arch/x86/kvm/vmx/vmcs12.h | 462 + .../vmcs_shadow_fields.h} | 0 arch/x86/kvm/vmx/vmenter.S | 57 + arch/x86/kvm/vmx/vmx.c | 7935 ++++++++++ arch/x86/kvm/vmx/vmx.h | 519 + arch/x86/kvm/x86.c | 161 +- arch/x86/platform/pvh/Makefile | 5 + .../enlighten_pvh.c => platform/pvh/enlighten.c} | 77 +- arch/x86/{xen/xen-pvh.S => platform/pvh/head.S} | 0 arch/x86/xen/Kconfig | 3 +- arch/x86/xen/Makefile | 2 - arch/x86/xen/enlighten_pvh.c | 92 +- arch/x86/xen/xen-asm_64.S | 2 + drivers/gpu/drm/xen/Kconfig | 1 + drivers/gpu/drm/xen/Makefile | 1 - drivers/gpu/drm/xen/xen_drm_front.c | 65 +- drivers/gpu/drm/xen/xen_drm_front_gem.c | 1 - drivers/gpu/drm/xen/xen_drm_front_shbuf.c | 414 - drivers/gpu/drm/xen/xen_drm_front_shbuf.h | 64 - drivers/hv/hv.c | 2 +- drivers/hv/hyperv_vmbus.h | 68 - drivers/xen/Kconfig | 3 + drivers/xen/Makefile | 1 + drivers/xen/xen-front-pgdir-shbuf.c | 553 + drivers/xen/xen-pciback/pci_stub.c | 3 +- include/kvm/arm_arch_timer.h | 4 - include/linux/compiler_attributes.h | 9 +- include/linux/kvm_host.h | 12 +- include/uapi/linux/kvm.h | 19 + include/xen/interface/hvm/start_info.h | 63 +- include/xen/xen-front-pgdir-shbuf.h | 89 + include/xen/xen.h | 3 + sound/xen/Kconfig | 1 + sound/xen/Makefile | 1 - sound/xen/xen_snd_front.c | 7 +- sound/xen/xen_snd_front.h | 4 +- sound/xen/xen_snd_front_alsa.c | 102 +- sound/xen/xen_snd_front_shbuf.c | 194 - sound/xen/xen_snd_front_shbuf.h | 36 - tools/kvm/kvm_stat/kvm_stat | 2 +- tools/testing/selftests/android/Makefile | 2 +- tools/testing/selftests/futex/functional/Makefile | 1 + tools/testing/selftests/gpio/Makefile | 6 +- tools/testing/selftests/kvm/Makefile | 5 +- tools/testing/selftests/kvm/clear_dirty_log_test.c | 2 + tools/testing/selftests/kvm/dirty_log_test.c | 165 +- tools/testing/selftests/kvm/include/kvm_util.h | 8 + .../testing/selftests/kvm/lib/aarch64/processor.c | 18 +- tools/testing/selftests/kvm/lib/kvm_util.c | 67 +- .../testing/selftests/kvm/lib/kvm_util_internal.h | 1 + tools/testing/selftests/kvm/lib/ucall.c | 36 +- tools/testing/selftests/kvm/x86_64/evmcs_test.c | 4 +- tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c | 157 + tools/testing/selftests/kvm/x86_64/state_test.c | 4 +- tools/testing/selftests/lib.mk | 8 +- .../selftests/networking/timestamping/Makefile | 1 + tools/testing/selftests/tc-testing/bpf/Makefile | 1 + tools/testing/selftests/vm/Makefile | 1 + virt/kvm/arm/arch_timer.c | 35 +- virt/kvm/arm/arm.c | 47 +- virt/kvm/arm/hyp/vgic-v3-sr.c | 6 +- virt/kvm/arm/mmio.c | 11 +- virt/kvm/arm/mmu.c | 390 +- virt/kvm/arm/trace.h | 18 +- virt/kvm/arm/vgic/vgic-mmio.c | 44 +- virt/kvm/arm/vgic/vgic.c | 13 +- virt/kvm/async_pf.c | 2 +- virt/kvm/kvm_main.c | 208 +- 149 files changed, 19936 insertions(+), 17215 deletions(-) delete mode 100644 arch/x86/kvm/vmx.c create mode 100644 arch/x86/kvm/vmx/capabilities.h rename arch/x86/kvm/{vmx_evmcs.h => vmx/evmcs.c} (88%) create mode 100644 arch/x86/kvm/vmx/evmcs.h create mode 100644 arch/x86/kvm/vmx/nested.c create mode 100644 arch/x86/kvm/vmx/nested.h create mode 100644 arch/x86/kvm/vmx/ops.h rename arch/x86/kvm/{ => vmx}/pmu_intel.c (100%) create mode 100644 arch/x86/kvm/vmx/vmcs.h create mode 100644 arch/x86/kvm/vmx/vmcs12.c create mode 100644 arch/x86/kvm/vmx/vmcs12.h rename arch/x86/kvm/{vmx_shadow_fields.h => vmx/vmcs_shadow_fields.h} (100%) create mode 100644 arch/x86/kvm/vmx/vmenter.S create mode 100644 arch/x86/kvm/vmx/vmx.c create mode 100644 arch/x86/kvm/vmx/vmx.h create mode 100644 arch/x86/platform/pvh/Makefile copy arch/x86/{xen/enlighten_pvh.c => platform/pvh/enlighten.c} (54%) rename arch/x86/{xen/xen-pvh.S => platform/pvh/head.S} (100%) delete mode 100644 drivers/gpu/drm/xen/xen_drm_front_shbuf.c delete mode 100644 drivers/gpu/drm/xen/xen_drm_front_shbuf.h create mode 100644 drivers/xen/xen-front-pgdir-shbuf.c create mode 100644 include/xen/xen-front-pgdir-shbuf.h delete mode 100644 sound/xen/xen_snd_front_shbuf.c delete mode 100644 sound/xen/xen_snd_front_shbuf.h create mode 100644 tools/testing/selftests/kvm/clear_dirty_log_test.c create mode 100644 tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c