linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Paolo Bonzini <pbonzini@redhat.com>
To: torvalds@linux-foundation.org
Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org
Subject: [GIT PULL] First batch of KVM changes for Linux 5.7
Date: Thu,  2 Apr 2020 15:22:43 -0400	[thread overview]
Message-ID: <20200402192243.7186-1-pbonzini@redhat.com> (raw)

Linus,

The following changes since commit 009384b38034111bf2c0c7bfb2740f5bd45c176c:

  irqchip/gic-v4.1: Eagerly vmap vPEs (2020-03-24 12:15:51 +0000)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 514ccc194971d0649e4e7ec8a9b3a6e33561d7bf:

  x86/kvm: fix a missing-prototypes "vmread_error" (2020-04-02 15:17:45 -0400)

----------------------------------------------------------------
ARM:
* GICv4.1 support
* 32bit host removal

PPC:
* secure (encrypted) using under the Protected Execution Framework
ultravisor

s390:
* allow disabling GISA (hardware interrupt injection) and protected
VMs/ultravisor support.

x86:
* New dirty bitmap flag that sets all bits in the bitmap when dirty
page logging is enabled; this is faster because it doesn't require bulk
modification of the page tables.
* Initial work on making nested SVM event injection more similar to VMX,
and less buggy.
* Various cleanups to MMU code (though the big ones and related
optimizations were delayed to 5.8).  Instead of using cr3 in function
names which occasionally means eptp, KVM too has standardized on "pgd".
* A large refactoring of CPUID features, which now use an array that
parallels the core x86_features.
* Some removal of pointer chasing from kvm_x86_ops, which will also be
switched to static calls as soon as they are available.
* New Tigerlake CPUID features.
* More bugfixes, optimizations and cleanups.

Generic:
* selftests: cleanups, new MMU notifier stress test, steal-time test
* CSV output for kvm_stat.

KVM/MIPS has been broken since 5.5, it does not compile due to a patch committed
by MIPS maintainers.  I had already prepared a fix, but the MIPS maintainers
prefer to fix it in generic code rather than KVM so they are taking care of it.

----------------------------------------------------------------

The branch shows up as based on a random commit because of an ARM topic branch
that you have already merged.  Most of it was developed as usual in the past couple of
months---no rebases or back merges here.

However, I also had 4 more patches to split a large file, but git hates
resolving that merge ("-X histogram" or "-X patience" make things a
little better, but not something that you shoud care about).  I will
rebase those, retest, and send them separately.

Thanks,

Paolo

Andrew Jones (17):
      KVM: selftests: aarch64: Use stream when given
      KVM: selftests: Remove unnecessary defines
      KVM: selftests: aarch64: Remove unnecessary ifdefs
      KVM: selftests: Rename vm_guest_mode_params
      KVM: selftests: Introduce vm_guest_mode_params
      KVM: selftests: Introduce num-pages conversion utilities
      KVM: selftests: Rework debug message printing
      KVM: selftests: Convert some printf's to pr_info's
      KVM: selftests: Fix unknown ucall command asserts
      KVM: selftests: s390x: Provide additional num-guest-pages adjustment
      selftests: KVM: SVM: Add vmcall test to gitignore
      KVM: selftests: Share common API documentation
      KVM: selftests: Enable printf format warnings for TEST_ASSERT
      KVM: selftests: Use consistent message for test skipping
      KVM: selftests: virt_map should take npages, not size
      KVM: selftests: Introduce steal-time test
      KVM: selftests: Rework timespec functions and usage

Ben Gardon (8):
      KVM: selftests: Create a demand paging test
      KVM: selftests: Add demand paging content to the demand paging test
      KVM: selftests: Add configurable demand paging delay
      KVM: selftests: Add memory size parameter to the demand paging test
      KVM: selftests: Pass args to vCPU in global vCPU args struct
      KVM: selftests: Add support for vcpu_args_set to aarch64 and s390x
      KVM: selftests: Support multiple vCPUs in demand paging test
      KVM: selftests: Time guest demand paging

Chia-I Wu (1):
      KVM: vmx: rewrite the comment in vmx_get_mt_mask

Christian Borntraeger (12):
      Merge branch 'pvbase' of git://git.kernel.org/.../kvms390/linux into HEAD
      KVM: s390/mm: Make pages accessible before destroying the guest
      KVM: s390: protvirt: Add SCLP interrupt handling
      KVM: s390: protvirt: do not inject interrupts after start
      KVM: s390: protvirt: introduce and enable KVM_CAP_S390_PROTECTED
      selftests: KVM: s390: fixup fprintf format error in reset.c
      selftests: KVM: s390: fix format strings for access reg test
      selftests: KVM: s390: fix early guest crash
      selftests: KVM: s390: test more register variants for the reset ioctl
      selftests: KVM: s390: check for registers to NOT change on reset
      KVM: s390: mark sie block as 512 byte aligned
      s390/gmap: return proper error code on ksm unsharing

Claudio Imbrenda (2):
      s390/mm: provide memory management functions for protected KVM guests
      KVM: s390/mm: handle guest unpin events

Eric Hankland (1):
      KVM: x86: Adjust counter sample period after a wrmsr

Fabiano Rosas (1):
      KVM: PPC: Book3S HV: Skip kvmppc_uvmem_free if Ultravisor is not supported

Greg Kurz (3):
      KVM: PPC: Book3S PR: Fix kernel crash with PR KVM
      KVM: PPC: Book3S PR: Move kvmppc_mmu_init() into PR KVM
      KVM: PPC: Kill kvmppc_ops::mmu_destroy() and kvmppc_mmu_destroy()

Gustavo Romero (1):
      KVM: PPC: Book3S HV: Treat TM-related invalid form instructions on P9 like the valid ones

Jan Kiszka (1):
      KVM: x86: Trace the original requested CPUID function in kvm_cpuid()

Janosch Frank (24):
      s390/protvirt: Add sysfs firmware interface for Ultravisor information
      KVM: s390: protvirt: Add UV debug trace
      KVM: s390: add new variants of UV CALL
      KVM: s390: protvirt: Add initial vm and cpu lifecycle handling
      KVM: s390: protvirt: Secure memory is not mergeable
      KVM: s390: protvirt: Handle SE notification interceptions
      KVM: s390: protvirt: Instruction emulation
      KVM: s390: protvirt: Handle spec exception loops
      KVM: s390: protvirt: Add new gprs location handling
      KVM: S390: protvirt: Introduce instruction data area bounce buffer
      KVM: s390: protvirt: handle secure guest prefix pages
      KVM: s390: protvirt: Write sthyi data to instruction data area
      KVM: s390: protvirt: STSI handling
      KVM: s390: protvirt: disallow one_reg
      KVM: s390: protvirt: Do only reset registers that are accessible
      KVM: s390: protvirt: Only sync fmt4 registers
      KVM: s390: protvirt: Add program exception injection
      KVM: s390: protvirt: UV calls in support of diag308 0, 1
      KVM: s390: protvirt: Report CPU state to Ultravisor
      KVM: s390: protvirt: Support cmd 5 operation state
      KVM: s390: protvirt: Mask PSW interrupt bits for interception 104 and 112
      KVM: s390: protvirt: Add UV cpu reset calls
      DOCUMENTATION: Protected virtual machine introduction and IPL
      KVM: s390: protvirt: Add KVM api documentation

Jay Zhou (2):
      KVM: x86: enable dirty log gradually in small chunks
      kvm: selftests: Support dirty log initial-all-set test

Joe Perches (2):
      KVM: PPC: Use fallthrough;
      KVM: s390: Use fallthrough;

KarimAllah Ahmed (1):
      KVM: arm64: Use the correct timer structure to access the physical counter

Laurent Dufour (2):
      KVM: PPC: Book3S HV: Check caller of H_SVM_* Hcalls
      KVM: PPC: Book3S HV: H_SVM_INIT_START must call UV_RETURN

Marc Zyngier (16):
      arm: Unplug KVM from the build system
      arm: Remove KVM from config files
      arm: Remove 32bit KVM host support
      arm: Remove HYP/Stage-2 page-table support
      arm: Remove GICv3 vgic compatibility macros
      arm: Remove the ability to set HYP vectors outside of the decompressor
      MAINTAINERS: RIP KVM/arm
      KVM: arm64: GICv4.1: Let doorbells be auto-enabled
      KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
      KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts
      KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
      KVM: arm64: GICv4.1: Reload VLPI configuration on distributor enable/disable
      KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs
      KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs
      Merge branch 'kvm-arm64/gic-v4.1' into kvmarm-master/next
      Merge tag 'kvm-arm-removal' into kvmarm-master/next

Miaohe Lin (6):
      KVM: x86: Fix print format and coding style
      KVM: x86: eliminate some unreachable code
      KVM: VMX: Add 'else' to split mutually exclusive case
      KVM: apic: remove unused function apic_lvt_vector()
      KVM: Fix some obsolete comments
      KVM: nSVM: Remove an obsolete comment.

Michael Ellerman (1):
      KVM: PPC: Book3S HV: Use RADIX_PTE_INDEX_SIZE in Radix MMU code

Michael Mueller (2):
      KVM: s390: protvirt: Implement interrupt injection
      KVM: s390: introduce module parameter kvm.use_gisa

Michael Roth (1):
      KVM: PPC: Book3S HV: Fix H_CEDE return code for nested guests

Oliver Upton (2):
      KVM: SVM: Inhibit APIC virtualization for X2APIC guest
      KVM: nVMX: Consolidate nested MTF checks to helper function

Paolo Bonzini (17):
      KVM: x86: handle GBPAGE CPUID adjustment for EPT with generic code
      KVM: CPUID: add support for supervisor states
      KVM: x86: unify callbacks to load paging root
      KVM: x86: rename set_cr3 callback and related flags to load_mmu_pgd
      KVM: nSVM: do not change host intercepts while nested VM is running
      KVM: nSVM: ignore L1 interrupt window while running L2 with V_INTR_MASKING=1
      KVM: nSVM: implement check_nested_events for interrupts
      KVM: nSVM: avoid loss of pending IRQ/NMI before entering L2
      KVM: X86: correct meaningless kvm_apicv_activated() check
      Merge branch 'kvm-null-pointer-fix' into HEAD
      Merge tag 'kvm-s390-next-5.7-1' of git://git.kernel.org/.../kvms390/linux into HEAD
      KVM: nVMX: remove side effects from nested_vmx_exit_reflected
      KVM: nSVM: check for EFER.SVME=1 before entering guest
      Merge tag 'kvm-s390-next-5.7-2' of git://git.kernel.org/.../kvms390/linux into HEAD
      Merge tag 'kvm-s390-next-5.7-3' of git://git.kernel.org/.../kvms390/linux into HEAD
      Merge tag 'kvmarm-5.7' of git://git.kernel.org/.../kvmarm/kvmarm into HEAD
      Merge tag 'kvm-ppc-next-5.7-1' of git://git.kernel.org/.../paulus/powerpc into HEAD

Paul Mackerras (2):
      KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot in HPT page fault handler
      KVM: PPC: Book3S HV: Add a capability for enabling secure guests

Peter Xu (3):
      KVM: Remove unnecessary asm/kvm_host.h includes
      KVM: Drop gfn_to_pfn_atomic()
      KVM: Documentation: Update fast page fault for indirect sp

Qian Cai (1):
      x86/kvm: fix a missing-prototypes "vmread_error"

Sean Christopherson (132):
      KVM: x86: Add EMULTYPE_PF when emulation is triggered by a page fault
      KVM: x86: Move gpa_val and gpa_available into the emulator context
      KVM: x86: Allocate new rmap and large page tracking when moving memslot
      KVM: Reinstall old memslots if arch preparation fails
      KVM: Don't free new memslot if allocation of said memslot fails
      KVM: PPC: Move memslot memory allocation into prepare_memory_region()
      KVM: x86: Allocate memslot resources during prepare_memory_region()
      KVM: Drop kvm_arch_create_memslot()
      KVM: Explicitly free allocated-but-unused dirty bitmap
      KVM: Refactor error handling for setting memory region
      KVM: Move setting of memslot into helper routine
      KVM: Drop "const" attribute from old memslot in commit_memory_region()
      KVM: x86: Free arrays for old memslot when moving memslot's base gfn
      KVM: Move memslot deletion to helper function
      KVM: Simplify kvm_free_memslot() and all its descendents
      KVM: Clean up local variable usage in __kvm_set_memory_region()
      KVM: Provide common implementation for generic dirty log functions
      KVM: Ensure validity of memslot with respect to kvm_get_dirty_log()
      KVM: Terminate memslot walks via used_slots
      KVM: Dynamically size memslot array based on number of used slots
      KVM: selftests: Add test for KVM_SET_USER_MEMORY_REGION
      KVM: x86/mmu: Move kvm_arch_flush_remote_tlbs_memslot() to mmu.c
      KVM: x86/mmu: Use range-based TLB flush for dirty log memslot flush
      KVM: x86/mmu: Consolidate open coded variants of memslot TLB flushes
      KVM: x86: Gracefully handle __vmalloc() failure during VM allocation
      KVM: x86: Directly return __vmalloc() result in ->vm_alloc()
      KVM: x86: Consolidate VM allocation and free for VMX and SVM
      KVM: x86/mmu: Ignore guest CR3 on fast root switch for direct MMU
      KVM: x86/mmu: Reuse the current root if possible for fast switch
      KVM: nVMX: Properly handle userspace interrupt window request
      KVM: x86/mmu: Don't drop level/direct from MMU role calculation
      KVM: x86/mmu: Drop kvm_mmu_extended_role.cr4_la57 hack
      KVM: nVMX: Allow L1 to use 5-level page walks for nested EPT
      KVM: nVMX: Rename nested_ept_get_cr3() to nested_ept_get_eptp()
      KVM: nVMX: Rename EPTP validity helper and associated variables
      KVM: x86/mmu: Rename kvm_mmu->get_cr3() to ->get_guest_pgd()
      KVM: nVMX: Drop unnecessary check on ept caps for execute-only
      KVM: x86: Fix warning due to implicit truncation on 32-bit KVM
      KVM: x86: Refactor I/O emulation helpers to provide vcpu-only variant
      KVM: x86: Explicitly pass an exception struct to check_intercept
      KVM: x86: Move emulation-only helpers to emulate.c
      KVM: x86: Dynamically allocate per-vCPU emulation context
      KVM: x86: Move kvm_emulate.h into KVM's private directory
      KVM: x86: Shrink the usercopy region of the emulation context
      KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries
      KVM: x86: Refactor loop around do_cpuid_func() to separate helper
      KVM: x86: Simplify handling of Centaur CPUID leafs
      KVM: x86: Clean up error handling in kvm_dev_ioctl_get_cpuid()
      KVM: x86: Check userspace CPUID array size after validating sub-leaf
      KVM: x86: Move CPUID 0xD.1 handling out of the index>0 loop
      KVM: x86: Check for CPUID 0xD.N support before validating array size
      KVM: x86: Warn on zero-size save state for valid CPUID 0xD.N sub-leaf
      KVM: x86: Refactor CPUID 0xD.N sub-leaf entry creation
      KVM: x86: Clean up CPUID 0x7 sub-leaf loop
      KVM: x86: Drop the explicit @index from do_cpuid_7_mask()
      KVM: x86: Drop redundant boot cpu checks on SSBD feature bits
      KVM: x86: Consolidate CPUID array max num entries checking
      KVM: x86: Hoist loop counter and terminator to top of __do_cpuid_func()
      KVM: x86: Refactor CPUID 0x4 and 0x8000001d handling
      KVM: x86: Encapsulate CPUID entries and metadata in struct
      KVM: x86: Drop redundant array size check
      KVM: x86: Use common loop iterator when handling CPUID 0xD.N
      KVM: VMX: Add helpers to query Intel PT mode
      KVM: x86: Calculate the supported xcr0 mask at load time
      KVM: x86: Use supported_xcr0 to detect MPX support
      KVM: x86: Make kvm_mpx_supported() an inline function
      KVM: x86: Clear output regs for CPUID 0x14 if PT isn't exposed to guest
      KVM: x86: Drop explicit @func param from ->set_supported_cpuid()
      KVM: x86: Use u32 for holding CPUID register value in helpers
      KVM: x86: Replace bare "unsigned" with "unsigned int" in cpuid helpers
      KVM: x86: Introduce cpuid_entry_{get,has}() accessors
      KVM: x86: Introduce cpuid_entry_{change,set,clear}() mutators
      KVM: x86: Refactor cpuid_mask() to auto-retrieve the register
      KVM: x86: Handle MPX CPUID adjustment in VMX code
      KVM: x86: Handle INVPCID CPUID adjustment in VMX code
      KVM: x86: Handle UMIP emulation CPUID adjustment in VMX code
      KVM: x86: Handle PKU CPUID adjustment in VMX code
      KVM: x86: Handle RDTSCP CPUID adjustment in VMX code
      KVM: x86: Handle Intel PT CPUID adjustment in VMX code
      KVM: x86: Refactor handling of XSAVES CPUID adjustment
      KVM: x86: Introduce kvm_cpu_caps to replace runtime CPUID masking
      KVM: SVM: Convert feature updates from CPUID to KVM cpu caps
      KVM: VMX: Convert feature updates from CPUID to KVM cpu caps
      KVM: x86: Move XSAVES CPUID adjust to VMX's KVM cpu cap update
      KVM: x86: Add a helper to check kernel support when setting cpu cap
      KVM: x86: Use KVM cpu caps to mark CR4.LA57 as not-reserved
      KVM: x86: Use KVM cpu caps to track UMIP emulation
      KVM: x86: Fold CPUID 0x7 masking back into __do_cpuid_func()
      KVM: x86: Remove the unnecessary loop on CPUID 0x7 sub-leafs
      KVM: x86: Squash CPUID 0x2.0 insanity for modern CPUs
      KVM: x86: Remove stateful CPUID handling
      KVM: x86: Do host CPUID at load time to mask KVM cpu caps
      KVM: x86: Override host CPUID results with kvm_cpu_caps
      KVM: x86: Set emulated/transmuted feature bits via kvm_cpu_caps
      KVM: x86: Use kvm_cpu_caps to detect Intel PT support
      KVM: x86: Do kvm_cpuid_array capacity checks in terminal functions
      KVM: x86: Use KVM cpu caps to detect MSR_TSC_AUX virt support
      KVM: VMX: Directly use VMX capabilities helper to detect RDTSCP support
      KVM: x86: Check for Intel PT MSR virtualization using KVM cpu caps
      KVM: VMX: Directly query Intel PT mode when refreshing PMUs
      KVM: SVM: Refactor logging of NPT enabled/disabled
      KVM: x86/mmu: Merge kvm_{enable,disable}_tdp() into a common function
      KVM: x86/mmu: Configure max page level during hardware setup
      KVM: x86: Don't propagate MMU lpage support to memslot.disallow_lpage
      KVM: Drop largepages_enabled and its accessor/mutator
      KVM: x86: Move VMX's host_efer to common x86 code
      KVM: nSVM: Expose SVM features to L1 iff nested is enabled
      KVM: nSVM: Advertise and enable NRIPS for L1 iff nrips is enabled
      KVM: x86: Move nSVM CPUID 0x8000000A handling into common x86 code
      KVM: x86: Add helpers to perform CPUID-based guest vendor check
      KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs
      KVM: x86: Fix CPUID range checks for Hypervisor and Centaur classes
      KVM: x86: Refactor out-of-range logic to contain the madness
      KVM: x86: Refactor kvm_cpuid() param that controls out-of-range logic
      KVM: x86: Add requested index to the CPUID tracepoint
      KVM: x86: Add blurb to CPUID tracepoint when using max basic leaf values
      KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support
      KVM: VMX: Fold loaded_vmcs_init() into alloc_loaded_vmcs()
      KVM: VMX: Gracefully handle faults on VMXON
      KVM: Fix out of range accesses to memslots
      KVM: selftests: Fix cosmetic copy-paste error in vm_mem_region_move()
      KVM: Pass kvm_init()'s opaque param to additional arch funcs
      KVM: x86: Move init-only kvm_x86_ops to separate struct
      KVM: VMX: Move hardware_setup() definition below vmx_x86_ops
      KVM: VMX: Configure runtime hooks using vmx_x86_ops
      KVM: x86: Set kvm_x86_ops only after ->hardware_setup() completes
      KVM: x86: Copy kvm_x86_ops by value to eliminate layer of indirection
      KVM: x86: Drop __exit from kvm_x86_ops' hardware_unsetup()
      KVM: VMX: Annotate vmx_x86_ops as __initdata
      KVM: SVM: Annotate svm_x86_ops as __initdata
      KVM: VMX: Add a trampoline to fix VMREAD error handling
      KVM: x86: Fix BUILD_BUG() in __cpuid_entry_get_reg() w/ CONFIG_UBSAN=y

Stefan Raspl (4):
      tools/kvm_stat: rework command line sequence and message texts
      tools/kvm_stat: switch to argparse
      tools/kvm_stat: add command line switch '-s' to set update interval
      tools/kvm_stat: add command line switch '-c' to log in csv format

Suravee Suthikulpanit (1):
      kvm: svm: Introduce GA Log tracepoint for AVIC

Ulrich Weigand (1):
      KVM: s390/interrupt: do not pin adapter interrupt pages

Uros Bizjak (1):
      KVM: VMX: access regs array in vmenter.S in its natural order

Vasily Gorbik (3):
      s390/protvirt: introduce host side setup
      s390/protvirt: add ultravisor initialization
      s390/mm: add (non)secure page access exceptions handlers

Vitaly Kuznetsov (5):
      KVM: nVMX: stop abusing need_vmcs12_to_shadow_sync for eVMCS mapping
      KVM: nVMX: properly handle errors in nested_vmx_handle_enlightened_vmptrld()
      KVM: selftests: define and use EVMCS_VERSION
      KVM: selftests: test enlightened vmenter with wrong eVMCS version
      KVM: selftests: enlightened VMPTRLD with an incorrect GPA

Wainer dos Santos Moschetta (2):
      selftests: kvm: Introduce the TEST_FAIL macro
      selftests: kvm: Uses TEST_FAIL in tests/utilities

Wanpeng Li (5):
      KVM: LAPIC: Recalculate apic map in batch
      KVM: X86: trigger kvmclock sync request just once on VM creation
      KVM: VMX: Micro-optimize vmexit time when not exposing PMU
      KVM: X86: Delay read msr data iff writes ICR MSR
      KVM: X86: Micro-optimize IPI fastpath delay

Xiaoyao Li (1):
      KVM: x86: Code style cleanup in kvm_arch_dev_ioctl()

Zhenyu Wang (2):
      KVM: x86: Expose AVX512 VP2INTERSECT in cpuid for TGL
      KVM: x86: Expose fast short REP MOV for supported cpuid

 Documentation/admin-guide/kernel-parameters.txt    |    5 +
 Documentation/virt/kvm/api.rst                     |  128 +-
 Documentation/virt/kvm/arm/hyp-abi.rst             |    5 +
 Documentation/virt/kvm/devices/s390_flic.rst       |   11 +-
 Documentation/virt/kvm/index.rst                   |    2 +
 Documentation/virt/kvm/locking.rst                 |   11 +-
 Documentation/virt/kvm/s390-pv-boot.rst            |   84 ++
 Documentation/virt/kvm/s390-pv.rst                 |  116 ++
 MAINTAINERS                                        |    6 +-
 arch/arm/Kconfig                                   |    2 -
 arch/arm/Makefile                                  |    1 -
 arch/arm/configs/axm55xx_defconfig                 |    2 -
 arch/arm/include/asm/arch_gicv3.h                  |  114 --
 arch/arm/include/asm/kvm_arm.h                     |  239 ----
 arch/arm/include/asm/kvm_asm.h                     |   77 --
 arch/arm/include/asm/kvm_coproc.h                  |   36 -
 arch/arm/include/asm/kvm_emulate.h                 |  372 -----
 arch/arm/include/asm/kvm_host.h                    |  456 ------
 arch/arm/include/asm/kvm_hyp.h                     |  127 --
 arch/arm/include/asm/kvm_mmu.h                     |  435 ------
 arch/arm/include/asm/kvm_ras.h                     |   14 -
 arch/arm/include/asm/pgtable-3level.h              |   20 -
 arch/arm/include/asm/pgtable.h                     |    9 -
 arch/arm/include/asm/sections.h                    |    6 +-
 arch/arm/include/asm/stage2_pgtable.h              |   75 -
 arch/arm/include/asm/virt.h                        |   17 -
 arch/arm/include/uapi/asm/kvm.h                    |  314 -----
 arch/arm/kernel/asm-offsets.c                      |   11 -
 arch/arm/kernel/hyp-stub.S                         |   39 +-
 arch/arm/kernel/vmlinux-xip.lds.S                  |    8 -
 arch/arm/kernel/vmlinux.lds.S                      |    8 -
 arch/arm/kernel/vmlinux.lds.h                      |   10 -
 arch/arm/kvm/Kconfig                               |   59 -
 arch/arm/kvm/Makefile                              |   43 -
 arch/arm/kvm/coproc.c                              | 1455 --------------------
 arch/arm/kvm/coproc.h                              |  130 --
 arch/arm/kvm/coproc_a15.c                          |   39 -
 arch/arm/kvm/coproc_a7.c                           |   42 -
 arch/arm/kvm/emulate.c                             |  166 ---
 arch/arm/kvm/guest.c                               |  387 ------
 arch/arm/kvm/handle_exit.c                         |  175 ---
 arch/arm/kvm/hyp/Makefile                          |   34 -
 arch/arm/kvm/hyp/banked-sr.c                       |   70 -
 arch/arm/kvm/hyp/cp15-sr.c                         |   72 -
 arch/arm/kvm/hyp/entry.S                           |  121 --
 arch/arm/kvm/hyp/hyp-entry.S                       |  295 ----
 arch/arm/kvm/hyp/s2-setup.c                        |   22 -
 arch/arm/kvm/hyp/switch.c                          |  242 ----
 arch/arm/kvm/hyp/tlb.c                             |   68 -
 arch/arm/kvm/hyp/vfp.S                             |   57 -
 arch/arm/kvm/init.S                                |  157 ---
 arch/arm/kvm/interrupts.S                          |   36 -
 arch/arm/kvm/irq.h                                 |   16 -
 arch/arm/kvm/reset.c                               |   86 --
 arch/arm/kvm/trace.h                               |   86 --
 arch/arm/kvm/vgic-v3-coproc.c                      |   27 -
 arch/arm/mach-exynos/Kconfig                       |    2 +-
 arch/arm/mm/mmu.c                                  |   26 -
 arch/arm64/include/asm/kvm_emulate.h               |    3 +-
 arch/arm64/include/asm/kvm_host.h                  |    1 +
 arch/arm64/kvm/fpsimd.c                            |    1 -
 arch/arm64/kvm/guest.c                             |    1 -
 arch/arm64/kvm/hyp/switch.c                        |    1 -
 arch/arm64/kvm/sys_regs.c                          |    1 -
 arch/arm64/kvm/sys_regs_generic_v8.c               |    1 -
 arch/mips/include/asm/kvm_host.h                   |    2 +-
 arch/mips/kvm/mips.c                               |   75 +-
 arch/powerpc/include/asm/kvm_asm.h                 |    3 +
 arch/powerpc/include/asm/kvm_book3s_uvmem.h        |    6 +
 arch/powerpc/include/asm/kvm_host.h                |    1 +
 arch/powerpc/include/asm/kvm_ppc.h                 |   21 +-
 arch/powerpc/kvm/book3s.c                          |   25 +-
 arch/powerpc/kvm/book3s.h                          |    1 +
 arch/powerpc/kvm/book3s_32_mmu.c                   |    2 +-
 arch/powerpc/kvm/book3s_32_mmu_host.c              |    2 +-
 arch/powerpc/kvm/book3s_64_mmu.c                   |    2 +-
 arch/powerpc/kvm/book3s_64_mmu_host.c              |    2 +-
 arch/powerpc/kvm/book3s_64_mmu_hv.c                |  119 +-
 arch/powerpc/kvm/book3s_64_mmu_radix.c             |    2 +-
 arch/powerpc/kvm/book3s_64_vio.c                   |    1 -
 arch/powerpc/kvm/book3s_64_vio_hv.c                |    1 -
 arch/powerpc/kvm/book3s_hv.c                       |   90 +-
 arch/powerpc/kvm/book3s_hv_tm.c                    |   28 +-
 arch/powerpc/kvm/book3s_hv_tm_builtin.c            |   16 +-
 arch/powerpc/kvm/book3s_hv_uvmem.c                 |   19 +-
 arch/powerpc/kvm/book3s_pr.c                       |   26 +-
 arch/powerpc/kvm/booke.c                           |   26 +-
 arch/powerpc/kvm/booke.h                           |    2 -
 arch/powerpc/kvm/e500.c                            |    1 -
 arch/powerpc/kvm/e500_mmu.c                        |    4 -
 arch/powerpc/kvm/e500mc.c                          |    1 -
 arch/powerpc/kvm/mpic.c                            |    1 -
 arch/powerpc/kvm/powerpc.c                         |   37 +-
 arch/powerpc/kvm/timing.h                          |    1 -
 arch/s390/boot/Makefile                            |    2 +-
 arch/s390/boot/uv.c                                |   20 +
 arch/s390/include/asm/gmap.h                       |    6 +
 arch/s390/include/asm/kvm_host.h                   |  117 +-
 arch/s390/include/asm/mmu.h                        |    2 +
 arch/s390/include/asm/mmu_context.h                |    1 +
 arch/s390/include/asm/page.h                       |    5 +
 arch/s390/include/asm/pgtable.h                    |   35 +-
 arch/s390/include/asm/uv.h                         |  251 +++-
 arch/s390/kernel/Makefile                          |    1 +
 arch/s390/kernel/entry.h                           |    2 +
 arch/s390/kernel/pgm_check.S                       |    4 +-
 arch/s390/kernel/setup.c                           |    9 +-
 arch/s390/kernel/uv.c                              |  414 ++++++
 arch/s390/kvm/Makefile                             |    2 +-
 arch/s390/kvm/diag.c                               |    6 +-
 arch/s390/kvm/gaccess.c                            |   23 +-
 arch/s390/kvm/intercept.c                          |  123 +-
 arch/s390/kvm/interrupt.c                          |  401 +++---
 arch/s390/kvm/kvm-s390.c                           |  597 ++++++--
 arch/s390/kvm/kvm-s390.h                           |   51 +-
 arch/s390/kvm/priv.c                               |   13 +-
 arch/s390/kvm/pv.c                                 |  303 ++++
 arch/s390/mm/fault.c                               |   78 ++
 arch/s390/mm/gmap.c                                |   72 +-
 arch/x86/include/asm/kvm_host.h                    |  105 +-
 arch/x86/include/asm/kvm_page_track.h              |    3 +-
 arch/x86/include/asm/vmx.h                         |   12 +
 arch/x86/kvm/cpuid.c                               |  944 +++++++------
 arch/x86/kvm/cpuid.h                               |  151 +-
 arch/x86/kvm/emulate.c                             |   57 +-
 arch/x86/kvm/hyperv.c                              |    8 +-
 arch/x86/kvm/i8254.c                               |    2 +-
 arch/x86/kvm/kvm_cache_regs.h                      |   10 +-
 arch/x86/{include/asm => kvm}/kvm_emulate.h        |   43 +-
 arch/x86/kvm/lapic.c                               |   85 +-
 arch/x86/kvm/lapic.h                               |    2 +
 arch/x86/kvm/mmu.h                                 |   10 +-
 arch/x86/kvm/mmu/mmu.c                             |  209 +--
 arch/x86/kvm/mmu/page_track.c                      |   16 +-
 arch/x86/kvm/mmu/paging_tmpl.h                     |    4 +-
 arch/x86/kvm/pmu.c                                 |   34 +-
 arch/x86/kvm/pmu.h                                 |   11 +-
 arch/x86/kvm/svm.c                                 |  407 +++---
 arch/x86/kvm/trace.h                               |   50 +-
 arch/x86/kvm/vmx/capabilities.h                    |   25 +-
 arch/x86/kvm/vmx/evmcs.h                           |    7 +
 arch/x86/kvm/vmx/nested.c                          |  188 +--
 arch/x86/kvm/vmx/nested.h                          |    8 +-
 arch/x86/kvm/vmx/ops.h                             |   27 +-
 arch/x86/kvm/vmx/pmu_intel.c                       |    8 +-
 arch/x86/kvm/vmx/vmenter.S                         |   72 +-
 arch/x86/kvm/vmx/vmx.c                             |  665 +++++----
 arch/x86/kvm/vmx/vmx.h                             |    8 +-
 arch/x86/kvm/x86.c                                 |  787 ++++++-----
 arch/x86/kvm/x86.h                                 |   28 +-
 include/kvm/arm_vgic.h                             |    3 +
 include/linux/kvm_host.h                           |   71 +-
 include/uapi/linux/kvm.h                           |   47 +-
 tools/arch/x86/include/asm/unistd_64.h             |    3 +
 tools/kvm/kvm_stat/kvm_stat                        |  256 ++--
 tools/kvm/kvm_stat/kvm_stat.txt                    |   44 +-
 tools/testing/selftests/kvm/.gitignore             |    7 +-
 tools/testing/selftests/kvm/Makefile               |   12 +-
 tools/testing/selftests/kvm/clear_dirty_log_test.c |    4 +
 tools/testing/selftests/kvm/demand_paging_test.c   |  661 +++++++++
 tools/testing/selftests/kvm/dirty_log_test.c       |  107 +-
 tools/testing/selftests/kvm/include/evmcs.h        |    2 +
 tools/testing/selftests/kvm/include/kvm_util.h     |  126 +-
 tools/testing/selftests/kvm/include/test_util.h    |   28 +-
 tools/testing/selftests/kvm/kvm_create_max_vcpus.c |    8 +-
 .../testing/selftests/kvm/lib/aarch64/processor.c  |   41 +-
 tools/testing/selftests/kvm/lib/aarch64/ucall.c    |    2 +-
 tools/testing/selftests/kvm/lib/assert.c           |    6 +-
 tools/testing/selftests/kvm/lib/io.c               |   12 +-
 tools/testing/selftests/kvm/lib/kvm_util.c         |  170 ++-
 .../testing/selftests/kvm/lib/kvm_util_internal.h  |   59 +-
 tools/testing/selftests/kvm/lib/s390x/processor.c  |   78 +-
 tools/testing/selftests/kvm/lib/test_util.c        |   93 ++
 tools/testing/selftests/kvm/lib/x86_64/processor.c |  201 +--
 tools/testing/selftests/kvm/lib/x86_64/svm.c       |    2 +-
 tools/testing/selftests/kvm/lib/x86_64/vmx.c       |    4 +-
 tools/testing/selftests/kvm/s390x/memop.c          |    2 +-
 tools/testing/selftests/kvm/s390x/resets.c         |  138 +-
 tools/testing/selftests/kvm/s390x/sync_regs_test.c |   13 +-
 tools/testing/selftests/kvm/steal_time.c           |  352 +++++
 .../selftests/kvm/x86_64/cr4_cpuid_sync_test.c     |    6 +-
 tools/testing/selftests/kvm/x86_64/evmcs_test.c    |   35 +-
 tools/testing/selftests/kvm/x86_64/hyperv_cpuid.c  |    8 +-
 .../selftests/kvm/x86_64/mmio_warning_test.c       |    6 +-
 .../selftests/kvm/x86_64/platform_info_test.c      |    6 +-
 .../selftests/kvm/x86_64/set_memory_region_test.c  |  141 ++
 tools/testing/selftests/kvm/x86_64/smm_test.c      |    2 +-
 tools/testing/selftests/kvm/x86_64/state_test.c    |   10 +-
 .../testing/selftests/kvm/x86_64/svm_vmcall_test.c |    6 +-
 .../testing/selftests/kvm/x86_64/sync_regs_test.c  |    4 +-
 .../kvm/x86_64/vmx_close_while_nested_test.c       |    4 +-
 .../selftests/kvm/x86_64/vmx_dirty_log_test.c      |   17 +-
 .../kvm/x86_64/vmx_set_nested_state_test.c         |    4 +-
 .../selftests/kvm/x86_64/vmx_tsc_adjust_test.c     |    8 +-
 tools/testing/selftests/kvm/x86_64/xss_msr_test.c  |    2 +-
 virt/kvm/arm/arch_timer.c                          |    2 +-
 virt/kvm/arm/arm.c                                 |   60 +-
 virt/kvm/arm/mmu.c                                 |   20 +-
 virt/kvm/arm/psci.c                                |    1 -
 virt/kvm/arm/vgic/vgic-debug.c                     |   14 +-
 virt/kvm/arm/vgic/vgic-mmio-v3.c                   |   81 +-
 virt/kvm/arm/vgic/vgic-mmio.c                      |   88 +-
 virt/kvm/arm/vgic/vgic-v3.c                        |    2 +
 virt/kvm/arm/vgic/vgic-v4.c                        |  107 +-
 virt/kvm/arm/vgic/vgic.h                           |    1 +
 virt/kvm/kvm_main.c                                |  663 ++++++---
 206 files changed, 7871 insertions(+), 9702 deletions(-)
 create mode 100644 Documentation/virt/kvm/s390-pv-boot.rst
 create mode 100644 Documentation/virt/kvm/s390-pv.rst
 delete mode 100644 arch/arm/include/asm/kvm_arm.h
 delete mode 100644 arch/arm/include/asm/kvm_asm.h
 delete mode 100644 arch/arm/include/asm/kvm_coproc.h
 delete mode 100644 arch/arm/include/asm/kvm_emulate.h
 delete mode 100644 arch/arm/include/asm/kvm_host.h
 delete mode 100644 arch/arm/include/asm/kvm_hyp.h
 delete mode 100644 arch/arm/include/asm/kvm_mmu.h
 delete mode 100644 arch/arm/include/asm/kvm_ras.h
 delete mode 100644 arch/arm/include/asm/stage2_pgtable.h
 delete mode 100644 arch/arm/include/uapi/asm/kvm.h
 delete mode 100644 arch/arm/kvm/Kconfig
 delete mode 100644 arch/arm/kvm/Makefile
 delete mode 100644 arch/arm/kvm/coproc.c
 delete mode 100644 arch/arm/kvm/coproc.h
 delete mode 100644 arch/arm/kvm/coproc_a15.c
 delete mode 100644 arch/arm/kvm/coproc_a7.c
 delete mode 100644 arch/arm/kvm/emulate.c
 delete mode 100644 arch/arm/kvm/guest.c
 delete mode 100644 arch/arm/kvm/handle_exit.c
 delete mode 100644 arch/arm/kvm/hyp/Makefile
 delete mode 100644 arch/arm/kvm/hyp/banked-sr.c
 delete mode 100644 arch/arm/kvm/hyp/cp15-sr.c
 delete mode 100644 arch/arm/kvm/hyp/entry.S
 delete mode 100644 arch/arm/kvm/hyp/hyp-entry.S
 delete mode 100644 arch/arm/kvm/hyp/s2-setup.c
 delete mode 100644 arch/arm/kvm/hyp/switch.c
 delete mode 100644 arch/arm/kvm/hyp/tlb.c
 delete mode 100644 arch/arm/kvm/hyp/vfp.S
 delete mode 100644 arch/arm/kvm/init.S
 delete mode 100644 arch/arm/kvm/interrupts.S
 delete mode 100644 arch/arm/kvm/irq.h
 delete mode 100644 arch/arm/kvm/reset.c
 delete mode 100644 arch/arm/kvm/trace.h
 delete mode 100644 arch/arm/kvm/vgic-v3-coproc.c
 create mode 100644 arch/s390/kernel/uv.c
 create mode 100644 arch/s390/kvm/pv.c
 rename arch/x86/{include/asm => kvm}/kvm_emulate.h (93%)
 create mode 100644 tools/testing/selftests/kvm/demand_paging_test.c
 create mode 100644 tools/testing/selftests/kvm/lib/test_util.c
 create mode 100644 tools/testing/selftests/kvm/steal_time.c
 create mode 100644 tools/testing/selftests/kvm/x86_64/set_memory_region_test.c


             reply	other threads:[~2020-04-02 19:22 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-04-02 19:22 Paolo Bonzini [this message]
2020-04-02 22:45 ` [GIT PULL] First batch of KVM changes for Linux 5.7 pr-tracker-bot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200402192243.7186-1-pbonzini@redhat.com \
    --to=pbonzini@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).