Skip to content
Snippets Groups Projects
Commit 71b60db0 authored by Ingo Molnar's avatar Ingo Molnar
Browse files

Merge branch into tip/master: 'irq/urgent'


 # New commits in irq/urgent:
    3ece3e8e ("PCI/MSI: Handle the NOMASK flag correctly for all PCI/MSI backends")
    c3164d2e ("PCI/MSI: Convert pci_msi_ignore_mask to per MSI domain flag")
    6c4d5aad ("PCI: vmd: Disable MSI remapping bypass under Xen")
    5ccf1b8a ("xen/pci: Do not register devices with segments >= 0x10000")
    b3f263a9 ("RISC-V: KVM: Optimize comments in kvm_riscv_vcpu_isa_disable_allowed")
    2d117e67 ("RISC-V: KVM: Teardown riscv specific bits after kvm_exit")
    6bfb3a71 ("LoongArch: KVM: Register perf callbacks for guest")
    2bf463d7 ("LoongArch: KVM: Implement arch-specific functions for guest perf")
    6a16e448 ("LoongArch: KVM: Add stub for kvm_arch_vcpu_preempted_in_kernel()")
    062ac0cb ("LoongArch: KVM: Remove PGD saving during VM context switch")
    1c405b42 ("LoongArch: KVM: Remove unnecessary header include path")
    250f2536 ("KVM: arm64: Tear down vGIC on failed vCPU creation")
    fe535380 ("KVM: arm64: PMU: Reload when resetting")
    1db4aaa0 ("KVM: arm64: PMU: Reload when user modifies registers")
    64074ca8 ("KVM: arm64: PMU: Fix SET_ONE_REG for vPMC regs")
    be5ccac3 ("KVM: arm64: PMU: Assume PMU presence in pmu-emul.c")
    f2aeb7bb ("KVM: arm64: PMU: Set raw values from user to PM{C,I}NTEN{SET,CLR}, PMOVS{SET,CLR}")
    c94cf023 ("m68k: defconfig: Update defconfigs for v6.14-rc1")
    1eab1154 ("KVM: arm64: Create each pKVM hyp vcpu after its corresponding host vcpu")
    8b21fb47 ("KVM: arm64: Factor out pKVM hyp vcpu creation to separate function")
    066daa8d ("KVM: arm64: Initialize HCRX_EL2 traps in pKVM")
    44f979bf ("KVM: arm64: Factor out setting HCRX_EL2 traps into separate function")
    74c1807f ("KVM: x86: block KVM_CAP_SYNC_REGS if guest state is protected")
    adafea11 ("KVM: x86: Add infrastructure for secure TSC")
    5f3b30b2 ("KVM: x86: Push down setting vcpu.arch.user_set_tsc")
    46c49372 ("KVM: x86: move vm_destroy callback at end of kvm_arch_destroy_vm")
    421d62f4 ("xen/pciback: Remove unused pcistub_get_pci_dev")
    5c4e79e2 ("xenfs/xensyms: respect hypervisor's "next" indication")
    1c3dfc7c ("xen/mcelog: Add __nonstring annotations for unterminated strings")
    2356f15c ("xen: Add support for XenServer 6.1 platform device")
    79ea6623 ("KVM: arm64: Count pKVM stage-2 usage in secondary pagetable stats")
    8c0d7d14 ("KVM: arm64: Distinct pKVM teardown memcache for stage-2")
    cf2d228d ("KVM: arm64: Add flags to kvm_hyp_memcache")
    edfd826b ("KVM: arm64: selftests: Test that TGRAN*_2 fields are writable")
    3f1e0727 ("KVM: arm64: Allow userspace to write ID_AA64MMFR0_EL1.TGRAN*_2")
    e1231aac ("arm64: Enable IMP DEF PMUv3 traps on Apple M*")
    1b92e65f ("KVM: arm64: Provide 1 event counter on IMPDEF hardware")
    2d00cab8 ("drivers/perf: apple_m1: Provide helper for mapping PMUv3 events")
    1e7dcbfa ("KVM: arm64: Remap PMUv3 events onto hardware")
    bed9b8ec ("KVM: arm64: Advertise PMUv3 if IMPDEF traps are present")
    2c433f70 ("KVM: arm64: Compute synthetic sysreg ESR for Apple PMUv3 traps")
    56290316 ("KVM: arm64: Move PMUVer filtering into KVM code")
    3d6d9172 ("KVM: arm64: Use guard() to cleanup usage of arm_pmus_lock")
    a38b67d1 ("KVM: arm64: Drop kvm_arm_pmu_available static key")
    6f34024d ("KVM: arm64: Use a cpucap to determine if system supports FEAT_PMUv3")
    ed335722 ("KVM: arm64: Always support SW_INCR PMU event")
    93b01528 ("KVM: arm64: Compute PMCEID from arm_pmu's event bitmaps")
    3c4e4ec9 ("m68k: setup: Remove size argument when calling strscpy()")
    44ff44ca ("smccc: kvm_guest: Fix kernel builds for 32 bit arm")
    ee4e778c ("KVM: riscv: selftests: Allow number of interrupts to be configurable")
    4b506adf ("KVM: riscv: selftests: Change command line option")
    1f6bbe12 ("KVM: riscv: selftests: Do not start the counter in the overflow handler")
    bbb62248 ("RISC-V: KVM: Disable the kernel perf counter during configure")
    5980a693 ("KVM: arm64: Fix documentation for KVM_CAP_ARM_WRITABLE_IMP_ID_REGS")
    03e1b89d ("KVM: arm64: Copy MIDR_EL1 into hyp VM when it is writable")
    9d912273 ("KVM: arm64: Copy guest CTR_EL0 into hyp VM")
    e6c8728a ("KVM: x86: Remove the unreachable case for 0x80000022 leaf in __do_cpuid_func()")
    83c6cb20 ("KVM: arm64: nv: Fail KVM init if asking for NV without GICv3")
    faf7714a ("KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ")
    89896cc1 ("KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup")
    7682c023 ("KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts")
    93078ae6 ("KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2")
    69c9176c ("KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting")
    201c8d40 ("KVM: arm64: nv: Add Maintenance Interrupt emulation")
    4b1b97f0 ("KVM: arm64: nv: Handle L2->L1 transition on interrupt injection")
    146a050f ("KVM: arm64: nv: Nested GICv3 emulation")
    21d29cd8 ("KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses")
    96c2f033 ("KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses")
    182f1596 ("KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg")
    16abeb60 ("KVM: arm64: nv: Load timer before the GIC")
    b7a252e8 ("arm64: sysreg: Add layout for ICH_MISR_EL2")
    5815fb82 ("arm64: sysreg: Add layout for ICH_VTR_EL2")
    22513c0d ("arm64: sysreg: Add layout for ICH_HCR_EL2")
    0c3566b6 ("KVM: VMX: Extract checks on entry/exit control pairs to a helper macro")
    4e96f010 ("KVM: SVM: Invalidate "next" SNP VMSA GPA even on failure")
    5279d6f7 ("KVM: SVM: Use guard(mutex) to simplify SNP vCPU state updates")
    e268beee ("KVM: SVM: Mark VMCB dirty before processing incoming snp_vmsa_gpa")
    46332437 ("KVM: SVM: Use guard(mutex) to simplify SNP AP Creation error handling")
    c6e129fb ("KVM: SVM: Simplify request+kick logic in SNP AP Creation handling")
    745ff821 ("KVM: SVM: Require AP's "requested" SEV_FEATURES to match KVM's view")
    d26638bf ("KVM: SVM: Don't change target vCPU state on AP Creation VMGEXIT error")
    72d12715 ("KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest has an invalid VMSA")
    2a289aed ("KVM: x86: Always set mp_state to RUNNABLE on wakeup from HLT")
    62838fa5 ("KVM: selftests: Relax assertion on HLT exits if CPU supports Idle HLT")
    d4b69c3d ("KVM: SVM: Inject #GP if memory operand for INVPCID is non-canonical")
    64c947a1 ("KVM: VMX: Reject KVM_RUN if userspace forces emulation during nested VM-Enter")
    0dab791f ("KVM: x86/tdp_mmu: Remove tdp_mmu_for_each_pte()")
    61146f67 ("KVM: nVMX: Decouple EPT RWX bits from EPT Violation protection bits")
    fa6c8fc2 ("KVM: VMX: Remove EPT_VIOLATIONS_ACC_*_BIT defines")
    75418e22 ("KVM: selftests: Fix spelling mistake "UFFDIO_CONINUE" -> "UFFDIO_CONTINUE"")
    f6965665 ("KVM: selftests: Add test for KVM_REG_ARM_VENDOR_HYP_BMAP_2")
    86edf6bd ("smccc/kvm_guest: Enable errata based on implementation CPUs")
    c8c2647e ("arm64: Make  _midr_in_range_list() an exported function")
    c0000e58 ("KVM: arm64: Introduce KVM_REG_ARM_VENDOR_HYP_BMAP_2")
    57e5cc9b ("KVM: arm64: Specify hypercall ABI for retrieving target implementations")
    e3121298 ("arm64: Modify _midr_range() functions to read MIDR/REVIDR internally")
    d766d87c ("KVM: arm64: Document ordering requirements for irqbypass")
    5c57533e ("KVM: arm64: vgic-v4: Fall back to software irqbypass if LPI not found")
    d0b79563 ("KVM: arm64: vgic-v4: Only WARN for HW IRQ mismatch when unmapping vLPI")
    a0d7e2fc ("KVM: arm64: vgic-v4: Only attempt vLPI mapping for actual MSIs")
    b2aba529 ("KVM: Drop kvm_arch_sync_events() now that all implementations are nops")
    fd217326 ("KVM: x86: Fold guts of kvm_arch_sync_events() into kvm_arch_pre_destroy_vm()")
    e4472125 ("KVM: x86: Unload MMUs during vCPU destruction, not before")
    ed8f9663 ("KVM: Assert that a destroyed/freed vCPU is no longer visible")
    ed09b50b ("KVM: x86: Don't load/put vCPU when unloading its MMU during teardown")
    a88c7c22 ("KVM: selftests: arm64: Test writes to MIDR,REVIDR,AIDR")
    3adaee78 ("KVM: arm64: Allow userspace to change the implementation ID registers")
    d0d81e03 ("KVM: arm64: Load VPIDR_EL2 with the VM's MIDR_EL1 value")
    b4043e7c ("KVM: arm64: Maintain per-VM copy of implementation ID regs")
    4cd48565 ("KVM: arm64: Set HCR_EL2.TID1 unconditionally")
    fa662c90 ("KVM: SVM: Add Idle HLT intercept support")
    70792aed ("x86/cpufeatures: Add CPUID feature bit for Idle HLT intercept")
    c3392d0a ("KVM: SVM: Provide helpers to set the error code")
    ea4c2f2f ("KVM: SVM: Convert plain error code numbers to defines")
    d62c02af ("KVM: VMX: Pass XFD_ERR as pseudo-payload when injecting #NM")
    3ef0df3f ("KVM: VMX: Don't modify guest XFD_ERR if CR0.TS=1")
    b50cb2b1 ("KVM: x86: Use a dedicated flow for queueing re-injected exceptions")
    4fa0efb4 ("KVM: x86: Rename and invert async #PF's send_user_only flag to send_always")
    b9595d1d ("KVM: x86: Don't inject PV async #PF if SEND_ALWAYS=0 and guest state is protected")
    a2b00f85 ("KVM: x86: Update Xen TSC leaves during CPUID emulation")
    8b0b98eb ("KVM: arm64: Advertise FEAT_ECV when possible")
    642c23ea ("KVM: arm64: Make ID_AA64MMFR4_EL1.NV_frac writable")
    f83c41fb ("KVM: arm64: Allow userspace to limit NV support to nVHE")
    94f296dc ("KVM: arm64: Move NV-specific capping to idreg sanitisation")
    e7ef6ed4 ("KVM: arm64: Enforce NV limits on a per-idregs basis")
    179fd7e3 ("KVM: arm64: Make ID_REG_LIMIT_FIELD_ENUM() more widely available")
    57e7de26 ("KVM: arm64: Consolidate idreg callbacks")
    2cd9542a ("KVM: arm64: Advertise NV2 in the boot messages")
    8f8d6084 ("KVM: arm64: Mark HCR.EL2.{NV*,AT} RES0 when ID_AA64MMFR4_EL1.NV_frac is 0")
    d9f943f7 ("KVM: arm64: Mark HCR.EL2.E2H RES0 when ID_AA64MMFR1_EL1.VH is zero")
    9d674557 ("KVM: arm64: Hide ID_AA64MMFR2_EL1.NV from guest and userspace")
    88aea41b ("arm64: cpufeature: Handle NV_frac as a synonym of NV2")
    2428865b ("KVM: selftests: Add a nested (forced) emulation intercept test for x86")
    79a14afc ("KVM: nVMX: Synthesize nested VM-Exit for supported emulation intercepts")
    fbd1e0f1 ("KVM: nVMX: Allow the caller to provide instruction length on nested VM-Exit")
    d4aea23f ("KVM: x86: Add a #define for the architectural max instruction length")
    9aeb9d8a ("KVM: x86: Plumb the emulator's starting RIP into nested intercept checks")
    407d03fe ("KVM: x86: Plumb the src/dst operand types through to .check_intercept()")
    08e3d89e ("KVM: nVMX: Consolidate missing X86EMUL_INTERCEPTED logic in L2 emulation")
    f43f7a21 ("KVM: nVMX: Emulate HLT in L2 if it's not intercepted")
    3244616a ("KVM: nVMX: Allow emulating RDPID on behalf of L2")
    c8e612bf ("KVM: nSVM: Pass next RIP, not current RIP, for nested VM-Exit on emulation")
    f002a97e ("KVM: nVMX: Check PAUSE_EXITING, not BUS_LOCK_DETECTION, on PAUSE emulation")
    26e228ec ("KVM: x86/xen: Move kvm_xen_hvm_config field into kvm_xen")
    69e5a7dd ("KVM: x86/xen: Bury xen_hvm_config behind CONFIG_KVM_XEN=y")
    a5d7700a ("KVM: x86/xen: Consult kvm_xen_enabled when checking for Xen MSR writes")
    bb0978d9 ("KVM: x86/xen: Add an #ifdef'd helper to detect writes to Xen MSR")
    5c178481 ("KVM: x86/xen: Restrict hypercall MSR to unofficial synthetic range")
    af3b6a9e ("KVM: x86/mmu: Walk rmaps (shadow MMU) without holding mmu_lock when aging gfns")
    bb6c7749 ("KVM: x86/mmu: Add support for lockless walks of rmap SPTEs")
    4834eade ("KVM: x86/mmu: Add infrastructure to allow walking rmaps outside of mmu_lock")
    9fb13ba6 ("KVM: x86/mmu: Refactor low level rmap helpers to prep for walking w/o mmu_lock")
    8c403cf2 ("KVM: x86/mmu: Only check gfn age in shadow MMU if indirect_shadow_pages > 0")
    e25c2332 ("KVM: x86/mmu: Skip shadow MMU test_young if TDP MMU reports page as young")
    b146a9b3 ("KVM: x86/mmu: Age TDP MMU SPTEs without holding mmu_lock")
    928c54b1 ("KVM: x86/mmu: Always update A/D-disabled SPTEs atomically")
    61d65f2d ("KVM: x86/mmu: Don't force atomic update if only the Accessed bit is volatile")
    e29b7492 ("KVM: x86/mmu: Factor out spte atomic bit clearing routine")
    aa34b811 ("KVM: Allow lockless walk of SPTEs when handing aging mmu_notifier event")
    16fc7cb4 ("KVM: selftests: Add infrastructure for getting vCPU binary stats")
    9b56532b ("KVM: selftests: Adjust number of files rlimit for all "standard" VMs")
    ea7179f9 ("KVM: selftests: Get VM's binary stats FD when opening VM")
    e65faf71 ("KVM: selftests: Add struct and helpers to wrap binary stats cache")
    b0c3f5df ("KVM: selftests: Macrofy vm_get_stat() to auto-generate stat name string")
    eead13d4 ("KVM: selftests: Assert that __vm_get_stat() actually finds a stat")
    374ccd63 ("KVM: Rename kvm_handle_hva_range()")
    7e066cb9 ("KVM: SEV: Use long-term pin when registering encrypted memory regions")
    1b3c3805 ("KVM: x86: Override TSC_STABLE flag for Xen PV clocks in kvm_guest_time_update()")
    847d68ab ("KVM: x86: Setup Hyper-V TSC page before Xen PV clocks (during clock update)")
    39d61b46 ("KVM: x86: Remove per-vCPU "cache" of its reference pvclock")
    46aed4d4 ("KVM: x86: Pass reference pvclock as a param to kvm_setup_guest_pvclock()")
    93fb0b10 ("KVM: x86: Set PVCLOCK_GUEST_STOPPED only for kvmclock, not for Xen PV clock")
    24c16637 ("KVM: x86: Don't bleed PVCLOCK_GUEST_STOPPED across PV clocks")
    ca28aa63 ("KVM: x86/xen: Use guest's copy of pvclock when starting timer")
    6c4927a4 ("KVM: x86: Process "guest stopped request" once per guest time update")
    aceb04f5 ("KVM: x86: Drop local pvclock_flags variable in kvm_guest_time_update()")
    4198f38a ("KVM: x86: Eliminate "handling" of impossible errors during SUSPEND")
    d9c5ed0a ("KVM: x86: Don't take kvm->lock when iterating over vCPUs in suspend notifier")
    93da6af3 ("KVM: x86: Defer runtime updates of dynamic CPUID bits until CPUID emulation")
    a487f679 ("KVM: x86: Query X86_FEATURE_MWAIT iff userspace owns the CPUID feature bit")
    7e9f735e ("KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vCPU has RTM or HLE")
    aa93b6f9 ("KVM: x86: Use for-loop to iterate over XSTATE size entries")
    a11128ce ("KVM: x86/cpuid: add type suffix to decimal const 48 fix building warning")
    e9cb6105 ("KVM: x86: Clear pv_unhalted on all transitions to KVM_MP_STATE_RUNNABLE")
    c9e5f3fa ("KVM: x86: Introduce kvm_set_mp_state()")
    82c47012 ("KVM: x86: Use kvfree_rcu() to free old optimized APIC map")
    4cad9f87 ("KVM: x86: Wake vCPU for PIC interrupt injection iff a valid IRQ was found")
    f7f232a0 ("KVM: selftests: Close VM's binary stats FD when releasing VM")
    fd546aba ("KVM: selftests: Fix mostly theoretical leak of VM's binary stats FD")
    dae7d81e ("KVM: selftests: Allow running a single iteration of dirty_log_test")
    7f225650 ("KVM: selftests: Fix an off-by-one in the number of dirty_log_test iterations")
    2680dcfb ("KVM: selftests: Set per-iteration variables at the start of each iteration")
    2020d3b7 ("KVM: selftests: Tighten checks around prev iter's last dirty page in ring")
    73eaa2aa ("KVM: selftests: Ensure guest writes min number of pages in dirty_log_test")
    485e27ed ("KVM: sefltests: Verify value of dirty_log_test last page isn't bogus")
    d0bd72cb ("KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration")
    24b9a2a6 ("KVM: selftests: Print (previous) last_page on dirty page value mismatch")
    c616f36a ("KVM: selftests: Use continue to handle all "pass" scenarios in dirty_log_test")
    9a91f654 ("KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_stop is true")
    0a818b35 ("KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop")
    f3629c0e ("KVM: selftests: Honor "stop" request in dirty ring test")
    deb8b840 ("KVM: selftests: Limit dirty_log_test's s390x workaround to s390x")
    9b1feec8 ("KVM: selftests: Continuously reap dirty ring while vCPU is running")
    f2228aa0 ("KVM: selftests: Read per-page value into local var when verifying dirty_log_test")
    af2d85d3 ("KVM: selftests: Precisely track number of dirty/clear pages for each iteration")
    12309078 ("KVM: selftests: Drop stale srandom() initialization from dirty_log_test")
    ff0efc77 ("KVM: selftests: Drop signal/kick from dirty ring testcase")
    67428ee7 ("KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming")
    fe49f800 ("KVM: selftests: Support multiple write retires in dirty_log_test")
    89ea56a4 ("KVM: selftests: Actually emit forced emulation prefix for kvm_asm_safe_fep()")
    54108e73 ("KVM: selftests: Print out the actual Top-Down Slots count on failure")
    0e671473 ("KVM: selftests: Drop the "feature event" param from guest test helpers")
    e327630e ("KVM: selftests: Remove dead code in Intel PMU counters test")
    8752e2b4 ("KVM: selftests: Only validate counts for hardware-supported arch events")
    933178dd ("KVM: selftests: Make Intel arch events globally available in PMU counters test")
    a6136669 ("KVM: SVM: Ensure PSP module is initialized if KVM module is built-in")
    f7354250 ("crypto: ccp: Add external API interface for PSP module initialization")
    8a01902a ("KVM: SEV: Use to_kvm_sev_info() for fetching kvm_sev_info struct")
    dfcbcd86 ("KVM: x86: Remove unused iommu_domain and iommu_noncoherent from kvm_arch")
    3617c0ee ("KVM: x86/xen: Only write Xen hypercall page for guest writes to MSR")
    723be3c6 ("m68k: sun3: Fix DEBUG_MMU_EMU build")
    751b3d8d ("m68k: sun3: Use str_read_write() helper in mmu_emu_handle_fault()")
    983820cb ("KVM: selftests: Add helpers for locally (un)blocking IRQs on x86")
    7803339f ("KVM: selftests: Use data load to trigger LLC references/misses in Intel PMU")
    bd779107 ("KVM: selftests: Add printf attribute to _no_printf()")
    3cd19f15 ("KVM: selftests: Remove unneeded semicolon")
    c76a9238 ("KVM: selftests: Add defines for AMD PMU CPUID features and properties")
    97d0d165 ("KVM: selftests: Fix typos in x86's PMU counter test's macro variable use")

Signed-off-by: default avatarIngo Molnar <mingo@kernel.org>
parents 0d86c239 3ece3e8e
No related branches found
No related tags found
Loading
Showing
with 358 additions and 106 deletions
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment