You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Merge branches 'guest_memfd', 'lam', 'misc', 'mmu' and 'pmu'
* guest_memfd: (35 commits)
KVM: selftests: Test KVM exit behavior for private memory/access
KVM: selftests: Add basic selftest for guest_memfd()
KVM: selftests: Expand set_memory_region_test to validate guest_memfd()
KVM: selftests: Add KVM_SET_USER_MEMORY_REGION2 helper
KVM: selftests: Add x86-only selftest for private memory conversions
KVM: selftests: Add GUEST_SYNC[1-6] macros for synchronizing more data
KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
KVM: selftests: Add helpers to do KVM_HC_MAP_GPA_RANGE hypercalls (x86)
KVM: selftests: Add helpers to convert guest memory b/w private and shared
KVM: selftests: Add support for creating private memslots
KVM: selftests: Convert lib's mem regions to KVM_SET_USER_MEMORY_REGION2
KVM: selftests: Drop unused kvm_userspace_memory_region_find() helper
KVM: x86: Add support for "protected VMs" that can utilize private memory
KVM: Allow arch code to track number of memslot address spaces per VM
KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro
KVM: x86/mmu: Handle page fault for private memory
KVM: x86: Disallow hugepages when memory attributes are mixed
KVM: x86: "Reset" vcpu->run->exit_reason early in KVM_RUN
KVM: Add transparent hugepage support for dedicated guest memory
KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
...
* lam: (47 commits)
KVM: x86: Use KVM-governed feature framework to track "LAM enabled"
KVM: x86: Advertise and enable LAM (user and supervisor)
KVM: x86: Virtualize LAM for user pointer
KVM: x86: Virtualize LAM for supervisor pointer
KVM: x86: Untag addresses for LAM emulation where applicable
KVM: x86: Introduce get_untagged_addr() in kvm_x86_ops and call it in emulator
KVM: x86: Remove kvm_vcpu_is_illegal_gpa()
KVM: x86: Add & use kvm_vcpu_is_legal_cr3() to check CR3's legality
KVM: x86/mmu: Drop non-PA bits when getting GFN for guest's PGD
KVM: x86: Add X86EMUL_F_INVLPG and pass it in em_invlpg()
KVM: x86: Add an emulation flag for implicit system access
KVM: x86: Consolidate flags for __linearize()
KVM: x86: hyper-v: Don't auto-enable stimer on write from user-space
KVM: x86: Update the variable naming in kvm_x86_ops.sched_in()
KVM: x86/mmu: Stop kicking vCPUs to sync the dirty log when PML is disabled
KVM: x86: Use octal for file permission
KVM: VMX: drop IPAT in memtype when CD=1 for KVM_X86_QUIRK_CD_NW_CLEARED
KVM: x86/mmu: Zap KVM TDP when noncoherent DMA assignment starts/stops
KVM: x86: Don't sync user-written TSC against startup values
KVM: x86/mmu: Zap SPTEs on MTRR update iff guest MTRRs are honored
...
* misc:
KVM: x86: Ignore MSR_AMD64_TW_CFG access
KVM: x86: remove the unused assigned_dev_head from kvm_arch
x86: KVM: Add feature flag for CPUID.80000021H:EAX[bit 1]
KVM: x86: remove always-false condition in kvmclock_sync_fn
KVM: x86: hyper-v: Don't auto-enable stimer on write from user-space
KVM: x86: Update the variable naming in kvm_x86_ops.sched_in()
KVM: x86/mmu: Stop kicking vCPUs to sync the dirty log when PML is disabled
KVM: x86: Use octal for file permission
KVM: x86: Don't sync user-written TSC against startup values
KVM: selftests: Test behavior of HWCR, a.k.a. MSR_K7_HWCR
KVM: x86: Virtualize HWCR.TscFreqSel[bit 24]
KVM: x86: Allow HWCR.McStatusWrEn to be cleared once set
KVM: x86: Refine calculation of guest wall clock to use a single TSC read
KVM: x86: Add SBPB support
KVM: x86: Add IBPB_BRTYPE support
KVM: x86: Add CONFIG_KVM_MAX_NR_VCPUS to allow up to 4096 vCPUs
KVM: x86: Force TLB flush on userspace changes to special registers
KVM: x86: Remove redundant vcpu->arch.cr0 assignments
* mmu:
KVM: x86/mmu: Remove unnecessary ‘NULL’ values from sptep
KVM: VMX: drop IPAT in memtype when CD=1 for KVM_X86_QUIRK_CD_NW_CLEARED
KVM: x86/mmu: Zap KVM TDP when noncoherent DMA assignment starts/stops
KVM: x86/mmu: Zap SPTEs on MTRR update iff guest MTRRs are honored
KVM: x86/mmu: Zap SPTEs when CR0.CD is toggled iff guest MTRRs are honored
KVM: x86/mmu: Add helpers to return if KVM honors guest MTRRs
* pmu:
KVM: x86: Service NMI requests after PMI requests in VM-Enter path
0 commit comments