Skip to content

kvm-x86-next-2023.06.22

…d 'pmu'

* generic:
  kvm/eventfd: use list_for_each_entry when deassign ioeventfd
  KVM: destruct kvm_io_device while unregistering it from kvm_io_bus
  KVM: Clean up kvm_vm_ioctl_create_vcpu()
  KVM: Fix comment for KVM_ENABLE_CAP
  KVM: Don't kfree(NULL) on kzalloc() failure in kvm_assign_ioeventfd_idx()
  KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
  KVM: Protect vcpu->pid dereference via debugfs with RCU

* misc:
  Documentation/process: Add a maintainer handbook for KVM x86
  Documentation/process: Add a label for the tip tree handbook's coding style
  KVM: x86: Remove PRIx* definitions as they are solely for user space
  KVM: x86: Update comments about MSR lists exposed to userspace
  KVM: x86: Clean up: remove redundant bool conversions
  KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdef
  KVM: x86: Correct the name for skipping VMENTER l1d flush
  KVM: x86: Fix a typo in Documentation/virt/kvm/x86/mmu.rst
  KVM: selftests: Extend cpuid_test to verify KVM_GET_CPUID2 "nent" updates
  KVM: x86: Update number of entries for KVM_GET_CPUID2 on success, not failure
  KVM: x86: Fix poll command
  KVM: x86: Move common handling of PAT MSR writes to kvm_set_msr_common()
  KVM: x86: Make kvm_mtrr_valid() static now that there are no external users
  KVM: x86: Move PAT MSR handling out of mtrr.c
  KVM: x86: Use MTRR macros to define possible MTRR MSR ranges
  KVM: x86: Add helper to get variable MTRR range from MSR index
  KVM: x86: Add helper to query if variable MTRR MSR is base (versus mask)
  KVM: SVM: Use kvm_pat_valid() directly instead of kvm_mtrr_valid()
  KVM: VMX: Open code writing vCPU's PAT in VMX's MSR handler

* mmu:
  KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
  KVM: x86/mmu: Assert on @mmu in the __kvm_mmu_invalidate_addr()
  KVM: x86/mmu: Add comment on try_cmpxchg64 usage in tdp_mmu_set_spte_atomic

* selftests:
  KVM: selftests: Add new CFLAGS to generate dependency files
  KVM: selftests: Allow specify physical cpu list in demand paging test
  KVM: selftests: Add dirty logging page splitting test
  KVM: selftests: Move dirty logging functions to memstress.(c|h)
  KVM: selftests: touch all pages of args on each memstress iteration
  KVM: selftests: Allow dumping per-vcpu info for uffd threads
  KVM: selftests: Setup vcpu_alias only for minor mode test
  KVM: selftests: Fix spelling mistake "miliseconds" -> "milliseconds"
  KVM: selftests: Refactor stable TSC check to use TEST_REQUIRE()

* svm:
  KVM: SVM: WARN, but continue, if misc_cg_set_capacity() fails
  KVM: SVM: enhance info printk's in SEV init
  KVM: SVM: Invoke trace_kvm_exit() for fastpath VM-Exits
  KVM: SVM: Remove TSS reloading code after VMEXIT

* vmx:
  KVM: x86/mmu: Trigger APIC-access page reload iff vendor code cares
  KVM: x86: Use standard mmu_notifier invalidate hooks for APIC access page
  KVM: VMX: Retry APIC-access page reload if invalidation is in-progress
  KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported
  KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0)
  KVM: VMX: restore vmx_vmexit alignment
  KVM: x86/pmu: Remove redundant check for MSR_IA32_DS_AREA set handler
  KVM: VMX: Use proper accessor to read guest CR4 in handle_desc()
  KVM: VMX: Treat UMIP as emulated if and only if the host doesn't have UMIP
  KVM: VMX: Move the comment of CR4.MCE handling right above the code
  KVM: VMX: Use kvm_read_cr4() to get cr4 value

* pmu:
  KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022
  KVM: x86/svm/pmu: Add AMD PerfMonV2 support
  KVM: x86/cpuid: Add a KVM-only leaf to redirect AMD PerfMonV2 flag
  KVM: x86/pmu: Constrain the num of guest counters with kvm_pmu_cap
  KVM: x86/pmu: Advertise PERFCTR_CORE iff the min nr of counters is met
  KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
  KVM: x86: Explicitly zero cpuid "0xa" leaf when PMU is disabled
  KVM: x86/pmu: Provide Intel PMU's pmc_is_enabled() as generic x86 code
  KVM: x86/pmu: Move handling PERF_GLOBAL_CTRL and friends to common x86
  KVM: x86/pmu: Reject userspace attempts to set reserved GLOBAL_STATUS bits
  KVM: x86/pmu: Move reprogram_counters() to pmu.h
  KVM: x86/pmu: Rename global_ovf_ctrl_mask to global_status_mask
Assets 2