linux-yocto/arch/arm64/kvm/hyp/nvhe
Paolo Bonzini 924ebaefce KVM/arm64 updates for 6.18
- Add support for FF-A 1.2 as the secure memory conduit for pKVM,
   allowing more registers to be used as part of the message payload.
 
 - Change the way pKVM allocates its VM handles, making sure that the
   privileged hypervisor is never tricked into using uninitialised
   data.
 
 - Speed up MMIO range registration by avoiding unnecessary RCU
   synchronisation, which results in VMs starting much quicker.
 
 - Add the dump of the instruction stream when panic-ing in the EL2
   payload, just like the rest of the kernel has always done. This will
   hopefully help debugging non-VHE setups.
 
 - Add 52bit PA support to the stage-1 page-table walker, and make use
   of it to populate the fault level reported to the guest on failing
   to translate a stage-1 walk.
 
 - Add NV support to the GICv3-on-GICv5 emulation code, ensuring
   feature parity for guests, irrespective of the host platform.
 
 - Fix some really ugly architecture problems when dealing with debug
   in a nested VM. This has some bad performance impacts, but is at
   least correct.
 
 - Add enough infrastructure to be able to disable EL2 features and
   give effective values to the EL2 control registers. This then allows
   a bunch of features to be turned off, which helps cross-host
   migration.
 
 - Large rework of the selftest infrastructure to allow most tests to
   transparently run at EL2. This is the first step towards enabling
   NV testing.
 
 - Various fixes and improvements all over the map, including one BE
   fix, just in time for the removal of the feature.
 -----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCgAdFiEEn9UcU+C1Yxj9lZw9I9DQutE9ekMFAmjVhSsACgkQI9DQutE9
 ekOSIg//YdbA/zo17GrLnJnlGdUnS0e3/357n3e5Lypx1UFRDTmNacpVPw4VG/jt
 eVpQn7AgYwyvKfCq46eD+hBBqNv1XTn4DeXttv7CmVqhCRythsEvDkTBWSt7oYUZ
 xfYXCMKNhqUElH4AbYYx3y7nb2E9/KVGr+NBn6Vf5c14OZ3MGVc/fyp4jM1ih5dR
 kcV2onAYohlIGvFEyZMBtJ+jkYkqfIbfxfqCL0RAET0aEBFcmM1aXybWZj47hlLM
 f2j+E6cFQ0ZzUt+3pFhT75wo43lHGtIFDjVd60uishyU+NXTVvqRmXDTRU4k546W
 18HHX1yijbzuXIatVhVRo2hIq3jKU37T9wtj46BejbDHRdAPENEyN/Qopm7rNS+X
 mCwOT7He6KR+H4rU6nFaTcsS7bNRCvIbZP9i9zb6NElbvXu5QnM8BUQsYFCDUa/n
 xtbtQlckbo/7zeoUsBDrGj2XmCf0d45FTHb7fdWOYEmMSmJhXYpUKdM4JcLyhKoQ
 DD0ox2S+pt2lwNw3XOSABdES0KJxCvDASAMIgn2h2sGpY8FxsBcVW/BufXopdafG
 UeInxWaILp2iCDM4tH2GLjKqlvMAOwcA+mAEZToXypxlJAnYA6J1pXCF8WEaM6+D
 BGrLli8Zd8JRs87byq6K7tp8oLNzZdliJp73j5jfOHTJA4MnvFI=
 =iAL3
 -----END PGP SIGNATURE-----

Merge tag 'kvmarm-6.18' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD

KVM/arm64 updates for 6.18

- Add support for FF-A 1.2 as the secure memory conduit for pKVM,
  allowing more registers to be used as part of the message payload.

- Change the way pKVM allocates its VM handles, making sure that the
  privileged hypervisor is never tricked into using uninitialised
  data.

- Speed up MMIO range registration by avoiding unnecessary RCU
  synchronisation, which results in VMs starting much quicker.

- Add the dump of the instruction stream when panic-ing in the EL2
  payload, just like the rest of the kernel has always done. This will
  hopefully help debugging non-VHE setups.

- Add 52bit PA support to the stage-1 page-table walker, and make use
  of it to populate the fault level reported to the guest on failing
  to translate a stage-1 walk.

- Add NV support to the GICv3-on-GICv5 emulation code, ensuring
  feature parity for guests, irrespective of the host platform.

- Fix some really ugly architecture problems when dealing with debug
  in a nested VM. This has some bad performance impacts, but is at
  least correct.

- Add enough infrastructure to be able to disable EL2 features and
  give effective values to the EL2 control registers. This then allows
  a bunch of features to be turned off, which helps cross-host
  migration.

- Large rework of the selftest infrastructure to allow most tests to
  transparently run at EL2. This is the first step towards enabling
  NV testing.

- Various fixes and improvements all over the map, including one BE
  fix, just in time for the removal of the feature.
2025-09-30 13:23:28 -04:00
..
.gitignore
cache.S
debug-sr.c KVM: arm64: nvhe: Disable branch generation in nVHE guests 2025-07-08 16:11:27 +01:00
early_alloc.c
ffa.c KVM: arm64: Bump the supported version of FF-A to 1.2 2025-09-08 19:30:59 +01:00
gen-hyprel.c KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32 2024-06-20 17:40:54 +00:00
host.S arm64: errata: Work around AmpereOne's erratum AC04_CPU_23 2025-05-19 12:46:26 +01:00
hyp-init.S arm64: errata: Work around AmpereOne's erratum AC04_CPU_23 2025-05-19 12:46:26 +01:00
hyp-main.c KVM: arm64: Introduce separate hypercalls for pKVM VM reservation and initialization 2025-09-15 10:46:55 +01:00
hyp-smp.c
hyp.lds.S KVM: arm64: Add .hyp.data section 2025-05-06 09:56:18 +01:00
list_debug.c kvm: arm64: use BUG() instead of BUG_ON(1) 2025-08-08 01:28:57 -07:00
Makefile KVM: arm64: Use SMCCC 1.2 for FF-A initialization and in host handler 2025-09-08 19:30:59 +01:00
mem_protect.c KVM: arm64: Fix debug checking for np-guests using huge mappings 2025-09-15 10:29:14 +01:00
mm.c KVM: arm64: np-guest CMOs with PMD_SIZE fixmap 2025-05-21 14:33:51 +01:00
page_alloc.c KVM: arm64: Make hyp_page::order a u8 2024-12-20 09:43:59 +00:00
pkvm.c KVM: arm64: Introduce separate hypercalls for pKVM VM reservation and initialization 2025-09-15 10:46:55 +01:00
psci-relay.c KVM: arm64: Initialize SCTLR_EL1 in __kvm_hyp_init_cpu() 2025-03-02 08:36:52 +00:00
setup.c KVM: arm64: Map hyp text as RO and dump instr on panic 2025-09-15 13:04:23 +01:00
stacktrace.c arm64: kvm: Introduce nvhe stack size constants 2025-01-08 11:25:28 +00:00
switch.c KVM: arm64: VHE: Save and restore host MDCR_EL2 value correctly 2025-09-10 02:56:19 -07:00
sys_regs.c KVM: arm64: Fix parameter ordering for VBAR_EL1 assignment 2025-09-10 02:56:20 -07:00
sysreg-sr.c KVM: arm64: Load VPIDR_EL2 with the VM's MIDR_EL1 value 2025-02-26 01:32:05 -08:00
timer-sr.c KVM: arm64: Work around x1e's CNTVOFF_EL2 bogosity 2025-01-02 19:19:10 +00:00
tlb.c KVM: arm64: Ensure TLBI uses correct VMID after changing context 2024-08-15 14:05:02 +01:00