diff options
author | Paolo Bonzini <pbonzini@redhat.com> | 2024-11-14 13:05:36 +0100 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2024-11-14 13:05:36 +0100 |
commit | 7b541d557f705c7e5bcd874f3b960c8fb8dee562 (patch) | |
tree | 68139f92a8dfab7dd4e23f44ee65fec910faabc2 /arch/arm64/kvm/trace_arm.h | |
parent | KVM: x86: expose MSR_PLATFORM_INFO as a feature MSR (diff) | |
parent | KVM: arm64: Pass on SVE mapping failures (diff) | |
download | linux-7b541d557f705c7e5bcd874f3b960c8fb8dee562.tar.xz linux-7b541d557f705c7e5bcd874f3b960c8fb8dee562.zip |
Merge tag 'kvmarm-6.13' of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD
KVM/arm64 changes for 6.13, part #1
- Support for stage-1 permission indirection (FEAT_S1PIE) and
permission overlays (FEAT_S1POE), including nested virt + the
emulated page table walker
- Introduce PSCI SYSTEM_OFF2 support to KVM + client driver. This call
was introduced in PSCIv1.3 as a mechanism to request hibernation,
similar to the S4 state in ACPI
- Explicitly trap + hide FEAT_MPAM (QoS controls) from KVM guests. As
part of it, introduce trivial initialization of the host's MPAM
context so KVM can use the corresponding traps
- PMU support under nested virtualization, honoring the guest
hypervisor's trap configuration and event filtering when running a
nested guest
- Fixes to vgic ITS serialization where stale device/interrupt table
entries are not zeroed when the mapping is invalidated by the VM
- Avoid emulated MMIO completion if userspace has requested synchronous
external abort injection
- Various fixes and cleanups affecting pKVM, vCPU initialization, and
selftests
Diffstat (limited to 'arch/arm64/kvm/trace_arm.h')
0 files changed, 0 insertions, 0 deletions