Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp4220454pxb; Tue, 2 Nov 2021 06:15:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyYPAsDiA+1ty85PDA4fs4Ts4JEBODChiplvMqRe1PZTVPvprl72dC4SkB9rFzcReSDq7SI X-Received: by 2002:a17:906:5017:: with SMTP id s23mr43776778ejj.546.1635858952158; Tue, 02 Nov 2021 06:15:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635858952; cv=none; d=google.com; s=arc-20160816; b=kHdLOpRIscj9f9Ycp9500gO9+PhruewAiVkR+GrpKv6SiHiVw8PwVtvAZ0ifq94kLh d/C4yRl+CyjG5Rev0NEO3SPwBHoLIqX1bw3Zl650bnu5FuQrsPHT5jSP3Z5S/ERwdkRw R8uKm/lzx87trMIJGhfD8BiDztc2c7LDEeRHDt11/OedZ+IGTxkb3UZD1VwTH2+6hpug 0fAxZ0PpOCFCKFHie32KrYJeWgD3g7wXbquF9zNGbj5GN5HQb14jwYdVMZ4EPx1iovlf gvkKxtXVIO9cyoSViQuqikxUzXwc2o/0c3PvJ98aC96R3hTckcWbvXnOkxae0H502ZnP JyJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date; bh=FEG94uCi+qFoEnBjX5NCLN8clEw8Q6AaBcymoPqaSdI=; b=aTLc4wYhDQfGYMVqjX2O6kDQ16YJB0CE7T0iF4qrYfiqyJ6QJTzdyjR696e+GUcxaw 3/zkouXuIF9pFyuZuwdPUJCYAgHH5/LfpwZ6qAb5L+tqsuk732ocmV1W2tIRjaO8b8PY BURe2rvJISJ+3jw0yK7c965ijFHKDa11sY+mcvq1BmA9guMTpbger0gKiSIY59Y7u87E gC2GVvWZ7VHL1AicbsEQRFNe1A79S/d58mR8zsh/n674RlzTPWo6+O6IxMAJS0xkXK0m ZkT3goTOawtgStE5M92Ox6qszKUjOo3B0c0hOenRBdEvi1OXUnQoUYkIMAwyU2adzgqm 9FGQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n1si29492769edb.104.2021.11.02.06.15.23; Tue, 02 Nov 2021 06:15:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231348AbhKBNPt (ORCPT + 99 others); Tue, 2 Nov 2021 09:15:49 -0400 Received: from mail-wm1-f53.google.com ([209.85.128.53]:40743 "EHLO mail-wm1-f53.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230518AbhKBNPs (ORCPT ); Tue, 2 Nov 2021 09:15:48 -0400 Received: by mail-wm1-f53.google.com with SMTP id j128-20020a1c2386000000b003301a98dd62so1872537wmj.5; Tue, 02 Nov 2021 06:13:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=FEG94uCi+qFoEnBjX5NCLN8clEw8Q6AaBcymoPqaSdI=; b=Th2STZAmIloDNceUGh8c1zoNVDp4zEF0aJeizpaJTATTtcIdDm3GjHtUpra6cwdbJm m49+E2vjaLELBkPQmzmi17+/o3LLmK/kVMEJRXTj8BWO7DE0cwzsgMpjYr4hdusjnobK VFQ6cjuVwO2pPDAMTKg+g6Pi8lQfg4z7bayCadRnYxN348XbdUQA2qYGBDnCyu/d+X0u uj0rrmdXFqf3p5xHRI0EeaZUDUHVrLXHcCs3plvocuJN4Ek1Pp9q6+OIy7RsnHdMB2Cc Pjsp8+/WaBGM3v2orn1gIFF7QOSbKnDYtIerXuk7oENWfeHZ1Agor/dkdLIMpnW0hVfI d4IA== X-Gm-Message-State: AOAM533jBwi1/xjMB2H+gd2vXdLfoMYeZh5Cpi4RTPbXEYvt4oIw6ya3 z9ikpBuKuXOdRgPRx78WbR603NfZPqk= X-Received: by 2002:a05:600c:1990:: with SMTP id t16mr7353649wmq.124.1635858792274; Tue, 02 Nov 2021 06:13:12 -0700 (PDT) Received: from liuwe-devbox-debian-v2 ([51.145.34.42]) by smtp.gmail.com with ESMTPSA id c1sm14161503wrt.14.2021.11.02.06.13.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Nov 2021 06:13:11 -0700 (PDT) Date: Tue, 2 Nov 2021 13:13:09 +0000 From: Wei Liu To: Linus Torvalds Cc: Wei Liu , Linux on Hyper-V List , Linux Kernel List , kys@microsoft.com, haiyangz@microsoft.com, decui@microsoft.com, sthemmin@microsoft.com, Michael Kelley Subject: [GIT PULL] Hyper-V commits for 5.16 Message-ID: <20211102131309.3hknsf66swvkv6hm@liuwe-devbox-debian-v2> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Linus, The following changes since commit 64570fbc14f8d7cb3fe3995f20e26bc25ce4b2cc: Linux 5.15-rc5 (2021-10-10 17:01:59 -0700) are available in the Git repository at: ssh://git@gitolite.kernel.org/pub/scm/linux/kernel/git/hyperv/linux.git tags/hyperv-next-signed-20211102 for you to fetch changes up to 285f68afa8b20f752b0b7194d54980b5e0e27b75: x86/hyperv: Protect set_hv_tscchange_cb() against getting preempted (2021-10-28 11:59:13 +0000) There are two merges from the tip tree: one is because of Tianyu's patches went in via tip/x86/sev, the other is because a tree-wide cleanup in tip/x86/cc conflicted with Tianyu's patch. Instead of requiring you to fix up I thought I'd just do it myself. Thanks, Wei. ---------------------------------------------------------------- hyperv-next for 5.16 - Initial patch set for Hyper-V isolation VM support (Tianyu Lan) - Fix a warning on preemption (Vitaly Kuznetsov) - A bunch of misc cleanup patches. ---------------------------------------------------------------- Jiapeng Chong (1): x86/hyperv: Remove duplicate include Lv Ruyi (1): Drivers: hv : vmbus: Adding NULL pointer check Michael Kelley (1): Drivers: hv: vmbus: Remove unused code to check for subchannels Tianyu Lan (9): x86/sev: Expose sev_es_ghcb_hv_call() for use by HyperV x86/hyperv: Initialize GHCB page in Isolation VM x86/hyperv: Initialize shared memory boundary in the Isolation VM. x86/hyperv: Add new hvcall guest address host visibility support Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM x86/hyperv: Add Write/Read MSR registers via ghcb page x86/hyperv: Add ghcb hvcall support for SNP VM Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message Drivers: hv: vmbus: Initialize VMbus ring buffer for Isolation VM Vitaly Kuznetsov (1): x86/hyperv: Protect set_hv_tscchange_cb() against getting preempted Wan Jiabing (1): x86/hyperv: Remove duplicated include in hv_init Wei Liu (2): Merge remote-tracking branch 'tip/x86/sev' into hyperv-next Merge remote-tracking branch 'tip/x86/cc' into hyperv-next arch/Kconfig | 3 + arch/powerpc/include/asm/mem_encrypt.h | 5 - arch/powerpc/platforms/pseries/Kconfig | 1 + arch/powerpc/platforms/pseries/Makefile | 2 + arch/powerpc/platforms/pseries/cc_platform.c | 26 +++ arch/powerpc/platforms/pseries/svm.c | 5 +- arch/s390/include/asm/mem_encrypt.h | 2 - arch/x86/Kconfig | 1 + arch/x86/hyperv/Makefile | 2 +- arch/x86/hyperv/hv_init.c | 82 ++++++-- arch/x86/hyperv/ivm.c | 289 +++++++++++++++++++++++++++ arch/x86/include/asm/hyperv-tlfs.h | 17 ++ arch/x86/include/asm/io.h | 8 + arch/x86/include/asm/kexec.h | 2 +- arch/x86/include/asm/mem_encrypt.h | 12 +- arch/x86/include/asm/mshyperv.h | 70 +++++-- arch/x86/include/asm/sev.h | 6 + arch/x86/kernel/Makefile | 6 + arch/x86/kernel/cc_platform.c | 69 +++++++ arch/x86/kernel/cpu/mshyperv.c | 5 + arch/x86/kernel/crash_dump_64.c | 4 +- arch/x86/kernel/head64.c | 9 +- arch/x86/kernel/kvm.c | 3 +- arch/x86/kernel/kvmclock.c | 4 +- arch/x86/kernel/machine_kexec_64.c | 19 +- arch/x86/kernel/pci-swiotlb.c | 9 +- arch/x86/kernel/relocate_kernel_64.S | 2 +- arch/x86/kernel/sev-shared.c | 68 ++++--- arch/x86/kernel/sev.c | 40 ++-- arch/x86/kernel/traps.c | 2 +- arch/x86/kvm/svm/svm.c | 3 +- arch/x86/mm/ioremap.c | 18 +- arch/x86/mm/mem_encrypt.c | 55 ++--- arch/x86/mm/mem_encrypt_identity.c | 18 +- arch/x86/mm/pat/set_memory.c | 24 ++- arch/x86/platform/efi/efi_64.c | 9 +- arch/x86/realmode/init.c | 8 +- drivers/gpu/drm/amd/amdgpu/amdgpu_drv.c | 4 +- drivers/gpu/drm/drm_cache.c | 4 +- drivers/gpu/drm/vmwgfx/vmwgfx_drv.c | 4 +- drivers/gpu/drm/vmwgfx/vmwgfx_msg.c | 6 +- drivers/hv/Kconfig | 1 + drivers/hv/channel.c | 72 ++++--- drivers/hv/channel_mgmt.c | 34 ---- drivers/hv/connection.c | 101 +++++++++- drivers/hv/hv.c | 82 ++++++-- drivers/hv/hv_common.c | 12 ++ drivers/hv/hyperv_vmbus.h | 2 + drivers/hv/ring_buffer.c | 57 ++++-- drivers/iommu/amd/init.c | 7 +- drivers/iommu/amd/iommu.c | 3 +- drivers/iommu/amd/iommu_v2.c | 3 +- drivers/iommu/iommu.c | 3 +- drivers/net/hyperv/hyperv_net.h | 5 +- drivers/net/hyperv/netvsc.c | 15 +- drivers/uio/uio_hv_generic.c | 18 +- fs/proc/vmcore.c | 6 +- include/asm-generic/hyperv-tlfs.h | 1 + include/asm-generic/mshyperv.h | 20 +- include/linux/cc_platform.h | 88 ++++++++ include/linux/hyperv.h | 25 +-- include/linux/mem_encrypt.h | 4 - kernel/dma/swiotlb.c | 4 +- 63 files changed, 1150 insertions(+), 339 deletions(-) create mode 100644 arch/powerpc/platforms/pseries/cc_platform.c create mode 100644 arch/x86/hyperv/ivm.c create mode 100644 arch/x86/kernel/cc_platform.c create mode 100644 include/linux/cc_platform.h