== Series Details == Series: drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups (rev8) URL : https://patchwork.freedesktop.org/series/112196/ State : warning == Summary == Error: dim checkpatch failed 7ddfeb73c37a drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page" 6e46a75c5c15 drm/i915/gvt: remove interface intel_gvt_is_valid_gfn 60cd1c1b954f drm/i915/gvt: Verify hugepages are contiguous in physical address space 82759b84f7fc drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn() a85e87c63800 drm/i915/gvt: Explicitly check that vGPU is attached before shadowing 2678442df896 drm/i915/gvt: Error out on an attempt to shadowing an unknown GTT entry type 425220f2cc46 drm/i915/gvt: Don't rely on KVM's gfn_to_pfn() to query possible 2M GTT 66caadcfb561 drm/i915/gvt: Use an "unsigned long" to iterate over memslot gfns cc12e36d8b5e drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() dfc1236b7e6e drm/i915/gvt: Protect gfn hash table with vgpu_lock 722d8f7ef123 KVM: x86/mmu: Move kvm_arch_flush_shadow_{all, memslot}() to mmu.c b2fdeb2bb4b6 KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change 58d52301be4c KVM: x86/mmu: Don't bounce through page-track mechanism for guest PTEs 84403a9c8920 KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hook c5834b025c35 KVM: x86: Reject memslot MOVE operations if KVMGT is attached 0e65c8e6f583 drm/i915/gvt: Don't bother removing write-protection on to-be-deleted slot ad683a55df9c KVM: x86: Add a new page-track hook to handle memslot deletion 287f9c98484d drm/i915/gvt: switch from ->track_flush_slot() to ->track_remove_region() 7630b3b1d29e KVM: x86: Remove the unused page-track hook track_flush_slot() 556343eb5969 KVM: x86/mmu: Move KVM-only page-track declarations to internal header Traceback (most recent call last): File "scripts/spdxcheck.py", line 6, in <module> from ply import lex, yacc ModuleNotFoundError: No module named 'ply' -:114: WARNING:FILE_PATH_CHANGES: added, moved or deleted file(s), does MAINTAINERS need updating? #114: new file mode 100644 total: 0 errors, 1 warnings, 0 checks, 113 lines checked 5eeebf29aa14 KVM: x86/mmu: Use page-track notifiers iff there are external users ec3a18744340 KVM: x86/mmu: Drop infrastructure for multiple page-track modes 1464bd80f0c0 KVM: x86/mmu: Rename page-track APIs to reflect the new reality ccd34fefb1d2 KVM: x86/mmu: Assert that correct locks are held for page write-tracking 3601016aae9f KVM: x86/mmu: Bug the VM if write-tracking is used but not enabled 730b76683f02 KVM: x86/mmu: Drop @slot param from exported/external page-track APIs 7fcd298749ba KVM: x86/mmu: Handle KVM bookkeeping in page-track APIs, not callers c1cebe248055 drm/i915/gvt: Drop final dependencies on KVM internal details