This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 87c9e88ac4a1 ovl: pass original credentials, not mounter credentials du [...] new 8127c4fdf169 pseries/lparcfg: Add resource group monitoring new b4a96ab50f36 powerpc/kdump: Add support for crashkernel CMA reservation new 7afe2383eff0 powerpc/kdump: Fix size calculation for hot-removed memory ranges new 98fa236044ca powerpc/8xx: Remove specific code from fast_exception_return new 2997876c4a1a powerpc/32: Restore clearing of MSR[RI] at interrupt/syscall exit new 10e1c77c3636 powerpc/32: Fix unpaired stwcx. on interrupt exit new 1e4b207ffe54 macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse new d2be62d58583 powerpc/vmlinux.lds: Drop .interp description new cbc8bd1b7d90 powerpc/boot: Add missing compression methods to usage new 825ce89a3ef1 powerpc/addnote: Fix overflow on 32-bit builds new 0070b2cbfe73 powerpc: 512x: Rename wdt@ node to watchdog@ new cc156be1e756 powerpc: 83xx: Rename wdt@ nodes to watchdog@ new 39fe29e7f2fd powerpc: 86xx: Rename wdt@ nodes to watchdog@ new af6850ac9ef3 powerpc: p2020: Rename wdt@ nodes to watchdog@ new 38c64dfe0af1 kexec: Include kernel-end even without crashkernel new f90d28443b1f arch:powerpc:tools This file was missing shebang line, so [...] new 2617bd81ae54 powerpc/83xx: Add a null pointer check to mcu_gpiochip_add new fb2ff9fa72e2 powerpc/smp: Expose die_id and die_cpumask new 78fc63ffa781 powerpc, mm: Fix mprotect on book3s 32-bit new 00312419f086 powerpc/64s/slb: Fix SLB multihit issue during SLB preload new 17b45ccf0988 powerpc/64s/hash: Restrict stress_hpt_struct memblock regi [...] new eae40a6da63f powerpc/64s/ptdump: Fix kernel_hash_pagetable dump for ISA [...] new 178dd2ee2b72 powerpc/64s/hash: Fix phys_addr_t printf format in htab_in [...] new fec40fe7e6dc powerpc/64s/hash: Improve hash mmu printk messages new b80691e25ec6 powerpc/64s/hash: Hash hpt_order should be only available [...] new b296fda58d1d powerpc/64s/hash: Update directMap page counters for Hash new 6394f0e8abe7 powerpc/64s/pgtable: Enable directMap counters in meminfo [...] new 3d44be297e7e powerpc/ptdump: Dump PXX level info for kernel_page_tables new 2a492d6b38c2 powerpc/64s/slb: Make preload_add return type as void new 5b3a426affbd powerpc/64s/slb: Add no_slb_preload early cmdline param new 8d398324967a powerpc/powermac: backlight: Include <linux/of.h> new 9b36c7fc5aa5 macintosh/via-pmu-backlight: Include <linux/fb.h> and <lin [...] new ad952db4a865 Merge tag 'powerpc-6.19-1' of git://git.kernel.org/pub/scm [...] new 231fb999a9ac RISC-V: Enable HOTPLUG_PARALLEL for secondary CPUs new c9a716104488 riscv: Remove __GFP_HIGHMEM masking new 0a067ae21bf2 riscv: pgtable: Use riscv_has_extension_unlikely new 1c7d491d8678 riscv: checksum: Use riscv_has_extension_likely new 8261a9d167e8 riscv: hweight: Use riscv_has_extension_likely new 6b85e9ac4a25 riscv: bitops: Use riscv_has_extension_likely new 724c69447975 riscv: cmpxchg: Use riscv_has_extension_likely new 6fcce9f028fb raid6: riscv: Prevent compiler from breaking inline vector [...] new 3c58d7a51341 raid6: riscv: Allow code to be compiled in userspace new 3ac022bf389d raid6: test: Add support for RISC-V new 6efb1a9462ef riscv: ptrace: Optimize the allocation of vector regset new f0ae09a89267 selftests: riscv: Add test for the Vector ptrace interface new c9651fbc6051 riscv: Add ISA extension parsing for Zalasr new 4640be258871 dt-bindings: riscv: Add Zalasr ISA extension description new f4922b691657 riscv: hwprobe: Export Zalasr extension new ad1bb4b8525e riscv: Introduce Zalasr instructions new e0a504984a88 riscv: hwprobe: Expose Zicbop extension and its block size new a131fd60796d selftests/riscv: Add Zicbop prefetch test new 07025b51c114 Merge tag 'riscv-for-linus-6.19-mw1' of git://git.kernel.o [...] new 7b5d4416964c um: init cpu_tasks[] earlier new f11839c16c3f um/hostfs: define HOSTFS_ATTR_* via asm-offsets new 6e3fc802ab86 um: move asm-offsets generation into a single file new 019cde8fc9a7 x86/um/vdso: Fix prototype of clock_gettime() new 8c0fbd6ae408 x86/um/vdso: Use prototypes from generic vDSO headers new 12fe820fae37 x86/um/vdso: Panic when vDSO can not be allocated new 3c9b904f9033 x86/um/vdso: Drop VDSO64-y from Makefile new 691ff5914835 um: Make host_task_size a local variable new de203267483d um: Use PAGE_ALIGN() for address alignment new 9c84022c1d1f um: Replace UML_ROUND_UP() with PAGE_ALIGN() new a7f7dbae94a5 um: Remove file-based iomem emulation support new 6aaf00d14e6c um: Do not disable kmalloc in initial_thread_cb() new 9e5a9f1c9b33 um: Turn signals_* into thread-local variables new 2670917c2fc8 um: Determine sleep based on need_resched() new 9c82de55d478 um: Define timers on a per-CPU basis new 1e4ee5135d81 um: Add initial SMP support new 37f847b79496 um: vdso: Remove getcpu support on x86 new 8d748955279c asm-generic: percpu: Add assembly guard new aa3e6faf620b um: Enable SMP support on x86 new 8e03c195cc4d um: Avoid circular dependency on asm-offsets in pgtable.h new 74d438872dae um: Split out default elf_aux_platform new c1b077515116 x86/um: Move ELF_PLATFORM fallback to x86-specific code new 83b4b44a2b05 um: Split out default elf_aux_hwcap new 70d52694b6a6 x86/um: Do not inherit vDSO from host new dbd7cf408ab7 x86/um: Drop gate area handling new 78fdfc9fc421 um: Remove fixaddr_user_init() new 880f615bf96e um: Remove redundant range check from __access_ok_vsyscall() new f20e32ffda93 um: Remove __access_ok_vsyscall() new 117e796fc5bf x86/um: Remove FIXADDR_USER_START and FIXADDR_USE_END new 293f71435d14 um: Always set up AT_HWCAP and AT_PLATFORM new 54618003a145 um: drivers: virtio: use string choices helper new a74b6c0e53a6 um: Don't rename vmap to kernel_vmap new a3209bb94b36 um: Disable KASAN_INLINE when STATIC_LINK is selected new 399ead3a6d76 Merge tag 'uml-for-linux-6.19-rc1' of git://git.kernel.org [...] new 32bd348be3fa KVM: Fix last_boosted_vcpu index assignment bug new 9259607ec710 KVM: Explicitly allocate/setup irqfd cleanup as per-CPU workqueue new 04fd067b770d KVM: Fix VM exit code for full dirty ring in API documentation new 9aca52b5523a Merge tag 'kvm-x86-generic-6.19' of https://github.com/kvm [...] new 7f3779a3ac3e mm/filemap: Add NUMA mempolicy support to filemap_alloc_folio() new 16a542e22339 mm/filemap: Extend __filemap_get_folio() to support NUMA m [...] new f634f10809ec mm/mempolicy: Export memory policy symbols new 049e560d4f47 KVM: guest_memfd: move kvm_gmem_get_index() and use in kvm [...] new 3f1078a445d9 KVM: guest_memfd: remove redundant gmem variable initialization new 765fcd7c0753 KVM: guest_memfd: use folio_nr_pages() instead of shift operation new 5f3e10797ab8 KVM: guest_memfd: Drop a superfluous local var in kvm_gmem [...] new 497b1dfbcacf KVM: guest_memfd: Rename "struct kvm_gmem" to "struct gmem_file" new 392dd9d9488a KVM: guest_memfd: Add macro to iterate over gmem_files for [...] new a63ca4236e67 KVM: guest_memfd: Use guest mem inodes instead of anonymou [...] new f609e89ae893 KVM: guest_memfd: Add slab-allocated inode cache new ed1ffa810bd6 KVM: guest_memfd: Enforce NUMA mempolicy using shared policy new 3223560c93eb KVM: selftests: Define wrappers for common syscalls to ass [...] new 29dc539d74ab KVM: selftests: Report stacktraces SIGBUS, SIGSEGV, SIGILL [...] new 2189d78269c5 KVM: selftests: Add additional equivalents to libnuma APIs [...] new fe7baebb99de KVM: selftests: Use proper uAPI headers to pick up mempoli [...] new e698e89b3ed1 KVM: selftests: Add helpers to probe for NUMA support, and [...] new 38ccc50ac037 KVM: selftests: Add guest_memfd tests for mmap and NUMA po [...] new e66438bb81c4 KVM: guest_memfd: Add gmem_inode.flags field instead of us [...] new 0bb4d9c39b76 KVM: guest_memfd: Define a CLASS to get+put guest_memfd fi [...] new 83e0e12219a4 KVM: selftests: Rename "guest_paddr" variables to "gpa" new 236831743ced Merge tag 'kvm-x86-gmem-6.19' of https://github.com/kvm-x8 [...] new 65a70164aba7 KVM: x86: Add a helper to dedup reporting of unhandled VM-Exits new 68c35f89d016 KVM: x86: Fix a semi theoretical bug in kvm_arch_async_pag [...] new ab4e41eb9fab KVM: x86: Don't clear async #PF queue when CR0.PG is disab [...] new c0711f8c610e KVM: TDX: Explicitly set user-return MSRs that *may* be cl [...] new b371174d2fa6 KVM: x86: WARN if user-return MSR notifier is registered on exit new 2baa33a8ddd6 KVM: x86: Leave user-return notifier registered on reboot/ [...] new 995d504100cf KVM: x86: Don't disable IRQs when unregistering user-retur [...] new b3e5b670c949 KVM: x86: Use "checked" versions of get_user() and put_user() new 0ea9494be9c9 KVM: x86: WARN if hrtimer callback for periodic APIC timer [...] new 9633f180ce99 KVM: x86: Explicitly set new periodic hrtimer expiration i [...] new 18ab3fc8e880 KVM: x86: Fix VM hard lockup after prolonged inactivity wi [...] new a091fe60c2d3 KVM: x86: Grab lapic_timer in a local variable to cleanup [...] new 43ddbf16edf5 Revert "x86: kvm: introduce periodic global clock updates" new 446fcce2a52b Revert "x86: kvm: rate-limit global clock updates" new e78fb96b41c6 KVM: x86: remove comment about ntp correction sync for new 11d984633f7f KVM: x86: Allocate/free user_return_msrs at kvm.ko (un)loa [...] new 844afc1af3a9 KVM: VMX: Use on-stack copy of @flags in __vmx_vcpu_run() new aba7de6088be x86/bugs: Use VM_CLEAR_CPU_BUFFERS in VMX as well new afb99ffbd582 x86/bugs: Decouple ALTERNATIVE usage from VERW macro definition new f6106d41ec84 x86/bugs: Use an x86 feature to track the MMIO Stale Data [...] new e6ff1d61de51 KVM: VMX: Handle MMIO Stale Data in VM-Enter assembly via [...] new fc704b578976 x86/bugs: KVM: Move VM_CLEAR_CPU_BUFFERS into SVM as SVM_C [...] new 0abd9610d6c6 KVM: VMX: Bundle all L1 data cache flush mitigation code together new 05bd63959a9d KVM: VMX: Disable L1TF L1 data cache flush if CONFIG_CPU_M [...] new 38ee66cb1845 KVM: x86: Unify L1TF flushing under per-CPU variable new ebd1a3365500 KVM: SVM: Handle #MCs in guest outside of fastpath new 63669bd1d50f KVM: VMX: Handle #MCs on VM-Enter/TD-Enter outside of the [...] new 75c69c82f211 KVM: x86: Load guest/host XCR0 and XSS outside of the fast [...] new 7649412af3ea KVM: x86: Load guest/host PKRU outside of the fastpath run loop new 0b28f21ad462 KVM: x86: Add a helper to dedup loading guest/host XCR0 and XSS new c57d9bafbd0b KVM: x86: Add support for emulating MOVNTDQA new 3f3fc58df502 KVM: x86: Move Src2Shift up one bit (use bits 36:32 for Sr [...] new 3d8834a0d1c9 KVM: x86: Improve formatting of the emulator's flags table new 1a84b07acaa4 KVM: x86: Move op_prefix to struct x86_emulate_ctxt (from [...] new 7e11eec989c8 KVM: x86: Share emulator's common register decoding code new f106797f81d6 KVM: x86: Add x86_emulate_ops.get_xcr() callback new 4cb21be4c3b0 KVM: x86: Add AVX support to the emulator's register fetch [...] new 825f0aece084 KVM: x86: Refactor REX prefix handling in instruction emulation new f0585a714a75 KVM: x86: Add emulator support for decoding VEX prefixes new ebec25438f3d KVM: x86: Enable support for emulating AVX MOV instructions new c09816f2afce KVM: x86: Remove unused declaration kvm_mmu_may_ignore_gue [...] new e64dcfab57ac Merge tag 'kvm-x86-misc-6.19' of https://github.com/kvm-x8 [...] new b146b289f759 KVM: selftests: Don't fall over in mmu_stress_test when on [...] new 17e5a9b77716 KVM: selftests: Forcefully override ARCH from x86_64 to x86 new 9e4ce7a89e0b KVM: selftests: Use "gpa" and "gva" for local variable nam [...] new 0a9eb2afa185 KVM: selftests: Extend vmx_close_while_nested_test to cover SVM new e6bcdd212238 KVM: selftests: Extend vmx_nested_tsc_scaling_test to cover SVM new 4d256d00e44e KVM: selftests: Move nested invalid CR3 check to its own test new 91423b041d3c KVM: selftests: Extend nested_invalid_cr3_test to cover SVM new 3c40777f0ed8 KVM: selftests: Extend vmx_tsc_adjust_test to cover SVM new 28b2dced8ba4 KVM: selftests: Stop hardcoding PAGE_SIZE in x86 selftests new ff736dba478c KVM: selftests: Remove the unused argument to prepare_eptp() new ae5b498b8da9 KVM: selftests: Use a loop to create guest page tables new 2103a8baf5cb KVM: selftests: Use a loop to walk guest page tables new ec5806639e39 KVM: selftests: Change VM_MODE_PXXV48_4K to VM_MODE_PXXVYY_4K new 6a8818de21d2 KVM: selftests: Add a VMX test for LA57 nested state new 1de4dc15baa1 KVM: selftests: Stop using __virt_pg_map() directly in tests new d2e50389ab44 KVM: selftests: Make sure vm->vpages_mapped is always up-to-date new b0bf3d67a7f0 Merge tag 'kvm-x86-selftests-6.19' of https://github.com/k [...] new b850841a53c5 KVM: x86/mmu: Skip MMIO SPTE invalidation if enable_mmio_c [...] new 6422060aa9c7 KVM: x86/mmu: Move the misplaced export of kvm_zap_gfn_range() new adc99a6cfcf7 Merge tag 'kvm-x86-mmu-6.19' of https://github.com/kvm-x86 [...] new 0a0da3f92118 KVM: Make support for kvm_arch_vcpu_async_ioctl() mandatory new 50efc2340a59 KVM: Rename kvm_arch_vcpu_async_ioctl() to kvm_arch_vcpu_u [...] new 5294a4b93e07 KVM: TDX: Drop PROVE_MMU=y sanity check on to-be-populated [...] new 3ab3283dbb2c KVM: x86/mmu: Add dedicated API to map guest_memfd pfn int [...] new c1f173fb3389 KVM: x86/mmu: WARN if KVM attempts to map into an invalid [...] new fe7413e39810 Revert "KVM: x86/tdp_mmu: Add a helper function to walk do [...] new 6de2fb089bb2 KVM: x86/mmu: Rename kvm_tdp_map_page() to kvm_tdp_page_pr [...] new ce7b5695397b KVM: TDX: Drop superfluous page pinning in S-EPT management new e6348c90dda9 KVM: TDX: Return -EIO, not -EINVAL, on a KVM_BUG_ON() condition new b836503300dc KVM: TDX: Fold tdx_sept_drop_private_spte() into tdx_sept_ [...] new 7139c8606505 KVM: x86/mmu: Drop the return code from kvm_x86_ops.remove [...] new b9d5cf6de0b6 KVM: TDX: WARN if mirror SPTE doesn't have full RWX when c [...] new 24adff397052 KVM: TDX: Avoid a double-KVM_BUG_ON() in tdx_sept_zap_priv [...] new af96d5452e5e KVM: TDX: Use atomic64_dec_return() instead of a poor equivalent new b4b2b6eda5af KVM: TDX: Fold tdx_mem_page_record_premap_cnt() into its s [...] new 6b5b71ffabf9 KVM: TDX: ADD pages to the TD image while populating mirro [...] new 14c9938619be KVM: TDX: Fold tdx_sept_zap_private_spte() into tdx_sept_r [...] new 597d7068702f KVM: TDX: Combine KVM_BUG_ON + pr_tdx_error() into TDX_BUG_ON() new 55560b6be5bc KVM: TDX: Derive error argument names from the local varia [...] new 2ff14116982c KVM: TDX: Assert that mmu_lock is held for write when remo [...] new 3d626ce5a8cc KVM: TDX: Add macro to retry SEAMCALLs when forcing vCPUs [...] new 59d5c1ed6df2 KVM: TDX: Add tdx_get_cmd() helper to get and validate sub [...] new 94428e3ba325 KVM: TDX: Convert INIT_MEM_REGION and INIT_VCPU to "unlock [...] new 0b76e827b29d KVM: TDX: Use guard() to acquire kvm->lock in tdx_vm_ioctl() new f26061fe2c25 KVM: TDX: Don't copy "cmd" back to userspace for KVM_TDX_C [...] new 15945e9ec195 KVM: TDX: Guard VM state transitions with "all" the locks new ad44aa4c5d3f KVM: TDX: Bug the VM if extending the initial measurement fails new 1e3a825c9ec9 KVM: TDX: Fix list_add corruption during vcpu_load() new 9a89894f30d5 KVM: TDX: Take MMU lock around tdh_vp_init() new 228add34dc2f KVM: TDX: Remove __user annotation from kernel pointer new 27376465e945 KVM: TDX: Fix sparse warnings from using 0 for NULL new 11b79f8318ae KVM: TDX: Check size of user's kvm_tdx_capabilities array [...] new 398180f93cf3 KVM: TDX: Use struct_size to simplify tdx_get_capabilities() new de8e8ebb1a7c Merge tag 'kvm-x86-tdx-6.19' of https://github.com/kvm-x86 [...] new 0152e049bd76 KVM: VMX: Remove stale vmx_set_dr6() declaration new f505c7b16fbe KVM: nVMX: Use vcpu instead of vmx->vcpu when vcpu is available new 0bd0a4a1428b KVM: TDX: Replace kmalloc + copy_from_user with memdup_use [...] new f48888bb8ad1 KVM: VMX: Hoist construct_eptp() "up" in vmx.c new a8749281e4c6 KVM: nVMX: Hardcode dummy EPTP used for early nested consi [...] new a10f5cc3ac9b KVM: x86/mmu: Move "dummy root" helpers to spte.h new 2f723a863423 KVM: VMX: Use kvm_mmu_page role to construct EPTP, not cur [...] new 15fe455dd1a0 KVM: nVMX: Add consistency check for TPR_THRESHOLD[31:4]!= [...] new ae8e6ad84177 KVM: nVMX: Add consistency check for TSC_MULTIPLIER=0 new f91699d5692d KVM: nVMX: Stuff vmcs02.TSC_MULTIPLIER early on for nested [...] new a175da6d430e KVM: nVMX: Remove support for "early" consistency checks v [...] new 1100e4910ad2 KVM: nVMX: Add an off-by-default module param to WARN on m [...] new 32ed0bc2f0f8 KVM: VMX: Ensure guest's SPEC_CTRL[63:32] is loaded on VM-Enter new dfd1572a64c9 KVM: VMX: Make loaded_vmcs_clear() static in vmx.c new d1e7b4613e2f Merge tag 'kvm-x86-vmx-6.19' of https://github.com/kvm-x86 [...] new 93c9e107386d KVM: SVM: Mark VMCB_PERM_MAP as dirty on nested VMRUN new 7c8b465a1c91 KVM: SVM: Mark VMCB_NPT as dirty on nested VMRUN new 4793f990ea15 KVM: x86: Advertise EferLmsleUnsupported to userspace new c53c632592a4 KVM: SVM: Disallow EFER.LMSLE when not supported by hardware new 574ef752d4ae KVM: SVM: Limit AVIC physical max index based on configure [...] new f2f6e67a56dc KVM: SVM: Add a helper to look up the max physical ID for AVIC new 83f3cbcd3a9f KVM: SVM: Replace hard-coded value 0x1FF with the correspo [...] new ca11d9d35e95 KVM: SVM: Expand AVIC_PHYSICAL_MAX_INDEX_MASK to be a 12-b [...] new 54ffe74cc4ab KVM: SVM: Move AVIC Physical ID table allocation to vcpu_p [...] new 5d0316e25def x86/cpufeatures: Add X86_FEATURE_X2AVIC_EXT new 940fc47cfb0d KVM: SVM: Add AVIC support for 4k vCPUs in x2AVIC mode new 3d31bdf9cc79 KVM: nSVM: Remove redundant cases in nested_svm_intercept() new 5674a76db021 KVM: nSVM: Propagate SVM_EXIT_CR0_SEL_WRITE correctly for [...] new 3d80f4c93d3d KVM: nSVM: Avoid incorrect injection of SVM_EXIT_CR0_SEL_WRITE new c331b400e291 KVM: SVM: Ensure SPEC_CTRL[63:32] is context switched betw [...] new 4da3768e1820 KVM: SVM: Don't skip unrelated instruction if INT3/INTO is [...] new 9f4ce4878878 KVM: x86: Document a virtualization gap for GIF on AMD CPUs new ce62118a2e48 KVM: SEV: Consolidate the SEV policy bits in a single header file new c9434e64e8b4 crypto: ccp - Add an API to return the supported SEV-SNP p [...] new 7a61d61396b9 KVM: SEV: Publish supported SEV-SNP policy bits new 275d6d1189e6 KVM: SEV: Add known supported SEV-SNP policy bits new 679fcce0028b Merge tag 'kvm-x86-svm-6.19' of https://github.com/kvm-x86 [...] new 74087611f0ba LoongArch: KVM: Get VM PMU capability from HW GCFG register new 7bcd8d0b2237 LoongArch: KVM: Add AVEC basic support new d3e43a1f34ac LoongArch: KVM: Use 64-bit register definition for EIOINTC new 985a96983bed KVM: LoongArch: selftests: Add system registers save/resto [...] new 1c5d3a1eab32 KVM: LoongArch: selftests: Add basic interfaces new d84fe2f30b0a KVM: LoongArch: selftests: Add exception handler register [...] new df41742343fa KVM: LoongArch: selftests: Add timer interrupt test case new 4e8824094069 KVM: LoongArch: selftests: Add SW emulated timer test case new 0f90fa6e2e9d KVM: LoongArch: selftests: Add time counter test case new 804028040536 Merge tag 'loongarch-kvm-6.19' of git://git.kernel.org/pub [...] new e2f3e2d37b06 RISC-V: KVM: Convert kvm_riscv_vcpu_sbi_forward() into ext [...] new 12fd6c62e9f6 RISC-V: KVM: Add separate source for forwarded SBI extensions new 7050f1d79f1c RISC-V: KVM: Add SBI MPXY extension support for Guest new d1c5620781d5 KVM: riscv: selftests: Add SBI MPXY extension to get-reg-list new a2483d5d1ee9 RISC-V: KVM: Introduce KVM_EXIT_FAIL_ENTRY_NO_VSFILE new df60cb2e6702 KVM: riscv: Support enabling dirty log gradually in small chunks new 974555d6e417 RISC-V: KVM: Fix guest page fault within HLV* instructions new 3239c52fd212 RISC-V: KVM: Flush VS-stage TLB after VCPU migration for A [...] new 63a9b0bc65d5 Merge tag 'kvm-riscv-6.19-1' of https://github.com/kvm-ris [...] new 297877069bc2 KVM: arm64: Drop useless __GFP_HIGHMEM from kvm struct allocation new cb17d79ff51d KVM: arm64: Use kvzalloc() for kvm struct allocation new 31df012da496 KVM: selftests: Assert GICR_TYPER.Processor_Number matches [...] new 85f329df2931 KVM: selftests: SYNC after guest ITS setup in vgic_lpi_stress new 156f70afcfec KVM: arm64: Only drop references on empty tables in stage2 [...] new d68d66e57e2b KVM: arm64: Split kvm_pgtable_stage2_destroy() new 4ddfab5436b6 KVM: arm64: Reschedule as needed when destroying the stage [...] new 404c2027d528 Merge branch 'kvm-arm64/misc' into kvmarm/next new ad9c62bd8946 KVM: arm64: VM exit to userspace to handle SEA new feee9ef7ac16 KVM: selftests: Test for KVM_EXIT_ARM_SEA new 4debb5e8952e Documentation: kvm: new UAPI for handling SEA new 11b8e6edc151 Merge branch 'kvm-arm64/sea-user' into kvmarm/next new 8cb4ecec5e36 irqchip/gic: Add missing GICH_HCR control bits new fa8f11e8e183 irqchip/gic: Expose CPU interface VA to KVM new 08f4f41c1e95 irqchip/apple-aic: Spit out ICH_MISR_EL2 value on spurious [...] new 8d3dfab1d305 KVM: arm64: Turn vgic-v3 errata traps into a patched-in constant new 567ebfedb5bd KVM: arm64: vgic-v3: Fix GICv3 trapping in protected mode new 2a28810cbb8b KVM: arm64: GICv3: Detect and work around the lack of ICV_ [...] new a4413a7c31cf KVM: arm64: Repack struct vgic_irq fields new 879a7fd4fd64 KVM: arm64: Add tracking of vgic_irq being present in a LR new 0dc433e79ad0 KVM: arm64: Add LR overflow handling documentation new 73c9726975af KVM: arm64: GICv3: Drop LPI active state when folding LRs new f4ded7b0848e KVM: arm64: GICv3: Preserve EOIcount on exit new 00c6d0d4a805 KVM: arm64: GICv3: Decouple ICH_HCR_EL2 programming from LRs new 438e47b697f7 KVM: arm64: GICv3: Extract LR folding primitive new 1ae0448ca797 KVM: arm64: GICv3: Extract LR computing primitive new 5ceb3dac8022 KVM: arm64: GICv2: Preserve EOIcount on exit new a00c88ac1f90 KVM: arm64: GICv2: Decouple GICH_HCR programming from LRs [...] new 3aa9a50c2007 KVM: arm64: GICv2: Extract LR folding primitive new 0660bc4a2b70 KVM: arm64: GICv2: Extract LR computing primitive new dd598fc1139f KVM: arm64: Compute vgic state irrespective of the number [...] new cf72ee637119 KVM: arm64: Eagerly save VMCR on exit new 6780a756044c KVM: arm64: Revamp vgic maintenance interrupt configuration new f04b8a5a83db KVM: arm64: Turn kvm_vgic_vcpu_enable() into kvm_vgic_vcpu [...] new 76b2eda65ccc KVM: arm64: Make vgic_target_oracle() globally available new 05984ba67eb6 KVM: arm64: Invert ap_list sorting to push active interrupts out new 33c1f60b3213 KVM: arm64: Move undeliverable interrupts to the end of ap_list new a69e2d6f8934 KVM: arm64: Use MI to detect groups being enabled/disabled new 3cfd59f81e0f KVM: arm64: GICv3: Handle LR overflow when EOImode==0 new cd4f6ee99b28 KVM: arm64: GICv3: Handle deactivation via ICV_DIR_EL1 traps new 295b69216558 KVM: arm64: GICv3: Add GICv2 SGI handling to deactivation [...] new 70fd60bdedc9 KVM: arm64: GICv3: Set ICH_HCR_EL2.TDIR when interrupts ov [...] new 1c3b3cadcd69 KVM: arm64: GICv3: Add SPI tracking to handle asymmetric d [...] new ca3c34da3644 KVM: arm64: GICv3: Handle in-LR deactivation when possible new 84792050e039 KVM: arm64: GICv3: Avoid broadcast kick on CPUs lacking TDIR new eb33ffa2bd3f KVM: arm64: GICv3: nv: Resync LRs/VMCR/HCR early for bette [...] new 6dd333c8942b KVM: arm64: GICv3: nv: Plug L1 LR sync into deactivation p [...] new 78ffc28456f5 KVM: arm64: GICv3: Force exit to sync ICH_HCR_EL2.En new 281c6c06e2a7 KVM: arm64: GICv2: Handle LR overflow when EOImode==0 new 255de897e7fb KVM: arm64: GICv2: Handle deactivation via GICV_DIR traps new 07bb1c5622a5 KVM: arm64: GICv2: Always trap GICV_DIR register new a1650de7c160 KVM: arm64: selftests: gic_v3: Add irq group setting helper new 2366295c76c2 KVM: arm64: selftests: gic_v3: Disable Group-0 interrupts [...] new 27392612c882 KVM: arm64: selftests: vgic_irq: Fix GUEST_ASSERT_IAR_EMPT [...] new 8b7888c5114d KVM: arm64: selftests: vgic_irq: Change configuration befo [...] new 5053c2ab92a1 KVM: arm64: selftests: vgic_irq: Exclude timer-controlled [...] new fd5fa1c8d09a KVM: arm64: selftests: vgic_irq: Remove LR-bound limitation new b6c68612ab41 KVM: arm64: selftests: vgic_irq: Perform EOImode==1 deacti [...] new d2dee2e84983 KVM: arm64: selftests: vgic_irq: Add asymmetric SPI deaect [...] new 1c9c71ac1b9f KVM: arm64: selftests: vgic_irq: Add Group-0 enable test new de8842327728 KVM: arm64: selftests: vgic_irq: Add timer deactivation test new 64d67e7add10 KVM: arm64: Convert ICH_HCR_EL2_TDIR cap to EARLY_LOCAL_CP [...] new 938309b028ba Merge branch 'kvm-arm64/vgic-lr-overflow' into kvmarm/next new dc31124379b6 arm64: Detect FEAT_XNX new 2608563b466b KVM: arm64: Add support for FEAT_XNX stage-2 permissions new d93febe2ed2e KVM: arm64: nv: Forward FEAT_XNX permissions to the shadow [...] new 6b49f70022ed KVM: arm64: Teach ptdump about FEAT_XNX permissions new 692650bd7b12 KVM: arm64: nv: Advertise support for FEAT_XNX new cdba9da34b14 KVM: arm64: Call helper for reading descriptors directly new 977d1bf15c51 KVM: arm64: nv: Stop passing vCPU through void ptr in S2 PTW new fabf321cba4b KVM: arm64: Handle endianness in read helper for emulated PTW new 590e694820bf KVM: arm64: nv: Use pgtable definitions in stage-2 walk new f6927b41d573 KVM: arm64: Add helper for swapping guest descriptor new 92c6443222ca KVM: arm64: Propagate PTW errors up to AT emulation new bff8aa213dee KVM: arm64: Implement HW access flag management in stage-1 SW PTW new e4c7dfac2f1a KVM: arm64: nv: Implement HW access flag management in sta [...] new d5bbb76f4474 KVM: arm64: nv: Expose hardware access flag management to [...] new 66f188858385 KVM: arm64: selftests: Add test for AT emulation new 36fe022f884b KVM: arm64: Fix compilation when CONFIG_ARM64_USE_LSE_ATOMICS=n new b0fc8329ec98 KVM: arm64: Add endian casting to kvm_swap_s[12]_desc() new d98a04dc1906 KVM: arm64: Add break to default case in kvm_pgtable_stage [...] new 05474b7bc75d KVM: arm64: Fix spelling mistake "Unexpeced" -> "Unexpected" new 93e8d997812b KVM: arm64: Document KVM_PGTABLE_PROT_{UX,PX} new e88d60c0aa0a KVM: arm64: at: Use correct HA bit in TCR_EL2 when regime is EL2 new d52aca163565 KVM: arm64: at: Update AF on software walk only if VM has [...] new 3eef0c83c3f3 Merge branch 'kvm-arm64/nv-xnx-haf' into kvmarm/next new f58e70cc31e3 Merge tag 'kvmarm-6.19' of https://git.kernel.org/pub/scm/ [...] new e72753ed1267 KVM: s390: Use ESCA instead of BSCA at VM init new 14542a0a54c5 KVM: S390: Remove sca_lock new 7d5136ed1b21 KVM: s390: Remove unused return variable in kvm_arch_vcpu_ [...] new f5a6fa189ad2 KVM: s390: Replace sprintf with snprintf for buffer safety new 182a258b5ec4 Documentation: kvm: Fix ordering new 8e8678e740ec KVM: s390: Add capability that forwards operation exceptions new 44acac00be5d KVM: s390: vsie: Check alignment of BSCA header new c067847c52e2 KVM: s390: Add signal_exits counter new d0139059e31a KVM: s390: Enable and disable interrupts in entry code new 2bd1337a1295 KVM: s390: Use generic VIRT_XFER_TO_GUEST_WORK functions new e0c26d47def7 Merge tag 'kvm-s390-next-6.19-1' of https://git.kernel.org [...] new 51d90a15fedf Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 363 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/admin-guide/kernel-parameters.txt | 5 +- Documentation/arch/riscv/hwprobe.rst | 11 +- .../devicetree/bindings/riscv/extensions.yaml | 5 + .../core/generic-idle-thread/arch-support.txt | 2 +- Documentation/virt/kvm/api.rst | 70 +- Documentation/virt/kvm/x86/errata.rst | 9 +- arch/arm64/include/asm/kvm_arm.h | 1 + arch/arm64/include/asm/kvm_asm.h | 8 +- arch/arm64/include/asm/kvm_host.h | 3 + arch/arm64/include/asm/kvm_hyp.h | 3 +- arch/arm64/include/asm/kvm_nested.h | 40 +- arch/arm64/include/asm/kvm_pgtable.h | 49 +- arch/arm64/include/asm/kvm_pkvm.h | 4 +- arch/arm64/include/asm/virt.h | 7 +- arch/arm64/kernel/cpufeature.c | 59 ++ arch/arm64/kernel/hyp-stub.S | 5 + arch/arm64/kernel/image-vars.h | 1 + arch/arm64/kvm/arm.c | 20 +- arch/arm64/kvm/at.c | 196 ++++- arch/arm64/kvm/hyp/nvhe/hyp-main.c | 7 +- arch/arm64/kvm/hyp/nvhe/pkvm.c | 3 + arch/arm64/kvm/hyp/nvhe/sys_regs.c | 5 + arch/arm64/kvm/hyp/pgtable.c | 122 +++- arch/arm64/kvm/hyp/vgic-v2-cpuif-proxy.c | 4 + arch/arm64/kvm/hyp/vgic-v3-sr.c | 96 ++- arch/arm64/kvm/mmu.c | 132 +++- arch/arm64/kvm/nested.c | 123 +++- arch/arm64/kvm/pkvm.c | 11 +- arch/arm64/kvm/ptdump.c | 35 +- arch/arm64/kvm/sys_regs.c | 28 +- arch/arm64/kvm/vgic/vgic-init.c | 9 +- arch/arm64/kvm/vgic/vgic-mmio-v2.c | 24 + arch/arm64/kvm/vgic/vgic-mmio.h | 1 + arch/arm64/kvm/vgic/vgic-v2.c | 291 ++++++-- arch/arm64/kvm/vgic/vgic-v3-nested.c | 104 +-- arch/arm64/kvm/vgic/vgic-v3.c | 426 ++++++++--- arch/arm64/kvm/vgic/vgic-v4.c | 5 +- arch/arm64/kvm/vgic/vgic.c | 298 +++++--- arch/arm64/kvm/vgic/vgic.h | 43 +- arch/arm64/tools/cpucaps | 2 + arch/loongarch/include/asm/kvm_eiointc.h | 55 +- arch/loongarch/include/asm/kvm_host.h | 8 + arch/loongarch/include/asm/kvm_vcpu.h | 1 + arch/loongarch/include/asm/loongarch.h | 2 + arch/loongarch/include/uapi/asm/kvm.h | 1 + arch/loongarch/kvm/Kconfig | 1 - arch/loongarch/kvm/intc/eiointc.c | 80 +- arch/loongarch/kvm/interrupt.c | 15 +- arch/loongarch/kvm/vcpu.c | 23 +- arch/loongarch/kvm/vm.c | 40 +- arch/mips/kvm/Kconfig | 1 - arch/mips/kvm/mips.c | 4 +- arch/powerpc/boot/addnote.c | 7 +- arch/powerpc/boot/dts/asp834x-redboot.dts | 2 +- arch/powerpc/boot/dts/fsl/ge_imp3a.dts | 4 +- arch/powerpc/boot/dts/fsl/gef_ppc9a.dts | 4 +- arch/powerpc/boot/dts/fsl/gef_sbc310.dts | 4 +- arch/powerpc/boot/dts/fsl/gef_sbc610.dts | 4 +- arch/powerpc/boot/dts/mpc5121.dtsi | 2 +- arch/powerpc/boot/dts/mpc8313erdb.dts | 2 +- arch/powerpc/boot/dts/mpc8315erdb.dts | 2 +- arch/powerpc/boot/dts/mpc832x_rdb.dts | 2 +- arch/powerpc/boot/dts/mpc8349emitx.dts | 2 +- arch/powerpc/boot/dts/mpc8349emitxgp.dts | 2 +- arch/powerpc/boot/dts/mpc836x_rdk.dts | 2 +- arch/powerpc/boot/dts/mpc8377_rdb.dts | 2 +- arch/powerpc/boot/dts/mpc8377_wlan.dts | 2 +- arch/powerpc/boot/dts/mpc8378_rdb.dts | 2 +- arch/powerpc/boot/dts/mpc8379_rdb.dts | 2 +- arch/powerpc/boot/wrapper | 4 +- arch/powerpc/include/asm/book3s/32/tlbflush.h | 5 +- arch/powerpc/include/asm/book3s/64/mmu-hash.h | 1 - arch/powerpc/include/asm/kexec.h | 2 + arch/powerpc/include/asm/topology.h | 11 +- arch/powerpc/kernel/entry_32.S | 33 +- arch/powerpc/kernel/interrupt.c | 2 +- arch/powerpc/kernel/process.c | 5 - arch/powerpc/kernel/setup-common.c | 4 +- arch/powerpc/kernel/smp.c | 23 + arch/powerpc/kernel/vmlinux.lds.S | 1 - arch/powerpc/kexec/core.c | 37 +- arch/powerpc/kexec/ranges.c | 45 +- arch/powerpc/kvm/Kconfig | 1 - arch/powerpc/kvm/powerpc.c | 4 +- arch/powerpc/mm/book3s32/tlb.c | 9 + arch/powerpc/mm/book3s64/hash_utils.c | 41 +- arch/powerpc/mm/book3s64/internal.h | 9 +- arch/powerpc/mm/book3s64/mmu_context.c | 2 - arch/powerpc/mm/book3s64/pgtable.c | 23 +- arch/powerpc/mm/book3s64/slb.c | 109 +-- arch/powerpc/mm/ptdump/8xx.c | 5 + arch/powerpc/mm/ptdump/book3s64.c | 5 + arch/powerpc/mm/ptdump/hashpagetable.c | 6 + arch/powerpc/mm/ptdump/ptdump.c | 1 + arch/powerpc/mm/ptdump/ptdump.h | 1 + arch/powerpc/mm/ptdump/shared.c | 5 + arch/powerpc/platforms/83xx/mcu_mpc8349emitx.c | 2 + arch/powerpc/platforms/powermac/backlight.c | 1 + arch/powerpc/platforms/pseries/lparcfg.c | 17 +- arch/powerpc/tools/head_check.sh | 1 + arch/riscv/Kconfig | 2 +- arch/riscv/include/asm/arch_hweight.h | 24 +- arch/riscv/include/asm/bitops.h | 32 +- arch/riscv/include/asm/checksum.h | 13 +- arch/riscv/include/asm/cmpxchg.h | 12 +- arch/riscv/include/asm/hwcap.h | 1 + arch/riscv/include/asm/hwprobe.h | 2 +- arch/riscv/include/asm/insn-def.h | 79 ++ arch/riscv/include/asm/kvm_host.h | 6 + arch/riscv/include/asm/kvm_tlb.h | 1 + arch/riscv/include/asm/kvm_vcpu_sbi.h | 5 +- arch/riscv/include/asm/kvm_vmid.h | 1 - arch/riscv/include/asm/pgtable.h | 15 +- arch/riscv/include/asm/vector.h | 1 + arch/riscv/include/uapi/asm/hwprobe.h | 3 + arch/riscv/include/uapi/asm/kvm.h | 3 + arch/riscv/kernel/cpufeature.c | 1 + arch/riscv/kernel/ptrace.c | 24 +- arch/riscv/kernel/smpboot.c | 15 + arch/riscv/kernel/sys_hwprobe.c | 7 + arch/riscv/kernel/vector.c | 2 + arch/riscv/kvm/Kconfig | 1 - arch/riscv/kvm/Makefile | 1 + arch/riscv/kvm/aia_imsic.c | 2 +- arch/riscv/kvm/main.c | 14 + arch/riscv/kvm/mmu.c | 5 +- arch/riscv/kvm/tlb.c | 30 + arch/riscv/kvm/vcpu.c | 6 +- arch/riscv/kvm/vcpu_insn.c | 22 + arch/riscv/kvm/vcpu_sbi.c | 10 +- arch/riscv/kvm/vcpu_sbi_base.c | 28 +- arch/riscv/kvm/vcpu_sbi_forward.c | 34 + arch/riscv/kvm/vcpu_sbi_replace.c | 32 - arch/riscv/kvm/vcpu_sbi_system.c | 4 +- arch/riscv/kvm/vcpu_sbi_v01.c | 3 +- arch/riscv/kvm/vmid.c | 23 - arch/riscv/lib/csum.c | 53 +- arch/riscv/mm/init.c | 4 +- arch/riscv/mm/pgtable.c | 22 +- arch/s390/include/asm/kvm_host.h | 8 +- arch/s390/include/asm/stacktrace.h | 1 + arch/s390/kernel/asm-offsets.c | 1 + arch/s390/kernel/entry.S | 2 + arch/s390/kvm/Kconfig | 2 +- arch/s390/kvm/gaccess.c | 27 +- arch/s390/kvm/intercept.c | 3 + arch/s390/kvm/interrupt.c | 80 +- arch/s390/kvm/kvm-s390.c | 233 ++---- arch/s390/kvm/kvm-s390.h | 9 +- arch/s390/kvm/vsie.c | 20 +- arch/um/Kconfig | 53 +- arch/um/Makefile | 12 +- arch/um/drivers/Makefile | 1 - arch/um/drivers/mmapper_kern.c | 135 ---- arch/um/drivers/virtio_uml.c | 4 +- arch/um/include/asm/current.h | 5 +- arch/um/include/asm/hardirq.h | 24 +- arch/um/include/asm/irqflags.h | 4 +- arch/um/include/asm/kasan.h | 4 - arch/um/include/asm/mmu.h | 10 + arch/um/include/asm/page.h | 4 - arch/um/include/asm/pgtable.h | 8 +- arch/um/include/asm/smp.h | 15 +- arch/um/include/asm/uaccess.h | 9 +- arch/um/include/linux/smp-internal.h | 17 + arch/um/include/linux/time-internal.h | 3 + arch/um/include/shared/as-layout.h | 1 - arch/um/include/shared/common-offsets.h | 20 - arch/um/include/shared/kern_util.h | 5 +- arch/um/include/shared/longjmp.h | 3 +- arch/um/include/shared/mem_user.h | 13 - arch/um/include/shared/os.h | 24 +- arch/um/include/shared/skas/mm_id.h | 5 + arch/um/include/shared/skas/skas.h | 2 + arch/um/include/shared/smp.h | 20 + arch/um/kernel/Makefile | 1 + arch/um/kernel/asm-offsets.c | 44 +- arch/um/kernel/irq.c | 27 +- arch/um/kernel/ksyms.c | 2 +- arch/um/kernel/mem.c | 111 +-- arch/um/kernel/physmem.c | 71 -- arch/um/kernel/process.c | 18 +- arch/um/kernel/skas/mmu.c | 33 +- arch/um/kernel/skas/process.c | 19 +- arch/um/kernel/smp.c | 242 +++++++ arch/um/kernel/time.c | 58 +- arch/um/kernel/tlb.c | 5 +- arch/um/kernel/trap.c | 2 +- arch/um/kernel/um_arch.c | 49 +- arch/um/os-Linux/Makefile | 6 +- arch/um/os-Linux/elf_aux.c | 37 +- arch/um/os-Linux/internal.h | 13 + arch/um/os-Linux/main.c | 6 +- arch/um/os-Linux/process.c | 20 + arch/um/os-Linux/signal.c | 46 +- arch/um/os-Linux/skas/process.c | 46 +- arch/um/os-Linux/smp.c | 148 ++++ arch/um/os-Linux/start_up.c | 54 +- arch/um/os-Linux/time.c | 78 +- arch/um/os-Linux/user_syms.c | 6 - arch/x86/include/asm/cpufeatures.h | 7 + arch/x86/include/asm/hardirq.h | 4 +- arch/x86/include/asm/kvm-x86-ops.h | 1 + arch/x86/include/asm/kvm_host.h | 23 +- arch/x86/include/asm/nospec-branch.h | 30 +- arch/x86/include/asm/svm.h | 5 +- arch/x86/include/uapi/asm/kvm.h | 1 + arch/x86/kernel/cpu/bugs.c | 22 +- arch/x86/kernel/cpu/scattered.c | 1 + arch/x86/kvm/cpuid.c | 1 + arch/x86/kvm/emulate.c | 319 +++++--- arch/x86/kvm/fpu.h | 66 ++ arch/x86/kvm/hyperv.c | 2 +- arch/x86/kvm/kvm_emulate.h | 20 +- arch/x86/kvm/lapic.c | 44 +- arch/x86/kvm/mmu.h | 5 +- arch/x86/kvm/mmu/mmu.c | 94 ++- arch/x86/kvm/mmu/mmu_internal.h | 10 - arch/x86/kvm/mmu/paging_tmpl.h | 2 +- arch/x86/kvm/mmu/spte.c | 2 +- arch/x86/kvm/mmu/spte.h | 10 + arch/x86/kvm/mmu/tdp_mmu.c | 50 +- arch/x86/kvm/svm/avic.c | 86 ++- arch/x86/kvm/svm/nested.c | 12 +- arch/x86/kvm/svm/sev.c | 47 +- arch/x86/kvm/svm/svm.c | 103 +-- arch/x86/kvm/svm/svm.h | 4 +- arch/x86/kvm/svm/vmenter.S | 53 +- arch/x86/kvm/vmx/main.c | 9 + arch/x86/kvm/vmx/nested.c | 173 ++--- arch/x86/kvm/vmx/run_flags.h | 10 +- arch/x86/kvm/vmx/tdx.c | 805 ++++++++++----------- arch/x86/kvm/vmx/tdx.h | 9 +- arch/x86/kvm/vmx/vmenter.S | 51 +- arch/x86/kvm/vmx/vmx.c | 323 +++++---- arch/x86/kvm/vmx/vmx.h | 2 - arch/x86/kvm/vmx/x86_ops.h | 2 +- arch/x86/kvm/x86.c | 285 ++++---- arch/x86/kvm/x86.h | 16 +- arch/x86/um/Kconfig | 7 +- arch/x86/um/Makefile | 5 +- arch/x86/um/asm/elf.h | 39 +- arch/x86/um/asm/spinlock.h | 8 + arch/x86/um/elfcore.c | 78 -- arch/x86/um/mem_32.c | 50 -- arch/x86/um/shared/sysdep/kernel-offsets.h | 17 - arch/x86/um/vdso/Makefile | 7 +- arch/x86/um/vdso/um_vdso.c | 30 +- arch/x86/um/vdso/vdso.lds.S | 2 - arch/x86/um/vdso/vma.c | 12 +- drivers/crypto/ccp/sev-dev.c | 37 + drivers/irqchip/irq-apple-aic.c | 7 +- drivers/irqchip/irq-gic.c | 3 + drivers/macintosh/mac_hid.c | 3 +- drivers/macintosh/via-pmu-backlight.c | 2 + fs/btrfs/compression.c | 4 +- fs/btrfs/verity.c | 2 +- fs/erofs/zdata.c | 2 +- fs/f2fs/compress.c | 2 +- fs/hostfs/hostfs.h | 34 +- include/asm-generic/percpu.h | 3 + include/kvm/arm_vgic.h | 29 +- include/linux/irqchip/arm-gic.h | 6 + include/linux/irqchip/arm-vgic-info.h | 2 + include/linux/kvm_host.h | 14 +- include/linux/pagemap.h | 18 +- include/linux/psp-sev.h | 37 + include/uapi/linux/kvm.h | 11 + include/uapi/linux/magic.h | 1 + lib/raid6/recov_rvv.c | 7 +- lib/raid6/rvv.c | 299 ++++---- lib/raid6/rvv.h | 17 + lib/raid6/test/Makefile | 8 + mm/filemap.c | 23 +- mm/mempolicy.c | 6 + mm/readahead.c | 2 +- tools/arch/arm64/include/asm/esr.h | 2 + tools/testing/selftests/kvm/Makefile | 2 +- tools/testing/selftests/kvm/Makefile.kvm | 12 +- tools/testing/selftests/kvm/arm64/at.c | 166 +++++ tools/testing/selftests/kvm/arm64/sea_to_user.c | 331 +++++++++ tools/testing/selftests/kvm/arm64/vgic_irq.c | 287 +++++++- .../testing/selftests/kvm/arm64/vgic_lpi_stress.c | 4 + tools/testing/selftests/kvm/guest_memfd_test.c | 98 +++ tools/testing/selftests/kvm/include/arm64/gic.h | 1 + .../selftests/kvm/include/arm64/gic_v3_its.h | 1 + tools/testing/selftests/kvm/include/kvm_syscalls.h | 81 +++ tools/testing/selftests/kvm/include/kvm_util.h | 45 +- .../selftests/kvm/include/loongarch/arch_timer.h | 85 +++ .../selftests/kvm/include/loongarch/processor.h | 81 ++- tools/testing/selftests/kvm/include/numaif.h | 110 +-- .../testing/selftests/kvm/include/x86/processor.h | 2 +- tools/testing/selftests/kvm/include/x86/vmx.h | 3 +- .../testing/selftests/kvm/kvm_binary_stats_test.c | 4 +- tools/testing/selftests/kvm/lib/arm64/gic.c | 6 + .../testing/selftests/kvm/lib/arm64/gic_private.h | 1 + tools/testing/selftests/kvm/lib/arm64/gic_v3.c | 22 + tools/testing/selftests/kvm/lib/arm64/gic_v3_its.c | 10 + tools/testing/selftests/kvm/lib/arm64/processor.c | 2 +- tools/testing/selftests/kvm/lib/kvm_util.c | 145 ++-- .../selftests/kvm/lib/loongarch/exception.S | 6 + .../selftests/kvm/lib/loongarch/processor.c | 47 +- tools/testing/selftests/kvm/lib/x86/memstress.c | 2 +- tools/testing/selftests/kvm/lib/x86/processor.c | 82 +-- tools/testing/selftests/kvm/lib/x86/vmx.c | 9 +- tools/testing/selftests/kvm/loongarch/arch_timer.c | 200 +++++ tools/testing/selftests/kvm/mmu_stress_test.c | 10 +- .../testing/selftests/kvm/pre_fault_memory_test.c | 32 +- tools/testing/selftests/kvm/riscv/get-reg-list.c | 4 + tools/testing/selftests/kvm/s390/user_operexec.c | 140 ++++ tools/testing/selftests/kvm/x86/hyperv_features.c | 2 +- tools/testing/selftests/kvm/x86/hyperv_ipi.c | 18 +- tools/testing/selftests/kvm/x86/hyperv_tlb_flush.c | 2 +- ...while_nested_test.c => nested_close_kvm_test.c} | 42 +- .../selftests/kvm/x86/nested_invalid_cr3_test.c | 116 +++ ..._tsc_adjust_test.c => nested_tsc_adjust_test.c} | 79 +- ...sc_scaling_test.c => nested_tsc_scaling_test.c} | 48 +- .../kvm/x86/private_mem_conversions_test.c | 9 +- tools/testing/selftests/kvm/x86/sev_smoke_test.c | 2 +- tools/testing/selftests/kvm/x86/state_test.c | 2 +- .../testing/selftests/kvm/x86/userspace_io_test.c | 2 +- .../testing/selftests/kvm/x86/vmx_dirty_log_test.c | 12 +- .../selftests/kvm/x86/vmx_nested_la57_state_test.c | 132 ++++ tools/testing/selftests/kvm/x86/xapic_ipi_test.c | 5 +- tools/testing/selftests/riscv/hwprobe/cbo.c | 165 ++++- tools/testing/selftests/riscv/vector/Makefile | 5 +- .../testing/selftests/riscv/vector/vstate_ptrace.c | 134 ++++ virt/kvm/Kconfig | 3 - virt/kvm/eventfd.c | 2 +- virt/kvm/guest_memfd.c | 373 +++++++--- virt/kvm/kvm_main.c | 15 +- virt/kvm/kvm_mm.h | 9 +- 332 files changed, 8192 insertions(+), 3993 deletions(-) create mode 100644 arch/riscv/kvm/vcpu_sbi_forward.c delete mode 100644 arch/um/drivers/mmapper_kern.c create mode 100644 arch/um/include/linux/smp-internal.h delete mode 100644 arch/um/include/shared/common-offsets.h create mode 100644 arch/um/include/shared/smp.h create mode 100644 arch/um/kernel/smp.c create mode 100644 arch/um/os-Linux/smp.c create mode 100644 arch/x86/um/asm/spinlock.h delete mode 100644 arch/x86/um/elfcore.c delete mode 100644 arch/x86/um/mem_32.c delete mode 100644 arch/x86/um/shared/sysdep/kernel-offsets.h create mode 100644 tools/testing/selftests/kvm/arm64/at.c create mode 100644 tools/testing/selftests/kvm/arm64/sea_to_user.c create mode 100644 tools/testing/selftests/kvm/include/kvm_syscalls.h create mode 100644 tools/testing/selftests/kvm/include/loongarch/arch_timer.h create mode 100644 tools/testing/selftests/kvm/loongarch/arch_timer.c create mode 100644 tools/testing/selftests/kvm/s390/user_operexec.c rename tools/testing/selftests/kvm/x86/{vmx_close_while_nested_test.c => nested_cl [...] create mode 100644 tools/testing/selftests/kvm/x86/nested_invalid_cr3_test.c rename tools/testing/selftests/kvm/x86/{vmx_tsc_adjust_test.c => nested_tsc_adjust [...] rename tools/testing/selftests/kvm/x86/{vmx_nested_tsc_scaling_test.c => nested_ts [...] create mode 100644 tools/testing/selftests/kvm/x86/vmx_nested_la57_state_test.c create mode 100644 tools/testing/selftests/riscv/vector/vstate_ptrace.c