This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from c43a20e4a520 Merge tag 'mtd/for-6.11' of git://git.kernel.org/pub/scm/l [...] new f9d1b541d057 Merge branch 'kvm-fixes-6.10-1' into HEAD new c72ceafbd12c mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory new 1d23040caa8b KVM: guest_memfd: Use AS_INACCESSIBLE when creating guest_ [...] new 70623723778a KVM: guest_memfd: pass error up from filemap_grab_folio new fa30b0dc91c8 KVM: guest_memfd: limit overzealous WARN new 3bb2531e20bf KVM: guest_memfd: Add hook for initializing memory new 17573fd971f9 KVM: guest_memfd: extract __kvm_gmem_get_pfn() new 1f6c06b17751 KVM: guest_memfd: Add interface for populating gmem pages [...] new a90764f0e4ed KVM: guest_memfd: Add hook for invalidating memory new f32fb32820b1 KVM: x86: Add hook for determining max NPT mapping level new 732326037349 Merge branch 'kvm-coco-hooks' into HEAD new b74d002d3d58 KVM: MMU: Disable fast path if KVM_EXIT_MEMORY_FAULT is needed new a8e319833355 KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_A [...] new 1dfe571c12cf KVM: SEV: Add initial SEV-SNP support new 136d8bc931c8 KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command new dee5a47cc7a4 KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command new ad27ce155566 KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command new 0c76b1d08280 KVM: SEV: Add support to handle GHCB GPA register VMGEXIT new d46b7b6a5f9e KVM: SEV: Add support to handle MSR based Page State Chang [...] new 9b54e248d264 KVM: SEV: Add support to handle Page State Change VMGEXIT new c63cf135cc99 KVM: SEV: Add support to handle RMP nested page faults new e366f92ea99e KVM: SEV: Support SEV-SNP AP Creation NAE event new 4f2e7aa1cfdf KVM: SEV: Implement gmem hook for initializing private pages new 8eb01900b018 KVM: SEV: Implement gmem hook for invalidating private pages new b2104024f40c KVM: x86: Implement hook for determining max NPT mapping level new ea262f8a7c36 KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP new 6f627b425378 KVM: SVM: Add module parameter to enable SEV-SNP new febff040b1a6 KVM: SEV: Automatically switch reclaimed pages to shared new 73137f59246d KVM: SEV: Don't WARN() if RMP lookup fails when invalidati [...] new b2ec042347fd KVM: SVM: Remove the need to trigger an UNBLOCK event on A [...] new ab978c62e72d Merge branch 'kvm-6.11-sev-snp' into HEAD new f99b052256f1 KVM: SNP: Fix LBR Virtualization for SNP guest new d81473840ce1 KVM: interrupt kvm_gmem_populate() on signals new 8a4e2742a54e KVM: x86/tdp_mmu: Sprinkle __must_check new 02b0d3b9d4dd Merge branch 'kvm-6.10-fixes' into HEAD new 27e6a24a4cf3 mm, virt: merge AS_UNMOVABLE and AS_INACCESSIBLE new 964cea817196 KVM: x86/tdp_mmu: Rename REMOVED_SPTE to FROZEN_SPTE new c2f38f75fc89 KVM: x86/tdp_mmu: Take a GFN in kvm_tdp_mmu_fast_pf_get_la [...] new eb162c941c0b Merge branch 'kvm-tdx-prep-1-truncated' into HEAD new 9aed7a6c0b59 KVM: Document KVM_PRE_FAULT_MEMORY ioctl new bc1a5cd00211 KVM: Add KVM_PRE_FAULT_MEMORY vcpu ioctl to pre-populate g [...] new 5186ec223b68 KVM: x86/mmu: Bump pf_taken stat only in the "real" page f [...] new f5e7f00cf195 KVM: x86/mmu: Account pf_{fixed,emulate,spurious} in calle [...] new 58ef24699bcd KVM: x86/mmu: Make kvm_mmu_do_page_fault() return mapped level new 6e01b7601dfe KVM: x86: Implement kvm_arch_vcpu_pre_fault_memory() new 9ff0e37c6882 KVM: selftests: x86: Add test for KVM_PRE_FAULT_MEMORY new f3996d4d7996 Merge branch 'kvm-prefault' into HEAD new e5b088c1dc4d RISC-V: KVM: Share APLIC and IMSIC defines with irqchip drivers new 3385339296d1 RISC-V: KVM: Use IMSIC guest files when available new 91195a90f1d1 RISCV: KVM: add tracepoints for entry and exit events new da7b1b525e97 perf kvm/riscv: Port perf kvm stat to RISC-V new e325618349cd RISC-V: KVM: Redirect AMO load/store access fault traps to guest new 60d2b2f3c474 Merge tag 'kvm-riscv-6.11-1' of https://github.com/kvm-ris [...] new 98f770389f46 KVM: s390: remove useless include new 33a729a1770b KVM: s390: vsie: retry SIE instruction on host intercepts new 7816e58967d0 kvm: s390: Reject memory region operations for ucontrol VMs new f0a23883fad4 Merge tag 'kvm-s390-next-6.11-1' of https://git.kernel.org [...] new e306e514906c LoongArch: KVM: Sync pending interrupt when getting ESTAT [...] new b5d4e2325db2 LoongArch: KVM: Delay secondary mmu tlb flush until guest entry new 2f56f9ea4dc3 LoongArch: KVM: Select huge page only if secondary mmu sup [...] new b072cbf0233b LoongArch: KVM: Discard dirty page tracking on readonly memslot new 32d4b999dade LoongArch: KVM: Add memory barrier before update pmd entry new 8c3470425270 LoongArch: KVM: Add dirty bitmap initially all set support new ebf00272da5c LoongArch: KVM: Mark page accessed and dirty with page ref added new d7ad41a31d91 LoongArch: KVM: always make pte young in page map's fast path new b4ba157044ea LoongArch: KVM: Add PV steal time support in host side new 03779999ac30 LoongArch: KVM: Add PV steal time support in guest side new 492ac37fa38f perf kvm: Add kvm-stat for loongarch64 new c8b8b8190a80 Merge tag 'loongarch-kvm-6.11' of git://git.kernel.org/pub [...] new 0b5afe05377d KVM: arm64: Add early_param to control WFx trapping new eb9d53d4a949 KVM: arm64: nv: Fix RESx behaviour of disabled FGTs with n [...] new 3dc14eefa504 KVM: arm64: nv: Use GFP_KERNEL_ACCOUNT for sysreg_masks al [...] new cb52b5c8b81b Revert "KVM: arm64: nv: Fix RESx behaviour of disabled FGT [...] new bd2e95136ba4 Merge branch kvm-arm64/misc into kvmarm/next new c9c012625e12 KVM: arm64: Trap FFA_VERSION host call in pKVM new 894376385a2d KVM: arm64: Add support for FFA_PARTITION_INFO_GET new 0dd60c4632a1 KVM: arm64: Update the identification range for the FF-A smcs new 42fb33dde42b KVM: arm64: Use FF-A 1.1 with pKVM new a35d5b2032ce Merge branch kvm-arm64/ffa-1p1 into kvmarm/next new 4f128f8e1aaa KVM: arm64: nv: Support multiple nested Stage-2 mmu structures new 61e30b9eef7f KVM: arm64: nv: Implement nested Stage-2 page table walk logic new fd276e71d1e7 KVM: arm64: nv: Handle shadow stage 2 page faults new ec14c272408a KVM: arm64: nv: Unmap/flush shadow stage 2 page tables new 82e86326ec58 KVM: arm64: nv: Add Stage-1 EL2 invalidation primitives new 67fda56e76da KVM: arm64: nv: Handle EL2 Stage-1 TLB invalidation new 8e236efa4cd2 KVM: arm64: nv: Handle TLB invalidation targeting L2 stage-1 new e6c9a3015ff2 KVM: arm64: nv: Handle TLBI VMALLS12E1{,IS} operations new 5cfb6cec62f2 KVM: arm64: nv: Handle TLBI ALLE1{,IS} operations new 70109bcd701e KVM: arm64: nv: Handle TLBI IPAS2E1{,IS} operations new d1de1576dc21 KVM: arm64: nv: Handle FEAT_TTL hinted TLB operations new b1a3a94812b9 KVM: arm64: nv: Tag shadow S2 entries with guest's leaf S2 level new 809b2e6013a5 KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-lik [...] new 0cb8aae22676 KVM: arm64: nv: Add handling of outer-shareable TLBI operations new 5d476ca57d7d KVM: arm64: nv: Add handling of range-based TLBI operations new 0feec7769a63 KVM: arm64: nv: Add handling of NXS-flavoured TLBI operations new 3cfde36df7ab KVM: arm64: nv: Truely enable nXS TLBI operations new 435a9f60eda4 Merge branch kvm-arm64/shadow-mmu into kvmarm/next new 4e8ff73eb7ae KVM: arm64: Get sys_reg encoding from descriptor in idregs [...] new 410db103f6eb KVM: arm64: Make idregs debugfs iterator search sysreg tab [...] new 97ca3fcc15cc KVM: arm64: Use read-only helper for reading VM ID registers new d7508d27dd88 KVM: arm64: Add helper for writing ID regs new 44241f34fac9 KVM: arm64: nv: Use accessors for modifying ID registers new f1ff3fc5209a KVM: arm64: unify code to prepare traps new 2843cae26644 KVM: arm64: Treat CTR_EL0 as a VM feature ID register new bb4fa769dcdd KVM: arm64: show writable masks for feature registers new 76d36012276a KVM: arm64: rename functions for invariant sys regs new 11a31be88fb6 KVM: selftests: arm64: Test writes to CTR_EL0 new 33d85a93c6c3 KVM: arm64: nv: Unfudge ID_AA64PFR0_EL1 masking new b0539664cbc3 KVM: selftests: Assert that MPIDR_EL1 is unchanged across [...] new 377d0e5d7795 Merge branch kvm-arm64/ctr-el0 into kvmarm/next new a8f0655887cc KVM: arm64: Fix clobbered ELR in sync abort/SError new ea9d7c83d14e KVM: arm64: Fix __pkvm_init_switch_pgd call ABI new 6e3b773ed6bc KVM: arm64: nVHE: Simplify invalid_host_el2_vect new 4ab3f9dd561b KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32 new 3c6eb6487693 KVM: arm64: VHE: Mark __hyp_call_panic __noreturn new 7a928b32f1de arm64: Introduce esr_brk_comment, esr_is_cfi_brk new 8f3873a39529 KVM: arm64: Introduce print_nvhe_hyp_panic helper new eca4ba5b6dff KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2 new 1270dad31097 Merge branch kvm-arm64/el2-kcfi into kvmarm/next new d2b2ecba8ddb KVM: arm64: nv: Forward FP/ASIMD traps to guest hypervisor new 399debfc9749 KVM: arm64: nv: Forward SVE traps to guest hypervisor new b3d29a823099 KVM: arm64: nv: Handle ZCR_EL2 traps new 069da3ffdadf KVM: arm64: nv: Load guest hyp's ZCR into EL1 state new b7e5c9426429 KVM: arm64: nv: Save guest's ZCR_EL2 when in hyp context new 9092aca9fe9a KVM: arm64: nv: Use guest hypervisor's max VL when running [...] new 2e3cf82063a0 KVM: arm64: nv: Ensure correct VL is loaded before saving [...] new 1785f020b112 KVM: arm64: Spin off helper for programming CPTR traps new 493da2b1c49a KVM: arm64: nv: Handle CPACR_EL1 traps new 0cfc85b8f5cf KVM: arm64: nv: Load guest FP state for ZCR_EL2 trap new 5326303bb7d9 KVM: arm64: nv: Honor guest hypervisor's FP/SVE traps in CPTR_EL2 new 0edc60fd6e9e KVM: arm64: nv: Add TCPAC/TTA to CPTR->CPACR conversion helper new e19d533126ac KVM: arm64: nv: Add trap description for CPTR_EL2 new cd931bd6093c KVM: arm64: nv: Add additional trap setup for CPTR_EL2 new f1ee914fb626 KVM: arm64: Allow the use of SVE+NV new 8c2899e7706e Merge branch kvm-arm64/nv-sve into kvmarm/next new 9b58e665d6b2 KVM: arm64: Correctly honor the presence of FEAT_TCRX new a3ee9ce88ba3 KVM: arm64: Get rid of HCRX_GUEST_FLAGS new 1b04fd40275e KVM: arm64: Make TCR2_EL1 save/restore dependent on the VM [...] new 663abf04ee4d KVM: arm64: Make PIR{,E0}_EL1 save/restore conditional on [...] new 91e9cc70b775 KVM: arm64: Honor trap routing for TCR2_EL1 new bc2e3253ca96 Merge branch kvm-arm64/nv-tcr2 into kvmarm/next new dc1d234cdd4a KVM: Documentation: Fix typo `BFD` new 03bd36a387b8 KVM: Documentation: Enumerate allowed value macros of `irq_type` new 810ecbefdd54 KVM: Documentation: Correct the VGIC V2 CPU interface addr [...] new 88a0a4f6068c MAINTAINERS: Include documentation in KVM/arm64 entry new bb032b2352c3 Merge branch kvm-arm64/docs into kvmarm/next new 1c5a0b55abeb Merge tag 'kvmarm-6.11' of git://git.kernel.org/pub/scm/li [...] new ebbdf37ce9ab KVM: Validate hva in kvm_gpc_activate_hva() to fix __kvm_g [...] new f4501e8bc88d Merge tag 'kvm-x86-fixes-6.10-11' of https://github.com/kv [...] new 96a02b9fa951 KVM: Unexport kvm_debugfs_dir new aeb1b22a3ac8 KVM: Enable halt polling shrink parameter by default new f8aadead1971 KVM: Update halt polling documentation to note that KVM ha [...] new 778c350eb580 Revert "KVM: async_pf: avoid recursive flushing of work items" new f2362c04752c KVM: fix documentation rendering for KVM_CAP_VM_MOVE_ENC_C [...] new fbe4a7e881d4 KVM: Setup empty IRQ routing when creating a VM new e3c89f5dd11d KVM: x86: Don't re-setup empty IRQ routing when KVM_CAP_SP [...] new c4201bd24f4a KVM: s390: Don't re-setup dummy routing when KVM_CREATE_IRQCHIP new d1ae567fb8b5 KVM: Add a flag to track if a loaded vCPU is scheduled out new 5d9c07febb86 KVM: VMX: Move PLE grow/shrink helpers above vmx_vcpu_load() new 8fbb696a8f53 KVM: x86: Fold kvm_arch_sched_in() into kvm_arch_vcpu_load() new 2a27c4314007 KVM: Delete the now unused kvm_arch_sched_in() new ef2e18ef3750 KVM: x86: Unconditionally set l1tf_flush_l1d during vCPU load new 3dee3b187499 KVM: x86: Drop now-superflous setting of l1tf_flush_l1d in [...] new 5c1f50ab7fcb KVM: Fix a goof where kvm_create_vm() returns 0 instead of [...] new 8b8e57e5096e KVM: Reject overly excessive IDs in KVM_CREATE_VCPU new 7c305d5118e6 KVM: x86: Limit check IDs for KVM_SET_BOOT_CPU_ID new d29bf2ca1404 KVM: x86: Prevent excluding the BSP on setting max_vcpu_ids new 4b451a57809c KVM: selftests: Test max vCPU IDs corner cases new 438a496b9041 KVM: selftests: Test vCPU boot IDs above 2^32 and MAX_VCPU_ID new a6816314af57 KVM: Introduce vcpu->wants_to_run new 4b23e0c199b2 KVM: Ensure new code that references immediate_exit gets e [...] new 118964562969 KVM: Mark a vCPU as preempted/ready iff it's scheduled out [...] new 25bc6af60f61 KVM: Add missing MODULE_DESCRIPTION() new 86014c1e20fa Merge tag 'kvm-x86-generic-6.11' of https://github.com/kvm [...] new 7974c0643ee3 KVM: x86: Add a struct to consolidate host values, e.g. EF [...] new 52c47f5897b6 KVM: SVM: Use KVM's snapshot of the host's XCR0 for SEV-ES [...] new c043eaaa6be0 KVM: x86/mmu: Snapshot shadow_phys_bits when kvm.ko is loaded new 82897db91215 KVM: x86: Move shadow_phys_bits into "kvm_host", as "maxphyaddr" new f9e1cbf1805e KVM: x86: hyper-v: Calculate APIC bus frequency for Hyper-V new b460256b162d KVM: x86: Make nanoseconds per APIC bus cycle a VM variable new 6fef518594bc KVM: x86: Add a capability to configure bus frequency for [...] new 69148ccec679 KVM: x86: Print names of apicv inhibit reasons in traces new f992572120fb KVM: x86: Keep consistent naming for APICv/AVIC inhibit reasons new c7d4c5f01961 KVM: x86: Drop unused check_apicv_inhibit_reasons() callba [...] new d5989a3533fc KVM: VMX: Remove unused declaration of vmx_request_immedia [...] new 5a4f8b3026fc KVM: x86/pmu: Squash period for checkpointed events based [...] new 6463e5e41842 KVM: x86: Apply Intel's TSC_AUX reserved-bit behavior to I [...] new c092fc879f99 KVM: x86: Inhibit code #DBs in MOV-SS shadow for all Intel [...] new d99e4cb2ae2e KVM: x86: Use "is Intel compatible" helper to emulate SYSC [...] new dc2b8b2b524a KVM: SVM: Emulate SYSENTER RIP/RSP behavior for all Intel [...] new 4067c2395e80 KVM: x86: Allow SYSENTER in Compatibility Mode for all Int [...] new bdaff4f92bce KVM: x86: Open code vendor_intel() in string_registers_quirk() new 1028893a73fe KVM: x86: Bury guest_cpuid_is_amd_or_hygon() in cpuid.c new 508f0c7bf6d5 KVM: x86: Improve documentation for KVM_CAP_X86_BUS_LOCK_EXIT new 85542adb65ec KVM: x86: Add KVM_RUN_X86_GUEST_MODE kvm_run flag new 8815d77cbc99 KVM: x86: Add missing MODULE_DESCRIPTION() macros new dd103407ca31 KVM: X86: Remove unnecessary GFP_KERNEL_ACCOUNT for tempor [...] new 6b878cbb87bf KVM: selftests: Add guest udelay() utility for x86 new 82222ee7e84c KVM: selftests: Add test for configure of x86 APIC bus frequency new 5dcc1e76144f Merge tag 'kvm-x86-misc-6.11' of https://github.com/kvm-x8 [...] new 4f8973e65fcd KVM: x86: invalid_list not used anymore in mmu_shrink_scan new 9ecc1c119b28 KVM: x86/mmu: Only allocate shadowed translation cache for [...] new caa727882937 KVM: x86/mmu: Rephrase comment about synthetic PFERR flags [...] new cf3ff0ee24d6 KVM: x86/mmu: Always drop mmu_lock to allocate TDP MMU SPs [...] new e1c04f7a9f42 KVM: x86/mmu: Hard code GFP flags for TDP MMU eager split [...] new 3d4a5a45ca26 KVM: x86/mmu: Unnest TDP MMU helpers that allocate SPs for [...] new 0089c055b560 KVM: x86/mmu: Avoid reacquiring RCU if TDP MMU fails to al [...] new 34b69edecb47 Merge tag 'kvm-x86-mmu-6.11' of https://github.com/kvm-x86 [...] new 0a7b73559b39 KVM: x86: Remove VMX support for virtualizing guest MTRR memtypes new e1548088ff54 KVM: VMX: Drop support for forcing UC memory when guest CR0.CD=1 new f05eda16037f srcu: Add an API for a memory barrier after SRCU read lock new 65a4de0ffd97 KVM: x86: Ensure a full memory barrier is emitted in the V [...] new 377b2f359d1f KVM: VMX: Always honor guest PAT on CPUs that support self-snoop new 5c5ddf71071f Merge tag 'kvm-x86-mtrrs-6.11' of https://github.com/kvm-x [...] new ea19f7d0bf46 KVM: x86: Remove IA32_PERF_GLOBAL_OVF_CTRL from KVM_GET_MS [...] new 8387435bebac KVM: x86/pmu: Switch to new Intel CPU model defines new 0c468a6a020c KVM: VMX: Switch to new Intel CPU model infrastructure new 0e102ce3d413 KVM: x86/pmu: Change ambiguous _mask suffix to _rsvd in kvm_pmu new 75430c412a31 KVM: x86/pmu: Manipulate FIXED_CTR_CTRL MSR with macros new 3b65a692a5c7 KVM: x86/pmu: Add a helper to enable bits in FIXED_CTR_CTRL new f287bef6ddc2 KVM: x86/pmu: Introduce distinct macros for GP/fixed count [...] new cda231cd42f5 Merge tag 'kvm-x86-pmu-6.11' of https://github.com/kvm-x86 [...] new f626279dea33 KVM: selftests: remove unused struct 'memslot_antagonist_args' new 17019d5195c4 KVM: selftests: Treat AMD Family 17h+ as supporting branch [...] new ea09ace3f8f3 KVM: selftests: Print the seed for the guest pRNG iff it h [...] new 5bb9af07d37c KVM: selftests: Rework macros in PMU counters test to prep [...] new 4669de42aa6c KVM: selftests: Increase robustness of LLC cache misses in [...] new dbfd50cb4512 Merge tag 'kvm-x86-selftests-6.11' of https://github.com/k [...] new f51af3468688 KVM: SVM: remove useless input parameter in snp_safe_alloc_page new 9f44286d77ac KVM: SVM: not account memory allocation for per-CPU svm_data new 99a49093ce92 KVM: SVM: Consider NUMA affinity when allocating per-CPU s [...] new 34830b3c02ae KVM: SVM: Force sev_es_host_save_area() to be inlined (for [...] new 704ec48fc2fb KVM: SVM: Use sev_es_host_save_area() helper when initiali [...] new 1229cbefa679 Merge tag 'kvm-x86-svm-6.11' of https://github.com/kvm-x86 [...] new cb9fb5fc12ef KVM: nVMX: Update VMCS12_REVISION comment to state it shou [...] new 23b2c5088d01 KVM: VMX: Remove unnecessary INVEPT[GLOBAL] from hardware [...] new 92c1e3cbf0d0 KVM: VMX: Switch __vmx_exit() and kvm_x86_vendor_exit() in [...] new d83c36d822be KVM: nVMX: Add a helper to get highest pending from Posted [...] new 32f55e475ce2 KVM: nVMX: Request immediate exit iff pending nested event [...] new 322a569c4b41 KVM: VMX: Split out the non-virtualization part of vmx_int [...] new 27c4fa42b11a KVM: nVMX: Check for pending posted interrupts when lookin [...] new 321ef62b0c5f KVM: nVMX: Fold requested virtual interrupt check into has [...] new 45405155d876 KVM: x86: WARN if a vCPU gets a valid wakeup that KVM can' [...] new 208a352a5490 Merge tag 'kvm-x86-vmx-6.11' of https://github.com/kvm-x86 [...] new 3d4415ed75a5 KVM: x86/mmu: Bug the VM if KVM tries to split a !hugepage SPTE new 9fe17d2ada6e KVM: x86/mmu: Clean up make_huge_page_split_spte() definit [...] new 2a1fc7dc3626 KVM: x86: Suppress MMIO that is triggered during task swit [...] new 88caf544c930 KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event new f55f3c3ac69f x86/sev: Move sev_guest.h into common SEV header new 74458e4859d8 KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST N [...] new bc9cd5a219aa Merge branch 'kvm-6.11-sev-attestation' into HEAD new f4854bf741c4 KVM: x86: Replace static_call_cond() with static_call() new 896046474f8d KVM: x86: Introduce kvm_x86_call() to simplify static call [...] new 5d766508fd15 KVM: x86/pmu: Add kvm_pmu_call() to simplify static calls [...] new 332d2c1d713e crypto: ccp: Add the SNP_VLEK_LOAD command new 2c9b3512402e Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 256 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/admin-guide/kernel-parameters.txt | 24 +- Documentation/virt/coco/sev-guest.rst | 19 + Documentation/virt/kvm/api.rst | 169 ++- Documentation/virt/kvm/devices/arm-vgic.rst | 2 +- Documentation/virt/kvm/halt-polling.rst | 12 +- .../virt/kvm/x86/amd-memory-encryption.rst | 110 +- Documentation/virt/kvm/x86/errata.rst | 18 + MAINTAINERS | 2 + arch/arm64/include/asm/esr.h | 12 + arch/arm64/include/asm/kvm_arm.h | 1 - arch/arm64/include/asm/kvm_asm.h | 2 + arch/arm64/include/asm/kvm_emulate.h | 95 +- arch/arm64/include/asm/kvm_host.h | 69 +- arch/arm64/include/asm/kvm_hyp.h | 4 +- arch/arm64/include/asm/kvm_mmu.h | 26 + arch/arm64/include/asm/kvm_nested.h | 131 +- arch/arm64/include/asm/sysreg.h | 17 + arch/arm64/kernel/asm-offsets.c | 1 + arch/arm64/kernel/debug-monitors.c | 4 +- arch/arm64/kernel/traps.c | 8 +- arch/arm64/kvm/arm.c | 88 +- arch/arm64/kvm/emulate-nested.c | 104 ++ arch/arm64/kvm/fpsimd.c | 19 +- arch/arm64/kvm/handle_exit.c | 43 +- arch/arm64/kvm/hyp/entry.S | 8 + arch/arm64/kvm/hyp/include/hyp/switch.h | 29 +- arch/arm64/kvm/hyp/include/hyp/sysreg-sr.h | 35 +- arch/arm64/kvm/hyp/include/nvhe/ffa.h | 2 +- arch/arm64/kvm/hyp/nvhe/Makefile | 6 +- arch/arm64/kvm/hyp/nvhe/ffa.c | 180 ++- arch/arm64/kvm/hyp/nvhe/gen-hyprel.c | 6 + arch/arm64/kvm/hyp/nvhe/host.S | 6 - arch/arm64/kvm/hyp/nvhe/hyp-init.S | 30 +- arch/arm64/kvm/hyp/nvhe/setup.c | 4 +- arch/arm64/kvm/hyp/vhe/switch.c | 202 ++- arch/arm64/kvm/hyp/vhe/tlb.c | 147 ++ arch/arm64/kvm/mmu.c | 213 ++- arch/arm64/kvm/nested.c | 1002 +++++++++++-- arch/arm64/kvm/pmu-emul.c | 2 +- arch/arm64/kvm/reset.c | 6 + arch/arm64/kvm/sys_regs.c | 593 +++++++- arch/loongarch/Kconfig | 11 + arch/loongarch/include/asm/kvm_host.h | 14 +- arch/loongarch/include/asm/kvm_para.h | 11 + arch/loongarch/include/asm/kvm_vcpu.h | 5 + arch/loongarch/include/asm/loongarch.h | 1 + arch/loongarch/include/asm/paravirt.h | 5 + arch/loongarch/include/uapi/asm/kvm.h | 4 + arch/loongarch/kernel/paravirt.c | 145 ++ arch/loongarch/kernel/time.c | 2 + arch/loongarch/kvm/Kconfig | 1 + arch/loongarch/kvm/exit.c | 38 +- arch/loongarch/kvm/main.c | 1 + arch/loongarch/kvm/mmu.c | 72 +- arch/loongarch/kvm/tlb.c | 5 +- arch/loongarch/kvm/vcpu.c | 156 +- arch/mips/include/asm/kvm_host.h | 1 - arch/mips/kvm/mips.c | 2 +- arch/powerpc/include/asm/kvm_host.h | 1 - arch/powerpc/kvm/powerpc.c | 2 +- arch/riscv/include/asm/kvm_aia_aplic.h | 58 - arch/riscv/include/asm/kvm_aia_imsic.h | 38 - arch/riscv/include/asm/kvm_host.h | 1 - arch/riscv/kvm/aia.c | 35 +- arch/riscv/kvm/aia_aplic.c | 2 +- arch/riscv/kvm/aia_device.c | 2 +- arch/riscv/kvm/aia_imsic.c | 2 +- arch/riscv/kvm/trace.h | 67 + arch/riscv/kvm/vcpu.c | 9 +- arch/riscv/kvm/vcpu_exit.c | 2 + arch/s390/include/asm/kvm_host.h | 2 - arch/s390/kvm/kvm-s390.c | 14 +- arch/s390/kvm/vsie.c | 22 +- arch/x86/include/asm/kvm-x86-ops.h | 8 +- arch/x86/include/asm/kvm-x86-pmu-ops.h | 3 +- arch/x86/include/asm/kvm_host.h | 90 +- arch/x86/include/asm/sev-common.h | 25 + arch/x86/include/asm/sev.h | 51 + arch/x86/include/asm/svm.h | 9 +- arch/x86/include/uapi/asm/kvm.h | 49 + arch/x86/kvm/Kconfig | 4 + arch/x86/kvm/cpuid.c | 14 +- arch/x86/kvm/cpuid.h | 18 - arch/x86/kvm/emulate.c | 71 +- arch/x86/kvm/hyperv.c | 9 +- arch/x86/kvm/irq.c | 2 +- arch/x86/kvm/irq.h | 1 - arch/x86/kvm/irq_comm.c | 7 - arch/x86/kvm/kvm_cache_regs.h | 10 +- arch/x86/kvm/kvm_emulate.h | 1 + arch/x86/kvm/lapic.c | 48 +- arch/x86/kvm/lapic.h | 5 +- arch/x86/kvm/mmu.h | 42 +- arch/x86/kvm/mmu/mmu.c | 206 ++- arch/x86/kvm/mmu/mmu_internal.h | 26 +- arch/x86/kvm/mmu/paging_tmpl.h | 3 +- arch/x86/kvm/mmu/spte.c | 46 +- arch/x86/kvm/mmu/spte.h | 10 +- arch/x86/kvm/mmu/tdp_mmu.c | 136 +- arch/x86/kvm/mmu/tdp_mmu.h | 2 +- arch/x86/kvm/mtrr.c | 644 +------- arch/x86/kvm/pmu.c | 73 +- arch/x86/kvm/pmu.h | 10 +- arch/x86/kvm/smm.c | 44 +- arch/x86/kvm/svm/nested.c | 2 +- arch/x86/kvm/svm/pmu.c | 11 +- arch/x86/kvm/svm/sev.c | 1582 +++++++++++++++++++- arch/x86/kvm/svm/svm.c | 78 +- arch/x86/kvm/svm/svm.h | 70 +- arch/x86/kvm/trace.h | 55 +- arch/x86/kvm/vmx/main.c | 5 +- arch/x86/kvm/vmx/nested.c | 55 +- arch/x86/kvm/vmx/pmu_intel.c | 52 +- arch/x86/kvm/vmx/posted_intr.h | 10 + arch/x86/kvm/vmx/vmcs12.h | 14 +- arch/x86/kvm/vmx/vmx.c | 205 ++- arch/x86/kvm/vmx/vmx.h | 3 +- arch/x86/kvm/vmx/x86_ops.h | 4 - arch/x86/kvm/x86.c | 567 ++++--- arch/x86/kvm/x86.h | 25 +- arch/x86/kvm/xen.c | 6 +- drivers/crypto/ccp/sev-dev.c | 36 + drivers/virt/coco/sev-guest/sev-guest.c | 2 - drivers/virt/coco/sev-guest/sev-guest.h | 63 - include/linux/arm_ffa.h | 3 + include/linux/kvm_host.h | 53 +- include/linux/pagemap.h | 13 +- include/linux/psp-sev.h | 4 +- include/linux/srcu.h | 14 + include/uapi/linux/kvm.h | 27 +- include/uapi/linux/psp-sev.h | 27 + include/uapi/linux/sev-guest.h | 3 + mm/compaction.c | 12 +- mm/migrate.c | 2 +- mm/truncate.c | 3 +- tools/include/uapi/linux/kvm.h | 10 + tools/perf/arch/loongarch/Makefile | 1 + tools/perf/arch/loongarch/util/Build | 2 + tools/perf/arch/loongarch/util/header.c | 96 ++ tools/perf/arch/loongarch/util/kvm-stat.c | 139 ++ tools/perf/arch/riscv/Makefile | 1 + tools/perf/arch/riscv/util/Build | 1 + tools/perf/arch/{arm64 => riscv}/util/kvm-stat.c | 28 +- tools/perf/arch/riscv/util/riscv_exception_types.h | 35 + tools/testing/selftests/kvm/Makefile | 2 + tools/testing/selftests/kvm/aarch64/set_id_regs.c | 17 + tools/testing/selftests/kvm/include/x86_64/apic.h | 8 + .../selftests/kvm/include/x86_64/processor.h | 18 + tools/testing/selftests/kvm/lib/kvm_util.c | 9 +- tools/testing/selftests/kvm/lib/x86_64/processor.c | 11 + .../kvm/memslot_modification_stress_test.c | 6 - .../testing/selftests/kvm/pre_fault_memory_test.c | 146 ++ .../selftests/kvm/x86_64/apic_bus_clock_test.c | 194 +++ .../selftests/kvm/x86_64/max_vcpuid_cap_test.c | 22 +- .../selftests/kvm/x86_64/pmu_counters_test.c | 44 +- .../selftests/kvm/x86_64/pmu_event_filter_test.c | 35 +- .../testing/selftests/kvm/x86_64/set_boot_cpu_id.c | 16 + virt/kvm/Kconfig | 11 + virt/kvm/async_pf.c | 13 +- virt/kvm/guest_memfd.c | 176 ++- virt/kvm/irqchip.c | 24 + virt/kvm/kvm_main.c | 106 +- virt/kvm/pfncache.c | 3 + 163 files changed, 7690 insertions(+), 2339 deletions(-) delete mode 100644 arch/riscv/include/asm/kvm_aia_aplic.h delete mode 100644 arch/riscv/include/asm/kvm_aia_imsic.h create mode 100644 arch/riscv/kvm/trace.h delete mode 100644 drivers/virt/coco/sev-guest/sev-guest.h create mode 100644 tools/perf/arch/loongarch/util/header.c create mode 100644 tools/perf/arch/loongarch/util/kvm-stat.c copy tools/perf/arch/{arm64 => riscv}/util/kvm-stat.c (67%) create mode 100644 tools/perf/arch/riscv/util/riscv_exception_types.h create mode 100644 tools/testing/selftests/kvm/pre_fault_memory_test.c create mode 100644 tools/testing/selftests/kvm/x86_64/apic_bus_clock_test.c