This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from ba9dac987319 Merge tag 'libnvdimm-for-6.18' of git://git.kernel.org/pub [...] new 35fae10aaf08 um: Support SPARSE_IRQ new a0830785e89d um: virtio-pci: implement .shutdown() new 26577cfbe1d6 um: Add missing trailing newline to help messages new 2cc62ed234f1 um: vector: Fix indentation for help message new 725e9d81868f um: Fix help message for ssl-non-raw new 4c134c2a5f3d um: Indent time-travel help messages new 78624eb99e1a um: Remove unused offset and child_err fields from stub_data new b765d69a1adf um: Remove outdated comment about STUB_DATA_PAGES new e047f9af9d69 um: Centralize stub size calculations new a73a9aad8a81 um: Stop tracking virtual CPUs via mm_cpumask() new be6a0372be58 um: Remove unused cpu_data and current_cpu_data macros new e66ae377fe21 um: Remove unused ipi_pipe field from cpuinfo_um new fc282d1731ec Merge tag 'uml-for-linux-6.18-rc1' of git://git.kernel.org [...] new 2b5f6638204c Merge tag 'acpi-6.18-rc1' into loongarch-next new abb2a5572264 LoongArch: Add cflag -fno-isolate-erroneous-paths-dereference new 19baac378a5f LoongArch: Fix build error for LTO with LLVM-18 new 98662be7ef20 LoongArch: Init acpi_gbl_use_global_lock to false new 5dcddd268a8d LoongArch: Allow specify SIMD width via kernel parameters new 30ade4fef7ad LoongArch: Add struct loongarch_image_header for kernel new d162feec6b6e LoongArch: Add preparatory infrastructure for kexec_file new 55d990f0084c LoongArch: Add EFI binary support for kexec_file new fc9c112f804a LoongArch: Add ELF binary support for kexec_file new 1bcca8620a91 LoongArch: Add crash dump support for kexec_file new c8168b4faf1d LoongArch: Automatically disable kaslr if boot from kexec_file new 892979b0a97c LoongArch: Try VMA lock-based page fault handling first new db740f5689e6 LoongArch: Handle new atomic instructions for probes new 24ff0347bbfd LoongArch: BPF: Optimize sign-extention mov instructions new 7b6c2d172d02 LoongArch: BPF: Fix uninitialized symbol 'retval_off' new 909d3e3f51b1 LoongArch: BPF: Remove duplicated flags check new b0f50dc09bf0 LoongArch: BPF: Remove duplicated bpf_flush_icache() new 3d770bd11b94 LoongArch: BPF: No text_poke() for kernel text new e82406c7cbdd LoongArch: BPF: No support of struct argument in trampolin [...] new a04731cbee6e LoongArch: BPF: Don't align trampoline size new ea645cfd3d5f LoongArch: BPF: Make trampoline size stable new de2c0b778864 LoongArch: BPF: Make error handling robust in arch_prepare [...] new 8b51b11b3d81 LoongArch: BPF: Sign-extend struct ops return values properly new 032676ff8217 LoongArch: Update Loongson-3 default config file new fb5bc347311b Merge tag 'loongarch-6.18' of git://git.kernel.org/pub/scm [...] new 6777885605e1 KVM: x86/mmu: Track possible NX huge pages separately for [...] new 62105564226e KVM: x86/mmu: Rename kvm_tdp_mmu_zap_sp() to better indica [...] new a57750909580 KVM: x86/mmu: Recover TDP MMU NX huge pages using MMU read lock new 3ccbf6f47098 KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves me [...] new 2bc2694fe20b KVM: TDX: Do not retry locally when the retry is caused by [...] new 5b0d0d85422d Merge tag 'kvm-x86-mmu-6.18' of https://github.com/kvm-x86 [...] new a1f2418c3eea KVM: VMX: Fix an indentation new 65391feb042b KVM: VMX: Add host MSR read/write helpers to consolidate p [...] new 7cbb14d361bd KVM: TDX: Remove redundant __GFP_ZERO new 510c47f165f0 KVM: TDX: Fix uninitialized error code for __tdx_bringup() new 0f68fe44550c Merge tag 'kvm-x86-vmx-6.18' of https://github.com/kvm-x86 [...] new c78af20374a1 KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it new 00f0b959ffb0 KVM: SEV: Enforce minimum GHCB version requirement for SEV [...] new 7b59c73fd611 x86/cpufeatures: Add SNP Secure TSC new 34bd82aab15b KVM: SVM: Move SEV-ES VMSA allocation to a dedicated sev_v [...] new 3d4e882e3439 KVM: SEV: Move init of SNP guest state into sev_init_vmcb() new baf6ed177290 KVM: SEV: Set RESET GHCB MSR value during sev_es_init_vmcb() new f7b1f0c1620d KVM: SEV: Fold sev_es_vcpu_reset() into sev_vcpu_create() new a311fce2b694 KVM: SVM: Enable Secure TSC for SNP guests new 2f5f8fb9de09 KVM: SEV: Save the SEV policy if and only if LAUNCH_START [...] new fc55b4cda00a KVM: nSVM: Replace kzalloc() + copy_from_user() with memdu [...] new e0ff302b79c5 KVM: SEV: Rename kvm_ghcb_get_sw_exit_code() to kvm_get_ca [...] new bd5f500d2317 KVM: SEV: Read save fields from GHCB exactly once new 4135a9a8ccba KVM: SEV: Validate XCR0 provided by guest in GHCB new 5b66e335ead6 KVM: SEV: Reject non-positive effective lengths during LAU [...] new 9bc366350734 KVM: x86: Add helper to retrieve current value of user return MSR new 29da8c823abf KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT fr [...] new 44bfe1f0490d KVM: SVM: Make svm_x86_ops globally visible, clean up on-H [...] new eb44ea6a7aac KVM: SVM: Move x2AVIC MSR interception helper to avic.c new a9095e4fc436 KVM: SVM: Update "APICv in x2APIC without x2AVIC" in avic. [...] new ce4253e21fa8 KVM: SVM: Always print "AVIC enabled" separately, even whe [...] new ad65dca2ca4c KVM: SVM: Don't advise the user to do force_avic=y (when x [...] new b14665353162 KVM: SVM: Move global "avic" variable to avic.c new ca2967de5a5b KVM: SVM: Enable AVIC by default for Zen4+ if x2AVIC is support new a104e0a3052d Merge tag 'kvm-x86-svm-6.18' of https://github.com/kvm-x86 [...] new d7fc7d9833f6 KVM: SEV: Introduce new min,max sev_es and sev_snp asid variables new 6c7c620585c6 KVM: SEV: Add SEV-SNP CipherTextHiding support new 10ef74c06bb1 Merge tag 'kvm-x86-ciphertext-6.18' of https://github.com/ [...] new e750f8539128 KVM: x86: Don't (re)check L1 intercepts when completing us [...] new 68e61f6fd656 KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 new 0910dd7c9ad4 KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP i [...] new 49be82d4ad2e arch/x86/kvm/ioapic: Remove license boilerplate with bad F [...] new 1f0654dc75b8 KVM: x86: allow CPUID 0xC000_0000 to proceed on Zhaoxin CPUs new cc63f918a215 kvm: x86: simplify kvm_vector_to_index() new 15daa58e78ce KVM: x86: Add kvm_icr_to_lapic_irq() helper to allow for f [...] new 777414340085 KVM: x86: Only allow "fast" IPIs in fastpath WRMSR(X2APIC_ [...] new aeeb4c7fff52 KVM: x86: Drop semi-arbitrary restrictions on IPI type in [...] new 0a94b2042419 KVM: x86: Unconditionally handle MSR_IA32_TSC_DEADLINE in [...] new aebcbb609773 KVM: x86: Acquire SRCU in WRMSR fastpath iff instruction n [...] new aa2e4f029341 KVM: x86: Unconditionally grab data from EDX:EAX in WRMSR [...] new d618fb4e43a0 KVM: x86: Fold WRMSR fastpath helpers into the main handler new a3e80bf73ee1 KVM: x86/pmu: Move kvm_init_pmu_capability() to pmu.c new 43f5bea2639c KVM: x86/pmu: Add wrappers for counting emulated instructi [...] new 5dfd498bad5f KVM: x86/pmu: Calculate set of to-be-emulated PMCs at time [...] new 6b6f1adc4332 KVM: x86/pmu: Rename pmc_speculative_in_use() to pmc_is_lo [...] new e630bb52d27f KVM: x86/pmu: Open code pmc_event_is_allowed() in its callers new 58baa649ea09 KVM: x86/pmu: Drop redundant check on PMC being globally e [...] new 8709656514c1 KVM: x86/pmu: Drop redundant check on PMC being locally en [...] new 3eced8b07bb9 KVM: x86/pmu: Rename check_pmu_event_filter() to pmc_is_ev [...] new 8bb8b60c95c5 KVM: x86: Push acquisition of SRCU in fastpath into kvm_pm [...] new 6c3d4b917995 KVM: x86: Add a fastpath handler for INVD new 3c7cb8414533 x86/cpufeatures: Add a CPU feature bit for MSR immediate f [...] new ec400f6c2f27 KVM: x86: Rename local "ecx" variables to "msr" and "pmc" [...] new 87a877de367d KVM: x86: Rename handle_fastpath_set_msr_irqoff() to handl [...] new 885df2d2109a KVM: x86: Add support for RDMSR/WRMSRNS w/ immediate on Intel new ec93675a3251 KVM: VMX: Support the immediate form of WRMSRNS in the VM- [...] new d90ebf5a06ec KVM: x86: Advertise support for the immediate form of MSR [...] new d2dcf25a4cf2 KVM: x86: Rename kvm_{g,s}et_msr()* to show that they emul [...] new db07f3d0eb19 KVM: x86: Use double-underscore read/write MSR helpers as [...] new c2aa58b226ab KVM: x86: Add kvm_msr_{read,write}() helpers new 41f6710f99f4 KVM: x86: Manually clear MPX state only on INIT new c26675447faf KVM: x86: Zero XSTATE components on INIT by iterating over [...] new cbf5d9457462 KVM: x86: Move kvm_irq_delivery_to_apic() from irq.c to lapic.c new 73473f31a4bf KVM: x86: Make "lowest priority" helpers local to lapic.c new aac057dd6231 KVM: x86: Move vector_hashing into lapic.c new b3a37bff8daf KVM: TDX: Reject fully in-kernel irqchip if EOIs are prote [...] new 06dc910f5e07 KVM: x86/pmu: Correct typo "_COUTNERS" to "_COUNTERS" new 4319fa120f0f KVM: x86: Use guard() instead of mutex_lock() to simplify code new cbd860293d13 KVM: x86: hyper-v: Use guard() instead of mutex_lock() to [...] new 5b5133e6a55b Documentation: KVM: Call out that KVM strictly follows the [...] new 4687a2c4e6a6 KVM: VMX: Setup canonical VMCS config prior to kvm_x86_ven [...] new e3d1f2826da6 KVM: SVM: Check pmu->version, not enable_pmu, when getting [...] new 51f34b1e650f KVM: x86/pmu: Snapshot host (i.e. perf's) reported PMU cap [...] new 1e24bece2681 KVM: x86: Rename vmx_vmentry/vmexit_ctrl() helpers new cdfed9370b96 KVM: x86/pmu: Move PMU_CAP_{FW_WRITES,LBR_FMT} into msr-in [...] new 6057497336bb KVM: x86: Rework KVM_REQ_MSR_FILTER_CHANGED into a generic [...] new 5a1a726e68ff KVM: x86: Use KVM_REQ_RECALC_INTERCEPTS to react to CPUID updates new 2bff2edf69ed KVM: VMX: Add helpers to toggle/change a bit in VMCS execu [...] new 30c0267f1581 KVM: x86/pmu: Use BIT_ULL() instead of open coded equivalents new 9bae7a086394 KVM: x86/pmu: Move initialization of valid PMCs bitmask to [...] new c49aa9837686 KVM: x86/pmu: Restrict GLOBAL_{CTRL,STATUS}, fixed PMCs, a [...] new e8f85d7884e0 KVM: x86: Don't treat ENTER and LEAVE as branches, because [...] new 86bcd23df9ce KVM: x86: Fix hypercalls docs section number order new d05ca6b7931e Merge tag 'kvm-x86-misc-6.18' of https://github.com/kvm-x8 [...] new 5dca3808b2fc KVM: x86: Merge 'svm' into 'cet' to pick up GHCB dependencies new 1f2bbbbbda57 KVM: x86: Merge 'selftests' into 'cet' to pick up ex_str() new 06f2969c6a12 KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support new c0a5f2989122 KVM: x86: Report XSS as to-be-saved if there are supported [...] new 338543cbe033 KVM: x86: Check XSS validity against guest CPUIDs new 9622e116d0d2 KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS new 779ed05511f2 KVM: x86: Initialize kvm_caps.supported_xss new e44eb58334bb KVM: x86: Load guest FPU state when access XSAVE-managed MSRs new 586ef9dcbb28 KVM: x86: Add fault checks for guest CR4.CET setting new 6a11c860d8a4 KVM: x86: Report KVM supported CET MSRs as to-be-saved new d6c387fc396b KVM: VMX: Introduce CET VMCS fields and control bits new 9d6812d41535 KVM: x86: Enable guest SSP read/write interface with new uAPIs new 8b59d0275c96 KVM: VMX: Emulate read and write to CET MSRs new 1a61bd0d126a KVM: x86: Save and reload SSP to/from SMRAM new 25f3840483e6 KVM: VMX: Set up interception for CET MSRs new 584ba3ffb984 KVM: VMX: Set host constant supervisor states to VMCS fields new 57c3db7e2e26 KVM: x86: Don't emulate instructions affected by CET features new 82c0ec028258 KVM: x86: Don't emulate task switches when IBT or SHSTK is [...] new d4c03f63957c KVM: x86: Emulate SSP[63:32]!=0 #GP(0) for FAR JMP to 32-bit mode new 296599346c67 KVM: x86/mmu: WARN on attempt to check permissions for Sha [...] new 843af0f2e461 KVM: x86/mmu: Pretty print PK, SS, and SGX flags in MMU tr [...] new b3744c59ebc5 KVM: x86: Allow setting CR4.CET if IBT or SHSTK is supported new 19e6e083f3f9 KVM: nVMX: Always forward XSAVES/XRSTORS exits from L2 to L1 new 69cc3e886582 KVM: x86: Add XSS support for CET_KERNEL and CET_USER new 1f6f68fcfe43 KVM: x86: Disable support for Shadow Stacks if TDP is disabled new f705de12a22c KVM: x86: Initialize allow_smaller_maxphyaddr earlier in setup new 343acdd158a5 KVM: x86: Disable support for IBT and SHSTK if allow_small [...] new e140467bbdaf KVM: x86: Enable CET virtualization for VMX and advertise [...] new f7336d47be53 KVM: VMX: Configure nested capabilities after CPU capabilities new 033cc166f029 KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event inj [...] new 625884996bff KVM: nVMX: Prepare for enabling CET support for nested guest new 8060b2bd2dd0 KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET new 62f7533a6b3a KVM: nVMX: Add consistency checks for CET states new 42ae6448531b KVM: nVMX: Advertise new VM-Entry/Exit control bits for CET state new 48b2ec0d540c KVM: SVM: Emulate reads and writes to shadow stack MSRs new c5ba49458513 KVM: nSVM: Save/load CET Shadow Stack state to/from vmcb12/vmcb02 new c7586aa3bed4 KVM: SVM: Update dump_vmcb with shadow stack save area additions new 38c46bdbf998 KVM: SVM: Pass through shadow stack MSRs as appropriate new b5fa221f7b08 KVM: SEV: Synchronize MSR_IA32_XSS from the GHCB when it's valid new 8db428fd5229 KVM: SVM: Enable shadow stack virtualization for SVM new d37cc4819a48 KVM: x86: Add human friendly formatting for #XM, and #VE new f2f5519aa4e3 KVM: x86: Define Control Protection Exception (#CP) vector new fddd07626baa KVM: x86: Define AMD's #HV, #VC, and #SX exception vectors new 9c38ddb3df94 KVM: selftests: Add an MSR test to exercise guest/host and [...] new 27c41353064f KVM: selftests: Add support for MSR_IA32_{S,U}_CET to MSRs test new a8b9cca99cf4 KVM: selftests: Extend MSRs test to validate vCPUs without [...] new 80c2b6d8e7bb KVM: selftests: Add KVM_{G,S}ET_ONE_REG coverage to MSRs test new 3469fd203bac KVM: selftests: Add coverage for KVM-defined registers in [...] new 947ab90c9198 KVM: selftests: Verify MSRs are (not) in save/restore list [...] new d292035fb5d2 KVM: VMX: Make CR4.CET a guest owned bit new 12abeb81c873 Merge tag 'kvm-x86-cet-6.18' of https://github.com/kvm-x86 [...] new 15463eece957 KVM: s390/vfio-ap: Use kvm_is_gpa_in_memslot() instead of [...] new 20c489205836 KVM: Export KVM-internal symbols for sub-modules only new d273b52b6fad KVM: x86: Move kvm_intr_is_single_vcpu() to lapic.c new 6560468305da KVM: x86: Drop pointless exports of kvm_arch_xxx() hooks new 6b36119b94d0 KVM: x86: Export KVM-internal symbols for sub-modules only new 256e3417065b Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...] new 6df164e29bd4 sunrpc: fix null pointer dereference on zero-length checksum new c926f0298d3c NFSD: Relocate the fh_want_write() and fh_drop_write() helpers new c1f203e46c55 NFSD: Move the fh_getattr() helper new d9adbb6e10bf sunrpc: delay pc_release callback until after the reply is sent new 2ee3a75e4208 nfsd: discard nfsd_file_get_local() new c97b737ef8f1 sunrpc: Change ret code of xdr_stream_decode_opaque_fixed new 832738e4b325 NFSD: Rework encoding and decoding of nfsd4_deviceid new 274365a51d88 NFSD: Minor cleanup in layoutcommit processing new 6bf1be3399e2 NFSD: Minor cleanup in layoutcommit decoding new f963cf2b91a3 NFSD: Implement large extent array support in pNFS new d68886bae76a NFSD: Fix last write offset handling in layoutcommit new 2990b5a47984 nfsd: fix assignment of ia_ctime.tv_nsec on delegated mtim [...] new 5affb498e70b nfsd: ignore ATTR_DELEG when checking ia_valid before noti [...] new afc5b36e29b9 vfs: add ATTR_CTIME_SET flag new c066ff58e5d6 nfsd: use ATTR_CTIME_SET for delegated ctime updates new 7663e963a511 nfsd: track original timestamps in nfs4_delegation new 3952f1cbcbc4 nfsd: fix SETATTR updates for delegated timestamps new b40b1ba37ad5 nfsd: fix timestamp updates in CB_GETATTR new e5e9b24ab8fa nfsd: freeze c/mtime updates with outstanding WRITE_ATTRS [...] new 6ecdfd7aa8e3 lockd: Remove space before newline new 17695d72d0b1 nfsd: Replace open-coded conversion of bytes to hex new 9ebcd022a343 nfsd: Eliminate an allocation in nfs4_make_rec_clidname() new ab1c282c010c NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() new e4f574ca9c6d nfsd: decouple the xprtsec policy check from check_nfsd_access() new a9a15ba23efc sunrpc: fix pr_notice in svc_tcp_sendto() to show correct length new 7569065fb123 sunrpc: eliminate return pointer in svc_tcp_sendmsg() new f64397e04b4d NFSD: Drop redundant conversion to bool new 898374fdd7f0 nfsd: unregister with rpcbind when deleting a transport new dd9adfa0da2b NFS: Remove rpcbind cleanup for NFSv4.0 callback new d73d06dac604 SUNRPC: Move the svc_rpcb_cleanup() call sites new fb340bfd48bc NFSD: Delay adding new entries to LRU new 8ddd06be9a9e NFSD: Reduce DRC bucket size new a082e4b4d08a nfsd: nfserr_jukebox in nlm_fopen should lead to a retry new 13289ed501ba nfsd: Don't force CRYPTO_LIB_SHA256 to be built-in new 6c15463c4511 sunrpc: fix "occurence"->"occurrence" new db155b7c7c85 NFSD: Disallow layoutget during grace period new e0963ce53b00 NFSD: Allow layoutcommit during grace period new eafdd7e949bb nfsd: delete unnecessary NULL check in __fh_verify() new d6e80d48f9c8 NFSD: Do the grace period check in ->proc_layoutget new 6304affe4564 NFSD: Add io_cache_{read,write} controls to debugfs new d8e97cc476e3 SUNRPC: Make RPCSEC_GSS_KRB5 select CRYPTO instead of depe [...] new 73cc6ec1a89a nfsd: discard nfserr_dropit new 81538c8e4280 Merge tag 'nfsd-6.18' of git://git.kernel.org/pub/scm/linu [...] new dff4f9ff5d7f btrfs: avoid potential out-of-bounds in btrfs_encode_fh() new 4335c4496b1b btrfs: fix PAGE_SIZE format specifier in open_ctree() new c746c3b51698 Merge tag 'for-6.18-tag' of git://git.kernel.org/pub/scm/l [...]
The 235 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/admin-guide/kernel-parameters.txt | 21 + Documentation/virt/kvm/api.rst | 20 +- Documentation/virt/kvm/x86/hypercalls.rst | 6 +- arch/loongarch/Kconfig | 11 + arch/loongarch/Makefile | 4 +- arch/loongarch/configs/loongson3_defconfig | 73 +- arch/loongarch/include/asm/image.h | 52 ++ arch/loongarch/include/asm/inst.h | 5 + arch/loongarch/include/asm/kexec.h | 12 + arch/loongarch/kernel/Makefile | 1 + arch/loongarch/kernel/cpu-probe.c | 46 +- arch/loongarch/kernel/inst.c | 12 + arch/loongarch/kernel/kexec_efi.c | 113 +++ arch/loongarch/kernel/kexec_elf.c | 105 +++ arch/loongarch/kernel/machine_kexec.c | 37 +- arch/loongarch/kernel/machine_kexec_file.c | 239 ++++++ arch/loongarch/kernel/relocate.c | 4 + arch/loongarch/kernel/setup.c | 1 + arch/loongarch/mm/fault.c | 58 +- arch/loongarch/net/bpf_jit.c | 86 +- arch/powerpc/include/asm/Kbuild | 1 - arch/powerpc/include/asm/kvm_types.h | 15 + arch/s390/include/asm/kvm_host.h | 2 + arch/s390/kvm/priv.c | 8 + arch/um/Kconfig | 1 + arch/um/drivers/ssl.c | 5 +- arch/um/drivers/ubd_kern.c | 2 +- arch/um/drivers/vector_kern.c | 2 +- arch/um/drivers/virtio_pcidev.c | 6 + arch/um/include/asm/mmu_context.h | 11 - arch/um/include/asm/processor-generic.h | 3 - arch/um/include/shared/as-layout.h | 5 +- arch/um/include/shared/skas/stub-data.h | 3 +- arch/um/kernel/dtb.c | 2 +- arch/um/kernel/irq.c | 5 + arch/um/kernel/time.c | 37 +- arch/um/kernel/um_arch.c | 7 +- arch/um/os-Linux/skas/process.c | 2 +- arch/x86/include/asm/cpufeatures.h | 2 + arch/x86/include/asm/kvm-x86-ops.h | 2 +- arch/x86/include/asm/kvm_host.h | 81 +- arch/x86/include/asm/kvm_types.h | 10 + arch/x86/include/asm/msr-index.h | 4 + arch/x86/include/asm/svm.h | 1 + arch/x86/include/asm/vmx.h | 9 + arch/x86/include/uapi/asm/kvm.h | 34 + arch/x86/include/uapi/asm/vmx.h | 6 +- arch/x86/kernel/cpu/scattered.c | 1 + arch/x86/kvm/cpuid.c | 58 +- arch/x86/kvm/emulate.c | 163 +++- arch/x86/kvm/hyperv.c | 16 +- arch/x86/kvm/ioapic.c | 15 +- arch/x86/kvm/irq.c | 91 +- arch/x86/kvm/irq.h | 4 - arch/x86/kvm/kvm_cache_regs.h | 3 +- arch/x86/kvm/kvm_emulate.h | 3 +- arch/x86/kvm/kvm_onhyperv.c | 6 +- arch/x86/kvm/lapic.c | 240 ++++-- arch/x86/kvm/lapic.h | 19 +- arch/x86/kvm/mmu.h | 2 +- arch/x86/kvm/mmu/mmu.c | 197 +++-- arch/x86/kvm/mmu/mmu_internal.h | 6 +- arch/x86/kvm/mmu/mmutrace.h | 3 + arch/x86/kvm/mmu/spte.c | 10 +- arch/x86/kvm/mmu/tdp_mmu.c | 51 +- arch/x86/kvm/mmu/tdp_mmu.h | 3 +- arch/x86/kvm/pmu.c | 173 +++- arch/x86/kvm/pmu.h | 60 +- arch/x86/kvm/reverse_cpuid.h | 5 + arch/x86/kvm/smm.c | 14 +- arch/x86/kvm/smm.h | 2 +- arch/x86/kvm/svm/avic.c | 151 +++- arch/x86/kvm/svm/nested.c | 38 +- arch/x86/kvm/svm/pmu.c | 8 +- arch/x86/kvm/svm/sev.c | 227 +++-- arch/x86/kvm/svm/svm.c | 236 +++-- arch/x86/kvm/svm/svm.h | 44 +- arch/x86/kvm/svm/svm_onhyperv.c | 28 +- arch/x86/kvm/svm/svm_onhyperv.h | 31 +- arch/x86/kvm/trace.h | 5 +- arch/x86/kvm/vmx/capabilities.h | 12 +- arch/x86/kvm/vmx/main.c | 14 +- arch/x86/kvm/vmx/nested.c | 215 ++++- arch/x86/kvm/vmx/nested.h | 5 + arch/x86/kvm/vmx/pmu_intel.c | 81 +- arch/x86/kvm/vmx/tdx.c | 28 +- arch/x86/kvm/vmx/vmcs12.c | 6 + arch/x86/kvm/vmx/vmcs12.h | 14 +- arch/x86/kvm/vmx/vmx.c | 229 +++-- arch/x86/kvm/vmx/vmx.h | 22 +- arch/x86/kvm/vmx/x86_ops.h | 2 +- arch/x86/kvm/x86.c | 946 +++++++++++++++------ arch/x86/kvm/x86.h | 42 +- arch/x86/um/shared/sysdep/stub_32.h | 2 +- arch/x86/um/shared/sysdep/stub_64.h | 2 +- drivers/s390/crypto/vfio_ap_ops.c | 2 +- fs/attr.c | 44 +- fs/btrfs/disk-io.c | 2 +- fs/btrfs/export.c | 8 +- fs/lockd/svclock.c | 2 +- fs/nfsd/Kconfig | 2 +- fs/nfsd/blocklayout.c | 32 +- fs/nfsd/blocklayoutxdr.c | 86 +- fs/nfsd/blocklayoutxdr.h | 4 +- fs/nfsd/debugfs.c | 95 ++- fs/nfsd/export.c | 82 +- fs/nfsd/export.h | 3 + fs/nfsd/filecache.c | 21 - fs/nfsd/filecache.h | 1 - fs/nfsd/flexfilelayout.c | 4 +- fs/nfsd/flexfilelayoutxdr.c | 3 +- fs/nfsd/localio.c | 1 - fs/nfsd/lockd.c | 15 +- fs/nfsd/nfs4layouts.c | 1 - fs/nfsd/nfs4proc.c | 125 ++- fs/nfsd/nfs4recover.c | 31 +- fs/nfsd/nfs4state.c | 86 +- fs/nfsd/nfs4xdr.c | 32 +- fs/nfsd/nfscache.c | 15 +- fs/nfsd/nfsd.h | 17 +- fs/nfsd/nfsfh.c | 55 +- fs/nfsd/nfsfh.h | 38 + fs/nfsd/pnfs.h | 5 +- fs/nfsd/state.h | 16 +- fs/nfsd/vfs.c | 23 +- fs/nfsd/vfs.h | 37 - fs/nfsd/xdr4.h | 39 +- include/linux/fs.h | 1 + include/linux/kvm_types.h | 25 +- include/linux/nfslocalio.h | 1 - include/linux/sunrpc/svc_xprt.h | 3 + include/linux/sunrpc/xdr.h | 4 +- net/sunrpc/Kconfig | 3 +- net/sunrpc/auth_gss/svcauth_gss.c | 2 +- net/sunrpc/svc.c | 17 +- net/sunrpc/svc_xprt.c | 13 + net/sunrpc/svcsock.c | 25 +- net/sunrpc/sysfs.c | 2 +- .../C/typedef/decoder/fixed_length_opaque.j2 | 2 +- tools/testing/selftests/kvm/Makefile.kvm | 1 + .../testing/selftests/kvm/include/x86/processor.h | 5 + tools/testing/selftests/kvm/x86/msrs_test.c | 489 +++++++++++ .../testing/selftests/kvm/x86/pmu_counters_test.c | 8 +- virt/kvm/eventfd.c | 2 +- virt/kvm/guest_memfd.c | 7 +- virt/kvm/kvm_main.c | 127 +-- 146 files changed, 4720 insertions(+), 1649 deletions(-) create mode 100644 arch/loongarch/include/asm/image.h create mode 100644 arch/loongarch/kernel/kexec_efi.c create mode 100644 arch/loongarch/kernel/kexec_elf.c create mode 100644 arch/loongarch/kernel/machine_kexec_file.c create mode 100644 arch/powerpc/include/asm/kvm_types.h create mode 100644 tools/testing/selftests/kvm/x86/msrs_test.c