This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 32f88d65f01b Merge tag 'linux_kselftest-fixes-6.10-rc3' of git://git.ke [...] new a0fc1a053b7a of: of_test: add MODULE_DESCRIPTION() new 84081a885394 dt-bindings: arm: sunxi: Fix incorrect '-' usage new 321e4fa68ce1 dt-bindings: arm: stm32: st,mlahb: Drop spurious "reg" pro [...] new 935df1bd40d4 of/irq: Factor out parsing of interrupt-map parent phandle [...] new e7985f43609c of: property: Fix fw_devlink handling of interrupt-map new 51214520ad62 Merge tag 'devicetree-fixes-for-6.10-1' of git://git.kerne [...] new 803482f472cc KVM: x86/mmu: Use SHADOW_NONPRESENT_VALUE for atomic zap i [...] new 40e8a6901a2c KVM: VMX: Don't kill the VM on an unexpected #VE new d1b32ecdc8ad KVM: nVMX: Initialize #VE info page for vmcs02 when provin [...] new 9031b42139b9 KVM: nVMX: Always handle #VEs in L0 (never forward #VEs fr [...] new 837d557aba6b KVM: x86/mmu: Add sanity checks that KVM doesn't create EP [...] new 743f17733664 KVM: VMX: Dump VMCS on unexpected #VE new bca99c035652 KVM: x86/mmu: Print SPTEs on unexpected #VE new a5dc0c9b5575 KVM: VMX: Enumerate EPT Violation #VE support in /proc/cpuinfo new 6af6142e3a62 KVM: x86: Disable KVM_INTEL_PROVE_VE by default new 76d5363c20ee KVM: x86: Force KVM_WERROR if the global WERROR is enabled new b4bd55646747 KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked new 27bd5fdc24c0 KVM: SEV-ES: Prevent MSR access post VMSA encryption new d92205621561 KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV [...] new b7e4be0a224f KVM: SEV-ES: Delegate LBR virtualization to the processor new 89a58812c47f KVM: x86: Drop support for hand tuning APIC timer advancem [...] new b3233c737ec5 Merge branch 'kvm-fixes-6.10-1' into HEAD new 2d707b4e37f9 RISC-V: KVM: No need to use mask when hart-index-bit is 0 new c66f3b40b17d RISC-V: KVM: Fix incorrect reg_subtype labels in kvm_riscv [...] new b50788f7cd31 Merge tag 'kvm-riscv-fixes-6.10-1' of https://github.com/k [...] new 947051e361d5 KVM: arm64: Fix AArch32 register narrowing on userspace write new dfe6d190f38f KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode new c92e8b9eaceb KVM: arm64: AArch32: Fix spurious trapping of conditional [...] new 41011e2de348 KVM: arm64: nv: Fix relative priorities of exceptions gene [...] new 47eb2d68d102 KVM: arm64: nv: Expose BTI and CSV_frac to a guest hypervisor new 87bb39ed40bd KVM: arm64: Reintroduce __sve_save_state new 45f4ea9bcfe9 KVM: arm64: Fix prototype for __sve_save_state/__sve_resto [...] new 6d8fb3cbf7e0 KVM: arm64: Abstract set/clear of CPTR_EL2 bits behind helper new e511e08a9f49 KVM: arm64: Specialize handling of host fpsimd state on trap new 66d5b53e20a6 KVM: arm64: Allocate memory mapped at hyp for host sve sta [...] new b5b9955617bc KVM: arm64: Eagerly restore host fpsimd/sve state in pKVM new 1696fc2174db KVM: arm64: Consolidate initializing the host data's fpsim [...] new a69283ae1db8 KVM: arm64: Refactor CPACR trap bit setting/clearing to us [...] new afb91f5f8ad7 KVM: arm64: Ensure that SME controls are disabled in prote [...] new 45ce0314bf25 Merge tag 'kvmarm-fixes-6.10-1' of git://git.kernel.org/pu [...] new db574f2f96d0 KVM: x86/mmu: Don't save mmu_invalidate_seq after checking [...] new 71d7b52cc33b Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt [...]
The 42 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: .../devicetree/bindings/arm/stm32/st,mlahb.yaml | 3 +- Documentation/devicetree/bindings/arm/sunxi.yaml | 6 +- arch/arm64/include/asm/el2_setup.h | 6 +- arch/arm64/include/asm/kvm_arm.h | 6 + arch/arm64/include/asm/kvm_emulate.h | 71 +++++++++++- arch/arm64/include/asm/kvm_host.h | 25 ++++- arch/arm64/include/asm/kvm_hyp.h | 4 +- arch/arm64/include/asm/kvm_pkvm.h | 9 ++ arch/arm64/kvm/arm.c | 76 +++++++++++++ arch/arm64/kvm/emulate-nested.c | 21 ++-- arch/arm64/kvm/fpsimd.c | 11 +- arch/arm64/kvm/guest.c | 3 +- arch/arm64/kvm/hyp/aarch32.c | 18 ++- arch/arm64/kvm/hyp/fpsimd.S | 6 + arch/arm64/kvm/hyp/include/hyp/switch.h | 36 +++--- arch/arm64/kvm/hyp/include/nvhe/pkvm.h | 1 - arch/arm64/kvm/hyp/nvhe/hyp-main.c | 84 ++++++++++++-- arch/arm64/kvm/hyp/nvhe/pkvm.c | 17 +-- arch/arm64/kvm/hyp/nvhe/setup.c | 25 ++++- arch/arm64/kvm/hyp/nvhe/switch.c | 24 +++- arch/arm64/kvm/hyp/vhe/switch.c | 12 +- arch/arm64/kvm/nested.c | 6 +- arch/arm64/kvm/reset.c | 3 + arch/riscv/kvm/aia_device.c | 7 +- arch/riscv/kvm/vcpu_onereg.c | 4 +- arch/x86/include/asm/kvm_host.h | 1 + arch/x86/include/asm/vmxfeatures.h | 2 +- arch/x86/kvm/Kconfig | 11 +- arch/x86/kvm/lapic.c | 39 ++++--- arch/x86/kvm/lapic.h | 2 +- arch/x86/kvm/mmu/mmu.c | 46 ++++++-- arch/x86/kvm/mmu/spte.h | 9 ++ arch/x86/kvm/mmu/tdp_iter.h | 2 + arch/x86/kvm/mmu/tdp_mmu.c | 2 +- arch/x86/kvm/svm/sev.c | 19 +++- arch/x86/kvm/svm/svm.c | 69 +++++++++--- arch/x86/kvm/svm/svm.h | 4 +- arch/x86/kvm/vmx/nested.c | 5 + arch/x86/kvm/vmx/vmx.c | 11 +- arch/x86/kvm/x86.c | 11 +- drivers/of/irq.c | 125 ++++++++++++--------- drivers/of/of_private.h | 3 + drivers/of/of_test.c | 1 + drivers/of/property.c | 30 ++--- 44 files changed, 650 insertions(+), 226 deletions(-)