Commit e1914add2799 for kernel

commit e1914add2799225a87502051415fc5c32aeb02ae
Merge: 1f63dd8ca0dc 2d5d3fc593c9
Author: Linus Torvalds <torvalds@linux-foundation.org>
Date:   Wed May 13 11:53:51 2026 -0700

    Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm

    Pull kvm fixes from Paolo Bonzini:
     "arm64:

       - Add the pKVM side of the workaround for ARM's erratum 4193714,
         provided that the EL3 firmware does its part of the job. KVM will
         refuse to initialise otherwise

       - Correctly handle 52bit VAs for guest EL2 stage-1 translations when
         running under NV with E2H==0

       - Correctly deal with permission faults in guest_memfd memslots

       - Fix the steal-time selftest after the infrastructure was reworked

       - Make sure the host cannot pass a non-sensical clock update to the
         EL2 tracing infrastructure

       - Appoint Steffen Eiden as a reviewer in anticipation of the KVM/s390
         ability to run arm64 guests, which will inevitably lead to arm64
         code being directly used on s390

       - Make sure that EL2 is configured with both exception entry and exit
         being Context Synchronization Events

       - Handle the current vcpu being NULL on EL2 panic

       - Fix the selftest_vcpu memcache being empty at the point of donation
         or sharing

       - Check that the memcache has enough capacity before engaging on the
         share/donate path

       - Fix __deactivate_fgt() to use its parameter rather than a variable
         in the macro context

      s390:

       - Fix array overrun with large amounts of PCI devices

      x86:

       - Never use L0's PAUSE loop exiting while L2 is running, since it's
         unlikely that a nested guest will help solving the hypervisor's
         spinlock contention

       - Fix emulation of MOVNTDQA

       - Fix typo in Xen hypercall tracepoint

       - Add back an optimization that was left behind when recently fixing
         a bug

       - Add module parameter to disable CET, whose implementation seems to
         have issues. For now it remains enabled by default

      Generic:

       - Reject offset causing an unsigned overflow in kvm_reset_dirty_gfn()

      Documentation:

       - Update stale links

      Selftests:

       - Fix guest_memfd_test with host page size > guest page size"

    * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (22 commits)
      KVM: VMX: introduce module parameter to disable CET
      KVM: x86: Swap the dst and src operand for MOVNTDQA
      KVM: x86: use again the flush argument of __link_shadow_page()
      KVM: selftests: Ensure gmem file sizes are multiple of host page size
      Documentation: kvm: update links in the references section of AMD Memory Encryption
      KVM: nSVM: Never use L0's PAUSE loop exiting while L2 is running
      KVM: x86: Fix Xen hypercall tracepoint argument assignment
      KVM: Reject wrapped offset in kvm_reset_dirty_gfn()
      KVM: arm64: Pre-check vcpu memcache for host->guest donate
      KVM: arm64: Pre-check vcpu memcache for host->guest share
      KVM: arm64: Seed pkvm_ownership_selftest vcpu memcache
      KVM: arm64: Fix __deactivate_fgt macro parameter typo
      KVM: arm64: Guard against NULL vcpu on VHE hyp panic path
      KVM: arm64: Make EL2 exception entry and exit context-synchronization events
      MAINTAINERS: Add Steffen as reviewer for KVM/arm64
      KVM: arm64: Remove potential UB on nvhe tracing clock update
      KVM: selftests: arm64: Fix steal_time test after UAPI refactoring
      KVM: arm64: Handle permission faults with guest_memfd
      KVM: arm64: nv: Consider the DS bit when translating TCR_EL2
      KVM: arm64: Work around C1-Pro erratum 4193714 for protected guests
      ...