Please pull a random smattering of fixes for 6.16. Note, the SEV-ES intra-host migration commits received your "Queued, thanks", but they never showed up in kvm.git. Oh, and there's one more fix that is probably a candidate for 6.16, but I'm waiting for a response from the submitter, as I think we can go with a more targeted fix: https://lore.kernel.org/all/aFwLpyDYOsHUtCn-@xxxxxxxxxx The following changes since commit 28224ef02b56fceee2c161fe2a49a0bb197e44f5: KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (2025-06-20 14:20:20 -0400) are available in the Git repository at: https://github.com/kvm-x86/linux.git tags/kvm-x86-fixes-6.16-rcN for you to fetch changes up to fa787ac07b3ceb56dd88a62d1866038498e96230: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (2025-06-25 09:15:24 -0700) ---------------------------------------------------------------- KVM x86 fixes for 6.16-rcN - Reject SEV{-ES} intra-host migration if one or more vCPUs are actively being created so as not to create a non-SEV{-ES} vCPU in an SEV{-ES} VM. - Use a pre-allocated, per-vCPU buffer for handling de-sparsified vCPU masks when emulating Hyper-V hypercalls to fix a "stack frame too large" issue. - Allow out-of-range/invalid Xen event channel ports when configuring IRQ routing to avoid dictating a specific ioctl() ordering to userspace. - Conditionally reschedule when setting memory attributes to avoid soft lockups when userspace converts huge swaths of memory to/from private. - Add back MWAIT as a required feature for the MONITOR/MWAIT selftest. - Add a missing field in struct sev_data_snp_launch_start that resulted in the guest-visible workarounds field being filled at the wrong offset. - Skip non-canonical address when processing Hyper-V PV TLB flushes to avoid VM-Fail on INVVPID. ---------------------------------------------------------------- Binbin Wu (1): Documentation: KVM: Fix unexpected unindent warnings Chenyi Qiang (1): KVM: selftests: Add back the missing check of MONITOR/MWAIT availability David Woodhouse (1): KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table. Liam Merwick (1): KVM: Allow CPU to reschedule while setting per-page memory attributes Manuel Andreas (1): KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush Nikunj A Dadhania (1): KVM: SVM: Add missing member in SNP_LAUNCH_START command structure Sean Christopherson (3): KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight KVM: SVM: Initialize vmsa_pa in VMCB to INVALID_PAGE if VMSA page is NULL KVM: x86/hyper-v: Use preallocated per-vCPU buffer for de-sparsified vCPU masks Documentation/virt/kvm/api.rst | 28 +++++++++++----------- arch/x86/include/asm/kvm_host.h | 7 +++++- arch/x86/kvm/hyperv.c | 5 +++- arch/x86/kvm/svm/sev.c | 12 ++++++++-- arch/x86/kvm/xen.c | 15 ++++++++++-- include/linux/psp-sev.h | 2 ++ .../testing/selftests/kvm/x86/monitor_mwait_test.c | 1 + virt/kvm/kvm_main.c | 3 +++ 8 files changed, 53 insertions(+), 20 deletions(-)