summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSasha Levin <sashal@kernel.org>2024-03-10 12:48:31 -0400
committerSasha Levin <sashal@kernel.org>2024-03-10 12:48:31 -0400
commit8955d973d5ccade2bd303a4cc584a3214adc36d9 (patch)
tree30ef13557ae625477eb51d4dba21e5b866dabf27
parent1eab915635d366db3e057863dc3286e7254072fa (diff)
downloaddeps-8955d973d5ccade2bd303a4cc584a3214adc36d9.tar.gz
Sun Mar 10 12:48:24 PM EDT 2024
Signed-off-by: Sasha Levin <sashal@kernel.org>
-rw-r--r--v4.19/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v4.19/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v4.19/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v4.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e80711
-rw-r--r--v4.19/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v4.19/910c57dfa4d113aae6571c2a8b9ae8c4309759025
-rw-r--r--v4.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v4.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v4.19/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.10/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.10/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.10/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.10/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8072
-rw-r--r--v5.10/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.10/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.10/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.10/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.10/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.11/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.11/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.11/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.11/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.11/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.11/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.11/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.11/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.11/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.12/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.12/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.12/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.12/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.12/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.12/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.12/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.12/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.12/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.13/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.13/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.13/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.13/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.13/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.13/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.13/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.13/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.13/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.14/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.14/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.14/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.14/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.14/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.14/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.14/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.14/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.14/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.15/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.15/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.15/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.15/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.15/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.15/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.15/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.15/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.15/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.16/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.16/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.16/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.16/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.16/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.16/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.16/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.16/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.17/2dfd2383034421101300a3b7325cf339a182d2187
-rw-r--r--v5.17/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.17/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.17/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.17/63e5c5a10559077bb5f32edf783084e7164af9c36
-rw-r--r--v5.17/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.17/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.17/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.17/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.18/2dfd2383034421101300a3b7325cf339a182d2186
-rw-r--r--v5.18/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.18/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.18/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.18/63e5c5a10559077bb5f32edf783084e7164af9c35
-rw-r--r--v5.18/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.18/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.18/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.18/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.19/2dfd2383034421101300a3b7325cf339a182d2186
-rw-r--r--v5.19/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.19/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v5.19/63e5c5a10559077bb5f32edf783084e7164af9c35
-rw-r--r--v5.19/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v5.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.19/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.4/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.4/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.4/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e80711
-rw-r--r--v5.4/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.4/910c57dfa4d113aae6571c2a8b9ae8c4309759024
-rw-r--r--v5.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.4/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.7/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.7/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.7/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8075
-rw-r--r--v5.7/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.7/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.7/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.8/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.8/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.8/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.8/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8075
-rw-r--r--v5.8/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.8/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.8/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.8/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.8/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v5.9/2dfd2383034421101300a3b7325cf339a182d2189
-rw-r--r--v5.9/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v5.9/5abf6dceb066f2b02b225fd561440c98a80626816
-rw-r--r--v5.9/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8072
-rw-r--r--v5.9/63e5c5a10559077bb5f32edf783084e7164af9c38
-rw-r--r--v5.9/910c57dfa4d113aae6571c2a8b9ae8c4309759023
-rw-r--r--v5.9/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v5.9/d02c357e5bfa7dfd618b7b3015624beb71f58f1f20
-rw-r--r--v5.9/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v6.0/2dfd2383034421101300a3b7325cf339a182d2186
-rw-r--r--v6.0/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v6.0/5abf6dceb066f2b02b225fd561440c98a80626815
-rw-r--r--v6.0/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v6.0/63e5c5a10559077bb5f32edf783084e7164af9c35
-rw-r--r--v6.0/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v6.0/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v6.0/d02c357e5bfa7dfd618b7b3015624beb71f58f1f6
-rw-r--r--v6.0/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v6.1/2dfd2383034421101300a3b7325cf339a182d2186
-rw-r--r--v6.1/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v6.1/5abf6dceb066f2b02b225fd561440c98a80626815
-rw-r--r--v6.1/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v6.1/63e5c5a10559077bb5f32edf783084e7164af9c35
-rw-r--r--v6.1/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v6.1/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v6.1/d02c357e5bfa7dfd618b7b3015624beb71f58f1f2
-rw-r--r--v6.1/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v6.2/2dfd2383034421101300a3b7325cf339a182d2186
-rw-r--r--v6.2/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v6.2/5abf6dceb066f2b02b225fd561440c98a80626815
-rw-r--r--v6.2/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v6.2/63e5c5a10559077bb5f32edf783084e7164af9c35
-rw-r--r--v6.2/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v6.2/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v6.2/d02c357e5bfa7dfd618b7b3015624beb71f58f1f4
-rw-r--r--v6.2/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v6.3/2dfd2383034421101300a3b7325cf339a182d2186
-rw-r--r--v6.3/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v6.3/5abf6dceb066f2b02b225fd561440c98a80626815
-rw-r--r--v6.3/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v6.3/63e5c5a10559077bb5f32edf783084e7164af9c35
-rw-r--r--v6.3/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v6.3/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v6.3/d02c357e5bfa7dfd618b7b3015624beb71f58f1f1
-rw-r--r--v6.3/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v6.4/2dfd2383034421101300a3b7325cf339a182d2186
-rw-r--r--v6.4/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v6.4/5abf6dceb066f2b02b225fd561440c98a80626815
-rw-r--r--v6.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v6.4/63e5c5a10559077bb5f32edf783084e7164af9c35
-rw-r--r--v6.4/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v6.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v6.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f1
-rw-r--r--v6.4/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v6.5/2dfd2383034421101300a3b7325cf339a182d2186
-rw-r--r--v6.5/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v6.5/5abf6dceb066f2b02b225fd561440c98a80626815
-rw-r--r--v6.5/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v6.5/63e5c5a10559077bb5f32edf783084e7164af9c35
-rw-r--r--v6.5/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v6.5/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v6.5/d02c357e5bfa7dfd618b7b3015624beb71f58f1f1
-rw-r--r--v6.5/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v6.6/2dfd2383034421101300a3b7325cf339a182d2185
-rw-r--r--v6.6/422692098c4c53a6b65c2ef235621aee6a38721f14
-rw-r--r--v6.6/5abf6dceb066f2b02b225fd561440c98a80626811
-rw-r--r--v6.6/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v6.6/63e5c5a10559077bb5f32edf783084e7164af9c34
-rw-r--r--v6.6/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v6.6/a1176ef5c92aa58e63ecf184b7cac2e311b2b23314
-rw-r--r--v6.6/d02c357e5bfa7dfd618b7b3015624beb71f58f1f1
-rw-r--r--v6.6/e563592224e02f87048edee3ce3f0da16cceee881
-rw-r--r--v6.7/2dfd2383034421101300a3b7325cf339a182d2185
-rw-r--r--v6.7/422692098c4c53a6b65c2ef235621aee6a38721f13
-rw-r--r--v6.7/5abf6dceb066f2b02b225fd561440c98a80626811
-rw-r--r--v6.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e8071
-rw-r--r--v6.7/63e5c5a10559077bb5f32edf783084e7164af9c34
-rw-r--r--v6.7/910c57dfa4d113aae6571c2a8b9ae8c4309759021
-rw-r--r--v6.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b23313
-rw-r--r--v6.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f1
-rw-r--r--v6.7/e563592224e02f87048edee3ce3f0da16cceee881
207 files changed, 1534 insertions, 0 deletions
diff --git a/v4.19/2dfd2383034421101300a3b7325cf339a182d218 b/v4.19/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v4.19/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v4.19/422692098c4c53a6b65c2ef235621aee6a38721f b/v4.19/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v4.19/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v4.19/5abf6dceb066f2b02b225fd561440c98a8062681 b/v4.19/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v4.19/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v4.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v4.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..da7194db621
--- /dev/null
+++ b/v4.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1,11 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
+19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region")
+a8d908b5873c ("KVM: x86: report sev_pin_memory errors with PTR_ERR")
+dc42c8ae0a77 ("KVM: SVM: convert get_user_pages() --> pin_user_pages()")
+78824fabc72e ("KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()")
+996ed22c7a52 ("arch/x86/kvm/svm/sev.c: change flag passed to GUP fast in sev_pin_memory()")
+eaf78265a4ab ("KVM: SVM: Move SEV code to separate file")
+ef0f64960d01 ("KVM: SVM: Move AVIC code to separate file")
+883b0a91f41a ("KVM: SVM: Move Nested SVM Implementation to nested.c")
+46a010dd6896 ("kVM SVM: Move SVM related files to own sub-directory")
+8c1b724ddb21 ("Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm")
diff --git a/v4.19/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v4.19/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v4.19/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v4.19/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v4.19/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..de923a909a5
--- /dev/null
+++ b/v4.19/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,5 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
+9de6fe3c28d6 ("KVM: x86: Emulate split-lock access as a write in emulator")
+42e35f8072c3 ("KVM/X86: Use kvm_vcpu_map in emulator_cmpxchg_emulated")
diff --git a/v4.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v4.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v4.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v4.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v4.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v4.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v4.19/e563592224e02f87048edee3ce3f0da16cceee88 b/v4.19/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v4.19/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.10/2dfd2383034421101300a3b7325cf339a182d218 b/v5.10/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.10/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.10/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.10/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.10/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.10/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.10/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.10/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.10/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.10/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b731bc4095a
--- /dev/null
+++ b/v5.10/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1,2 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
+19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region")
diff --git a/v5.10/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.10/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.10/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.10/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.10/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.10/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.10/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.10/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.10/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.10/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.10/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.10/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.10/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.10/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.10/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.11/2dfd2383034421101300a3b7325cf339a182d218 b/v5.11/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.11/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.11/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.11/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.11/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.11/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.11/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.11/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.11/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.11/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.11/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.11/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.11/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.11/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.11/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.11/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.11/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.11/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.11/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.11/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.11/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.11/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.11/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.11/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.11/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.11/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.12/2dfd2383034421101300a3b7325cf339a182d218 b/v5.12/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.12/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.12/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.12/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.12/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.12/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.12/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.12/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.12/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.12/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.12/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.12/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.12/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.12/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.12/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.12/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.12/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.12/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.12/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.12/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.12/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.12/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.12/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.12/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.12/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.12/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.13/2dfd2383034421101300a3b7325cf339a182d218 b/v5.13/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.13/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.13/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.13/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.13/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.13/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.13/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.13/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.13/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.13/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.13/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.13/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.13/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.13/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.13/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.13/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.13/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.13/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.13/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.13/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.13/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.13/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.13/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.13/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.13/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.13/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.14/2dfd2383034421101300a3b7325cf339a182d218 b/v5.14/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.14/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.14/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.14/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.14/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.14/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.14/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.14/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.14/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.14/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.14/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.14/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.14/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.14/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.14/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.14/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.14/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.14/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.14/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.14/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.14/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.14/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.14/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.14/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.14/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.14/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.15/2dfd2383034421101300a3b7325cf339a182d218 b/v5.15/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.15/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.15/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.15/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.15/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.15/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.15/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.15/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.15/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.15/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.15/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.15/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.15/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.15/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.15/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.15/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.15/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.15/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.15/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.15/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.15/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.15/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.15/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.15/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.15/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.15/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.16/2dfd2383034421101300a3b7325cf339a182d218 b/v5.16/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.16/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.16/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.16/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.16/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.16/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.16/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.16/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.16/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.16/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.16/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.16/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.16/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.16/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.16/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.16/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.16/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.16/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.16/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.16/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.16/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.16/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.16/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.16/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.17/2dfd2383034421101300a3b7325cf339a182d218 b/v5.17/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..d7272788c5f
--- /dev/null
+++ b/v5.17/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,7 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
diff --git a/v5.17/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.17/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.17/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.17/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.17/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.17/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.17/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.17/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.17/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.17/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.17/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..124aa851997
--- /dev/null
+++ b/v5.17/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,6 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
diff --git a/v5.17/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.17/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.17/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.17/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.17/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.17/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.17/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.17/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.17/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.17/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.17/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.17/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.18/2dfd2383034421101300a3b7325cf339a182d218 b/v5.18/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..356e3b62c5b
--- /dev/null
+++ b/v5.18/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,6 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v5.18/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.18/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.18/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.18/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.18/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.18/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.18/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.18/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.18/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.18/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.18/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..53e09897f49
--- /dev/null
+++ b/v5.18/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,5 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v5.18/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.18/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.18/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.18/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.18/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.18/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.18/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.18/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.18/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.18/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.18/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.18/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.19/2dfd2383034421101300a3b7325cf339a182d218 b/v5.19/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..356e3b62c5b
--- /dev/null
+++ b/v5.19/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,6 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v5.19/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.19/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.19/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.19/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.19/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.19/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v5.19/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v5.19/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.19/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..53e09897f49
--- /dev/null
+++ b/v5.19/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,5 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v5.19/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.19/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v5.19/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v5.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.19/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.19/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.19/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.19/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.19/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.4/2dfd2383034421101300a3b7325cf339a182d218 b/v5.4/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.4/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.4/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.4/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.4/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.4/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.4/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.4/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..da7194db621
--- /dev/null
+++ b/v5.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1,11 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
+19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region")
+a8d908b5873c ("KVM: x86: report sev_pin_memory errors with PTR_ERR")
+dc42c8ae0a77 ("KVM: SVM: convert get_user_pages() --> pin_user_pages()")
+78824fabc72e ("KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()")
+996ed22c7a52 ("arch/x86/kvm/svm/sev.c: change flag passed to GUP fast in sev_pin_memory()")
+eaf78265a4ab ("KVM: SVM: Move SEV code to separate file")
+ef0f64960d01 ("KVM: SVM: Move AVIC code to separate file")
+883b0a91f41a ("KVM: SVM: Move Nested SVM Implementation to nested.c")
+46a010dd6896 ("kVM SVM: Move SVM related files to own sub-directory")
+8c1b724ddb21 ("Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm")
diff --git a/v5.4/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.4/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.4/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.4/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.4/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..679352b705b
--- /dev/null
+++ b/v5.4/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,4 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
+9de6fe3c28d6 ("KVM: x86: Emulate split-lock access as a write in emulator")
diff --git a/v5.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.4/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.4/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.4/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.7/2dfd2383034421101300a3b7325cf339a182d218 b/v5.7/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.7/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.7/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.7/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.7/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.7/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.7/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.7/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..4452b9a10cd
--- /dev/null
+++ b/v5.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1,5 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
+19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region")
+a8d908b5873c ("KVM: x86: report sev_pin_memory errors with PTR_ERR")
+dc42c8ae0a77 ("KVM: SVM: convert get_user_pages() --> pin_user_pages()")
+78824fabc72e ("KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()")
diff --git a/v5.7/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.7/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.7/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.7/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.7/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.7/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.7/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.7/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.7/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.8/2dfd2383034421101300a3b7325cf339a182d218 b/v5.8/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.8/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.8/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.8/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.8/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.8/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.8/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.8/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.8/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.8/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..4452b9a10cd
--- /dev/null
+++ b/v5.8/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1,5 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
+19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region")
+a8d908b5873c ("KVM: x86: report sev_pin_memory errors with PTR_ERR")
+dc42c8ae0a77 ("KVM: SVM: convert get_user_pages() --> pin_user_pages()")
+78824fabc72e ("KVM: SVM: fix svn_pin_memory()'s use of get_user_pages_fast()")
diff --git a/v5.8/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.8/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.8/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.8/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.8/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.8/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.8/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.8/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.8/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.8/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.8/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.8/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.8/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.8/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.8/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v5.9/2dfd2383034421101300a3b7325cf339a182d218 b/v5.9/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..cd7d08f07f6
--- /dev/null
+++ b/v5.9/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,9 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.9/422692098c4c53a6b65c2ef235621aee6a38721f b/v5.9/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v5.9/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.9/5abf6dceb066f2b02b225fd561440c98a8062681 b/v5.9/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..3426dc0b009
--- /dev/null
+++ b/v5.9/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,6 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
+63f4b210414b ("Merge remote-tracking branch 'kvm/next' into kvm-next-5.20")
diff --git a/v5.9/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v5.9/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b731bc4095a
--- /dev/null
+++ b/v5.9/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1,2 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
+19a23da53932 ("Fix unsynchronized access to sev members through svm_register_enc_region")
diff --git a/v5.9/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v5.9/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..48dd6d05479
--- /dev/null
+++ b/v5.9/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,8 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
+3d7d6043f3c3 ("KVM: selftests: Move raw KVM_SET_USER_MEMORY_REGION helper to utils")
+7d9a662ed9f0 ("kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h")
+1b0c9d00aa2c ("Merge tag 'kvm-riscv-5.17-1' of https://github.com/kvm-riscv/linux into HEAD")
diff --git a/v5.9/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v5.9/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..ef754c51999
--- /dev/null
+++ b/v5.9/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1,3 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
+5d6c7de6446e ("KVM: x86: Bail to userspace if emulation of atomic user access faults")
+1c2361f667f3 ("KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses")
diff --git a/v5.9/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v5.9/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v5.9/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v5.9/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v5.9/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..da15459281a
--- /dev/null
+++ b/v5.9/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,20 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
+20ec3ebd707c ("KVM: Rename mmu_notifier_* to mmu_invalidate_*")
+65e3b446bcce ("KVM: x86/mmu: Document the "rules" for using host_pfn_mapping_level()")
+a8ac499bb6ab ("KVM: x86/mmu: Don't require refcounted "struct page" to create huge SPTEs")
+9202aee816c8 ("KVM: x86/mmu: Rename pte_list_{destroy,remove}() to show they zap SPTEs")
+a42989e7fbb0 ("KVM: x86/mmu: Directly "destroy" PTE list when recycling rmaps")
+2ff9039a75a8 ("KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu")
+6ec6509eea39 ("KVM: x86/mmu: Pass const memslot to rmap_add()")
+5d49f08c2e08 ("KVM: x86/mmu: Shove refcounted page dependency into host_pfn_mapping_level()")
+b14b2690c50e ("KVM: Rename/refactor kvm_is_reserved_pfn() to kvm_pfn_to_refcounted_page()")
+284dc4930773 ("KVM: Take a 'struct page', not a pfn in kvm_is_zone_device_page()")
+b1624f99aa8f ("KVM: Remove kvm_vcpu_gfn_to_page() and kvm_vcpu_gpa_to_page()")
+6573a6910ce4 ("KVM: Don't WARN if kvm_pfn_to_page() encounters a "reserved" pfn")
+8e1c69149f27 ("KVM: Avoid pfn_to_page() and vice versa when releasing pages")
+a1040b0d42ac ("KVM: Don't set Accessed/Dirty bits for ZERO_PAGE")
diff --git a/v5.9/e563592224e02f87048edee3ce3f0da16cceee88 b/v5.9/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v5.9/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v6.0/2dfd2383034421101300a3b7325cf339a182d218 b/v6.0/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..356e3b62c5b
--- /dev/null
+++ b/v6.0/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,6 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.0/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.0/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v6.0/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.0/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.0/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..843ffde46e2
--- /dev/null
+++ b/v6.0/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,5 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
diff --git a/v6.0/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.0/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v6.0/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v6.0/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.0/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..53e09897f49
--- /dev/null
+++ b/v6.0/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,5 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.0/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.0/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v6.0/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v6.0/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.0/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v6.0/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.0/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.0/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..ce20555700f
--- /dev/null
+++ b/v6.0/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,6 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
+766576874b97 ("kvm: x86: Allow to respond to generic signals during slow PF")
+c8b88b332bed ("kvm: Add interruptible flag to __gfn_to_pfn_memslot()")
diff --git a/v6.0/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.0/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v6.0/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v6.1/2dfd2383034421101300a3b7325cf339a182d218 b/v6.1/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..356e3b62c5b
--- /dev/null
+++ b/v6.1/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,6 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.1/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.1/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v6.1/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.1/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.1/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..843ffde46e2
--- /dev/null
+++ b/v6.1/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,5 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
diff --git a/v6.1/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.1/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v6.1/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v6.1/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.1/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..53e09897f49
--- /dev/null
+++ b/v6.1/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,5 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.1/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.1/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v6.1/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v6.1/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.1/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v6.1/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.1/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.1/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..74884e5ed07
--- /dev/null
+++ b/v6.1/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,2 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
diff --git a/v6.1/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.1/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v6.1/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v6.2/2dfd2383034421101300a3b7325cf339a182d218 b/v6.2/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..356e3b62c5b
--- /dev/null
+++ b/v6.2/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,6 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.2/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.2/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v6.2/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.2/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.2/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..843ffde46e2
--- /dev/null
+++ b/v6.2/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,5 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
diff --git a/v6.2/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.2/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v6.2/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v6.2/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.2/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..53e09897f49
--- /dev/null
+++ b/v6.2/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,5 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.2/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.2/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v6.2/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v6.2/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.2/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v6.2/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.2/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.2/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..6e0b95211e8
--- /dev/null
+++ b/v6.2/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1,4 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
+354c908c068e ("KVM: x86/mmu: Handle no-slot faults in kvm_faultin_pfn()")
+56c3a4e4a2d5 ("KVM: x86/mmu: Handle error PFNs in kvm_faultin_pfn()")
+ba6e3fe25543 ("KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()")
diff --git a/v6.2/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.2/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v6.2/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v6.3/2dfd2383034421101300a3b7325cf339a182d218 b/v6.3/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..356e3b62c5b
--- /dev/null
+++ b/v6.3/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,6 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.3/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.3/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v6.3/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.3/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.3/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..843ffde46e2
--- /dev/null
+++ b/v6.3/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,5 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
diff --git a/v6.3/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.3/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v6.3/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v6.3/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.3/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..53e09897f49
--- /dev/null
+++ b/v6.3/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,5 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.3/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.3/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v6.3/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v6.3/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.3/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v6.3/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.3/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.3/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..c0970523a36
--- /dev/null
+++ b/v6.3/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
diff --git a/v6.3/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.3/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v6.3/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v6.4/2dfd2383034421101300a3b7325cf339a182d218 b/v6.4/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..356e3b62c5b
--- /dev/null
+++ b/v6.4/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,6 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.4/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.4/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v6.4/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.4/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.4/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..843ffde46e2
--- /dev/null
+++ b/v6.4/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,5 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
diff --git a/v6.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v6.4/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v6.4/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.4/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..53e09897f49
--- /dev/null
+++ b/v6.4/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,5 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.4/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.4/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v6.4/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v6.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v6.4/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..c0970523a36
--- /dev/null
+++ b/v6.4/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
diff --git a/v6.4/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.4/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v6.4/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v6.5/2dfd2383034421101300a3b7325cf339a182d218 b/v6.5/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..356e3b62c5b
--- /dev/null
+++ b/v6.5/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,6 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.5/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.5/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v6.5/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.5/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.5/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..843ffde46e2
--- /dev/null
+++ b/v6.5/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1,5 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
+d1f85fbe836e ("KVM: SEV: Enable data breakpoints in SEV-ES")
+c2690b5f0194 ("KVM: SVM/SEV/SEV-ES: Rework intercepts")
+29de732cc95c ("KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV")
+b265ee7bae11 ("KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header")
diff --git a/v6.5/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.5/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v6.5/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v6.5/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.5/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..53e09897f49
--- /dev/null
+++ b/v6.5/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,5 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
+5d1d46f9d56f ("KVM: selftests: Add a selftest for guest prints and formatted asserts")
diff --git a/v6.5/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.5/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v6.5/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v6.5/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.5/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v6.5/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.5/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.5/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..c0970523a36
--- /dev/null
+++ b/v6.5/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
diff --git a/v6.5/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.5/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v6.5/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v6.6/2dfd2383034421101300a3b7325cf339a182d218 b/v6.6/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..a190cd6395e
--- /dev/null
+++ b/v6.6/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,5 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
diff --git a/v6.6/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.6/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..153d5040832
--- /dev/null
+++ b/v6.6/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,14 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.6/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.6/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..27c52d3de4f
--- /dev/null
+++ b/v6.6/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
diff --git a/v6.6/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.6/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v6.6/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v6.6/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.6/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..d76f349e852
--- /dev/null
+++ b/v6.6/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,4 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
diff --git a/v6.6/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.6/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v6.6/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v6.6/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.6/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..e4c2680fd50
--- /dev/null
+++ b/v6.6/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,14 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
+45b890f7689e ("Merge tag 'kvmarm-6.7' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD")
diff --git a/v6.6/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.6/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..c0970523a36
--- /dev/null
+++ b/v6.6/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
diff --git a/v6.6/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.6/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v6.6/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")
diff --git a/v6.7/2dfd2383034421101300a3b7325cf339a182d218 b/v6.7/2dfd2383034421101300a3b7325cf339a182d218
new file mode 100644
index 00000000000..a190cd6395e
--- /dev/null
+++ b/v6.7/2dfd2383034421101300a3b7325cf339a182d218
@@ -0,0 +1,5 @@
+2dfd23830344 ("KVM: selftests: Add a testcase to verify GUEST_MEMFD and READONLY are exclusive")
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
diff --git a/v6.7/422692098c4c53a6b65c2ef235621aee6a38721f b/v6.7/422692098c4c53a6b65c2ef235621aee6a38721f
new file mode 100644
index 00000000000..f2a22b9dd66
--- /dev/null
+++ b/v6.7/422692098c4c53a6b65c2ef235621aee6a38721f
@@ -0,0 +1,13 @@
+422692098c4c ("KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
diff --git a/v6.7/5abf6dceb066f2b02b225fd561440c98a8062681 b/v6.7/5abf6dceb066f2b02b225fd561440c98a8062681
new file mode 100644
index 00000000000..27c52d3de4f
--- /dev/null
+++ b/v6.7/5abf6dceb066f2b02b225fd561440c98a8062681
@@ -0,0 +1 @@
+5abf6dceb066 ("SEV: disable SEV-ES DebugSwap by default")
diff --git a/v6.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807 b/v6.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
new file mode 100644
index 00000000000..b3a8d55ae85
--- /dev/null
+++ b/v6.7/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
@@ -0,0 +1 @@
+5ef1d8c1ddbf ("KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()")
diff --git a/v6.7/63e5c5a10559077bb5f32edf783084e7164af9c3 b/v6.7/63e5c5a10559077bb5f32edf783084e7164af9c3
new file mode 100644
index 00000000000..d76f349e852
--- /dev/null
+++ b/v6.7/63e5c5a10559077bb5f32edf783084e7164af9c3
@@ -0,0 +1,4 @@
+63e5c5a10559 ("KVM: selftests: Create GUEST_MEMFD for relevant invalid flags testcases")
+e9e60c82fe39 ("selftests/kvm: fix compilation on non-x86_64 platforms")
+5d74316466f4 ("KVM: selftests: Add a memory region subtest to validate invalid flags")
+8a89efd43423 ("KVM: selftests: Add basic selftest for guest_memfd()")
diff --git a/v6.7/910c57dfa4d113aae6571c2a8b9ae8c430975902 b/v6.7/910c57dfa4d113aae6571c2a8b9ae8c430975902
new file mode 100644
index 00000000000..7f2b26a263e
--- /dev/null
+++ b/v6.7/910c57dfa4d113aae6571c2a8b9ae8c430975902
@@ -0,0 +1 @@
+910c57dfa4d1 ("KVM: x86: Mark target gfn of emulated atomic instruction as dirty")
diff --git a/v6.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233 b/v6.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
new file mode 100644
index 00000000000..372ba1ab5cd
--- /dev/null
+++ b/v6.7/a1176ef5c92aa58e63ecf184b7cac2e311b2b233
@@ -0,0 +1,13 @@
+a1176ef5c92a ("KVM: x86/mmu: Restrict KVM_SW_PROTECTED_VM to the TDP MMU")
+89ea60c2c7b5 ("KVM: x86: Add support for "protected VMs" that can utilize private memory")
+eed52e434bc3 ("KVM: Allow arch code to track number of memslot address spaces per VM")
+2333afa17af0 ("KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro")
+a7800aa80ea4 ("KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory")
+5a475554db1e ("KVM: Introduce per-page memory attributes")
+16f95f3b95ca ("KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace")
+bb58b90b1a8f ("KVM: Introduce KVM_SET_USER_MEMORY_REGION2")
+f128cf8cfbec ("KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER")
+4a2e993faad3 ("KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU")
+1853d7502a19 ("KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER")
+8569992d64b8 ("KVM: Use gfn instead of hva for mmu_notifier_retry")
+c0db19232c1e ("KVM: Assert that mmu_invalidate_in_progress *never* goes negative")
diff --git a/v6.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f b/v6.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
new file mode 100644
index 00000000000..c0970523a36
--- /dev/null
+++ b/v6.7/d02c357e5bfa7dfd618b7b3015624beb71f58f1f
@@ -0,0 +1 @@
+d02c357e5bfa ("KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing")
diff --git a/v6.7/e563592224e02f87048edee3ce3f0da16cceee88 b/v6.7/e563592224e02f87048edee3ce3f0da16cceee88
new file mode 100644
index 00000000000..e601c38b4eb
--- /dev/null
+++ b/v6.7/e563592224e02f87048edee3ce3f0da16cceee88
@@ -0,0 +1 @@
+e563592224e0 ("KVM: Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY")