<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Kconfig</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>9e5dd49de5d82401e92098c03e0a0e978ddd515a - KVM: arm64: tracing: add ftrace dependency</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#9e5dd49de5d82401e92098c03e0a0e978ddd515a</link>
        <description>KVM: arm64: tracing: add ftrace dependencySelecting CONFIG_TRACE_REMOTE causes a build time warning when FTRACEis disabled:WARNING: unmet direct dependencies detected for TRACE_REMOTE  Depends on [n]: FTRACE [=n]  Selected by [y]:  - NVHE_EL2_TRACING [=y] &amp;&amp; VIRTUALIZATION [=y] &amp;&amp; KVM [=y] &amp;&amp; NVHE_EL2_DEBUG [=y] &amp;&amp; TRACING [=y]Add this as another dependency to ensure a clean build.Fixes: 3aed038aac8d (&quot;KVM: arm64: Add trace remote for the nVHE/pKVM hyp&quot;)Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Reviewed-by: Vincent Donnefort &lt;vdonnefort@google.com&gt;Link: https://patch.msgid.link/20260312123601.625063-3-arnd@kernel.orgSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Thu, 12 Mar 2026 13:35:44 +0100</pubDate>
        <dc:creator>Arnd Bergmann &lt;arnd@arndb.de&gt;</dc:creator>
    </item>
<item>
        <title>3aed038aac8d897016a2b6e1935f16c7640918d4 - KVM: arm64: Add trace remote for the nVHE/pKVM hyp</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#3aed038aac8d897016a2b6e1935f16c7640918d4</link>
        <description>KVM: arm64: Add trace remote for the nVHE/pKVM hypIn both protected and nVHE mode, the hypervisor is capable of writingevents into tracefs compatible ring-buffers. Create a trace remote sothe kernel can read those buffers.This currently doesn&apos;t provide any event support which will come later.Signed-off-by: Vincent Donnefort &lt;vdonnefort@google.com&gt;Link: https://patch.msgid.link/20260309162516.2623589-25-vdonnefort@google.comSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Mon, 09 Mar 2026 17:25:10 +0100</pubDate>
        <dc:creator>Vincent Donnefort &lt;vdonnefort@google.com&gt;</dc:creator>
    </item>
<item>
        <title>680a04c333fa29bf92007efe11431be005e8c4bb - KVM: arm64: Add tracing capability for the nVHE/pKVM hyp</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#680a04c333fa29bf92007efe11431be005e8c4bb</link>
        <description>KVM: arm64: Add tracing capability for the nVHE/pKVM hypThere is currently no way to inspect or log what&apos;s happening at EL2when the nVHE or pKVM hypervisor is used. With the growing set offeatures for pKVM, the need for tooling is more pressing. And tracefs,by its reliability, versatility and support for user-space is fit forpurpose.Add support to write into a tracefs compatible ring-buffer. There&apos;s noway the hypervisor could log events directly into the host tracefsring-buffers. So instead let&apos;s use our own, where the hypervisor is thewriter and the host the reader.Signed-off-by: Vincent Donnefort &lt;vdonnefort@google.com&gt;Link: https://patch.msgid.link/20260309162516.2623589-24-vdonnefort@google.comSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Mon, 09 Mar 2026 17:25:09 +0100</pubDate>
        <dc:creator>Vincent Donnefort &lt;vdonnefort@google.com&gt;</dc:creator>
    </item>
<item>
        <title>9019e82c7e46c03c37e8b108473d02b543222d9f - KVM: arm64: Add PKVM_DISABLE_STAGE2_ON_PANIC</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#9019e82c7e46c03c37e8b108473d02b543222d9f</link>
        <description>KVM: arm64: Add PKVM_DISABLE_STAGE2_ON_PANICOn NVHE_EL2_DEBUG, when using pKVM, the host stage-2 is relaxed to grantthe kernel access to the stacktrace, hypervisor bug table and text tosymbolize addresses. This is unsafe for production. In preparation foradding more debug options to NVHE_EL2_DEBUG, decouple the stage-2relaxation into a separate option.While at it, rename PROTECTED_NVHE_STACKTRACE into PKVM_STACKTRACE,following the same naming scheme as PKVM_DISABLE_STAGE2_ON_PANIC.Reviewed-by: Kalesh Singh &lt;kaleshsingh@google.com&gt;Signed-off-by: Vincent Donnefort &lt;vdonnefort@google.com&gt;Link: https://patch.msgid.link/20260309162516.2623589-20-vdonnefort@google.comSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Mon, 09 Mar 2026 17:25:05 +0100</pubDate>
        <dc:creator>Vincent Donnefort &lt;vdonnefort@google.com&gt;</dc:creator>
    </item>
<item>
        <title>407fd8b8d8cce03856aa67329715de48b254b529 - KVM: remove CONFIG_KVM_GENERIC_MMU_NOTIFIER</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#407fd8b8d8cce03856aa67329715de48b254b529</link>
        <description>KVM: remove CONFIG_KVM_GENERIC_MMU_NOTIFIERAll architectures now use MMU notifier for KVM page table management.Remove the Kconfig symbol and the code that is used when it isdisabled.Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Wed, 11 Feb 2026 19:03:03 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>221533629550e920580ab428f13ffebf54063b95 - Merge tag &apos;hyperv-next-signed-20251006&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/hyperv/linux</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#221533629550e920580ab428f13ffebf54063b95</link>
        <description>Merge tag &apos;hyperv-next-signed-20251006&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/hyperv/linuxPull hyperv updates from Wei Liu: - Unify guest entry code for KVM and MSHV (Sean Christopherson) - Switch Hyper-V MSI domain to use msi_create_parent_irq_domain()   (Nam Cao) - Add CONFIG_HYPERV_VMBUS and limit the semantics of CONFIG_HYPERV   (Mukesh Rathor) - Add kexec/kdump support on Azure CVMs (Vitaly Kuznetsov) - Deprecate hyperv_fb in favor of Hyper-V DRM driver (Prasanna   Kumar T S M) - Miscellaneous enhancements, fixes and cleanups (Abhishek Tiwari,   Alok Tiwari, Nuno Das Neves, Wei Liu, Roman Kisel, Michael Kelley)* tag &apos;hyperv-next-signed-20251006&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/hyperv/linux:  hyperv: Remove the spurious null directive line  MAINTAINERS: Mark hyperv_fb driver Obsolete  fbdev/hyperv_fb: deprecate this in favor of Hyper-V DRM driver  Drivers: hv: Make CONFIG_HYPERV bool  Drivers: hv: Add CONFIG_HYPERV_VMBUS option  Drivers: hv: vmbus: Fix typos in vmbus_drv.c  Drivers: hv: vmbus: Fix sysfs output format for ring buffer index  Drivers: hv: vmbus: Clean up sscanf format specifier in target_cpu_store()  x86/hyperv: Switch to msi_create_parent_irq_domain()  mshv: Use common &quot;entry virt&quot; APIs to do work in root before running guest  entry: Rename &quot;kvm&quot; entry code assets to &quot;virt&quot; to genericize APIs  entry/kvm: KVM: Move KVM details related to signal/-EINTR into KVM proper  mshv: Handle NEED_RESCHED_LAZY before transferring to guest  x86/hyperv: Add kexec/kdump support on Azure CVMs  Drivers: hv: Simplify data structures for VMBus channel close message  Drivers: hv: util: Cosmetic changes for hv_utils_transport.c  mshv: Add support for a new parent partition configuration  clocksource: hyper-v: Skip unnecessary checks for the root partition  hyperv: Add missing field to hv_output_map_device_interrupt

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Tue, 07 Oct 2025 17:40:15 +0200</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>9be7e1e320ff2e7db4b23c8ec5f599bbfac94ede - entry: Rename &quot;kvm&quot; entry code assets to &quot;virt&quot; to genericize APIs</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#9be7e1e320ff2e7db4b23c8ec5f599bbfac94ede</link>
        <description>entry: Rename &quot;kvm&quot; entry code assets to &quot;virt&quot; to genericize APIsRename the &quot;kvm&quot; entry code files and Kconfigs to use generic &quot;virt&quot;nomenclature so that the code can be reused by other hypervisors (orrather, their root/dom0 partition drivers), without incorrectly suggestingthe code somehow relies on and/or involves KVM.No functional change intended.Signed-off-by: Sean Christopherson &lt;seanjc@google.com&gt;Reviewed-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Reviewed-by: Joel Fernandes &lt;joelagnelf@nvidia.com&gt;Signed-off-by: Wei Liu &lt;wei.liu@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Thu, 28 Aug 2025 02:01:54 +0200</pubDate>
        <dc:creator>Sean Christopherson &lt;seanjc@google.com&gt;</dc:creator>
    </item>
<item>
        <title>32e200bd6e4407c31aef0392be041274bfa3f20e - KVM: arm64: Enable support for guest_memfd backed memory</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#32e200bd6e4407c31aef0392be041274bfa3f20e</link>
        <description>KVM: arm64: Enable support for guest_memfd backed memoryNow that the infrastructure is in place, enable guest_memfd for arm64.* Select CONFIG_KVM_GUEST_MEMFD in KVM/arm64 Kconfig.* Enforce KVM_MEMSLOT_GMEM_ONLY for guest_memfd on arm64: Ensure that  guest_memfd-backed memory slots on arm64 are only supported if they  are intended for shared memory use cases (i.e.,  kvm_memslot_is_gmem_only() is true). This design reflects the current  arm64 KVM ecosystem where guest_memfd is primarily being introduced  for VMs that support shared memory.Reviewed-by: James Houghton &lt;jthoughton@google.com&gt;Reviewed-by: Gavin Shan &lt;gshan@redhat.com&gt;Reviewed-by: Marc Zyngier &lt;maz@kernel.org&gt;Acked-by: David Hildenbrand &lt;david@redhat.com&gt;Signed-off-by: Fuad Tabba &lt;tabba@google.com&gt;Signed-off-by: Sean Christopherson &lt;seanjc@google.com&gt;Message-ID: &lt;20250729225455.670324-21-seanjc@google.com&gt;Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Wed, 30 Jul 2025 00:54:51 +0200</pubDate>
        <dc:creator>Fuad Tabba &lt;tabba@google.com&gt;</dc:creator>
    </item>
<item>
        <title>2555d4c6872085584bda55d1c2bc048cae5fb0b3 - arm64: drop binutils version checks</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#2555d4c6872085584bda55d1c2bc048cae5fb0b3</link>
        <description>arm64: drop binutils version checksNow that gcc-8 and binutils-2.30 are the minimum versions, a lot ofthe individual feature checks can go away for simplification.Acked-by: Mark Rutland &lt;mark.rutland@arm.com&gt;Signed-off-by: Arnd Bergmann &lt;arnd@arndb.de&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Fri, 28 Mar 2025 22:17:40 +0100</pubDate>
        <dc:creator>Arnd Bergmann &lt;arnd@arndb.de&gt;</dc:creator>
    </item>
<item>
        <title>f9aad622006bd64c28fdf73c03a1c5139fcbf049 - mm: rename GENERIC_PTDUMP and PTDUMP_CORE</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#f9aad622006bd64c28fdf73c03a1c5139fcbf049</link>
        <description>mm: rename GENERIC_PTDUMP and PTDUMP_COREPlatforms subscribe into generic ptdump implementation via GENERIC_PTDUMP.But generic ptdump gets enabled via PTDUMP_CORE.  These configscombination is confusing as they sound very similar and does notdifferentiate between platform&apos;s feature subscription and featureenablement for ptdump.  Rename the configs as ARCH_HAS_PTDUMP and PTDUMPmaking it more clear and improve readability.Link: https://lkml.kernel.org/r/20250226122404.1927473-6-anshuman.khandual@arm.comSigned-off-by: Anshuman Khandual &lt;anshuman.khandual@arm.com&gt;Reviewed-by: Christophe Leroy &lt;christophe.leroy@csgroup.eu&gt; (powerpc)Acked-by: Catalin Marinas &lt;catalin.marinas@arm.com&gt;	[arm64]Cc: Will Deacon &lt;will@kernel.org&gt;Cc: Jonathan Corbet &lt;corbet@lwn.net&gt;Cc: Marc Zyngier &lt;maz@kernel.org&gt;Cc: Michael Ellerman &lt;mpe@ellerman.id.au&gt;Cc: Nicholas Piggin &lt;npiggin@gmail.com&gt;Cc: Paul Walmsley &lt;paul.walmsley@sifive.com&gt;Cc: Palmer Dabbelt &lt;palmer@dabbelt.com&gt;Cc: Heiko Carstens &lt;hca@linux.ibm.com&gt;Cc: Vasily Gorbik &lt;gor@linux.ibm.com&gt;Cc: Thomas Gleixner &lt;tglx@linutronix.de&gt;Cc: Ingo Molnar &lt;mingo@redhat.com&gt;Cc: Christophe Leroy &lt;christophe.leroy@csgroup.eu&gt;Cc: Madhavan Srinivasan &lt;maddy@linux.ibm.com&gt;Cc: Mark Rutland &lt;mark.rutland@arm.com&gt;Cc: Steven Price &lt;steven.price@arm.com&gt;Signed-off-by: Andrew Morton &lt;akpm@linux-foundation.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Wed, 26 Feb 2025 13:24:04 +0100</pubDate>
        <dc:creator>Anshuman Khandual &lt;anshuman.khandual@arm.com&gt;</dc:creator>
    </item>
<item>
        <title>f625469051266311e19245ef427f23a6a3c3f4aa - Merge branch kvm-arm64/s2-ptdump into kvmarm-master/next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#f625469051266311e19245ef427f23a6a3c3f4aa</link>
        <description>Merge branch kvm-arm64/s2-ptdump into kvmarm-master/next* kvm-arm64/s2-ptdump:  : .  : Stage-2 page table dumper, reusing the main ptdump infrastructure,  : courtesy of Sebastian Ene. From the cover letter:  :  : &quot;This series extends the ptdump support to allow dumping the guest  : stage-2 pagetables. When CONFIG_PTDUMP_STAGE2_DEBUGFS is enabled, ptdump  : registers the new following files under debugfs:  : - /sys/debug/kvm/&lt;guest_id&gt;/stage2_page_tables  : - /sys/debug/kvm/&lt;guest_id&gt;/stage2_levels  : - /sys/debug/kvm/&lt;guest_id&gt;/ipa_range  :  : This allows userspace tools (eg. cat) to dump the stage-2 pagetables by  : reading the &apos;stage2_page_tables&apos; file.  : [...]&quot;  : .  KVM: arm64: Register ptdump with debugfs on guest creation  arm64: ptdump: Don&apos;t override the level when operating on the stage-2 tables  arm64: ptdump: Use the ptdump description from a local context  arm64: ptdump: Expose the attribute parsing functionality  KVM: arm64: Move pagetable definitions to common headerSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Thu, 12 Sep 2024 09:38:02 +0200</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>7c4f73548ed15476daf1101f66648085eda65067 - KVM: arm64: Register ptdump with debugfs on guest creation</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#7c4f73548ed15476daf1101f66648085eda65067</link>
        <description>KVM: arm64: Register ptdump with debugfs on guest creationWhile arch/*/mem/ptdump handles the kernel pagetable dumping code,introduce KVM/ptdump to show the guest stage-2 pagetables. Theseparation is necessary because most of the definitions from thestage-2 pagetable reside in the KVM path and we will be invokingfunctionality specific to KVM. Introduce the PTDUMP_STAGE2_DEBUGFS config.When a guest is created, register a new file entry under the guestdebugfs dir which allows userspace to show the contents of the gueststage-2 pagetables when accessed.[maz: moved function prototypes from kvm_host.h to kvm_mmu.h]Signed-off-by: Sebastian Ene &lt;sebastianene@google.com&gt;Reviewed-by: Vincent Donnefort &lt;vdonnefort@google.com&gt;Link: https://lore.kernel.org/r/20240909124721.1672199-6-sebastianene@google.comSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Mon, 09 Sep 2024 14:47:21 +0200</pubDate>
        <dc:creator>Sebastian Ene &lt;sebastianene@google.com&gt;</dc:creator>
    </item>
<item>
        <title>10f2ad032defe906240d0c3b62dcbceace96b230 - KVM: arm64: Enforce dependency on an ARMv8.4-aware toolchain</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#10f2ad032defe906240d0c3b62dcbceace96b230</link>
        <description>KVM: arm64: Enforce dependency on an ARMv8.4-aware toolchainWith the NV support of TLBI-range operations, KVM makes use ofinstructions that are only supported by binutils versions &gt;= 2.30.This breaks the build for very old toolchains.Make KVM support conditional on having ARMv8.4 support in theassembler, side-stepping the issue.Fixes: 5d476ca57d7d (&quot;KVM: arm64: nv: Add handling of range-based TLBI operations&quot;)Reported-by: Viresh Kumar &lt;viresh.kumar@linaro.org&gt;Suggested-by: Arnd Bergmann &lt;arnd@linaro.org&gt;Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Acked-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Link: https://lore.kernel.org/r/20240807115144.3237260-1-maz@kernel.orgSigned-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Wed, 07 Aug 2024 13:51:44 +0200</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>82affc97affbdfe83c807ad17147a1220031fd90 - Revert &quot;KVM: arm64: Snapshot all non-zero RES0/RES1 sysreg fields for later checking&quot;</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#82affc97affbdfe83c807ad17147a1220031fd90</link>
        <description>Revert &quot;KVM: arm64: Snapshot all non-zero RES0/RES1 sysreg fields for later checking&quot;This reverts commits 99101dda29e3186b1356b0dc4dbb835c02c71ac9 andb80b701d5a67d07f4df4a21e09cb31f6bc1feeca.Linus reports that the sysreg reserved bit checks in KVM have led tobuild failures, arising from commit fdd867fe9b32 (&quot;arm64/sysreg: Addregister fields for ID_AA64DFR1_EL1&quot;) giving meaning to fields that werepreviously RES0.Of course, this is a genuine issue, since KVM&apos;s sysreg emulation dependsheavily on the definition of reserved fields. But at this point thebuild breakage is far more offensive, and the right course of action isto revert and retry later.All of these build-time assertions were on by default beforecommit 99101dda29e3 (&quot;KVM: arm64: Make build-time check of RES0/RES1bits optional&quot;), so deliberately revert it all atomically to avoidintroducing further breakage of bisection.Link: https://lore.kernel.org/all/CAHk-=whCvkhc8BbFOUf1ddOsgSGgEjwoKv77=HEY1UiVCydGqw@mail.gmail.com/Acked-by: Marc Zyngier &lt;maz@kernel.org&gt;Signed-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;Signed-off-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Sat, 16 Mar 2024 01:24:57 +0100</pubDate>
        <dc:creator>Oliver Upton &lt;oliver.upton@linux.dev&gt;</dc:creator>
    </item>
<item>
        <title>961e2bfcf3784dbf76f3539211c699c11d7ba8c2 - Merge tag &apos;kvmarm-6.9&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#961e2bfcf3784dbf76f3539211c699c11d7ba8c2</link>
        <description>Merge tag &apos;kvmarm-6.9&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEADKVM/arm64 updates for 6.9 - Infrastructure for building KVM&apos;s trap configuration based on the   architectural features (or lack thereof) advertised in the VM&apos;s ID   registers - Support for mapping vfio-pci BARs as Normal-NC (vaguely similar to   x86&apos;s WC) at stage-2, improving the performance of interacting with   assigned devices that can tolerate it - Conversion of KVM&apos;s representation of LPIs to an xarray, utilized to   address serialization some of the serialization on the LPI injection   path - Support for _architectural_ VHE-only systems, advertised through the   absence of FEAT_E2H0 in the CPU&apos;s ID register - Miscellaneous cleanups, fixes, and spelling corrections to KVM and   selftests

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Mon, 11 Mar 2024 15:02:32 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>7d8942d8e73843de35b3737b8be50f8fef6796bb - Merge tag &apos;kvm-x86-guest_memfd_fixes-6.8&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#7d8942d8e73843de35b3737b8be50f8fef6796bb</link>
        <description>Merge tag &apos;kvm-x86-guest_memfd_fixes-6.8&apos; of https://github.com/kvm-x86/linux into HEADKVM GUEST_MEMFD fixes for 6.8: - Make KVM_MEM_GUEST_MEMFD mutually exclusive with KVM_MEM_READONLY to   avoid creating ABI that KVM can&apos;t sanely support. - Update documentation for KVM_SW_PROTECTED_VM to make it abundantly   clear that such VMs are purely a development and testing vehicle, and   come with zero guarantees. - Limit KVM_SW_PROTECTED_VM guests to the TDP MMU, as the long term plan   is to support confidential VMs with deterministic private memory (SNP   and TDX) only in the TDP MMU. - Fix a bug in a GUEST_MEMFD negative test that resulted in false passes   when verifying that KVM_MEM_GUEST_MEMFD memslots can&apos;t be dirty logged.

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Sat, 09 Mar 2024 17:48:35 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>99101dda29e3186b1356b0dc4dbb835c02c71ac9 - KVM: arm64: Make build-time check of RES0/RES1 bits optional</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#99101dda29e3186b1356b0dc4dbb835c02c71ac9</link>
        <description>KVM: arm64: Make build-time check of RES0/RES1 bits optionalIn order to ease the transition towards a state of absoluteparanoia where all RES0/RES1 bits gets checked against whatKVM know of them, make the checks optional and guarded by aconfig symbol (CONFIG_KVM_ARM64_RES_BITS_PARANOIA) default to n.Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Link: https://lore.kernel.org/kvm/87frxka7ud.wl-maz@kernel.org/Signed-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Thu, 22 Feb 2024 15:12:09 +0100</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>52571d058b0775d57c9d1bc62d8a19b2da51ef39 - KVM: arm64: Drop the requirement for XARRAY_MULTI</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#52571d058b0775d57c9d1bc62d8a19b2da51ef39</link>
        <description>KVM: arm64: Drop the requirement for XARRAY_MULTINow that we don&apos;t use xa_store_range() anymore, drop the addedcomplexity of XARRAY_MULTI for KVM. It is likely still pulledin by other bits of the kernel though.Reviewed-by: Joey Gouly &lt;joey.gouly@arm.com&gt;Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Link: https://lore.kernel.org/r/20240214131827.2856277-12-maz@kernel.orgSigned-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Wed, 14 Feb 2024 14:18:12 +0100</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>687d8f4c3dea0758afd748968d91288220bbe7e3 - Merge branch &apos;kvm-kconfig&apos;</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#687d8f4c3dea0758afd748968d91288220bbe7e3</link>
        <description>Merge branch &apos;kvm-kconfig&apos;Cleanups to Kconfig definitions for KVM* replace HAVE_KVM with an architecture-dependent symbol, when CONFIG_KVM  may or may not be available depending on CPU capabilities (MIPS)* replace HAVE_KVM with IS_ENABLED(CONFIG_KVM) for host-side code that is  not part of the KVM module, so that it is completely compiled out* factor common &quot;select&quot; statements in common code instead of requiring  each architecture to specify it

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Thu, 08 Feb 2024 14:47:06 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>f48212ee8e78f765917dc64a7ff4bd13c7e71384 - treewide: remove CONFIG_HAVE_KVM</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Kconfig#f48212ee8e78f765917dc64a7ff4bd13c7e71384</link>
        <description>treewide: remove CONFIG_HAVE_KVMIt has no users anymore.Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;

            List of files:
            /linux/arch/arm64/kvm/Kconfig</description>
        <pubDate>Thu, 04 Jan 2024 17:34:25 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
</channel>
</rss>
