<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>3aed038aac8d897016a2b6e1935f16c7640918d4 - KVM: arm64: Add trace remote for the nVHE/pKVM hyp</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#3aed038aac8d897016a2b6e1935f16c7640918d4</link>
        <description>KVM: arm64: Add trace remote for the nVHE/pKVM hypIn both protected and nVHE mode, the hypervisor is capable of writingevents into tracefs compatible ring-buffers. Create a trace remote sothe kernel can read those buffers.This currently doesn&apos;t provide any event support which will come later.Signed-off-by: Vincent Donnefort &lt;vdonnefort@google.com&gt;Link: https://patch.msgid.link/20260309162516.2623589-25-vdonnefort@google.comSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Mon, 09 Mar 2026 17:25:10 +0100</pubDate>
        <dc:creator>Vincent Donnefort &lt;vdonnefort@google.com&gt;</dc:creator>
    </item>
<item>
        <title>ff2aa6495d4beafa84cfdd8c61fc00785fee3d9a - KVM: arm64: gic-v5: Probe for GICv5</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#ff2aa6495d4beafa84cfdd8c61fc00785fee3d9a</link>
        <description>KVM: arm64: gic-v5: Probe for GICv5Add in a probe function for GICv5 which enables support for GICv3guests on a GICv5 host, if FEAT_GCIE_LEGACY is supported by thehardware.Co-authored-by: Timothy Hayes &lt;timothy.hayes@arm.com&gt;Signed-off-by: Timothy Hayes &lt;timothy.hayes@arm.com&gt;Signed-off-by: Sascha Bischoff &lt;sascha.bischoff@arm.com&gt;Link: https://lore.kernel.org/r/20250627100847.1022515-6-sascha.bischoff@arm.comSigned-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Fri, 27 Jun 2025 12:09:02 +0200</pubDate>
        <dc:creator>Sascha Bischoff &lt;Sascha.Bischoff@arm.com&gt;</dc:creator>
    </item>
<item>
        <title>63d423a7635bca6d817a30adff29be58ee99c6d5 - KVM: arm64: Switch to table-driven FGU configuration</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#63d423a7635bca6d817a30adff29be58ee99c6d5</link>
        <description>KVM: arm64: Switch to table-driven FGU configurationDefining the FGU behaviour is extremely tedious. It relies on matchingeach set of bits from FGT registers with am architectural feature, andadding them to the FGU list if the corresponding feature isn&apos;t advertisedto the guest.It is however relatively easy to dump most of that information fromthe architecture JSON description, and use that to control the FGU bits.Let&apos;s introduce a new set of tables descripbing the mapping betweenFGT bits and features. Most of the time, this is only a lookup inan idreg field, with a few more complex exceptions.While this is obviously many more lines in a new file, this ismostly generated, and is pretty easy to maintain.Reviewed-by: Joey Gouly &lt;joey.gouly@arm.com&gt;Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Sun, 09 Feb 2025 15:05:01 +0100</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>96c2f03311de1a9363a7b4cee28776ac9cec8109 - KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#96c2f03311de1a9363a7b4cee28776ac9cec8109</link>
        <description>KVM: arm64: nv: Plumb handling of GICv3 EL2 accessesWire the handling of all GICv3 EL2 registers, and provide emulationfor all the non memory-backed registers (ICC_SRE_EL2, ICH_VTR_EL2,ICH_MISR_EL2, ICH_ELRSR_EL2, and ICH_EISR_EL2).Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Link: https://lore.kernel.org/r/20250225172930.1850838-7-maz@kernel.orgSigned-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Tue, 25 Feb 2025 18:29:20 +0100</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>f625469051266311e19245ef427f23a6a3c3f4aa - Merge branch kvm-arm64/s2-ptdump into kvmarm-master/next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#f625469051266311e19245ef427f23a6a3c3f4aa</link>
        <description>Merge branch kvm-arm64/s2-ptdump into kvmarm-master/next* kvm-arm64/s2-ptdump:  : .  : Stage-2 page table dumper, reusing the main ptdump infrastructure,  : courtesy of Sebastian Ene. From the cover letter:  :  : &quot;This series extends the ptdump support to allow dumping the guest  : stage-2 pagetables. When CONFIG_PTDUMP_STAGE2_DEBUGFS is enabled, ptdump  : registers the new following files under debugfs:  : - /sys/debug/kvm/&lt;guest_id&gt;/stage2_page_tables  : - /sys/debug/kvm/&lt;guest_id&gt;/stage2_levels  : - /sys/debug/kvm/&lt;guest_id&gt;/ipa_range  :  : This allows userspace tools (eg. cat) to dump the stage-2 pagetables by  : reading the &apos;stage2_page_tables&apos; file.  : [...]&quot;  : .  KVM: arm64: Register ptdump with debugfs on guest creation  arm64: ptdump: Don&apos;t override the level when operating on the stage-2 tables  arm64: ptdump: Use the ptdump description from a local context  arm64: ptdump: Expose the attribute parsing functionality  KVM: arm64: Move pagetable definitions to common headerSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Thu, 12 Sep 2024 09:38:02 +0200</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>2e0f239457c1076e09b36350cbbdb2ed25997a1f - Merge branch kvm-arm64/nv-at-pan into kvmarm-master/next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#2e0f239457c1076e09b36350cbbdb2ed25997a1f</link>
        <description>Merge branch kvm-arm64/nv-at-pan into kvmarm-master/next* kvm-arm64/nv-at-pan:  : .  : Add NV support for the AT family of instructions, which mostly results  : in adding a page table walker that deals with most of the complexity  : of the architecture.  :  : From the cover letter:  :  : &quot;Another task that a hypervisor supporting NV on arm64 has to deal with  : is to emulate the AT instruction, because we multiplex all the S1  : translations on a single set of registers, and the guest S2 is never  : truly resident on the CPU.  :  : So given that we lie about page tables, we also have to lie about  : translation instructions, hence the emulation. Things are made  : complicated by the fact that guest S1 page tables can be swapped out,  : and that our shadow S2 is likely to be incomplete. So while using AT  : to emulate AT is tempting (and useful), it is not going to always  : work, and we thus need a fallback in the shape of a SW S1 walker.&quot;  : .  KVM: arm64: nv: Add support for FEAT_ATS1A  KVM: arm64: nv: Plumb handling of AT S1* traps from EL2  KVM: arm64: nv: Make AT+PAN instructions aware of FEAT_PAN3  KVM: arm64: nv: Sanitise SCTLR_EL1.EPAN according to VM configuration  KVM: arm64: nv: Add SW walker for AT S1 emulation  KVM: arm64: nv: Make ps_to_output_size() generally available  KVM: arm64: nv: Add emulation of AT S12E{0,1}{R,W}  KVM: arm64: nv: Add basic emulation of AT S1E2{R,W}  KVM: arm64: nv: Add basic emulation of AT S1E1{R,W}P  KVM: arm64: nv: Add basic emulation of AT S1E{0,1}{R,W}  KVM: arm64: nv: Honor absence of FEAT_PAN2  KVM: arm64: nv: Turn upper_attr for S2 walk into the full descriptor  KVM: arm64: nv: Enforce S2 alignment when contiguous bit is set  arm64: Add ESR_ELx_FSC_ADDRSZ_L() helper  arm64: Add system register encoding for PSTATE.PAN  arm64: Add PAR_EL1 field description  arm64: Add missing APTable and TCR_ELx.HPD masks  KVM: arm64: Make kvm_at() take an OP_AT_*Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;# Conflicts:#	arch/arm64/kvm/nested.c

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Thu, 12 Sep 2024 09:37:47 +0200</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>7c4f73548ed15476daf1101f66648085eda65067 - KVM: arm64: Register ptdump with debugfs on guest creation</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#7c4f73548ed15476daf1101f66648085eda65067</link>
        <description>KVM: arm64: Register ptdump with debugfs on guest creationWhile arch/*/mem/ptdump handles the kernel pagetable dumping code,introduce KVM/ptdump to show the guest stage-2 pagetables. Theseparation is necessary because most of the definitions from thestage-2 pagetable reside in the KVM path and we will be invokingfunctionality specific to KVM. Introduce the PTDUMP_STAGE2_DEBUGFS config.When a guest is created, register a new file entry under the guestdebugfs dir which allows userspace to show the contents of the gueststage-2 pagetables when accessed.[maz: moved function prototypes from kvm_host.h to kvm_mmu.h]Signed-off-by: Sebastian Ene &lt;sebastianene@google.com&gt;Reviewed-by: Vincent Donnefort &lt;vdonnefort@google.com&gt;Link: https://lore.kernel.org/r/20240909124721.1672199-6-sebastianene@google.comSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Mon, 09 Sep 2024 14:47:21 +0200</pubDate>
        <dc:creator>Sebastian Ene &lt;sebastianene@google.com&gt;</dc:creator>
    </item>
<item>
        <title>477e89cabb1428d5989430d57828347f5de2be9c - KVM: arm64: nv: Add basic emulation of AT S1E{0,1}{R,W}</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#477e89cabb1428d5989430d57828347f5de2be9c</link>
        <description>KVM: arm64: nv: Add basic emulation of AT S1E{0,1}{R,W}Emulating AT instructions is one the tasks devolved to the hosthypervisor when NV is on.Here, we take the basic approach of emulating AT S1E{0,1}{R,W}using the AT instructions themselves. While this mostly work,it doesn&apos;t *always* work:- S1 page tables can be swapped out- shadow S2 can be incomplete and not contain mappings for  the S1 page tablesWe are not trying to handle these case here, and defer it toa later patch. Suitable comments indicate where we are in direneed of better handling.Co-developed-by: Jintack Lim &lt;jintack.lim@linaro.org&gt;Signed-off-by: Jintack Lim &lt;jintack.lim@linaro.org&gt;Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Wed, 19 Jun 2024 09:29:20 +0200</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>963a08e586bd45fd55f4c1752e98029ce83fc091 - KVM: arm64: fix override-init warnings in W=1 builds</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#963a08e586bd45fd55f4c1752e98029ce83fc091</link>
        <description>KVM: arm64: fix override-init warnings in W=1 buildsAdd -Wno-override-init to the build flags for sys_regs.c,handle_exit.c, and switch.c to fix warnings like the following:arch/arm64/kvm/hyp/vhe/switch.c:271:43: warning: initialized field overwritten [-Woverride-init]  271 |         [ESR_ELx_EC_CP15_32]            = kvm_hyp_handle_cp15_32,      |Signed-off-by: Sebastian Ott &lt;sebott@redhat.com&gt;Reviewed-by: Marc Zyngier &lt;maz@kernel.org&gt;Link: https://lore.kernel.org/r/20240723101204.7356-2-sebott@redhat.comSigned-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Tue, 23 Jul 2024 12:12:02 +0200</pubDate>
        <dc:creator>Sebastian Ott &lt;sebott@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>ff9a79307f89563da6d841da8b7cc4a0afceb0e2 - Merge tag &apos;kbuild-v6.10&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy/linux-kbuild</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#ff9a79307f89563da6d841da8b7cc4a0afceb0e2</link>
        <description>Merge tag &apos;kbuild-v6.10&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy/linux-kbuildPull Kbuild updates from Masahiro Yamada: - Avoid &apos;constexpr&apos;, which is a keyword in C23 - Allow &apos;dtbs_check&apos; and &apos;dt_compatible_check&apos; run independently of   &apos;dt_binding_check&apos; - Fix weak references to avoid GOT entries in position-independent code   generation - Convert the last use of &apos;optional&apos; property in arch/sh/Kconfig - Remove support for the &apos;optional&apos; property in Kconfig - Remove support for Clang&apos;s ThinLTO caching, which does not work with   the .incbin directive - Change the semantics of $(src) so it always points to the source   directory, which fixes Makefile inconsistencies between upstream and   downstream - Fix &apos;make tar-pkg&apos; for RISC-V to produce a consistent package - Provide reasonable default coverage for objtool, sanitizers, and   profilers - Remove redundant OBJECT_FILES_NON_STANDARD, KASAN_SANITIZE, etc. - Remove the last use of tristate choice in drivers/rapidio/Kconfig - Various cleanups and fixes in Kconfig* tag &apos;kbuild-v6.10&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy/linux-kbuild: (46 commits)  kconfig: use sym_get_choice_menu() in sym_check_prop()  rapidio: remove choice for enumeration  kconfig: lxdialog: remove initialization with A_NORMAL  kconfig: m/nconf: merge two item_add_str() calls  kconfig: m/nconf: remove dead code to display value of bool choice  kconfig: m/nconf: remove dead code to display children of choice members  kconfig: gconf: show checkbox for choice correctly  kbuild: use GCOV_PROFILE and KCSAN_SANITIZE in scripts/Makefile.modfinal  Makefile: remove redundant tool coverage variables  kbuild: provide reasonable defaults for tool coverage  modules: Drop the .export_symbol section from the final modules  kconfig: use menu_list_for_each_sym() in sym_check_choice_deps()  kconfig: use sym_get_choice_menu() in conf_write_defconfig()  kconfig: add sym_get_choice_menu() helper  kconfig: turn defaults and additional prompt for choice members into error  kconfig: turn missing prompt for choice members into error  kconfig: turn conf_choice() into void function  kconfig: use linked list in sym_set_changed()  kconfig: gconf: use MENU_CHANGED instead of SYMBOL_CHANGED  kconfig: gconf: remove debug code  ...

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Sat, 18 May 2024 21:39:20 +0200</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>b1992c3772e69a6fd0e3fc81cd4d2820c8b6eca0 - kbuild: use $(src) instead of $(srctree)/$(src) for source directory</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#b1992c3772e69a6fd0e3fc81cd4d2820c8b6eca0</link>
        <description>kbuild: use $(src) instead of $(srctree)/$(src) for source directoryKbuild conventionally uses $(obj)/ for generated files, and $(src)/ forchecked-in source files. It is merely a convention without any functionaldifference. In fact, $(obj) and $(src) are exactly the same, as definedin scripts/Makefile.build:    src := $(obj)When the kernel is built in a separate output directory, $(src) doesnot accurately reflect the source directory location. While Kbuildresolves this discrepancy by specifying VPATH=$(srctree) to search forsource files, it does not cover all cases. For example, when adding aheader search path for local headers, -I$(srctree)/$(src) is typicallypassed to the compiler.This introduces inconsistency between upstream and downstream Makefilesbecause $(src) is used instead of $(srctree)/$(src) for the latter.To address this inconsistency, this commit changes the semantics of$(src) so that it always points to the directory in the source tree.Going forward, the variables used in Makefiles will have the followingmeanings:  $(obj)     - directory in the object tree  $(src)     - directory in the source tree  (changed by this commit)  $(objtree) - the top of the kernel object tree  $(srctree) - the top of the kernel source treeConsequently, $(srctree)/$(src) in upstream Makefiles need to be replacedwith $(src).Signed-off-by: Masahiro Yamada &lt;masahiroy@kernel.org&gt;Reviewed-by: Nicolas Schier &lt;nicolas@fjasle.eu&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Sat, 27 Apr 2024 16:55:02 +0200</pubDate>
        <dc:creator>Masahiro Yamada &lt;masahiroy@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>6ccc971ee2c61a1ffb487e46bf6184f7df6aacfb - KVM: arm64: nv: Add emulation for ERETAx instructions</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#6ccc971ee2c61a1ffb487e46bf6184f7df6aacfb</link>
        <description>KVM: arm64: nv: Add emulation for ERETAx instructionsFEAT_NV has the interesting property of relying on ERET beingtrapped. An added complexity is that it also traps ERETAA andERETAB, meaning that the Pointer Authentication aspect of theseinstruction must be emulated.Add an emulation of Pointer Authentication, limited to ERETAx(always using SP_EL2 as the modifier and ELR_EL2 as the pointer),using the Generic Authentication instructions.The emulation, however small, is placed in its own compilationunit so that it can be avoided if the configuration doesn&apos;tinclude it (or the toolchan in not up to the task).Reviewed-by: Joey Gouly &lt;joey.gouly@arm.com&gt;Reviewed-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;Link: https://lore.kernel.org/r/20240419102935.1935571-13-maz@kernel.orgSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Fri, 19 Apr 2024 12:29:32 +0200</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>9f75b6d447d712b6ed9abc869eedf456fe7f5e9b - KVM: arm64: nv: Filter out unsupported features from ID regs</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#9f75b6d447d712b6ed9abc869eedf456fe7f5e9b</link>
        <description>KVM: arm64: nv: Filter out unsupported features from ID regsAs there is a number of features that we either can&apos;t support,or don&apos;t want to support right away with NV, let&apos;s add somebasic filtering so that we don&apos;t advertize silly things to theEL2 guest.Whilst we are at it, advertize FEAT_TTL as well as FEAT_GTG, whichthe NV implementation will implement.Reviewed-by: Ganapatrao Kulkarni &lt;gankulkarni@os.amperecomputing.com&gt;Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Link: https://lore.kernel.org/r/20230209175820.1939006-18-maz@kernel.orgSigned-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Thu, 09 Feb 2023 18:58:19 +0100</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>47f3a2fc765ae2719e6daf39c0a1c757934b152e - KVM: arm64: nv: Support virtual EL2 exceptions</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#47f3a2fc765ae2719e6daf39c0a1c757934b152e</link>
        <description>KVM: arm64: nv: Support virtual EL2 exceptionsSupport injecting exceptions and performing exception returns to andfrom virtual EL2.  This must be done entirely in software except whentaking an exception from vEL0 to vEL2 when the virtual HCR_EL2.{E2H,TGE}== {1,1}  (a VHE guest hypervisor).[maz: switch to common exception injection framework, illegal exeption return handling]Reviewed-by: Ganapatrao Kulkarni &lt;gankulkarni@os.amperecomputing.com&gt;Signed-off-by: Jintack Lim &lt;jintack.lim@linaro.org&gt;Signed-off-by: Christoffer Dall &lt;christoffer.dall@arm.com&gt;Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Link: https://lore.kernel.org/r/20230209175820.1939006-10-maz@kernel.orgSigned-off-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Thu, 09 Feb 2023 18:58:11 +0100</pubDate>
        <dc:creator>Jintack Lim &lt;jintack.lim@linaro.org&gt;</dc:creator>
    </item>
<item>
        <title>9f5fee05f6897d0fe0e3a44ade71bb85cd97b2ef - KVM: arm64: Move nVHE stacktrace unwinding into its own compilation unit</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#9f5fee05f6897d0fe0e3a44ade71bb85cd97b2ef</link>
        <description>KVM: arm64: Move nVHE stacktrace unwinding into its own compilation unitThe unwinding code doesn&apos;t really belong to the exit handlingcode. Instead, move it to a file (conveniently named stacktrace.cto confuse the reviewer), and move all the stacktrace-relatedstuff there.It will be joined by more code very soon.Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Reviewed-by: Kalesh Singh &lt;kaleshsingh@google.com&gt;Tested-by: Kalesh Singh &lt;kaleshsingh@google.com&gt;Reviewed-by: Oliver Upton &lt;oliver.upton@linux.dev&gt;Link: https://lore.kernel.org/r/20220727142906.1856759-3-maz@kernel.org

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Wed, 27 Jul 2022 16:29:02 +0200</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>20492a62b99bd4367b79a76ca288d018f11980db - KVM: arm64: pmu: Restore compilation when HW_PERF_EVENTS isn&apos;t selected</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#20492a62b99bd4367b79a76ca288d018f11980db</link>
        <description>KVM: arm64: pmu: Restore compilation when HW_PERF_EVENTS isn&apos;t selectedMoving kvm_pmu_events into the vcpu (and refering to it) broke thesomewhat unusual case where the kernel has no support for a PMUat all.In order to solve this, move things around a bit so that we caneasily avoid refering to the pmu structure outside of PMU-awarecode. As a bonus, pmu.c isn&apos;t compiled in when HW_PERF_EVENTSisn&apos;t selected.Reported-by: kernel test robot &lt;lkp@intel.com&gt;Reviewed-by: Fuad Tabba &lt;tabba@google.com&gt;Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Link: https://lore.kernel.org/r/202205161814.KQHpOzsJ-lkp@intel.com

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Mon, 16 May 2022 14:02:24 +0200</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>3248136b3637e1671e4fa46e32e2122f9ec4bc3d - KVM: arm64: Align the VMID allocation with the arm64 ASID</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#3248136b3637e1671e4fa46e32e2122f9ec4bc3d</link>
        <description>KVM: arm64: Align the VMID allocation with the arm64 ASIDAt the moment, the VMID algorithm will send an SGI to all theCPUs to force an exit and then broadcast a full TLB flush andI-Cache invalidation.This patch uses the new VMID allocator. The benefits are:&#160; &#160;- Aligns with arm64 ASID algorithm.&#160;&#160; - CPUs are not forced to exit at roll-over. Instead,     the VMID will be marked reserved and context invalidation     is broadcasted. This will reduce the IPIs traffic. &#160; - More flexible to add support for pinned KVM VMIDs in     the future.&#160; &#160;With the new algo, the code is now adapted:&#160; &#160; - The call to update_vmid() will be done with preemption      disabled as the new algo requires to store information      per-CPU.Signed-off-by: Julien Grall &lt;julien.grall@arm.com&gt;Signed-off-by: Shameer Kolothum &lt;shameerali.kolothum.thodi@huawei.com&gt;Signed-off-by: Marc Zyngier &lt;maz@kernel.org&gt;Link: https://lore.kernel.org/r/20211122121844.867-4-shameerali.kolothum.thodi@huawei.com

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Mon, 22 Nov 2021 13:18:43 +0100</pubDate>
        <dc:creator>Julien Grall &lt;julien.grall@arm.com&gt;</dc:creator>
    </item>
<item>
        <title>79e06c4c4950be2abd8ca5d2428a8c915aa62c24 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#79e06c4c4950be2abd8ca5d2428a8c915aa62c24</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm updates from Paolo Bonzini: &quot;RISCV:   - Use common KVM implementation of MMU memory caches   - SBI v0.2 support for Guest   - Initial KVM selftests support   - Fix to avoid spurious virtual interrupts after clearing hideleg CSR   - Update email address for Anup and Atish  ARM:   - Simplification of the &apos;vcpu first run&apos; by integrating it into KVM&apos;s     &apos;pid change&apos; flow   - Refactoring of the FP and SVE state tracking, also leading to a     simpler state and less shared data between EL1 and EL2 in the nVHE     case   - Tidy up the header file usage for the nvhe hyp object   - New HYP unsharing mechanism, finally allowing pages to be unmapped     from the Stage-1 EL2 page-tables   - Various pKVM cleanups around refcounting and sharing   - A couple of vgic fixes for bugs that would trigger once the vcpu     xarray rework is merged, but not sooner   - Add minimal support for ARMv8.7&apos;s PMU extension   - Rework kvm_pgtable initialisation ahead of the NV work   - New selftest for IRQ injection   - Teach selftests about the lack of default IPA space and page sizes   - Expand sysreg selftest to deal with Pointer Authentication   - The usual bunch of cleanups and doc update  s390:   - fix sigp sense/start/stop/inconsistency   - cleanups  x86:   - Clean up some function prototypes more   - improved gfn_to_pfn_cache with proper invalidation, used by Xen     emulation   - add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery   - completely remove potential TOC/TOU races in nested SVM consistency     checks   - update some PMCs on emulated instructions   - Intel AMX support (joint work between Thomas and Intel)   - large MMU cleanups   - module parameter to disable PMU virtualization   - cleanup register cache   - first part of halt handling cleanups   - Hyper-V enlightened MSR bitmap support for nested hypervisors  Generic:   - clean up Makefiles   - introduce CONFIG_HAVE_KVM_DIRTY_RING   - optimize memslot lookup using a tree   - optimize vCPU array usage by converting to xarray&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (268 commits)  x86/fpu: Fix inline prefix warnings  selftest: kvm: Add amx selftest  selftest: kvm: Move struct kvm_x86_state to header  selftest: kvm: Reorder vcpu_load_state steps for AMX  kvm: x86: Disable interception for IA32_XFD on demand  x86/fpu: Provide fpu_sync_guest_vmexit_xfd_state()  kvm: selftests: Add support for KVM_CAP_XSAVE2  kvm: x86: Add support for getting/setting expanded xstate buffer  x86/fpu: Add uabi_size to guest_fpu  kvm: x86: Add CPUID support for Intel AMX  kvm: x86: Add XCR0 support for Intel AMX  kvm: x86: Disable RDMSR interception of IA32_XFD_ERR  kvm: x86: Emulate IA32_XFD_ERR for guest  kvm: x86: Intercept #NM for saving IA32_XFD_ERR  x86/fpu: Prepare xfd_err in struct fpu_guest  kvm: x86: Add emulation for IA32_XFD  x86/fpu: Provide fpu_update_guest_xfd() for IA32_XFD emulation  kvm: x86: Enable dynamic xfeatures at KVM_SET_CPUID2  x86/fpu: Provide fpu_enable_guest_xfd_features() for KVM  x86/fpu: Add guest support to xfd_enable_feature()  ...

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Sun, 16 Jan 2022 15:15:14 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>7fd55a02a426ffff378e0acceff4a381bcbbfca0 - Merge tag &apos;kvmarm-5.17&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#7fd55a02a426ffff378e0acceff4a381bcbbfca0</link>
        <description>Merge tag &apos;kvmarm-5.17&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEADKVM/arm64 updates for Linux 5.16- Simplification of the &apos;vcpu first run&apos; by integrating it into  KVM&apos;s &apos;pid change&apos; flow- Refactoring of the FP and SVE state tracking, also leading to  a simpler state and less shared data between EL1 and EL2 in  the nVHE case- Tidy up the header file usage for the nvhe hyp object- New HYP unsharing mechanism, finally allowing pages to be  unmapped from the Stage-1 EL2 page-tables- Various pKVM cleanups around refcounting and sharing- A couple of vgic fixes for bugs that would trigger once  the vcpu xarray rework is merged, but not sooner- Add minimal support for ARMv8.7&apos;s PMU extension- Rework kvm_pgtable initialisation ahead of the NV work- New selftest for IRQ injection- Teach selftests about the lack of default IPA space and  page sizes- Expand sysreg selftest to deal with Pointer Authentication- The usual bunch of cleanups and doc update

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Fri, 07 Jan 2022 16:42:19 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>d8f6ef45a623d650f9b97e11553adb4978f6aa70 - KVM: arm64: Use Makefile.kvm for common files</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/arm64/kvm/Makefile#d8f6ef45a623d650f9b97e11553adb4978f6aa70</link>
        <description>KVM: arm64: Use Makefile.kvm for common filesSigned-off-by: David Woodhouse &lt;dwmw@amazon.co.uk&gt;Acked-by: Marc Zyngier &lt;maz@kernel.org&gt;Message-Id: &lt;20211121125451.9489-8-dwmw2@infradead.org&gt;Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;

            List of files:
            /linux/arch/arm64/kvm/Makefile</description>
        <pubDate>Sun, 21 Nov 2021 13:54:46 +0100</pubDate>
        <dc:creator>David Woodhouse &lt;dwmw@amazon.co.uk&gt;</dc:creator>
    </item>
</channel>
</rss>
