<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Kconfig</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>8457669db968c98edb781892d73fa559e1efcbd4 - Merge tag &apos;asoc-fix-v7.0-rc2&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#8457669db968c98edb781892d73fa559e1efcbd4</link>
        <description>Merge tag &apos;asoc-fix-v7.0-rc2&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linusASoC: Fixes for v7.0A moderately large pile of fixes, though none of them are  super major,plus a few new quirks and device IDs.

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Thu, 05 Mar 2026 17:22:14 +0100</pubDate>
        <dc:creator>Takashi Iwai &lt;tiwai@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>949d0a46ad1b9ab3450fb6ed69ff1e3e13c657bd - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#949d0a46ad1b9ab3450fb6ed69ff1e3e13c657bd</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm fixes from Paolo Bonzini: &quot;Arm:   - Make sure we don&apos;t leak any S1POE state from guest to guest when     the feature is supported on the HW, but not enabled on the host   - Propagate the ID registers from the host into non-protected VMs     managed by pKVM, ensuring that the guest sees the intended feature     set   - Drop double kern_hyp_va() from unpin_host_sve_state(), which could     bite us if we were to change kern_hyp_va() to not being idempotent   - Don&apos;t leak stage-2 mappings in protected mode   - Correctly align the faulting address when dealing with single page     stage-2 mappings for PAGE_SIZE &gt; 4kB   - Fix detection of virtualisation-capable GICv5 IRS, due to the     maintainer being obviously fat fingered... [his words, not mine]   - Remove duplication of code retrieving the ASID for the purpose of     S1 PT handling   - Fix slightly abusive const-ification in vgic_set_kvm_info()  Generic:   - Remove internal Kconfigs that are now set on all architectures   - Remove per-architecture code to enable KVM_CAP_SYNC_MMU, all     architectures finally enable it in Linux 7.0&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm:  KVM: always define KVM_CAP_SYNC_MMU  KVM: remove CONFIG_KVM_GENERIC_MMU_NOTIFIER  KVM: arm64: Deduplicate ASID retrieval code  irqchip/gic-v5: Fix inversion of IRS_IDR0.virt flag  KVM: arm64: Revert accidental drop of kvm_uninit_stage2_mmu() for non-NV VMs  KVM: arm64: Fix protected mode handling of pages larger than 4kB  KVM: arm64: vgic: Handle const qualifier from gic_kvm_info allocation type  KVM: arm64: Remove redundant kern_hyp_va() in unpin_host_sve_state()  KVM: arm64: Fix ID register initialization for non-protected pKVM guests  KVM: arm64: Optimise away S1POE handling when not supported by host  KVM: arm64: Hide S1POE from guests when not supported by the host

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Mon, 02 Mar 2026 00:34:47 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>407fd8b8d8cce03856aa67329715de48b254b529 - KVM: remove CONFIG_KVM_GENERIC_MMU_NOTIFIER</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#407fd8b8d8cce03856aa67329715de48b254b529</link>
        <description>KVM: remove CONFIG_KVM_GENERIC_MMU_NOTIFIERAll architectures now use MMU notifier for KVM page table management.Remove the Kconfig symbol and the code that is used when it isdisabled.Signed-off-by: Paolo Bonzini &lt;pbonzini@redhat.com&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Wed, 11 Feb 2026 19:03:03 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>c17ee635fd3a482b2ad2bf5e269755c2eae5f25e - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#c17ee635fd3a482b2ad2bf5e269755c2eae5f25e</link>
        <description>Merge drm/drm-fixes into drm-misc-fixes7.0-rc1 was just released, let&apos;s merge it to kick the new release cycle.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Mon, 23 Feb 2026 10:09:45 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cb5573868ea85ddbc74dd9a917acd1e434d21390 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#cb5573868ea85ddbc74dd9a917acd1e434d21390</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull KVM updates from Paolo Bonzini: &quot;Loongarch:   - Add more CPUCFG mask bits   - Improve feature detection   - Add lazy load support for FPU and binary translation (LBT) register     state   - Fix return value for memory reads from and writes to in-kernel     devices   - Add support for detecting preemption from within a guest   - Add KVM steal time test case to tools/selftests  ARM:   - Add support for FEAT_IDST, allowing ID registers that are not     implemented to be reported as a normal trap rather than as an UNDEF     exception   - Add sanitisation of the VTCR_EL2 register, fixing a number of     UXN/PXN/XN bugs in the process   - Full handling of RESx bits, instead of only RES0, and resulting in     SCTLR_EL2 being added to the list of sanitised registers   - More pKVM fixes for features that are not supposed to be exposed to     guests   - Make sure that MTE being disabled on the pKVM host doesn&apos;t give it     the ability to attack the hypervisor   - Allow pKVM&apos;s host stage-2 mappings to use the Force Write Back     version of the memory attributes by using the &quot;pass-through&apos;     encoding   - Fix trapping of ICC_DIR_EL1 on GICv5 hosts emulating GICv3 for the     guest   - Preliminary work for guest GICv5 support   - A bunch of debugfs fixes, removing pointless custom iterators     stored in guest data structures   - A small set of FPSIMD cleanups   - Selftest fixes addressing the incorrect alignment of page     allocation   - Other assorted low-impact fixes and spelling fixes  RISC-V:   - Fixes for issues discoverd by KVM API fuzzing in     kvm_riscv_aia_imsic_has_attr(), kvm_riscv_aia_imsic_rw_attr(), and     kvm_riscv_vcpu_aia_imsic_update()   - Allow Zalasr, Zilsd and Zclsd extensions for Guest/VM   - Transparent huge page support for hypervisor page tables   - Adjust the number of available guest irq files based on MMIO     register sizes found in the device tree or the ACPI tables   - Add RISC-V specific paging modes to KVM selftests   - Detect paging mode at runtime for selftests  s390:   - Performance improvement for vSIE (aka nested virtualization)   - Completely new memory management. s390 was a special snowflake that     enlisted help from the architecture&apos;s page table management to     build hypervisor page tables, in particular enabling sharing the     last level of page tables. This however was a lot of code (~3K     lines) in order to support KVM, and also blocked several features.     The biggest advantages is that the page size of userspace is     completely independent of the page size used by the guest:     userspace can mix normal pages, THPs and hugetlbfs as it sees fit,     and in fact transparent hugepages were not possible before. It&apos;s     also now possible to have nested guests and guests with huge pages     running on the same host   - Maintainership change for s390 vfio-pci   - Small quality of life improvement for protected guests  x86:   - Add support for giving the guest full ownership of PMU hardware     (contexted switched around the fastpath run loop) and allowing     direct access to data MSRs and PMCs (restricted by the vPMU model).     KVM still intercepts access to control registers, e.g. to enforce     event filtering and to prevent the guest from profiling sensitive     host state. This is more accurate, since it has no risk of     contention and thus dropped events, and also has significantly less     overhead.     For more information, see the commit message for merge commit     bf2c3138ae36 (&quot;Merge tag &apos;kvm-x86-pmu-6.20&apos; ...&quot;)   - Disallow changing the virtual CPU model if L2 is active, for all     the same reasons KVM disallows change the model after the first     KVM_RUN   - Fix a bug where KVM would incorrectly reject host accesses to PV     MSRs when running with KVM_CAP_ENFORCE_PV_FEATURE_CPUID enabled,     even if those were advertised as supported to userspace,   - Fix a bug with protected guest state (SEV-ES/SNP and TDX) VMs,     where KVM would attempt to read CR3 configuring an async #PF entry   - Fail the build if EXPORT_SYMBOL_GPL or EXPORT_SYMBOL is used in KVM     (for x86 only) to enforce usage of EXPORT_SYMBOL_FOR_KVM_INTERNAL.     Only a few exports that are intended for external usage, and those     are allowed explicitly   - When checking nested events after a vCPU is unblocked, ignore     -EBUSY instead of WARNing. Userspace can sometimes put the vCPU     into what should be an impossible state, and spurious exit to     userspace on -EBUSY does not really do anything to solve the issue   - Also throw in the towel and drop the WARN on INIT/SIPI being     blocked when vCPU is in Wait-For-SIPI, which also resulted in     playing whack-a-mole with syzkaller stuffing architecturally     impossible states into KVM   - Add support for new Intel instructions that don&apos;t require anything     beyond enumerating feature flags to userspace   - Grab SRCU when reading PDPTRs in KVM_GET_SREGS2   - Add WARNs to guard against modifying KVM&apos;s CPU caps outside of the     intended setup flow, as nested VMX in particular is sensitive to     unexpected changes in KVM&apos;s golden configuration   - Add a quirk to allow userspace to opt-in to actually suppress EOI     broadcasts when the suppression feature is enabled by the guest     (currently limited to split IRQCHIP, i.e. userspace I/O APIC).     Sadly, simply fixing KVM to honor Suppress EOI Broadcasts isn&apos;t an     option as some userspaces have come to rely on KVM&apos;s buggy behavior     (KVM advertises Supress EOI Broadcast irrespective of whether or     not userspace I/O APIC supports Directed EOIs)   - Clean up KVM&apos;s handling of marking mapped vCPU pages dirty   - Drop a pile of *ancient* sanity checks hidden behind in KVM&apos;s     unused ASSERT() macro, most of which could be trivially triggered     by the guest and/or user, and all of which were useless   - Fold &quot;struct dest_map&quot; into its sole user, &quot;struct rtc_status&quot;, to     make it more obvious what the weird parameter is used for, and to     allow fropping these RTC shenanigans if CONFIG_KVM_IOAPIC=n   - Bury all of ioapic.h, i8254.h and related ioctls (including     KVM_CREATE_IRQCHIP) behind CONFIG_KVM_IOAPIC=y   - Add a regression test for recent APICv update fixes   - Handle &quot;hardware APIC ISR&quot;, a.k.a. SVI, updates in     kvm_apic_update_apicv() to consolidate the updates, and to     co-locate SVI updates with the updates for KVM&apos;s own cache of ISR     information   - Drop a dead function declaration   - Minor cleanups  x86 (Intel):   - Rework KVM&apos;s handling of VMCS updates while L2 is active to     temporarily switch to vmcs01 instead of deferring the update until     the next nested VM-Exit.     The deferred updates approach directly contributed to several bugs,     was proving to be a maintenance burden due to the difficulty in     auditing the correctness of deferred updates, and was polluting     &quot;struct nested_vmx&quot; with a growing pile of booleans   - Fix an SGX bug where KVM would incorrectly try to handle EPCM page     faults, and instead always reflect them into the guest. Since KVM     doesn&apos;t shadow EPCM entries, EPCM violations cannot be due to KVM     interference and can&apos;t be resolved by KVM   - Fix a bug where KVM would register its posted interrupt wakeup     handler even if loading kvm-intel.ko ultimately failed   - Disallow access to vmcb12 fields that aren&apos;t fully supported,     mostly to avoid weirdness and complexity for FRED and other     features, where KVM wants enable VMCS shadowing for fields that     conditionally exist   - Print out the &quot;bad&quot; offsets and values if kvm-intel.ko refuses to     load (or refuses to online a CPU) due to a VMCS config mismatch  x86 (AMD):   - Drop a user-triggerable WARN on nested_svm_load_cr3() failure   - Add support for virtualizing ERAPS. Note, correct virtualization of     ERAPS relies on an upcoming, publicly announced change in the APM     to reduce the set of conditions where hardware (i.e. KVM) *must*     flush the RAP   - Ignore nSVM intercepts for instructions that are not supported     according to L1&apos;s virtual CPU model   - Add support for expedited writes to the fast MMIO bus, a la VMX&apos;s     fastpath for EPT Misconfig   - Don&apos;t set GIF when clearing EFER.SVME, as GIF exists independently     of SVM, and allow userspace to restore nested state with GIF=0   - Treat exit_code as an unsigned 64-bit value through all of KVM   - Add support for fetching SNP certificates from userspace   - Fix a bug where KVM would use vmcb02 instead of vmcb01 when     emulating VMLOAD or VMSAVE on behalf of L2   - Misc fixes and cleanups  x86 selftests:   - Add a regression test for TPR&lt;=&gt;CR8 synchronization and IRQ masking   - Overhaul selftest&apos;s MMU infrastructure to genericize stage-2 MMU     support, and extend x86&apos;s infrastructure to support EPT and NPT     (for L2 guests)   - Extend several nested VMX tests to also cover nested SVM   - Add a selftest for nested VMLOAD/VMSAVE   - Rework the nested dirty log test, originally added as a regression     test for PML where KVM logged L2 GPAs instead of L1 GPAs, to     improve test coverage and to hopefully make the test easier to     understand and maintain  guest_memfd:   - Remove kvm_gmem_populate()&apos;s preparation tracking and half-baked     hugepage handling. SEV/SNP was the only user of the tracking and it     can do it via the RMP   - Retroactively document and enforce (for SNP) that     KVM_SEV_SNP_LAUNCH_UPDATE and KVM_TDX_INIT_MEM_REGION require the     source page to be 4KiB aligned, to avoid non-trivial complexity for     something that no known VMM seems to be doing and to avoid an API     special case for in-place conversion, which simply can&apos;t support     unaligned sources   - When populating guest_memfd memory, GUP the source page in common     code and pass the refcounted page to the vendor callback, instead     of letting vendor code do the heavy lifting. Doing so avoids a     looming deadlock bug with in-place due an AB-BA conflict betwee     mmap_lock and guest_memfd&apos;s filemap invalidate lock  Generic:   - Fix a bug where KVM would ignore the vCPU&apos;s selected address space     when creating a vCPU-specific mapping of guest memory. Actually     this bug could not be hit even on x86, the only architecture with     multiple address spaces, but it&apos;s a bug nevertheless&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (267 commits)  KVM: s390: Increase permitted SE header size to 1 MiB  MAINTAINERS: Replace backup for s390 vfio-pci  KVM: s390: vsie: Fix race in acquire_gmap_shadow()  KVM: s390: vsie: Fix race in walk_guest_tables()  KVM: s390: Use guest address to mark guest page dirty  irqchip/riscv-imsic: Adjust the number of available guest irq files  RISC-V: KVM: Transparent huge page support  RISC-V: KVM: selftests: Add Zalasr extensions to get-reg-list test  RISC-V: KVM: Allow Zalasr extensions for Guest/VM  KVM: riscv: selftests: Add riscv vm satp modes  KVM: riscv: selftests: add Zilsd and Zclsd extension to get-reg-list test  riscv: KVM: allow Zilsd and Zclsd extensions for Guest/VM  RISC-V: KVM: Skip IMSIC update if vCPU IMSIC state is not initialized  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_rw_attr()  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_has_attr()  RISC-V: KVM: Remove unnecessary &apos;ret&apos; assignment  KVM: s390: Add explicit padding to struct kvm_s390_keyop  KVM: LoongArch: selftests: Add steal time test case  LoongArch: KVM: Add paravirt vcpu_is_preempted() support in guest side  LoongArch: KVM: Add paravirt preempt feature in hypervisor side  ...

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Fri, 13 Feb 2026 20:31:15 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>b1195183ed42f1522fae3fe44ebee3af437aa000 - Merge tag &apos;kvm-s390-next-7.0-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#b1195183ed42f1522fae3fe44ebee3af437aa000</link>
        <description>Merge tag &apos;kvm-s390-next-7.0-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD- gmap rewrite: completely new memory management for kvm/s390- vSIE improvement- maintainership change for s390 vfio-pci- small quality of life improvement for protected guests

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Wed, 11 Feb 2026 18:52:27 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>ec496f77b4c11036cc835d6f045fb5e5ef1e6530 - Merge branch &apos;for-6.20/sony&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#ec496f77b4c11036cc835d6f045fb5e5ef1e6530</link>
        <description>Merge branch &apos;for-6.20/sony&apos; into for-linus- Support for Rock band 4 PS4 and PS5 guitars (Rosalie Wanders)

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Mon, 09 Feb 2026 17:33:26 +0100</pubDate>
        <dc:creator>Jiri Kosina &lt;jkosina@suse.com&gt;</dc:creator>
    </item>
<item>
        <title>a2f2798fa6d18d91766b19a4896bd9fd0654d730 - KVM: s390: Enable KVM_GENERIC_MMU_NOTIFIER</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#a2f2798fa6d18d91766b19a4896bd9fd0654d730</link>
        <description>KVM: s390: Enable KVM_GENERIC_MMU_NOTIFIEREnable KVM_GENERIC_MMU_NOTIFIER, for now with empty placeholder callbacks.Also enable KVM_MMU_LOCKLESS_AGING and define KVM_HAVE_MMU_RWLOCK.Acked-by: Christian Borntraeger &lt;borntraeger@linux.ibm.com&gt;Reviewed-by: Steffen Eiden &lt;seiden@linux.ibm.com&gt;Reviewed-by: Christoph Schlameuss &lt;schlameuss@linux.ibm.com&gt;Acked-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Wed, 04 Feb 2026 16:02:39 +0100</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>cc4adab164b772a34b3340d644b7c4728498581e - Merge tag &apos;v6.19-rc1&apos; into msm-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#cc4adab164b772a34b3340d644b7c4728498581e</link>
        <description>Merge tag &apos;v6.19-rc1&apos; into msm-nextMerge Linux 6.19-rc1 in order to catch up with other changes (e.g. UBWCconfig database defining UBWC_6).Signed-off-by: Dmitry Baryshkov &lt;dmitry.baryshkov@oss.qualcomm.com&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Tue, 20 Jan 2026 23:06:55 +0100</pubDate>
        <dc:creator>Dmitry Baryshkov &lt;dmitry.baryshkov@oss.qualcomm.com&gt;</dc:creator>
    </item>
<item>
        <title>5add3c3c280a35f7e258e9cef7607db5a2e56fdc - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#5add3c3c280a35f7e258e9cef7607db5a2e56fdc</link>
        <description>Merge drm/drm-next into drm-xe-nextBackmerging to bring in 6.19-rc1. An important upstream bugfix andto help unblock PTL CI.Signed-off-by: Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Fri, 19 Dec 2025 11:51:22 +0100</pubDate>
        <dc:creator>Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;</dc:creator>
    </item>
<item>
        <title>ec439c38013550420aecc15988ae6acb670838c1 - Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf after 6.19-rc1</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#ec439c38013550420aecc15988ae6acb670838c1</link>
        <description>Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf after 6.19-rc1Cross-merge BPF and other fixes after downstream PR.Signed-off-by: Alexei Starovoitov &lt;ast@kernel.org&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Wed, 17 Dec 2025 06:29:38 +0100</pubDate>
        <dc:creator>Alexei Starovoitov &lt;ast@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>b8304863a3990d0f18c38e5b94191830a63ee1af - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#b8304863a3990d0f18c38e5b94191830a63ee1af</link>
        <description>Merge drm/drm-next into drm-intel-nextSync-up some display code needed for Async flips refactor.Signed-off-by: Rodrigo Vivi &lt;rodrigo.vivi@intel.com&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Mon, 15 Dec 2025 14:24:02 +0100</pubDate>
        <dc:creator>Rodrigo Vivi &lt;rodrigo.vivi@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>7f790dd21a931c61167f7bdc327aecf2cebad327 - Merge drm/drm-next into drm-misc-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#7f790dd21a931c61167f7bdc327aecf2cebad327</link>
        <description>Merge drm/drm-next into drm-misc-nextLet&apos;s kickstart the v6.20 (7.0?) release cycle.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Mon, 15 Dec 2025 09:27:39 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>24f171c7e145f43b9f187578e89b0982ce87e54c - Merge tag &apos;asoc-fix-v6.19-rc1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#24f171c7e145f43b9f187578e89b0982ce87e54c</link>
        <description>Merge tag &apos;asoc-fix-v6.19-rc1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linusASoC: Fixes for v6.19We&apos;ve been quite busy with fixes since the merge window, though not inany particularly exciting ways - the standout thing is the fix for _SXcontrols which were broken by a change to how we do clamping, otherwiseit&apos;s all fairly run of the mill fixes and quirks.

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Sun, 21 Dec 2025 11:11:11 +0100</pubDate>
        <dc:creator>Takashi Iwai &lt;tiwai@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>84318277d6334c6981ab326d4acc87c6a6ddc9b8 - Merge remote-tracking branch &apos;drm/drm-fixes&apos; into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#84318277d6334c6981ab326d4acc87c6a6ddc9b8</link>
        <description>Merge remote-tracking branch &apos;drm/drm-fixes&apos; into drm-misc-fixesPull in rc1 to include all changes since the merge window closed,and grab all fixes and changes from drm/drm-next.Signed-off-by: Maarten Lankhorst &lt;dev@lankhorst.se&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Mon, 15 Dec 2025 12:53:27 +0100</pubDate>
        <dc:creator>Maarten Lankhorst &lt;dev@lankhorst.se&gt;</dc:creator>
    </item>
<item>
        <title>51d90a15fedf8366cb96ef68d0ea2d0bf15417d2 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#51d90a15fedf8366cb96ef68d0ea2d0bf15417d2</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull KVM updates from Paolo Bonzini: &quot;ARM:   - Support for userspace handling of synchronous external aborts     (SEAs), allowing the VMM to potentially handle the abort in a     non-fatal manner   - Large rework of the VGIC&apos;s list register handling with the goal of     supporting more active/pending IRQs than available list registers     in hardware. In addition, the VGIC now supports EOImode==1 style     deactivations for IRQs which may occur on a separate vCPU than the     one that acked the IRQ   - Support for FEAT_XNX (user / privileged execute permissions) and     FEAT_HAF (hardware update to the Access Flag) in the software page     table walkers and shadow MMU   - Allow page table destruction to reschedule, fixing long     need_resched latencies observed when destroying a large VM   - Minor fixes to KVM and selftests  Loongarch:   - Get VM PMU capability from HW GCFG register   - Add AVEC basic support   - Use 64-bit register definition for EIOINTC   - Add KVM timer test cases for tools/selftests  RISC/V:   - SBI message passing (MPXY) support for KVM guest   - Give a new, more specific error subcode for the case when in-kernel     AIA virtualization fails to allocate IMSIC VS-file   - Support KVM_DIRTY_LOG_INITIALLY_SET, enabling dirty log gradually     in small chunks   - Fix guest page fault within HLV* instructions   - Flush VS-stage TLB after VCPU migration for Andes cores  s390:   - Always allocate ESCA (Extended System Control Area), instead of     starting with the basic SCA and converting to ESCA with the     addition of the 65th vCPU. The price is increased number of exits     (and worse performance) on z10 and earlier processor; ESCA was     introduced by z114/z196 in 2010   - VIRT_XFER_TO_GUEST_WORK support   - Operation exception forwarding support   - Cleanups  x86:   - Skip the costly &quot;zap all SPTEs&quot; on an MMIO generation wrap if MMIO     SPTE caching is disabled, as there can&apos;t be any relevant SPTEs to     zap   - Relocate a misplaced export   - Fix an async #PF bug where KVM would clear the completion queue     when the guest transitioned in and out of paging mode, e.g. when     handling an SMI and then returning to paged mode via RSM   - Leave KVM&apos;s user-return notifier registered even when disabling     virtualization, as long as kvm.ko is loaded. On reboot/shutdown,     keeping the notifier registered is ok; the kernel does not use the     MSRs and the callback will run cleanly and restore host MSRs if the     CPU manages to return to userspace before the system goes down   - Use the checked version of {get,put}_user()   - Fix a long-lurking bug where KVM&apos;s lack of catch-up logic for     periodic APIC timers can result in a hard lockup in the host   - Revert the periodic kvmclock sync logic now that KVM doesn&apos;t use a     clocksource that&apos;s subject to NTP corrections   - Clean up KVM&apos;s handling of MMIO Stale Data and L1TF, and bury the     latter behind CONFIG_CPU_MITIGATIONS   - Context switch XCR0, XSS, and PKRU outside of the entry/exit fast     path; the only reason they were handled in the fast path was to     paper of a bug in the core #MC code, and that has long since been     fixed   - Add emulator support for AVX MOV instructions, to play nice with     emulated devices whose guest drivers like to access PCI BARs with     large multi-byte instructions  x86 (AMD):   - Fix a few missing &quot;VMCB dirty&quot; bugs   - Fix the worst of KVM&apos;s lack of EFER.LMSLE emulation   - Add AVIC support for addressing 4k vCPUs in x2AVIC mode   - Fix incorrect handling of selective CR0 writes when checking     intercepts during emulation of L2 instructions   - Fix a currently-benign bug where KVM would clobber SPEC_CTRL[63:32]     on VMRUN and #VMEXIT   - Fix a bug where KVM corrupt the guest code stream when re-injecting     a soft interrupt if the guest patched the underlying code after the     VM-Exit, e.g. when Linux patches code with a temporary INT3   - Add KVM_X86_SNP_POLICY_BITS to advertise supported SNP policy bits     to userspace, and extend KVM &quot;support&quot; to all policy bits that     don&apos;t require any actual support from KVM  x86 (Intel):   - Use the root role from kvm_mmu_page to construct EPTPs instead of     the current vCPU state, partly as worthwhile cleanup, but mostly to     pave the way for tracking per-root TLB flushes, and elide EPT     flushes on pCPU migration if the root is clean from a previous     flush   - Add a few missing nested consistency checks   - Rip out support for doing &quot;early&quot; consistency checks via hardware     as the functionality hasn&apos;t been used in years and is no longer     useful in general; replace it with an off-by-default module param     to WARN if hardware fails a check that KVM does not perform   - Fix a currently-benign bug where KVM would drop the guest&apos;s     SPEC_CTRL[63:32] on VM-Enter   - Misc cleanups   - Overhaul the TDX code to address systemic races where KVM (acting     on behalf of userspace) could inadvertantly trigger lock contention     in the TDX-Module; KVM was either working around these in weird,     ugly ways, or was simply oblivious to them (though even Yan&apos;s     devilish selftests could only break individual VMs, not the host     kernel)   - Fix a bug where KVM could corrupt a vCPU&apos;s cpu_list when freeing a     TDX vCPU, if creating said vCPU failed partway through   - Fix a few sparse warnings (bad annotation, 0 != NULL)   - Use struct_size() to simplify copying TDX capabilities to userspace   - Fix a bug where TDX would effectively corrupt user-return MSR     values if the TDX Module rejects VP.ENTER and thus doesn&apos;t clobber     host MSRs as expected  Selftests:   - Fix a math goof in mmu_stress_test when running on a single-CPU     system/VM   - Forcefully override ARCH from x86_64 to x86 to play nice with     specifying ARCH=x86_64 on the command line   - Extend a bunch of nested VMX to validate nested SVM as well   - Add support for LA57 in the core VM_MODE_xxx macro, and add a test     to verify KVM can save/restore nested VMX state when L1 is using     5-level paging, but L2 is not   - Clean up the guest paging code in anticipation of sharing the core     logic for nested EPT and nested NPT  guest_memfd:   - Add NUMA mempolicy support for guest_memfd, and clean up a variety     of rough edges in guest_memfd along the way   - Define a CLASS to automatically handle get+put when grabbing a     guest_memfd from a memslot to make it harder to leak references   - Enhance KVM selftests to make it easer to develop and debug     selftests like those added for guest_memfd NUMA support, e.g. where     test and/or KVM bugs often result in hard-to-debug SIGBUS errors   - Misc cleanups  Generic:   - Use the recently-added WQ_PERCPU when creating the per-CPU     workqueue for irqfd cleanup   - Fix a goof in the dirty ring documentation   - Fix choice of target for directed yield across different calls to     kvm_vcpu_on_spin(); the function was always starting from the first     vCPU instead of continuing the round-robin search&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (260 commits)  KVM: arm64: at: Update AF on software walk only if VM has FEAT_HAFDBS  KVM: arm64: at: Use correct HA bit in TCR_EL2 when regime is EL2  KVM: arm64: Document KVM_PGTABLE_PROT_{UX,PX}  KVM: arm64: Fix spelling mistake &quot;Unexpeced&quot; -&gt; &quot;Unexpected&quot;  KVM: arm64: Add break to default case in kvm_pgtable_stage2_pte_prot()  KVM: arm64: Add endian casting to kvm_swap_s[12]_desc()  KVM: arm64: Fix compilation when CONFIG_ARM64_USE_LSE_ATOMICS=n  KVM: arm64: selftests: Add test for AT emulation  KVM: arm64: nv: Expose hardware access flag management to NV guests  KVM: arm64: nv: Implement HW access flag management in stage-2 SW PTW  KVM: arm64: Implement HW access flag management in stage-1 SW PTW  KVM: arm64: Propagate PTW errors up to AT emulation  KVM: arm64: Add helper for swapping guest descriptor  KVM: arm64: nv: Use pgtable definitions in stage-2 walk  KVM: arm64: Handle endianness in read helper for emulated PTW  KVM: arm64: nv: Stop passing vCPU through void ptr in S2 PTW  KVM: arm64: Call helper for reading descriptors directly  KVM: arm64: nv: Advertise support for FEAT_XNX  KVM: arm64: Teach ptdump about FEAT_XNX permissions  KVM: s390: Use generic VIRT_XFER_TO_GUEST_WORK functions  ...

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Sat, 06 Dec 2025 02:01:20 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>e0c26d47def7382d7dbd9cad58bc653aed75737a - Merge tag &apos;kvm-s390-next-6.19-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#e0c26d47def7382d7dbd9cad58bc653aed75737a</link>
        <description>Merge tag &apos;kvm-s390-next-6.19-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD- SCA rework- VIRT_XFER_TO_GUEST_WORK support- Operation exception forwarding support- Cleanups

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Tue, 02 Dec 2025 18:58:47 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>2bd1337a1295e012e60008ee21a64375e5234e12 - KVM: s390: Use generic VIRT_XFER_TO_GUEST_WORK functions</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#2bd1337a1295e012e60008ee21a64375e5234e12</link>
        <description>KVM: s390: Use generic VIRT_XFER_TO_GUEST_WORK functionsSwitch to using the generic infrastructure to check for and handle pendingwork before transitioning into guest mode.xfer_to_guest_mode_handle_work() does a few more things than the currentcode does when deciding whether or not to exit the __vcpu_run() loop. Theexittime tests from kvm-unit-tests, in my tests, were within a few percentcompared to before this series, which is within noise tolerance.Co-developed-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;Signed-off-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;Signed-off-by: Andrew Donnellan &lt;ajd@linux.ibm.com&gt;Acked-by: Janosch Frank &lt;frankja@linux.ibm.com&gt;[frankja@linux.ibm.com: Removed semicolon]Signed-off-by: Janosch Frank &lt;frankja@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Wed, 26 Nov 2025 06:33:12 +0100</pubDate>
        <dc:creator>Andrew Donnellan &lt;ajd@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>de8e8ebb1a7c5e2243fdb0409418484501e3b9b2 - Merge tag &apos;kvm-x86-tdx-6.19&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#de8e8ebb1a7c5e2243fdb0409418484501e3b9b2</link>
        <description>Merge tag &apos;kvm-x86-tdx-6.19&apos; of https://github.com/kvm-x86/linux into HEADKVM TDX changes for 6.19: - Overhaul the TDX code to address systemic races where KVM (acting on behalf   of userspace) could inadvertantly trigger lock contention in the TDX-Module,   which KVM was either working around in weird, ugly ways, or was simply   oblivious to (as proven by Yan tripping several KVM_BUG_ON()s with clever   selftests). - Fix a bug where KVM could corrupt a vCPU&apos;s cpu_list when freeing a vCPU if   creating said vCPU failed partway through. - Fix a few sparse warnings (bad annotation, 0 != NULL). - Use struct_size() to simplify copying capabilities to userspace.

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Wed, 26 Nov 2025 09:36:37 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>0a0da3f92118950862700497bc7917f0fbf6a6e8 - KVM: Make support for kvm_arch_vcpu_async_ioctl() mandatory</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/kvm/Kconfig#0a0da3f92118950862700497bc7917f0fbf6a6e8</link>
        <description>KVM: Make support for kvm_arch_vcpu_async_ioctl() mandatoryImplement kvm_arch_vcpu_async_ioctl() &quot;natively&quot; in x86 and arm64 insteadof relying on an #ifdef&apos;d stub, and drop HAVE_KVM_VCPU_ASYNC_IOCTL inanticipation of using the API on x86.  Once x86 uses the API, providing astub for one architecture and having all other architectures opt-inrequires more code than simply implementing the API in the lone holdout.Eliminating the Kconfig will also reduce churn if the API is renamed inthe future (spoiler alert).No functional change intended.Acked-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;Reviewed-by: Yan Zhao &lt;yan.y.zhao@intel.com&gt;Tested-by: Yan Zhao &lt;yan.y.zhao@intel.com&gt;Tested-by: Kai Huang &lt;kai.huang@intel.com&gt;Link: https://patch.msgid.link/20251030200951.3402865-2-seanjc@google.comSigned-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/arch/s390/kvm/Kconfig</description>
        <pubDate>Thu, 30 Oct 2025 21:09:24 +0100</pubDate>
        <dc:creator>Sean Christopherson &lt;seanjc@google.com&gt;</dc:creator>
    </item>
</channel>
</rss>
