<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>c17ee635fd3a482b2ad2bf5e269755c2eae5f25e - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#c17ee635fd3a482b2ad2bf5e269755c2eae5f25e</link>
        <description>Merge drm/drm-fixes into drm-misc-fixes7.0-rc1 was just released, let&apos;s merge it to kick the new release cycle.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Mon, 23 Feb 2026 10:09:45 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cb5573868ea85ddbc74dd9a917acd1e434d21390 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#cb5573868ea85ddbc74dd9a917acd1e434d21390</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull KVM updates from Paolo Bonzini: &quot;Loongarch:   - Add more CPUCFG mask bits   - Improve feature detection   - Add lazy load support for FPU and binary translation (LBT) register     state   - Fix return value for memory reads from and writes to in-kernel     devices   - Add support for detecting preemption from within a guest   - Add KVM steal time test case to tools/selftests  ARM:   - Add support for FEAT_IDST, allowing ID registers that are not     implemented to be reported as a normal trap rather than as an UNDEF     exception   - Add sanitisation of the VTCR_EL2 register, fixing a number of     UXN/PXN/XN bugs in the process   - Full handling of RESx bits, instead of only RES0, and resulting in     SCTLR_EL2 being added to the list of sanitised registers   - More pKVM fixes for features that are not supposed to be exposed to     guests   - Make sure that MTE being disabled on the pKVM host doesn&apos;t give it     the ability to attack the hypervisor   - Allow pKVM&apos;s host stage-2 mappings to use the Force Write Back     version of the memory attributes by using the &quot;pass-through&apos;     encoding   - Fix trapping of ICC_DIR_EL1 on GICv5 hosts emulating GICv3 for the     guest   - Preliminary work for guest GICv5 support   - A bunch of debugfs fixes, removing pointless custom iterators     stored in guest data structures   - A small set of FPSIMD cleanups   - Selftest fixes addressing the incorrect alignment of page     allocation   - Other assorted low-impact fixes and spelling fixes  RISC-V:   - Fixes for issues discoverd by KVM API fuzzing in     kvm_riscv_aia_imsic_has_attr(), kvm_riscv_aia_imsic_rw_attr(), and     kvm_riscv_vcpu_aia_imsic_update()   - Allow Zalasr, Zilsd and Zclsd extensions for Guest/VM   - Transparent huge page support for hypervisor page tables   - Adjust the number of available guest irq files based on MMIO     register sizes found in the device tree or the ACPI tables   - Add RISC-V specific paging modes to KVM selftests   - Detect paging mode at runtime for selftests  s390:   - Performance improvement for vSIE (aka nested virtualization)   - Completely new memory management. s390 was a special snowflake that     enlisted help from the architecture&apos;s page table management to     build hypervisor page tables, in particular enabling sharing the     last level of page tables. This however was a lot of code (~3K     lines) in order to support KVM, and also blocked several features.     The biggest advantages is that the page size of userspace is     completely independent of the page size used by the guest:     userspace can mix normal pages, THPs and hugetlbfs as it sees fit,     and in fact transparent hugepages were not possible before. It&apos;s     also now possible to have nested guests and guests with huge pages     running on the same host   - Maintainership change for s390 vfio-pci   - Small quality of life improvement for protected guests  x86:   - Add support for giving the guest full ownership of PMU hardware     (contexted switched around the fastpath run loop) and allowing     direct access to data MSRs and PMCs (restricted by the vPMU model).     KVM still intercepts access to control registers, e.g. to enforce     event filtering and to prevent the guest from profiling sensitive     host state. This is more accurate, since it has no risk of     contention and thus dropped events, and also has significantly less     overhead.     For more information, see the commit message for merge commit     bf2c3138ae36 (&quot;Merge tag &apos;kvm-x86-pmu-6.20&apos; ...&quot;)   - Disallow changing the virtual CPU model if L2 is active, for all     the same reasons KVM disallows change the model after the first     KVM_RUN   - Fix a bug where KVM would incorrectly reject host accesses to PV     MSRs when running with KVM_CAP_ENFORCE_PV_FEATURE_CPUID enabled,     even if those were advertised as supported to userspace,   - Fix a bug with protected guest state (SEV-ES/SNP and TDX) VMs,     where KVM would attempt to read CR3 configuring an async #PF entry   - Fail the build if EXPORT_SYMBOL_GPL or EXPORT_SYMBOL is used in KVM     (for x86 only) to enforce usage of EXPORT_SYMBOL_FOR_KVM_INTERNAL.     Only a few exports that are intended for external usage, and those     are allowed explicitly   - When checking nested events after a vCPU is unblocked, ignore     -EBUSY instead of WARNing. Userspace can sometimes put the vCPU     into what should be an impossible state, and spurious exit to     userspace on -EBUSY does not really do anything to solve the issue   - Also throw in the towel and drop the WARN on INIT/SIPI being     blocked when vCPU is in Wait-For-SIPI, which also resulted in     playing whack-a-mole with syzkaller stuffing architecturally     impossible states into KVM   - Add support for new Intel instructions that don&apos;t require anything     beyond enumerating feature flags to userspace   - Grab SRCU when reading PDPTRs in KVM_GET_SREGS2   - Add WARNs to guard against modifying KVM&apos;s CPU caps outside of the     intended setup flow, as nested VMX in particular is sensitive to     unexpected changes in KVM&apos;s golden configuration   - Add a quirk to allow userspace to opt-in to actually suppress EOI     broadcasts when the suppression feature is enabled by the guest     (currently limited to split IRQCHIP, i.e. userspace I/O APIC).     Sadly, simply fixing KVM to honor Suppress EOI Broadcasts isn&apos;t an     option as some userspaces have come to rely on KVM&apos;s buggy behavior     (KVM advertises Supress EOI Broadcast irrespective of whether or     not userspace I/O APIC supports Directed EOIs)   - Clean up KVM&apos;s handling of marking mapped vCPU pages dirty   - Drop a pile of *ancient* sanity checks hidden behind in KVM&apos;s     unused ASSERT() macro, most of which could be trivially triggered     by the guest and/or user, and all of which were useless   - Fold &quot;struct dest_map&quot; into its sole user, &quot;struct rtc_status&quot;, to     make it more obvious what the weird parameter is used for, and to     allow fropping these RTC shenanigans if CONFIG_KVM_IOAPIC=n   - Bury all of ioapic.h, i8254.h and related ioctls (including     KVM_CREATE_IRQCHIP) behind CONFIG_KVM_IOAPIC=y   - Add a regression test for recent APICv update fixes   - Handle &quot;hardware APIC ISR&quot;, a.k.a. SVI, updates in     kvm_apic_update_apicv() to consolidate the updates, and to     co-locate SVI updates with the updates for KVM&apos;s own cache of ISR     information   - Drop a dead function declaration   - Minor cleanups  x86 (Intel):   - Rework KVM&apos;s handling of VMCS updates while L2 is active to     temporarily switch to vmcs01 instead of deferring the update until     the next nested VM-Exit.     The deferred updates approach directly contributed to several bugs,     was proving to be a maintenance burden due to the difficulty in     auditing the correctness of deferred updates, and was polluting     &quot;struct nested_vmx&quot; with a growing pile of booleans   - Fix an SGX bug where KVM would incorrectly try to handle EPCM page     faults, and instead always reflect them into the guest. Since KVM     doesn&apos;t shadow EPCM entries, EPCM violations cannot be due to KVM     interference and can&apos;t be resolved by KVM   - Fix a bug where KVM would register its posted interrupt wakeup     handler even if loading kvm-intel.ko ultimately failed   - Disallow access to vmcb12 fields that aren&apos;t fully supported,     mostly to avoid weirdness and complexity for FRED and other     features, where KVM wants enable VMCS shadowing for fields that     conditionally exist   - Print out the &quot;bad&quot; offsets and values if kvm-intel.ko refuses to     load (or refuses to online a CPU) due to a VMCS config mismatch  x86 (AMD):   - Drop a user-triggerable WARN on nested_svm_load_cr3() failure   - Add support for virtualizing ERAPS. Note, correct virtualization of     ERAPS relies on an upcoming, publicly announced change in the APM     to reduce the set of conditions where hardware (i.e. KVM) *must*     flush the RAP   - Ignore nSVM intercepts for instructions that are not supported     according to L1&apos;s virtual CPU model   - Add support for expedited writes to the fast MMIO bus, a la VMX&apos;s     fastpath for EPT Misconfig   - Don&apos;t set GIF when clearing EFER.SVME, as GIF exists independently     of SVM, and allow userspace to restore nested state with GIF=0   - Treat exit_code as an unsigned 64-bit value through all of KVM   - Add support for fetching SNP certificates from userspace   - Fix a bug where KVM would use vmcb02 instead of vmcb01 when     emulating VMLOAD or VMSAVE on behalf of L2   - Misc fixes and cleanups  x86 selftests:   - Add a regression test for TPR&lt;=&gt;CR8 synchronization and IRQ masking   - Overhaul selftest&apos;s MMU infrastructure to genericize stage-2 MMU     support, and extend x86&apos;s infrastructure to support EPT and NPT     (for L2 guests)   - Extend several nested VMX tests to also cover nested SVM   - Add a selftest for nested VMLOAD/VMSAVE   - Rework the nested dirty log test, originally added as a regression     test for PML where KVM logged L2 GPAs instead of L1 GPAs, to     improve test coverage and to hopefully make the test easier to     understand and maintain  guest_memfd:   - Remove kvm_gmem_populate()&apos;s preparation tracking and half-baked     hugepage handling. SEV/SNP was the only user of the tracking and it     can do it via the RMP   - Retroactively document and enforce (for SNP) that     KVM_SEV_SNP_LAUNCH_UPDATE and KVM_TDX_INIT_MEM_REGION require the     source page to be 4KiB aligned, to avoid non-trivial complexity for     something that no known VMM seems to be doing and to avoid an API     special case for in-place conversion, which simply can&apos;t support     unaligned sources   - When populating guest_memfd memory, GUP the source page in common     code and pass the refcounted page to the vendor callback, instead     of letting vendor code do the heavy lifting. Doing so avoids a     looming deadlock bug with in-place due an AB-BA conflict betwee     mmap_lock and guest_memfd&apos;s filemap invalidate lock  Generic:   - Fix a bug where KVM would ignore the vCPU&apos;s selected address space     when creating a vCPU-specific mapping of guest memory. Actually     this bug could not be hit even on x86, the only architecture with     multiple address spaces, but it&apos;s a bug nevertheless&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (267 commits)  KVM: s390: Increase permitted SE header size to 1 MiB  MAINTAINERS: Replace backup for s390 vfio-pci  KVM: s390: vsie: Fix race in acquire_gmap_shadow()  KVM: s390: vsie: Fix race in walk_guest_tables()  KVM: s390: Use guest address to mark guest page dirty  irqchip/riscv-imsic: Adjust the number of available guest irq files  RISC-V: KVM: Transparent huge page support  RISC-V: KVM: selftests: Add Zalasr extensions to get-reg-list test  RISC-V: KVM: Allow Zalasr extensions for Guest/VM  KVM: riscv: selftests: Add riscv vm satp modes  KVM: riscv: selftests: add Zilsd and Zclsd extension to get-reg-list test  riscv: KVM: allow Zilsd and Zclsd extensions for Guest/VM  RISC-V: KVM: Skip IMSIC update if vCPU IMSIC state is not initialized  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_rw_attr()  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_has_attr()  RISC-V: KVM: Remove unnecessary &apos;ret&apos; assignment  KVM: s390: Add explicit padding to struct kvm_s390_keyop  KVM: LoongArch: selftests: Add steal time test case  LoongArch: KVM: Add paravirt vcpu_is_preempted() support in guest side  LoongArch: KVM: Add paravirt preempt feature in hypervisor side  ...

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Fri, 13 Feb 2026 20:31:15 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>b1195183ed42f1522fae3fe44ebee3af437aa000 - Merge tag &apos;kvm-s390-next-7.0-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#b1195183ed42f1522fae3fe44ebee3af437aa000</link>
        <description>Merge tag &apos;kvm-s390-next-7.0-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD- gmap rewrite: completely new memory management for kvm/s390- vSIE improvement- maintainership change for s390 vfio-pci- small quality of life improvement for protected guests

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Wed, 11 Feb 2026 18:52:27 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>cec38587a9e395576fb54ee9e077b037a50d9335 - KVM: s390: Remove gmap from s390/mm</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#cec38587a9e395576fb54ee9e077b037a50d9335</link>
        <description>KVM: s390: Remove gmap from s390/mmRemove the now unused include/asm/gmap.h and mm/gmap.c files.Acked-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Wed, 04 Feb 2026 16:02:54 +0100</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>f088104d837a991c65e51fa30bb4196169b3244d - Merge drm/drm-next into drm-intel-gt-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#f088104d837a991c65e51fa30bb4196169b3244d</link>
        <description>Merge drm/drm-next into drm-intel-gt-nextBackmerge in order to get the commit:  048832a3f400 (&quot;drm/i915: Refactor shmem_pwrite() to use kiocb and write_iter&quot;)To drm-intel-gt-next as there are followup fixes to be applied.Signed-off-by: Joonas Lahtinen &lt;joonas.lahtinen@linux.intel.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Tue, 16 Sep 2025 12:53:20 +0200</pubDate>
        <dc:creator>Joonas Lahtinen &lt;joonas.lahtinen@linux.intel.com&gt;</dc:creator>
    </item>
<item>
        <title>ab93e0dd72c37d378dd936f031ffb83ff2bd87ce - Merge branch &apos;next&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#ab93e0dd72c37d378dd936f031ffb83ff2bd87ce</link>
        <description>Merge branch &apos;next&apos; into for-linusPrepare input updates for 6.17 merge window.

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Wed, 06 Aug 2025 19:08:54 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>a7bee4e7f78089c101be2ad51f4b5ec64782053e - Merge tag &apos;ib-mfd-gpio-input-pwm-v6.17&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/lee/mfd into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#a7bee4e7f78089c101be2ad51f4b5ec64782053e</link>
        <description>Merge tag &apos;ib-mfd-gpio-input-pwm-v6.17&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/lee/mfd into nextMerge an immutable branch between MFD, GPIO, Input and PWM to resolveconflicts for the merge window pull request.

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Mon, 04 Aug 2025 08:28:48 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>74f1af95820fc2ee580a775a3a17c416db30b38c - Merge remote-tracking branch &apos;drm/drm-next&apos; into msm-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#74f1af95820fc2ee580a775a3a17c416db30b38c</link>
        <description>Merge remote-tracking branch &apos;drm/drm-next&apos; into msm-nextBack-merge drm-next to (indirectly) get arm-smmu updates for makingstall-on-fault more reliable.Signed-off-by: Rob Clark &lt;robin.clark@oss.qualcomm.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Sun, 29 Jun 2025 04:54:49 +0200</pubDate>
        <dc:creator>Rob Clark &lt;robin.clark@oss.qualcomm.com&gt;</dc:creator>
    </item>
<item>
        <title>c598d5eb9fb331ba17bc9ad67ae9a2231ca5aca5 - Merge drm/drm-next into drm-misc-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#c598d5eb9fb331ba17bc9ad67ae9a2231ca5aca5</link>
        <description>Merge drm/drm-next into drm-misc-nextBackmerging to forward to v6.16-rc1Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Wed, 11 Jun 2025 09:01:34 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>86e2d052c2320bf12571a5d96b16c2745e1cfc5e - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#86e2d052c2320bf12571a5d96b16c2745e1cfc5e</link>
        <description>Merge drm/drm-next into drm-xe-nextBackmerging to bring in 6.16Signed-off-by: Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Mon, 09 Jun 2025 18:26:55 +0200</pubDate>
        <dc:creator>Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;</dc:creator>
    </item>
<item>
        <title>34c55367af96f62e89221444f04487440ebc6487 - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#34c55367af96f62e89221444f04487440ebc6487</link>
        <description>Merge drm/drm-next into drm-intel-nextSync to v6.16-rc1, among other things to get the fixed size GENMASK_U*()and BIT_U*() macros.Signed-off-by: Jani Nikula &lt;jani.nikula@intel.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Mon, 09 Jun 2025 11:40:46 +0200</pubDate>
        <dc:creator>Jani Nikula &lt;jani.nikula@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>bbfd5594756011167b8f8de9a00e0c946afda1e6 - Merge drm/drm-next into drm-intel-gt-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#bbfd5594756011167b8f8de9a00e0c946afda1e6</link>
        <description>Merge drm/drm-next into drm-intel-gt-nextNeed to pull in a67221b5eb8d (&quot;drm/i915/dp: Return min bpc supported by source instead of 0&quot;)in order to fix build breakage on GCC 9.4.0 (from Ubuntu 20.04).Signed-off-by: Joonas Lahtinen &lt;joonas.lahtinen@linux.intel.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Wed, 28 May 2025 09:20:17 +0200</pubDate>
        <dc:creator>Joonas Lahtinen &lt;joonas.lahtinen@linux.intel.com&gt;</dc:creator>
    </item>
<item>
        <title>db5302ae571beec635c1a96e7f72926a4e65195e - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#db5302ae571beec635c1a96e7f72926a4e65195e</link>
        <description>Merge drm/drm-next into drm-intel-nextBackmerge to sync with v6.15-rc, xe, and specifically async flip changesin drm-misc.Signed-off-by: Jani Nikula &lt;jani.nikula@intel.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Fri, 16 May 2025 09:22:36 +0200</pubDate>
        <dc:creator>Jani Nikula &lt;jani.nikula@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>7f9039c524a351c684149ecf1b3c5145a0dff2fe - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#7f9039c524a351c684149ecf1b3c5145a0dff2fe</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull more kvm updates from Paolo Bonzini:  Generic:   - Clean up locking of all vCPUs for a VM by using the *_nest_lock()     family of functions, and move duplicated code to virt/kvm/. kernel/     patches acked by Peter Zijlstra   - Add MGLRU support to the access tracking perf test  ARM fixes:   - Make the irqbypass hooks resilient to changes in the GSI&lt;-&gt;MSI     routing, avoiding behind stale vLPI mappings being left behind. The     fix is to resolve the VGIC IRQ using the host IRQ (which is stable)     and nuking the vLPI mapping upon a routing change   - Close another VGIC race where vCPU creation races with VGIC     creation, leading to in-flight vCPUs entering the kernel w/o     private IRQs allocated   - Fix a build issue triggered by the recently added workaround for     Ampere&apos;s AC04_CPU_23 erratum   - Correctly sign-extend the VA when emulating a TLBI instruction     potentially targeting a VNCR mapping   - Avoid dereferencing a NULL pointer in the VGIC debug code, which     can happen if the device doesn&apos;t have any mapping yet  s390:   - Fix interaction between some filesystems and Secure Execution   - Some cleanups and refactorings, preparing for an upcoming big     series  x86:   - Wait for target vCPU to ack KVM_REQ_UPDATE_PROTECTED_GUEST_STATE     to fix a race between AP destroy and VMRUN   - Decrypt and dump the VMSA in dump_vmcb() if debugging enabled for     the VM   - Refine and harden handling of spurious faults   - Add support for ALLOWED_SEV_FEATURES   - Add #VMGEXIT to the set of handlers special cased for     CONFIG_RETPOLINE=y   - Treat DEBUGCTL[5:2] as reserved to pave the way for virtualizing     features that utilize those bits   - Don&apos;t account temporary allocations in sev_send_update_data()   - Add support for KVM_CAP_X86_BUS_LOCK_EXIT on SVM, via Bus Lock     Threshold   - Unify virtualization of IBRS on nested VM-Exit, and cross-vCPU     IBPB, between SVM and VMX   - Advertise support to userspace for WRMSRNS and PREFETCHI   - Rescan I/O APIC routes after handling EOI that needed to be     intercepted due to the old/previous routing, but not the     new/current routing   - Add a module param to control and enumerate support for device     posted interrupts   - Fix a potential overflow with nested virt on Intel systems running     32-bit kernels   - Flush shadow VMCSes on emergency reboot   - Add support for SNP to the various SEV selftests   - Add a selftest to verify fastops instructions via forced emulation   - Refine and optimize KVM&apos;s software processing of the posted     interrupt bitmap, and share the harvesting code between KVM and the     kernel&apos;s Posted MSI handler&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (93 commits)  rtmutex_api: provide correct extern functions  KVM: arm64: vgic-debug: Avoid dereferencing NULL ITE pointer  KVM: arm64: vgic-init: Plug vCPU vs. VGIC creation race  KVM: arm64: Unmap vLPIs affected by changes to GSI routing information  KVM: arm64: Resolve vLPI by host IRQ in vgic_v4_unset_forwarding()  KVM: arm64: Protect vLPI translation with vgic_irq::irq_lock  KVM: arm64: Use lock guard in vgic_v4_set_forwarding()  KVM: arm64: Mask out non-VA bits from TLBI VA* on VNCR invalidation  arm64: sysreg: Drag linux/kconfig.h to work around vdso build issue  KVM: s390: Simplify and move pv code  KVM: s390: Refactor and split some gmap helpers  KVM: s390: Remove unneeded srcu lock  s390: Remove unneeded includes  s390/uv: Improve splitting of large folios that cannot be split while dirty  s390/uv: Always return 0 from s390_wiggle_split_folio() if successful  s390/uv: Don&apos;t return 0 from make_hva_secure() if the operation was not successful  rust: add helper for mutex_trylock  RISC-V: KVM: use kvm_trylock_all_vcpus when locking all vCPUs  KVM: arm64: use kvm_trylock_all_vcpus when locking all vCPUs  x86: KVM: SVM: use kvm_lock_all_vcpus instead of a custom implementation  ...

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Mon, 02 Jun 2025 21:24:58 +0200</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>4f9786035f9e519db41375818e1d0b5f20da2f10 - Merge branch &apos;next&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#4f9786035f9e519db41375818e1d0b5f20da2f10</link>
        <description>Merge branch &apos;next&apos; into for-linusPrepare input updates for 6.16 merge window.

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Mon, 02 Jun 2025 06:41:07 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>e9ba21fb5dcf88a9c0dee28df16866d3824adaf1 - Merge tag &apos;kvm-s390-next-6.16-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#e9ba21fb5dcf88a9c0dee28df16866d3824adaf1</link>
        <description>Merge tag &apos;kvm-s390-next-6.16-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD* Fix interaction between some filesystems and Secure Execution* Some cleanups and refactorings, preparing for an upcoming big series

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Wed, 28 May 2025 19:21:16 +0200</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>200197908dc4afe03a75234478e6a14634a0a788 - KVM: s390: Refactor and split some gmap helpers</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#200197908dc4afe03a75234478e6a14634a0a788</link>
        <description>KVM: s390: Refactor and split some gmap helpersRefactor some gmap functions; move the implementation into a separatefile with only helper functions. The new helper functions work on vmaddresses, leaving all gmap logic in the gmap functions, which mostlybecome just wrappers.The whole gmap handling is going to be moved inside KVM soon, but thehelper functions need to touch core mm functions, and thus need tostay in the core of kernel.Reviewed-by: Steffen Eiden &lt;seiden@linux.ibm.com&gt;Reviewed-by: Christoph Schlameuss &lt;schlameuss@linux.ibm.com&gt;Acked-by: Janosch Frank &lt;frankja@linux.ibm.com&gt;Link: https://lore.kernel.org/r/20250528095502.226213-4-imbrenda@linux.ibm.comSigned-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;Message-ID: &lt;20250528095502.226213-4-imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Wed, 28 May 2025 11:55:01 +0200</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>d51b9d81f7883f526b26e3ab903e646274aebeb1 - Merge tag &apos;v6.15-rc6&apos; into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#d51b9d81f7883f526b26e3ab903e646274aebeb1</link>
        <description>Merge tag &apos;v6.15-rc6&apos; into nextSync up with mainline to bring in xpad controller changes.

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Fri, 16 May 2025 01:20:39 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>844e31bbaef7c8a6ff2c0fbac45c0c85b5484482 - Merge remote-tracking branch &apos;drm-misc/drm-misc-next&apos; into msm-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#844e31bbaef7c8a6ff2c0fbac45c0c85b5484482</link>
        <description>Merge remote-tracking branch &apos;drm-misc/drm-misc-next&apos; into msm-nextMerge drm-misc-next to get commit Fixes: fec450ca15af (&quot;drm/display:hdmi: provide central data authority for ACR params&quot;).Signed-off-by: Rob Clark &lt;robdclark@chromium.org&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Tue, 29 Apr 2025 22:42:29 +0200</pubDate>
        <dc:creator>Rob Clark &lt;robdclark@chromium.org&gt;</dc:creator>
    </item>
<item>
        <title>3ab7ae8e07f888f223027f0ef84d33e43919ad55 - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/s390/mm/Makefile#3ab7ae8e07f888f223027f0ef84d33e43919ad55</link>
        <description>Merge drm/drm-next into drm-xe-nextBackmerge to bring in linux 6.15-rc.Signed-off-by: Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;

            List of files:
            /linux/arch/s390/mm/Makefile</description>
        <pubDate>Thu, 24 Apr 2025 13:34:55 +0200</pubDate>
        <dc:creator>Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;</dc:creator>
    </item>
</channel>
</rss>
