<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>f4b369c6fe0ceaba2da2daff8c9eb415f85926dd - Merge branch &apos;next&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#f4b369c6fe0ceaba2da2daff8c9eb415f85926dd</link>
        <description>Merge branch &apos;next&apos; into for-linusPrepare input updates for 7.1 merge window.

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Mon, 20 Apr 2026 03:28:57 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>0421ccdfad0d92713a812a5aeb7d07b0ea7213c8 - Merge tag &apos;v7.0-rc3&apos; into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#0421ccdfad0d92713a812a5aeb7d07b0ea7213c8</link>
        <description>Merge tag &apos;v7.0-rc3&apos; into nextSync up with the mainline to brig up the latest changes, specificallychanges to ALPS driver.

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Thu, 12 Mar 2026 18:44:42 +0100</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>3e9e952bb3139ad1e08f3e1960239c2988ab90c9 - Merge branch &apos;for-7.1-printf-kunit-build&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#3e9e952bb3139ad1e08f3e1960239c2988ab90c9</link>
        <description>Merge branch &apos;for-7.1-printf-kunit-build&apos; into for-linus

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Mon, 20 Apr 2026 13:41:28 +0200</pubDate>
        <dc:creator>Petr Mladek &lt;pmladek@suse.com&gt;</dc:creator>
    </item>
<item>
        <title>42d3b66d4cdbacfc9d120d2301b8de89cc29a914 - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#42d3b66d4cdbacfc9d120d2301b8de89cc29a914</link>
        <description>Merge drm/drm-next into drm-xe-nextBackmerging to bring in 7.00-rc3. Important ahead GPU SVM merging THPsupport.Signed-off-by: Matthew Brost &lt;matthew.brost@intel.com&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Thu, 12 Mar 2026 15:17:56 +0100</pubDate>
        <dc:creator>Matthew Brost &lt;matthew.brost@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>f09812b85fa6f41058bcc46e70ac406bf9b0493a - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#f09812b85fa6f41058bcc46e70ac406bf9b0493a</link>
        <description>Merge drm/drm-next into drm-intel-nextSync with v7.0-rc1 which contains a few treewide changes affecting i915.Signed-off-by: Jani Nikula &lt;jani.nikula@intel.com&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Wed, 25 Feb 2026 12:23:04 +0100</pubDate>
        <dc:creator>Jani Nikula &lt;jani.nikula@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>8b85987d3cf50178f67618122d9f3bb202f62f42 - Merge drm/drm-next into drm-misc-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#8b85987d3cf50178f67618122d9f3bb202f62f42</link>
        <description>Merge drm/drm-next into drm-misc-nextLet&apos;s merge 7.0-rc1 to start the new drm-misc-next windowSigned-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Mon, 23 Feb 2026 11:48:20 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>c17ee635fd3a482b2ad2bf5e269755c2eae5f25e - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#c17ee635fd3a482b2ad2bf5e269755c2eae5f25e</link>
        <description>Merge drm/drm-fixes into drm-misc-fixes7.0-rc1 was just released, let&apos;s merge it to kick the new release cycle.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Mon, 23 Feb 2026 10:09:45 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cb5573868ea85ddbc74dd9a917acd1e434d21390 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#cb5573868ea85ddbc74dd9a917acd1e434d21390</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull KVM updates from Paolo Bonzini: &quot;Loongarch:   - Add more CPUCFG mask bits   - Improve feature detection   - Add lazy load support for FPU and binary translation (LBT) register     state   - Fix return value for memory reads from and writes to in-kernel     devices   - Add support for detecting preemption from within a guest   - Add KVM steal time test case to tools/selftests  ARM:   - Add support for FEAT_IDST, allowing ID registers that are not     implemented to be reported as a normal trap rather than as an UNDEF     exception   - Add sanitisation of the VTCR_EL2 register, fixing a number of     UXN/PXN/XN bugs in the process   - Full handling of RESx bits, instead of only RES0, and resulting in     SCTLR_EL2 being added to the list of sanitised registers   - More pKVM fixes for features that are not supposed to be exposed to     guests   - Make sure that MTE being disabled on the pKVM host doesn&apos;t give it     the ability to attack the hypervisor   - Allow pKVM&apos;s host stage-2 mappings to use the Force Write Back     version of the memory attributes by using the &quot;pass-through&apos;     encoding   - Fix trapping of ICC_DIR_EL1 on GICv5 hosts emulating GICv3 for the     guest   - Preliminary work for guest GICv5 support   - A bunch of debugfs fixes, removing pointless custom iterators     stored in guest data structures   - A small set of FPSIMD cleanups   - Selftest fixes addressing the incorrect alignment of page     allocation   - Other assorted low-impact fixes and spelling fixes  RISC-V:   - Fixes for issues discoverd by KVM API fuzzing in     kvm_riscv_aia_imsic_has_attr(), kvm_riscv_aia_imsic_rw_attr(), and     kvm_riscv_vcpu_aia_imsic_update()   - Allow Zalasr, Zilsd and Zclsd extensions for Guest/VM   - Transparent huge page support for hypervisor page tables   - Adjust the number of available guest irq files based on MMIO     register sizes found in the device tree or the ACPI tables   - Add RISC-V specific paging modes to KVM selftests   - Detect paging mode at runtime for selftests  s390:   - Performance improvement for vSIE (aka nested virtualization)   - Completely new memory management. s390 was a special snowflake that     enlisted help from the architecture&apos;s page table management to     build hypervisor page tables, in particular enabling sharing the     last level of page tables. This however was a lot of code (~3K     lines) in order to support KVM, and also blocked several features.     The biggest advantages is that the page size of userspace is     completely independent of the page size used by the guest:     userspace can mix normal pages, THPs and hugetlbfs as it sees fit,     and in fact transparent hugepages were not possible before. It&apos;s     also now possible to have nested guests and guests with huge pages     running on the same host   - Maintainership change for s390 vfio-pci   - Small quality of life improvement for protected guests  x86:   - Add support for giving the guest full ownership of PMU hardware     (contexted switched around the fastpath run loop) and allowing     direct access to data MSRs and PMCs (restricted by the vPMU model).     KVM still intercepts access to control registers, e.g. to enforce     event filtering and to prevent the guest from profiling sensitive     host state. This is more accurate, since it has no risk of     contention and thus dropped events, and also has significantly less     overhead.     For more information, see the commit message for merge commit     bf2c3138ae36 (&quot;Merge tag &apos;kvm-x86-pmu-6.20&apos; ...&quot;)   - Disallow changing the virtual CPU model if L2 is active, for all     the same reasons KVM disallows change the model after the first     KVM_RUN   - Fix a bug where KVM would incorrectly reject host accesses to PV     MSRs when running with KVM_CAP_ENFORCE_PV_FEATURE_CPUID enabled,     even if those were advertised as supported to userspace,   - Fix a bug with protected guest state (SEV-ES/SNP and TDX) VMs,     where KVM would attempt to read CR3 configuring an async #PF entry   - Fail the build if EXPORT_SYMBOL_GPL or EXPORT_SYMBOL is used in KVM     (for x86 only) to enforce usage of EXPORT_SYMBOL_FOR_KVM_INTERNAL.     Only a few exports that are intended for external usage, and those     are allowed explicitly   - When checking nested events after a vCPU is unblocked, ignore     -EBUSY instead of WARNing. Userspace can sometimes put the vCPU     into what should be an impossible state, and spurious exit to     userspace on -EBUSY does not really do anything to solve the issue   - Also throw in the towel and drop the WARN on INIT/SIPI being     blocked when vCPU is in Wait-For-SIPI, which also resulted in     playing whack-a-mole with syzkaller stuffing architecturally     impossible states into KVM   - Add support for new Intel instructions that don&apos;t require anything     beyond enumerating feature flags to userspace   - Grab SRCU when reading PDPTRs in KVM_GET_SREGS2   - Add WARNs to guard against modifying KVM&apos;s CPU caps outside of the     intended setup flow, as nested VMX in particular is sensitive to     unexpected changes in KVM&apos;s golden configuration   - Add a quirk to allow userspace to opt-in to actually suppress EOI     broadcasts when the suppression feature is enabled by the guest     (currently limited to split IRQCHIP, i.e. userspace I/O APIC).     Sadly, simply fixing KVM to honor Suppress EOI Broadcasts isn&apos;t an     option as some userspaces have come to rely on KVM&apos;s buggy behavior     (KVM advertises Supress EOI Broadcast irrespective of whether or     not userspace I/O APIC supports Directed EOIs)   - Clean up KVM&apos;s handling of marking mapped vCPU pages dirty   - Drop a pile of *ancient* sanity checks hidden behind in KVM&apos;s     unused ASSERT() macro, most of which could be trivially triggered     by the guest and/or user, and all of which were useless   - Fold &quot;struct dest_map&quot; into its sole user, &quot;struct rtc_status&quot;, to     make it more obvious what the weird parameter is used for, and to     allow fropping these RTC shenanigans if CONFIG_KVM_IOAPIC=n   - Bury all of ioapic.h, i8254.h and related ioctls (including     KVM_CREATE_IRQCHIP) behind CONFIG_KVM_IOAPIC=y   - Add a regression test for recent APICv update fixes   - Handle &quot;hardware APIC ISR&quot;, a.k.a. SVI, updates in     kvm_apic_update_apicv() to consolidate the updates, and to     co-locate SVI updates with the updates for KVM&apos;s own cache of ISR     information   - Drop a dead function declaration   - Minor cleanups  x86 (Intel):   - Rework KVM&apos;s handling of VMCS updates while L2 is active to     temporarily switch to vmcs01 instead of deferring the update until     the next nested VM-Exit.     The deferred updates approach directly contributed to several bugs,     was proving to be a maintenance burden due to the difficulty in     auditing the correctness of deferred updates, and was polluting     &quot;struct nested_vmx&quot; with a growing pile of booleans   - Fix an SGX bug where KVM would incorrectly try to handle EPCM page     faults, and instead always reflect them into the guest. Since KVM     doesn&apos;t shadow EPCM entries, EPCM violations cannot be due to KVM     interference and can&apos;t be resolved by KVM   - Fix a bug where KVM would register its posted interrupt wakeup     handler even if loading kvm-intel.ko ultimately failed   - Disallow access to vmcb12 fields that aren&apos;t fully supported,     mostly to avoid weirdness and complexity for FRED and other     features, where KVM wants enable VMCS shadowing for fields that     conditionally exist   - Print out the &quot;bad&quot; offsets and values if kvm-intel.ko refuses to     load (or refuses to online a CPU) due to a VMCS config mismatch  x86 (AMD):   - Drop a user-triggerable WARN on nested_svm_load_cr3() failure   - Add support for virtualizing ERAPS. Note, correct virtualization of     ERAPS relies on an upcoming, publicly announced change in the APM     to reduce the set of conditions where hardware (i.e. KVM) *must*     flush the RAP   - Ignore nSVM intercepts for instructions that are not supported     according to L1&apos;s virtual CPU model   - Add support for expedited writes to the fast MMIO bus, a la VMX&apos;s     fastpath for EPT Misconfig   - Don&apos;t set GIF when clearing EFER.SVME, as GIF exists independently     of SVM, and allow userspace to restore nested state with GIF=0   - Treat exit_code as an unsigned 64-bit value through all of KVM   - Add support for fetching SNP certificates from userspace   - Fix a bug where KVM would use vmcb02 instead of vmcb01 when     emulating VMLOAD or VMSAVE on behalf of L2   - Misc fixes and cleanups  x86 selftests:   - Add a regression test for TPR&lt;=&gt;CR8 synchronization and IRQ masking   - Overhaul selftest&apos;s MMU infrastructure to genericize stage-2 MMU     support, and extend x86&apos;s infrastructure to support EPT and NPT     (for L2 guests)   - Extend several nested VMX tests to also cover nested SVM   - Add a selftest for nested VMLOAD/VMSAVE   - Rework the nested dirty log test, originally added as a regression     test for PML where KVM logged L2 GPAs instead of L1 GPAs, to     improve test coverage and to hopefully make the test easier to     understand and maintain  guest_memfd:   - Remove kvm_gmem_populate()&apos;s preparation tracking and half-baked     hugepage handling. SEV/SNP was the only user of the tracking and it     can do it via the RMP   - Retroactively document and enforce (for SNP) that     KVM_SEV_SNP_LAUNCH_UPDATE and KVM_TDX_INIT_MEM_REGION require the     source page to be 4KiB aligned, to avoid non-trivial complexity for     something that no known VMM seems to be doing and to avoid an API     special case for in-place conversion, which simply can&apos;t support     unaligned sources   - When populating guest_memfd memory, GUP the source page in common     code and pass the refcounted page to the vendor callback, instead     of letting vendor code do the heavy lifting. Doing so avoids a     looming deadlock bug with in-place due an AB-BA conflict betwee     mmap_lock and guest_memfd&apos;s filemap invalidate lock  Generic:   - Fix a bug where KVM would ignore the vCPU&apos;s selected address space     when creating a vCPU-specific mapping of guest memory. Actually     this bug could not be hit even on x86, the only architecture with     multiple address spaces, but it&apos;s a bug nevertheless&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (267 commits)  KVM: s390: Increase permitted SE header size to 1 MiB  MAINTAINERS: Replace backup for s390 vfio-pci  KVM: s390: vsie: Fix race in acquire_gmap_shadow()  KVM: s390: vsie: Fix race in walk_guest_tables()  KVM: s390: Use guest address to mark guest page dirty  irqchip/riscv-imsic: Adjust the number of available guest irq files  RISC-V: KVM: Transparent huge page support  RISC-V: KVM: selftests: Add Zalasr extensions to get-reg-list test  RISC-V: KVM: Allow Zalasr extensions for Guest/VM  KVM: riscv: selftests: Add riscv vm satp modes  KVM: riscv: selftests: add Zilsd and Zclsd extension to get-reg-list test  riscv: KVM: allow Zilsd and Zclsd extensions for Guest/VM  RISC-V: KVM: Skip IMSIC update if vCPU IMSIC state is not initialized  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_rw_attr()  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_has_attr()  RISC-V: KVM: Remove unnecessary &apos;ret&apos; assignment  KVM: s390: Add explicit padding to struct kvm_s390_keyop  KVM: LoongArch: selftests: Add steal time test case  LoongArch: KVM: Add paravirt vcpu_is_preempted() support in guest side  LoongArch: KVM: Add paravirt preempt feature in hypervisor side  ...

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Fri, 13 Feb 2026 20:31:15 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>9e03b7caf4e65f5a5841dfed540fdcc3ff061734 - Merge tag &apos;kvm-x86-misc-6.20&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#9e03b7caf4e65f5a5841dfed540fdcc3ff061734</link>
        <description>Merge tag &apos;kvm-x86-misc-6.20&apos; of https://github.com/kvm-x86/linux into HEADKVM x86 misc changes for 6.20 - Disallow changing the virtual CPU model if L2 is active, for all the same   reasons KVM disallows change the model after the first KVM_RUN. - Fix a bug where KVM would incorrectly reject host accesses to PV MSRs that   were advertised as supported to userspace when running with   KVM_CAP_ENFORCE_PV_FEATURE_CPUID enabled. - Fix a bug where KVM would attempt to read protect guest state (CR3) when   configuring an async #PF entry. - Fail the build if EXPORT_SYMBOL_GPL or EXPORT_SYMBOL is used in KVM (for x86   only) to enforce usage of EXPORT_SYMBOL_FOR_KVM_INTERNAL.  Explicitly allow   the few exports that are intended for external usage. - Ignore -EBUSY when checking nested events after a vCPU exits blocking as   the WARN is user-triggerable, and because exiting to userspace on -EBUSY   does more harm than good in pretty much every situation. - Throw in the towel and drop the WARN on INIT/SIPI being blocked when vCPU is   in Wait-For-SIPI, as playing whack-a-mole with syzkaller turned out to be an   unwinnable game. - Add support for new Intel instructions that don&apos;t require anything beyond   enumerating feature flags to userspace. - Grab SRCU when reading PDPTRs in KVM_GET_SREGS2. - Add WARNs to guard against modifying KVM&apos;s CPU caps outside of the intended   setup flow, as nested VMX in particular is sensitive to unexpected changes   in KVM&apos;s golden configuration. - Add a quirk to allow userspace to opt-in to actually suppress EOI broadcasts   when the suppression feature is enabled by the guest (currently limited to   split IRQCHIP, i.e. userspace I/O APIC).  Sadly, simply fixing KVM to honor   Suppress EOI Broadcasts isn&apos;t an option as some userspaces have come to rely   on KVM&apos;s buggy behavior (KVM advertises Supress EOI Broadcast irrespective   of whether or not userspace I/O APIC supports Directed EOIs). - Minor cleanups.

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Mon, 09 Feb 2026 18:53:47 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>fc4d3a6558af99e7b6a2ede6a6e6605be41da0ee - KVM: x86: Enforce use of EXPORT_SYMBOL_FOR_KVM_INTERNAL</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#fc4d3a6558af99e7b6a2ede6a6e6605be41da0ee</link>
        <description>KVM: x86: Enforce use of EXPORT_SYMBOL_FOR_KVM_INTERNALAdd a (gnarly) inline &quot;script&quot; in the Makefile to fail the build if thereis EXPORT_SYMBOL_GPL or EXPORT_SYMBOL usage in virt/kvm or arch/x86/kvmbeyond the known-good/expected exports for other modules.  Remembering touse EXPORT_SYMBOL_FOR_KVM_INTERNAL is surprisingly difficult, and hopingto detect &quot;bad&quot; exports via code review is not a robust long-term strategy.Jump through a pile of hoops to coerce make into printing a human-friendlyerror message, with the offending files+lines cleanly separated.E.g. where &lt;srctree&gt; is the resolution of $(srctree), i.e. &apos;.&apos; for in-treebuilds, and the absolute path for out-of-tree-builds:  &lt;srctree&gt;/arch/x86/kvm/Makefile:97: *** ERROR ***  found 2 unwanted occurrences of EXPORT_SYMBOL_GPL:    &lt;srctree&gt;/arch/x86/kvm/x86.c:686:EXPORT_SYMBOL_GPL(__kvm_set_user_return_msr);    &lt;srctree&gt;/arch/x86/kvm/x86.c:703:EXPORT_SYMBOL_GPL(kvm_set_user_return_msr);  in directories:    &lt;srctree&gt;/arch/x86/kvm    &lt;srctree&gt;/virt/kvm  Use EXPORT_SYMBOL_FOR_KVM_INTERNAL, not EXPORT_SYMBOL_GPL.  Stop.and  &lt;srctree&gt;/arch/x86/kvm/Makefile:98: *** ERROR ***  found 1 unwanted occurrences of EXPORT_SYMBOL:    &lt;srctree&gt;/arch/x86/kvm/x86.c:709:EXPORT_SYMBOL(kvm_get_user_return_msr);  in directories:    &lt;srctree&gt;/arch/x86/kvm    &lt;srctree&gt;/virt/kvm  Use EXPORT_SYMBOL_FOR_KVM_INTERNAL, not EXPORT_SYMBOL.  Stop.Put the enforcement in x86&apos;s Makefile even though the rule itself appliesto virt/kvm, as putting the enforcement in virt/kvm/Makefile.kvm wouldeffectively require exempting every architecture except x86.  PPC is theonly other architecture with sub-modules, and PPC hasn&apos;t been switched touse EXPORT_SYMBOL_FOR_KVM_INTERNAL (and given its nearly-orphaned state,likely never will).  And for KVM architectures without sub-modules, thatmeans that, barring truly spurious exports, the exports are intended fornon-KVM usage and thus shouldn&apos;t be using EXPORT_SYMBOL_FOR_KVM_INTERNAL.Tested-by: Chao Gao &lt;chao.gao@intel.com&gt;Link: https://patch.msgid.link/20251121190514.293385-1-seanjc@google.comSigned-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Fri, 21 Nov 2025 20:05:14 +0100</pubDate>
        <dc:creator>Sean Christopherson &lt;seanjc@google.com&gt;</dc:creator>
    </item>
<item>
        <title>cb9f145f638d7afa633632a9290d6ad06caeb8ee - Merge remote-tracking branch &apos;drm/drm-next&apos; into msm-next-robclark</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#cb9f145f638d7afa633632a9290d6ad06caeb8ee</link>
        <description>Merge remote-tracking branch &apos;drm/drm-next&apos; into msm-next-robclarkBack-merge drm-next to get caught up.Signed-off-by: Rob Clark &lt;robin.clark@oss.qualcomm.com&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Sat, 01 Nov 2025 13:47:30 +0100</pubDate>
        <dc:creator>Rob Clark &lt;robin.clark@oss.qualcomm.com&gt;</dc:creator>
    </item>
<item>
        <title>f088104d837a991c65e51fa30bb4196169b3244d - Merge drm/drm-next into drm-intel-gt-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#f088104d837a991c65e51fa30bb4196169b3244d</link>
        <description>Merge drm/drm-next into drm-intel-gt-nextBackmerge in order to get the commit:  048832a3f400 (&quot;drm/i915: Refactor shmem_pwrite() to use kiocb and write_iter&quot;)To drm-intel-gt-next as there are followup fixes to be applied.Signed-off-by: Joonas Lahtinen &lt;joonas.lahtinen@linux.intel.com&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Tue, 16 Sep 2025 12:53:20 +0200</pubDate>
        <dc:creator>Joonas Lahtinen &lt;joonas.lahtinen@linux.intel.com&gt;</dc:creator>
    </item>
<item>
        <title>a53d0cf7f1cb3182ad533ff5cacfa5fd29c419ad - Merge commit &apos;linus&apos; into core/bugs, to resolve conflicts</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#a53d0cf7f1cb3182ad533ff5cacfa5fd29c419ad</link>
        <description>Merge commit &apos;linus&apos; into core/bugs, to resolve conflictsResolve conflicts with this commit that was developed in parallelduring the merge window: 8c8efa93db68 (&quot;x86/bug: Add ARCH_WARN_ASM macro for BUG/WARN asm code sharing with Rust&quot;) Conflicts:	arch/riscv/include/asm/bug.h	arch/x86/include/asm/bug.hSigned-off-by: Ingo Molnar &lt;mingo@kernel.org&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Tue, 05 Aug 2025 11:15:34 +0200</pubDate>
        <dc:creator>Ingo Molnar &lt;mingo@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>8b87f67b4c87452e21721887fa8dec1f4c6b2b7c - Merge branch &apos;next&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#8b87f67b4c87452e21721887fa8dec1f4c6b2b7c</link>
        <description>Merge branch &apos;next&apos; into for-linusPrepare input updates for 6.18 merge window.

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Wed, 08 Oct 2025 06:53:13 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>4b051897df2375414587a245ecb9bb1a4d26b3b8 - Merge tag &apos;v6.17-rc2&apos; into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#4b051897df2375414587a245ecb9bb1a4d26b3b8</link>
        <description>Merge tag &apos;v6.17-rc2&apos; into HEADSync up with mainline to bring in changes to include/linux/sprintf.h

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Thu, 21 Aug 2025 20:46:49 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>b4d90dbc4c1bc4bd3eb2d2989330af0eb95c98e8 - Merge drm/drm-next into drm-misc-next-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#b4d90dbc4c1bc4bd3eb2d2989330af0eb95c98e8</link>
        <description>Merge drm/drm-next into drm-misc-next-fixesBackmerging to drm-misc-next-fixes to get features and fixes fromv6.17-rc6.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Mon, 15 Sep 2025 10:23:28 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>702fdf3513b045f596f836d9a4b8672c76f11834 - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#702fdf3513b045f596f836d9a4b8672c76f11834</link>
        <description>Merge drm/drm-next into drm-intel-nextCatching up with some display dependencies.Signed-off-by: Rodrigo Vivi &lt;rodrigo.vivi@intel.com&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Wed, 10 Sep 2025 14:01:42 +0200</pubDate>
        <dc:creator>Rodrigo Vivi &lt;rodrigo.vivi@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>ca994e8922f25f7fed2075098f185cf198109eaa - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#ca994e8922f25f7fed2075098f185cf198109eaa</link>
        <description>Merge drm/drm-next into drm-xe-nextBring v6.17-rc1 to propagate commits from other subsystems, particularlyPCI, which has some new functions needed for SR-IOV integration.Signed-off-by: Lucas De Marchi &lt;lucas.demarchi@intel.com&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Tue, 12 Aug 2025 14:58:37 +0200</pubDate>
        <dc:creator>Lucas De Marchi &lt;lucas.demarchi@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>08c51f5bddc81c8c97c1eb11861b0dc009e5ccd8 - Merge drm/drm-next into drm-misc-n</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#08c51f5bddc81c8c97c1eb11861b0dc009e5ccd8</link>
        <description>Merge drm/drm-next into drm-misc-nUpdating drm-misc-next to the state of v6.17-rc1. Begins a new releasecycle.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Mon, 11 Aug 2025 14:37:45 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>8d2b0853add1d7534dc0794e3c8e0b9e8c4ec640 - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/arch/x86/kvm/Makefile#8d2b0853add1d7534dc0794e3c8e0b9e8c4ec640</link>
        <description>Merge drm/drm-fixes into drm-misc-fixesUpdating drm-misc-fixes to the state of v6.17-rc1. Begins a new releasecycle.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/arch/x86/kvm/Makefile</description>
        <pubDate>Mon, 11 Aug 2025 16:49:06 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
</channel>
</rss>
