<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in processor.h</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>c17ee635fd3a482b2ad2bf5e269755c2eae5f25e - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#c17ee635fd3a482b2ad2bf5e269755c2eae5f25e</link>
        <description>Merge drm/drm-fixes into drm-misc-fixes7.0-rc1 was just released, let&apos;s merge it to kick the new release cycle.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Mon, 23 Feb 2026 10:09:45 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cb5573868ea85ddbc74dd9a917acd1e434d21390 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#cb5573868ea85ddbc74dd9a917acd1e434d21390</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull KVM updates from Paolo Bonzini: &quot;Loongarch:   - Add more CPUCFG mask bits   - Improve feature detection   - Add lazy load support for FPU and binary translation (LBT) register     state   - Fix return value for memory reads from and writes to in-kernel     devices   - Add support for detecting preemption from within a guest   - Add KVM steal time test case to tools/selftests  ARM:   - Add support for FEAT_IDST, allowing ID registers that are not     implemented to be reported as a normal trap rather than as an UNDEF     exception   - Add sanitisation of the VTCR_EL2 register, fixing a number of     UXN/PXN/XN bugs in the process   - Full handling of RESx bits, instead of only RES0, and resulting in     SCTLR_EL2 being added to the list of sanitised registers   - More pKVM fixes for features that are not supposed to be exposed to     guests   - Make sure that MTE being disabled on the pKVM host doesn&apos;t give it     the ability to attack the hypervisor   - Allow pKVM&apos;s host stage-2 mappings to use the Force Write Back     version of the memory attributes by using the &quot;pass-through&apos;     encoding   - Fix trapping of ICC_DIR_EL1 on GICv5 hosts emulating GICv3 for the     guest   - Preliminary work for guest GICv5 support   - A bunch of debugfs fixes, removing pointless custom iterators     stored in guest data structures   - A small set of FPSIMD cleanups   - Selftest fixes addressing the incorrect alignment of page     allocation   - Other assorted low-impact fixes and spelling fixes  RISC-V:   - Fixes for issues discoverd by KVM API fuzzing in     kvm_riscv_aia_imsic_has_attr(), kvm_riscv_aia_imsic_rw_attr(), and     kvm_riscv_vcpu_aia_imsic_update()   - Allow Zalasr, Zilsd and Zclsd extensions for Guest/VM   - Transparent huge page support for hypervisor page tables   - Adjust the number of available guest irq files based on MMIO     register sizes found in the device tree or the ACPI tables   - Add RISC-V specific paging modes to KVM selftests   - Detect paging mode at runtime for selftests  s390:   - Performance improvement for vSIE (aka nested virtualization)   - Completely new memory management. s390 was a special snowflake that     enlisted help from the architecture&apos;s page table management to     build hypervisor page tables, in particular enabling sharing the     last level of page tables. This however was a lot of code (~3K     lines) in order to support KVM, and also blocked several features.     The biggest advantages is that the page size of userspace is     completely independent of the page size used by the guest:     userspace can mix normal pages, THPs and hugetlbfs as it sees fit,     and in fact transparent hugepages were not possible before. It&apos;s     also now possible to have nested guests and guests with huge pages     running on the same host   - Maintainership change for s390 vfio-pci   - Small quality of life improvement for protected guests  x86:   - Add support for giving the guest full ownership of PMU hardware     (contexted switched around the fastpath run loop) and allowing     direct access to data MSRs and PMCs (restricted by the vPMU model).     KVM still intercepts access to control registers, e.g. to enforce     event filtering and to prevent the guest from profiling sensitive     host state. This is more accurate, since it has no risk of     contention and thus dropped events, and also has significantly less     overhead.     For more information, see the commit message for merge commit     bf2c3138ae36 (&quot;Merge tag &apos;kvm-x86-pmu-6.20&apos; ...&quot;)   - Disallow changing the virtual CPU model if L2 is active, for all     the same reasons KVM disallows change the model after the first     KVM_RUN   - Fix a bug where KVM would incorrectly reject host accesses to PV     MSRs when running with KVM_CAP_ENFORCE_PV_FEATURE_CPUID enabled,     even if those were advertised as supported to userspace,   - Fix a bug with protected guest state (SEV-ES/SNP and TDX) VMs,     where KVM would attempt to read CR3 configuring an async #PF entry   - Fail the build if EXPORT_SYMBOL_GPL or EXPORT_SYMBOL is used in KVM     (for x86 only) to enforce usage of EXPORT_SYMBOL_FOR_KVM_INTERNAL.     Only a few exports that are intended for external usage, and those     are allowed explicitly   - When checking nested events after a vCPU is unblocked, ignore     -EBUSY instead of WARNing. Userspace can sometimes put the vCPU     into what should be an impossible state, and spurious exit to     userspace on -EBUSY does not really do anything to solve the issue   - Also throw in the towel and drop the WARN on INIT/SIPI being     blocked when vCPU is in Wait-For-SIPI, which also resulted in     playing whack-a-mole with syzkaller stuffing architecturally     impossible states into KVM   - Add support for new Intel instructions that don&apos;t require anything     beyond enumerating feature flags to userspace   - Grab SRCU when reading PDPTRs in KVM_GET_SREGS2   - Add WARNs to guard against modifying KVM&apos;s CPU caps outside of the     intended setup flow, as nested VMX in particular is sensitive to     unexpected changes in KVM&apos;s golden configuration   - Add a quirk to allow userspace to opt-in to actually suppress EOI     broadcasts when the suppression feature is enabled by the guest     (currently limited to split IRQCHIP, i.e. userspace I/O APIC).     Sadly, simply fixing KVM to honor Suppress EOI Broadcasts isn&apos;t an     option as some userspaces have come to rely on KVM&apos;s buggy behavior     (KVM advertises Supress EOI Broadcast irrespective of whether or     not userspace I/O APIC supports Directed EOIs)   - Clean up KVM&apos;s handling of marking mapped vCPU pages dirty   - Drop a pile of *ancient* sanity checks hidden behind in KVM&apos;s     unused ASSERT() macro, most of which could be trivially triggered     by the guest and/or user, and all of which were useless   - Fold &quot;struct dest_map&quot; into its sole user, &quot;struct rtc_status&quot;, to     make it more obvious what the weird parameter is used for, and to     allow fropping these RTC shenanigans if CONFIG_KVM_IOAPIC=n   - Bury all of ioapic.h, i8254.h and related ioctls (including     KVM_CREATE_IRQCHIP) behind CONFIG_KVM_IOAPIC=y   - Add a regression test for recent APICv update fixes   - Handle &quot;hardware APIC ISR&quot;, a.k.a. SVI, updates in     kvm_apic_update_apicv() to consolidate the updates, and to     co-locate SVI updates with the updates for KVM&apos;s own cache of ISR     information   - Drop a dead function declaration   - Minor cleanups  x86 (Intel):   - Rework KVM&apos;s handling of VMCS updates while L2 is active to     temporarily switch to vmcs01 instead of deferring the update until     the next nested VM-Exit.     The deferred updates approach directly contributed to several bugs,     was proving to be a maintenance burden due to the difficulty in     auditing the correctness of deferred updates, and was polluting     &quot;struct nested_vmx&quot; with a growing pile of booleans   - Fix an SGX bug where KVM would incorrectly try to handle EPCM page     faults, and instead always reflect them into the guest. Since KVM     doesn&apos;t shadow EPCM entries, EPCM violations cannot be due to KVM     interference and can&apos;t be resolved by KVM   - Fix a bug where KVM would register its posted interrupt wakeup     handler even if loading kvm-intel.ko ultimately failed   - Disallow access to vmcb12 fields that aren&apos;t fully supported,     mostly to avoid weirdness and complexity for FRED and other     features, where KVM wants enable VMCS shadowing for fields that     conditionally exist   - Print out the &quot;bad&quot; offsets and values if kvm-intel.ko refuses to     load (or refuses to online a CPU) due to a VMCS config mismatch  x86 (AMD):   - Drop a user-triggerable WARN on nested_svm_load_cr3() failure   - Add support for virtualizing ERAPS. Note, correct virtualization of     ERAPS relies on an upcoming, publicly announced change in the APM     to reduce the set of conditions where hardware (i.e. KVM) *must*     flush the RAP   - Ignore nSVM intercepts for instructions that are not supported     according to L1&apos;s virtual CPU model   - Add support for expedited writes to the fast MMIO bus, a la VMX&apos;s     fastpath for EPT Misconfig   - Don&apos;t set GIF when clearing EFER.SVME, as GIF exists independently     of SVM, and allow userspace to restore nested state with GIF=0   - Treat exit_code as an unsigned 64-bit value through all of KVM   - Add support for fetching SNP certificates from userspace   - Fix a bug where KVM would use vmcb02 instead of vmcb01 when     emulating VMLOAD or VMSAVE on behalf of L2   - Misc fixes and cleanups  x86 selftests:   - Add a regression test for TPR&lt;=&gt;CR8 synchronization and IRQ masking   - Overhaul selftest&apos;s MMU infrastructure to genericize stage-2 MMU     support, and extend x86&apos;s infrastructure to support EPT and NPT     (for L2 guests)   - Extend several nested VMX tests to also cover nested SVM   - Add a selftest for nested VMLOAD/VMSAVE   - Rework the nested dirty log test, originally added as a regression     test for PML where KVM logged L2 GPAs instead of L1 GPAs, to     improve test coverage and to hopefully make the test easier to     understand and maintain  guest_memfd:   - Remove kvm_gmem_populate()&apos;s preparation tracking and half-baked     hugepage handling. SEV/SNP was the only user of the tracking and it     can do it via the RMP   - Retroactively document and enforce (for SNP) that     KVM_SEV_SNP_LAUNCH_UPDATE and KVM_TDX_INIT_MEM_REGION require the     source page to be 4KiB aligned, to avoid non-trivial complexity for     something that no known VMM seems to be doing and to avoid an API     special case for in-place conversion, which simply can&apos;t support     unaligned sources   - When populating guest_memfd memory, GUP the source page in common     code and pass the refcounted page to the vendor callback, instead     of letting vendor code do the heavy lifting. Doing so avoids a     looming deadlock bug with in-place due an AB-BA conflict betwee     mmap_lock and guest_memfd&apos;s filemap invalidate lock  Generic:   - Fix a bug where KVM would ignore the vCPU&apos;s selected address space     when creating a vCPU-specific mapping of guest memory. Actually     this bug could not be hit even on x86, the only architecture with     multiple address spaces, but it&apos;s a bug nevertheless&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (267 commits)  KVM: s390: Increase permitted SE header size to 1 MiB  MAINTAINERS: Replace backup for s390 vfio-pci  KVM: s390: vsie: Fix race in acquire_gmap_shadow()  KVM: s390: vsie: Fix race in walk_guest_tables()  KVM: s390: Use guest address to mark guest page dirty  irqchip/riscv-imsic: Adjust the number of available guest irq files  RISC-V: KVM: Transparent huge page support  RISC-V: KVM: selftests: Add Zalasr extensions to get-reg-list test  RISC-V: KVM: Allow Zalasr extensions for Guest/VM  KVM: riscv: selftests: Add riscv vm satp modes  KVM: riscv: selftests: add Zilsd and Zclsd extension to get-reg-list test  riscv: KVM: allow Zilsd and Zclsd extensions for Guest/VM  RISC-V: KVM: Skip IMSIC update if vCPU IMSIC state is not initialized  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_rw_attr()  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_has_attr()  RISC-V: KVM: Remove unnecessary &apos;ret&apos; assignment  KVM: s390: Add explicit padding to struct kvm_s390_keyop  KVM: LoongArch: selftests: Add steal time test case  LoongArch: KVM: Add paravirt vcpu_is_preempted() support in guest side  LoongArch: KVM: Add paravirt preempt feature in hypervisor side  ...

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Fri, 13 Feb 2026 20:31:15 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>549006326978fbf66d9db2953cb1e4fb5487da65 - Merge tag &apos;kvmarm-7.0&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#549006326978fbf66d9db2953cb1e4fb5487da65</link>
        <description>Merge tag &apos;kvmarm-7.0&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEADKVM/arm64 updates for 7.0- Add support for FEAT_IDST, allowing ID registers that are not  implemented to be reported as a normal trap rather than as an UNDEF  exception.- Add sanitisation of the VTCR_EL2 register, fixing a number of  UXN/PXN/XN bugs in the process.- Full handling of RESx bits, instead of only RES0, and resulting in  SCTLR_EL2 being added to the list of sanitised registers.- More pKVM fixes for features that are not supposed to be exposed to  guests.- Make sure that MTE being disabled on the pKVM host doesn&apos;t give it  the ability to attack the hypervisor.- Allow pKVM&apos;s host stage-2 mappings to use the Force Write Back  version of the memory attributes by using the &quot;pass-through&apos;  encoding.- Fix trapping of ICC_DIR_EL1 on GICv5 hosts emulating GICv3 for the  guest.- Preliminary work for guest GICv5 support.- A bunch of debugfs fixes, removing pointless custom iterators stored  in guest data structures.- A small set of FPSIMD cleanups.- Selftest fixes addressing the incorrect alignment of page  allocation.- Other assorted low-impact fixes and spelling fixes.

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Mon, 09 Feb 2026 18:18:19 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>7c652c0ddddd0058d8b3e3b044eb0ea10cf2def3 - Merge branch kvm-arm64/selftests-6.20 into kvmarm-master/next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#7c652c0ddddd0058d8b3e3b044eb0ea10cf2def3</link>
        <description>Merge branch kvm-arm64/selftests-6.20 into kvmarm-master/next* kvm-arm64/selftests-6.20:  : .  : Some selftest fixes addressing page alignment issues as well as  : a bad MMU setup bug, courtesy of Fuad Tabba.  : .  KVM: selftests: Fix typos and stale comments in kvm_util  KVM: selftests: Move page_align() to shared header  KVM: riscv: selftests: Fix incorrect rounding in page_align()  KVM: arm64: selftests: Fix incorrect rounding in page_align()  KVM: arm64: selftests: Disable unused TTBR1_EL1 translationsSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Fri, 23 Jan 2026 11:04:20 +0100</pubDate>
        <dc:creator>Marc Zyngier &lt;maz@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>7e03d07d03a486c66d5c084c7185b1bef29049e9 - KVM: arm64: selftests: Disable unused TTBR1_EL1 translations</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#7e03d07d03a486c66d5c084c7185b1bef29049e9</link>
        <description>KVM: arm64: selftests: Disable unused TTBR1_EL1 translationsKVM selftests map all guest code and data into the lower virtual addressrange (0x0000...) managed by TTBR0_EL1. The upper range (0xFFFF...)managed by TTBR1_EL1 is unused and uninitialized.If a guest accesses the upper range, the MMU attempts a translationtable walk using uninitialized registers, leading to unpredictablebehavior.Set `TCR_EL1.EPD1` to disable translation table walks for TTBR1_EL1,ensuring that any access to the upper range generates an immediateTranslation Fault. Additionally, set `TCR_EL1.TBI1` (Top Byte Ignore) toensure that tagged pointers in the upper range also deterministicallytrigger a Translation Fault via EPD1.Define `TCR_EPD1_MASK`, `TCR_EPD1_SHIFT`, and `TCR_TBI1` in`processor.h` to support this configuration. These are based on theirdefinitions in `arch/arm64/include/asm/pgtable-hwdef.h`.Suggested-by: Will Deacon &lt;will@kernel.org&gt;Reviewed-by: Itaru Kitayama &lt;itaru.kitayama@fujitsu.com&gt;Signed-off-by: Fuad Tabba &lt;tabba@google.com&gt;Link: https://patch.msgid.link/20260109082218.3236580-2-tabba@google.comSigned-off-by: Marc Zyngier &lt;maz@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Fri, 09 Jan 2026 09:22:14 +0100</pubDate>
        <dc:creator>Fuad Tabba &lt;tabba@google.com&gt;</dc:creator>
    </item>
<item>
        <title>a4a508df2aa34f8650afde54ea804321c618f45f - Merge tag &apos;v6.18&apos; into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#a4a508df2aa34f8650afde54ea804321c618f45f</link>
        <description>Merge tag &apos;v6.18&apos; into nextSync up with the mainline to bring in the latest APIs.

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Sat, 13 Dec 2025 10:18:20 +0100</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>0f94e51b5320eacccc2626ab70b8d7e705332334 - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#0f94e51b5320eacccc2626ab70b8d7e705332334</link>
        <description>Merge drm/drm-next into drm-xe-nextBackmerging to bring in a needed dependency for the Xe VFIOdriver variant. This should ideally have been done before wecommited that, so we now have a small window in drm-xe-nextwhere that driver doesn&apos;t compile.Reported-by: kernel test robot &lt;lkp@intel.com&gt;Closes: https://lore.kernel.org/oe-kbuild-all/202512030331.I8CveRre-lkp@intel.com/Signed-off-by: Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Wed, 03 Dec 2025 11:22:18 +0100</pubDate>
        <dc:creator>Thomas Hellstr&#246;m &lt;thomas.hellstrom@linux.intel.com&gt;</dc:creator>
    </item>
<item>
        <title>d518ec2cbcac1c1175563a115f5024eeb6b4cd8d - Merge 6.18-rc3 into usb-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#d518ec2cbcac1c1175563a115f5024eeb6b4cd8d</link>
        <description>Merge 6.18-rc3 into usb-nextWe need the USB fixes in here as well to build on top of.Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Mon, 27 Oct 2025 08:33:01 +0100</pubDate>
        <dc:creator>Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;</dc:creator>
    </item>
<item>
        <title>d68eb9096fb065cc0cb5218ae651f54b08de5831 - Merge 6.18-rc3 into staging-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#d68eb9096fb065cc0cb5218ae651f54b08de5831</link>
        <description>Merge 6.18-rc3 into staging-nextWe need the staging driver fixes in here to build on top of.Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Mon, 27 Oct 2025 08:09:56 +0100</pubDate>
        <dc:creator>Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;</dc:creator>
    </item>
<item>
        <title>c428900703aaa528bf141358551287f87e5b2b93 - Merge 6.18-rc3 into char-misc-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#c428900703aaa528bf141358551287f87e5b2b93</link>
        <description>Merge 6.18-rc3 into char-misc-nextWe need the fixes in here, and it resolves a merge conflict in:	drivers/misc/amd-sbi/KconfigSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Mon, 27 Oct 2025 07:48:19 +0100</pubDate>
        <dc:creator>Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;</dc:creator>
    </item>
<item>
        <title>82f78acd5a9270370ef4aa3f032ede25f3dc91ee - Merge patch series &quot;Add OP-TEE based RPMB driver for UFS devices&quot;</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#82f78acd5a9270370ef4aa3f032ede25f3dc91ee</link>
        <description>Merge patch series &quot;Add OP-TEE based RPMB driver for UFS devices&quot;Bean Huo &lt;beanhuo@iokpp.de&gt; says:This patch series introduces OP-TEE based RPMB (Replay ProtectedMemory Block) support for UFS devices, extending the kernel-levelsecure storage capabilities that are currently available for eMMCdevices.Previously, OP-TEE required a userspace supplicant to access RPMBpartitions, which created complex dependencies and reliability issues,especially during early boot scenarios. Recent work by Linaro hasmoved core supplicant functionality directly into the Linux kernel foreMMC devices, eliminating userspace dependencies and enablingimmediate secure storage access. This series extends the same approachto UFS devices, which are used in enterprise and mobile applicationsthat require secure storage capabilities.Benefits: - Eliminates dependency on userspace supplicant for UFS RPMB access - Enables early boot secure storage access (e.g., fTPM, secure UEFI   variables) - Provides kernel-level RPMB access as soon as UFS driver is   initialized - Removes complex initramfs dependencies and boot ordering   requirements - Ensures reliable and deterministic secure storage operations - Supports both built-in and modular fTPM configurations.Prerequisites:--------------This patch series depends on commit 7e8242405b94 (&quot;rpmb: move structrpmb_frame to common header&quot;) which has been merged into mainlinev6.18-rc2.Link: https://patch.msgid.link/20251107230518.4060231-1-beanhuo@iokpp.deSigned-off-by: Martin K. Petersen &lt;martin.petersen@oracle.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Thu, 20 Nov 2025 16:26:13 +0100</pubDate>
        <dc:creator>Martin K. Petersen &lt;martin.petersen@oracle.com&gt;</dc:creator>
    </item>
<item>
        <title>37022410f4a3cc11614626a58cd08bcf8ea529e9 - Merge 6.18-rc3 into driver-core-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#37022410f4a3cc11614626a58cd08bcf8ea529e9</link>
        <description>Merge 6.18-rc3 into driver-core-nextWe need the driver core fixes in here as well to build on top of.Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Mon, 27 Oct 2025 08:02:50 +0100</pubDate>
        <dc:creator>Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;</dc:creator>
    </item>
<item>
        <title>7362b5b493102c6b71827c2da22117b475528f6d - Merge branch &apos;for-6.19/nintendo&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#7362b5b493102c6b71827c2da22117b475528f6d</link>
        <description>Merge branch &apos;for-6.19/nintendo&apos; into for-linus- switch to WQ_PERCPU workaueues (Marco Crivellari)- reduce potential initialization blocking time of hid-nintendo (Willy Huang)

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Tue, 02 Dec 2025 14:46:11 +0100</pubDate>
        <dc:creator>Jiri Kosina &lt;jkosina@suse.com&gt;</dc:creator>
    </item>
<item>
        <title>2e90ff546240498c2158d9f9acfcfba30904ab6b - Merge branch &apos;for-linus&apos; into for-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#2e90ff546240498c2158d9f9acfcfba30904ab6b</link>
        <description>Merge branch &apos;for-linus&apos; into for-nextPull 6.18-devel branch for applying the further HD-audio fixups for HP.Signed-off-by: Takashi Iwai &lt;tiwai@suse.de&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Thu, 20 Nov 2025 09:48:59 +0100</pubDate>
        <dc:creator>Takashi Iwai &lt;tiwai@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>29ae148fa88934bfd81af2a616816f9e22559b7c - Merge tag &apos;v6.18-rc5&apos; into media-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#29ae148fa88934bfd81af2a616816f9e22559b7c</link>
        <description>Merge tag &apos;v6.18-rc5&apos; into media-nextLinux 6.18-rc5* tag &apos;v6.18-rc5&apos;: (1016 commits)  Linux 6.18-rc5  kbuild: Let kernel-doc.py use PYTHON3 override  rtc: rx8025: fix incorrect register reference  Revert &quot;drm/nouveau: set DMA mask before creating the flush page&quot;  io_uring: fix regbuf vector size truncation  compiler_types: Move unused static inline functions warning to W=2  smb: client: validate change notify buffer before copy  tracing/tools: Fix incorrcet short option in usage text for --threads  drm/xe: Enforce correct user fence signaling order using  x86/microcode/AMD: Add more known models to entry sign checking  drm/xe: Do clean shutdown also when using flr  drm/xe: Move declarations under conditional branch  drm/xe/guc: Synchronize Dead CT worker with unbind  tracing: Fix memory leaks in create_field_var()  ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up  tracing: tprobe-events: Fix to put tracepoint_user when disable the tprobe  tracing: tprobe-events: Fix to register tracepoint correctly  gpio: tb10x: Drop unused tb10x_set_bits() function  drm/amd/display: Enable mst when it&apos;s detected but yet to be initialized  drm/amdgpu: Fix wait after reset sequence in S3  ...

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Tue, 11 Nov 2025 12:44:28 +0100</pubDate>
        <dc:creator>Mauro Carvalho Chehab &lt;mchehab+huawei@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>1c1960f57151e36f550d1a53352f832d5aaa5f8f - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#1c1960f57151e36f550d1a53352f832d5aaa5f8f</link>
        <description>Merge drm/drm-next into drm-intel-nextPrimarily sync with the drm_print.h changes from drm-misc.Signed-off-by: Jani Nikula &lt;jani.nikula@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Tue, 11 Nov 2025 11:32:07 +0100</pubDate>
        <dc:creator>Jani Nikula &lt;jani.nikula@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>8b6faa7fddf0ae69c5f1a9315a64edee6f022037 - spi: tegra210-quad: Improve timeout handling under</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#8b6faa7fddf0ae69c5f1a9315a64edee6f022037</link>
        <description>spi: tegra210-quad: Improve timeout handling underMerge series from Vishwaroop A &lt;va@nvidia.com&gt;:This patch series addresses timeout handling issues in the Tegra QSPI driverthat occur under high system load conditions. We&apos;ve observed that when CPUsare saturated (due to error injection, RAS firmware activity, or general CPUcontention), QSPI interrupt handlers can be delayed, causing spurious transferfailures even though the hardware completed the operation successfully.These changes have been tested in production environments under various highload scenarios including RAS testing and CPU saturation workloads.

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Wed, 05 Nov 2025 12:54:48 +0100</pubDate>
        <dc:creator>Mark Brown &lt;broonie@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cb9f145f638d7afa633632a9290d6ad06caeb8ee - Merge remote-tracking branch &apos;drm/drm-next&apos; into msm-next-robclark</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#cb9f145f638d7afa633632a9290d6ad06caeb8ee</link>
        <description>Merge remote-tracking branch &apos;drm/drm-next&apos; into msm-next-robclarkBack-merge drm-next to get caught up.Signed-off-by: Rob Clark &lt;robin.clark@oss.qualcomm.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Sat, 01 Nov 2025 13:47:30 +0100</pubDate>
        <dc:creator>Rob Clark &lt;robin.clark@oss.qualcomm.com&gt;</dc:creator>
    </item>
<item>
        <title>dc74a00c7661a14a672ea7660caca5c4aa661a79 - regulator: pca9450: add input supply links</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#dc74a00c7661a14a672ea7660caca5c4aa661a79</link>
        <description>regulator: pca9450: add input supply linksMerge series from Oleksij Rempel &lt;o.rempel@pengutronix.de&gt;:This series adds input supply definitions for the NXP PCA9450 PMIC.Some systems detect power events such as undervoltage before the PMIC.To allow correct propagation of such events, each regulator must defineits upstream input supply. The first patch updates the devicetreebinding to document new *-supply properties, and the second patch addsmatching .supply_name entries in the driver.Changes in this series:- Document INL1, INB13, INB26 and INB45 supply properties- Link all LDO and BUCK regulators to their corresponding input groups

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Tue, 28 Oct 2025 12:17:51 +0100</pubDate>
        <dc:creator>Mark Brown &lt;broonie@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>96fbc8050d0f8d208dfd807aa0137082f1e07ff2 - Merge tag &apos;v6.18-rc3&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux into gpio/for-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/arm64/processor.h#96fbc8050d0f8d208dfd807aa0137082f1e07ff2</link>
        <description>Merge tag &apos;v6.18-rc3&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux into gpio/for-nextLinux 6.18-rc3

            List of files:
            /linux/tools/testing/selftests/kvm/include/arm64/processor.h</description>
        <pubDate>Mon, 27 Oct 2025 09:45:48 +0100</pubDate>
        <dc:creator>Bartosz Golaszewski &lt;bartosz.golaszewski@linaro.org&gt;</dc:creator>
    </item>
</channel>
</rss>
