<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in svm_util.h</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>06bc7ff0a1e0f2b0102e1314e3527a7ec0997851 - Merge tag &apos;asoc-fix-v7.1-rc2&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#06bc7ff0a1e0f2b0102e1314e3527a7ec0997851</link>
        <description>Merge tag &apos;asoc-fix-v7.1-rc2&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linusASoC: Fixes for v7.1Another batch of fixes, plus a couple of quirks (mostly AMD ones, as hasbeen the case recently).  All driver changes, including fixes for theKUnit tests for the Cirrus drivers that could cause memory corruption.

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Wed, 06 May 2026 16:10:00 +0200</pubDate>
        <dc:creator>Takashi Iwai &lt;tiwai@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>57b8e2d666a31fa201432d58f5fe3469a0dd83ba - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#57b8e2d666a31fa201432d58f5fe3469a0dd83ba</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm updates from Paolo Bonzini: &quot;On top of a lot of Arm fixes, this includes a massive rename of types  and variables in tools/testing/selftests/kvm - these were  unnecessarily different from what the kernel uses, so they&apos;re being  made consistent.  arm64:   - Allow tracing for non-pKVM, which was accidentally disabled when     the series was merged   - Rationalise the way the pKVM hypercall ranges are defined by using     the same mechanism as already used for the vcpu_sysreg enum   - Enforce that SMCCC function numbers relayed by the pKVM proxy are     actually compliant with the specification   - Fix a couple of feature to idreg mappings which resulted in the     wrong sanitisation being applied   - Fix the GICD_IIDR revision number field that could never been     written correctly by userspace   - Make kvm_vcpu_initialized() correctly use its parameter instead of     relying on the surrounding context   - Enforce correct ordering in __pkvm_init_vcpu(), plugging a     potential pin leak at the same time   - Move __pkvm_init_finalise() to a less dangerous spot, avoiding     future problems   - Restore functional userspace irqchip support after a four year     breakage (last functional kernel was 5.18...)   - Spelling fixes  Selftests:   - Rename types across all KVM selftests to more closely align with     types used in the kernel:        vm_vaddr_t -&gt; gva_t        vm_paddr_t -&gt; gpa_t        uint64_t -&gt; u64        uint32_t -&gt; u32        uint16_t -&gt; u16        uint8_t  -&gt; u8        int64_t -&gt; s64        int32_t -&gt; s32        int16_t -&gt; s16        int8_t  -&gt; s8   - Fix Loongarch compilation&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (31 commits)  KVM: selftests: Add check_steal_time_uapi() implementation for LoongArch  KVM: arm64: Wake-up from WFI when iqrchip is in userspace  KVM: arm64: Fix initialisation order in __pkvm_init_finalise()  KVM: arm64: Fix pin leak and publication ordering in __pkvm_init_vcpu()  KVM: arm64: Fix kvm_vcpu_initialized() macro parameter  KVM: arm64: Fix FEAT_SPE_FnE to use PMSIDR_EL1.FnE, not PMSVer  KVM: arm64: Fix typo in feature check comments  KVM: arm64: Fix FEAT_Debugv8p9 to check DebugVer, not PMUVer  KVM: arm64: Reject non compliant SMCCC function calls in pKVM  KVM: arm64: vgic: Fix IIDR revision field extracted from wrong value  KVM: selftests: Replace &quot;paddr&quot; with &quot;gpa&quot; throughout  KVM: selftests: Replace &quot;u64 nested_paddr&quot; with &quot;gpa_t l2_gpa&quot;  KVM: selftests: Replace &quot;u64 gpa&quot; with &quot;gpa_t&quot; throughout  KVM: selftests: Replace &quot;vaddr&quot; with &quot;gva&quot; throughout  KVM: selftests: Clarify that arm64&apos;s inject_uer() takes a host PA, not a guest PA  KVM: selftests: Rename translate_to_host_paddr() =&gt; translate_hva_to_hpa()  KVM: selftests: Rename vm_vaddr_populate_bitmap() =&gt; vm_populate_gva_bitmap()  KVM: selftests: Rename vm_vaddr_unused_gap() =&gt; vm_unused_gva_gap()  KVM: selftests: Drop &quot;vaddr_&quot; from APIs that allocate memory for a given VM  KVM: selftests: Use u8 instead of uint8_t  ...

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Wed, 29 Apr 2026 15:56:50 +0200</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>39f1c201b93f4ff71631bac72cff6eb155f976a4 - Merge tag &apos;kvm-x86-selftests_kernel_types-7.1&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#39f1c201b93f4ff71631bac72cff6eb155f976a4</link>
        <description>Merge tag &apos;kvm-x86-selftests_kernel_types-7.1&apos; of https://github.com/kvm-x86/linux into HEADKVM selftests type renames for 7.1Renames types across all KVM selftests to more closely align with types usedin the kernel:  vm_vaddr_t -&gt; gva_t  vm_paddr_t -&gt; gpa_t  uint64_t -&gt; u64  uint32_t -&gt; u32  uint16_t -&gt; u16  uint8_t  -&gt; u8  int64_t -&gt; s64  int32_t -&gt; s32  int16_t -&gt; s16  int8_t  -&gt; s8Using the kernel&apos;s preferred types eliminates a source of friction for manycontributors, as the majority of KVM selftests contributions come from kerneldevelopers.  The kernel names are also shorter, which allows for more concisecode, and in any many cases eliminates newlines thanks to shorter types andparameter names.Rename variables and parameters as well as types, e.g. gpa instead of paddr,to again align with the kernel, and in a few cases to remove ambiguity, e.g.where paddr is used to refer to a _host_ physical address.

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Mon, 27 Apr 2026 10:24:41 +0200</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>26f8453288d4c1fb8c96802eae15ddc988f5e068 - KVM: selftests: Use u64 instead of uint64_t</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#26f8453288d4c1fb8c96802eae15ddc988f5e068</link>
        <description>KVM: selftests: Use u64 instead of uint64_tUse u64 instead of uint64_t to make the KVM selftests code more conciseand more similar to the kernel (since selftests are primarily developedby kernel developers).This commit was generated with the following command:  git ls-files tools/testing/selftests/kvm | xargs sed -i &apos;s/uint64_t/u64/g&apos;Then by manually adjusting whitespace to make checkpatch.pl happy.Include &lt;linux/types.h&gt; in include/kvm_util_types.h, iinclude/test_util.h,and include/x86/pmu.h to pick up the tools-defined u64.  Arguably, allheaders (especially kvm_util_types.h) should have already been includingstdint.h to get uint64_t from the libc headers, but the missing dependencyonly rears its head once KVM uses u64 instead of uint64_t.No functional change intended.Signed-off-by: David Matlack &lt;dmatlack@google.com&gt;[sean: rename pread_uint64() =&gt; pread_u64, expand on types.h include]Link: https://patch.msgid.link/20260420212004.3938325-5-seanjc@google.comSigned-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Mon, 20 Apr 2026 23:19:49 +0200</pubDate>
        <dc:creator>David Matlack &lt;dmatlack@google.com&gt;</dc:creator>
    </item>
<item>
        <title>5567fc9dcd7ed46678cd68e6ca0662331d42f0ac - KVM: selftests: Use gva_t instead of vm_vaddr_t</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#5567fc9dcd7ed46678cd68e6ca0662331d42f0ac</link>
        <description>KVM: selftests: Use gva_t instead of vm_vaddr_tReplace all occurrences of vm_vaddr_t with gva_t to align with KVM codeand with the conversion helpers (e.g. addr_gva2hva()).This commit was generated with the following command:  git ls-files tools/testing/selftests/kvm | xargs sed -i &apos;s/vm_vaddr_/gva_/g&apos;Then by manually adjusting whitespace to make checkpatch.pl happy, anddropping renames of functions that allocate memory within a given VM.No functional change intended.Signed-off-by: David Matlack &lt;dmatlack@google.com&gt;[sean: drop renames of allocator APIs]Link: https://patch.msgid.link/20260420212004.3938325-2-seanjc@google.comSigned-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Mon, 20 Apr 2026 23:19:46 +0200</pubDate>
        <dc:creator>David Matlack &lt;dmatlack@google.com&gt;</dc:creator>
    </item>
<item>
        <title>f4b369c6fe0ceaba2da2daff8c9eb415f85926dd - Merge branch &apos;next&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#f4b369c6fe0ceaba2da2daff8c9eb415f85926dd</link>
        <description>Merge branch &apos;next&apos; into for-linusPrepare input updates for 7.1 merge window.

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Mon, 20 Apr 2026 03:28:57 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>0421ccdfad0d92713a812a5aeb7d07b0ea7213c8 - Merge tag &apos;v7.0-rc3&apos; into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#0421ccdfad0d92713a812a5aeb7d07b0ea7213c8</link>
        <description>Merge tag &apos;v7.0-rc3&apos; into nextSync up with the mainline to brig up the latest changes, specificallychanges to ALPS driver.

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Thu, 12 Mar 2026 18:44:42 +0100</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>3e9e952bb3139ad1e08f3e1960239c2988ab90c9 - Merge branch &apos;for-7.1-printf-kunit-build&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#3e9e952bb3139ad1e08f3e1960239c2988ab90c9</link>
        <description>Merge branch &apos;for-7.1-printf-kunit-build&apos; into for-linus

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Mon, 20 Apr 2026 13:41:28 +0200</pubDate>
        <dc:creator>Petr Mladek &lt;pmladek@suse.com&gt;</dc:creator>
    </item>
<item>
        <title>42d3b66d4cdbacfc9d120d2301b8de89cc29a914 - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#42d3b66d4cdbacfc9d120d2301b8de89cc29a914</link>
        <description>Merge drm/drm-next into drm-xe-nextBackmerging to bring in 7.00-rc3. Important ahead GPU SVM merging THPsupport.Signed-off-by: Matthew Brost &lt;matthew.brost@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Thu, 12 Mar 2026 15:17:56 +0100</pubDate>
        <dc:creator>Matthew Brost &lt;matthew.brost@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>f09812b85fa6f41058bcc46e70ac406bf9b0493a - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#f09812b85fa6f41058bcc46e70ac406bf9b0493a</link>
        <description>Merge drm/drm-next into drm-intel-nextSync with v7.0-rc1 which contains a few treewide changes affecting i915.Signed-off-by: Jani Nikula &lt;jani.nikula@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Wed, 25 Feb 2026 12:23:04 +0100</pubDate>
        <dc:creator>Jani Nikula &lt;jani.nikula@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>8b85987d3cf50178f67618122d9f3bb202f62f42 - Merge drm/drm-next into drm-misc-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#8b85987d3cf50178f67618122d9f3bb202f62f42</link>
        <description>Merge drm/drm-next into drm-misc-nextLet&apos;s merge 7.0-rc1 to start the new drm-misc-next windowSigned-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Mon, 23 Feb 2026 11:48:20 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>c17ee635fd3a482b2ad2bf5e269755c2eae5f25e - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#c17ee635fd3a482b2ad2bf5e269755c2eae5f25e</link>
        <description>Merge drm/drm-fixes into drm-misc-fixes7.0-rc1 was just released, let&apos;s merge it to kick the new release cycle.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Mon, 23 Feb 2026 10:09:45 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cb5573868ea85ddbc74dd9a917acd1e434d21390 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#cb5573868ea85ddbc74dd9a917acd1e434d21390</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull KVM updates from Paolo Bonzini: &quot;Loongarch:   - Add more CPUCFG mask bits   - Improve feature detection   - Add lazy load support for FPU and binary translation (LBT) register     state   - Fix return value for memory reads from and writes to in-kernel     devices   - Add support for detecting preemption from within a guest   - Add KVM steal time test case to tools/selftests  ARM:   - Add support for FEAT_IDST, allowing ID registers that are not     implemented to be reported as a normal trap rather than as an UNDEF     exception   - Add sanitisation of the VTCR_EL2 register, fixing a number of     UXN/PXN/XN bugs in the process   - Full handling of RESx bits, instead of only RES0, and resulting in     SCTLR_EL2 being added to the list of sanitised registers   - More pKVM fixes for features that are not supposed to be exposed to     guests   - Make sure that MTE being disabled on the pKVM host doesn&apos;t give it     the ability to attack the hypervisor   - Allow pKVM&apos;s host stage-2 mappings to use the Force Write Back     version of the memory attributes by using the &quot;pass-through&apos;     encoding   - Fix trapping of ICC_DIR_EL1 on GICv5 hosts emulating GICv3 for the     guest   - Preliminary work for guest GICv5 support   - A bunch of debugfs fixes, removing pointless custom iterators     stored in guest data structures   - A small set of FPSIMD cleanups   - Selftest fixes addressing the incorrect alignment of page     allocation   - Other assorted low-impact fixes and spelling fixes  RISC-V:   - Fixes for issues discoverd by KVM API fuzzing in     kvm_riscv_aia_imsic_has_attr(), kvm_riscv_aia_imsic_rw_attr(), and     kvm_riscv_vcpu_aia_imsic_update()   - Allow Zalasr, Zilsd and Zclsd extensions for Guest/VM   - Transparent huge page support for hypervisor page tables   - Adjust the number of available guest irq files based on MMIO     register sizes found in the device tree or the ACPI tables   - Add RISC-V specific paging modes to KVM selftests   - Detect paging mode at runtime for selftests  s390:   - Performance improvement for vSIE (aka nested virtualization)   - Completely new memory management. s390 was a special snowflake that     enlisted help from the architecture&apos;s page table management to     build hypervisor page tables, in particular enabling sharing the     last level of page tables. This however was a lot of code (~3K     lines) in order to support KVM, and also blocked several features.     The biggest advantages is that the page size of userspace is     completely independent of the page size used by the guest:     userspace can mix normal pages, THPs and hugetlbfs as it sees fit,     and in fact transparent hugepages were not possible before. It&apos;s     also now possible to have nested guests and guests with huge pages     running on the same host   - Maintainership change for s390 vfio-pci   - Small quality of life improvement for protected guests  x86:   - Add support for giving the guest full ownership of PMU hardware     (contexted switched around the fastpath run loop) and allowing     direct access to data MSRs and PMCs (restricted by the vPMU model).     KVM still intercepts access to control registers, e.g. to enforce     event filtering and to prevent the guest from profiling sensitive     host state. This is more accurate, since it has no risk of     contention and thus dropped events, and also has significantly less     overhead.     For more information, see the commit message for merge commit     bf2c3138ae36 (&quot;Merge tag &apos;kvm-x86-pmu-6.20&apos; ...&quot;)   - Disallow changing the virtual CPU model if L2 is active, for all     the same reasons KVM disallows change the model after the first     KVM_RUN   - Fix a bug where KVM would incorrectly reject host accesses to PV     MSRs when running with KVM_CAP_ENFORCE_PV_FEATURE_CPUID enabled,     even if those were advertised as supported to userspace,   - Fix a bug with protected guest state (SEV-ES/SNP and TDX) VMs,     where KVM would attempt to read CR3 configuring an async #PF entry   - Fail the build if EXPORT_SYMBOL_GPL or EXPORT_SYMBOL is used in KVM     (for x86 only) to enforce usage of EXPORT_SYMBOL_FOR_KVM_INTERNAL.     Only a few exports that are intended for external usage, and those     are allowed explicitly   - When checking nested events after a vCPU is unblocked, ignore     -EBUSY instead of WARNing. Userspace can sometimes put the vCPU     into what should be an impossible state, and spurious exit to     userspace on -EBUSY does not really do anything to solve the issue   - Also throw in the towel and drop the WARN on INIT/SIPI being     blocked when vCPU is in Wait-For-SIPI, which also resulted in     playing whack-a-mole with syzkaller stuffing architecturally     impossible states into KVM   - Add support for new Intel instructions that don&apos;t require anything     beyond enumerating feature flags to userspace   - Grab SRCU when reading PDPTRs in KVM_GET_SREGS2   - Add WARNs to guard against modifying KVM&apos;s CPU caps outside of the     intended setup flow, as nested VMX in particular is sensitive to     unexpected changes in KVM&apos;s golden configuration   - Add a quirk to allow userspace to opt-in to actually suppress EOI     broadcasts when the suppression feature is enabled by the guest     (currently limited to split IRQCHIP, i.e. userspace I/O APIC).     Sadly, simply fixing KVM to honor Suppress EOI Broadcasts isn&apos;t an     option as some userspaces have come to rely on KVM&apos;s buggy behavior     (KVM advertises Supress EOI Broadcast irrespective of whether or     not userspace I/O APIC supports Directed EOIs)   - Clean up KVM&apos;s handling of marking mapped vCPU pages dirty   - Drop a pile of *ancient* sanity checks hidden behind in KVM&apos;s     unused ASSERT() macro, most of which could be trivially triggered     by the guest and/or user, and all of which were useless   - Fold &quot;struct dest_map&quot; into its sole user, &quot;struct rtc_status&quot;, to     make it more obvious what the weird parameter is used for, and to     allow fropping these RTC shenanigans if CONFIG_KVM_IOAPIC=n   - Bury all of ioapic.h, i8254.h and related ioctls (including     KVM_CREATE_IRQCHIP) behind CONFIG_KVM_IOAPIC=y   - Add a regression test for recent APICv update fixes   - Handle &quot;hardware APIC ISR&quot;, a.k.a. SVI, updates in     kvm_apic_update_apicv() to consolidate the updates, and to     co-locate SVI updates with the updates for KVM&apos;s own cache of ISR     information   - Drop a dead function declaration   - Minor cleanups  x86 (Intel):   - Rework KVM&apos;s handling of VMCS updates while L2 is active to     temporarily switch to vmcs01 instead of deferring the update until     the next nested VM-Exit.     The deferred updates approach directly contributed to several bugs,     was proving to be a maintenance burden due to the difficulty in     auditing the correctness of deferred updates, and was polluting     &quot;struct nested_vmx&quot; with a growing pile of booleans   - Fix an SGX bug where KVM would incorrectly try to handle EPCM page     faults, and instead always reflect them into the guest. Since KVM     doesn&apos;t shadow EPCM entries, EPCM violations cannot be due to KVM     interference and can&apos;t be resolved by KVM   - Fix a bug where KVM would register its posted interrupt wakeup     handler even if loading kvm-intel.ko ultimately failed   - Disallow access to vmcb12 fields that aren&apos;t fully supported,     mostly to avoid weirdness and complexity for FRED and other     features, where KVM wants enable VMCS shadowing for fields that     conditionally exist   - Print out the &quot;bad&quot; offsets and values if kvm-intel.ko refuses to     load (or refuses to online a CPU) due to a VMCS config mismatch  x86 (AMD):   - Drop a user-triggerable WARN on nested_svm_load_cr3() failure   - Add support for virtualizing ERAPS. Note, correct virtualization of     ERAPS relies on an upcoming, publicly announced change in the APM     to reduce the set of conditions where hardware (i.e. KVM) *must*     flush the RAP   - Ignore nSVM intercepts for instructions that are not supported     according to L1&apos;s virtual CPU model   - Add support for expedited writes to the fast MMIO bus, a la VMX&apos;s     fastpath for EPT Misconfig   - Don&apos;t set GIF when clearing EFER.SVME, as GIF exists independently     of SVM, and allow userspace to restore nested state with GIF=0   - Treat exit_code as an unsigned 64-bit value through all of KVM   - Add support for fetching SNP certificates from userspace   - Fix a bug where KVM would use vmcb02 instead of vmcb01 when     emulating VMLOAD or VMSAVE on behalf of L2   - Misc fixes and cleanups  x86 selftests:   - Add a regression test for TPR&lt;=&gt;CR8 synchronization and IRQ masking   - Overhaul selftest&apos;s MMU infrastructure to genericize stage-2 MMU     support, and extend x86&apos;s infrastructure to support EPT and NPT     (for L2 guests)   - Extend several nested VMX tests to also cover nested SVM   - Add a selftest for nested VMLOAD/VMSAVE   - Rework the nested dirty log test, originally added as a regression     test for PML where KVM logged L2 GPAs instead of L1 GPAs, to     improve test coverage and to hopefully make the test easier to     understand and maintain  guest_memfd:   - Remove kvm_gmem_populate()&apos;s preparation tracking and half-baked     hugepage handling. SEV/SNP was the only user of the tracking and it     can do it via the RMP   - Retroactively document and enforce (for SNP) that     KVM_SEV_SNP_LAUNCH_UPDATE and KVM_TDX_INIT_MEM_REGION require the     source page to be 4KiB aligned, to avoid non-trivial complexity for     something that no known VMM seems to be doing and to avoid an API     special case for in-place conversion, which simply can&apos;t support     unaligned sources   - When populating guest_memfd memory, GUP the source page in common     code and pass the refcounted page to the vendor callback, instead     of letting vendor code do the heavy lifting. Doing so avoids a     looming deadlock bug with in-place due an AB-BA conflict betwee     mmap_lock and guest_memfd&apos;s filemap invalidate lock  Generic:   - Fix a bug where KVM would ignore the vCPU&apos;s selected address space     when creating a vCPU-specific mapping of guest memory. Actually     this bug could not be hit even on x86, the only architecture with     multiple address spaces, but it&apos;s a bug nevertheless&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (267 commits)  KVM: s390: Increase permitted SE header size to 1 MiB  MAINTAINERS: Replace backup for s390 vfio-pci  KVM: s390: vsie: Fix race in acquire_gmap_shadow()  KVM: s390: vsie: Fix race in walk_guest_tables()  KVM: s390: Use guest address to mark guest page dirty  irqchip/riscv-imsic: Adjust the number of available guest irq files  RISC-V: KVM: Transparent huge page support  RISC-V: KVM: selftests: Add Zalasr extensions to get-reg-list test  RISC-V: KVM: Allow Zalasr extensions for Guest/VM  KVM: riscv: selftests: Add riscv vm satp modes  KVM: riscv: selftests: add Zilsd and Zclsd extension to get-reg-list test  riscv: KVM: allow Zilsd and Zclsd extensions for Guest/VM  RISC-V: KVM: Skip IMSIC update if vCPU IMSIC state is not initialized  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_rw_attr()  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_has_attr()  RISC-V: KVM: Remove unnecessary &apos;ret&apos; assignment  KVM: s390: Add explicit padding to struct kvm_s390_keyop  KVM: LoongArch: selftests: Add steal time test case  LoongArch: KVM: Add paravirt vcpu_is_preempted() support in guest side  LoongArch: KVM: Add paravirt preempt feature in hypervisor side  ...

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Fri, 13 Feb 2026 20:31:15 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>a0c468eda4386c67082973d21d811fd777a798ed - Merge tag &apos;kvm-x86-selftests-6.20&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#a0c468eda4386c67082973d21d811fd777a798ed</link>
        <description>Merge tag &apos;kvm-x86-selftests-6.20&apos; of https://github.com/kvm-x86/linux into HEADKVM selftests changes for 6.20 - Add a regression test for TPR&lt;=&gt;CR8 synchronization and IRQ masking. - Overhaul selftest&apos;s MMU infrastructure to genericize stage-2 MMU support,   and extend x86&apos;s infrastructure to support EPT and NPT (for L2 guests). - Extend several nested VMX tests to also cover nested SVM. - Add a selftest for nested VMLOAD/VMSAVE. - Rework the nested dirty log test, originally added as a regression test for   PML where KVM logged L2 GPAs instead of L1 GPAs, to improve test coverage   and to hopefully make the test easier to understand and maintain.

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Mon, 09 Feb 2026 18:38:54 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>753c0d5a507b939d6efc60c7b437d5330880cce3 - KVM: selftests: Add support for nested NPTs</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#753c0d5a507b939d6efc60c7b437d5330880cce3</link>
        <description>KVM: selftests: Add support for nested NPTsImplement nCR3 and NPT initialization functions, similar to the EPTequivalents, and create common TDP helpers for enablement checking andinitialization. Enable NPT for nested guests by default if the TDP MMUwas initialized, similar to VMX.Reuse the PTE masks from the main MMU in the NPT MMU, except for the Cand S bits related to confidential VMs.Signed-off-by: Yosry Ahmed &lt;yosry.ahmed@linux.dev&gt;Link: https://patch.msgid.link/20251230230150.4150236-17-seanjc@google.com[sean: apply Yosry&apos;s fixup for ncr3_gpa]Signed-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Wed, 31 Dec 2025 00:01:45 +0100</pubDate>
        <dc:creator>Yosry Ahmed &lt;yosry.ahmed@linux.dev&gt;</dc:creator>
    </item>
<item>
        <title>1260ed77798502de9c98020040d2995008de10cc - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#1260ed77798502de9c98020040d2995008de10cc</link>
        <description>Merge drm/drm-fixes into drm-misc-fixesBackmerging to get updates from v6.15-rc1.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Tue, 08 Apr 2025 10:15:47 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>946661e3bef8efa11ba8079d4ebafe6fc3b0aaad - Merge branch &apos;next&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#946661e3bef8efa11ba8079d4ebafe6fc3b0aaad</link>
        <description>Merge branch &apos;next&apos; into for-linusPrepare input updates for 6.15 merge window.

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Sat, 05 Apr 2025 08:04:35 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>0b119045b79a672bc6d8f18641c60fc8ce1b4585 - Merge tag &apos;v6.14-rc4&apos; into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#0b119045b79a672bc6d8f18641c60fc8ce1b4585</link>
        <description>Merge tag &apos;v6.14-rc4&apos; into nextSync up with the mainline.

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Wed, 26 Feb 2025 01:03:25 +0100</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>9e676a024fa1fa2bd8150c2d2ba85478280353bc - Merge tag &apos;v6.14-rc1&apos; into perf-tools-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#9e676a024fa1fa2bd8150c2d2ba85478280353bc</link>
        <description>Merge tag &apos;v6.14-rc1&apos; into perf-tools-nextTo get the various fixes in the current master.Signed-off-by: Namhyung Kim &lt;namhyung@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Wed, 05 Feb 2025 23:57:18 +0100</pubDate>
        <dc:creator>Namhyung Kim &lt;namhyung@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>0410c6121529409b08e81a77ae3ee58c657e2243 - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/include/x86/svm_util.h#0410c6121529409b08e81a77ae3ee58c657e2243</link>
        <description>Merge drm/drm-next into drm-xe-nextSync to fix conlicts between drm-xe-next and drm-intel-next.Signed-off-by: Lucas De Marchi &lt;lucas.demarchi@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/include/x86/svm_util.h</description>
        <pubDate>Fri, 28 Feb 2025 15:54:14 +0100</pubDate>
        <dc:creator>Lucas De Marchi &lt;lucas.demarchi@intel.com&gt;</dc:creator>
    </item>
</channel>
</rss>
