<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in config</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>1260ed77798502de9c98020040d2995008de10cc - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#1260ed77798502de9c98020040d2995008de10cc</link>
        <description>Merge drm/drm-fixes into drm-misc-fixesBackmerging to get updates from v6.15-rc1.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Tue, 08 Apr 2025 10:15:47 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>946661e3bef8efa11ba8079d4ebafe6fc3b0aaad - Merge branch &apos;next&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#946661e3bef8efa11ba8079d4ebafe6fc3b0aaad</link>
        <description>Merge branch &apos;next&apos; into for-linusPrepare input updates for 6.15 merge window.

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Sat, 05 Apr 2025 08:04:35 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>0b119045b79a672bc6d8f18641c60fc8ce1b4585 - Merge tag &apos;v6.14-rc4&apos; into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#0b119045b79a672bc6d8f18641c60fc8ce1b4585</link>
        <description>Merge tag &apos;v6.14-rc4&apos; into nextSync up with the mainline.

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Wed, 26 Feb 2025 01:03:25 +0100</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>9e676a024fa1fa2bd8150c2d2ba85478280353bc - Merge tag &apos;v6.14-rc1&apos; into perf-tools-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#9e676a024fa1fa2bd8150c2d2ba85478280353bc</link>
        <description>Merge tag &apos;v6.14-rc1&apos; into perf-tools-nextTo get the various fixes in the current master.Signed-off-by: Namhyung Kim &lt;namhyung@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Wed, 05 Feb 2025 23:57:18 +0100</pubDate>
        <dc:creator>Namhyung Kim &lt;namhyung@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>0410c6121529409b08e81a77ae3ee58c657e2243 - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#0410c6121529409b08e81a77ae3ee58c657e2243</link>
        <description>Merge drm/drm-next into drm-xe-nextSync to fix conlicts between drm-xe-next and drm-intel-next.Signed-off-by: Lucas De Marchi &lt;lucas.demarchi@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Fri, 28 Feb 2025 15:54:14 +0100</pubDate>
        <dc:creator>Lucas De Marchi &lt;lucas.demarchi@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>93c7dd1b39444ebd5a6a98e56a363d7a4e646775 - Merge drm/drm-next into drm-misc-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#93c7dd1b39444ebd5a6a98e56a363d7a4e646775</link>
        <description>Merge drm/drm-next into drm-misc-nextBring rc1 to start the new release dev.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Thu, 06 Feb 2025 13:47:32 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>ea9f8f2b21795a5d80418a655bcb212d5b89e08f - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#ea9f8f2b21795a5d80418a655bcb212d5b89e08f</link>
        <description>Merge drm/drm-next into drm-intel-nextSync with v6.14-rc1.Signed-off-by: Jani Nikula &lt;jani.nikula@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Wed, 05 Feb 2025 18:12:37 +0100</pubDate>
        <dc:creator>Jani Nikula &lt;jani.nikula@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>c771600c6af14749609b49565ffb4cac2959710d - Merge drm/drm-next into drm-intel-gt-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#c771600c6af14749609b49565ffb4cac2959710d</link>
        <description>Merge drm/drm-next into drm-intel-gt-nextWe need4ba4f1afb6a9 (&quot;perf: Generic hotplug support for a PMU with a scope&quot;)in order to land a i915 PMU simplification and a fix. That landed in 6.12and we are stuck at 6.9 so lets bump things forward.Signed-off-by: Tvrtko Ursulin &lt;tursulin@ursulin.net&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Wed, 05 Feb 2025 10:29:14 +0100</pubDate>
        <dc:creator>Tvrtko Ursulin &lt;tursulin@ursulin.net&gt;</dc:creator>
    </item>
<item>
        <title>b3cc7428a32202936904b5b07cf9f135025bafd6 - Merge branch &apos;for-6.15/amd_sfh&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#b3cc7428a32202936904b5b07cf9f135025bafd6</link>
        <description>Merge branch &apos;for-6.15/amd_sfh&apos; into for-linusFrom: Mario Limonciello &lt;mario.limonciello@amd.com&gt;Some platforms include a human presence detection (HPD) sensor. Whenenabled and a user is detected a wake event will be emitted from thesensor fusion hub that software can react to.Example use cases are &quot;wake from suspend on approach&quot; or to &quot;lockwhen leaving&quot;.This is currently enabled by default on supported systems, but userscan&apos;t control it. This essentially means that wake on approach isenabled which is a really surprising behavior to users that don&apos;texpect it.Instead of defaulting to enabled add a sysfs knob that users canuse to enable the feature if desirable and set it to disabled bydefault.

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Wed, 26 Mar 2025 13:42:07 +0100</pubDate>
        <dc:creator>Jiri Kosina &lt;jkosina@suse.com&gt;</dc:creator>
    </item>
<item>
        <title>0f8e26b38d7ac72b3ad764944a25dd5808f37a6e - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#0f8e26b38d7ac72b3ad764944a25dd5808f37a6e</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm updates from Paolo Bonzini: &quot;Loongarch:   - Clear LLBCTL if secondary mmu mapping changes   - Add hypercall service support for usermode VMM  x86:   - Add a comment to kvm_mmu_do_page_fault() to explain why KVM     performs a direct call to kvm_tdp_page_fault() when RETPOLINE is     enabled   - Ensure that all SEV code is compiled out when disabled in Kconfig,     even if building with less brilliant compilers   - Remove a redundant TLB flush on AMD processors when guest CR4.PGE     changes   - Use str_enabled_disabled() to replace open coded strings   - Drop kvm_x86_ops.hwapic_irr_update() as KVM updates hardware&apos;s     APICv cache prior to every VM-Enter   - Overhaul KVM&apos;s CPUID feature infrastructure to track all vCPU     capabilities instead of just those where KVM needs to manage state     and/or explicitly enable the feature in hardware. Along the way,     refactor the code to make it easier to add features, and to make it     more self-documenting how KVM is handling each feature   - Rework KVM&apos;s handling of VM-Exits during event vectoring; this     plugs holes where KVM unintentionally puts the vCPU into infinite     loops in some scenarios (e.g. if emulation is triggered by the     exit), and brings parity between VMX and SVM   - Add pending request and interrupt injection information to the     kvm_exit and kvm_entry tracepoints respectively   - Fix a relatively benign flaw where KVM would end up redoing RDPKRU     when loading guest/host PKRU, due to a refactoring of the kernel     helpers that didn&apos;t account for KVM&apos;s pre-checking of the need to     do WRPKRU   - Make the completion of hypercalls go through the complete_hypercall     function pointer argument, no matter if the hypercall exits to     userspace or not.     Previously, the code assumed that KVM_HC_MAP_GPA_RANGE specifically     went to userspace, and all the others did not; the new code need     not special case KVM_HC_MAP_GPA_RANGE and in fact does not care at     all whether there was an exit to userspace or not   - As part of enabling TDX virtual machines, support support     separation of private/shared EPT into separate roots.     When TDX will be enabled, operations on private pages will need to     go through the privileged TDX Module via SEAMCALLs; as a result,     they are limited and relatively slow compared to reading a PTE.     The patches included in 6.14 allow KVM to keep a mirror of the     private EPT in host memory, and define entries in kvm_x86_ops to     operate on external page tables such as the TDX private EPT   - The recently introduced conversion of the NX-page reclamation     kthread to vhost_task moved the task under the main process. The     task is created as soon as KVM_CREATE_VM was invoked and this, of     course, broke userspace that didn&apos;t expect to see any child task of     the VM process until it started creating its own userspace threads.     In particular crosvm refuses to fork() if procfs shows any child     task, so unbreak it by creating the task lazily. This is arguably a     userspace bug, as there can be other kinds of legitimate worker     tasks and they wouldn&apos;t impede fork(); but it&apos;s not like userspace     has a way to distinguish kernel worker tasks right now. Should they     show as &quot;Kthread: 1&quot; in proc/.../status?  x86 - Intel:   - Fix a bug where KVM updates hardware&apos;s APICv cache of the highest     ISR bit while L2 is active, while ultimately results in a     hardware-accelerated L1 EOI effectively being lost   - Honor event priority when emulating Posted Interrupt delivery     during nested VM-Enter by queueing KVM_REQ_EVENT instead of     immediately handling the interrupt   - Rework KVM&apos;s processing of the Page-Modification Logging buffer to     reap entries in the same order they were created, i.e. to mark gfns     dirty in the same order that hardware marked the page/PTE dirty   - Misc cleanups  Generic:   - Cleanup and harden kvm_set_memory_region(); add proper lockdep     assertions when setting memory regions and add a dedicated API for     setting KVM-internal memory regions. The API can then explicitly     disallow all flags for KVM-internal memory regions   - Explicitly verify the target vCPU is online in kvm_get_vcpu() to     fix a bug where KVM would return a pointer to a vCPU prior to it     being fully online, and give kvm_for_each_vcpu() similar treatment     to fix a similar flaw   - Wait for a vCPU to come online prior to executing a vCPU ioctl, to     fix a bug where userspace could coerce KVM into handling the ioctl     on a vCPU that isn&apos;t yet onlined   - Gracefully handle xarray insertion failures; even though such     failures are impossible in practice after xa_reserve(), reserving     an entry is always followed by xa_store() which does not know (or     differentiate) whether there was an xa_reserve() before or not  RISC-V:   - Zabha, Svvptc, and Ziccrse extension support for guests. None of     them require anything in KVM except for detecting them and marking     them as supported; Zabha adds byte and halfword atomic operations,     while the others are markers for specific operation of the TLB and     of LL/SC instructions respectively   - Virtualize SBI system suspend extension for Guest/VM   - Support firmware counters which can be used by the guests to     collect statistics about traps that occur in the host  Selftests:   - Rework vcpu_get_reg() to return a value instead of using an     out-param, and update all affected arch code accordingly   - Convert the max_guest_memory_test into a more generic     mmu_stress_test. The basic gist of the &quot;conversion&quot; is to have the     test do mprotect() on guest memory while vCPUs are accessing said     memory, e.g. to verify KVM and mmu_notifiers are working as     intended   - Play nice with treewrite builds of unsupported architectures, e.g.     arm (32-bit), as KVM selftests&apos; Makefile doesn&apos;t do anything to     ensure the target architecture is actually one KVM selftests     supports   - Use the kernel&apos;s $(ARCH) definition instead of the target triple     for arch specific directories, e.g. arm64 instead of aarch64,     mainly so as not to be different from the rest of the kernel   - Ensure that format strings for logging statements are checked by     the compiler even when the logging statement itself is disabled   - Attempt to whack the last LLC references/misses mole in the Intel     PMU counters test by adding a data load and doing CLFLUSH{OPT} on     the data instead of the code being executed. It seems that modern     Intel CPUs have learned new code prefetching tricks that bypass the     PMU counters   - Fix a flaw in the Intel PMU counters test where it asserts that     events are counting correctly without actually knowing what the     events count given the underlying hardware; this can happen if     Intel reuses a formerly microarchitecture-specific event encoding     as an architectural event, as was the case for Top-Down Slots&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (151 commits)  kvm: defer huge page recovery vhost task to later  KVM: x86/mmu: Return RET_PF* instead of 1 in kvm_mmu_page_fault()  KVM: Disallow all flags for KVM-internal memslots  KVM: x86: Drop double-underscores from __kvm_set_memory_region()  KVM: Add a dedicated API for setting KVM-internal memslots  KVM: Assert slots_lock is held when setting memory regions  KVM: Open code kvm_set_memory_region() into its sole caller (ioctl() API)  LoongArch: KVM: Add hypercall service support for usermode VMM  LoongArch: KVM: Clear LLBCTL if secondary mmu mapping is changed  KVM: SVM: Use str_enabled_disabled() helper in svm_hardware_setup()  KVM: VMX: read the PML log in the same order as it was written  KVM: VMX: refactor PML terminology  KVM: VMX: Fix comment of handle_vmx_instruction()  KVM: VMX: Reinstate __exit attribute for vmx_exit()  KVM: SVM: Use str_enabled_disabled() helper in sev_hardware_setup()  KVM: x86: Avoid double RDPKRU when loading host/guest PKRU  KVM: x86: Use LVT_TIMER instead of an open coded literal  RISC-V: KVM: Add new exit statstics for redirected traps  RISC-V: KVM: Update firmware counters for various events  RISC-V: KVM: Redirect instruction access fault trap to guest  ...

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Sat, 25 Jan 2025 18:55:09 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>a066bad89c6c79890bb8f45aef8662dcd0562a62 - Merge tag &apos;kvm-selftests-treewide-6.14&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#a066bad89c6c79890bb8f45aef8662dcd0562a62</link>
        <description>Merge tag &apos;kvm-selftests-treewide-6.14&apos; of https://github.com/kvm-x86/linux into HEADKVM selftests &quot;tree&quot;-wide changes for 6.14: - Rework vcpu_get_reg() to return a value instead of using an out-param, and   update all affected arch code accordingly. - Convert the max_guest_memory_test into a more generic mmu_stress_test.   The basic gist of the &quot;conversion&quot; is to have the test do mprotect() on   guest memory while vCPUs are accessing said memory, e.g. to verify KVM   and mmu_notifiers are working as intended. - Play nice with treewrite builds of unsupported architectures, e.g. arm   (32-bit), as KVM selftests&apos; Makefile doesn&apos;t do anything to ensure the   target architecture is actually one KVM selftests supports. - Use the kernel&apos;s $(ARCH) definition instead of the target triple for arch   specific directories, e.g. arm64 instead of aarch64, mainly so as not to   be different from the rest of the kernel.

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Thu, 19 Dec 2024 13:50:06 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>67730e6c53d70fb31618230f81c4acee9f72eaa3 - KVM: selftests: Use canonical $(ARCH) paths for KVM selftests directories</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/s390/config#67730e6c53d70fb31618230f81c4acee9f72eaa3</link>
        <description>KVM: selftests: Use canonical $(ARCH) paths for KVM selftests directoriesUse the kernel&apos;s canonical $(ARCH) paths instead of the raw target triplefor KVM selftests directories.  KVM selftests are quite nearly the onlyplace in the entire kernel that using the target triple for directories,tools/testing/selftests/drivers/s390x being the lone holdout.Using the kernel&apos;s preferred nomenclature eliminates the minor, butannoying, friction of having to translate to KVM&apos;s selftests directories,e.g. for pattern matching, opening files, running selftests, etc.Opportunsitically delete file comments that reference the full path of thefile, as they are obviously prone to becoming stale, and serve no knownpurpose.Reviewed-by: Muhammad Usama Anjum &lt;usama.anjum@collabora.com&gt;Acked-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;Acked-by: Andrew Jones &lt;ajones@ventanamicro.com&gt;Link: https://lore.kernel.org/r/20241128005547.4077116-16-seanjc@google.comSigned-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/s390/config</description>
        <pubDate>Thu, 28 Nov 2024 01:55:46 +0100</pubDate>
        <dc:creator>Sean Christopherson &lt;seanjc@google.com&gt;</dc:creator>
    </item>
</channel>
</rss>
