<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in fix_hypercall_test.c</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>06bc7ff0a1e0f2b0102e1314e3527a7ec0997851 - Merge tag &apos;asoc-fix-v7.1-rc2&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#06bc7ff0a1e0f2b0102e1314e3527a7ec0997851</link>
        <description>Merge tag &apos;asoc-fix-v7.1-rc2&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linusASoC: Fixes for v7.1Another batch of fixes, plus a couple of quirks (mostly AMD ones, as hasbeen the case recently).  All driver changes, including fixes for theKUnit tests for the Cirrus drivers that could cause memory corruption.

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Wed, 06 May 2026 16:10:00 +0200</pubDate>
        <dc:creator>Takashi Iwai &lt;tiwai@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>57b8e2d666a31fa201432d58f5fe3469a0dd83ba - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#57b8e2d666a31fa201432d58f5fe3469a0dd83ba</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm updates from Paolo Bonzini: &quot;On top of a lot of Arm fixes, this includes a massive rename of types  and variables in tools/testing/selftests/kvm - these were  unnecessarily different from what the kernel uses, so they&apos;re being  made consistent.  arm64:   - Allow tracing for non-pKVM, which was accidentally disabled when     the series was merged   - Rationalise the way the pKVM hypercall ranges are defined by using     the same mechanism as already used for the vcpu_sysreg enum   - Enforce that SMCCC function numbers relayed by the pKVM proxy are     actually compliant with the specification   - Fix a couple of feature to idreg mappings which resulted in the     wrong sanitisation being applied   - Fix the GICD_IIDR revision number field that could never been     written correctly by userspace   - Make kvm_vcpu_initialized() correctly use its parameter instead of     relying on the surrounding context   - Enforce correct ordering in __pkvm_init_vcpu(), plugging a     potential pin leak at the same time   - Move __pkvm_init_finalise() to a less dangerous spot, avoiding     future problems   - Restore functional userspace irqchip support after a four year     breakage (last functional kernel was 5.18...)   - Spelling fixes  Selftests:   - Rename types across all KVM selftests to more closely align with     types used in the kernel:        vm_vaddr_t -&gt; gva_t        vm_paddr_t -&gt; gpa_t        uint64_t -&gt; u64        uint32_t -&gt; u32        uint16_t -&gt; u16        uint8_t  -&gt; u8        int64_t -&gt; s64        int32_t -&gt; s32        int16_t -&gt; s16        int8_t  -&gt; s8   - Fix Loongarch compilation&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (31 commits)  KVM: selftests: Add check_steal_time_uapi() implementation for LoongArch  KVM: arm64: Wake-up from WFI when iqrchip is in userspace  KVM: arm64: Fix initialisation order in __pkvm_init_finalise()  KVM: arm64: Fix pin leak and publication ordering in __pkvm_init_vcpu()  KVM: arm64: Fix kvm_vcpu_initialized() macro parameter  KVM: arm64: Fix FEAT_SPE_FnE to use PMSIDR_EL1.FnE, not PMSVer  KVM: arm64: Fix typo in feature check comments  KVM: arm64: Fix FEAT_Debugv8p9 to check DebugVer, not PMUVer  KVM: arm64: Reject non compliant SMCCC function calls in pKVM  KVM: arm64: vgic: Fix IIDR revision field extracted from wrong value  KVM: selftests: Replace &quot;paddr&quot; with &quot;gpa&quot; throughout  KVM: selftests: Replace &quot;u64 nested_paddr&quot; with &quot;gpa_t l2_gpa&quot;  KVM: selftests: Replace &quot;u64 gpa&quot; with &quot;gpa_t&quot; throughout  KVM: selftests: Replace &quot;vaddr&quot; with &quot;gva&quot; throughout  KVM: selftests: Clarify that arm64&apos;s inject_uer() takes a host PA, not a guest PA  KVM: selftests: Rename translate_to_host_paddr() =&gt; translate_hva_to_hpa()  KVM: selftests: Rename vm_vaddr_populate_bitmap() =&gt; vm_populate_gva_bitmap()  KVM: selftests: Rename vm_vaddr_unused_gap() =&gt; vm_unused_gva_gap()  KVM: selftests: Drop &quot;vaddr_&quot; from APIs that allocate memory for a given VM  KVM: selftests: Use u8 instead of uint8_t  ...

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Wed, 29 Apr 2026 15:56:50 +0200</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>0fc8f6200d2313278fbf4539bbab74677c685531 - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#0fc8f6200d2313278fbf4539bbab74677c685531</link>
        <description>Merge drm/drm-fixes into drm-misc-fixesGetting fixes and updates from v7.1-rc1.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Mon, 27 Apr 2026 10:26:49 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>39f1c201b93f4ff71631bac72cff6eb155f976a4 - Merge tag &apos;kvm-x86-selftests_kernel_types-7.1&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#39f1c201b93f4ff71631bac72cff6eb155f976a4</link>
        <description>Merge tag &apos;kvm-x86-selftests_kernel_types-7.1&apos; of https://github.com/kvm-x86/linux into HEADKVM selftests type renames for 7.1Renames types across all KVM selftests to more closely align with types usedin the kernel:  vm_vaddr_t -&gt; gva_t  vm_paddr_t -&gt; gpa_t  uint64_t -&gt; u64  uint32_t -&gt; u32  uint16_t -&gt; u16  uint8_t  -&gt; u8  int64_t -&gt; s64  int32_t -&gt; s32  int16_t -&gt; s16  int8_t  -&gt; s8Using the kernel&apos;s preferred types eliminates a source of friction for manycontributors, as the majority of KVM selftests contributions come from kerneldevelopers.  The kernel names are also shorter, which allows for more concisecode, and in any many cases eliminates newlines thanks to shorter types andparameter names.Rename variables and parameters as well as types, e.g. gpa instead of paddr,to again align with the kernel, and in a few cases to remove ambiguity, e.g.where paddr is used to refer to a _host_ physical address.

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Mon, 27 Apr 2026 10:24:41 +0200</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>6ec982b5a2c7c9f0f956fd955416ac11f52bf50a - KVM: selftests: Use u8 instead of uint8_t</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#6ec982b5a2c7c9f0f956fd955416ac11f52bf50a</link>
        <description>KVM: selftests: Use u8 instead of uint8_tUse u8 instead of uint8_t to make the KVM selftests code more conciseand more similar to the kernel (since selftests are primarily developedby kernel developers).This commit was generated with the following command:  git ls-files tools/testing/selftests/kvm | xargs sed -i &apos;s/uint8_t/u8/g&apos;Then by manually adjusting whitespace to make checkpatch.pl happy.No functional change intended.Signed-off-by: David Matlack &lt;dmatlack@google.com&gt;Link: https://patch.msgid.link/20260420212004.3938325-11-seanjc@google.comSigned-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Mon, 20 Apr 2026 23:19:55 +0200</pubDate>
        <dc:creator>David Matlack &lt;dmatlack@google.com&gt;</dc:creator>
    </item>
<item>
        <title>26f8453288d4c1fb8c96802eae15ddc988f5e068 - KVM: selftests: Use u64 instead of uint64_t</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#26f8453288d4c1fb8c96802eae15ddc988f5e068</link>
        <description>KVM: selftests: Use u64 instead of uint64_tUse u64 instead of uint64_t to make the KVM selftests code more conciseand more similar to the kernel (since selftests are primarily developedby kernel developers).This commit was generated with the following command:  git ls-files tools/testing/selftests/kvm | xargs sed -i &apos;s/uint64_t/u64/g&apos;Then by manually adjusting whitespace to make checkpatch.pl happy.Include &lt;linux/types.h&gt; in include/kvm_util_types.h, iinclude/test_util.h,and include/x86/pmu.h to pick up the tools-defined u64.  Arguably, allheaders (especially kvm_util_types.h) should have already been includingstdint.h to get uint64_t from the libc headers, but the missing dependencyonly rears its head once KVM uses u64 instead of uint64_t.No functional change intended.Signed-off-by: David Matlack &lt;dmatlack@google.com&gt;[sean: rename pread_uint64() =&gt; pread_u64, expand on types.h include]Link: https://patch.msgid.link/20260420212004.3938325-5-seanjc@google.comSigned-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Mon, 20 Apr 2026 23:19:49 +0200</pubDate>
        <dc:creator>David Matlack &lt;dmatlack@google.com&gt;</dc:creator>
    </item>
<item>
        <title>01f492e1817e858d1712f2489d0afbaa552f417b - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#01f492e1817e858d1712f2489d0afbaa552f417b</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm updates from Paolo Bonzini: &quot;Arm:   - Add support for tracing in the standalone EL2 hypervisor code,     which should help both debugging and performance analysis. This     uses the new infrastructure for &apos;remote&apos; trace buffers that can be     exposed by non-kernel entities such as firmware, and which came     through the tracing tree   - Add support for GICv5 Per Processor Interrupts (PPIs), as the     starting point for supporting the new GIC architecture in KVM   - Finally add support for pKVM protected guests, where pages are     unmapped from the host as they are faulted into the guest and can     be shared back from the guest using pKVM hypercalls. Protected     guests are created using a new machine type identifier. As the     elusive guestmem has not yet delivered on its promises, anonymous     memory is also supported     This is only a first step towards full isolation from the host; for     example, the CPU register state and DMA accesses are not yet     isolated. Because this does not really yet bring fully what it     promises, it is hidden behind CONFIG_ARM_PKVM_GUEST +     &apos;kvm-arm.mode=protected&apos;, and also triggers TAINT_USER when a VM is     created. Caveat emptor   - Rework the dreaded user_mem_abort() function to make it more     maintainable, reducing the amount of state being exposed to the     various helpers and rendering a substantial amount of state     immutable   - Expand the Stage-2 page table dumper to support NV shadow page     tables on a per-VM basis   - Tidy up the pKVM PSCI proxy code to be slightly less hard to     follow   - Fix both SPE and TRBE in non-VHE configurations so that they do not     generate spurious, out of context table walks that ultimately lead     to very bad HW lockups   - A small set of patches fixing the Stage-2 MMU freeing in error     cases   - Tighten-up accepted SMC immediate value to be only #0 for host     SMCCC calls   - The usual cleanups and other selftest churn  LoongArch:   - Use CSR_CRMD_PLV for kvm_arch_vcpu_in_kernel()   - Add DMSINTC irqchip in kernel support  RISC-V:   - Fix steal time shared memory alignment checks   - Fix vector context allocation leak   - Fix array out-of-bounds in pmu_ctr_read() and pmu_fw_ctr_read_hi()   - Fix double-free of sdata in kvm_pmu_clear_snapshot_area()   - Fix integer overflow in kvm_pmu_validate_counter_mask()   - Fix shift-out-of-bounds in make_xfence_request()   - Fix lost write protection on huge pages during dirty logging   - Split huge pages during fault handling for dirty logging   - Skip CSR restore if VCPU is reloaded on the same core   - Implement kvm_arch_has_default_irqchip() for KVM selftests   - Factored-out ISA checks into separate sources   - Added hideleg to struct kvm_vcpu_config   - Factored-out VCPU config into separate sources   - Support configuration of per-VM HGATP mode from KVM user space  s390:   - Support for ESA (31-bit) guests inside nested hypervisors   - Remove restriction on memslot alignment, which is not needed     anymore with the new gmap code   - Fix LPSW/E to update the bear (which of course is the breaking     event address register)  x86:   - Shut up various UBSAN warnings on reading module parameter before     they were initialized   - Don&apos;t zero-allocate page tables that are used for splitting     hugepages in the TDP MMU, as KVM is guaranteed to set all SPTEs in     the page table and thus write all bytes   - As an optimization, bail early when trying to unsync 4KiB mappings     if the target gfn can just be mapped with a 2MiB hugepage  x86 generic:   - Copy single-chunk MMIO write values into struct kvm_vcpu (more     precisely struct kvm_mmio_fragment) to fix use-after-free stack     bugs where KVM would dereference stack pointer after an exit to     userspace   - Clean up and comment the emulated MMIO code to try to make it     easier to maintain (not necessarily &quot;easy&quot;, but &quot;easier&quot;)   - Move VMXON+VMXOFF and EFER.SVME toggling out of KVM (not *all* of     VMX and SVM enabling) as it is needed for trusted I/O   - Advertise support for AVX512 Bit Matrix Multiply (BMM) instructions   - Immediately fail the build if a required #define is missing in one     of KVM&apos;s headers that is included multiple times   - Reject SET_GUEST_DEBUG with -EBUSY if there&apos;s an already injected     exception, mostly to prevent syzkaller from abusing the uAPI to     trigger WARNs, but also because it can help prevent userspace from     unintentionally crashing the VM   - Exempt SMM from CPUID faulting on Intel, as per the spec   - Misc hardening and cleanup changes  x86 (AMD):   - Fix and optimize IRQ window inhibit handling for AVIC; make it     per-vCPU so that KVM doesn&apos;t prematurely re-enable AVIC if multiple     vCPUs have to-be-injected IRQs   - Clean up and optimize the OSVW handling, avoiding a bug in which     KVM would overwrite state when enabling virtualization on multiple     CPUs in parallel. This should not be a problem because OSVW should     usually be the same for all CPUs   - Drop a WARN in KVM_MEMORY_ENCRYPT_REG_REGION where KVM complains     about a &quot;too large&quot; size based purely on user input   - Clean up and harden the pinning code for KVM_MEMORY_ENCRYPT_REG_REGION   - Disallow synchronizing a VMSA of an already-launched/encrypted     vCPU, as doing so for an SNP guest will crash the host due to an     RMP violation page fault   - Overhaul KVM&apos;s APIs for detecting SEV+ guests so that VM-scoped     queries are required to hold kvm-&gt;lock, and enforce it by lockdep.     Fix various bugs where sev_guest() was not ensured to be stable for     the whole duration of a function or ioctl   - Convert a pile of kvm-&gt;lock SEV code to guard()   - Play nicer with userspace that does not enable     KVM_CAP_EXCEPTION_PAYLOAD, for which KVM needs to set CR2 and DR6     as a response to ioctls such as KVM_GET_VCPU_EVENTS (even if the     payload would end up in EXITINFO2 rather than CR2, for example).     Only set CR2 and DR6 when consumption of the payload is imminent,     but on the other hand force delivery of the payload in all paths     where userspace retrieves CR2 or DR6   - Use vcpu-&gt;arch.cr2 when updating vmcb12&apos;s CR2 on nested #VMEXIT     instead of vmcb02-&gt;save.cr2. The value is out of sync after a     save/restore or after a #PF is injected into L2   - Fix a class of nSVM bugs where some fields written by the CPU are     not synchronized from vmcb02 to cached vmcb12 after VMRUN, and so     are not up-to-date when saved by KVM_GET_NESTED_STATE   - Fix a class of bugs where the ordering between KVM_SET_NESTED_STATE     and KVM_SET_{S}REGS could cause vmcb02 to be incorrectly     initialized after save+restore   - Add a variety of missing nSVM consistency checks   - Fix several bugs where KVM failed to correctly update VMCB fields     on nested #VMEXIT   - Fix several bugs where KVM failed to correctly synthesize #UD or     #GP for SVM-related instructions   - Add support for save+restore of virtualized LBRs (on SVM)   - Refactor various helpers and macros to improve clarity and     (hopefully) make the code easier to maintain   - Aggressively sanitize fields when copying from vmcb12, to guard     against unintentionally allowing L1 to utilize yet-to-be-defined     features   - Fix several bugs where KVM botched rAX legality checks when     emulating SVM instructions. There are remaining issues in that KVM     doesn&apos;t handle size prefix overrides for 64-bit guests   - Fail emulation of VMRUN/VMLOAD/VMSAVE if mapping vmcb12 fails     instead of somewhat arbitrarily synthesizing #GP (i.e. don&apos;t double     down on AMD&apos;s architectural but sketchy behavior of generating #GP     for &quot;unsupported&quot; addresses)   - Cache all used vmcb12 fields to further harden against TOCTOU bugs  x86 (Intel):   - Drop obsolete branch hint prefixes from the VMX instruction macros   - Use ASM_INPUT_RM() in __vmcs_writel() to coerce clang into using a     register input when appropriate   - Code cleanups  guest_memfd:   - Don&apos;t mark guest_memfd folios as accessed, as guest_memfd doesn&apos;t     support reclaim, the memory is unevictable, and there is no storage     to write back to  LoongArch selftests:   - Add KVM PMU test cases  s390 selftests:   - Enable more memory selftests  x86 selftests:   - Add support for Hygon CPUs in KVM selftests   - Fix a bug in the MSR test where it would get false failures on     AMD/Hygon CPUs with exactly one of RDPID or RDTSCP   - Add an MADV_COLLAPSE testcase for guest_memfd as a regression test     for a bug where the kernel would attempt to collapse guest_memfd     folios against KVM&apos;s will&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (373 commits)  KVM: x86: use inlines instead of macros for is_sev_*guest  x86/virt: Treat SVM as unsupported when running as an SEV+ guest  KVM: SEV: Goto an existing error label if charging misc_cg for an ASID fails  KVM: SVM: Move lock-protected allocation of SEV ASID into a separate helper  KVM: SEV: use mutex guard in snp_handle_guest_req()  KVM: SEV: use mutex guard in sev_mem_enc_unregister_region()  KVM: SEV: use mutex guard in sev_mem_enc_ioctl()  KVM: SEV: use mutex guard in snp_launch_update()  KVM: SEV: Assert that kvm-&gt;lock is held when querying SEV+ support  KVM: SEV: Document that checking for SEV+ guests when reclaiming memory is &quot;safe&quot;  KVM: SEV: Hide &quot;struct kvm_sev_info&quot; behind CONFIG_KVM_AMD_SEV=y  KVM: SEV: WARN on unhandled VM type when initializing VM  KVM: LoongArch: selftests: Add PMU overflow interrupt test  KVM: LoongArch: selftests: Add basic PMU event counting test  KVM: LoongArch: selftests: Add cpucfg read/write helpers  LoongArch: KVM: Add DMSINTC inject msi to vCPU  LoongArch: KVM: Add DMSINTC device support  LoongArch: KVM: Make vcpu_is_preempted() as a macro rather than function  LoongArch: KVM: Move host CSR_GSTAT save and restore in context switch  LoongArch: KVM: Move host CSR_EENTRY save and restore in context switch  ...

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Fri, 17 Apr 2026 16:18:03 +0200</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>c13008ed3d76142a001ebc56d8e391431cac2411 - Merge tag &apos;kvm-x86-selftests-7.1&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#c13008ed3d76142a001ebc56d8e391431cac2411</link>
        <description>Merge tag &apos;kvm-x86-selftests-7.1&apos; of https://github.com/kvm-x86/linux into HEADKVM selftests changes for 7.1 - Add support for Hygon CPUs in KVM selftests. - Fix a bug in the MSR test where it would get false failures on AMD/Hygon   CPUs with exactly one of RDPID or RDTSCP. - Add an MADV_COLLAPSE testcase for guest_memfd as a regression test for a   bug where the kernel would attempt to collapse guest_memfd folios against   KVM&apos;s will.

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Mon, 13 Apr 2026 11:53:46 +0200</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>53b2869231d3211ed638295e8873215d0ad10507 - KVM: selftests: Add a flag to identify AMD compatible test cases</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#53b2869231d3211ed638295e8873215d0ad10507</link>
        <description>KVM: selftests: Add a flag to identify AMD compatible test casesMost of KVM x86 selftests for AMD are compatible with Hygon architecture(but not all), add a flag &quot;host_cpu_is_amd_compatible&quot; to figure outthese cases.Following test failures on Hygon platform can be fixed:* Fix hypercall test: Hygon architecture also uses VMMCALL as guest  hypercall instruction.* Following test failures due to access reserved memory address regions:  - access_tracking_perf_test  - demand_paging_test  - dirty_log_perf_test  - dirty_log_test  - kvm_page_table_test  - memslot_modification_stress_test  - pre_fault_memory_test  - x86/dirty_log_page_splitting_testHygon CSV also makes the &quot;physical address space width reduction&quot;, thereduced physical address bits are reported by bits 11:6 ofCPUID[0x8000001f].EBX as well, so the existed logic is totallyapplicable for Hygon processors.  Mapping memory into these regions andaccessing to them results in a #PF.Signed-off-by: Zhiquan Li &lt;zhiquan_li@163.com&gt;Link: https://patch.msgid.link/20260212103841.171459-3-zhiquan_li@163.comSigned-off-by: Sean Christopherson &lt;seanjc@google.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Thu, 12 Feb 2026 11:38:39 +0100</pubDate>
        <dc:creator>Zhiquan Li &lt;zhiquan_li@163.com&gt;</dc:creator>
    </item>
<item>
        <title>1260ed77798502de9c98020040d2995008de10cc - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#1260ed77798502de9c98020040d2995008de10cc</link>
        <description>Merge drm/drm-fixes into drm-misc-fixesBackmerging to get updates from v6.15-rc1.Signed-off-by: Thomas Zimmermann &lt;tzimmermann@suse.de&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Tue, 08 Apr 2025 10:15:47 +0200</pubDate>
        <dc:creator>Thomas Zimmermann &lt;tzimmermann@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>946661e3bef8efa11ba8079d4ebafe6fc3b0aaad - Merge branch &apos;next&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#946661e3bef8efa11ba8079d4ebafe6fc3b0aaad</link>
        <description>Merge branch &apos;next&apos; into for-linusPrepare input updates for 6.15 merge window.

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Sat, 05 Apr 2025 08:04:35 +0200</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>0b119045b79a672bc6d8f18641c60fc8ce1b4585 - Merge tag &apos;v6.14-rc4&apos; into next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#0b119045b79a672bc6d8f18641c60fc8ce1b4585</link>
        <description>Merge tag &apos;v6.14-rc4&apos; into nextSync up with the mainline.

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Wed, 26 Feb 2025 01:03:25 +0100</pubDate>
        <dc:creator>Dmitry Torokhov &lt;dmitry.torokhov@gmail.com&gt;</dc:creator>
    </item>
<item>
        <title>9e676a024fa1fa2bd8150c2d2ba85478280353bc - Merge tag &apos;v6.14-rc1&apos; into perf-tools-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#9e676a024fa1fa2bd8150c2d2ba85478280353bc</link>
        <description>Merge tag &apos;v6.14-rc1&apos; into perf-tools-nextTo get the various fixes in the current master.Signed-off-by: Namhyung Kim &lt;namhyung@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Wed, 05 Feb 2025 23:57:18 +0100</pubDate>
        <dc:creator>Namhyung Kim &lt;namhyung@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>0410c6121529409b08e81a77ae3ee58c657e2243 - Merge drm/drm-next into drm-xe-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#0410c6121529409b08e81a77ae3ee58c657e2243</link>
        <description>Merge drm/drm-next into drm-xe-nextSync to fix conlicts between drm-xe-next and drm-intel-next.Signed-off-by: Lucas De Marchi &lt;lucas.demarchi@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Fri, 28 Feb 2025 15:54:14 +0100</pubDate>
        <dc:creator>Lucas De Marchi &lt;lucas.demarchi@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>93c7dd1b39444ebd5a6a98e56a363d7a4e646775 - Merge drm/drm-next into drm-misc-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#93c7dd1b39444ebd5a6a98e56a363d7a4e646775</link>
        <description>Merge drm/drm-next into drm-misc-nextBring rc1 to start the new release dev.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Thu, 06 Feb 2025 13:47:32 +0100</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>ea9f8f2b21795a5d80418a655bcb212d5b89e08f - Merge drm/drm-next into drm-intel-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#ea9f8f2b21795a5d80418a655bcb212d5b89e08f</link>
        <description>Merge drm/drm-next into drm-intel-nextSync with v6.14-rc1.Signed-off-by: Jani Nikula &lt;jani.nikula@intel.com&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Wed, 05 Feb 2025 18:12:37 +0100</pubDate>
        <dc:creator>Jani Nikula &lt;jani.nikula@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>c771600c6af14749609b49565ffb4cac2959710d - Merge drm/drm-next into drm-intel-gt-next</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#c771600c6af14749609b49565ffb4cac2959710d</link>
        <description>Merge drm/drm-next into drm-intel-gt-nextWe need4ba4f1afb6a9 (&quot;perf: Generic hotplug support for a PMU with a scope&quot;)in order to land a i915 PMU simplification and a fix. That landed in 6.12and we are stuck at 6.9 so lets bump things forward.Signed-off-by: Tvrtko Ursulin &lt;tursulin@ursulin.net&gt;

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Wed, 05 Feb 2025 10:29:14 +0100</pubDate>
        <dc:creator>Tvrtko Ursulin &lt;tursulin@ursulin.net&gt;</dc:creator>
    </item>
<item>
        <title>b3cc7428a32202936904b5b07cf9f135025bafd6 - Merge branch &apos;for-6.15/amd_sfh&apos; into for-linus</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#b3cc7428a32202936904b5b07cf9f135025bafd6</link>
        <description>Merge branch &apos;for-6.15/amd_sfh&apos; into for-linusFrom: Mario Limonciello &lt;mario.limonciello@amd.com&gt;Some platforms include a human presence detection (HPD) sensor. Whenenabled and a user is detected a wake event will be emitted from thesensor fusion hub that software can react to.Example use cases are &quot;wake from suspend on approach&quot; or to &quot;lockwhen leaving&quot;.This is currently enabled by default on supported systems, but userscan&apos;t control it. This essentially means that wake on approach isenabled which is a really surprising behavior to users that don&apos;texpect it.Instead of defaulting to enabled add a sysfs knob that users canuse to enable the feature if desirable and set it to disabled bydefault.

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Wed, 26 Mar 2025 13:42:07 +0100</pubDate>
        <dc:creator>Jiri Kosina &lt;jkosina@suse.com&gt;</dc:creator>
    </item>
<item>
        <title>0f8e26b38d7ac72b3ad764944a25dd5808f37a6e - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#0f8e26b38d7ac72b3ad764944a25dd5808f37a6e</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm updates from Paolo Bonzini: &quot;Loongarch:   - Clear LLBCTL if secondary mmu mapping changes   - Add hypercall service support for usermode VMM  x86:   - Add a comment to kvm_mmu_do_page_fault() to explain why KVM     performs a direct call to kvm_tdp_page_fault() when RETPOLINE is     enabled   - Ensure that all SEV code is compiled out when disabled in Kconfig,     even if building with less brilliant compilers   - Remove a redundant TLB flush on AMD processors when guest CR4.PGE     changes   - Use str_enabled_disabled() to replace open coded strings   - Drop kvm_x86_ops.hwapic_irr_update() as KVM updates hardware&apos;s     APICv cache prior to every VM-Enter   - Overhaul KVM&apos;s CPUID feature infrastructure to track all vCPU     capabilities instead of just those where KVM needs to manage state     and/or explicitly enable the feature in hardware. Along the way,     refactor the code to make it easier to add features, and to make it     more self-documenting how KVM is handling each feature   - Rework KVM&apos;s handling of VM-Exits during event vectoring; this     plugs holes where KVM unintentionally puts the vCPU into infinite     loops in some scenarios (e.g. if emulation is triggered by the     exit), and brings parity between VMX and SVM   - Add pending request and interrupt injection information to the     kvm_exit and kvm_entry tracepoints respectively   - Fix a relatively benign flaw where KVM would end up redoing RDPKRU     when loading guest/host PKRU, due to a refactoring of the kernel     helpers that didn&apos;t account for KVM&apos;s pre-checking of the need to     do WRPKRU   - Make the completion of hypercalls go through the complete_hypercall     function pointer argument, no matter if the hypercall exits to     userspace or not.     Previously, the code assumed that KVM_HC_MAP_GPA_RANGE specifically     went to userspace, and all the others did not; the new code need     not special case KVM_HC_MAP_GPA_RANGE and in fact does not care at     all whether there was an exit to userspace or not   - As part of enabling TDX virtual machines, support support     separation of private/shared EPT into separate roots.     When TDX will be enabled, operations on private pages will need to     go through the privileged TDX Module via SEAMCALLs; as a result,     they are limited and relatively slow compared to reading a PTE.     The patches included in 6.14 allow KVM to keep a mirror of the     private EPT in host memory, and define entries in kvm_x86_ops to     operate on external page tables such as the TDX private EPT   - The recently introduced conversion of the NX-page reclamation     kthread to vhost_task moved the task under the main process. The     task is created as soon as KVM_CREATE_VM was invoked and this, of     course, broke userspace that didn&apos;t expect to see any child task of     the VM process until it started creating its own userspace threads.     In particular crosvm refuses to fork() if procfs shows any child     task, so unbreak it by creating the task lazily. This is arguably a     userspace bug, as there can be other kinds of legitimate worker     tasks and they wouldn&apos;t impede fork(); but it&apos;s not like userspace     has a way to distinguish kernel worker tasks right now. Should they     show as &quot;Kthread: 1&quot; in proc/.../status?  x86 - Intel:   - Fix a bug where KVM updates hardware&apos;s APICv cache of the highest     ISR bit while L2 is active, while ultimately results in a     hardware-accelerated L1 EOI effectively being lost   - Honor event priority when emulating Posted Interrupt delivery     during nested VM-Enter by queueing KVM_REQ_EVENT instead of     immediately handling the interrupt   - Rework KVM&apos;s processing of the Page-Modification Logging buffer to     reap entries in the same order they were created, i.e. to mark gfns     dirty in the same order that hardware marked the page/PTE dirty   - Misc cleanups  Generic:   - Cleanup and harden kvm_set_memory_region(); add proper lockdep     assertions when setting memory regions and add a dedicated API for     setting KVM-internal memory regions. The API can then explicitly     disallow all flags for KVM-internal memory regions   - Explicitly verify the target vCPU is online in kvm_get_vcpu() to     fix a bug where KVM would return a pointer to a vCPU prior to it     being fully online, and give kvm_for_each_vcpu() similar treatment     to fix a similar flaw   - Wait for a vCPU to come online prior to executing a vCPU ioctl, to     fix a bug where userspace could coerce KVM into handling the ioctl     on a vCPU that isn&apos;t yet onlined   - Gracefully handle xarray insertion failures; even though such     failures are impossible in practice after xa_reserve(), reserving     an entry is always followed by xa_store() which does not know (or     differentiate) whether there was an xa_reserve() before or not  RISC-V:   - Zabha, Svvptc, and Ziccrse extension support for guests. None of     them require anything in KVM except for detecting them and marking     them as supported; Zabha adds byte and halfword atomic operations,     while the others are markers for specific operation of the TLB and     of LL/SC instructions respectively   - Virtualize SBI system suspend extension for Guest/VM   - Support firmware counters which can be used by the guests to     collect statistics about traps that occur in the host  Selftests:   - Rework vcpu_get_reg() to return a value instead of using an     out-param, and update all affected arch code accordingly   - Convert the max_guest_memory_test into a more generic     mmu_stress_test. The basic gist of the &quot;conversion&quot; is to have the     test do mprotect() on guest memory while vCPUs are accessing said     memory, e.g. to verify KVM and mmu_notifiers are working as     intended   - Play nice with treewrite builds of unsupported architectures, e.g.     arm (32-bit), as KVM selftests&apos; Makefile doesn&apos;t do anything to     ensure the target architecture is actually one KVM selftests     supports   - Use the kernel&apos;s $(ARCH) definition instead of the target triple     for arch specific directories, e.g. arm64 instead of aarch64,     mainly so as not to be different from the rest of the kernel   - Ensure that format strings for logging statements are checked by     the compiler even when the logging statement itself is disabled   - Attempt to whack the last LLC references/misses mole in the Intel     PMU counters test by adding a data load and doing CLFLUSH{OPT} on     the data instead of the code being executed. It seems that modern     Intel CPUs have learned new code prefetching tricks that bypass the     PMU counters   - Fix a flaw in the Intel PMU counters test where it asserts that     events are counting correctly without actually knowing what the     events count given the underlying hardware; this can happen if     Intel reuses a formerly microarchitecture-specific event encoding     as an architectural event, as was the case for Top-Down Slots&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (151 commits)  kvm: defer huge page recovery vhost task to later  KVM: x86/mmu: Return RET_PF* instead of 1 in kvm_mmu_page_fault()  KVM: Disallow all flags for KVM-internal memslots  KVM: x86: Drop double-underscores from __kvm_set_memory_region()  KVM: Add a dedicated API for setting KVM-internal memslots  KVM: Assert slots_lock is held when setting memory regions  KVM: Open code kvm_set_memory_region() into its sole caller (ioctl() API)  LoongArch: KVM: Add hypercall service support for usermode VMM  LoongArch: KVM: Clear LLBCTL if secondary mmu mapping is changed  KVM: SVM: Use str_enabled_disabled() helper in svm_hardware_setup()  KVM: VMX: read the PML log in the same order as it was written  KVM: VMX: refactor PML terminology  KVM: VMX: Fix comment of handle_vmx_instruction()  KVM: VMX: Reinstate __exit attribute for vmx_exit()  KVM: SVM: Use str_enabled_disabled() helper in sev_hardware_setup()  KVM: x86: Avoid double RDPKRU when loading host/guest PKRU  KVM: x86: Use LVT_TIMER instead of an open coded literal  RISC-V: KVM: Add new exit statstics for redirected traps  RISC-V: KVM: Update firmware counters for various events  RISC-V: KVM: Redirect instruction access fault trap to guest  ...

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Sat, 25 Jan 2025 18:55:09 +0100</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>a066bad89c6c79890bb8f45aef8662dcd0562a62 - Merge tag &apos;kvm-selftests-treewide-6.14&apos; of https://github.com/kvm-x86/linux into HEAD</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c#a066bad89c6c79890bb8f45aef8662dcd0562a62</link>
        <description>Merge tag &apos;kvm-selftests-treewide-6.14&apos; of https://github.com/kvm-x86/linux into HEADKVM selftests &quot;tree&quot;-wide changes for 6.14: - Rework vcpu_get_reg() to return a value instead of using an out-param, and   update all affected arch code accordingly. - Convert the max_guest_memory_test into a more generic mmu_stress_test.   The basic gist of the &quot;conversion&quot; is to have the test do mprotect() on   guest memory while vCPUs are accessing said memory, e.g. to verify KVM   and mmu_notifiers are working as intended. - Play nice with treewrite builds of unsupported architectures, e.g. arm   (32-bit), as KVM selftests&apos; Makefile doesn&apos;t do anything to ensure the   target architecture is actually one KVM selftests supports. - Use the kernel&apos;s $(ARCH) definition instead of the target triple for arch   specific directories, e.g. arm64 instead of aarch64, mainly so as not to   be different from the rest of the kernel.

            List of files:
            /linux/tools/testing/selftests/kvm/x86/fix_hypercall_test.c</description>
        <pubDate>Thu, 19 Dec 2024 13:50:06 +0100</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
</channel>
</rss>
