<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in gmap.c</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2025</copyright>
    <generator>Java</generator><item>
        <title>086aca1030cff9e4729785bcfafaf4b8c489a892 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#086aca1030cff9e4729785bcfafaf4b8c489a892</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm fixes from Paolo Bonzini: &quot;s390:   - vsie: Fix races with partial gmap invalidations  x86:   - Use __DECLARE_FLEX_ARRAY() for UAPI structures with VLAs&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm:  KVM: s390: vsie: Fix races with partial gmap invalidations  KVM: x86: Use __DECLARE_FLEX_ARRAY() for UAPI structures with VLAs

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Sat, 11 Apr 2026 18:45:20 +0000</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>1fe7294dfb7d26f70bc8f6d7aff26bf76ed32214 - Merge tag &apos;kvm-s390-master-7.0-4&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#1fe7294dfb7d26f70bc8f6d7aff26bf76ed32214</link>
        <description>Merge tag &apos;kvm-s390-master-7.0-4&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEADKVM: s390: One very last second fixFix one more gmap-rewrite issue: races with partial gmap invalidations.

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Sat, 11 Apr 2026 12:11:23 +0000</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>3ffe5eb4a5f248c0d4b849f050af973396656f85 - KVM: s390: vsie: Fix races with partial gmap invalidations</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#3ffe5eb4a5f248c0d4b849f050af973396656f85</link>
        <description>KVM: s390: vsie: Fix races with partial gmap invalidationsIntroduce a new boolean flag, used for shadow gmaps, to keep track ofwhether the gmap has been invalidated, either partially or totally.Use the new flag to check whether shadow gmap invalidations happenedduring shadowing. In such cases, abort whatever was going on, return-EAGAIN and let the caller try again.Fixes: 19d6c5b80443 (&quot;KVM: s390: vsie: Fix unshadowing while shadowing&quot;)Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;Message-ID: &lt;20260407161721.247044-1-imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Tue, 07 Apr 2026 16:17:21 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>b477ab8893c3e6b4be3074358db830687de7bfff - Merge tag &apos;asoc-fix-v7.0-rc6&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linus</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#b477ab8893c3e6b4be3074358db830687de7bfff</link>
        <description>Merge tag &apos;asoc-fix-v7.0-rc6&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound into for-linusASoC: Fixes for v7.0Another smallish batch of fixes and quirks, these days it&apos;s AMD that isgetting all the DMI entries added.  We&apos;ve got one core fix for a missinglist initialisation with auxiliary devices, otherwise it&apos;s all fairlysmall things.

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Thu, 02 Apr 2026 07:08:03 +0000</pubDate>
        <dc:creator>Takashi Iwai &lt;tiwai@suse.de&gt;</dc:creator>
    </item>
<item>
        <title>ac354b5cb04d2077c3821a6cbfbc7981ad45f84a - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#ac354b5cb04d2077c3821a6cbfbc7981ad45f84a</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull kvm fixes from Paolo Bonzini: &quot;s390:   - Lots of small and not-so-small fixes for the newly rewritten gmap,     mostly affecting the handling of nested guests.  x86:   - Fix an issue with shadow paging, which causes KVM to install an     MMIO PTE in the shadow page tables without first zapping a non-MMIO     SPTE if KVM didn&apos;t see the write that modified the shadowed guest     PTE.     While commit a54aa15c6bda3 (&quot;KVM: x86/mmu: Handle MMIO SPTEs     directly in mmu_set_spte()&quot;) was right about it being impossible to     miss such a write if it was coming from the guest, it failed to     account for writes to guest memory that are outside the scope of     KVM: if userspace modifies the guest PTE, and then the guest hits a     relevant page fault, KVM will get confused&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm:  KVM: x86/mmu: Only WARN in direct MMUs when overwriting shadow-present SPTE  KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE  KVM: s390: Fix KVM_S390_VCPU_FAULT ioctl  KVM: s390: vsie: Fix guest page tables protection  KVM: s390: vsie: Fix unshadowing while shadowing  KVM: s390: vsie: Fix refcount overflow for shadow gmaps  KVM: s390: vsie: Fix nested guest memory shadowing  KVM: s390: Correctly handle guest mappings without struct page  KVM: s390: Fix gmap_link()  KVM: s390: vsie: Fix check for pre-existing shadow mapping  KVM: s390: Remove non-atomic dat_crstep_xchg()  KVM: s390: vsie: Fix dat_split_ste()

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Sun, 29 Mar 2026 18:58:47 +0000</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>6c6ba5489586b6458980fc988736d7fb1be44f30 - Merge tag &apos;kvm-s390-master-7.0-2&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#6c6ba5489586b6458980fc988736d7fb1be44f30</link>
        <description>Merge tag &apos;kvm-s390-master-7.0-2&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEADKVM: s390: More memory management fixesLots of small and not-so-small fixes for the newly rewritten gmap,mostly affecting the handling of nested guests.

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Fri, 27 Mar 2026 21:30:44 +0000</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>19d6c5b8044366c88c1b1f6e831c0661ff1ddd20 - KVM: s390: vsie: Fix unshadowing while shadowing</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#19d6c5b8044366c88c1b1f6e831c0661ff1ddd20</link>
        <description>KVM: s390: vsie: Fix unshadowing while shadowingIf shadowing causes the shadow gmap to get unshadowed, exit early toprevent an attempt to dereference the parent pointer, which at thispoint is NULL.Opportunistically add some more checks to prevent NULL parents.Fixes: a2c17f9270cc (&quot;KVM: s390: New gmap code&quot;)Fixes: e5f98a6899bd (&quot;KVM: s390: Add some helper functions needed for vSIE&quot;)Fixes: e38c884df921 (&quot;KVM: s390: Switch to new gmap&quot;)Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Thu, 26 Mar 2026 13:17:17 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>0f2b760a17126cb7940d410c99edfa14e928554c - KVM: s390: Correctly handle guest mappings without struct page</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#0f2b760a17126cb7940d410c99edfa14e928554c</link>
        <description>KVM: s390: Correctly handle guest mappings without struct pageIntroduce a new special softbit for large pages, like already presendfor normal pages, and use it to mark guest mappings that do not havestruct pages.Whenever a leaf DAT entry becomes dirty, check the special softbit andonly call SetPageDirty() if there is an actual struct page.Move the logic to mark pages dirty inside _gmap_ptep_xchg() and_gmap_crstep_xchg_atomic(), to avoid needlessly duplicating the code.Fixes: 5a74e3d93417 (&quot;KVM: s390: KVM-specific bitfields and helper functions&quot;)Fixes: a2c17f9270cc (&quot;KVM: s390: New gmap code&quot;)Reviewed-by: Christian Borntraeger &lt;borntraeger@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Thu, 26 Mar 2026 13:17:14 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>45921d0212d4a335680854c89a14efd01eae911a - KVM: s390: Fix gmap_link()</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#45921d0212d4a335680854c89a14efd01eae911a</link>
        <description>KVM: s390: Fix gmap_link()The slow path of the fault handler ultimately called gmap_link(), whichassumed the fault was a major fault, and blindly called dat_link().In case of minor faults, things were not always handled properly; inparticular the prefix and vsie marker bits were ignored.Move dat_link() into gmap.c, renaming it accordingly. Once moved, thenew _gmap_link() function will be able to correctly honour the prefixand vsie markers.This will cause spurious unshadows in some uncommon cases.Fixes: 94fd9b16cc67 (&quot;KVM: s390: KVM page table management functions: lifecycle management&quot;)Fixes: a2c17f9270cc (&quot;KVM: s390: New gmap code&quot;)Reviewed-by: Steffen Eiden &lt;seiden@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Thu, 26 Mar 2026 13:17:13 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>b827ef02f409bd42c7e7fb82663b84753c0e5d14 - KVM: s390: Remove non-atomic dat_crstep_xchg()</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#b827ef02f409bd42c7e7fb82663b84753c0e5d14</link>
        <description>KVM: s390: Remove non-atomic dat_crstep_xchg()In practice dat_crstep_xchg() is racy and hard to use correctly. Simplyremove it and replace its uses with dat_crstep_xchg_atomic().This solves some actual races that lead to system hangs / crashes.Opportunistically fix an alignment issue in _gmap_crstep_xchg_atomic().Fixes: 589071eaaa8f (&quot;KVM: s390: KVM page table management functions: clear and replace&quot;)Fixes: 94fd9b16cc67 (&quot;KVM: s390: KVM page table management functions: lifecycle management&quot;)Reviewed-by: Steffen Eiden &lt;seiden@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Thu, 26 Mar 2026 13:17:11 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>c17ee635fd3a482b2ad2bf5e269755c2eae5f25e - Merge drm/drm-fixes into drm-misc-fixes</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#c17ee635fd3a482b2ad2bf5e269755c2eae5f25e</link>
        <description>Merge drm/drm-fixes into drm-misc-fixes7.0-rc1 was just released, let&apos;s merge it to kick the new release cycle.Signed-off-by: Maxime Ripard &lt;mripard@kernel.org&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Mon, 23 Feb 2026 09:09:45 +0000</pubDate>
        <dc:creator>Maxime Ripard &lt;mripard@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>8934827db5403eae57d4537114a9ff88b0a8460f - Merge tag &apos;kmalloc_obj-treewide-v7.0-rc1&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#8934827db5403eae57d4537114a9ff88b0a8460f</link>
        <description>Merge tag &apos;kmalloc_obj-treewide-v7.0-rc1&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linuxPull kmalloc_obj conversion from Kees Cook: &quot;This does the tree-wide conversion to kmalloc_obj() and friends using  coccinelle, with a subsequent small manual cleanup of whitespace  alignment that coccinelle does not handle.  This uncovered a clang bug in __builtin_counted_by_ref(), so the  conversion is preceded by disabling that for current versions of  clang.  The imminent clang 22.1 release has the fix.  I&apos;ve done allmodconfig build tests for x86_64, arm64, i386, and arm. I  did defconfig builds for alpha, m68k, mips, parisc, powerpc, riscv,  s390, sparc, sh, arc, csky, xtensa, hexagon, and openrisc&quot;* tag &apos;kmalloc_obj-treewide-v7.0-rc1&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux:  kmalloc_obj: Clean up after treewide replacements  treewide: Replace kmalloc with kmalloc_obj for non-scalar types  compiler_types: Disable __builtin_counted_by_ref for Clang

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Sat, 21 Feb 2026 19:02:58 +0000</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>69050f8d6d075dc01af7a5f2f550a8067510366f - treewide: Replace kmalloc with kmalloc_obj for non-scalar types</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#69050f8d6d075dc01af7a5f2f550a8067510366f</link>
        <description>treewide: Replace kmalloc with kmalloc_obj for non-scalar typesThis is the result of running the Coccinelle script fromscripts/coccinelle/api/kmalloc_objs.cocci. The script is designed toavoid scalar types (which need careful case-by-case checking), andinstead replace kmalloc-family calls that allocate struct or unionobject instances:Single allocations:	kmalloc(sizeof(TYPE), ...)are replaced with:	kmalloc_obj(TYPE, ...)Array allocations:	kmalloc_array(COUNT, sizeof(TYPE), ...)are replaced with:	kmalloc_objs(TYPE, COUNT, ...)Flex array allocations:	kmalloc(struct_size(PTR, FAM, COUNT), ...)are replaced with:	kmalloc_flex(*PTR, FAM, COUNT, ...)(where TYPE may also be *VAR)The resulting allocations no longer return &quot;void *&quot;, instead returning&quot;TYPE *&quot;.Signed-off-by: Kees Cook &lt;kees@kernel.org&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Sat, 21 Feb 2026 07:49:23 +0000</pubDate>
        <dc:creator>Kees Cook &lt;kees@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>cb5573868ea85ddbc74dd9a917acd1e434d21390 - Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#cb5573868ea85ddbc74dd9a917acd1e434d21390</link>
        <description>Merge tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvmPull KVM updates from Paolo Bonzini: &quot;Loongarch:   - Add more CPUCFG mask bits   - Improve feature detection   - Add lazy load support for FPU and binary translation (LBT) register     state   - Fix return value for memory reads from and writes to in-kernel     devices   - Add support for detecting preemption from within a guest   - Add KVM steal time test case to tools/selftests  ARM:   - Add support for FEAT_IDST, allowing ID registers that are not     implemented to be reported as a normal trap rather than as an UNDEF     exception   - Add sanitisation of the VTCR_EL2 register, fixing a number of     UXN/PXN/XN bugs in the process   - Full handling of RESx bits, instead of only RES0, and resulting in     SCTLR_EL2 being added to the list of sanitised registers   - More pKVM fixes for features that are not supposed to be exposed to     guests   - Make sure that MTE being disabled on the pKVM host doesn&apos;t give it     the ability to attack the hypervisor   - Allow pKVM&apos;s host stage-2 mappings to use the Force Write Back     version of the memory attributes by using the &quot;pass-through&apos;     encoding   - Fix trapping of ICC_DIR_EL1 on GICv5 hosts emulating GICv3 for the     guest   - Preliminary work for guest GICv5 support   - A bunch of debugfs fixes, removing pointless custom iterators     stored in guest data structures   - A small set of FPSIMD cleanups   - Selftest fixes addressing the incorrect alignment of page     allocation   - Other assorted low-impact fixes and spelling fixes  RISC-V:   - Fixes for issues discoverd by KVM API fuzzing in     kvm_riscv_aia_imsic_has_attr(), kvm_riscv_aia_imsic_rw_attr(), and     kvm_riscv_vcpu_aia_imsic_update()   - Allow Zalasr, Zilsd and Zclsd extensions for Guest/VM   - Transparent huge page support for hypervisor page tables   - Adjust the number of available guest irq files based on MMIO     register sizes found in the device tree or the ACPI tables   - Add RISC-V specific paging modes to KVM selftests   - Detect paging mode at runtime for selftests  s390:   - Performance improvement for vSIE (aka nested virtualization)   - Completely new memory management. s390 was a special snowflake that     enlisted help from the architecture&apos;s page table management to     build hypervisor page tables, in particular enabling sharing the     last level of page tables. This however was a lot of code (~3K     lines) in order to support KVM, and also blocked several features.     The biggest advantages is that the page size of userspace is     completely independent of the page size used by the guest:     userspace can mix normal pages, THPs and hugetlbfs as it sees fit,     and in fact transparent hugepages were not possible before. It&apos;s     also now possible to have nested guests and guests with huge pages     running on the same host   - Maintainership change for s390 vfio-pci   - Small quality of life improvement for protected guests  x86:   - Add support for giving the guest full ownership of PMU hardware     (contexted switched around the fastpath run loop) and allowing     direct access to data MSRs and PMCs (restricted by the vPMU model).     KVM still intercepts access to control registers, e.g. to enforce     event filtering and to prevent the guest from profiling sensitive     host state. This is more accurate, since it has no risk of     contention and thus dropped events, and also has significantly less     overhead.     For more information, see the commit message for merge commit     bf2c3138ae36 (&quot;Merge tag &apos;kvm-x86-pmu-6.20&apos; ...&quot;)   - Disallow changing the virtual CPU model if L2 is active, for all     the same reasons KVM disallows change the model after the first     KVM_RUN   - Fix a bug where KVM would incorrectly reject host accesses to PV     MSRs when running with KVM_CAP_ENFORCE_PV_FEATURE_CPUID enabled,     even if those were advertised as supported to userspace,   - Fix a bug with protected guest state (SEV-ES/SNP and TDX) VMs,     where KVM would attempt to read CR3 configuring an async #PF entry   - Fail the build if EXPORT_SYMBOL_GPL or EXPORT_SYMBOL is used in KVM     (for x86 only) to enforce usage of EXPORT_SYMBOL_FOR_KVM_INTERNAL.     Only a few exports that are intended for external usage, and those     are allowed explicitly   - When checking nested events after a vCPU is unblocked, ignore     -EBUSY instead of WARNing. Userspace can sometimes put the vCPU     into what should be an impossible state, and spurious exit to     userspace on -EBUSY does not really do anything to solve the issue   - Also throw in the towel and drop the WARN on INIT/SIPI being     blocked when vCPU is in Wait-For-SIPI, which also resulted in     playing whack-a-mole with syzkaller stuffing architecturally     impossible states into KVM   - Add support for new Intel instructions that don&apos;t require anything     beyond enumerating feature flags to userspace   - Grab SRCU when reading PDPTRs in KVM_GET_SREGS2   - Add WARNs to guard against modifying KVM&apos;s CPU caps outside of the     intended setup flow, as nested VMX in particular is sensitive to     unexpected changes in KVM&apos;s golden configuration   - Add a quirk to allow userspace to opt-in to actually suppress EOI     broadcasts when the suppression feature is enabled by the guest     (currently limited to split IRQCHIP, i.e. userspace I/O APIC).     Sadly, simply fixing KVM to honor Suppress EOI Broadcasts isn&apos;t an     option as some userspaces have come to rely on KVM&apos;s buggy behavior     (KVM advertises Supress EOI Broadcast irrespective of whether or     not userspace I/O APIC supports Directed EOIs)   - Clean up KVM&apos;s handling of marking mapped vCPU pages dirty   - Drop a pile of *ancient* sanity checks hidden behind in KVM&apos;s     unused ASSERT() macro, most of which could be trivially triggered     by the guest and/or user, and all of which were useless   - Fold &quot;struct dest_map&quot; into its sole user, &quot;struct rtc_status&quot;, to     make it more obvious what the weird parameter is used for, and to     allow fropping these RTC shenanigans if CONFIG_KVM_IOAPIC=n   - Bury all of ioapic.h, i8254.h and related ioctls (including     KVM_CREATE_IRQCHIP) behind CONFIG_KVM_IOAPIC=y   - Add a regression test for recent APICv update fixes   - Handle &quot;hardware APIC ISR&quot;, a.k.a. SVI, updates in     kvm_apic_update_apicv() to consolidate the updates, and to     co-locate SVI updates with the updates for KVM&apos;s own cache of ISR     information   - Drop a dead function declaration   - Minor cleanups  x86 (Intel):   - Rework KVM&apos;s handling of VMCS updates while L2 is active to     temporarily switch to vmcs01 instead of deferring the update until     the next nested VM-Exit.     The deferred updates approach directly contributed to several bugs,     was proving to be a maintenance burden due to the difficulty in     auditing the correctness of deferred updates, and was polluting     &quot;struct nested_vmx&quot; with a growing pile of booleans   - Fix an SGX bug where KVM would incorrectly try to handle EPCM page     faults, and instead always reflect them into the guest. Since KVM     doesn&apos;t shadow EPCM entries, EPCM violations cannot be due to KVM     interference and can&apos;t be resolved by KVM   - Fix a bug where KVM would register its posted interrupt wakeup     handler even if loading kvm-intel.ko ultimately failed   - Disallow access to vmcb12 fields that aren&apos;t fully supported,     mostly to avoid weirdness and complexity for FRED and other     features, where KVM wants enable VMCS shadowing for fields that     conditionally exist   - Print out the &quot;bad&quot; offsets and values if kvm-intel.ko refuses to     load (or refuses to online a CPU) due to a VMCS config mismatch  x86 (AMD):   - Drop a user-triggerable WARN on nested_svm_load_cr3() failure   - Add support for virtualizing ERAPS. Note, correct virtualization of     ERAPS relies on an upcoming, publicly announced change in the APM     to reduce the set of conditions where hardware (i.e. KVM) *must*     flush the RAP   - Ignore nSVM intercepts for instructions that are not supported     according to L1&apos;s virtual CPU model   - Add support for expedited writes to the fast MMIO bus, a la VMX&apos;s     fastpath for EPT Misconfig   - Don&apos;t set GIF when clearing EFER.SVME, as GIF exists independently     of SVM, and allow userspace to restore nested state with GIF=0   - Treat exit_code as an unsigned 64-bit value through all of KVM   - Add support for fetching SNP certificates from userspace   - Fix a bug where KVM would use vmcb02 instead of vmcb01 when     emulating VMLOAD or VMSAVE on behalf of L2   - Misc fixes and cleanups  x86 selftests:   - Add a regression test for TPR&lt;=&gt;CR8 synchronization and IRQ masking   - Overhaul selftest&apos;s MMU infrastructure to genericize stage-2 MMU     support, and extend x86&apos;s infrastructure to support EPT and NPT     (for L2 guests)   - Extend several nested VMX tests to also cover nested SVM   - Add a selftest for nested VMLOAD/VMSAVE   - Rework the nested dirty log test, originally added as a regression     test for PML where KVM logged L2 GPAs instead of L1 GPAs, to     improve test coverage and to hopefully make the test easier to     understand and maintain  guest_memfd:   - Remove kvm_gmem_populate()&apos;s preparation tracking and half-baked     hugepage handling. SEV/SNP was the only user of the tracking and it     can do it via the RMP   - Retroactively document and enforce (for SNP) that     KVM_SEV_SNP_LAUNCH_UPDATE and KVM_TDX_INIT_MEM_REGION require the     source page to be 4KiB aligned, to avoid non-trivial complexity for     something that no known VMM seems to be doing and to avoid an API     special case for in-place conversion, which simply can&apos;t support     unaligned sources   - When populating guest_memfd memory, GUP the source page in common     code and pass the refcounted page to the vendor callback, instead     of letting vendor code do the heavy lifting. Doing so avoids a     looming deadlock bug with in-place due an AB-BA conflict betwee     mmap_lock and guest_memfd&apos;s filemap invalidate lock  Generic:   - Fix a bug where KVM would ignore the vCPU&apos;s selected address space     when creating a vCPU-specific mapping of guest memory. Actually     this bug could not be hit even on x86, the only architecture with     multiple address spaces, but it&apos;s a bug nevertheless&quot;* tag &apos;for-linus&apos; of git://git.kernel.org/pub/scm/virt/kvm/kvm: (267 commits)  KVM: s390: Increase permitted SE header size to 1 MiB  MAINTAINERS: Replace backup for s390 vfio-pci  KVM: s390: vsie: Fix race in acquire_gmap_shadow()  KVM: s390: vsie: Fix race in walk_guest_tables()  KVM: s390: Use guest address to mark guest page dirty  irqchip/riscv-imsic: Adjust the number of available guest irq files  RISC-V: KVM: Transparent huge page support  RISC-V: KVM: selftests: Add Zalasr extensions to get-reg-list test  RISC-V: KVM: Allow Zalasr extensions for Guest/VM  KVM: riscv: selftests: Add riscv vm satp modes  KVM: riscv: selftests: add Zilsd and Zclsd extension to get-reg-list test  riscv: KVM: allow Zilsd and Zclsd extensions for Guest/VM  RISC-V: KVM: Skip IMSIC update if vCPU IMSIC state is not initialized  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_rw_attr()  RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_has_attr()  RISC-V: KVM: Remove unnecessary &apos;ret&apos; assignment  KVM: s390: Add explicit padding to struct kvm_s390_keyop  KVM: LoongArch: selftests: Add steal time test case  LoongArch: KVM: Add paravirt vcpu_is_preempted() support in guest side  LoongArch: KVM: Add paravirt preempt feature in hypervisor side  ...

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Fri, 13 Feb 2026 19:31:15 +0000</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>b1195183ed42f1522fae3fe44ebee3af437aa000 - Merge tag &apos;kvm-s390-next-7.0-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#b1195183ed42f1522fae3fe44ebee3af437aa000</link>
        <description>Merge tag &apos;kvm-s390-next-7.0-1&apos; of https://git.kernel.org/pub/scm/linux/kernel/git/kvms390/linux into HEAD- gmap rewrite: completely new memory management for kvm/s390- vSIE improvement- maintainership change for s390 vfio-pci- small quality of life improvement for protected guests

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Wed, 11 Feb 2026 17:52:27 +0000</pubDate>
        <dc:creator>Paolo Bonzini &lt;pbonzini@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>f8f296ea1c61ce98a03dd9ede370adb864c4cde3 - KVM: s390: vsie: Fix race in acquire_gmap_shadow()</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#f8f296ea1c61ce98a03dd9ede370adb864c4cde3</link>
        <description>KVM: s390: vsie: Fix race in acquire_gmap_shadow()The shadow gmap returned by gmap_create_shadow() could get droppedbefore taking the gmap-&gt;children_lock. This meant that the shadow gmapwas sometimes being used while its reference count was 0.Fix this by taking the additional reference inside gmap_create_shadow()while still holding gmap-&gt;children_lock, instead of afterwards.Fixes: e38c884df921 (&quot;KVM: s390: Switch to new gmap&quot;)Reviewed-by: Christoph Schlameuss &lt;schlameuss@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Fri, 06 Feb 2026 14:35:53 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>0fdd5c18a99cc89e829243f9f8561b37b7ebc4fc - KVM: s390: Enable 1M pages for gmap</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#0fdd5c18a99cc89e829243f9f8561b37b7ebc4fc</link>
        <description>KVM: s390: Enable 1M pages for gmapWhile userspace is allowed to have pages of any size, the new gmapwould always use 4k pages to back the guest.Enable 1M pages for gmap.This allows 1M pages to be used to back a guest when userspace is using1M pages for the corresponding addresses (e.g. THP or hugetlbfs).Remove the limitation that disallowed having nested guests andhugepages at the same time.Acked-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Wed, 04 Feb 2026 15:02:56 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>e5f98a6899bd4bd0d99cb21777bd361fbb873838 - KVM: s390: Add some helper functions needed for vSIE</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#e5f98a6899bd4bd0d99cb21777bd361fbb873838</link>
        <description>KVM: s390: Add some helper functions needed for vSIEImplement gmap_protect_asce_top_level(), which was a stub. Thisfunction was a stub due to cross dependencies with other patches.Acked-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Wed, 04 Feb 2026 15:02:50 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>a2c17f9270cc3f1c55c35e8b1d151f41d75b40f5 - KVM: s390: New gmap code</title>
        <link>http://opengrok.net:8080/history/linux/arch/s390/kvm/gmap.c#a2c17f9270cc3f1c55c35e8b1d151f41d75b40f5</link>
        <description>KVM: s390: New gmap codeNew gmap (guest map) code. This new gmap code will only be used by KVM.This will replace the existing gmap.Acked-by: Heiko Carstens &lt;hca@linux.ibm.com&gt;Signed-off-by: Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;

            List of files:
            /linux/arch/s390/kvm/gmap.c</description>
        <pubDate>Wed, 04 Feb 2026 15:02:48 +0000</pubDate>
        <dc:creator>Claudio Imbrenda &lt;imbrenda@linux.ibm.com&gt;</dc:creator>
    </item>
</channel>
</rss>
