Kernel KVM virtualization development
 help / color / mirror / Atom feed
 messages from 2025-04-01 16:43:15 to 2025-04-03 11:38:00 UTC [more...]

[PATCH v3 00/17] AMD: Add Secure AVIC Guest Support
 2025-04-03 11:37 UTC  (5+ messages)
` [PATCH v3 01/17] x86/apic: Add new driver for Secure AVIC
` [PATCH v3 02/17] x86/apic: Initialize Secure AVIC APIC backing page

[PATCH v7 7/7] KVM: guest_memfd: Add a guest_memfd() flag to initialize it as shared
 2025-04-03 11:32 UTC  (4+ messages)

[PATCH 0/5] KVM: RISC-V: VCPU reset fixes
 2025-04-03 11:25 UTC  (6+ messages)
` [PATCH 1/5] KVM: RISC-V: refactor vector state reset
` [PATCH 2/5] KVM: RISC-V: refactor sbi reset request
` [PATCH 3/5] KVM: RISC-V: remove unnecessary SBI reset state
` [PATCH 4/5] KVM: RISC-V: reset VCPU state when becoming runnable
` [PATCH 5/5] KVM: RISC-V: reset smstateen CSRs

[PATCH v1] s390/virtio_ccw: don't allocate/assign airqs for non-existing queues
 2025-04-03  9:44 UTC  (2+ messages)

[PATCH v2 0/3] vsock: add namespace support to vhost-vsock
 2025-04-03  9:33 UTC  (10+ messages)

[PATCH v7 0/7] KVM: Restricted mapping of guest_memfd at the host and arm64 support
 2025-04-03  9:11 UTC  (6+ messages)
` [PATCH v7 4/7] KVM: guest_memfd: Folio sharing states and functions that manage their transition

[PATCH v7 3/7] KVM: guest_memfd: Track folio sharing within a struct kvm_gmem_private
 2025-04-03  8:58 UTC  (4+ messages)

[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
 2025-04-03  8:39 UTC  (4+ messages)
` [RFC PATCH v2 14/22] iommufd: Add TIO calls

[PATCH v3] vsock/virtio: Remove queued_replies pushback logic
 2025-04-03  8:27 UTC  (3+ messages)

[PATCH v2] vsock/virtio: Remove queued_replies pushback logic
 2025-04-03  8:24 UTC  (5+ messages)

[PATCH v5 49/65] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
 2025-04-03  8:10 UTC  (5+ messages)

[PATCH v3 0/6] x86/bugs: RSB mitigation fixes and documentation
 2025-04-03  7:48 UTC  (20+ messages)
` [PATCH v3 1/6] x86/bugs: Rename entry_ibpb()
` [PATCH v3 2/6] x86/bugs: Use SBPB in __write_ibpb() if applicable
` [PATCH v3 3/6] x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier()
` [PATCH v3 4/6] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
` [PATCH v3 5/6] x86/bugs: Don't fill RSB on context switch with eIBRS
` [PATCH v3 6/6] x86/bugs: Add RSB mitigation document

[RFC PATCH v1 00/15] MSR refactor with new MSR instructions support
 2025-04-03  7:13 UTC  (15+ messages)
` [RFC PATCH v1 01/15] x86/msr: Replace __wrmsr() with native_wrmsrl()

[PATCH v3 0/9] vhost-scsi: log write descriptors for live migration (and three bugfix)
 2025-04-03  6:29 UTC  (10+ messages)
` [PATCH v3 1/9] vhost-scsi: protect vq->log_used with vq->mutex
` [PATCH v3 2/9] vhost-scsi: Fix vhost_scsi_send_bad_target()
` [PATCH v3 3/9] vhost-scsi: Fix vhost_scsi_send_status()
` [PATCH v3 4/9] vhost: modify vhost_log_write() for broader users
` [PATCH v3 5/9] vhost-scsi: adjust vhost_scsi_get_desc() to log vring descriptors
` [PATCH v3 6/9] vhost-scsi: log I/O queue write descriptors
` [PATCH v3 7/9] vhost-scsi: log control "
` [PATCH v3 8/9] vhost-scsi: log event "
` [PATCH v3 9/9] vhost: add WARNING if log_num is more than limit

[PATCH 0/2] TDX attestation support
 2025-04-02 22:19 UTC  (11+ messages)
` [PATCH 1/2] KVM: TDX: Handle TDG.VP.VMCALL<GetQuote>
` [PATCH 2/2] KVM: TDX: Handle TDG.VP.VMCALL<SetupEventNotifyInterrupt>

[PATCH v6 0/7] KVM: Restricted mapping of guest_memfd at the host and arm64 support
 2025-04-02 22:17 UTC  (5+ messages)
` [PATCH v6 5/7] KVM: guest_memfd: Restore folio state after final folio_put()

[PATCH v4 0/8] Introduce CET supervisor state support
 2025-04-02 21:44 UTC  (24+ messages)
` [PATCH v4 1/8] x86/fpu/xstate: Always preserve non-user xfeatures/flags in __state_perm
` [PATCH v4 2/8] x86/fpu: Drop @perm from guest pseudo FPU container
` [PATCH v4 3/8] x86/fpu/xstate: Add CET supervisor xfeature support
` [PATCH v4 4/8] x86/fpu/xstate: Differentiate default features for host and guest FPUs
` [PATCH v4 7/8] x86/fpu/xstate: Introduce "guest-only" supervisor xfeature set
` [PATCH v4 8/8] x86/fpu/xstate: Warn if guest-only supervisor states are detected in normal fpstate

[PATCH v2 0/5] KVM: guest_memfd: support for uffd minor
 2025-04-02 21:25 UTC  (9+ messages)
` [PATCH v2 1/5] mm: userfaultfd: generic continue for non hugetlbfs
` [PATCH v2 2/5] KVM: guest_memfd: add kvm_gmem_vma_is_gmem
` [PATCH v2 3/5] mm: userfaultfd: allow to register continue for guest_memfd
` [PATCH v2 4/5] KVM: guest_memfd: add support for userfaultfd minor
` [PATCH v2 5/5] KVM: selftests: test userfaultfd minor for guest_memfd

[PATCH v3 00/29] single-binary: start make hw/arm/ common
 2025-04-02 20:06 UTC  (5+ messages)
` [PATCH v3 03/29] include/exec/cpu-all: move compile time check for CPUArchState to cpu-target.c

[PATCH 0/2] KVM: VMX: Fix lockdep false positive on PI wakeup
 2025-04-02 20:06 UTC  (8+ messages)
` [PATCH 1/2] KVM: VMX: Assert that IRQs are disabled when putting vCPU on PI wakeup list
` [PATCH 2/2] KVM: VMX: Use separate subclasses for PI wakeup lock to squash false positive

[PATCH 00/12] KVM: Make irqfd registration globally unique
 2025-04-02 18:40 UTC  (14+ messages)
` [PATCH 01/12] KVM: Use a local struct to do the initial vfs_poll() on an irqfd
` [PATCH 02/12] KVM: Acquire SCRU lock outside of irqfds.lock during assignment
` [PATCH 03/12] KVM: Initialize irqfd waitqueue callback when adding to the queue
` [PATCH 04/12] KVM: Add irqfd to KVM's list via the vfs_poll() callback
` [PATCH 05/12] KVM: Add irqfd to eventfd's waitqueue while holding irqfds.lock
` [PATCH 06/12] sched/wait: Add a waitqueue helper for fully exclusive priority waiters
` [PATCH 07/12] KVM: Disallow binding multiple irqfds to an eventfd with a priority waiter
` [PATCH 08/12] sched/wait: Drop WQ_FLAG_EXCLUSIVE from add_wait_queue_priority()
` [PATCH 09/12] KVM: Drop sanity check that per-VM list of irqfds is unique
` [PATCH 10/12] KVM: selftests: Assert that eventfd() succeeds in Xen shinfo test
` [PATCH 11/12] KVM: selftests: Add utilities to create eventfds and do KVM_IRQFD
` [PATCH 12/12] KVM: selftests: Add a KVM_IRQFD test to verify uniqueness requirements

[kvm:planes-20250401 46/62] arch/s390/kvm/../../../virt/kvm/kvm_main.c:4530:7: error: invalid application of 'sizeof' to an incomplete type 'struct kvm_debugregs'
 2025-04-02 18:00 UTC 

[PATCH 1/1] virtio_console: fix missing byte order handling for cols and rows
 2025-04-02 15:40 UTC  (3+ messages)

[PATCH v2 00/30] single-binary: start make hw/arm/ common
 2025-04-02 15:06 UTC  (7+ messages)
` [PATCH v2 20/30] target/arm/cpu: always define kvm related registers

[PATCH v2 0/2] x86/bugs: RSB tweaks
 2025-04-02 14:19 UTC  (9+ messages)
` [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline

[PATCH] KVM: x86: Expose ARCH_CAP_FB_CLEAR when invulnerable to MDS
 2025-04-02 13:46 UTC  (3+ messages)

[RFC PATCH 0/7] KVM: optee: Introduce OP-TEE Mediator for exposing secure world to KVM guests
 2025-04-02 11:19 UTC  (12+ messages)
` [RFC PATCH 1/7] firmware: smccc: Add macros for Trusted OS/App owner check on SMC value
` [RFC PATCH 2/7] tee: Add TEE Mediator module which aims to expose TEE to a KVM guest
` [RFC PATCH 3/7] KVM: Notify TEE Mediator when KVM creates and destroys guests
` [RFC PATCH 4/7] KVM: arm64: Forward guest CPU state to TEE mediator on SMC trap
` [RFC PATCH 5/7] tee: optee: Add OPTEE_SMC_VM_CREATED and OPTEE_SMC_VM_DESTROYED
` [RFC PATCH 6/7] tee: optee: Add OP-TEE Mediator
` [RFC PATCH 7/7] tee: optee: Notify TEE Mediator on OP-TEE driver initialization and release

[RFC v2 00/17] AMD: Add Secure AVIC Guest Support
 2025-04-02 10:34 UTC  (15+ messages)
` [RFC v2 01/17] x86/apic: Add new driver for Secure AVIC
` [RFC v2 14/17] x86/apic: Add kexec support "

[syzbot] Monthly kvm report (Apr 2025)
 2025-04-02  9:38 UTC 

[PATCH v7 9/9] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
 2025-04-02  8:56 UTC  (3+ messages)

[RFC PATCH v4 0/2] KVM: Add support for the ERAPS feature
 2025-04-02  8:28 UTC  (3+ messages)
` [RFC PATCH v4 1/2] x86: kvm: svm: set up ERAPS support for guests
` [RFC PATCH v4 2/2] debug: add tracepoint for flush_rap_on_vmrun

[kvm:planes-20250401 43/62] arch/arm64/kvm/hyp/nvhe/gen-hyprel.c:269:33: error: invalid type argument of '->' (have 'struct stat')
 2025-04-02  6:29 UTC 

[kvm:planes-20250401 40/62] arch/arm64/kvm/vgic/vgic-init.c:470:5: warning: suggest explicit braces to avoid ambiguous 'else'
 2025-04-02  5:25 UTC 

[kvm:planes-20250401 58/62] arch/x86/kvm/lapic.c:1327:44: error: passing argument 2 of 'test_and_set_bit' from incompatible pointer type
 2025-04-02  4:50 UTC 

[kvm:planes-20250401 46/62] include/uapi/linux/kvm.h:1427:54: error: invalid application of 'sizeof' to incomplete type 'struct kvm_debugregs'
 2025-04-02  4:38 UTC 

[kvm:planes-20250401 58/62] arch/x86/kvm/lapic.c:1327:37: error: incompatible pointer types passing 'atomic_t *' to parameter of type 'volatile unsigned long *'
 2025-04-02  4:23 UTC 

[RFC PATCH 00/39] 1G page support for guest_memfd
 2025-04-02  4:07 UTC  (5+ messages)
` [RFC PATCH 13/39] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
` [RFC PATCH 27/39] KVM: guest_memfd: Allow mmapping guest_memfd files

[PATCH v3 0/6] KVM: SVM: Fix DEBUGCTL bugs
 2025-04-02  3:57 UTC  (2+ messages)

[kvm:planes-20250401 51/62] arch/x86/kvm/svm/svm.c:3255:37: error: passing argument 1 of 'kvm_clear_apicv_inhibit' from incompatible pointer type
 2025-04-02  3:45 UTC 

[GIT PULL] VFIO updates for v6.15-rc1
 2025-04-02  3:00 UTC  (2+ messages)

[GIT PULL] virtio: features, fixes, cleanups
 2025-04-02  3:00 UTC  (2+ messages)

[GIT PULL] Please pull IOMMUFD subsystem changes
 2025-04-02  1:50 UTC  (2+ messages)

[PATCH] KVM: VMX: Add a quirk to (not) honor guest PAT on CPUs that support self-snoop
 2025-04-02  1:09 UTC  (4+ messages)

[ANNOUNCE] PUCK Agenda - 2025.04.02 - No Topic
 2025-04-02  0:29 UTC 

[RFC PATCH] vfio/pci: add PCIe TPH to device feature ioctl
 2025-04-01 23:52 UTC  (9+ messages)

[Invitation] bi-weekly guest_memfd upstream call on 2025-04-03
 2025-04-01 20:55 UTC  (2+ messages)

[PATCH v2 0/8] x86/irq: KVM: Optimize KVM's PIR harvesting
 2025-04-01 16:34 UTC  (9+ messages)
` [PATCH v2 1/8] x86/irq: Ensure initial PIR loads are performed exactly once
` [PATCH v2 2/8] x86/irq: Track if IRQ was found in PIR during initial loop (to load PIR vals)
` [PATCH v2 3/8] KVM: VMX: Ensure vIRR isn't reloaded at odd times when sync'ing PIR
` [PATCH v2 4/8] x86/irq: KVM: Track PIR bitmap as an "unsigned long" array
` [PATCH v2 5/8] KVM: VMX: Process PIR using 64-bit accesses on 64-bit kernels
` [PATCH v2 6/8] KVM: VMX: Isolate pure loads from atomic XCHG when processing PIR
` [PATCH v2 7/8] KVM: VMX: Use arch_xchg() when processing PIR to avoid instrumentation
` [PATCH v2 8/8] x86/irq: KVM: Add helper for harvesting PIR to deduplicate KVM and posted MSIs


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox