messages from 2025-04-04 17:36:35 to 2025-04-08 05:03:37 UTC [more...]
[PATCH v7 00/45] arm64: Support for Arm CCA in KVM
2025-04-08 5:03 UTC (25+ messages)
` [PATCH v7 12/45] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v7 17/45] arm64: RME: Handle realm enter/exit
` [PATCH v7 18/45] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v7 28/45] arm64: rme: support RSI_HOST_CALL
` [PATCH v7 30/45] arm64: RME: Always use 4k pages for realms
` [PATCH v7 34/45] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v7 35/45] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
[PATCH 0/2] TDX attestation support
2025-04-08 2:35 UTC (8+ messages)
` [PATCH 1/2] KVM: TDX: Handle TDG.VP.VMCALL<GetQuote>
[PATCH v5 00/65] QEMU Guest memfd + QEMU TDX support
2025-04-08 2:00 UTC (8+ messages)
` [PATCH v5 49/65] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
[PATCH v5 0/2] KVM: x86: Include host suspended time in steal time
2025-04-08 1:36 UTC (2+ messages)
[PATCH] vhost/net: remove zerocopy support
2025-04-08 1:18 UTC (3+ messages)
[PATCH v4 00/13] Enable shared device assignment
2025-04-08 0:50 UTC (16+ messages)
` [PATCH v4 01/13] memory: Export a helper to get intersection of a MemoryRegionSection with a given range
` [PATCH v4 02/13] memory: Change memory_region_set_ram_discard_manager() to return the result
` [PATCH v4 03/13] memory: Unify the definiton of ReplayRamPopulate() and ReplayRamDiscard()
` [PATCH v4 04/13] memory: Introduce generic state change parent class for RamDiscardManager
` [PATCH v4 05/13] memory: Introduce PrivateSharedManager Interface as child of GenericStateManager
` [PATCH v4 06/13] vfio: Add the support for PrivateSharedManager Interface
` [PATCH v4 07/13] ram-block-attribute: Introduce RamBlockAttribute to manage RAMBLock with guest_memfd
` [PATCH v4 08/13] ram-block-attribute: Introduce a callback to notify shared/private state changes
` [PATCH v4 09/13] memory: Attach RamBlockAttribute to guest_memfd-backed RAMBlocks
` [PATCH v4 10/13] memory: Change NotifyStateClear() definition to return the result
` [PATCH v4 11/13] KVM: Introduce CVMPrivateSharedListener for attribute changes during page conversions
` [PATCH v4 12/13] ram-block-attribute: Add priority listener support for PrivateSharedListener
` [PATCH v4 13/13] RAMBlock: Make guest_memfd require coordinate discard
[GIT PULL] KVM/arm64: First batch of fixes for 6.15
2025-04-08 0:31 UTC
[PATCH v2 0/5] KVM: selftests: access_tracking_perf_test fixes for NUMA balancing and MGLRU
2025-04-08 0:17 UTC (3+ messages)
` [PATCH v2 3/5] cgroup: selftests: Move cgroup_util into its own library
[PATCH v1] s390/virtio_ccw: don't allocate/assign airqs for non-existing queues
2025-04-07 21:20 UTC (43+ messages)
[RFC] PCI: add CONFIG_MMU dependency
2025-04-07 21:17 UTC (4+ messages)
[PATCH net-next 0/2] vsock: SOCK_LINGER rework
2025-04-07 18:41 UTC (3+ messages)
` [PATCH net-next 1/2] vsock: Linger on unsent data
` [PATCH net-next 2/2] vsock/test: Expand linger test to ensure close() does not misbehave
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-04-07 16:40 UTC (6+ messages)
` [RFC PATCH v2 14/22] iommufd: Add TIO calls
[PATCH v3 00/17] AMD: Add Secure AVIC Guest Support
2025-04-07 16:19 UTC (4+ messages)
` [PATCH v3 13/17] x86/apic: Handle EOI writes for SAVIC guests
[RFC v2 00/17] AMD: Add Secure AVIC Guest Support
2025-04-07 16:17 UTC (12+ messages)
` [RFC v2 01/17] x86/apic: Add new driver for Secure AVIC
[PATCH v3 0/6] KVM: guest_memfd: support for uffd minor
2025-04-07 15:26 UTC (9+ messages)
[RFC PATCH v2 18/22] coco/sev-guest: Implement the guest support for SEV TIO
2025-04-07 11:05 UTC (2+ messages)
[PATCH] tools/kvm_stat: fix termination behavior when not on a terminal
2025-04-07 11:03 UTC (2+ messages)
[PATCH v2 00/10] target/i386/kvm/pmu: PMU Enhancement, Bugfix and Cleanup
2025-04-07 9:33 UTC (9+ messages)
` [PATCH v2 08/10] target/i386/kvm: reset AMD PMU registers during VM reset
[PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
2025-04-07 8:25 UTC (4+ messages)
` [PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios
[PATCH v7 0/8] Move initializing SEV/SNP functionality to KVM
2025-04-07 7:53 UTC (3+ messages)
[PATCH] KVM: x86:Cancel hrtimer in the process of saving PIT state to reduce the performance overhead caused by hrtimer during guest stop
2025-04-07 2:19 UTC (5+ messages)
[PATCH v7 0/7] KVM: Restricted mapping of guest_memfd at the host and arm64 support
2025-04-07 6:28 UTC (8+ messages)
` [PATCH v7 5/7] KVM: guest_memfd: Restore folio state after final folio_put()
[RFC PATCH] vfio/pci: add PCIe TPH to device feature ioctl
2025-04-07 5:22 UTC (10+ messages)
[PATCH 0/7] irqbypass: Cleanups and a perf improvement
2025-04-07 3:37 UTC (9+ messages)
` [PATCH 1/7] irqbypass: Drop pointless and misleading THIS_MODULE get/put
` [PATCH 2/7] irqbypass: Drop superfluous might_sleep() annotations
` [PATCH 3/7] irqbypass: Take ownership of producer/consumer token tracking
` [PATCH 4/7] irqbypass: Explicitly track producer and consumer bindings
` [PATCH 5/7] irqbypass: Use paired consumer/producer to disconnect during unregister
` [PATCH 6/7] irqbypass: Use guard(mutex) in lieu of manual lock+unlock
` [PATCH 7/7] irqbypass: Use xarray to track producers and consumers
[PATCH] vhost/net: Defer TX queue re-enable until after sendmsg
2025-04-07 2:54 UTC (2+ messages)
[PATCH v3 0/9] vhost-scsi: log write descriptors for live migration (and three bugfix)
2025-04-06 21:43 UTC (5+ messages)
` [PATCH v3 6/9] vhost-scsi: log I/O queue write descriptors
` [PATCH v3 7/9] vhost-scsi: log control "
[PATCH v2 0/2] KVM : selftests: arm64: Explicitly set the page attrs to Inner-Shareable
2025-04-06 18:16 UTC (8+ messages)
` [PATCH v2 1/2] KVM: selftests: arm64: Introduce and use hardware-definition macros
` [PATCH v2 2/2] KVM: selftests: arm64: Explicitly set the page attrs to Inner-Shareable
[RFC PATCH v2 17/22] resource: Mark encrypted MMIO resource on validation
2025-04-05 18:19 UTC (2+ messages)
[RFC PATCH v2 16/22] coco/tsm: Add tsm-guest module
2025-04-05 17:15 UTC (2+ messages)
[PATCH v3 0/6] x86/bugs: RSB mitigation fixes and documentation
2025-04-05 0:56 UTC (9+ messages)
` [PATCH v3 3/6] x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier()
` [PATCH v3 6/6] x86/bugs: Add RSB mitigation document
[PATCH 0/2] KVM : selftests: arm64: Explicitly set the page attrs to Inner-Shareable
2025-04-05 0:01 UTC (6+ messages)
` [PATCH 1/2] KVM: selftests: arm64: Introduce and use hardware-definition macros
` [PATCH 2/2] KVM: selftests: arm64: Explicitly set the page attrs to Inner-Shareable
[Bug 217379] New: Latency issues in irq_bypass_register_consumer
2025-04-04 21:26 UTC (2+ messages)
` [Bug 217379] "
[PATCH 00/67] KVM: iommu: Overhaul device posted IRQs support
2025-04-04 19:39 UTC (68+ messages)
` [PATCH 01/67] KVM: SVM: Allocate IR data using atomic allocation
` [PATCH 02/67] KVM: x86: Reset IRTE to host control if *new* route isn't postable
` [PATCH 03/67] KVM: x86: Explicitly treat routing entry type changes as changes
` [PATCH 04/67] KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer
` [PATCH 05/67] iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE
` [PATCH 06/67] iommu/amd: WARN if KVM attempts to set vCPU affinity without posted intrrupts
` [PATCH 07/67] KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added
` [PATCH 08/67] KVM: x86: Pass new routing entries and irqfd when updating IRTEs
` [PATCH 09/67] KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure
` [PATCH 10/67] KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE
` [PATCH 11/67] KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing
` [PATCH 12/67] KVM: SVM: Drop pointless masking of default APIC base when setting V_APIC_BAR
` [PATCH 13/67] KVM: SVM: Drop pointless masking of kernel page pa's with AVIC HPA masks
` [PATCH 14/67] KVM: SVM: Add helper to deduplicate code for getting AVIC backing page
` [PATCH 15/67] KVM: SVM: Drop vcpu_svm's pointless avic_backing_page field
` [PATCH 16/67] KVM: SVM: Inhibit AVIC if ID is too big instead of rejecting vCPU creation
` [PATCH 17/67] KVM: SVM: Drop redundant check in AVIC code on ID during "
` [PATCH 18/67] KVM: SVM: Track AVIC tables as natively sized pointers, not "struct pages"
` [PATCH 19/67] KVM: SVM: Drop superfluous "cache" of AVIC Physical ID entry pointer
` [PATCH 20/67] KVM: VMX: Move enable_ipiv knob to common x86
` [PATCH 21/67] KVM: SVM: Add enable_ipiv param, never set IsRunning if disabled
` [PATCH 22/67] KVM: SVM: Disable (x2)AVIC IPI virtualization if CPU has erratum #1235
` [PATCH 23/67] KVM: VMX: Suppress PI notifications whenever the vCPU is put
` [PATCH 24/67] KVM: SVM: Add a comment to explain why avic_vcpu_blocking() ignores IRQ blocking
` [PATCH 25/67] iommu/amd: KVM: SVM: Use pi_desc_addr to derive ga_root_ptr
` [PATCH 26/67] iommu/amd: KVM: SVM: Delete now-unused cached/previous GA tag fields
` [PATCH 27/67] iommu/amd: KVM: SVM: Pass NULL @vcpu_info to indicate "not guest mode"
` [PATCH 28/67] KVM: SVM: Get vCPU info for IRTE using new routing entry
` [PATCH 29/67] KVM: SVM: Stop walking list of routing table entries when updating IRTE
` [PATCH 30/67] KVM: VMX: "
` [PATCH 31/67] KVM: SVM: Extract SVM specific code out of get_pi_vcpu_info()
` [PATCH 32/67] KVM: x86: Nullify irqfd->producer after updating IRTEs
` [PATCH 33/67] KVM: x86: Dedup AVIC vs. PI code for identifying target vCPU
` [PATCH 34/67] KVM: x86: Move posted interrupt tracepoint to common code
` [PATCH 35/67] KVM: SVM: Clean up return handling in avic_pi_update_irte()
` [PATCH 36/67] iommu: KVM: Split "struct vcpu_data" into separate AMD vs. Intel structs
` [PATCH 37/67] KVM: Don't WARN if updating IRQ bypass route fails
` [PATCH 38/67] KVM: Fold kvm_arch_irqfd_route_changed() into kvm_arch_update_irqfd_routing()
` [PATCH 39/67] KVM: x86: Track irq_bypass_vcpu in common x86 code
` [PATCH 40/67] KVM: x86: Skip IOMMU IRTE updates if there's no old or new vCPU being targeted
` [PATCH 41/67] KVM: x86: Don't update IRTE entries when old and new routes were !MSI
` [PATCH 42/67] KVM: SVM: Revert IRTE to legacy mode if IOMMU doesn't provide IR metadata
` [PATCH 43/67] KVM: SVM: Take and hold ir_list_lock across IRTE updates in IOMMU
` [PATCH 44/67] iommu/amd: KVM: SVM: Infer IsRun from validity of pCPU destination
` [PATCH 45/67] iommu/amd: Factor out helper for manipulating IRTE GA/CPU info
` [PATCH 46/67] iommu/amd: KVM: SVM: Set pCPU info in IRTE when setting vCPU affinity
` [PATCH 47/67] iommu/amd: KVM: SVM: Add IRTE metadata to affined vCPU's list if AVIC is inhibited
` [PATCH 48/67] KVM: SVM: Don't check for assigned device(s) when updating affinity
` [PATCH 49/67] KVM: SVM: Don't check for assigned device(s) when activating AVIC
` [PATCH 50/67] KVM: SVM: WARN if (de)activating guest mode in IOMMU fails
` [PATCH 51/67] KVM: SVM: Process all IRTEs on affinity change even if one update fails
` [PATCH 52/67] KVM: SVM: WARN if updating IRTE GA fields in IOMMU fails
` [PATCH 53/67] KVM: x86: Drop superfluous "has assigned device" check in kvm_pi_update_irte()
` [PATCH 54/67] KVM: x86: WARN if IRQ bypass isn't supported "
` [PATCH 55/67] KVM: x86: WARN if IRQ bypass routing is updated without in-kernel local APIC
` [PATCH 56/67] KVM: SVM: WARN if ir_list is non-empty at vCPU free
` [PATCH 57/67] KVM: x86: Decouple device assignment from IRQ bypass
` [PATCH 58/67] KVM: VMX: WARN if VT-d Posted IRQs aren't possible when starting "
` [PATCH 59/67] KVM: SVM: Use vcpu_idx, not vcpu_id, for GA log tag/metadata
` [PATCH 60/67] iommu/amd: WARN if KVM calls GA IRTE helpers without virtual APIC support
` [PATCH 61/67] KVM: SVM: Fold avic_set_pi_irte_mode() into its sole caller
` [PATCH 62/67] KVM: SVM: Don't check vCPU's blocking status when toggling AVIC on/off
` [PATCH 63/67] KVM: SVM: Consolidate IRTE update "
` [PATCH 64/67] iommu/amd: KVM: SVM: Allow KVM to control need for GA log interrupts
` [PATCH 65/67] KVM: SVM: Generate GA log IRQs only if the associated vCPUs is blocking
` [PATCH 66/67] *** DO NOT MERGE *** iommu/amd: Hack to fake IRQ posting support
` [PATCH 67/67] *** DO NOT MERGE *** KVM: selftests: WIP posted interrupts test
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox