messages from 2025-04-15 20:29:01 to 2025-04-17 12:00:29 UTC [more...]
[PATCH v4 00/18] AMD: Add Secure AVIC Guest Support
2025-04-17 12:00 UTC (22+ messages)
` [PATCH v4 01/18] KVM: x86: Move find_highest_vector() to a common header
` [PATCH v4 02/18] x86/apic: Add new driver for Secure AVIC
` [PATCH v4 03/18] x86/apic: Initialize Secure AVIC APIC backing page
` [PATCH v4 04/18] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
` [PATCH v4 05/18] x86/apic: Initialize APIC ID for Secure AVIC
` [PATCH v4 06/18] x86/apic: Add update_vector callback "
` [PATCH v4 07/18] x86/apic: Add support to send IPI "
` [PATCH v4 08/18] x86/apic: Support LAPIC timer "
` [PATCH v4 09/18] x86/sev: Initialize VGIF for secondary VCPUs "
` [PATCH v4 10/18] x86/apic: Add support to send NMI IPI "
` [PATCH v4 11/18] x86/apic: Allow NMI to be injected from hypervisor "
` [PATCH v4 12/18] x86/sev: Enable NMI support "
` [PATCH v4 13/18] x86/apic: Read and write LVT* APIC registers from HV for SAVIC guests
` [PATCH v4 14/18] x86/apic: Handle EOI writes "
` [PATCH v4 15/18] x86/apic: Add kexec support for Secure AVIC
` [PATCH v4 16/18] x86/apic: Enable Secure AVIC in Control MSR
` [PATCH v4 17/18] x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
` [PATCH v4 18/18] x86/sev: Indicate SEV-SNP guest supports Secure AVIC
[bug report] Potential DEADLOCK due to vfio_pci_mmap_huge_fault()
2025-04-17 11:52 UTC
[PATCH v2] hw/ppc/spapr_hcall: Return host mitigation characteristics in KVM mode
2025-04-17 11:19 UTC
[RFC PATCH v1 13/15] x86/msr: Use the alternatives mechanism to read MSR
2025-04-17 11:10 UTC (2+ messages)
[PATCH v2 0/4] KVM: extract lock_all_vcpus/unlock_all_vcpus
2025-04-17 9:53 UTC (6+ messages)
` [PATCH v2 2/4] KVM: x86: move sev_lock/unlock_vcpus_for_migration to kvm_main.c
[Invitation] bi-weekly guest_memfd upstream call on 2025-04-17
2025-04-17 7:14 UTC (4+ messages)
[PATCH] kvm: x86: Don't report guest userspace emulation error to userspace in kvm_task_switch()
2025-04-17 3:55 UTC (3+ messages)
[Bug 220019] New: Host call trace and crash after boot guest with perf kvm stat record
2025-04-17 3:15 UTC (4+ messages)
` [Bug 220019] "
[PATCH v5 00/28] KVM: arm64: Implement support for SME
2025-04-17 0:25 UTC (29+ messages)
` [PATCH v5 01/28] arm64/fpsimd: Update FA64 and ZT0 enables when loading SME state
` [PATCH v5 02/28] arm64/fpsimd: Decide to save ZT0 and streaming mode FFR at bind time
` [PATCH v5 03/28] arm64/fpsimd: Check enable bit for FA64 when saving EFI state
` [PATCH v5 04/28] arm64/fpsimd: Determine maximum virtualisable SME vector length
` [PATCH v5 05/28] KVM: arm64: Introduce non-UNDEF FGT control
` [PATCH v5 06/28] KVM: arm64: Pay attention to FFR parameter in SVE save and load
` [PATCH v5 07/28] KVM: arm64: Pull ctxt_has_ helpers to start of sysreg-sr.h
` [PATCH v5 08/28] KVM: arm64: Move SVE state access macros after feature test macros
` [PATCH v5 09/28] KVM: arm64: Rename SVE finalization constants to be more general
` [PATCH v5 10/28] KVM: arm64: Document the KVM ABI for SME
` [PATCH v5 11/28] KVM: arm64: Define internal features "
` [PATCH v5 12/28] KVM: arm64: Rename sve_state_reg_region
` [PATCH v5 13/28] KVM: arm64: Store vector lengths in an array
` [PATCH v5 14/28] KVM: arm64: Implement SME vector length configuration
` [PATCH v5 15/28] KVM: arm64: Support SME control registers
` [PATCH v5 16/28] KVM: arm64: Support TPIDR2_EL0
` [PATCH v5 17/28] KVM: arm64: Support SME identification registers for guests
` [PATCH v5 18/28] KVM: arm64: Support SME priority registers
` [PATCH v5 19/28] KVM: arm64: Provide assembly for SME register access
` [PATCH v5 20/28] KVM: arm64: Support userspace access to streaming mode Z and P registers
` [PATCH v5 21/28] KVM: arm64: Flush register state on writes to SVCR.SM and SVCR.ZA
` [PATCH v5 22/28] KVM: arm64: Expose SME specific state to userspace
` [PATCH v5 23/28] KVM: arm64: Context switch SME state for guests
` [PATCH v5 24/28] KVM: arm64: Handle SME exceptions
` [PATCH v5 25/28] KVM: arm64: Expose SME to nested guests
` [PATCH v5 26/28] KVM: arm64: Provide interface for configuring and enabling SME for guests
` [PATCH v5 27/28] KVM: arm64: selftests: Add SME system registers to get-reg-list
` [PATCH v5 28/28] KVM: arm64: selftests: Add SME to set_id_regs test
[PATCH] KVM: selftests: add test for SVE host corruption
2025-04-16 23:32 UTC
[PATCH v4 00/11] target/i386/kvm/pmu: PMU Enhancement, Bugfix and Cleanup
2025-04-16 21:52 UTC (12+ messages)
` [PATCH v4 01/11] [DO NOT MERGE] i386/cpu: Consolidate the helper to get Host's vendor
` [PATCH v4 02/11] target/i386: disable PerfMonV2 when PERFCORE unavailable
` [PATCH v4 03/11] target/i386: disable PERFCORE when "-pmu" is configured
` [PATCH v4 04/11] kvm: Introduce kvm_arch_pre_create_vcpu()
` [PATCH v4 05/11] target/i386/kvm: set KVM_PMU_CAP_DISABLE if "-pmu" is configured
` [PATCH v4 06/11] target/i386/kvm: extract unrelated code out of kvm_x86_build_cpuid()
` [PATCH v4 07/11] target/i386/kvm: rename architectural PMU variables
` [PATCH v4 08/11] target/i386/kvm: query kvm.enable_pmu parameter
` [PATCH v4 09/11] target/i386/kvm: reset AMD PMU registers during VM reset
` [PATCH v4 10/11] target/i386/kvm: support perfmon-v2 for reset
` [PATCH v4 11/11] target/i386/kvm: don't stop Intel PMU counters
[PATCH v2 0/3] KVM: x86: Dynamically allocate hashed page list
2025-04-16 19:57 UTC (10+ messages)
` [PATCH v2 1/3] KVM: x86/mmu: Dynamically allocate shadow MMU's "
` [PATCH v2 2/3] KVM: x86: Allocate kvm_vmx/kvm_svm structures using kzalloc()
` [PATCH v2 3/3] KVM: x86/mmu: Defer allocation of shadow MMU's hashed page list
[PATCH RFC v2 0/5] kernel-hacking: introduce CONFIG_NO_AUTO_INLINE
2025-04-16 19:34 UTC (8+ messages)
` [PATCH RFC v2 1/5] nvme: add __always_inline for nvme_pci_npages_prp
` [PATCH RFC v2 2/5] mm: add __always_inline for page_contains_unaccepted
` [PATCH RFC v2 3/5] vfio/virtio: add __always_inline for virtiovf_get_device_config_size
` [PATCH RFC v2 4/5] tpm: add __always_inline for tpm_is_hwrng_enabled
` [PATCH RFC v2 5/5] lib/Kconfig.debug: introduce CONFIG_NO_AUTO_INLINE
[PATCH net-next v8 1/9] netmem: add niov->type attribute to distinguish different net_iov types
2025-04-16 17:26 UTC (10+ messages)
` [PATCH net-next v8 2/9] net: add get_netmem/put_netmem support
` [PATCH net-next v8 3/9] net: devmem: TCP tx netlink api
` [PATCH net-next v8 4/9] net: devmem: Implement TX path
` [PATCH net-next v8 5/9] net: add devmem TCP TX documentation
` [PATCH net-next v8 6/9] net: enable driver support for netmem TX
` [PATCH net-next v8 7/9] gve: add netmem TX support to GVE DQO-RDA mode
` [PATCH net-next v8 8/9] net: check for driver support in netmem TX
` [PATCH net-next v8 9/9] selftests: ncdevmem: Implement devmem TCP TX
[RESEND PATCH v5 0/6] kvm powerpc/book3s-hv: Expose Hostwide counters as perf-events
2025-04-16 16:27 UTC (7+ messages)
` [RESEND PATCH v5 1/6] powerpc: Document APIv2 KVM hcall spec for Hostwide counters
` [RESEND PATCH v5 2/6] kvm powerpc/book3s-apiv2: Add support for Hostwide GSB elements
` [RESEND PATCH v5 3/6] kvm powerpc/book3s-apiv2: Add kunit tests "
` [RESEND PATCH v5 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
` [RESEND PATCH v5 5/6] powerpc/kvm-hv-pmu: Implement GSB message-ops for hostwide counters
` [RESEND PATCH v5 6/6] powerpc/kvm-hv-pmu: Add perf-events for Hostwide counters
[RFC PATCH 00/18] KVM: VMX: Introduce Intel Mode-Based Execute Control (MBEC)
2025-04-16 15:44 UTC (4+ messages)
Untested fix for attributes vs. hugepage race
2025-04-16 14:34 UTC
[PATCH 1/1] virtio_console: fix missing byte order handling for cols and rows
2025-04-16 13:49 UTC (2+ messages)
[PATCH v2] x86/bugs/mmio: Rename mmio_stale_data_clear to cpu_buf_vm_clear
2025-04-16 13:47 UTC
[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
2025-04-16 13:42 UTC (44+ messages)
` [PATCH v8 01/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v8 02/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v8 03/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v8 04/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v8 05/43] arm64: RME: Check for RME support at KVM init
` [PATCH v8 06/43] arm64: RME: Define the user ABI
` [PATCH v8 07/43] arm64: RME: ioctls to create and configure realms
` [PATCH v8 08/43] kvm: arm64: Don't expose debug capabilities for realm guests
` [PATCH v8 09/43] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v8 10/43] arm64: RME: RTT tear down
` [PATCH v8 11/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v8 12/43] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v8 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v8 14/43] KVM: arm64: Support timers in realm RECs
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v8 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v8 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v8 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v8 19/43] arm64: RME: Allow populating initial contents
` [PATCH v8 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v8 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v8 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v8 23/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v8 24/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v8 25/43] arm64: Don't expose stolen time for realm guests
` [PATCH v8 26/43] arm64: RME: allow userspace to inject aborts
` [PATCH v8 27/43] arm64: RME: support RSI_HOST_CALL
` [PATCH v8 28/43] arm64: RME: Allow checking SVE on VM instance
` [PATCH v8 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v8 30/43] arm64: RME: Prevent Device mappings for Realms
` [PATCH v8 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v8 32/43] arm64: RME: Enable PMU support with a realm guest
` [PATCH v8 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v8 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v8 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v8 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v8 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v8 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v8 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v8 40/43] arm64: RME: Provide accurate register list
` [PATCH v8 41/43] KVM: arm64: Expose support for private memory
` [PATCH v8 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v8 43/43] KVM: arm64: Allow activating realms
[PATCH v7 0/9] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
2025-04-16 12:53 UTC (9+ messages)
` [PATCH v7 4/9] KVM: guest_memfd: Handle in-place shared memory as guest_memfd backed memory
[PATCH net-next 0/2] vsock: SOCK_LINGER rework
2025-04-16 12:36 UTC (5+ messages)
` [PATCH net-next 1/2] vsock: Linger on unsent data
[PATCH v2 0/1] TDX attestation support
2025-04-16 10:35 UTC (3+ messages)
` [PATCH v2 1/1] KVM: TDX: Handle TDG.VP.VMCALL<GetQuote>
[PATCH] vhost/net: remove zerocopy support
2025-04-16 10:15 UTC (5+ messages)
[RFC PATCH 0/7] kernel-hacking: introduce CONFIG_NO_AUTO_INLINE
2025-04-16 10:09 UTC (3+ messages)
[PATCH 00/67] KVM: iommu: Overhaul device posted IRQs support
2025-04-16 9:47 UTC (7+ messages)
` [PATCH 06/67] iommu/amd: WARN if KVM attempts to set vCPU affinity without posted intrrupts
[PATCH 0/6] objtool: Detect and warn about indirect calls in __nocfi functions
2025-04-16 8:38 UTC (6+ messages)
` [PATCH 3/6] x86/kvm/emulate: Avoid RET for fastops
[PATCH v2 00/10] target/i386/kvm/pmu: PMU Enhancement, Bugfix and Cleanup
2025-04-16 8:17 UTC (10+ messages)
` [PATCH v2 08/10] target/i386/kvm: reset AMD PMU registers during VM reset
[PATCH 0/5] accel/kvm: Support KVM PMU filter
2025-04-16 8:17 UTC (7+ messages)
` [PATCH 1/5] qapi/qom: Introduce kvm-pmu-filter object
[PATCH] x86/e820: discard high memory that can't be addressed by 32-bit systems
2025-04-16 8:16 UTC (9+ messages)
` [tip: x86/urgent] x86/e820: Discard "
[PATCH v3 0/9] vhost-scsi: log write descriptors for live migration (and three bugfix)
2025-04-16 7:58 UTC (3+ messages)
` [PATCH v3 4/9] vhost: modify vhost_log_write() for broader users
[PATCH v3 00/10] target/i386/kvm/pmu: PMU Enhancement, Bugfix and Cleanup
2025-04-16 7:48 UTC (4+ messages)
` [PATCH v3 07/10] target/i386/kvm: query kvm.enable_pmu parameter
[PATCH v4 00/38] Mediated vPMU 4.0 for x86
2025-04-16 7:22 UTC (2+ messages)
[PATCH v4 0/5] Add support for the Bus Lock Threshold
2025-04-16 6:14 UTC (5+ messages)
` [PATCH v4 3/5] KVM: SVM: Enable Bus lock threshold exit
` [PATCH v4 4/5] KVM: SVM: Add support for KVM_CAP_X86_BUS_LOCK_EXIT on SVM CPUs
[PATCH v9 0/5] KVM: selftests: Add LoongArch support
2025-04-16 3:54 UTC (6+ messages)
` [PATCH v9 1/5] KVM: selftests: Add VM_MODE_P47V47_16K vm mode
` [PATCH v9 2/5] KVM: selftests: Add KVM selftests header files for LoongArch
` [PATCH v9 3/5] KVM: selftests: Add core KVM selftests support "
` [PATCH v9 4/5] KVM: selftests: Add ucall test "
` [PATCH v9 5/5] KVM: selftests: Add test cases "
[PATCH v4 00/13] Enable shared device assignment
2025-04-16 3:32 UTC (7+ messages)
` [PATCH v4 04/13] memory: Introduce generic state change parent class for RamDiscardManager
Drop "KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall"
2025-04-16 3:12 UTC
[PATCH v2] vfio/type1: Remove Fine Grained Superpages detection
2025-04-16 2:25 UTC (2+ messages)
[PATCH 0/3] KVM: x86: allow DEBUGCTL.DEBUGCTLMSR_FREEZE_IN_SMM passthrough
2025-04-16 0:25 UTC (4+ messages)
` [PATCH 1/3] x86: KVM: VMX: Wrap GUEST_IA32_DEBUGCTL read/write with access functions
` [PATCH 2/3] x86: KVM: VMX: cache guest written value of MSR_IA32_DEBUGCTL
` [PATCH 3/3] x86: KVM: VMX: preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while in the guest mode
[PATCH] Revert "PCI: Avoid reset when disabled via sysfs"
2025-04-15 20:39 UTC (2+ messages)
[RFC PATCH v2 22/22] pci: Define pci_iomap_range_encrypted
2025-04-15 20:30 UTC (2+ messages)
[RFC PATCH v2 21/22] pci: Allow encrypted MMIO mapping via sysfs
2025-04-15 20:28 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox