public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-05-13 07:23:06 to 2025-05-14 12:40:33 UTC [more...]

[PATCH v1 0/2] virtio: Add length checks for device writable portions
 2025-05-14 12:40 UTC  (3+ messages)

[PATCH v9 00/17] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
 2025-05-14 11:30 UTC  (28+ messages)
` [PATCH v9 01/17] KVM: Rename CONFIG_KVM_PRIVATE_MEM to CONFIG_KVM_GMEM
` [PATCH v9 02/17] KVM: Rename CONFIG_KVM_GENERIC_PRIVATE_MEM to CONFIG_KVM_GENERIC_GMEM_POPULATE
` [PATCH v9 03/17] KVM: Rename kvm_arch_has_private_mem() to kvm_arch_supports_gmem()
` [PATCH v9 04/17] KVM: x86: Rename kvm->arch.has_private_mem to kvm->arch.supports_gmem
` [PATCH v9 05/17] KVM: Rename kvm_slot_can_be_private() to kvm_slot_has_gmem()
` [PATCH v9 06/17] KVM: Fix comments that refer to slots_lock
` [PATCH v9 07/17] KVM: guest_memfd: Allow host to map guest_memfd() pages
` [PATCH v9 08/17] KVM: guest_memfd: Check that userspace_addr and fd+offset refer to same range
` [PATCH v9 09/17] KVM: x86/mmu: Handle guest page faults for guest_memfd with shared memory
` [PATCH v9 10/17] KVM: x86: Compute max_mapping_level with input from guest_memfd
` [PATCH v9 11/17] KVM: arm64: Refactor user_mem_abort() calculation of force_pte
` [PATCH v9 12/17] KVM: arm64: Rename variables in user_mem_abort()
` [PATCH v9 13/17] KVM: arm64: Handle guest_memfd()-backed guest page faults
` [PATCH v9 14/17] KVM: arm64: Enable mapping guest_memfd in arm64
` [PATCH v9 15/17] KVM: Introduce the KVM capability KVM_CAP_GMEM_SHARED_MEM
` [PATCH v9 16/17] KVM: selftests: guest_memfd mmap() test when mapping is allowed
` [PATCH v9 17/17] KVM: selftests: Test guest_memfd same-range validation

[RFC PATCH 00/18] KVM: VMX: Introduce Intel Mode-Based Execute Control (MBEC)
 2025-05-14 11:14 UTC  (14+ messages)
` [RFC PATCH 03/18] KVM: x86: Add module parameter for Intel MBEC
` [RFC PATCH 06/18] KVM: VMX: Wire up Intel MBEC enable/disable logic
` [RFC PATCH 15/18] KVM: x86/mmu: Extend make_spte to understand MBEC

[PATCH] RISC-V: KVM: Disable instret/cycle for VU mode by default
 2025-05-14 10:55 UTC  (2+ messages)

[PATCH v4 00/17] KVM: arm64: Recursive NV support
 2025-05-14 10:35 UTC  (18+ messages)
` [PATCH v4 01/17] arm64: sysreg: Add layout for VNCR_EL2
` [PATCH v4 02/17] KVM: arm64: nv: Allocate VNCR page when required
` [PATCH v4 03/17] KVM: arm64: nv: Extract translation helper from the AT code
` [PATCH v4 04/17] KVM: arm64: nv: Snapshot S1 ASID tagging information during walk
` [PATCH v4 05/17] KVM: arm64: nv: Move TLBI range decoding to a helper
` [PATCH v4 06/17] KVM: arm64: nv: Don't adjust PSTATE.M when L2 is nesting
` [PATCH v4 07/17] KVM: arm64: nv: Add pseudo-TLB backing VNCR_EL2
` [PATCH v4 08/17] KVM: arm64: nv: Add userspace and guest handling of VNCR_EL2
` [PATCH v4 09/17] KVM: arm64: nv: Handle VNCR_EL2-triggered faults
` [PATCH v4 10/17] KVM: arm64: nv: Handle mapping of VNCR_EL2 at EL2
` [PATCH v4 11/17] KVM: arm64: nv: Handle VNCR_EL2 invalidation from MMU notifiers
` [PATCH v4 12/17] KVM: arm64: nv: Program host's VNCR_EL2 to the fixmap address
` [PATCH v4 13/17] KVM: arm64: nv: Add S1 TLB invalidation primitive for VNCR_EL2
` [PATCH v4 14/17] KVM: arm64: nv: Plumb TLBI S1E2 into system instruction dispatch
` [PATCH v4 15/17] KVM: arm64: nv: Remove dead code from ERET handling
` [PATCH v4 16/17] KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2*
` [PATCH v4 17/17] KVM: arm64: Document NV caps and vcpu flags

[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
 2025-05-14 10:24 UTC  (6+ messages)
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS

[RFC PATCH 00/12] Private MMIO support for private assigned dev
 2025-05-14  9:47 UTC  (14+ messages)

[PATCH v5 0/6] KVM: lockdep improvements
 2025-05-14  9:35 UTC  (8+ messages)
` [PATCH v5 3/6] KVM: add kvm_lock_all_vcpus and kvm_trylock_all_vcpus
` [PATCH v5 5/6] KVM: arm64: use kvm_trylock_all_vcpus when locking all vCPUs
` [PATCH v5 6/6] RISC-V: KVM: "

[kvm-unit-tests PATCH v3 00/16] arm/arm64: Add kvmtool to the runner script
 2025-05-14  8:02 UTC  (13+ messages)
` [kvm-unit-tests PATCH v3 01/16] scripts: unittests.cfg: Rename 'extra_params' to 'qemu_params'
` [kvm-unit-tests PATCH v3 02/16] scripts: Add 'test_args' test definition parameter
` [kvm-unit-tests PATCH v3 04/16] run_tests.sh: Document --probe-maxsmp argument
` [kvm-unit-tests PATCH v3 05/16] scripts: Document environment variables
` [kvm-unit-tests PATCH v3 06/16] scripts: Refuse to run the tests if not configured for qemu
` [kvm-unit-tests PATCH v3 07/16] scripts: Use an associative array for qemu argument names

[RFC PATCH v6 00/32] AMD: Add Secure AVIC Guest Support
 2025-05-14  7:18 UTC  (33+ messages)
` [RFC PATCH v6 01/32] x86/apic: KVM: Deduplicate APIC vector => register+bit math
` [RFC PATCH v6 02/32] KVM: x86: Move find_highest_vector() to a common header
` [RFC PATCH v6 03/32] KVM: x86: Move lapic get/set_reg() helpers to common code
` [RFC PATCH v6 04/32] KVM: x86: Move lapic get/set_reg64() "
` [RFC PATCH v6 05/32] KVM: x86: Move lapic set/clear_vector() "
` [RFC PATCH v6 06/32] KVM: x86: Move {REG,VEC}_POS() macros to lapic.c
` [RFC PATCH v6 07/32] KVM: x86: apic_test_vector() to common code
` [RFC PATCH v6 08/32] x86/apic: Remove redundant parentheses around 'bitmap'
` [RFC PATCH v6 09/32] x86/apic: Rename 'reg_off' to 'reg'
` [RFC PATCH v6 10/32] x86/apic: Change apic_*_vector() vector param to unsigned
` [RFC PATCH v6 11/32] x86/apic: Change get/set reg operations reg "
` [RFC PATCH v6 12/32] x86/apic: Unionize apic regs for 32bit/64bit access w/o type casting
` [RFC PATCH v6 13/32] x86/apic: Simplify bitwise operations on apic bitmap
` [RFC PATCH v6 14/32] x86/apic: Move apic_update_irq_cfg() calls to apic_update_vector()
` [RFC PATCH v6 15/32] x86/apic: Add new driver for Secure AVIC
` [RFC PATCH v6 16/32] x86/apic: Initialize Secure AVIC APIC backing page
` [RFC PATCH v6 17/32] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
` [RFC PATCH v6 18/32] x86/apic: Initialize APIC ID for Secure AVIC
` [RFC PATCH v6 19/32] x86/apic: Add update_vector() callback for apic drivers
` [RFC PATCH v6 20/32] x86/apic: Add update_vector() callback for Secure AVIC
` [RFC PATCH v6 21/32] x86/apic: Add support to send IPI "
` [RFC PATCH v6 22/32] x86/apic: Support LAPIC timer "
` [RFC PATCH v6 23/32] x86/sev: Initialize VGIF for secondary VCPUs "
` [RFC PATCH v6 24/32] x86/apic: Add support to send NMI IPI "
` [RFC PATCH v6 25/32] x86/apic: Allow NMI to be injected from hypervisor "
` [RFC PATCH v6 26/32] x86/sev: Enable NMI support "
` [RFC PATCH v6 27/32] x86/apic: Read and write LVT* APIC registers from HV for SAVIC guests
` [RFC PATCH v6 28/32] x86/apic: Handle EOI writes for Secure AVIC guests
` [RFC PATCH v6 29/32] x86/apic: Add kexec support for Secure AVIC
` [RFC PATCH v6 30/32] x86/apic: Enable Secure AVIC in Control MSR
` [RFC PATCH v6 31/32] x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
` [RFC PATCH v6 32/32] x86/sev: Indicate SEV-SNP guest supports Secure AVIC

[PATCH] kvm: x86: fix infinite loop in kvm_guest_time_update when tsc is 0
 2025-05-14  6:49 UTC 

[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
 2025-05-14  6:43 UTC  (24+ messages)
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory

[PATCH net-next v4] selftests/vsock: add initial vmtest.sh for vsock
 2025-05-14  6:32 UTC  (3+ messages)

[PATCH net-next v5] selftests/vsock: add initial vmtest.sh for vsock
 2025-05-14  6:31 UTC 

[PATCH] vhost/net: remove zerocopy support
 2025-05-14  6:27 UTC  (7+ messages)

[PATCH v8 00/48] single-binary: compile target/arm twice
 2025-05-14  6:12 UTC  (42+ messages)
` [PATCH v8 02/48] include/system/hvf: missing vaddr include
` [PATCH v8 04/48] target/arm: move kvm stubs and remove CONFIG_KVM from kvm_arm.h
` [PATCH v8 05/48] target/arm/kvm-stub: add kvm_arm_reset_vcpu stub
` [PATCH v8 12/48] tcg: add vaddr type for helpers
` [PATCH v8 13/48] target/arm/helper: use vaddr instead of target_ulong for exception_pc_alignment
` [PATCH v8 14/48] target/arm/helper: use vaddr instead of target_ulong for probe_access
` [PATCH v8 22/48] target/arm/helper: remove remaining TARGET_AARCH64
` [PATCH v8 23/48] target/arm/helper: compile file twice (user, system)
` [PATCH v8 24/48] target/arm/vfp_fpscr: "
` [PATCH v8 26/48] target/arm/arch_dump: compile file once (system)
` [PATCH v8 27/48] target/arm/arm-powerctl: "
` [PATCH v8 29/48] target/arm/ptw: replace target_ulong with int64_t
` [PATCH v8 30/48] target/arm/ptw: replace TARGET_AARCH64 by CONFIG_ATOMIC64 from arm_casq_ptw
` [PATCH v8 32/48] target/arm/meson: accelerator files are not needed in user mode
` [PATCH v8 34/48] target/arm/machine: reduce migration include to avoid target specific definitions
` [PATCH v8 35/48] target/arm/machine: remove TARGET_AARCH64 from migration state
` [PATCH v8 36/48] target/arm/machine: move cpu_post_load kvm bits to kvm_arm_cpu_post_load function
` [PATCH v8 38/48] target/arm/machine: compile file once (system)
` [PATCH v8 46/48] target/arm/tcg/tlb-insns: "

[PATCH v4 00/13] Enable shared device assignment
 2025-05-14  1:39 UTC  (6+ messages)
` [PATCH v4 07/13] ram-block-attribute: Introduce RamBlockAttribute to manage RAMBLock with guest_memfd

[RFC PATCH 00/21] KVM: TDX huge page support for private memory
 2025-05-13 23:20 UTC  (29+ messages)
` [RFC PATCH 02/21] x86/virt/tdx: Enhance tdh_mem_page_aug() to support huge pages
` [RFC PATCH 03/21] x86/virt/tdx: Add SEAMCALL wrapper tdh_mem_page_demote()
` [RFC PATCH 04/21] KVM: TDX: Enforce 4KB mapping level during TD build Time
` [RFC PATCH 05/21] KVM: TDX: Enhance tdx_clear_page() to support huge pages
` [RFC PATCH 06/21] KVM: TDX: Assert the reclaimed pages were mapped as expected
` [RFC PATCH 07/21] KVM: TDX: Add a helper for WBINVD on huge pages with TD's keyID
` [RFC PATCH 09/21] KVM: TDX: Enable 2MB mapping size after TD is RUNNABLE
` [RFC PATCH 10/21] KVM: x86/mmu: Disallow page merging (huge page adjustment) for mirror root
` [RFC PATCH 12/21] KVM: TDX: Determine max mapping level according to vCPU's ACCEPT level
` [RFC PATCH 14/21] KVM: x86/tdp_mmu: Invoke split_external_spt hook with exclusive mmu_lock
` [RFC PATCH 16/21] KVM: x86/mmu: Introduce kvm_split_boundary_leafs() to split boundary leafs
` [RFC PATCH 19/21] KVM: gmem: Split huge boundary leafs for punch hole of private memory
` [RFC PATCH 20/21] KVM: x86: Force a prefetch fault's max mapping level to 4KB for TDX
` [RFC PATCH 21/21] KVM: x86: Ignore splitting huge pages in fault path "

[PATCH v2 0/5] KVM: Dirty ring fixes and cleanups
 2025-05-13 22:27 UTC  (10+ messages)
` [PATCH v2 3/5] KVM: Conditionally reschedule when resetting the dirty ring
` [PATCH v2 4/5] KVM: Check for empty mask of harvested dirty ring entries in caller
` [PATCH v2 5/5] KVM: Use mask of harvested dirty ring entries to coalesce dirty ring resets

[PATCH v6 0/9] x86: Add support for NMI-source reporting with FRED
 2025-05-13 20:38 UTC  (10+ messages)
` [PATCH v6 1/9] x86/fred, KVM: VMX: Pass event data to the FRED entry point from KVM
` [PATCH v6 2/9] x86/cpufeatures: Add the CPUID feature bit for NMI-source reporting
` [PATCH v6 3/9] x86/nmi: Extend the registration interface to include the NMI-source vector
` [PATCH v6 4/9] x86/nmi: Assign and register NMI-source vectors
` [PATCH v6 5/9] x86/nmi: Add support to handle NMIs with source information
` [PATCH v6 6/9] x86/nmi: Prepare for the new NMI-source vector encoding
` [PATCH v6 7/9] x86/nmi: Enable NMI-source for IPIs delivered as NMIs
` [PATCH v6 8/9] perf/x86: Enable NMI-source reporting for perfmon
` [PATCH v6 9/9] x86/nmi: Print source information with the unknown NMI console message

[RFC PATCH 39/39] KVM: guest_memfd: Dynamically split/reconstruct HugeTLB page
 2025-05-13 17:33 UTC  (6+ messages)

[RFC 00/10] i386/cpu: Cache CPUID fixup, Intel cache model & topo CPUID enhencement
 2025-05-13 12:45 UTC  (3+ messages)
` [RFC 06/10] i386/cpu: Introduce enable_cpuid_0x1f to force exposing CPUID 0x1f

[PATCH v4 00/27] hw/i386/pc: Remove deprecated 2.6 and 2.7 PC machines
 2025-05-13 11:23 UTC  (41+ messages)
` [PATCH v4 12/27] target/i386/cpu: Remove CPUX86State::enable_cpuid_0xb field
      ` How to mark internal properties (was: Re: [PATCH v4 12/27] target/i386/cpu: Remove CPUX86State::enable_cpuid_0xb field)
            ` How to mark internal properties
` [PATCH v4 14/27] hw/intc/apic: Remove APICCommonState::legacy_instance_id field
` [PATCH v4 15/27] hw/core/machine: Remove hw_compat_2_6[] array
` [PATCH v4 17/27] hw/i386/pc: Remove deprecated pc-q35-2.7 and pc-i440fx-2.7 machines
` [PATCH v4 19/27] target/i386/cpu: Remove CPUX86State::full_cpuid_auto_level field
` [PATCH v4 20/27] target/i386/cpu: Remove CPUX86State::enable_l3_cache field
` [PATCH v4 21/27] hw/audio/pcspk: Remove PCSpkState::migrate field
` [PATCH v4 23/27] hw/i386/intel_iommu: Remove IntelIOMMUState::buggy_eim field
` [PATCH v4 24/27] hw/intc/ioapic: Remove IOAPICCommonState::version field
` [PATCH v4 25/27] hw/virtio/virtio-pci: Remove VirtIOPCIProxy::ignore_backend_features field
` [PATCH v4 27/27] hw/virtio/virtio-pci: Remove VIRTIO_PCI_FLAG_PAGE_PER_VQ definition

[GIT PULL] Please pull mlx5 VFIO PCI DMA conversion
 2025-05-13 10:48 UTC 

[PATCH net-next v14 0/9] Device memory TCP TX
 2025-05-13  9:30 UTC  (4+ messages)
` [PATCH net-next v14 4/9] net: devmem: Implement TX path

[kvm-unit-tests PATCH v1 0/8] Improve CET tests
 2025-05-13  7:22 UTC  (7+ messages)
` [kvm-unit-tests PATCH v1 3/8] x86: cet: Directly check for #CP exception in run_in_user()
` [kvm-unit-tests PATCH v1 4/8] x86: cet: Validate #CP error code
` [kvm-unit-tests PATCH v1 5/8] x86: cet: Use report_skip()
` [kvm-unit-tests PATCH v1 6/8] x86: cet: Drop unnecessary casting
` [kvm-unit-tests PATCH v1 7/8] x86: cet: Validate writing unaligned values to SSP MSR causes #GP
` [kvm-unit-tests PATCH v1 8/8] x86: cet: Validate CET states during VMX transitions


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox