messages from 2025-05-13 16:34:46 to 2025-05-14 23:42:57 UTC [more...]
[RFC PATCH v2 00/51] 1G page support for guest_memfd
2025-05-14 23:41 UTC
[PATCH v4 00/38] Mediated vPMU 4.0 for x86
2025-05-14 23:30 UTC (14+ messages)
` [PATCH v4 01/38] perf: Support get/put mediated PMU interfaces
` [PATCH v4 04/38] perf: Add a EVENT_GUEST flag
` [PATCH v4 05/38] perf: Add generic exclude_guest support
` [PATCH v4 06/38] x86/irq: Factor out common code for installing kvm irq handler
` [PATCH v4 07/38] perf: core/x86: Register a new vector for KVM GUEST PMI
` [PATCH v4 09/38] perf: Add switch_guest_ctx() interface
[PATCH v6 0/9] x86: Add support for NMI-source reporting with FRED
2025-05-14 21:34 UTC (12+ messages)
` [PATCH v6 1/9] x86/fred, KVM: VMX: Pass event data to the FRED entry point from KVM
` [PATCH v6 2/9] x86/cpufeatures: Add the CPUID feature bit for NMI-source reporting
` [PATCH v6 3/9] x86/nmi: Extend the registration interface to include the NMI-source vector
` [PATCH v6 4/9] x86/nmi: Assign and register NMI-source vectors
` [PATCH v6 5/9] x86/nmi: Add support to handle NMIs with source information
` [PATCH v6 6/9] x86/nmi: Prepare for the new NMI-source vector encoding
` [PATCH v6 7/9] x86/nmi: Enable NMI-source for IPIs delivered as NMIs
` [PATCH v6 8/9] perf/x86: Enable NMI-source reporting for perfmon
` [PATCH v6 9/9] x86/nmi: Print source information with the unknown NMI console message
[PATCH v1 0/6] VMM can handle guest SEA via KVM_EXIT_ARM_SEA
2025-05-14 21:29 UTC (4+ messages)
` [PATCH v1 6/6] Documentation: kvm: new uAPI for handling SEA
[PATCH v9 00/17] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
2025-05-14 21:26 UTC (34+ messages)
` [PATCH v9 02/17] KVM: Rename CONFIG_KVM_GENERIC_PRIVATE_MEM to CONFIG_KVM_GENERIC_GMEM_POPULATE
` [PATCH v9 03/17] KVM: Rename kvm_arch_has_private_mem() to kvm_arch_supports_gmem()
` [PATCH v9 04/17] KVM: x86: Rename kvm->arch.has_private_mem to kvm->arch.supports_gmem
` [PATCH v9 05/17] KVM: Rename kvm_slot_can_be_private() to kvm_slot_has_gmem()
` [PATCH v9 06/17] KVM: Fix comments that refer to slots_lock
` [PATCH v9 07/17] KVM: guest_memfd: Allow host to map guest_memfd() pages
` [PATCH v9 08/17] KVM: guest_memfd: Check that userspace_addr and fd+offset refer to same range
` [PATCH v9 09/17] KVM: x86/mmu: Handle guest page faults for guest_memfd with shared memory
` [PATCH v9 10/17] KVM: x86: Compute max_mapping_level with input from guest_memfd
` [PATCH v9 11/17] KVM: arm64: Refactor user_mem_abort() calculation of force_pte
` [PATCH v9 12/17] KVM: arm64: Rename variables in user_mem_abort()
` [PATCH v9 13/17] KVM: arm64: Handle guest_memfd()-backed guest page faults
` [PATCH v9 14/17] KVM: arm64: Enable mapping guest_memfd in arm64
` [PATCH v9 15/17] KVM: Introduce the KVM capability KVM_CAP_GMEM_SHARED_MEM
` [PATCH v9 16/17] KVM: selftests: guest_memfd mmap() test when mapping is allowed
` [PATCH v9 17/17] KVM: selftests: Test guest_memfd same-range validation
[PATCH] RISC-V: KVM: Disable instret/cycle for VU mode by default
2025-05-14 21:01 UTC (3+ messages)
[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
2025-05-14 20:33 UTC (27+ messages)
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory
[RFC PATCH 00/12] Private MMIO support for private assigned dev
2025-05-14 20:05 UTC (16+ messages)
[PATCH 0/3] KVM: arm64: Allow vGICv4 configuration per VM
2025-05-14 19:21 UTC (4+ messages)
` [PATCH 1/3] kvm: arm64: Add support for KVM_DEV_ARM_VGIC_CONFIG_GICV4 attr
` [PATCH 2/3] docs: kvm: devices/arm-vgic-v3: Document "
` [PATCH 3/3] KVM: selftests: Extend vgic_init to test GICv4 config attr
[PATCH v4 0/2] kvm: sev: Add SNP guest request throttling
2025-05-14 18:50 UTC (6+ messages)
` [PATCH v4 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v4 2/2] kvm: sev: If ccp is busy, report busy to guest
` [PATCH v4 2/2] The ccp driver can be overloaded even with guest request rate limits. The return value of -EBUSY means that there is no firmware error to report back to user space, so the guest VM would see this as exitinfo2 = 0. The false success can trick the guest to update its message sequence number when it shouldn't have
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-05-14 18:39 UTC (3+ messages)
` [RFC PATCH v2 07/22] coco/tsm: Add tsm and tsm-host modules
[PATCH] KVM: s390: rename PROT_NONE to PROT_TYPE_DUMMY
2025-05-14 17:46 UTC (3+ messages)
[PATCH v1 0/5] KVM: s390: some cleanup and small fixes
2025-05-14 17:41 UTC (7+ messages)
` [PATCH v1 1/5] s390: remove unneeded includes
` [PATCH v1 2/5] KVM: s390: remove unneeded srcu lock
` [PATCH v1 3/5] KVM: s390: refactor some functions in priv.c
` [PATCH v1 4/5] KVM: s390: refactor and split some gmap helpers
` [PATCH v1 5/5] KVM: s390: simplify and move pv code
[PATCH 0/3] KVM: s390: Use ESCA instead of BSCA at VM init
2025-05-14 17:34 UTC (5+ messages)
` [PATCH 1/3] KVM: s390: Set KVM_MAX_VCPUS to 256
` [PATCH 2/3] KVM: s390: Always allocate esca_block
` [PATCH 3/3] KVM: s390: Specify kvm->arch.sca as esca_block
[akpm-mm:mm-new 320/331] arch/s390/kvm/gaccess.c:321:2: error: expected identifier
2025-05-14 16:10 UTC (7+ messages)
[RFC 00/10] i386/cpu: Cache CPUID fixup, Intel cache model & topo CPUID enhencement
2025-05-14 15:23 UTC (4+ messages)
` [RFC 06/10] i386/cpu: Introduce enable_cpuid_0x1f to force exposing CPUID 0x1f
[PATCH 0/3] KVM: x86: allow DEBUGCTL.DEBUGCTLMSR_FREEZE_IN_SMM passthrough
2025-05-14 14:28 UTC (7+ messages)
` [PATCH 1/3] x86: KVM: VMX: Wrap GUEST_IA32_DEBUGCTL read/write with access functions
[PATCH v2 0/5] KVM: Dirty ring fixes and cleanups
2025-05-14 14:24 UTC (6+ messages)
` [PATCH v2 3/5] KVM: Conditionally reschedule when resetting the dirty ring
[Invitation] bi-weekly guest_memfd upstream call on 2025-05-15
2025-05-14 13:12 UTC
[RFC PATCH 00/18] KVM: VMX: Introduce Intel Mode-Based Execute Control (MBEC)
2025-05-14 12:55 UTC (11+ messages)
` [RFC PATCH 06/18] KVM: VMX: Wire up Intel MBEC enable/disable logic
` [RFC PATCH 15/18] KVM: x86/mmu: Extend make_spte to understand MBEC
[PATCH v1 0/2] virtio: Add length checks for device writable portions
2025-05-14 12:41 UTC (5+ messages)
` [PATCH 1/2] virtio_blk: add length check for device writable portion
[PATCH v4 00/17] KVM: arm64: Recursive NV support
2025-05-14 10:35 UTC (18+ messages)
` [PATCH v4 01/17] arm64: sysreg: Add layout for VNCR_EL2
` [PATCH v4 02/17] KVM: arm64: nv: Allocate VNCR page when required
` [PATCH v4 03/17] KVM: arm64: nv: Extract translation helper from the AT code
` [PATCH v4 04/17] KVM: arm64: nv: Snapshot S1 ASID tagging information during walk
` [PATCH v4 05/17] KVM: arm64: nv: Move TLBI range decoding to a helper
` [PATCH v4 06/17] KVM: arm64: nv: Don't adjust PSTATE.M when L2 is nesting
` [PATCH v4 07/17] KVM: arm64: nv: Add pseudo-TLB backing VNCR_EL2
` [PATCH v4 08/17] KVM: arm64: nv: Add userspace and guest handling of VNCR_EL2
` [PATCH v4 09/17] KVM: arm64: nv: Handle VNCR_EL2-triggered faults
` [PATCH v4 10/17] KVM: arm64: nv: Handle mapping of VNCR_EL2 at EL2
` [PATCH v4 11/17] KVM: arm64: nv: Handle VNCR_EL2 invalidation from MMU notifiers
` [PATCH v4 12/17] KVM: arm64: nv: Program host's VNCR_EL2 to the fixmap address
` [PATCH v4 13/17] KVM: arm64: nv: Add S1 TLB invalidation primitive for VNCR_EL2
` [PATCH v4 14/17] KVM: arm64: nv: Plumb TLBI S1E2 into system instruction dispatch
` [PATCH v4 15/17] KVM: arm64: nv: Remove dead code from ERET handling
` [PATCH v4 16/17] KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2*
` [PATCH v4 17/17] KVM: arm64: Document NV caps and vcpu flags
[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
2025-05-14 10:24 UTC (6+ messages)
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
[PATCH v5 0/6] KVM: lockdep improvements
2025-05-14 9:35 UTC (5+ messages)
` [PATCH v5 3/6] KVM: add kvm_lock_all_vcpus and kvm_trylock_all_vcpus
` [PATCH v5 5/6] KVM: arm64: use kvm_trylock_all_vcpus when locking all vCPUs
[kvm-unit-tests PATCH v3 00/16] arm/arm64: Add kvmtool to the runner script
2025-05-14 8:02 UTC (13+ messages)
` [kvm-unit-tests PATCH v3 01/16] scripts: unittests.cfg: Rename 'extra_params' to 'qemu_params'
` [kvm-unit-tests PATCH v3 02/16] scripts: Add 'test_args' test definition parameter
` [kvm-unit-tests PATCH v3 04/16] run_tests.sh: Document --probe-maxsmp argument
` [kvm-unit-tests PATCH v3 05/16] scripts: Document environment variables
` [kvm-unit-tests PATCH v3 06/16] scripts: Refuse to run the tests if not configured for qemu
` [kvm-unit-tests PATCH v3 07/16] scripts: Use an associative array for qemu argument names
[RFC PATCH v6 00/32] AMD: Add Secure AVIC Guest Support
2025-05-14 7:18 UTC (33+ messages)
` [RFC PATCH v6 01/32] x86/apic: KVM: Deduplicate APIC vector => register+bit math
` [RFC PATCH v6 02/32] KVM: x86: Move find_highest_vector() to a common header
` [RFC PATCH v6 03/32] KVM: x86: Move lapic get/set_reg() helpers to common code
` [RFC PATCH v6 04/32] KVM: x86: Move lapic get/set_reg64() "
` [RFC PATCH v6 05/32] KVM: x86: Move lapic set/clear_vector() "
` [RFC PATCH v6 06/32] KVM: x86: Move {REG,VEC}_POS() macros to lapic.c
` [RFC PATCH v6 07/32] KVM: x86: apic_test_vector() to common code
` [RFC PATCH v6 08/32] x86/apic: Remove redundant parentheses around 'bitmap'
` [RFC PATCH v6 09/32] x86/apic: Rename 'reg_off' to 'reg'
` [RFC PATCH v6 10/32] x86/apic: Change apic_*_vector() vector param to unsigned
` [RFC PATCH v6 11/32] x86/apic: Change get/set reg operations reg "
` [RFC PATCH v6 12/32] x86/apic: Unionize apic regs for 32bit/64bit access w/o type casting
` [RFC PATCH v6 13/32] x86/apic: Simplify bitwise operations on apic bitmap
` [RFC PATCH v6 14/32] x86/apic: Move apic_update_irq_cfg() calls to apic_update_vector()
` [RFC PATCH v6 15/32] x86/apic: Add new driver for Secure AVIC
` [RFC PATCH v6 16/32] x86/apic: Initialize Secure AVIC APIC backing page
` [RFC PATCH v6 17/32] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
` [RFC PATCH v6 18/32] x86/apic: Initialize APIC ID for Secure AVIC
` [RFC PATCH v6 19/32] x86/apic: Add update_vector() callback for apic drivers
` [RFC PATCH v6 20/32] x86/apic: Add update_vector() callback for Secure AVIC
` [RFC PATCH v6 21/32] x86/apic: Add support to send IPI "
` [RFC PATCH v6 22/32] x86/apic: Support LAPIC timer "
` [RFC PATCH v6 23/32] x86/sev: Initialize VGIF for secondary VCPUs "
` [RFC PATCH v6 24/32] x86/apic: Add support to send NMI IPI "
` [RFC PATCH v6 25/32] x86/apic: Allow NMI to be injected from hypervisor "
` [RFC PATCH v6 26/32] x86/sev: Enable NMI support "
` [RFC PATCH v6 27/32] x86/apic: Read and write LVT* APIC registers from HV for SAVIC guests
` [RFC PATCH v6 28/32] x86/apic: Handle EOI writes for Secure AVIC guests
` [RFC PATCH v6 29/32] x86/apic: Add kexec support for Secure AVIC
` [RFC PATCH v6 30/32] x86/apic: Enable Secure AVIC in Control MSR
` [RFC PATCH v6 31/32] x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
` [RFC PATCH v6 32/32] x86/sev: Indicate SEV-SNP guest supports Secure AVIC
[PATCH] kvm: x86: fix infinite loop in kvm_guest_time_update when tsc is 0
2025-05-14 6:49 UTC
[PATCH net-next v4] selftests/vsock: add initial vmtest.sh for vsock
2025-05-14 6:32 UTC (3+ messages)
[PATCH net-next v5] selftests/vsock: add initial vmtest.sh for vsock
2025-05-14 6:31 UTC
[PATCH] vhost/net: remove zerocopy support
2025-05-14 6:27 UTC (7+ messages)
[PATCH v8 00/48] single-binary: compile target/arm twice
2025-05-14 6:12 UTC (6+ messages)
` [PATCH v8 30/48] target/arm/ptw: replace TARGET_AARCH64 by CONFIG_ATOMIC64 from arm_casq_ptw
[PATCH v4 00/13] Enable shared device assignment
2025-05-14 1:39 UTC (6+ messages)
` [PATCH v4 07/13] ram-block-attribute: Introduce RamBlockAttribute to manage RAMBLock with guest_memfd
[RFC PATCH 00/21] KVM: TDX huge page support for private memory
2025-05-13 23:20 UTC (29+ messages)
` [RFC PATCH 02/21] x86/virt/tdx: Enhance tdh_mem_page_aug() to support huge pages
` [RFC PATCH 03/21] x86/virt/tdx: Add SEAMCALL wrapper tdh_mem_page_demote()
` [RFC PATCH 04/21] KVM: TDX: Enforce 4KB mapping level during TD build Time
` [RFC PATCH 05/21] KVM: TDX: Enhance tdx_clear_page() to support huge pages
` [RFC PATCH 06/21] KVM: TDX: Assert the reclaimed pages were mapped as expected
` [RFC PATCH 07/21] KVM: TDX: Add a helper for WBINVD on huge pages with TD's keyID
` [RFC PATCH 09/21] KVM: TDX: Enable 2MB mapping size after TD is RUNNABLE
` [RFC PATCH 10/21] KVM: x86/mmu: Disallow page merging (huge page adjustment) for mirror root
` [RFC PATCH 12/21] KVM: TDX: Determine max mapping level according to vCPU's ACCEPT level
` [RFC PATCH 14/21] KVM: x86/tdp_mmu: Invoke split_external_spt hook with exclusive mmu_lock
` [RFC PATCH 16/21] KVM: x86/mmu: Introduce kvm_split_boundary_leafs() to split boundary leafs
` [RFC PATCH 19/21] KVM: gmem: Split huge boundary leafs for punch hole of private memory
` [RFC PATCH 20/21] KVM: x86: Force a prefetch fault's max mapping level to 4KB for TDX
` [RFC PATCH 21/21] KVM: x86: Ignore splitting huge pages in fault path "
[RFC PATCH 39/39] KVM: guest_memfd: Dynamically split/reconstruct HugeTLB page
2025-05-13 17:33 UTC (6+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).