kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2025-05-13 20:38:03 to 2025-05-14 23:43:57 UTC [more...]

[RFC PATCH v2 00/51] 1G page support for guest_memfd
 2025-05-14 23:42 UTC  (39+ messages)
` [RFC PATCH v2 01/51] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
` [RFC PATCH v2 02/51] KVM: guest_memfd: Introduce and use shareability to guard faulting
` [RFC PATCH v2 03/51] KVM: selftests: Update guest_memfd_test for INIT_PRIVATE flag
` [RFC PATCH v2 04/51] KVM: guest_memfd: Introduce KVM_GMEM_CONVERT_SHARED/PRIVATE ioctls
` [RFC PATCH v2 05/51] KVM: guest_memfd: Skip LRU for guest_memfd folios
` [RFC PATCH v2 06/51] KVM: Query guest_memfd for private/shared status
` [RFC PATCH v2 07/51] KVM: guest_memfd: Add CAP KVM_CAP_GMEM_CONVERSION
` [RFC PATCH v2 08/51] KVM: selftests: Test flag validity after guest_memfd supports conversions
` [RFC PATCH v2 09/51] KVM: selftests: Test faulting with respect to GUEST_MEMFD_FLAG_INIT_PRIVATE
` [RFC PATCH v2 10/51] KVM: selftests: Refactor vm_mem_add to be more flexible
` [RFC PATCH v2 11/51] KVM: selftests: Allow cleanup of ucall_pool from host
` [RFC PATCH v2 12/51] KVM: selftests: Test conversion flows for guest_memfd
` [RFC PATCH v2 13/51] KVM: selftests: Add script to exercise private_mem_conversions_test
` [RFC PATCH v2 14/51] KVM: selftests: Update private_mem_conversions_test to mmap guest_memfd
` [RFC PATCH v2 15/51] KVM: selftests: Update script to map shared memory from guest_memfd
` [RFC PATCH v2 16/51] mm: hugetlb: Consolidate interpretation of gbl_chg within alloc_hugetlb_folio()
` [RFC PATCH v2 17/51] mm: hugetlb: Cleanup interpretation of gbl_chg in alloc_hugetlb_folio()
` [RFC PATCH v2 18/51] mm: hugetlb: Cleanup interpretation of map_chg_state within alloc_hugetlb_folio()
` [RFC PATCH v2 19/51] mm: hugetlb: Rename alloc_surplus_hugetlb_folio
` [RFC PATCH v2 20/51] mm: mempolicy: Refactor out policy_node_nodemask()
` [RFC PATCH v2 21/51] mm: hugetlb: Inline huge_node() into callers
` [RFC PATCH v2 22/51] mm: hugetlb: Refactor hugetlb allocation functions
` [RFC PATCH v2 23/51] mm: hugetlb: Refactor out hugetlb_alloc_folio()
` [RFC PATCH v2 24/51] mm: hugetlb: Add option to create new subpool without using surplus
` [RFC PATCH v2 25/51] mm: truncate: Expose preparation steps for truncate_inode_pages_final
` [RFC PATCH v2 26/51] mm: Consolidate freeing of typed folios on final folio_put()
` [RFC PATCH v2 27/51] mm: hugetlb: Expose hugetlb_subpool_{get,put}_pages()
` [RFC PATCH v2 28/51] mm: Introduce guestmem_hugetlb to support folio_put() handling of guestmem pages
` [RFC PATCH v2 29/51] mm: guestmem_hugetlb: Wrap HugeTLB as an allocator for guest_memfd
` [RFC PATCH v2 30/51] mm: truncate: Expose truncate_inode_folio()
` [RFC PATCH v2 31/51] KVM: x86: Set disallow_lpage on base_gfn and guest_memfd pgoff misalignment
` [RFC PATCH v2 32/51] KVM: guest_memfd: Support guestmem_hugetlb as custom allocator
` [RFC PATCH v2 33/51] KVM: guest_memfd: Allocate and truncate from "
` [RFC PATCH v2 34/51] mm: hugetlb: Add functions to add/delete folio from hugetlb lists
` [RFC PATCH v2 35/51] mm: guestmem_hugetlb: Add support for splitting and merging pages
` [RFC PATCH v2 36/51] mm: Convert split_folio() macro to function
` [RFC PATCH v2 37/51] filemap: Pass address_space mapping to ->free_folio()
` [RFC PATCH v2 38/51] KVM: guest_memfd: Split allocator pages for guest_memfd use

[PATCH v4 00/38] Mediated vPMU 4.0 for x86
 2025-05-14 23:30 UTC  (14+ messages)
` [PATCH v4 01/38] perf: Support get/put mediated PMU interfaces
` [PATCH v4 04/38] perf: Add a EVENT_GUEST flag
` [PATCH v4 05/38] perf: Add generic exclude_guest support
` [PATCH v4 06/38] x86/irq: Factor out common code for installing kvm irq handler
` [PATCH v4 07/38] perf: core/x86: Register a new vector for KVM GUEST PMI
` [PATCH v4 09/38] perf: Add switch_guest_ctx() interface

[PATCH v6 0/9] x86: Add support for NMI-source reporting with FRED
 2025-05-14 21:34 UTC  (6+ messages)
` [PATCH v6 1/9] x86/fred, KVM: VMX: Pass event data to the FRED entry point from KVM
` [PATCH v6 8/9] perf/x86: Enable NMI-source reporting for perfmon
` [PATCH v6 9/9] x86/nmi: Print source information with the unknown NMI console message

[PATCH v1 0/6] VMM can handle guest SEA via KVM_EXIT_ARM_SEA
 2025-05-14 21:29 UTC  (4+ messages)
` [PATCH v1 6/6] Documentation: kvm: new uAPI for handling SEA

[PATCH v9 13/17] KVM: arm64: Handle guest_memfd()-backed guest page faults
 2025-05-14 21:26 UTC  (2+ messages)

[PATCH] RISC-V: KVM: Disable instret/cycle for VU mode by default
 2025-05-14 21:01 UTC  (3+ messages)

[PATCH v9 00/17] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
 2025-05-14 20:40 UTC  (20+ messages)
` [PATCH v9 02/17] KVM: Rename CONFIG_KVM_GENERIC_PRIVATE_MEM to CONFIG_KVM_GENERIC_GMEM_POPULATE
` [PATCH v9 07/17] KVM: guest_memfd: Allow host to map guest_memfd() pages
` [PATCH v9 08/17] KVM: guest_memfd: Check that userspace_addr and fd+offset refer to same range
` [PATCH v9 10/17] KVM: x86: Compute max_mapping_level with input from guest_memfd

[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
 2025-05-14 20:33 UTC  (27+ messages)
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory

[RFC PATCH 00/12] Private MMIO support for private assigned dev
 2025-05-14 20:05 UTC  (16+ messages)

[PATCH 0/3] KVM: arm64: Allow vGICv4 configuration per VM
 2025-05-14 19:21 UTC  (4+ messages)
` [PATCH 1/3] kvm: arm64: Add support for KVM_DEV_ARM_VGIC_CONFIG_GICV4 attr
` [PATCH 2/3] docs: kvm: devices/arm-vgic-v3: Document "
` [PATCH 3/3] KVM: selftests: Extend vgic_init to test GICv4 config attr

[PATCH v4 0/2] kvm: sev: Add SNP guest request throttling
 2025-05-14 18:50 UTC  (6+ messages)
` [PATCH v4 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v4 2/2] kvm: sev: If ccp is busy, report busy to guest
` [PATCH v4 2/2] The ccp driver can be overloaded even with guest request rate limits. The return value of -EBUSY means that there is no firmware error to report back to user space, so the guest VM would see this as exitinfo2 = 0. The false success can trick the guest to update its message sequence number when it shouldn't have

[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
 2025-05-14 18:39 UTC  (3+ messages)
` [RFC PATCH v2 07/22] coco/tsm: Add tsm and tsm-host modules

[PATCH] KVM: s390: rename PROT_NONE to PROT_TYPE_DUMMY
 2025-05-14 17:46 UTC  (3+ messages)

[PATCH v1 0/5] KVM: s390: some cleanup and small fixes
 2025-05-14 17:41 UTC  (7+ messages)
` [PATCH v1 1/5] s390: remove unneeded includes
` [PATCH v1 2/5] KVM: s390: remove unneeded srcu lock
` [PATCH v1 3/5] KVM: s390: refactor some functions in priv.c
` [PATCH v1 4/5] KVM: s390: refactor and split some gmap helpers
` [PATCH v1 5/5] KVM: s390: simplify and move pv code

[PATCH 0/3] KVM: s390: Use ESCA instead of BSCA at VM init
 2025-05-14 17:34 UTC  (5+ messages)
` [PATCH 1/3] KVM: s390: Set KVM_MAX_VCPUS to 256
` [PATCH 2/3] KVM: s390: Always allocate esca_block
` [PATCH 3/3] KVM: s390: Specify kvm->arch.sca as esca_block

[akpm-mm:mm-new 320/331] arch/s390/kvm/gaccess.c:321:2: error: expected identifier
 2025-05-14 16:10 UTC  (7+ messages)

[RFC 00/10] i386/cpu: Cache CPUID fixup, Intel cache model & topo CPUID enhencement
 2025-05-14 15:23 UTC  (4+ messages)
` [RFC 06/10] i386/cpu: Introduce enable_cpuid_0x1f to force exposing CPUID 0x1f

[PATCH 0/3] KVM: x86: allow DEBUGCTL.DEBUGCTLMSR_FREEZE_IN_SMM passthrough
 2025-05-14 14:28 UTC  (7+ messages)
` [PATCH 1/3] x86: KVM: VMX: Wrap GUEST_IA32_DEBUGCTL read/write with access functions

[PATCH v2 0/5] KVM: Dirty ring fixes and cleanups
 2025-05-14 14:24 UTC  (6+ messages)
` [PATCH v2 3/5] KVM: Conditionally reschedule when resetting the dirty ring

[Invitation] bi-weekly guest_memfd upstream call on 2025-05-15
 2025-05-14 13:12 UTC 

[RFC PATCH 00/18] KVM: VMX: Introduce Intel Mode-Based Execute Control (MBEC)
 2025-05-14 12:55 UTC  (7+ messages)
` [RFC PATCH 06/18] KVM: VMX: Wire up Intel MBEC enable/disable logic

[PATCH v1 0/2] virtio: Add length checks for device writable portions
 2025-05-14 12:41 UTC  (5+ messages)
` [PATCH 1/2] virtio_blk: add length check for device writable portion

[PATCH v4 00/17] KVM: arm64: Recursive NV support
 2025-05-14 10:35 UTC  (18+ messages)
` [PATCH v4 01/17] arm64: sysreg: Add layout for VNCR_EL2
` [PATCH v4 02/17] KVM: arm64: nv: Allocate VNCR page when required
` [PATCH v4 03/17] KVM: arm64: nv: Extract translation helper from the AT code
` [PATCH v4 04/17] KVM: arm64: nv: Snapshot S1 ASID tagging information during walk
` [PATCH v4 05/17] KVM: arm64: nv: Move TLBI range decoding to a helper
` [PATCH v4 06/17] KVM: arm64: nv: Don't adjust PSTATE.M when L2 is nesting
` [PATCH v4 07/17] KVM: arm64: nv: Add pseudo-TLB backing VNCR_EL2
` [PATCH v4 08/17] KVM: arm64: nv: Add userspace and guest handling of VNCR_EL2
` [PATCH v4 09/17] KVM: arm64: nv: Handle VNCR_EL2-triggered faults
` [PATCH v4 10/17] KVM: arm64: nv: Handle mapping of VNCR_EL2 at EL2
` [PATCH v4 11/17] KVM: arm64: nv: Handle VNCR_EL2 invalidation from MMU notifiers
` [PATCH v4 12/17] KVM: arm64: nv: Program host's VNCR_EL2 to the fixmap address
` [PATCH v4 13/17] KVM: arm64: nv: Add S1 TLB invalidation primitive for VNCR_EL2
` [PATCH v4 14/17] KVM: arm64: nv: Plumb TLBI S1E2 into system instruction dispatch
` [PATCH v4 15/17] KVM: arm64: nv: Remove dead code from ERET handling
` [PATCH v4 16/17] KVM: arm64: Allow userspace to request KVM_ARM_VCPU_EL2*
` [PATCH v4 17/17] KVM: arm64: Document NV caps and vcpu flags

[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
 2025-05-14 10:24 UTC  (6+ messages)
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS

[PATCH v5 0/6] KVM: lockdep improvements
 2025-05-14  9:35 UTC  (5+ messages)
` [PATCH v5 3/6] KVM: add kvm_lock_all_vcpus and kvm_trylock_all_vcpus
` [PATCH v5 5/6] KVM: arm64: use kvm_trylock_all_vcpus when locking all vCPUs

[kvm-unit-tests PATCH v3 00/16] arm/arm64: Add kvmtool to the runner script
 2025-05-14  8:02 UTC  (13+ messages)
` [kvm-unit-tests PATCH v3 01/16] scripts: unittests.cfg: Rename 'extra_params' to 'qemu_params'
` [kvm-unit-tests PATCH v3 02/16] scripts: Add 'test_args' test definition parameter
` [kvm-unit-tests PATCH v3 04/16] run_tests.sh: Document --probe-maxsmp argument
` [kvm-unit-tests PATCH v3 05/16] scripts: Document environment variables
` [kvm-unit-tests PATCH v3 06/16] scripts: Refuse to run the tests if not configured for qemu
` [kvm-unit-tests PATCH v3 07/16] scripts: Use an associative array for qemu argument names

[RFC PATCH v6 00/32] AMD: Add Secure AVIC Guest Support
 2025-05-14  7:18 UTC  (33+ messages)
` [RFC PATCH v6 01/32] x86/apic: KVM: Deduplicate APIC vector => register+bit math
` [RFC PATCH v6 02/32] KVM: x86: Move find_highest_vector() to a common header
` [RFC PATCH v6 03/32] KVM: x86: Move lapic get/set_reg() helpers to common code
` [RFC PATCH v6 04/32] KVM: x86: Move lapic get/set_reg64() "
` [RFC PATCH v6 05/32] KVM: x86: Move lapic set/clear_vector() "
` [RFC PATCH v6 06/32] KVM: x86: Move {REG,VEC}_POS() macros to lapic.c
` [RFC PATCH v6 07/32] KVM: x86: apic_test_vector() to common code
` [RFC PATCH v6 08/32] x86/apic: Remove redundant parentheses around 'bitmap'
` [RFC PATCH v6 09/32] x86/apic: Rename 'reg_off' to 'reg'
` [RFC PATCH v6 10/32] x86/apic: Change apic_*_vector() vector param to unsigned
` [RFC PATCH v6 11/32] x86/apic: Change get/set reg operations reg "
` [RFC PATCH v6 12/32] x86/apic: Unionize apic regs for 32bit/64bit access w/o type casting
` [RFC PATCH v6 13/32] x86/apic: Simplify bitwise operations on apic bitmap
` [RFC PATCH v6 14/32] x86/apic: Move apic_update_irq_cfg() calls to apic_update_vector()
` [RFC PATCH v6 15/32] x86/apic: Add new driver for Secure AVIC
` [RFC PATCH v6 16/32] x86/apic: Initialize Secure AVIC APIC backing page
` [RFC PATCH v6 17/32] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
` [RFC PATCH v6 18/32] x86/apic: Initialize APIC ID for Secure AVIC
` [RFC PATCH v6 19/32] x86/apic: Add update_vector() callback for apic drivers
` [RFC PATCH v6 20/32] x86/apic: Add update_vector() callback for Secure AVIC
` [RFC PATCH v6 21/32] x86/apic: Add support to send IPI "
` [RFC PATCH v6 22/32] x86/apic: Support LAPIC timer "
` [RFC PATCH v6 23/32] x86/sev: Initialize VGIF for secondary VCPUs "
` [RFC PATCH v6 24/32] x86/apic: Add support to send NMI IPI "
` [RFC PATCH v6 25/32] x86/apic: Allow NMI to be injected from hypervisor "
` [RFC PATCH v6 26/32] x86/sev: Enable NMI support "
` [RFC PATCH v6 27/32] x86/apic: Read and write LVT* APIC registers from HV for SAVIC guests
` [RFC PATCH v6 28/32] x86/apic: Handle EOI writes for Secure AVIC guests
` [RFC PATCH v6 29/32] x86/apic: Add kexec support for Secure AVIC
` [RFC PATCH v6 30/32] x86/apic: Enable Secure AVIC in Control MSR
` [RFC PATCH v6 31/32] x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
` [RFC PATCH v6 32/32] x86/sev: Indicate SEV-SNP guest supports Secure AVIC

[PATCH] kvm: x86: fix infinite loop in kvm_guest_time_update when tsc is 0
 2025-05-14  6:49 UTC 

[PATCH net-next v4] selftests/vsock: add initial vmtest.sh for vsock
 2025-05-14  6:32 UTC  (3+ messages)

[PATCH net-next v5] selftests/vsock: add initial vmtest.sh for vsock
 2025-05-14  6:31 UTC 

[PATCH] vhost/net: remove zerocopy support
 2025-05-14  6:27 UTC  (7+ messages)

[PATCH v8 00/48] single-binary: compile target/arm twice
 2025-05-14  6:12 UTC  (6+ messages)
` [PATCH v8 30/48] target/arm/ptw: replace TARGET_AARCH64 by CONFIG_ATOMIC64 from arm_casq_ptw

[PATCH v4 00/13] Enable shared device assignment
 2025-05-14  1:39 UTC  (6+ messages)
` [PATCH v4 07/13] ram-block-attribute: Introduce RamBlockAttribute to manage RAMBLock with guest_memfd

[RFC PATCH 00/21] KVM: TDX huge page support for private memory
 2025-05-13 23:20 UTC  (13+ messages)
` [RFC PATCH 12/21] KVM: TDX: Determine max mapping level according to vCPU's ACCEPT level
` [RFC PATCH 14/21] KVM: x86/tdp_mmu: Invoke split_external_spt hook with exclusive mmu_lock
` [RFC PATCH 16/21] KVM: x86/mmu: Introduce kvm_split_boundary_leafs() to split boundary leafs
` [RFC PATCH 19/21] KVM: gmem: Split huge boundary leafs for punch hole of private memory
` [RFC PATCH 20/21] KVM: x86: Force a prefetch fault's max mapping level to 4KB for TDX
` [RFC PATCH 21/21] KVM: x86: Ignore splitting huge pages in fault path "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).