messages from 2025-05-22 08:05:12 to 2025-05-23 09:53:54 UTC [more...]
[RFC PATCH 00/20] TD-Preserving updates
2025-05-23 9:52 UTC (15+ messages)
` [RFC PATCH 01/20] x86/virt/tdx: Print SEAMCALL leaf numbers in decimal
` [RFC PATCH 02/20] x86/virt/tdx: Prepare to support P-SEAMLDR SEAMCALLs
` [RFC PATCH 03/20] x86/virt/seamldr: Introduce a wrapper for "
` [RFC PATCH 04/20] x86/virt/tdx: Introduce a "tdx" subsystem and "tsm" device
` [RFC PATCH 05/20] x86/virt/tdx: Export tdx module attributes via sysfs
` [RFC PATCH 06/20] x86/virt/seamldr: Add a helper to read P-SEAMLDR information
` [RFC PATCH 07/20] x86/virt/tdx: Expose SEAMLDR information via sysfs
` [RFC PATCH 08/20] x86/virt/seamldr: Implement FW_UPLOAD sysfs ABI for TD-Preserving Updates
` [RFC PATCH 09/20] x86/virt/seamldr: Allocate and populate a module update request
` [RFC PATCH 10/20] x86/virt/seamldr: Introduce skeleton for TD-Preserving updates
` [RFC PATCH 11/20] x86/virt/seamldr: Abort updates if errors occurred midway
` [RFC PATCH 12/20] x86/virt/seamldr: Shut down the current TDX module
` [RFC PATCH 13/20] x86/virt/tdx: Reset software states after TDX module shutdown
` [RFC PATCH 14/20] x86/virt/seamldr: Install a new TDX module
[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
2025-05-23 9:42 UTC (4+ messages)
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
[PATCH v3 0/2] RISC-V: KVM: VCPU reset fixes
2025-05-23 9:20 UTC (5+ messages)
[kvm-unit-tests PATCH] nVMX: Fix testing failure for canonical checks when forced emulation is not available
2025-05-23 9:08 UTC
[PATCH 0/3] riscv: Add double trap testing
2025-05-23 7:53 UTC (4+ messages)
` [PATCH 1/3] lib/riscv: export FWFT functions
` [PATCH 2/3] lib/riscv: clear SDT when entering exception handling
` [PATCH 3/3] riscv: Add ISA double trap extension testing
[PATCH v3 00/13] KVM: Make irqfd registration globally unique
2025-05-23 7:23 UTC (15+ messages)
` [PATCH v3 01/13] KVM: Use a local struct to do the initial vfs_poll() on an irqfd
` [PATCH v3 02/13] KVM: Acquire SCRU lock outside of irqfds.lock during assignment
` [PATCH v3 03/13] KVM: Initialize irqfd waitqueue callback when adding to the queue
` [PATCH v3 04/13] KVM: Add irqfd to KVM's list via the vfs_poll() callback
` [PATCH v3 05/13] KVM: Add irqfd to eventfd's waitqueue while holding irqfds.lock
` [PATCH v3 06/13] sched/wait: Drop WQ_FLAG_EXCLUSIVE from add_wait_queue_priority()
` [PATCH v3 07/13] xen: privcmd: Don't mark eventfd waiter as EXCLUSIVE
` [PATCH v3 08/13] sched/wait: Add a waitqueue helper for fully exclusive priority waiters
` [PATCH v3 09/13] KVM: Disallow binding multiple irqfds to an eventfd with a priority waiter
` [PATCH v3 10/13] KVM: Drop sanity check that per-VM list of irqfds is unique
` [PATCH v3 11/13] KVM: selftests: Assert that eventfd() succeeds in Xen shinfo test
` [PATCH v3 12/13] KVM: selftests: Add utilities to create eventfds and do KVM_IRQFD
` [PATCH v3 13/13] KVM: selftests: Add a KVM_IRQFD test to verify uniqueness requirements
[PATCH v4 0/4] KVM: x86: Dynamically allocate hashed page list
2025-05-23 6:40 UTC (7+ messages)
` [PATCH v4 1/4] KVM: TDX: Move TDX hardware setup from main.c to tdx.c
` [PATCH v4 2/4] KVM: x86/mmu: Dynamically allocate shadow MMU's hashed page list
` [PATCH v4 3/4] KVM: x86: Use kvzalloc() to allocate VM struct
` [PATCH v4 4/4] KVM: x86/mmu: Defer allocation of shadow MMU's hashed page list
[PATCH net-next v8] selftests/vsock: add initial vmtest.sh for vsock
2025-05-23 4:59 UTC
[PATCH v2 04/14] x86: Handle KCOV __init vs inline mismatches
2025-05-23 4:39 UTC
[PATCH v3 0/4] KVM: s390: some cleanup and small fixes
2025-05-23 3:48 UTC (14+ messages)
` [PATCH v3 1/4] s390: remove unneeded includes
` [PATCH v3 2/4] KVM: s390: remove unneeded srcu lock
` [PATCH v3 3/4] KVM: s390: refactor and split some gmap helpers
` [PATCH v3 4/4] KVM: s390: simplify and move pv code
[PATCH v4] vfio/type1: optimize vfio_pin_pages_remote() for large folio
2025-05-23 3:42 UTC (4+ messages)
[PATCH v2 0/8] irqbypass: Cleanups and a perf improvement
2025-05-23 1:53 UTC (3+ messages)
` [PATCH v2 8/8] irqbypass: Require producers to pass in Linux IRQ number during registration
[PATCH v8 0/6] bugfix some driver issues
2025-05-23 1:29 UTC (3+ messages)
[PATCH 0/5] KVM: VMX: Fix MMIO Stale Data Mitigation
2025-05-23 1:17 UTC (6+ messages)
` [PATCH 1/5] KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is NULL
` [PATCH 2/5] KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE
` [PATCH 3/5] KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest
` [PATCH 4/5] Revert "kvm: detect assigned device via irqbypass manager"
` [PATCH 5/5] VFIO: KVM: x86: Drop kvm_arch_{start,end}_assignment()
[PATCH v2 00/59] KVM: iommu: Overhaul device posted IRQs support
2025-05-23 1:00 UTC (60+ messages)
` [PATCH v2 01/59] KVM: x86: Pass new routing entries and irqfd when updating IRTEs
` [PATCH v2 02/59] KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure
` [PATCH v2 03/59] KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE
` [PATCH v2 04/59] iommu/amd: KVM: SVM: Delete now-unused cached/previous GA tag fields
` [PATCH v2 05/59] KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing
` [PATCH v2 06/59] KVM: SVM: Drop pointless masking of default APIC base when setting V_APIC_BAR
` [PATCH v2 07/59] KVM: SVM: Drop pointless masking of kernel page pa's with AVIC HPA masks
` [PATCH v2 08/59] KVM: SVM: Add helper to deduplicate code for getting AVIC backing page
` [PATCH v2 09/59] KVM: SVM: Drop vcpu_svm's pointless avic_backing_page field
` [PATCH v2 10/59] KVM: SVM: Inhibit AVIC if ID is too big instead of rejecting vCPU creation
` [PATCH v2 11/59] KVM: SVM: Drop redundant check in AVIC code on ID during "
` [PATCH v2 12/59] KVM: SVM: Track AVIC tables as natively sized pointers, not "struct pages"
` [PATCH v2 13/59] KVM: SVM: Drop superfluous "cache" of AVIC Physical ID entry pointer
` [PATCH v2 14/59] KVM: VMX: Move enable_ipiv knob to common x86
` [PATCH v2 15/59] KVM: SVM: Add enable_ipiv param, never set IsRunning if disabled
` [PATCH v2 16/59] KVM: SVM: Disable (x2)AVIC IPI virtualization if CPU has erratum #1235
` [PATCH v2 17/59] KVM: VMX: Suppress PI notifications whenever the vCPU is put
` [PATCH v2 18/59] KVM: SVM: Add a comment to explain why avic_vcpu_blocking() ignores IRQ blocking
` [PATCH v2 19/59] iommu/amd: KVM: SVM: Use pi_desc_addr to derive ga_root_ptr
` [PATCH v2 20/59] iommu/amd: KVM: SVM: Pass NULL @vcpu_info to indicate "not guest mode"
` [PATCH v2 21/59] KVM: SVM: Stop walking list of routing table entries when updating IRTE
` [PATCH v2 22/59] KVM: VMX: "
` [PATCH v2 23/59] KVM: SVM: Extract SVM specific code out of get_pi_vcpu_info()
` [PATCH v2 24/59] KVM: x86: Move IRQ routing/delivery APIs from x86.c => irq.c
` [PATCH v2 25/59] KVM: x86: Nullify irqfd->producer after updating IRTEs
` [PATCH v2 26/59] KVM: x86: Dedup AVIC vs. PI code for identifying target vCPU
` [PATCH v2 27/59] KVM: x86: Move posted interrupt tracepoint to common code
` [PATCH v2 28/59] KVM: SVM: Clean up return handling in avic_pi_update_irte()
` [PATCH v2 29/59] iommu: KVM: Split "struct vcpu_data" into separate AMD vs. Intel structs
` [PATCH v2 30/59] KVM: Don't WARN if updating IRQ bypass route fails
` [PATCH v2 31/59] KVM: Fold kvm_arch_irqfd_route_changed() into kvm_arch_update_irqfd_routing()
` [PATCH v2 32/59] KVM: x86: Track irq_bypass_vcpu in common x86 code
` [PATCH v2 33/59] KVM: x86: Skip IOMMU IRTE updates if there's no old or new vCPU being targeted
` [PATCH v2 34/59] KVM: x86: Don't update IRTE entries when old and new routes were !MSI
` [PATCH v2 35/59] KVM: SVM: Revert IRTE to legacy mode if IOMMU doesn't provide IR metadata
` [PATCH v2 36/59] KVM: SVM: Take and hold ir_list_lock across IRTE updates in IOMMU
` [PATCH v2 37/59] iommu/amd: Document which IRTE fields amd_iommu_update_ga() can modify
` [PATCH v2 38/59] iommu/amd: KVM: SVM: Infer IsRun from validity of pCPU destination
` [PATCH v2 39/59] iommu/amd: Factor out helper for manipulating IRTE GA/CPU info
` [PATCH v2 40/59] iommu/amd: KVM: SVM: Set pCPU info in IRTE when setting vCPU affinity
` [PATCH v2 41/59] iommu/amd: KVM: SVM: Add IRTE metadata to affined vCPU's list if AVIC is inhibited
` [PATCH v2 42/59] KVM: SVM: Don't check for assigned device(s) when updating affinity
` [PATCH v2 43/59] KVM: SVM: Don't check for assigned device(s) when activating AVIC
` [PATCH v2 44/59] KVM: SVM: WARN if (de)activating guest mode in IOMMU fails
` [PATCH v2 45/59] KVM: SVM: Process all IRTEs on affinity change even if one update fails
` [PATCH v2 46/59] KVM: SVM: WARN if updating IRTE GA fields in IOMMU fails
` [PATCH v2 47/59] KVM: x86: Drop superfluous "has assigned device" check in kvm_pi_update_irte()
` [PATCH v2 48/59] KVM: x86: WARN if IRQ bypass isn't supported "
` [PATCH v2 49/59] KVM: x86: WARN if IRQ bypass routing is updated without in-kernel local APIC
` [PATCH v2 50/59] KVM: SVM: WARN if ir_list is non-empty at vCPU free
` [PATCH v2 51/59] KVM: x86: Decouple device assignment from IRQ bypass
` [PATCH v2 52/59] KVM: VMX: WARN if VT-d Posted IRQs aren't possible when starting "
` [PATCH v2 53/59] KVM: SVM: Use vcpu_idx, not vcpu_id, for GA log tag/metadata
` [PATCH v2 54/59] iommu/amd: WARN if KVM calls GA IRTE helpers without virtual APIC support
` [PATCH v2 55/59] KVM: SVM: Fold avic_set_pi_irte_mode() into its sole caller
` [PATCH v2 56/59] KVM: SVM: Don't check vCPU's blocking status when toggling AVIC on/off
` [PATCH v2 57/59] KVM: SVM: Consolidate IRTE update "
` [PATCH v2 58/59] iommu/amd: KVM: SVM: Allow KVM to control need for GA log interrupts
` [PATCH v2 59/59] KVM: SVM: Generate GA log IRQs only if the associated vCPUs is blocking
[PATCH v3 0/8] x86, KVM: Optimize SEV cache flushing
2025-05-22 23:37 UTC (9+ messages)
` [PATCH v3 1/8] drm/gpu: Remove dead checks on wbinvd_on_all_cpus()'s return value
` [PATCH v3 2/8] x86, lib: Drop the unused return value from wbinvd_on_all_cpus()
` [PATCH v3 3/8] x86, lib: Add WBNOINVD helper functions
` [PATCH v3 4/8] x86, lib: Add wbinvd and wbnoinvd helpers to target multiple CPUs
` [PATCH v3 5/8] KVM: x86: Use wbinvd_on_cpu() instead of an open-coded equivalent
` [PATCH v3 6/8] KVM: SVM: Remove wbinvd in sev_vm_destroy()
` [PATCH v3 7/8] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
` [PATCH v3 8/8] KVM: SVM: Flush cache only on CPUs running SEV guest
[RFC PATCH v2 00/51] 1G page support for guest_memfd
2025-05-22 23:12 UTC (5+ messages)
` [RFC PATCH v2 33/51] KVM: guest_memfd: Allocate and truncate from custom allocator
` [RFC PATCH v2 38/51] KVM: guest_memfd: Split allocator pages for guest_memfd use
[PATCH v5 0/5] KVM: x86: allow DEBUGCTL.DEBUGCTLMSR_FREEZE_IN_SMM passthrough
2025-05-22 22:45 UTC (14+ messages)
` [PATCH v5 1/5] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
` [PATCH v5 2/5] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag
` [PATCH v5 3/5] KVM: nVMX: check vmcs12->guest_ia32_debugctl value given by L2
` [PATCH v5 4/5] KVM: VMX: wrap guest access to IA32_DEBUGCTL with wrappers
` [PATCH v5 5/5] KVM: VMX: preserve DEBUGCTLMSR_FREEZE_IN_SMM
[PATCH net-next v6 0/5] vsock: SOCK_LINGER rework
2025-05-22 22:29 UTC (9+ messages)
` [PATCH net-next v6 3/5] vsock/test: Introduce vsock_wait_sent() helper
` [PATCH net-next v6 4/5] vsock/test: Introduce enable_so_linger() helper
` [PATCH net-next v6 5/5] vsock/test: Add test for an unexpectedly lingering close()
[PATCH v2 0/5] Enable hstateen bits lazily for the KVM RISC-V Guests
2025-05-22 20:35 UTC (6+ messages)
` [PATCH v2 1/5] RISC-V: KVM: Lazy enable hstateen IMSIC & ISEL bit
` [PATCH v2 2/5] RISC-V: KVM: Add a hstateen lazy enabler helper function
` [PATCH v2 3/5] RISC-V: KVM: Support lazy enabling of siselect and aia bits
` [PATCH v2 4/5] RISC-V: KVM: Enable envcfg and sstateen bits lazily
` [PATCH v2 5/5] RISC-V: KVM: Remove the boot time enabling of hstateen bits
[PATCH v3 0/9] Add SBI v3.0 PMU enhancements
2025-05-22 19:03 UTC (10+ messages)
` [PATCH v3 1/9] drivers/perf: riscv: Add SBI v3.0 flag
` [PATCH v3 2/9] drivers/perf: riscv: Add raw event v2 support
` [PATCH v3 3/9] RISC-V: KVM: Add support for Raw event v2
` [PATCH v3 4/9] drivers/perf: riscv: Implement PMU event info function
` [PATCH v3 5/9] drivers/perf: riscv: Export "
` [PATCH v3 6/9] KVM: Add a helper function to validate vcpu gpa range
` [PATCH v3 7/9] RISC-V: KVM: Use the new gpa range validate helper function
` [PATCH v3 8/9] RISC-V: KVM: Implement get event info function
` [PATCH v3 9/9] RISC-V: KVM: Upgrade the supported SBI version to 3.0
[PATCH] vfio/type1: fixed rollback in vfio_dma_bitmap_alloc_all()
2025-05-22 17:52 UTC (4+ messages)
` 答复: [????] "
` "
[RFC PATCH v2 04/51] KVM: guest_memfd: Introduce KVM_GMEM_CONVERT_SHARED/PRIVATE ioctls
2025-05-22 16:26 UTC (13+ messages)
[PATCH v8 0/6] Introduce CET supervisor state support
2025-05-22 15:10 UTC (7+ messages)
` [PATCH v8 1/6] x86/fpu/xstate: Differentiate default features for host and guest FPUs
` [PATCH v8 2/6] x86/fpu: Initialize guest FPU permissions from guest defaults
` [PATCH v8 3/6] x86/fpu: Initialize guest fpstate and FPU pseudo container "
` [PATCH v8 4/6] x86/fpu: Remove xfd argument from __fpstate_reset()
` [PATCH v8 5/6] x86/fpu/xstate: Introduce "guest-only" supervisor xfeature set
` [PATCH v8 6/6] x86/fpu/xstate: Add CET supervisor xfeature support as a guest-only feature
[PATCH v4 0/5] Add SEV-SNP CipherTextHiding feature support
2025-05-22 14:56 UTC (2+ messages)
[PATCH v7 0/6] Introduce CET supervisor state support
2025-05-22 14:44 UTC (4+ messages)
` [PATCH v7 1/6] x86/fpu/xstate: Differentiate default features for host and guest FPUs
[PATCH v9 00/17] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
2025-05-22 13:49 UTC (9+ messages)
` [PATCH v9 10/17] KVM: x86: Compute max_mapping_level with input from guest_memfd
[PATCH v3 0/3] KVM: x86: Dynamically allocate hashed page list
2025-05-22 13:40 UTC (10+ messages)
` [PATCH v3 2/3] KVM: x86: Use kvzalloc() to allocate VM struct
[PATCH v2 0/5] KVM: s390: some cleanup and small fixes
2025-05-22 13:07 UTC (3+ messages)
` [PATCH v2 2/5] KVM: s390: remove unneeded srcu lock
[PATCH v3 0/3] KVM: s390: Use ESCA instead of BSCA at VM init
2025-05-22 10:49 UTC (5+ messages)
` [PATCH v3 1/3] KVM: s390: Set KVM_MAX_VCPUS to 256
` [PATCH v3 2/3] KVM: s390: Always allocate esca_block
` [PATCH v3 3/3] KVM: s390: Specify kvm->arch.sca as esca_block
[PATCH v9 09/17] KVM: x86/mmu: Handle guest page faults for guest_memfd with shared memory
2025-05-22 10:24 UTC (5+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox