messages from 2025-06-10 06:52:43 to 2025-06-11 10:49:11 UTC [more...]
[PATCH v9 00/43] arm64: Support for Arm CCA in KVM
2025-06-11 10:47 UTC (3+ messages)
` [PATCH v9 01/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v9 02/43] arm64: RME: Handle Granule Protection Faults (GPFs)
[PATCH] RISC-V: KVM: Avoid re-acquiring memslot in kvm_riscv_gstage_map()
2025-06-11 9:51 UTC
[PATCH 0/6] Fix warning for missing export.h in Hyper-V drivers
2025-06-11 10:04 UTC (7+ messages)
` [PATCH 1/6] Drivers: hv: Fix warnings for missing export.h header inclusion
` [PATCH 2/6] x86/hyperv: "
` [PATCH 3/6] KVM: x86: hyper-v: "
` [PATCH 4/6] clocksource: "
` [PATCH 5/6] PCI: hv: "
` [PATCH 6/6] net: mana: "
[PATCH V3 2/2] KVM: selftests: Change MDSCR_EL1 register holding variables as uint64_t
2025-06-11 9:59 UTC (4+ messages)
[PATCH V4 0/1] KVM: TDX: Decrease TDX VM shutdown time
2025-06-11 9:51 UTC (2+ messages)
` [PATCH V4 1/1] KVM: TDX: Add sub-ioctl KVM_TDX_TERMINATE_VM
[PATCH v6 0/8] KVM: VMX: Preserve host's DEBUGCTL.FREEZE_IN_SMM
2025-06-11 9:29 UTC (12+ messages)
` [PATCH v6 1/8] KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL
` [PATCH v6 2/8] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
` [PATCH v6 3/8] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag
` [PATCH v6 4/8] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported
` [PATCH v6 5/8] KVM: VMX: Extract checking of guest's DEBUGCTL into helper
` [PATCH v6 6/8] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter
` [PATCH v6 7/8] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs
` [PATCH v6 8/8] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest
[PATCH v5 00/10] target/i386/kvm/pmu: PMU Enhancement, Bugfix and Cleanup
2025-06-11 8:45 UTC (3+ messages)
[Invitation] bi-weekly guest_memfd upstream call on 2025-06-12
2025-06-11 8:01 UTC
[RFC PATCH 00/20] TD-Preserving updates
2025-06-11 7:45 UTC (13+ messages)
` [RFC PATCH 03/20] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [RFC PATCH 05/20] x86/virt/tdx: Export tdx module attributes via sysfs
[PATCH v2 00/32] KVM: x86: Clean up MSR interception code
2025-06-11 7:31 UTC (44+ messages)
` [PATCH v2 01/32] KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest
` [PATCH v2 02/32] KVM: SVM: Allocate IOPM pages after initial setup in svm_hardware_setup()
` [PATCH v2 03/32] KVM: SVM: Don't BUG if setting up the MSR intercept bitmaps fails
` [PATCH v2 04/32] KVM: SVM: Tag MSR bitmap initialization helpers with __init
` [PATCH v2 05/32] KVM: SVM: Use ARRAY_SIZE() to iterate over direct_access_msrs
` [PATCH v2 06/32] KVM: SVM: Kill the VM instead of the host if MSR interception is buggy
` [PATCH v2 07/32] KVM: x86: Use non-atomic bit ops to manipulate "shadow" MSR intercepts
` [PATCH v2 08/32] KVM: SVM: Massage name and param of helper that merges vmcb01 and vmcb12 MSRPMs
` [PATCH v2 09/32] KVM: SVM: Clean up macros related to architectural MSRPM definitions
` [PATCH v2 10/32] KVM: nSVM: Use dedicated array of MSRPM offsets to merge L0 and L1 bitmaps
` [PATCH v2 11/32] KVM: nSVM: Omit SEV-ES specific passthrough MSRs from L0+L1 bitmap merge
` [PATCH v2 12/32] KVM: nSVM: Don't initialize vmcb02 MSRPM with vmcb01's "always passthrough"
` [PATCH v2 13/32] KVM: SVM: Add helpers for accessing MSR bitmap that don't rely on offsets
` [PATCH v2 14/32] KVM: SVM: Implement and adopt VMX style MSR intercepts APIs
` [PATCH v2 15/32] KVM: SVM: Pass through GHCB MSR if and only if VM is an SEV-ES guest
` [PATCH v2 16/32] KVM: SVM: Drop "always" flag from list of possible passthrough MSRs
` [PATCH v2 17/32] KVM: x86: Move definition of X2APIC_MSR() to lapic.h
` [PATCH v2 18/32] KVM: VMX: Manually recalc all MSR intercepts on userspace MSR filter change
` [PATCH v2 19/32] KVM: SVM: "
` [PATCH v2 20/32] KVM: x86: Rename msr_filter_changed() => recalc_msr_intercepts()
` [PATCH v2 21/32] KVM: SVM: Rename init_vmcb_after_set_cpuid() to make it intercepts specific
` [PATCH v2 22/32] KVM: SVM: Fold svm_vcpu_init_msrpm() into its sole caller
` [PATCH v2 23/32] KVM: SVM: Merge "after set CPUID" intercept recalc helpers
` [PATCH v2 24/32] KVM: SVM: Drop explicit check on MSRPM offset when emulating SEV-ES accesses
` [PATCH v2 25/32] KVM: SVM: Move svm_msrpm_offset() to nested.c
` [PATCH v2 26/32] KVM: SVM: Store MSRPM pointer as "void *" instead of "u32 *"
` [PATCH v2 27/32] KVM: nSVM: Access MSRPM in 4-byte chunks only for merging L0 and L1 bitmaps
` [PATCH v2 28/32] KVM: SVM: Return -EINVAL instead of MSR_INVALID to signal out-of-range MSR
` [PATCH v2 29/32] KVM: nSVM: Merge MSRPM in 64-bit chunks on 64-bit kernels
` [PATCH v2 30/32] KVM: SVM: Add a helper to allocate and initialize permissions bitmaps
` [PATCH v2 31/32] KVM: x86: Simplify userspace filter logic when disabling MSR interception
` [PATCH v2 32/32] KVM: selftests: Verify KVM disable interception (for userspace) on filter change
[PATCH v11 00/18] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
2025-06-11 6:29 UTC (4+ messages)
` [PATCH v11 08/18] KVM: guest_memfd: Allow host to map guest_memfd pages
[Bug 220200] New: Kernel crash with WARNING: CPU: 17 PID: 4510 at lib/refcount.c:28 refcount_warn_saturate+0xd8/0xe0
2025-06-11 5:00 UTC (2+ messages)
` [Bug 220200] "
[kvm-unit-tests PATCH] x86/pmu: Verify all available GP counters in check_counters_many()
2025-06-11 7:58 UTC
[RFC PATCH 0/4] TDX attestation support and GHCI fixup
2025-06-11 2:37 UTC (13+ messages)
` [RFC PATCH 3/4] KVM: TDX: Exit to userspace for GetTdVmCallInfo
` [RFC PATCH 4/4] KVM: TDX: Check KVM exit on KVM_HC_MAP_GPA_RANGE when TD finalize
[RFC PATCH 00/30] Host side (KVM/VFIO/IOMMUFD) support for TDISP using TSM
2025-06-11 1:55 UTC (2+ messages)
[PATCH v3 0/9] LoongArch: KVM: INTC: Enhancement about eiointc emulation
2025-06-11 1:51 UTC (11+ messages)
` [PATCH v3 1/9] LoongArch: KVM: INTC: Fix interrupt route update with eiointc
` [PATCH v3 2/9] LoongArch: KVM: INTC: Check interrupt route from physical cpu
` [PATCH v3 3/9] LoongArch: KVM: INTC: Disable update property num_cpu and feature
` [PATCH v3 4/9] LoongArch: KVM: INTC: Check validation of num_cpu from user space
` [PATCH v3 5/9] LoongArch: KVM: INTC: Avoid overflow with array index
` [PATCH v3 6/9] LoongArch: KVM: INTC: Use standard bitops API with eiointc
` [PATCH v3 7/9] LoongArch: KVM: INTC: Remove unused parameter len
` [PATCH v3 8/9] LoongArch: KVM: INTC: Add stat information with kernel irqchip
` [PATCH v3 9/9] LoongArch: KVM: INTC: Add address alignment check
[PATCH v4 0/3] KVM: x86: Provide a capability to disable APERF/MPERF read intercepts
2025-06-11 1:47 UTC (5+ messages)
` [PATCH v4 3/3] KVM: selftests: Test behavior of KVM_X86_DISABLE_EXITS_APERFMPERF
[kvm-unit-tests PATCH v2 00/14] x86: Add CPUID properties, clean up related code
2025-06-11 1:35 UTC (17+ messages)
` [kvm-unit-tests PATCH v2 01/14] x86: Encode X86_FEATURE_* definitions using a structure
` [kvm-unit-tests PATCH v2 02/14] x86: Add X86_PROPERTY_* framework to retrieve CPUID values
` [kvm-unit-tests PATCH v2 03/14] x86: Use X86_PROPERTY_MAX_VIRT_ADDR in is_canonical()
` [kvm-unit-tests PATCH v2 04/14] x86: Implement get_supported_xcr0() using X86_PROPERTY_SUPPORTED_XCR0_{LO,HI}
` [kvm-unit-tests PATCH v2 05/14] x86: Add and use X86_PROPERTY_INTEL_PT_NR_RANGES
` [kvm-unit-tests PATCH v2 06/14] x86/pmu: Mark all arch events as available on AMD, and rename fields
` [kvm-unit-tests PATCH v2 07/14] x86/pmu: Mark Intel architectural event available iff X <= CPUID.0xA.EAX[31:24]
` [kvm-unit-tests PATCH v2 08/14] x86/pmu: Use X86_PROPERTY_PMU_* macros to retrieve PMU information
` [kvm-unit-tests PATCH v2 09/14] x86/sev: Use VC_VECTOR from processor.h
` [kvm-unit-tests PATCH v2 10/14] x86/sev: Skip the AMD SEV test if SEV is unsupported/disabled
` [kvm-unit-tests PATCH v2 11/14] x86/sev: Define and use X86_FEATURE_* flags for CPUID 0x8000001F
` [kvm-unit-tests PATCH v2 12/14] x86/sev: Use X86_PROPERTY_SEV_C_BIT to get the AMD SEV C-bit location
` [kvm-unit-tests PATCH v2 13/14] x86/sev: Use amd_sev_es_enabled() to detect if SEV-ES is enabled
` [kvm-unit-tests PATCH v2 14/14] x86: Move SEV MSR definitions to msr.h
[kvm-unit-tests PATCH 00/16] x86: Add CPUID properties, clean up related code
2025-06-11 0:41 UTC (15+ messages)
` [kvm-unit-tests PATCH 02/16] x86: Encode X86_FEATURE_* definitions using a structure
` [kvm-unit-tests PATCH 07/16] x86/pmu: Rename pmu_gp_counter_is_available() to pmu_arch_event_is_available()
` [kvm-unit-tests PATCH 08/16] x86/pmu: Rename gp_counter_mask_length to arch_event_mask_length
` [kvm-unit-tests PATCH 10/16] x86/pmu: Use X86_PROPERTY_PMU_* macros to retrieve PMU information
` [kvm-unit-tests PATCH 11/16] x86/sev: Use VC_VECTOR from processor.h
[PATCH] KVM: x86/mmu: Embed direct bits into gpa for KVM_PRE_FAULT_MEMORY
2025-06-11 0:10 UTC
[PATCH 0/8] KVM: Remove include/kvm, standardize includes
2025-06-11 0:10 UTC (9+ messages)
` [PATCH 1/8] KVM: arm64: Move arm_{psci,hypercalls}.h to an internal KVM path
` [PATCH 2/8] KVM: arm64: Include KVM headers to get forward declarations
` [PATCH 3/8] KVM: arm64: Move ARM specific headers in include/kvm to arch directory
` [PATCH 4/8] KVM: Move include/kvm/iodev.h to include/linux as kvm_iodev.h
` [PATCH 5/8] KVM: MIPS: Stop adding virt/kvm to the arch include path
` [PATCH 6/8] KVM: PPC: "
` [PATCH 7/8] KVM: s390: "
` [PATCH 8/8] KVM: Standardize include paths across all architectures
[PATCH v3 0/6] KVM: guest_memfd: support for uffd minor
2025-06-10 22:25 UTC (5+ messages)
` [PATCH v3 1/6] mm: userfaultfd: generic continue for non hugetlbfs
` [PATCH v3 4/6] KVM: guest_memfd: add support for userfaultfd minor
[kvm-unit-tests PATCH] x86/run: Specify "-vnc none" for QEMU if and only if QEMU supports VNC
2025-06-10 19:42 UTC (2+ messages)
[kvm-unit-tests PATCH] x86/pmu: Explicitly zero PERF_GLOBAL_CTRL at start of PMU test
2025-06-10 19:42 UTC (3+ messages)
[kvm-unit-tests PATCH] x86/pks: Actually skip the PKS test if PKS isn't support
2025-06-10 19:42 UTC (2+ messages)
[kvm-unit-tests PATCH] x86: ioapic: Expand routing reconfiguration => EOI interception testcase
2025-06-10 19:42 UTC (2+ messages)
[kvm-unit-tests PATCH] x86: Disable PIT re-injection for all tests to play nice with (x2)AVIC
2025-06-10 19:42 UTC (2+ messages)
[kvm-unit-tests PATCH] x86: Delete split IRQ chip variants of apic and ioapic tests
2025-06-10 19:42 UTC (2+ messages)
[kvm-unit-tests PATCH v2 0/8] x86/svm: Make nSVM MSR test useful
2025-06-10 19:42 UTC (2+ messages)
[kvm-unit-tests PATCH] runtime: Skip tests if the target "kernel" file doesn't exist
2025-06-10 19:42 UTC (2+ messages)
[kvm-unit-tests PATCH 0/6] x86: FEP related cleanups and fix
2025-06-10 19:42 UTC (2+ messages)
[kvm-unit-tests PATCH 0/2] x86: nSVM: Fix a bug with nNPT+x2AVIC
2025-06-10 19:42 UTC (2+ messages)
[PATCH] x86/pmu_pebs: Initalize and enable PMU interrupt (PMI_VECTOR)
2025-06-10 19:42 UTC (2+ messages)
[RFC PATCH v7 00/37] AMD: Add Secure AVIC Guest Support
2025-06-10 17:54 UTC (38+ messages)
` [RFC PATCH v7 01/37] KVM: lapic: Remove __apic_test_and_{set|clear}_vector()
` [RFC PATCH v7 02/37] KVM: lapic: Remove redundant parentheses around 'bitmap'
` [RFC PATCH v7 03/37] x86/apic: KVM: Deduplicate APIC vector => register+bit math
` [RFC PATCH v7 04/37] KVM: lapic: Rename VEC_POS/REG_POS macro usages
` [RFC PATCH v7 05/37] KVM: lapic: Change lapic regs base address to void pointer
` [RFC PATCH v7 06/37] KVM: lapic: Rename find_highest_vector()
` [RFC PATCH v7 07/37] KVM: lapic: Rename lapic get/set_reg() helpers
` [RFC PATCH v7 08/37] KVM: lapic: Rename lapic get/set_reg64() helpers
` [RFC PATCH v7 09/37] KVM: lapic: Rename lapic set/clear vector helpers
` [RFC PATCH v7 10/37] KVM: lapic: Mark apic_find_highest_vector() inline
` [RFC PATCH v7 11/37] x86/apic: KVM: Move apic_find_highest_vector() to a common header
` [RFC PATCH v7 12/37] x86/apic: KVM: Move lapic get/set_reg() helpers to common code
` [RFC PATCH v7 13/37] KVM: x86: Move lapic get/set_reg64() "
` [RFC PATCH v7 14/37] KVM: x86: Move lapic set/clear_vector() "
` [RFC PATCH v7 15/37] KVM: x86: apic_test_vector() "
` [RFC PATCH v7 16/37] x86/apic: Rename 'reg_off' to 'reg'
` [RFC PATCH v7 17/37] x86/apic: Unionize apic regs for 32bit/64bit access w/o type casting
` [RFC PATCH v7 18/37] x86/apic: Simplify bitwise operations on apic bitmap
` [RFC PATCH v7 19/37] x86/apic: Move apic_update_irq_cfg() calls to apic_update_vector()
` [RFC PATCH v7 20/37] x86/apic: Add new driver for Secure AVIC
` [RFC PATCH v7 21/37] x86/apic: Initialize Secure AVIC APIC backing page
` [RFC PATCH v7 22/37] x86/apic: Populate .read()/.write() callbacks of Secure AVIC driver
` [RFC PATCH v7 23/37] x86/apic: Initialize APIC ID for Secure AVIC
` [RFC PATCH v7 24/37] x86/apic: Add update_vector() callback for apic drivers
` [RFC PATCH v7 25/37] x86/apic: Add update_vector() callback for Secure AVIC
` [RFC PATCH v7 26/37] x86/apic: Add support to send IPI "
` [RFC PATCH v7 27/37] x86/apic: Support LAPIC timer "
` [RFC PATCH v7 28/37] x86/sev: Initialize VGIF for secondary VCPUs "
` [RFC PATCH v7 29/37] x86/apic: Add support to send NMI IPI "
` [RFC PATCH v7 30/37] x86/apic: Allow NMI to be injected from hypervisor "
` [RFC PATCH v7 31/37] x86/sev: Enable NMI support "
` [RFC PATCH v7 32/37] x86/apic: Read and write LVT* APIC registers from HV for SAVIC guests
` [RFC PATCH v7 33/37] x86/apic: Handle EOI writes for Secure AVIC guests
` [RFC PATCH v7 34/37] x86/apic: Add kexec support for Secure AVIC
` [RFC PATCH v7 35/37] x86/apic: Enable Secure AVIC in Control MSR
` [RFC PATCH v7 36/37] x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
` [RFC PATCH v7 37/37] x86/sev: Indicate SEV-SNP guest supports Secure AVIC
[PATCH] RISC-V: KVM: lock the correct mp_state during reset
2025-06-10 16:28 UTC (2+ messages)
[PATCH v5 0/6] KVM: lockdep improvements
2025-06-10 16:28 UTC (2+ messages)
[PATCH v5 00/20] AMD: Add Secure AVIC Guest Support
2025-06-10 16:12 UTC (5+ messages)
` [PATCH v5 01/20] KVM: x86: Move find_highest_vector() to a common header
[PATCHv2 04/12] x86/virt/tdx: Add tdx_alloc/free_page() helpers
2025-06-10 14:51 UTC (2+ messages)
` [PATCHv2.1 "
[PATCH kvmtool v3 0/3] cpu: vmexit: KVM_RUN ioctl error handling fixes
2025-06-10 8:01 UTC (2+ messages)
[PATCH v4] riscv: sbi: Add SBI Debug Triggers Extension tests
2025-06-10 8:32 UTC (2+ messages)
[RFC PATCH 00/12] Private MMIO support for private assigned dev
2025-06-10 6:53 UTC (11+ messages)
[RFC PATCH v6 00/32] AMD: Add Secure AVIC Guest Support
2025-06-10 6:52 UTC (3+ messages)
` [RFC PATCH v6 15/32] x86/apic: Add new driver for Secure AVIC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox