Kernel KVM virtualization development
 help / color / mirror / Atom feed
 messages from 2025-06-10 18:03:22 to 2025-06-11 12:09:42 UTC [more...]

[PATCH v3 0/6] KVM: guest_memfd: support for uffd minor
 2025-06-11 12:09 UTC  (7+ messages)
` [PATCH v3 1/6] mm: userfaultfd: generic continue for non hugetlbfs
` [PATCH v3 4/6] KVM: guest_memfd: add support for userfaultfd minor

[kvm-unit-tests PATCH v2 00/14] x86: Add CPUID properties, clean up related code
 2025-06-11 12:02 UTC  (18+ messages)
` [kvm-unit-tests PATCH v2 01/14] x86: Encode X86_FEATURE_* definitions using a structure
` [kvm-unit-tests PATCH v2 02/14] x86: Add X86_PROPERTY_* framework to retrieve CPUID values
` [kvm-unit-tests PATCH v2 03/14] x86: Use X86_PROPERTY_MAX_VIRT_ADDR in is_canonical()
` [kvm-unit-tests PATCH v2 04/14] x86: Implement get_supported_xcr0() using X86_PROPERTY_SUPPORTED_XCR0_{LO,HI}
` [kvm-unit-tests PATCH v2 05/14] x86: Add and use X86_PROPERTY_INTEL_PT_NR_RANGES
` [kvm-unit-tests PATCH v2 06/14] x86/pmu: Mark all arch events as available on AMD, and rename fields
` [kvm-unit-tests PATCH v2 07/14] x86/pmu: Mark Intel architectural event available iff X <= CPUID.0xA.EAX[31:24]
` [kvm-unit-tests PATCH v2 08/14] x86/pmu: Use X86_PROPERTY_PMU_* macros to retrieve PMU information
` [kvm-unit-tests PATCH v2 09/14] x86/sev: Use VC_VECTOR from processor.h
` [kvm-unit-tests PATCH v2 10/14] x86/sev: Skip the AMD SEV test if SEV is unsupported/disabled
` [kvm-unit-tests PATCH v2 11/14] x86/sev: Define and use X86_FEATURE_* flags for CPUID 0x8000001F
` [kvm-unit-tests PATCH v2 12/14] x86/sev: Use X86_PROPERTY_SEV_C_BIT to get the AMD SEV C-bit location
` [kvm-unit-tests PATCH v2 13/14] x86/sev: Use amd_sev_es_enabled() to detect if SEV-ES is enabled
` [kvm-unit-tests PATCH v2 14/14] x86: Move SEV MSR definitions to msr.h

[PATCH] RISC-V: KVM: Avoid re-acquiring memslot in kvm_riscv_gstage_map()
 2025-06-11 11:29 UTC  (2+ messages)

[PATCH 0/6] Fix warning for missing export.h in Hyper-V drivers
 2025-06-11 11:12 UTC  (8+ messages)
` [PATCH 1/6] Drivers: hv: Fix warnings for missing export.h header inclusion
` [PATCH 2/6] x86/hyperv: "
` [PATCH 3/6] KVM: x86: hyper-v: "
` [PATCH 4/6] clocksource: "
` [PATCH 5/6] PCI: hv: "
` [PATCH 6/6] net: mana: "

[PATCH v9 00/43] arm64: Support for Arm CCA in KVM
 2025-06-11 10:48 UTC  (44+ messages)
` [PATCH v9 01/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v9 02/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v9 03/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v9 04/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v9 05/43] arm64: RME: Check for RME support at KVM init
` [PATCH v9 06/43] arm64: RME: Define the user ABI
` [PATCH v9 07/43] arm64: RME: ioctls to create and configure realms
` [PATCH v9 08/43] kvm: arm64: Don't expose debug capabilities for realm guests
` [PATCH v9 09/43] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v9 10/43] arm64: RME: RTT tear down
` [PATCH v9 11/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v9 12/43] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v9 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v9 14/43] KVM: arm64: Support timers in realm RECs
` [PATCH v9 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v9 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v9 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v9 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v9 19/43] arm64: RME: Allow populating initial contents
` [PATCH v9 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v9 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v9 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v9 23/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v9 24/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v9 25/43] arm64: Don't expose stolen time for realm guests
` [PATCH v9 26/43] arm64: RME: allow userspace to inject aborts
` [PATCH v9 27/43] arm64: RME: support RSI_HOST_CALL
` [PATCH v9 28/43] arm64: RME: Allow checking SVE on VM instance
` [PATCH v9 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v9 30/43] arm64: RME: Prevent Device mappings for Realms
` [PATCH v9 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v9 32/43] arm64: RME: Enable PMU support with a realm guest
` [PATCH v9 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v9 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v9 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v9 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v9 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v9 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v9 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v9 40/43] arm64: RME: Provide accurate register list
` [PATCH v9 41/43] KVM: arm64: Expose support for private memory
` [PATCH v9 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v9 43/43] KVM: arm64: Allow activating realms

[PATCH V3 2/2] KVM: selftests: Change MDSCR_EL1 register holding variables as uint64_t
 2025-06-11  9:59 UTC  (4+ messages)

[PATCH V4 0/1] KVM: TDX: Decrease TDX VM shutdown time
 2025-06-11  9:51 UTC  (2+ messages)
` [PATCH V4 1/1] KVM: TDX: Add sub-ioctl KVM_TDX_TERMINATE_VM

[PATCH v6 0/8] KVM: VMX: Preserve host's DEBUGCTL.FREEZE_IN_SMM
 2025-06-11  9:29 UTC  (12+ messages)
` [PATCH v6 1/8] KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL
` [PATCH v6 2/8] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
` [PATCH v6 3/8] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag
` [PATCH v6 4/8] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported
` [PATCH v6 5/8] KVM: VMX: Extract checking of guest's DEBUGCTL into helper
` [PATCH v6 6/8] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter
` [PATCH v6 7/8] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs
` [PATCH v6 8/8] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest

[PATCH v5 00/10] target/i386/kvm/pmu: PMU Enhancement, Bugfix and Cleanup
 2025-06-11  8:45 UTC  (3+ messages)

[Invitation] bi-weekly guest_memfd upstream call on 2025-06-12
 2025-06-11  8:01 UTC 

[RFC PATCH 00/20] TD-Preserving updates
 2025-06-11  7:45 UTC  (6+ messages)
` [RFC PATCH 05/20] x86/virt/tdx: Export tdx module attributes via sysfs

[PATCH v2 00/32] KVM: x86: Clean up MSR interception code
 2025-06-11  7:31 UTC  (44+ messages)
` [PATCH v2 01/32] KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest
` [PATCH v2 02/32] KVM: SVM: Allocate IOPM pages after initial setup in svm_hardware_setup()
` [PATCH v2 03/32] KVM: SVM: Don't BUG if setting up the MSR intercept bitmaps fails
` [PATCH v2 04/32] KVM: SVM: Tag MSR bitmap initialization helpers with __init
` [PATCH v2 05/32] KVM: SVM: Use ARRAY_SIZE() to iterate over direct_access_msrs
` [PATCH v2 06/32] KVM: SVM: Kill the VM instead of the host if MSR interception is buggy
` [PATCH v2 07/32] KVM: x86: Use non-atomic bit ops to manipulate "shadow" MSR intercepts
` [PATCH v2 08/32] KVM: SVM: Massage name and param of helper that merges vmcb01 and vmcb12 MSRPMs
` [PATCH v2 09/32] KVM: SVM: Clean up macros related to architectural MSRPM definitions
` [PATCH v2 10/32] KVM: nSVM: Use dedicated array of MSRPM offsets to merge L0 and L1 bitmaps
` [PATCH v2 11/32] KVM: nSVM: Omit SEV-ES specific passthrough MSRs from L0+L1 bitmap merge
` [PATCH v2 12/32] KVM: nSVM: Don't initialize vmcb02 MSRPM with vmcb01's "always passthrough"
` [PATCH v2 13/32] KVM: SVM: Add helpers for accessing MSR bitmap that don't rely on offsets
` [PATCH v2 14/32] KVM: SVM: Implement and adopt VMX style MSR intercepts APIs
` [PATCH v2 15/32] KVM: SVM: Pass through GHCB MSR if and only if VM is an SEV-ES guest
` [PATCH v2 16/32] KVM: SVM: Drop "always" flag from list of possible passthrough MSRs
` [PATCH v2 17/32] KVM: x86: Move definition of X2APIC_MSR() to lapic.h
` [PATCH v2 18/32] KVM: VMX: Manually recalc all MSR intercepts on userspace MSR filter change
` [PATCH v2 19/32] KVM: SVM: "
` [PATCH v2 20/32] KVM: x86: Rename msr_filter_changed() => recalc_msr_intercepts()
` [PATCH v2 21/32] KVM: SVM: Rename init_vmcb_after_set_cpuid() to make it intercepts specific
` [PATCH v2 22/32] KVM: SVM: Fold svm_vcpu_init_msrpm() into its sole caller
` [PATCH v2 23/32] KVM: SVM: Merge "after set CPUID" intercept recalc helpers
` [PATCH v2 24/32] KVM: SVM: Drop explicit check on MSRPM offset when emulating SEV-ES accesses
` [PATCH v2 25/32] KVM: SVM: Move svm_msrpm_offset() to nested.c
` [PATCH v2 26/32] KVM: SVM: Store MSRPM pointer as "void *" instead of "u32 *"
` [PATCH v2 27/32] KVM: nSVM: Access MSRPM in 4-byte chunks only for merging L0 and L1 bitmaps
` [PATCH v2 28/32] KVM: SVM: Return -EINVAL instead of MSR_INVALID to signal out-of-range MSR
` [PATCH v2 29/32] KVM: nSVM: Merge MSRPM in 64-bit chunks on 64-bit kernels
` [PATCH v2 30/32] KVM: SVM: Add a helper to allocate and initialize permissions bitmaps
` [PATCH v2 31/32] KVM: x86: Simplify userspace filter logic when disabling MSR interception
` [PATCH v2 32/32] KVM: selftests: Verify KVM disable interception (for userspace) on filter change

[PATCH v11 00/18] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
 2025-06-11  6:29 UTC  (4+ messages)
` [PATCH v11 08/18] KVM: guest_memfd: Allow host to map guest_memfd pages

[Bug 220200] New: Kernel crash with WARNING: CPU: 17 PID: 4510 at lib/refcount.c:28 refcount_warn_saturate+0xd8/0xe0
 2025-06-11  5:00 UTC  (2+ messages)
` [Bug 220200] "

[kvm-unit-tests PATCH] x86/pmu: Verify all available GP counters in check_counters_many()
 2025-06-11  7:58 UTC 

[RFC PATCH 0/4] TDX attestation support and GHCI fixup
 2025-06-11  2:37 UTC  (13+ messages)
` [RFC PATCH 3/4] KVM: TDX: Exit to userspace for GetTdVmCallInfo
` [RFC PATCH 4/4] KVM: TDX: Check KVM exit on KVM_HC_MAP_GPA_RANGE when TD finalize

[RFC PATCH 00/30] Host side (KVM/VFIO/IOMMUFD) support for TDISP using TSM
 2025-06-11  1:55 UTC  (2+ messages)

[PATCH v3 0/9] LoongArch: KVM: INTC: Enhancement about eiointc emulation
 2025-06-11  1:51 UTC  (11+ messages)
` [PATCH v3 1/9] LoongArch: KVM: INTC: Fix interrupt route update with eiointc
` [PATCH v3 2/9] LoongArch: KVM: INTC: Check interrupt route from physical cpu
` [PATCH v3 3/9] LoongArch: KVM: INTC: Disable update property num_cpu and feature
` [PATCH v3 4/9] LoongArch: KVM: INTC: Check validation of num_cpu from user space
` [PATCH v3 5/9] LoongArch: KVM: INTC: Avoid overflow with array index
` [PATCH v3 6/9] LoongArch: KVM: INTC: Use standard bitops API with eiointc
` [PATCH v3 7/9] LoongArch: KVM: INTC: Remove unused parameter len
` [PATCH v3 8/9] LoongArch: KVM: INTC: Add stat information with kernel irqchip
` [PATCH v3 9/9] LoongArch: KVM: INTC: Add address alignment check

[PATCH v4 0/3] KVM: x86: Provide a capability to disable APERF/MPERF read intercepts
 2025-06-11  1:47 UTC  (5+ messages)
` [PATCH v4 3/3] KVM: selftests: Test behavior of KVM_X86_DISABLE_EXITS_APERFMPERF

[kvm-unit-tests PATCH 00/16] x86: Add CPUID properties, clean up related code
 2025-06-11  0:41 UTC  (6+ messages)
` [kvm-unit-tests PATCH 07/16] x86/pmu: Rename pmu_gp_counter_is_available() to pmu_arch_event_is_available()

[PATCH] KVM: x86/mmu: Embed direct bits into gpa for KVM_PRE_FAULT_MEMORY
 2025-06-11  0:10 UTC 

[PATCH 0/8] KVM: Remove include/kvm, standardize includes
 2025-06-11  0:10 UTC  (9+ messages)
` [PATCH 1/8] KVM: arm64: Move arm_{psci,hypercalls}.h to an internal KVM path
` [PATCH 2/8] KVM: arm64: Include KVM headers to get forward declarations
` [PATCH 3/8] KVM: arm64: Move ARM specific headers in include/kvm to arch directory
` [PATCH 4/8] KVM: Move include/kvm/iodev.h to include/linux as kvm_iodev.h
` [PATCH 5/8] KVM: MIPS: Stop adding virt/kvm to the arch include path
` [PATCH 6/8] KVM: PPC: "
` [PATCH 7/8] KVM: s390: "
` [PATCH 8/8] KVM: Standardize include paths across all architectures

[kvm-unit-tests PATCH] x86/run: Specify "-vnc none" for QEMU if and only if QEMU supports VNC
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH] x86/pmu: Explicitly zero PERF_GLOBAL_CTRL at start of PMU test
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH] x86/pks: Actually skip the PKS test if PKS isn't support
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH] x86: ioapic: Expand routing reconfiguration => EOI interception testcase
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH] x86: Disable PIT re-injection for all tests to play nice with (x2)AVIC
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH] x86: Delete split IRQ chip variants of apic and ioapic tests
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH v2 0/8] x86/svm: Make nSVM MSR test useful
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH] runtime: Skip tests if the target "kernel" file doesn't exist
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH 0/6] x86: FEP related cleanups and fix
 2025-06-10 19:42 UTC  (2+ messages)

[kvm-unit-tests PATCH 0/2] x86: nSVM: Fix a bug with nNPT+x2AVIC
 2025-06-10 19:42 UTC  (2+ messages)

[PATCH] x86/pmu_pebs: Initalize and enable PMU interrupt (PMI_VECTOR)
 2025-06-10 19:42 UTC  (2+ messages)

[RFC PATCH v7 00/37] AMD: Add Secure AVIC Guest Support
 2025-06-10 17:54 UTC  (16+ messages)
` [RFC PATCH v7 23/37] x86/apic: Initialize APIC ID for Secure AVIC
` [RFC PATCH v7 24/37] x86/apic: Add update_vector() callback for apic drivers
` [RFC PATCH v7 25/37] x86/apic: Add update_vector() callback for Secure AVIC
` [RFC PATCH v7 26/37] x86/apic: Add support to send IPI "
` [RFC PATCH v7 27/37] x86/apic: Support LAPIC timer "
` [RFC PATCH v7 28/37] x86/sev: Initialize VGIF for secondary VCPUs "
` [RFC PATCH v7 29/37] x86/apic: Add support to send NMI IPI "
` [RFC PATCH v7 30/37] x86/apic: Allow NMI to be injected from hypervisor "
` [RFC PATCH v7 31/37] x86/sev: Enable NMI support "
` [RFC PATCH v7 32/37] x86/apic: Read and write LVT* APIC registers from HV for SAVIC guests
` [RFC PATCH v7 33/37] x86/apic: Handle EOI writes for Secure AVIC guests
` [RFC PATCH v7 34/37] x86/apic: Add kexec support for Secure AVIC
` [RFC PATCH v7 35/37] x86/apic: Enable Secure AVIC in Control MSR
` [RFC PATCH v7 36/37] x86/sev: Prevent SECURE_AVIC_CONTROL MSR interception for Secure AVIC guests
` [RFC PATCH v7 37/37] x86/sev: Indicate SEV-SNP guest supports Secure AVIC


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox