public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-09-19 07:38:32 to 2025-09-20 20:38:57 UTC [more...]

[RFC PATCH v2 00/18] iommu/riscv: Add irqbypass support
 2025-09-20 20:38 UTC  (4+ messages)
` [RFC PATCH v2 01/18] genirq/msi: Provide DOMAIN_BUS_MSI_REMAP
` [RFC PATCH v2 02/18] iommu/riscv: Move struct riscv_iommu_domain and info to iommu.h
` [RFC PATCH v2 03/18] iommu/riscv: Use data structure instead of individual values

[PATCH 0/2] KVM: arm64: selftests: Cover ID_AA64ISAR3_EL1 in set_id_regs
 2025-09-20 19:52 UTC  (3+ messages)
` [PATCH 1/2] KVM: arm64: selftests: Remove a duplicate register listing "
` [PATCH 2/2] KVM: arm64: selftests: Cover ID_AA64ISAR3_EL1 "

[PATCH] vfio/pci: Fix INTx handling on legacy DisINTx- PCI devices
 2025-09-20 19:25 UTC  (5+ messages)

[PATCH v2] KVM: SEV: Reject non-positive effective lengths during LAUNCH_UPDATE
 2025-09-20 17:21 UTC  (2+ messages)

[PATCH v3 0/8] riscv: Add Zalasr ISA extension support
 2025-09-20 14:52 UTC  (10+ messages)
` [PATCH v3 6/8] riscv: Apply acquire/release semantics to arch_xchg/arch_cmpxchg operations
` [PATCH v3 7/8] RISC-V: KVM: Allow Zalasr extensions for Guest/VM
` [PATCH v3 8/8] KVM: riscv: selftests: Add Zalasr extensions to get-reg-list test
  ` [External] Re: [PATCH v3 0/8] riscv: Add Zalasr ISA extension support

[mst-vhost:vhost 41/44] drivers/vdpa/pds/vdpa_dev.c:590:19: error: incompatible function pointer types initializing 's64 (*)(struct vdpa_device *, u16)' (aka 'long long (*)(struct vdpa_device *, unsigned short)') with an expression of type 'u32 (struct vdpa_device *, u16)' (aka 
 2025-09-20 14:41 UTC 

[PATCH v6 00/23] WHPX support for Arm
 2025-09-20 14:01 UTC  (24+ messages)
` [PATCH v6 01/23] target/arm/kvm: add constants for new PSCI versions
` [PATCH v6 02/23] accel/system: Introduce hwaccel_enabled() helper
` [PATCH v6 03/23] hw/arm: virt: add GICv2m for the case when ITS is not available
` [PATCH v6 04/23] tests: data: update AArch64 ACPI tables
` [PATCH v6 05/23] whpx: Move around files before introducing AArch64 support
` [PATCH v6 06/23] whpx: reshuffle common code
` [PATCH v6 07/23] whpx: ifdef out winhvemulation on non-x86_64
` [PATCH v6 08/23] whpx: common: add WHPX_INTERCEPT_DEBUG_TRAPS define
` [PATCH v6 09/23] hw, target, accel: whpx: change apic_in_platform to kernel_irqchip
` [PATCH v6 10/23] whpx: interrupt controller support
` [PATCH v6 11/23] whpx: add arm64 support
` [PATCH v6 12/23] whpx: copy over memory management logic from hvf
` [PATCH v6 13/23] target/arm: cpu: mark WHPX as supporting PSCI 1.3
` [PATCH v6 14/23] hw/arm: virt: cleanly fail on attempt to use the platform vGIC together with ITS
` [PATCH v6 15/23] whpx: arm64: clamp down IPA size
` [PATCH v6 16/23] hw/arm, accel/hvf, whpx: unify get_physical_address_range between WHPX and HVF
` [PATCH v6 17/23] whpx: arm64: implement -cpu host
` [PATCH v6 18/23] target/arm: whpx: instantiate GIC early
` [PATCH v6 19/23] whpx: arm64: gicv3: add migration blocker
` [PATCH v6 20/23] whpx: enable arm64 builds
` [PATCH v6 21/23] MAINTAINERS: update maintainers for WHPX
` [PATCH v6 22/23] docs: arm: update virt machine model description
` [PATCH v6 23/23] whpx: apic: use non-deprecated APIs to control interrupt controller state

[PATCH v2 00/16] KVM: arm64: TTW reporting on SEA and 52bit PA in S1 PTW
 2025-09-20  9:27 UTC  (14+ messages)
` [PATCH v2 06/16] KVM: arm64: Compute shareability for LPA2
` [PATCH v2 07/16] KVM: arm64: Populate PAR_EL1 with 52bit addresses
` [PATCH v2 10/16] KVM: arm64: Allow use of S1 PTW for non-NV vcpus
` [PATCH v2 14/16] KVM: arm64: Add S1 IPA to page table level walker
` [PATCH v2 16/16] KVM: arm64: selftest: Expand external_aborts test to look for TTW levels

[PATCH 1/2] KVM: x86: Add helper to retrieve cached value of user return MSR
 2025-09-20  6:52 UTC  (9+ messages)
` [PATCH 2/2] KVM: SVM: Use cached value as restore value of TSC_AUX for SEV-ES guest

[PATCH v4 0/5] KVM: selftests: PMU fixes for GNR/SRF/CWF
 2025-09-20  0:50 UTC  (9+ messages)
` [PATCH v4 1/5] KVM: selftests: Add timing_info bit support in vmx_pmu_caps_test
` [PATCH v4 2/5] KVM: selftests: Track unavailable_mask for PMU events as 32-bit value
` [PATCH v4 3/5] KVM: selftests: Reduce number of "unavailable PMU events" combos tested
` [PATCH v4 4/5] KVM: selftests: Validate more arch-events in pmu_counters_test
` [PATCH v4 5/5] KVM: selftests: Handle Intel Atom errata that leads to PMU event overcount

[PATCH v15 00/41] KVM: x86: Mega-CET
 2025-09-19 22:57 UTC  (17+ messages)
` [PATCH v15 13/41] KVM: x86: Enable guest SSP read/write interface with new uAPIs
` [PATCH v15 14/41] KVM: VMX: Emulate read and write to CET MSRs
` [PATCH v15 19/41] KVM: x86: Enable CET virtualization for VMX and advertise to userspace

[PATCH v16 00/51] KVM: x86: Super Mega CET
 2025-09-19 22:32 UTC  (52+ messages)
` [PATCH v16 01/51] KVM: SEV: Rename kvm_ghcb_get_sw_exit_code() to kvm_get_cached_sw_exit_code()
` [PATCH v16 02/51] KVM: SEV: Read save fields from GHCB exactly once
` [PATCH v16 03/51] KVM: SEV: Validate XCR0 provided by guest in GHCB
` [PATCH v16 04/51] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
` [PATCH v16 05/51] KVM: x86: Report XSS as to-be-saved if there are supported features
` [PATCH v16 06/51] KVM: x86: Check XSS validity against guest CPUIDs
` [PATCH v16 07/51] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
` [PATCH v16 08/51] KVM: x86: Initialize kvm_caps.supported_xss
` [PATCH v16 09/51] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
` [PATCH v16 10/51] KVM: x86: Add fault checks for guest CR4.CET setting
` [PATCH v16 11/51] KVM: x86: Report KVM supported CET MSRs as to-be-saved
` [PATCH v16 12/51] KVM: VMX: Introduce CET VMCS fields and control bits
` [PATCH v16 13/51] KVM: x86: Enable guest SSP read/write interface with new uAPIs
` [PATCH v16 14/51] KVM: VMX: Emulate read and write to CET MSRs
` [PATCH v16 15/51] KVM: x86: Save and reload SSP to/from SMRAM
` [PATCH v16 16/51] KVM: VMX: Set up interception for CET MSRs
` [PATCH v16 17/51] KVM: VMX: Set host constant supervisor states to VMCS fields
` [PATCH v16 18/51] KVM: x86: Don't emulate instructions affected by CET features
` [PATCH v16 19/51] KVM: x86: Don't emulate task switches when IBT or SHSTK is enabled
` [PATCH v16 20/51] KVM: x86: Emulate SSP[63:32]!=0 #GP(0) for FAR JMP to 32-bit mode
` [PATCH v16 21/51] KVM: x86/mmu: WARN on attempt to check permissions for Shadow Stack #PF
` [PATCH v16 22/51] KVM: x86/mmu: Pretty print PK, SS, and SGX flags in MMU tracepoints
` [PATCH v16 23/51] KVM: x86: Allow setting CR4.CET if IBT or SHSTK is supported
` [PATCH v16 24/51] KVM: nVMX: Always forward XSAVES/XRSTORS exits from L2 to L1
` [PATCH v16 25/51] KVM: x86: Add XSS support for CET_KERNEL and CET_USER
` [PATCH v16 26/51] KVM: x86: Disable support for Shadow Stacks if TDP is disabled
` [PATCH v16 27/51] KVM: x86: Disable support for IBT and SHSTK if allow_smaller_maxphyaddr is true
` [PATCH v16 28/51] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
` [PATCH v16 29/51] KVM: VMX: Configure nested capabilities after CPU capabilities
` [PATCH v16 30/51] KVM: nVMX: Virtualize NO_HW_ERROR_CODE_CC for L1 event injection to L2
` [PATCH v16 31/51] KVM: nVMX: Prepare for enabling CET support for nested guest
` [PATCH v16 32/51] KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET
` [PATCH v16 33/51] KVM: nVMX: Add consistency checks for CET states
` [PATCH v16 34/51] KVM: nVMX: Advertise new VM-Entry/Exit control bits for CET state
` [PATCH v16 35/51] KVM: SVM: Emulate reads and writes to shadow stack MSRs
` [PATCH v16 36/51] KVM: nSVM: Save/load CET Shadow Stack state to/from vmcb12/vmcb02
` [PATCH v16 37/51] KVM: SVM: Update dump_vmcb with shadow stack save area additions
` [PATCH v16 38/51] KVM: SVM: Pass through shadow stack MSRs as appropriate
` [PATCH v16 39/51] KVM: SEV: Synchronize MSR_IA32_XSS from the GHCB when it's valid
` [PATCH v16 40/51] KVM: SVM: Enable shadow stack virtualization for SVM
` [PATCH v16 41/51] KVM: x86: Add human friendly formatting for #XM, and #VE
` [PATCH v16 42/51] KVM: x86: Define Control Protection Exception (#CP) vector
` [PATCH v16 43/51] KVM: x86: Define AMD's #HV, #VC, and #SX exception vectors
` [PATCH v16 44/51] KVM: selftests: Add ex_str() to print human friendly name of "
` [PATCH v16 45/51] KVM: selftests: Add an MSR test to exercise guest/host and read/write
` [PATCH v16 46/51] KVM: selftests: Add support for MSR_IA32_{S,U}_CET to MSRs test
` [PATCH v16 47/51] KVM: selftests: Extend MSRs test to validate vCPUs without supported features
` [PATCH v16 48/51] KVM: selftests: Add KVM_{G,S}ET_ONE_REG coverage to MSRs test
` [PATCH v16 49/51] KVM: selftests: Add coverate for KVM-defined registers in "
` [PATCH v16 50/51] KVM: selftests: Verify MSRs are (not) in save/restore list when (un)supported
` [PATCH v16 51/51] KVM: VMX: Make CR4.CET a guest owned bit

[Discussion] x86: Guest Support for APX
 2025-09-19 22:13 UTC  (2+ messages)

[PATCH 0/8] target/i386: SEV: Add support for enabling VMSA SEV features
 2025-09-19 22:06 UTC  (16+ messages)
` [PATCH 1/8] target/i386: SEV: Generalize handling of SVM_SEV_FEAT_SNP_ACTIVE
` [PATCH 2/8] target/i386: SEV: Ensure SEV features are only set through qemu cli or IGVM
` [PATCH 3/8] target/i386: SEV: Consolidate SEV feature validation to common init path
` [PATCH 5/8] target/i386: SEV: Add support for enabling debug-swap SEV feature
` [PATCH 6/8] target/i386: SEV: Enable use of KVM_SEV_INIT2 for SEV-ES guests
` [PATCH 7/8] target/i386: SEV: Add support for enabling Secure TSC SEV feature
` [PATCH 8/8] target/i386: SEV: Add support for setting TSC frequency for Secure TSC

[PATCH v4 0/7] KVM: SVM: Enable AVIC for Zen4+ (if x2AVIC)
 2025-09-19 21:59 UTC  (8+ messages)
` [PATCH v4 1/7] KVM: SVM: Make svm_x86_ops globally visible, clean up on-HyperV usage
` [PATCH v4 2/7] KVM: SVM: Move x2AVIC MSR interception helper to avic.c
` [PATCH v4 3/7] KVM: SVM: Update "APICv in x2APIC without x2AVIC" in avic.c, not svm.c
` [PATCH v4 4/7] KVM: SVM: Always print "AVIC enabled" separately, even when force enabled
` [PATCH v4 5/7] KVM: SVM: Don't advise the user to do force_avic=y (when x2AVIC is detected)
` [PATCH v4 6/7] KVM: SVM: Move global "avic" variable to avic.c
` [PATCH v4 7/7] KVM: SVM: Enable AVIC by default for Zen4+ if x2AVIC is support

[PATCH v3 0/6] KVM: SVM: Enable AVIC for Zen4+ (if x2AVIC)
 2025-09-19 21:56 UTC  (18+ messages)
` [PATCH v3 1/6] KVM: SVM: Move x2AVIC MSR interception helper to avic.c
` [PATCH v3 2/6] KVM: SVM: Update "APICv in x2APIC without x2AVIC" in avic.c, not svm.c
` [PATCH v3 3/6] KVM: SVM: Always print "AVIC enabled" separately, even when force enabled
` [PATCH v3 4/6] KVM: SVM: Don't advise the user to do force_avic=y (when x2AVIC is detected)
` [PATCH v3 5/6] KVM: SVM: Move global "avic" variable to avic.c
` [PATCH v3 6/6] KVM: SVM: Enable AVIC by default for Zen4+ if x2AVIC is support

[PATCH] KVM: x86: Drop "cache" from user return MSR setter that skips WRMSR
 2025-09-19 21:42 UTC 

[PATCH v2 0/2] KVM: SVM: Fix a bug where TSC_AUX can get clobbered
 2025-09-19 21:38 UTC  (3+ messages)
` [PATCH v2 1/2] KVM: x86: Add helper to retrieve current value of user return MSR
` [PATCH v2 2/2] KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest

[PATCH v2 0/3] vhost_task: Fix a bug where KVM wakes an exited task
 2025-09-19 21:15 UTC  (7+ messages)
        ` [PATCH] vhost: Take a reference on the task that is reference in struct vhost_task

[PATCH v9 00/10] x86,fs/resctrl: Support L3 Smart Data Cache Injection Allocation Enforcement (SDCIAE)
 2025-09-19 21:05 UTC  (31+ messages)
` [PATCH v9 01/10] x86/cpufeatures: Add support for L3 Smart Data Cache Injection Allocation Enforcement
` [PATCH v9 02/10] x86/resctrl: Add SDCIAE feature in the command line options
` [PATCH v9 03/10] x86,fs/resctrl: Detect io_alloc feature
` [PATCH v9 04/10] x86,fs/resctrl: Implement "io_alloc" enable/disable handlers
` [PATCH v9 05/10] fs/resctrl: Introduce interface to display "io_alloc" support
` [PATCH v9 06/10] fs/resctrl: Add user interface to enable/disable io_alloc feature
` [PATCH v9 07/10] fs/resctrl: Introduce interface to display io_alloc CBMs
` [PATCH v9 08/10] fs/resctrl: Modify rdt_parse_data to pass mode and CLOSID
` [PATCH v9 09/10] fs/resctrl: Introduce interface to modify io_alloc Capacity Bit Masks
` [PATCH v9 10/10] fs/resctrl: Update bit_usage to reflect io_alloc

[PATCH v15 29/41] KVM: SEV: Synchronize MSR_IA32_XSS from the GHCB when it's valid
 2025-09-19 20:58 UTC  (15+ messages)

[PATCH v3 00/16] TDX: Enable Dynamic PAMT
 2025-09-19 19:26 UTC  (10+ messages)
` [PATCH v3 03/16] x86/virt/tdx: Simplify tdmr_get_pamt_sz()
` [PATCH v3 08/16] x86/virt/tdx: Optimize tdx_alloc/free_page() helpers
` [PATCH v3 11/16] KVM: TDX: Add x86 ops for external spt cache
` [PATCH v3 12/16] x86/virt/tdx: Add helpers to allow for pre-allocating pages

[RFC PATCH v2 0/4] SEV-SNP guest policy bit support updates
 2025-09-19 19:00 UTC  (5+ messages)
` [RFC PATCH v2 1/4] KVM: SEV: Publish supported SEV-SNP policy bits
` [RFC PATCH v2 2/4] KVM: SEV: Consolidate the SEV policy bits in a single header file
` [RFC PATCH v2 3/4] crypto: ccp - Add an API to return the supported SEV-SNP policy bits
` [RFC PATCH v2 4/4] KVM: SEV: Add known "

[PATCH v3 01/10] PCI: Avoid saving error values for config space
 2025-09-19 18:17 UTC  (3+ messages)

[TECH TOPIC] vfio, iommufd: Enabling user space drivers to vend more granular access to client processes
 2025-09-19 17:14 UTC  (9+ messages)

[PATCH v3 0/5] KVM: selftests: PMU fixes for GNR/SRF/CWF
 2025-09-19 16:42 UTC  (8+ messages)
` [PATCH v3 2/5] KVM: selftests: Track unavailable_mask for PMU events as 32-bit value
` [PATCH v3 5/5] KVM: selftests: Handle Intel Atom errata that leads to PMU event overcount

[PATCH] KVM: x86: Don't treat ENTER and LEAVE as branches, because they aren't
 2025-09-19 16:22 UTC  (2+ messages)

[PATCH v8 00/29] KVM: arm64: Implement support for SME
 2025-09-19 15:53 UTC  (4+ messages)
` [PATCH v8 06/29] KVM: arm64: Introduce non-UNDEF FGT control

[PATCH v6 05/11] KVM: guest_memfd: Add flag to remove from direct map
 2025-09-19  8:44 UTC  (2+ messages)

[RESEND v4 0/7] KVM: SVM: Add support for 4k vCPUs with x2AVIC
 2025-09-19  8:41 UTC  (3+ messages)
` [RESEND v4 6/7] x86/cpufeatures: Add X86_FEATURE_X2AVIC_EXT

[PATCH v6 01/11] filemap: Pass address_space mapping to ->free_folio()
 2025-09-19  8:30 UTC  (2+ messages)

[PATCH v6 05/11] KVM: guest_memfd: Add flag to remove from direct map
 2025-09-19  8:25 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox