messages from 2025-10-30 10:28:55 to 2025-10-31 10:10:58 UTC [more...]
[PATCH] KVM: x86: Add a helper to dedup reporting of unhandled VM-Exits
2025-10-31 10:10 UTC (3+ messages)
[PATCH] KVM: s390: Add capability that forwards operation exceptions
2025-10-31 9:36 UTC (4+ messages)
[PATCH v4 00/28] KVM: x86/mmu: TDX post-populate cleanups
2025-10-31 9:17 UTC (58+ messages)
` [PATCH v4 01/28] KVM: Make support for kvm_arch_vcpu_async_ioctl() mandatory
` [PATCH v4 02/28] KVM: Rename kvm_arch_vcpu_async_ioctl() to kvm_arch_vcpu_unlocked_ioctl()
` [PATCH v4 03/28] KVM: TDX: Drop PROVE_MMU=y sanity check on to-be-populated mappings
` [PATCH v4 04/28] KVM: x86/mmu: Add dedicated API to map guest_memfd pfn into TDP MMU
` [PATCH v4 05/28] KVM: x86/mmu: WARN if KVM attempts to map into an invalid TDP MMU root
` [PATCH v4 06/28] Revert "KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU"
` [PATCH v4 07/28] KVM: x86/mmu: Rename kvm_tdp_map_page() to kvm_tdp_page_prefault()
` [PATCH v4 08/28] KVM: TDX: Drop superfluous page pinning in S-EPT management
` [PATCH v4 09/28] KVM: TDX: Return -EIO, not -EINVAL, on a KVM_BUG_ON() condition
` [PATCH v4 10/28] KVM: TDX: Fold tdx_sept_drop_private_spte() into tdx_sept_remove_private_spte()
` [PATCH v4 11/28] KVM: x86/mmu: Drop the return code from kvm_x86_ops.remove_external_spte()
` [PATCH v4 12/28] KVM: TDX: WARN if mirror SPTE doesn't have full RWX when creating S-EPT mapping
` [PATCH v4 13/28] KVM: TDX: Avoid a double-KVM_BUG_ON() in tdx_sept_zap_private_spte()
` [PATCH v4 14/28] KVM: TDX: Use atomic64_dec_return() instead of a poor equivalent
` [PATCH v4 15/28] KVM: TDX: Fold tdx_mem_page_record_premap_cnt() into its sole caller
` [PATCH v4 16/28] KVM: TDX: ADD pages to the TD image while populating mirror EPT entries
` [PATCH v4 17/28] KVM: TDX: Fold tdx_sept_zap_private_spte() into tdx_sept_remove_private_spte()
` [PATCH v4 18/28] KVM: TDX: Combine KVM_BUG_ON + pr_tdx_error() into TDX_BUG_ON()
` [PATCH v4 19/28] KVM: TDX: Derive error argument names from the local variable names
` [PATCH v4 20/28] KVM: TDX: Assert that mmu_lock is held for write when removing S-EPT entries
` [PATCH v4 21/28] KVM: TDX: Add macro to retry SEAMCALLs when forcing vCPUs out of guest
` [PATCH v4 22/28] KVM: TDX: Add tdx_get_cmd() helper to get and validate sub-ioctl command
` [PATCH v4 23/28] KVM: TDX: Convert INIT_MEM_REGION and INIT_VCPU to "unlocked" vCPU ioctl
` [PATCH v4 24/28] KVM: TDX: Use guard() to acquire kvm->lock in tdx_vm_ioctl()
` [PATCH v4 25/28] KVM: TDX: Don't copy "cmd" back to userspace for KVM_TDX_CAPABILITIES
` [PATCH v4 26/28] KVM: TDX: Guard VM state transitions with "all" the locks
` [PATCH v4 27/28] KVM: TDX: Bug the VM if extending the initial measurement fails
` [PATCH v4 28/28] KVM: TDX: Fix list_add corruption during vcpu_load()
[PATCH v4 0/3] mm: Implement ECC handling for pfn with no struct page
2025-10-31 8:27 UTC (5+ messages)
` [PATCH v4 2/3] mm: handle poisoning of pfn without struct pages
[PATCH v3 00/28] vfio/xe: Add driver variant for Xe VF migration
2025-10-31 7:50 UTC (31+ messages)
` [PATCH v3 01/28] drm/xe/pf: Remove GuC version check for migration support
` [PATCH v3 02/28] drm/xe: Move migration support to device-level struct
` [PATCH v3 03/28] drm/xe/pf: Convert control state to bitmap
` [PATCH v3 04/28] drm/xe/pf: Add save/restore control state stubs and connect to debugfs
` [PATCH v3 05/28] drm/xe/pf: Add data structures and handlers for migration rings
` [PATCH v3 06/28] drm/xe/pf: Add helpers for migration data allocation / free
` [PATCH v3 07/28] drm/xe/pf: Add support for encap/decap of bitstream to/from packet
` [PATCH v3 08/28] drm/xe/pf: Add minimalistic migration descriptor
` [PATCH v3 09/28] drm/xe/pf: Expose VF migration data size over debugfs
` [PATCH v3 10/28] drm/xe: Add sa/guc_buf_cache sync interface
` [PATCH v3 11/28] drm/xe: Allow the caller to pass guc_buf_cache size
` [PATCH v3 12/28] drm/xe/pf: Increase PF GuC Buffer Cache size and use it for VF migration
` [PATCH v3 13/28] drm/xe/pf: Remove GuC migration data save/restore from GT debugfs
` [PATCH v3 14/28] drm/xe/pf: Don't save GuC VF migration data on pause
` [PATCH v3 15/28] drm/xe/pf: Switch VF migration GuC save/restore to struct migration data
` [PATCH v3 16/28] drm/xe/pf: Handle GuC migration data as part of PF control
` [PATCH v3 17/28] drm/xe/pf: Add helpers for VF GGTT migration data handling
` [PATCH v3 18/28] drm/xe/pf: Handle GGTT migration data as part of PF control
` [PATCH v3 19/28] drm/xe/pf: Handle MMIO "
` [PATCH v3 20/28] drm/xe/pf: Add helper to retrieve VF's LMEM object
` [PATCH v3 21/28] drm/xe/migrate: Add function to copy of VRAM data in chunks
` [PATCH v3 22/28] drm/xe/pf: Handle VRAM migration data as part of PF control
` [PATCH v3 23/28] drm/xe/pf: Add wait helper for VF FLR
` [PATCH v3 24/28] drm/xe/pf: Enable SR-IOV VF migration
` [PATCH v3 25/28] drm/xe/pci: Introduce a helper to allow VF access to PF xe_device
` [PATCH v3 26/28] drm/xe/pf: Export helpers for VFIO
` [PATCH v3 27/28] drm/intel/pciids: Add match with VFIO override
` [PATCH v3 28/28] vfio/xe: Add device specific vfio_pci driver variant for Intel graphics
[PATCH] s390/mm: Use pointer from memcpy() call for assignment in s390_replace_asce()
2025-10-31 7:22 UTC
[PATCH v5 0/9] vfio/pci: Allow MMIO regions to be exported through dma-buf
2025-10-31 6:48 UTC (10+ messages)
` [PATCH v5 9/9] vfio/pci: Add dma-buf export support for MMIO regions
[PATCH 0/2] KVM: x86: Fix an FPU+CET splat
2025-10-31 6:28 UTC (4+ messages)
` [PATCH 1/2] KVM: x86: Unload "FPU" state on INIT if and only if its currently in-use
` [PATCH 2/2] KVM: x86: Harden KVM against imbalanced load/put of guest FPU state
[PATCH v12 00/23] TDX KVM selftests
2025-10-31 4:06 UTC (23+ messages)
` [PATCH v12 01/23] KVM: selftests: Add macros so simplify creating VM shapes for non-default types
` [PATCH v12 02/23] KVM: selftests: Allocate pgd in virt_map() as necessary
` [PATCH v12 03/23] KVM: selftests: Expose functions to get default sregs values
` [PATCH v12 04/23] KVM: selftests: Expose function to allocate guest vCPU stack
` [PATCH v12 05/23] KVM: selftests: Update kvm_init_vm_address_properties() for TDX
` [PATCH v12 06/23] KVM: selftests: Expose segment definitons to assembly files
` [PATCH v12 07/23] KVM: selftests: Add kbuild definitons
` [PATCH v12 08/23] KVM: selftests: Define structs to pass parameters to TDX boot code
` [PATCH v12 12/23] KVM: selftests: Add helper to initialize TDX VM
` [PATCH v12 15/23] KVM: selftests: Call TDX init when creating a new TDX vm
[PATCH 0/6] KVM: LoongArch: selftests: Add timer test case
2025-10-31 3:16 UTC (7+ messages)
` [PATCH 1/6] KVM: LoongArch: selftests: Add system registers save and restore on exception
` [PATCH 2/6] KVM: LoongArch: selftests: Add exception handler register interface
` [PATCH 3/6] KVM: LoongArch: selftests: Add basic interfaces
` [PATCH 4/6] KVM: LoongArch: selftests: Add timer test case with one-shot mode
` [PATCH 5/6] KVM: LoongArch: selftests: Add period mode timer and time counter test
` [PATCH 6/6] KVM: LoongArch: selftests: Add SW emulated timer test
[PATCH] vfio: Fix ksize arg while copying user struct in vfio_df_ioctl_bind_iommufd()
2025-10-31 1:34 UTC (4+ messages)
[PATCH v4 0/8] x86/bugs: KVM: L1TF and MMIO Stale Data cleanups
2025-10-31 0:30 UTC (9+ messages)
` [PATCH v4 1/8] x86/bugs: Use VM_CLEAR_CPU_BUFFERS in VMX as well
` [PATCH v4 2/8] x86/bugs: Decouple ALTERNATIVE usage from VERW macro definition
` [PATCH v4 3/8] x86/bugs: Use an X86_FEATURE_xxx flag for the MMIO Stale Data mitigation
` [PATCH v4 4/8] KVM: VMX: Handle MMIO Stale Data in VM-Enter assembly via ALTERNATIVES_2
` [PATCH v4 5/8] x86/bugs: KVM: Move VM_CLEAR_CPU_BUFFERS into SVM as SVM_CLEAR_CPU_BUFFERS
` [PATCH v4 6/8] KVM: VMX: Bundle all L1 data cache flush mitigation code together
` [PATCH v4 7/8] KVM: VMX: Disable L1TF L1 data cache flush if CONFIG_CPU_MITIGATIONS=n
` [PATCH v4 8/8] KVM: x86: Unify L1TF flushing under per-CPU variable
[RFC PATCH 00/21] VFIO live update support
2025-10-31 0:18 UTC (11+ messages)
` [RFC PATCH 06/21] vfio/pci: Accept live update preservation request for VFIO cdev
` [RFC PATCH 15/21] PCI: Make PCI saved state and capability structs public
[PATCH] KVM: x86: Document a virtualization gap for GIF on AMD CPUs
2025-10-31 0:09 UTC (2+ messages)
[PATCH v2 0/4] KVM: selftests: Test SET_NESTED_STATE with 48-bit L2 on 57-bit L1
2025-10-30 23:32 UTC (5+ messages)
` [PATCH v2 1/4] KVM: selftests: Use a loop to create guest page tables
` [PATCH v2 2/4] KVM: selftests: Use a loop to walk "
[PATCH 0/4] KVM: x86: Cleanup #MC and XCR0/XSS/PKRU handling
2025-10-30 22:42 UTC (5+ messages)
` [PATCH 1/4] KVM: SVM: Handle #MCs in guest outside of fastpath
` [PATCH 2/4] KVM: VMX: Handle #MCs on VM-Enter/TD-Enter outside of the fastpath
` [PATCH 3/4] KVM: x86: Load guest/host XCR0 and XSS outside of the fastpath run loop
` [PATCH 4/4] KVM: x86: Load guest/host PKRU "
[PATCH] KVM: PPC: Use pointer from memcpy() call for assignment in kvmppc_kvm_pv()
2025-10-30 21:41 UTC (2+ messages)
[PATCH v6 0/2] KVM: guest_memfd: use write for population
2025-10-30 21:37 UTC (5+ messages)
` [PATCH v6 1/2] KVM: guest_memfd: add generic population via write
[PATCH 0/3] Fix a lost async pagefault notification when the guest is using SMM
2025-10-30 20:28 UTC (9+ messages)
` [PATCH 2/3] KVM: x86: Fix a semi theoretical bug in kvm_arch_async_page_present_queued
[PATCH] KVM: SVM: switch to raw spinlock for svm->ir_list_lock
2025-10-30 19:41 UTC
[PATCH v5 0/4] KVM: x86: User-return MSR fix+cleanups
2025-10-30 19:15 UTC (5+ messages)
` [PATCH v5 1/4] KVM: TDX: Explicitly set user-return MSRs that *may* be clobbered by the TDX-Module
` [PATCH v5 2/4] KVM: x86: WARN if user-return MSR notifier is registered on exit
` [PATCH v5 3/4] KVM: x86: Leave user-return notifier registered on reboot/shutdown
` [PATCH v5 4/4] KVM: x86: Don't disable IRQs when unregistering user-return notifier
[PATCH 0/3] Unify VERW mitigation for guests
2025-10-30 19:11 UTC (18+ messages)
` [PATCH 1/3] x86/bugs: Use VM_CLEAR_CPU_BUFFERS in VMX as well
` [PATCH 2/3] x86/mmio: Rename cpu_buf_vm_clear to cpu_buf_vm_clear_mmio_only
` [PATCH 3/3] x86/mmio: Unify VERW mitigation for guests
[PATCH v7 03/12] mm: introduce AS_NO_DIRECT_MAP
2025-10-30 17:18 UTC (7+ messages)
` [PATCH v7 04/12] KVM: guest_memfd: Add stub for kvm_arch_gmem_invalidate
` [PATCH v7 06/12] KVM: guest_memfd: add module param for disabling TLB flushing
` [PATCH v7 12/12] KVM: selftests: Test guest execution from direct map removed gmem
[PATCH v2 0/2] arm: add kvm-psci-version vcpu property
2025-10-30 16:59 UTC (3+ messages)
` [PATCH v2 1/2] target/arm/kvm: add constants for new PSCI versions
` [PATCH v2 2/2] target/arm/kvm: add kvm-psci-version vcpu property
[PATCH] KVM: arm64: selftests: Filter ZCR_EL2 in get-reg-list
2025-10-30 16:23 UTC (2+ messages)
[PATCH] KVM: arm64: selftests: Add SCTLR2_EL2 to get-reg-list
2025-10-30 16:23 UTC (2+ messages)
[PATCH v2] KVM: selftests: fix MAPC RDbase target formatting in vgic_lpi_stress
2025-10-30 16:23 UTC (2+ messages)
[PATCH] KVM: arm64: vgic-v3: Trap all if no in-kernel irqchip
2025-10-30 16:23 UTC (2+ messages)
[PATCH v3 00/20] i386: Support CET for KVM
2025-10-30 16:39 UTC (31+ messages)
` [PATCH v3 02/20] i386/cpu: Clean up indent style of x86_ext_save_areas[]
` [PATCH v3 07/20] i386/cpu: Reorganize dependency check for arch lbr state
` [PATCH v3 10/20] i386/cpu: Add missing migratable xsave features
` [PATCH v3 11/20] i386/cpu: Enable xsave support for CET states
` [PATCH v3 12/20] i386/cpu: Add CET support in CR4
` [PATCH v3 15/20] i386/machine: Add vmstate for cet-ss and cet-ibt
` [PATCH v3 16/20] i386/cpu: Mark cet-u & cet-s xstates as migratable
` [PATCH v3 20/20] i386/tdx: Add CET SHSTK/IBT into the supported CPUID by XFAM
[PATCH 0/3] KVM: selftests: arm64: Improve diagnostics from set_id_regs
2025-10-30 15:42 UTC (4+ messages)
` [PATCH 1/3] KVM: selftests: arm64: Report set_id_reg reads of test registers as tests
` [PATCH 2/3] KVM: selftests: arm64: Report register reset tests individually
` [PATCH 3/3] KVM: selftests: arm64: Make set_id_regs bitfield validatity checks non-fatal
[PATCH] x86/virt/tdx: Use precalculated TDVPR page physical address
2025-10-30 15:42 UTC (6+ messages)
[PATCH v2 0/3] KVM: arm64: Fix handling of ID_PFR1_EL1.GIC
2025-10-30 12:27 UTC (4+ messages)
` [PATCH v2 1/3] KVM: arm64: Make all 32bit ID registers fully writable
` [PATCH v2 2/3] KVM: arm64: Set ID_{AA64PFR0,PFR1}_EL1.GIC when GICv3 is configured
` [PATCH v2 3/3] KVM: arm64: Limit clearing of ID_{AA64PFR0,PFR1}_EL1.GIC to userspace irqchip
[PATCH 0/7] cpus: Constify some CPUState arguments
2025-10-30 11:42 UTC (4+ messages)
[PATCH 0/3] KVM: arm64: Fix handling of ID_PFR1_EL1.GIC
2025-10-30 11:25 UTC (4+ messages)
` [PATCH 1/3] KVM: arm64: Make ID_PFR1_EL1.GIC writable
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox