public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-11-20 17:16:25 to 2025-11-21 11:11:35 UTC [more...]

[PATCH v3 00/10] KVM: nVMX: Improve performance for unmanaged guest memory
 2025-11-21 11:11 UTC  (8+ messages)
` [PATCH v3 01/10] KVM: nVMX: Implement cache for L1 MSR bitmap
` [PATCH v3 02/10] KVM: pfncache: Restore guest-uses-pfn support
` [PATCH v3 03/10] KVM: x86: Add nested state validation for pfncache support
` [PATCH v3 04/10] KVM: nVMX: Implement cache for L1 APIC pages
` [PATCH v3 05/10] KVM: selftests: Add nested VMX APIC cache invalidation test
` [PATCH v3 06/10] KVM: nVMX: Cache evmcs fields to ensure consistency during VM-entry
` [PATCH v3 07/10] KVM: nVMX: Replace evmcs kvm_host_map with pfncache

[PATCH v2 0/5] Support the FEAT_HDBSS introduced in Armv9.5
 2025-11-21 10:21 UTC  (8+ messages)
` [PATCH v2 1/5] arm64/sysreg: Add HDBSS related register information
` [PATCH v2 2/5] KVM: arm64: Support set the DBM attr during memory abort
` [PATCH v2 3/5] KVM: arm64: Add support for FEAT_HDBSS
` [PATCH v2 4/5] KVM: arm64: Enable HDBSS support and handle HDBSSF events
` [PATCH v2 5/5] KVM: arm64: Document HDBSS ioctl

[PATCH net-next v6 0/8] tun/tap & vhost-net: netdev queue flow control to avoid ptr_ring tail drop
 2025-11-21  9:22 UTC  (4+ messages)
` [syzbot ci] "

[PATCH 0/5] i386: Add support for CPUID 0x80000026 and Bus Lock Detect
 2025-11-21  8:34 UTC  (6+ messages)
` [PATCH 1/5] i386: Implement CPUID 0x80000026
` [PATCH 2/5] i386: Add CPU property x-force-cpuid-0x80000026
` [PATCH 3/5] i386: Enable CPUID 80000026 for EPYC-Genoa/Turin vCPU
` [PATCH 4/5] i386: Add Bus Lock Detect support
` [PATCH 5/5] i386: Add Bus Lock Detect support for EPYC-Turin-v2 model

[PATCH v2] KVM: SVM: Add Bus Lock Detect support
 2025-11-21  8:12 UTC 

[PATCH v6 0/5] Disable ATS via iommu during PCI resets
 2025-11-21  7:59 UTC  (5+ messages)
` [PATCH v6 4/5] iommu: Introduce pci_dev_reset_iommu_prepare/done()
` [PATCH v6 5/5] PCI: Suspend iommu function prior to resetting a device

[PATCH v9 00/11] vfio/pci: Allow MMIO regions to be exported through dma-buf
 2025-11-21  7:42 UTC  (7+ messages)
` [PATCH v9 10/11] vfio/pci: Add dma-buf export support for MMIO regions

[PATCH 00/14] Error message improvements
 2025-11-21  7:37 UTC  (28+ messages)
` [PATCH 01/14] error: Strip trailing '\n' from error string arguments (again)
` [PATCH 02/14] hw/usb: Use error_setg_file_open() for a better error message
` [PATCH 03/14] tap-solaris: Use error_setg_file_open() for better error messages
` [PATCH 04/14] qga: "
` [PATCH 05/14] hw/scsi: Use error_setg_file_open() for a better error message
` [PATCH 06/14] hw/virtio: "
` [PATCH 07/14] net/tap: "
` [PATCH 08/14] blkdebug: "
` [PATCH 09/14] error: Use error_setg_file_open() for simplicity and consistency
` [PATCH 10/14] net/slirp: Improve file open error message
` [PATCH 11/14] error: Use error_setg_errno() to improve error messages
` [PATCH 12/14] error: Use error_setg_errno() for simplicity and consistency
` [PATCH 13/14] qga/commands-win32: Use error_setg_win32() for better error messages
` [PATCH 14/14] block/file-win32: Improve an error message

[PATCH v5 00/28] vfio/xe: Add driver variant for Xe VF migration
 2025-11-21  7:19 UTC  (9+ messages)
` [PATCH v5 28/28] vfio/xe: Add device specific vfio_pci driver variant for Intel graphics

[PATCH 0/6] vfio: Reset migration device state using dedicated callback
 2025-11-21  7:13 UTC  (3+ messages)
` [PATCH 1/6] vfio: Introduce .migration_reset_state() callback

[PATCH v2 0/4] KVM: x86: Cleanup #MC and XCR0/XSS/PKRU handling
 2025-11-21  6:09 UTC  (3+ messages)
` [PATCH v2 2/4] KVM: VMX: Handle #MCs on VM-Enter/TD-Enter outside of the fastpath

[PATCH net-next v11 00/13] vsock: add namespace support to vhost-vsock and loopback
 2025-11-21  5:44 UTC  (14+ messages)
` [PATCH net-next v11 01/13] vsock: a per-net vsock NS mode state
` [PATCH net-next v11 02/13] vsock: add netns to vsock core
` [PATCH net-next v11 03/13] vsock: reject bad VSOCK_NET_MODE_LOCAL configuration for G2H
` [PATCH net-next v11 04/13] virtio: set skb owner of virtio_transport_reset_no_sock() reply
` [PATCH net-next v11 05/13] vsock: add netns support to virtio transports
` [PATCH net-next v11 06/13] selftests/vsock: add namespace helpers to vmtest.sh
` [PATCH net-next v11 07/13] selftests/vsock: prepare vm management helpers for namespaces
` [PATCH net-next v11 08/13] selftests/vsock: add vm_dmesg_{warn,oops}_count() helpers
` [PATCH net-next v11 09/13] selftests/vsock: use ss to wait for listeners instead of /proc/net
` [PATCH net-next v11 10/13] selftests/vsock: add tests for proc sys vsock ns_mode
` [PATCH net-next v11 11/13] selftests/vsock: add namespace tests for CID collisions
` [PATCH net-next v11 12/13] selftests/vsock: add tests for host <-> vm connectivity with namespaces
` [PATCH net-next v11 13/13] selftests/vsock: add tests for namespace deletion and mode changes

[kvm-unit-tests PATCH v4 0/8] x86/pmu: Fix test errors on GNR/SRF/CWF
 2025-11-21  3:32 UTC  (10+ messages)
` [kvm-unit-tests PATCH v4 1/8] x86/pmu: Add helper to detect Intel overcount issues
` [kvm-unit-tests PATCH v4 2/8] x86/pmu: Relax precise count validation for Intel overcounted platforms
` [kvm-unit-tests PATCH v4 3/8] x86/pmu: Fix incorrect masking of fixed counters
` [kvm-unit-tests PATCH v4 4/8] x86/pmu: Handle instruction overcount issue in overflow test
` [kvm-unit-tests PATCH v4 5/8] x86/pmu: Relax precise count check for emulated instructions tests
` [kvm-unit-tests PATCH v4 6/8] x86/pmu: Expand "llc references" upper limit for broader compatibility
` [kvm-unit-tests PATCH v4 7/8] x86: pmu_pebs: Remove abundant data_cfg_match calculation
` [kvm-unit-tests PATCH v4 8/8] x86: pmu_pebs: Support to validate timed PEBS record on GNR/SRF

[PATCH v6 0/1] KVM: Add support for the ERAPS feature
 2025-11-21  2:40 UTC  (4+ messages)
` [PATCH v6 1/1] x86: kvm: svm: set up ERAPS support for guests

[kvm-unit-tests patch v3 0/8] Fix pmu test errors on GNR/SRF/CWF
 2025-11-21  1:25 UTC  (11+ messages)
` [kvm-unit-tests patch v3 1/8] x86/pmu: Add helper to detect Intel overcount issues
` [kvm-unit-tests patch v3 3/8] x86/pmu: Fix incorrect masking of fixed counters
` [kvm-unit-tests patch v3 5/8] x86/pmu: Relax precise count check for emulated instructions tests

[PATCH v4 00/16] TDX: Enable Dynamic PAMT
 2025-11-21  0:51 UTC  (17+ messages)
` [PATCH v4 01/16] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH v4 02/16] x86/tdx: Add helpers to check return status codes
` [PATCH v4 03/16] x86/virt/tdx: Simplify tdmr_get_pamt_sz()
` [PATCH v4 04/16] x86/virt/tdx: Allocate page bitmap for Dynamic PAMT
` [PATCH v4 05/16] x86/virt/tdx: Allocate reference counters for PAMT memory
` [PATCH v4 06/16] x86/virt/tdx: Improve PAMT refcounts allocation for sparse memory
` [PATCH v4 07/16] x86/virt/tdx: Add tdx_alloc/free_page() helpers
` [PATCH v4 08/16] x86/virt/tdx: Optimize "
` [PATCH v4 09/16] KVM: TDX: Allocate PAMT memory for TD control structures
` [PATCH v4 10/16] KVM: TDX: Allocate PAMT memory for vCPU "
` [PATCH v4 11/16] KVM: TDX: Add x86 ops for external spt cache
` [PATCH v4 12/16] x86/virt/tdx: Add helpers to allow for pre-allocating pages
` [PATCH v4 13/16] KVM: TDX: Handle PAMT allocation in fault path
` [PATCH v4 14/16] KVM: TDX: Reclaim PAMT memory
` [PATCH v4 15/16] x86/virt/tdx: Enable Dynamic PAMT
` [PATCH v4 16/16] Documentation/x86: Add documentation for TDX's "

[PATCH 0/9] Initial DMABUF support for iommufd
 2025-11-21  0:47 UTC  (6+ messages)
` [PATCH 1/9] vfio/pci: Add vfio_pci_dma_buf_iommufd_map()
` [PATCH 6/9] iommufd: Have pfn_reader process DMABUF iopt_pages

[PATCH 00/10] sched/kvm: Semantics-aware vCPU scheduling for oversubscribed KVM
 2025-11-21  0:38 UTC  (4+ messages)
` [PATCH 06/10] KVM: Fix last_boosted_vcpu index assignment bug

[PATCH v2 00/23] Extend test coverage for nested SVM
 2025-11-21  0:30 UTC  (30+ messages)
` [PATCH v2 01/23] KVM: selftests: Minor improvements to asserts in test_vmx_nested_state()
` [PATCH v2 02/23] KVM: selftests: Extend vmx_set_nested_state_test to cover SVM
` [PATCH v2 03/23] KVM: selftests: Extend vmx_close_while_nested_test "
` [PATCH v2 04/23] KVM: selftests: Extend vmx_nested_tsc_scaling_test "
` [PATCH v2 05/23] KVM: selftests: Move nested invalid CR3 check to its own test
` [PATCH v2 12/23] KVM: selftests: Parameterize the PTE bitmasks for virt mapping functions
` [PATCH v2 18/23] KVM: selftests: Generalize nested "

[PATCH net-next v10 00/11] vsock: add namespace support to vhost-vsock and loopback
 2025-11-20 23:36 UTC  (4+ messages)
` [PATCH net-next v10 10/11] selftests/vsock: add tests for host <-> vm connectivity with namespaces

[PATCH v2 08/10] KVM: x86: Add nested context management
 2025-11-20 21:35 UTC  (2+ messages)

[PATCH RFC 0/3] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
 2025-11-20 19:34 UTC  (3+ messages)
` [PATCH 3/3] KVM: guest_memfd: GUP source pages prior to populating guest memory

[PATCH] KVM: s390: Implement CHECK_STOP support and fix GET_MP_STATE
 2025-11-20 18:28 UTC  (2+ messages)

[PATCH v1 00/26] PCI/TSM: TDX Connect: SPDM Session and IDE Establishment
 2025-11-20 18:00 UTC  (8+ messages)
` [PATCH v1 08/26] x86/virt/tdx: Add tdx_enable_ext() to enable of TDX Module Extensions

[PATCH v4 00/49] KVM: arm64: Add LR overflow infrastructure (the final one, I swear!)
 2025-11-20 17:25 UTC  (50+ messages)
` [PATCH v4 01/49] irqchip/gic: Add missing GICH_HCR control bits
` [PATCH v4 02/49] irqchip/gic: Expose CPU interface VA to KVM
` [PATCH v4 03/49] irqchip/apple-aic: Spit out ICH_MISR_EL2 value on spurious vGIC MI
` [PATCH v4 04/49] KVM: arm64: Turn vgic-v3 errata traps into a patched-in constant
` [PATCH v4 05/49] KVM: arm64: vgic-v3: Fix GICv3 trapping in protected mode
` [PATCH v4 06/49] KVM: arm64: GICv3: Detect and work around the lack of ICV_DIR_EL1 trapping
` [PATCH v4 07/49] KVM: arm64: Repack struct vgic_irq fields
` [PATCH v4 08/49] KVM: arm64: Add tracking of vgic_irq being present in a LR
` [PATCH v4 09/49] KVM: arm64: Add LR overflow handling documentation
` [PATCH v4 10/49] KVM: arm64: GICv3: Drop LPI active state when folding LRs
` [PATCH v4 11/49] KVM: arm64: GICv3: Preserve EOIcount on exit
` [PATCH v4 12/49] KVM: arm64: GICv3: Decouple ICH_HCR_EL2 programming from LRs
` [PATCH v4 13/49] KVM: arm64: GICv3: Extract LR folding primitive
` [PATCH v4 14/49] KVM: arm64: GICv3: Extract LR computing primitive
` [PATCH v4 15/49] KVM: arm64: GICv2: Preserve EOIcount on exit
` [PATCH v4 16/49] KVM: arm64: GICv2: Decouple GICH_HCR programming from LRs being loaded
` [PATCH v4 17/49] KVM: arm64: GICv2: Extract LR folding primitive
` [PATCH v4 18/49] KVM: arm64: GICv2: Extract LR computing primitive
` [PATCH v4 19/49] KVM: arm64: Compute vgic state irrespective of the number of interrupts
` [PATCH v4 20/49] KVM: arm64: Eagerly save VMCR on exit
` [PATCH v4 21/49] KVM: arm64: Revamp vgic maintenance interrupt configuration
` [PATCH v4 22/49] KVM: arm64: Turn kvm_vgic_vcpu_enable() into kvm_vgic_vcpu_reset()
` [PATCH v4 23/49] KVM: arm64: Make vgic_target_oracle() globally available
` [PATCH v4 24/49] KVM: arm64: Invert ap_list sorting to push active interrupts out
` [PATCH v4 25/49] KVM: arm64: Move undeliverable interrupts to the end of ap_list
` [PATCH v4 26/49] KVM: arm64: Use MI to detect groups being enabled/disabled
` [PATCH v4 27/49] KVM: arm64: GICv3: Handle LR overflow when EOImode==0
` [PATCH v4 28/49] KVM: arm64: GICv3: Handle deactivation via ICV_DIR_EL1 traps
` [PATCH v4 29/49] KVM: arm64: GICv3: Add GICv2 SGI handling to deactivation primitive
` [PATCH v4 30/49] KVM: arm64: GICv3: Set ICH_HCR_EL2.TDIR when interrupts overflow LR capacity
` [PATCH v4 31/49] KVM: arm64: GICv3: Add SPI tracking to handle asymmetric deactivation
` [PATCH v4 32/49] KVM: arm64: GICv3: Handle in-LR deactivation when possible
` [PATCH v4 33/49] KVM: arm64: GICv3: Avoid broadcast kick on CPUs lacking TDIR
` [PATCH v4 34/49] KVM: arm64: GICv3: nv: Resync LRs/VMCR/HCR early for better MI emulation
` [PATCH v4 35/49] KVM: arm64: GICv3: nv: Plug L1 LR sync into deactivation primitive
` [PATCH v4 36/49] KVM: arm64: GICv3: Force exit to sync ICH_HCR_EL2.En
` [PATCH v4 37/49] KVM: arm64: GICv2: Handle LR overflow when EOImode==0
` [PATCH v4 38/49] KVM: arm64: GICv2: Handle deactivation via GICV_DIR traps
` [PATCH v4 39/49] KVM: arm64: GICv2: Always trap GICV_DIR register
` [PATCH v4 40/49] KVM: arm64: selftests: gic_v3: Add irq group setting helper
` [PATCH v4 41/49] KVM: arm64: selftests: gic_v3: Disable Group-0 interrupts by default
` [PATCH v4 42/49] KVM: arm64: selftests: vgic_irq: Fix GUEST_ASSERT_IAR_EMPTY() helper
` [PATCH v4 43/49] KVM: arm64: selftests: vgic_irq: Change configuration before enabling interrupt
` [PATCH v4 44/49] KVM: arm64: selftests: vgic_irq: Exclude timer-controlled interrupts
` [PATCH v4 45/49] KVM: arm64: selftests: vgic_irq: Remove LR-bound limitation
` [PATCH v4 46/49] KVM: arm64: selftests: vgic_irq: Perform EOImode==1 deactivation in ack order
` [PATCH v4 47/49] KVM: arm64: selftests: vgic_irq: Add asymmetric SPI deaectivation test
` [PATCH v4 48/49] KVM: arm64: selftests: vgic_irq: Add Group-0 enable test
` [PATCH v4 49/49] KVM: arm64: selftests: vgic_irq: Add timer deactivation test

[PATCH v4 00/23] KVM: s390: gmap rewrite, the real deal
 2025-11-20 17:15 UTC  (11+ messages)
` [PATCH v4 12/23] KVM: s390: KVM page table management functions: lifecycle management
` [PATCH v4 14/23] KVM: s390: New gmap code
` [PATCH v4 16/23] KVM: s390: Add some helper functions needed for vSIE
` [PATCH v4 17/23] KVM: s390: Stop using CONFIG_PGSTE
` [PATCH v4 18/23] KVM: s390: Storage key functions refactoring
` [PATCH v4 19/23] KVM: s390: Switch to new gmap
` [PATCH v4 20/23] KVM: s390: Remove gmap from s390/mm
` [PATCH v4 21/23] KVM: S390: Remove PGSTE code from linux/s390 mm
` [PATCH v4 22/23] KVM: s390: Enable 1M pages for gmap
` [PATCH v4 23/23] KVM: s390: Storage key manipulation IOCTL


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox