messages from 2025-12-04 09:48:37 to 2025-12-06 08:19:08 UTC [more...]
[PATCH] KVM: Remove subtle "struct kvm_stats_desc" pseudo-overlay
2025-12-06 8:16 UTC (3+ messages)
[PATCH v3 0/4] LongArch: KVM: Add AVEC support irqchip in kernel
2025-12-06 6:46 UTC (5+ messages)
` [PATCH v3 1/4] LongArch: KVM: Add some maccros for AVEC
` [PATCH v3 2/4] LongArch: KVM: Add DINTC device support
` [PATCH v3 3/4] LongArch: KVM: Add irqfd set dintc msi
` [PATCH v3 4/4] LongArch: KVM: Add dintc inject msi to the dest vcpu
Kernel 6.18 not respecting my VFIO bindings
2025-12-06 1:52 UTC
[GIT PULL] KVM changes for Linux 6.19-rc1
2025-12-06 1:20 UTC (2+ messages)
[PATCH v2 0/7] KVM: x86/tdx: Have TDX handle VMXON during bringup
2025-12-06 1:10 UTC (8+ messages)
` [PATCH v2 1/7] KVM: x86: Move kvm_rebooting to x86
` [PATCH v2 2/7] KVM: x86: Extract VMXON and EFER.SVME enablement to kernel
` [PATCH v2 3/7] KVM: x86/tdx: Do VMXON and TDX-Module initialization during subsys init
` [PATCH v2 4/7] x86/virt/tdx: Tag a pile of functions as __init, and globals as __ro_after_init
` [PATCH v2 5/7] x86/virt/tdx: KVM: Consolidate TDX CPU hotplug handling
` [PATCH v2 6/7] x86/virt/tdx: Use ida_is_empty() to detect if any TDs may be running
` [PATCH v2 7/7] KVM: Bury kvm_{en,dis}able_virtualization() in kvm_main.c once more
[PATCH 0/9] KVM: x86: APIC and I/O APIC cleanups
2025-12-06 0:43 UTC (10+ messages)
` [PATCH 1/9] KVM: x86: Drop ASSERT()s on APIC/vCPU being non-NULL
` [PATCH 2/9] KVM: x86: Drop guest/user-triggerable asserts on IRR/ISR vectors
` [PATCH 3/9] KVM: x86: Drop ASSERT() on I/O APIC EOIs being only for LEVEL_to WARN_ON_ONCE
` [PATCH 4/9] KVM: x86: Drop guest-triggerable ASSERT()s on I/O APIC access alignment
` [PATCH 5/9] KVM: x86: Drop MAX_NR_RESERVED_IOAPIC_PINS, use KVM_MAX_IRQ_ROUTES directly
` [PATCH 6/9] KVM: x86: Add a wrapper to handle common case of IRQ delivery without dest_map
` [PATCH 7/9] KVM: x86: Fold "struct dest_map" into "struct rtc_status"
` [PATCH 8/9] KVM: x86: Bury ioapic.h definitions behind CONFIG_KVM_IOAPIC
` [PATCH 9/9] KVM: x86: Hide KVM_IRQCHIP_KERNEL behind CONFIG_KVM_IOAPIC=y
[PATCH v6 00/44] KVM: x86: Add support for mediated vPMUs
2025-12-06 0:17 UTC (45+ messages)
` [PATCH v6 01/44] perf: Skip pmu_ctx based on event_type
` [PATCH v6 02/44] perf: Add generic exclude_guest support
` [PATCH v6 03/44] perf: Move security_perf_event_free() call to __free_event()
` [PATCH v6 04/44] perf: Add APIs to create/release mediated guest vPMUs
` [PATCH v6 05/44] perf: Clean up perf ctx time
` [PATCH v6 06/44] perf: Add a EVENT_GUEST flag
` [PATCH v6 07/44] perf: Add APIs to load/put guest mediated PMU context
` [PATCH v6 08/44] perf/x86/core: Register a new vector for handling mediated guest PMIs
` [PATCH v6 09/44] perf/x86/core: Add APIs to switch to/from mediated PMI vector (for KVM)
` [PATCH v6 10/44] perf/x86/core: Do not set bit width for unavailable counters
` [PATCH v6 11/44] perf/x86/core: Plumb mediated PMU capability from x86_pmu to x86_pmu_cap
` [PATCH v6 12/44] perf/x86/intel: Support PERF_PMU_CAP_MEDIATED_VPMU
` [PATCH v6 13/44] perf/x86/amd: Support PERF_PMU_CAP_MEDIATED_VPMU for AMD host
` [PATCH v6 14/44] KVM: Add a simplified wrapper for registering perf callbacks
` [PATCH v6 15/44] KVM: x86/pmu: Snapshot host (i.e. perf's) reported PMU capabilities
` [PATCH v6 16/44] KVM: x86/pmu: Start stubbing in mediated PMU support
` [PATCH v6 17/44] KVM: x86/pmu: Implement Intel mediated PMU requirements and constraints
` [PATCH v6 18/44] KVM: x86/pmu: Implement AMD mediated PMU requirements
` [PATCH v6 19/44] KVM: x86/pmu: Register PMI handler for mediated vPMU
` [PATCH v6 20/44] KVM: x86/pmu: Disable RDPMC interception for compatible "
` [PATCH v6 21/44] KVM: x86/pmu: Load/save GLOBAL_CTRL via entry/exit fields for mediated PMU
` [PATCH v6 22/44] KVM: x86/pmu: Disable interception of select PMU MSRs for mediated vPMUs
` [PATCH v6 23/44] KVM: x86/pmu: Bypass perf checks when emulating mediated PMU counter accesses
` [PATCH v6 24/44] KVM: x86/pmu: Introduce eventsel_hw to prepare for pmu event filtering
` [PATCH v6 25/44] KVM: x86/pmu: Reprogram mediated PMU event selectors on event filter updates
` [PATCH v6 26/44] KVM: x86/pmu: Always stuff GuestOnly=1,HostOnly=0 for mediated PMCs on AMD
` [PATCH v6 27/44] KVM: x86/pmu: Load/put mediated PMU context when entering/exiting guest
` [PATCH v6 28/44] KVM: x86/pmu: Disallow emulation in the fastpath if mediated PMCs are active
` [PATCH v6 29/44] KVM: x86/pmu: Handle emulated instruction for mediated vPMU
` [PATCH v6 30/44] KVM: nVMX: Add macros to simplify nested MSR interception setting
` [PATCH v6 31/44] KVM: nVMX: Disable PMU MSR interception as appropriate while running L2
` [PATCH v6 32/44] KVM: nSVM: "
` [PATCH v6 33/44] KVM: x86/pmu: Expose enable_mediated_pmu parameter to user space
` [PATCH v6 34/44] KVM: x86/pmu: Elide WRMSRs when loading guest PMCs if values already match
` [PATCH v6 35/44] KVM: VMX: Drop intermediate "guest" field from msr_autostore
` [PATCH v6 36/44] KVM: nVMX: Don't update msr_autostore count when saving TSC for vmcs12
` [PATCH v6 37/44] KVM: VMX: Dedup code for removing MSR from VMCS's auto-load list
` [PATCH v6 38/44] KVM: VMX: Drop unused @entry_only param from add_atomic_switch_msr()
` [PATCH v6 39/44] KVM: VMX: Bug the VM if either MSR auto-load list is full
` [PATCH v6 40/44] KVM: VMX: Set MSR index auto-load entry if and only if entry is "new"
` [PATCH v6 41/44] KVM: VMX: Compartmentalize adding MSRs to host vs. guest auto-load list
` [PATCH v6 42/44] KVM: VMX: Dedup code for adding MSR to VMCS's auto list
` [PATCH v6 43/44] KVM: VMX: Initialize vmcs01.VM_EXIT_MSR_STORE_ADDR with list address
` [PATCH v6 44/44] KVM: VMX: Add mediated PMU support for CPUs without "save perf global ctrl"
[PATCH v3 00/10] KVM: VMX: Fix APICv activation bugs
2025-12-05 23:19 UTC (11+ messages)
` [PATCH v3 01/10] KVM: VMX: Update SVI during runtime APICv activation
` [PATCH v3 02/10] KVM: nVMX: Immediately refresh APICv controls as needed on nested VM-Exit
` [PATCH v3 03/10] KVM: selftests: Add a test to verify APICv updates (while L2 is active)
` [PATCH v3 04/10] KVM: nVMX: Switch to vmcs01 to update PML controls on-demand if L2 is active
` [PATCH v3 05/10] KVM: nVMX: Switch to vmcs01 to update TPR threshold "
` [PATCH v3 06/10] KVM: nVMX: Switch to vmcs01 to update SVI "
` [PATCH v3 07/10] KVM: nVMX: Switch to vmcs01 to refresh APICv controls "
` [PATCH v3 08/10] KVM: nVMX: Switch to vmcs01 to update APIC page "
` [PATCH v3 09/10] KVM: nVMX: Switch to vmcs01 to set virtual APICv mode "
` [PATCH v3 10/10] KVM: x86: Update APICv ISR (a.k.a. SVI) as part of kvm_apic_update_apicv()
[PATCH v4] KVM: selftests: Test TPR / CR8 sync and interrupt masking
2025-12-05 22:49 UTC
[PATCH v8 00/13] Direct Map Removal Support for guest_memfd
2025-12-05 18:35 UTC (17+ messages)
` [PATCH v8 01/13] x86: export set_direct_map_valid_noflush to KVM module
` [PATCH v8 02/13] x86/tlb: export flush_tlb_kernel_range "
` [PATCH v8 03/13] mm: introduce AS_NO_DIRECT_MAP
` [PATCH v8 04/13] KVM: guest_memfd: Add stub for kvm_arch_gmem_invalidate
` [PATCH v8 05/13] KVM: guest_memfd: Add flag to remove from direct map
` [PATCH v8 06/13] KVM: x86: define kvm_arch_gmem_supports_no_direct_map()
` [PATCH v8 07/13] KVM: arm64: "
` [PATCH v8 08/13] KVM: selftests: load elf via bounce buffer
` [PATCH v8 09/13] KVM: selftests: set KVM_MEM_GUEST_MEMFD in vm_mem_add() if guest_memfd != -1
` [PATCH v8 10/13] KVM: selftests: Add guest_memfd based vm_mem_backing_src_types
` [PATCH v8 11/13] KVM: selftests: cover GUEST_MEMFD_FLAG_NO_DIRECT_MAP in existing selftests
` [PATCH v8 12/13] KVM: selftests: stuff vm_mem_backing_src_type into vm_shape
` [PATCH v8 13/13] KVM: selftests: Test guest execution from direct map removed gmem
[PATCH v2 1/1] KVM: VMX: configure SVI during runtime APICv activation
2025-12-05 18:27 UTC (8+ messages)
[PATCH 0/7] KVM: x86: Improve the handling of debug exceptions during instruction emulation
2025-12-05 18:23 UTC (11+ messages)
` [PATCH 2/7] KVM: x86: Check guest debug in DR access "
` [PATCH 4/7] KVM: x86: Consolidate KVM_GUESTDBG_SINGLESTEP check into the kvm_inject_emulated_db()
` [PATCH 5/7] KVM: VMX: Set 'BS' bit in pending debug exceptions during instruction emulation
` [PATCH 6/7] KVM: selftests: Verify guest debug DR7.GD checking "
` [PATCH 7/7] KVM: selftests: Verify 'BS' bit checking in pending debug exception during VM entry
[PATCH v7 03/12] mm: introduce AS_NO_DIRECT_MAP
2025-12-05 17:24 UTC (8+ messages)
` [PATCH v7 04/12] KVM: guest_memfd: Add stub for kvm_arch_gmem_invalidate
` [PATCH v7 05/12] KVM: guest_memfd: Add flag to remove from direct map
` [PATCH v7 12/12] KVM: selftests: Test guest execution from direct map removed gmem
[PATCH][next] KVM: Avoid a few dozen -Wflex-array-member-not-at-end warnings
2025-12-05 17:04 UTC (2+ messages)
[PATCH 0/9] KVM: SVM: Fix (hilarious) exit_code bugs
2025-12-05 16:59 UTC (2+ messages)
[PATCH 0/2] KVM: x86: Do runtime updates during KVM_SET_CPUID2
2025-12-05 16:59 UTC (2+ messages)
[PATCH 0/2] KVM: Fix a guest_memfd memslot UAF
2025-12-05 16:59 UTC (2+ messages)
[PATCH 00/10] KVM: Avoid literal numbers as return values
2025-12-05 15:59 UTC (17+ messages)
` [PATCH 01/10] KVM: Switch coalesced_mmio_in_range() to return bool
` [PATCH 02/10] KVM/x86: Use bool for the err parameter of kvm_complete_insn_gp()
` [PATCH 03/10] KVM/x86: Let x86_emulate_ops.set_cr() return a bool
` [PATCH 04/10] KVM/x86: Let x86_emulate_ops.set_dr() "
` [PATCH 05/10] KVM/x86: Add KVM_MSR_RET_* defines for values 0 and 1
` [PATCH 06/10] KVM/x86: Use defines for APIC related MSR emulation
` [PATCH 07/10] KVM/x86: Use defines for Hyper-V "
` [PATCH 08/10] KVM/x86: Use defines for VMX "
` [PATCH 09/10] KVM/x86: Use defines for SVM "
` [PATCH 10/10] KVM/x86: Use defines for common "
[PATCH v2] KVM: SEV: Add KVM_SEV_SNP_HV_REPORT_REQ command
2025-12-05 14:28 UTC (4+ messages)
[PATCH next] vfio/xe: Fix use after free in xe_vfio_pci_alloc_file()
2025-12-05 12:31 UTC (2+ messages)
[PATCH v4 04/11] x86/bhi: Make clear_bhb_loop() effective on newer CPUs
2025-12-05 9:21 UTC (12+ messages)
[kvm-unit-tests PATCH 0/2] x86/svm: Add testing for L1 intercept bug
2025-12-05 8:14 UTC (3+ messages)
` [kvm-unit-tests PATCH 1/2] x86/svm: Add missing svm intercepts
` [kvm-unit-tests PATCH 2/2] x86/svm: Add unsupported instruction intercept test
[kvm-unit-tests PATCH 0/2] x86/svm: Add testing for L1 intercept bug
2025-12-05 8:14 UTC (6+ messages)
` [kvm-unit-tests PATCH 1/2] x86/svm: Add missing svm intercepts
` [kvm-unit-tests PATCH] x86/svm: Add unsupported instruction intercept test
[PATCH v2 0/4] mm/vfio: huge pfnmaps with !MAP_FIXED mappings
2025-12-05 7:45 UTC (9+ messages)
` [PATCH v2 1/4] mm/thp: Allow thp_get_unmapped_area_vmflags() to take alignment
` [PATCH v2 2/4] mm: Add file_operations.get_mapping_order()
` [PATCH v2 3/4] vfio: Introduce vfio_device_ops.get_mapping_order hook
` [PATCH v2 4/4] vfio-pci: Best-effort huge pfnmaps with !MAP_FIXED mappings
[RFC PATCH 0/2] KVM: pfncache: Support guest_memfd without direct map
2025-12-05 7:15 UTC (6+ messages)
[PATCH] KVM: SVM: Don't allow L1 intercepts for instructions not advertised
2025-12-05 7:06 UTC
[PATCH v3 0/9] KVM: arm64: Add support for FEAT_IDST
2025-12-05 6:25 UTC (19+ messages)
` [PATCH v3 1/9] arm64: Repaint ID_AA64MMFR2_EL1.IDS description
` [PATCH v3 3/9] KVM: arm64: Add a generic synchronous exception injection primitive
` [PATCH v3 4/9] KVM: arm64: Handle FEAT_IDST for sysregs without specific handlers
` [PATCH v3 5/9] KVM: arm64: Handle CSSIDR2_EL1 and SMIDR_EL1 in a generic way
` [PATCH v3 6/9] KVM: arm64: Force trap of GMID_EL1 when the guest doesn't have MTE
` [PATCH v3 8/9] KVM: arm64: pkvm: Report optional ID register traps with a 0x18 syndrome
` [PATCH v3 9/9] KVM: arm64: selftests: Add a test for FEAT_IDST
[RFC PATCH v2 00/23] KVM: TDX huge page support for private memory
2025-12-05 6:14 UTC (3+ messages)
` [RFC PATCH v2 21/23] KVM: TDX: Preallocate PAMT pages to be used in split path
[PATCH RFC 0/3] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
2025-12-05 3:54 UTC (17+ messages)
` [PATCH 1/3] KVM: guest_memfd: Remove preparation tracking
` [PATCH 3/3] KVM: guest_memfd: GUP source pages prior to populating guest memory
[GIT PULL] VFIO updates for v6.19-rc1
2025-12-05 3:01 UTC (2+ messages)
[GIT PULL] Please pull IOMMUFD subsystem changes
2025-12-05 3:01 UTC (2+ messages)
[GIT PULL] virtio,vhost: fixes, cleanups
2025-12-05 3:01 UTC (2+ messages)
[PATCH v3 0/5] mm, kvm: add guest_memfd support for uffd minor faults
2025-12-04 17:27 UTC (12+ messages)
` [PATCH v3 4/5] guest_memfd: add support for userfaultfd minor mode
[kvm-unit-tests PATCH v4 00/11] arm64: EL2 support
2025-12-04 17:17 UTC (15+ messages)
` [kvm-unit-tests PATCH v4 01/11] arm64: set SCTLR_EL1 to a known value for secondary cores
` [kvm-unit-tests PATCH v4 02/11] arm64: drop to EL1 if booted at EL2
` [kvm-unit-tests PATCH v4 03/11] arm64: efi: initialise SCTLR_ELx fully
` [kvm-unit-tests PATCH v4 04/11] arm64: efi: initialise the EL
` [kvm-unit-tests PATCH v4 05/11] arm64: timer: use hypervisor timers when at EL2
` [kvm-unit-tests PATCH v4 06/11] arm64: micro-bench: fix timer IRQ
` [kvm-unit-tests PATCH v4 07/11] arm64: micro-bench: use smc when at EL2
` [kvm-unit-tests PATCH v4 08/11] arm64: selftest: update test for running "
` [kvm-unit-tests PATCH v4 09/11] arm64: pmu: count EL2 cycles
` [kvm-unit-tests PATCH v4 10/11] arm64: run at EL2 if supported
` [kvm-unit-tests PATCH v4 11/11] arm64: add EL2 environment variable
[PATCH] target/ppc/kvm : Use macro names instead of hardcoded constants as return values
2025-12-04 17:10 UTC (3+ messages)
[PATCH 00/21] vfio/pci: Base support to preserve a VFIO device file across Live Update
2025-12-04 10:30 UTC (6+ messages)
` [PATCH 06/21] vfio/pci: Retrieve preserved device files after "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).