messages from 2025-12-05 17:51:48 to 2025-12-09 16:52:55 UTC [more...]
[PATCH] KVM: SVM: Don't allow L1 intercepts for instructions not advertised
2025-12-09 16:52 UTC (3+ messages)
[RFC v2 00/15] vfio: introduce vfio-cxl to support CXL type-2 accelerator passthrough Hello all,
2025-12-09 16:50 UTC (13+ messages)
` [RFC v2 01/15] cxl: factor out cxl_await_range_active() and cxl_media_ready()
` [RFC v2 02/15] cxl: introduce cxl_get_hdm_reg_info()
` [RFC v2 03/15] cxl: introduce cxl_find_comp_reglock_offset()
` [RFC v2 04/15] cxl: introduce devm_cxl_del_memdev()
` [RFC v2 05/15] cxl: introduce cxl_get_committed_regions()
` [RFC v2 06/15] vfio/cxl: introduce vfio-cxl core preludes
` [RFC v2 07/15] vfio/cxl: expose CXL region to the userspace via a new VFIO device region
` [RFC v2 08/15] vfio/cxl: discover precommitted CXL region
` [RFC v2 09/15] vfio/cxl: introduce vfio_cxl_core_{read, write}()
` [RFC v2 10/15] vfio/cxl: introduce the register emulation framework
` [RFC v2 11/15] vfio/cxl: introduce the emulation of HDM registers
` [RFC v2 12/15] vfio/cxl: introduce the emulation of CXL configuration space
[PATCH v2 1/1] virtio: add driver_override support
2025-12-09 16:34 UTC (3+ messages)
[PATCH v2 00/13] Nested SVM fixes, cleanups, and hardening
2025-12-09 16:27 UTC (11+ messages)
` [PATCH v2 04/13] KVM: nSVM: Fix consistency checks for NP_ENABLE
` [PATCH v2 10/13] KVM: nSVM: Restrict mapping VMCB12 on nested VMRUN
` [PATCH v2 11/13] KVM: nSVM: Simplify nested_svm_vmrun()
` [PATCH v2 12/13] KVM: nSVM: Sanitize control fields copied from VMCB12
` [PATCH v2 13/13] KVM: nSVM: Only copy NP_ENABLE from VMCB01's misc_ctl
[PATCH] vhost/vsock: improve RCU read sections around vhost_vsock_get()
2025-12-09 13:05 UTC (2+ messages)
[PATCH v2 0/7] KVM: x86/tdx: Have TDX handle VMXON during bringup
2025-12-09 7:46 UTC (23+ messages)
` [PATCH v2 1/7] KVM: x86: Move kvm_rebooting to x86
` [PATCH v2 2/7] KVM: x86: Extract VMXON and EFER.SVME enablement to kernel
` [PATCH v2 3/7] KVM: x86/tdx: Do VMXON and TDX-Module initialization during subsys init
` [PATCH v2 4/7] x86/virt/tdx: Tag a pile of functions as __init, and globals as __ro_after_init
` [PATCH v2 5/7] x86/virt/tdx: KVM: Consolidate TDX CPU hotplug handling
` [PATCH v2 6/7] x86/virt/tdx: Use ida_is_empty() to detect if any TDs may be running
` [PATCH v2 7/7] KVM: Bury kvm_{en,dis}able_virtualization() in kvm_main.c once more
[PATCH v6 00/44] KVM: x86: Add support for mediated vPMUs
2025-12-09 6:31 UTC (58+ messages)
` [PATCH v6 01/44] perf: Skip pmu_ctx based on event_type
` [PATCH v6 02/44] perf: Add generic exclude_guest support
` [PATCH v6 03/44] perf: Move security_perf_event_free() call to __free_event()
` [PATCH v6 04/44] perf: Add APIs to create/release mediated guest vPMUs
` [PATCH v6 05/44] perf: Clean up perf ctx time
` [PATCH v6 06/44] perf: Add a EVENT_GUEST flag
` [PATCH v6 07/44] perf: Add APIs to load/put guest mediated PMU context
` [PATCH v6 08/44] perf/x86/core: Register a new vector for handling mediated guest PMIs
` [PATCH v6 09/44] perf/x86/core: Add APIs to switch to/from mediated PMI vector (for KVM)
` [PATCH v6 10/44] perf/x86/core: Do not set bit width for unavailable counters
` [PATCH v6 11/44] perf/x86/core: Plumb mediated PMU capability from x86_pmu to x86_pmu_cap
` [PATCH v6 12/44] perf/x86/intel: Support PERF_PMU_CAP_MEDIATED_VPMU
` [PATCH v6 13/44] perf/x86/amd: Support PERF_PMU_CAP_MEDIATED_VPMU for AMD host
` [PATCH v6 14/44] KVM: Add a simplified wrapper for registering perf callbacks
` [PATCH v6 15/44] KVM: x86/pmu: Snapshot host (i.e. perf's) reported PMU capabilities
` [PATCH v6 16/44] KVM: x86/pmu: Start stubbing in mediated PMU support
` [PATCH v6 17/44] KVM: x86/pmu: Implement Intel mediated PMU requirements and constraints
` [PATCH v6 18/44] KVM: x86/pmu: Implement AMD mediated PMU requirements
` [PATCH v6 19/44] KVM: x86/pmu: Register PMI handler for mediated vPMU
` [PATCH v6 20/44] KVM: x86/pmu: Disable RDPMC interception for compatible "
` [PATCH v6 21/44] KVM: x86/pmu: Load/save GLOBAL_CTRL via entry/exit fields for mediated PMU
` [PATCH v6 22/44] KVM: x86/pmu: Disable interception of select PMU MSRs for mediated vPMUs
` [PATCH v6 23/44] KVM: x86/pmu: Bypass perf checks when emulating mediated PMU counter accesses
` [PATCH v6 24/44] KVM: x86/pmu: Introduce eventsel_hw to prepare for pmu event filtering
` [PATCH v6 25/44] KVM: x86/pmu: Reprogram mediated PMU event selectors on event filter updates
` [PATCH v6 26/44] KVM: x86/pmu: Always stuff GuestOnly=1,HostOnly=0 for mediated PMCs on AMD
` [PATCH v6 27/44] KVM: x86/pmu: Load/put mediated PMU context when entering/exiting guest
` [PATCH v6 28/44] KVM: x86/pmu: Disallow emulation in the fastpath if mediated PMCs are active
` [PATCH v6 29/44] KVM: x86/pmu: Handle emulated instruction for mediated vPMU
` [PATCH v6 30/44] KVM: nVMX: Add macros to simplify nested MSR interception setting
` [PATCH v6 31/44] KVM: nVMX: Disable PMU MSR interception as appropriate while running L2
` [PATCH v6 32/44] KVM: nSVM: "
` [PATCH v6 33/44] KVM: x86/pmu: Expose enable_mediated_pmu parameter to user space
` [PATCH v6 34/44] KVM: x86/pmu: Elide WRMSRs when loading guest PMCs if values already match
` [PATCH v6 35/44] KVM: VMX: Drop intermediate "guest" field from msr_autostore
` [PATCH v6 36/44] KVM: nVMX: Don't update msr_autostore count when saving TSC for vmcs12
` [PATCH v6 37/44] KVM: VMX: Dedup code for removing MSR from VMCS's auto-load list
` [PATCH v6 38/44] KVM: VMX: Drop unused @entry_only param from add_atomic_switch_msr()
` [PATCH v6 39/44] KVM: VMX: Bug the VM if either MSR auto-load list is full
` [PATCH v6 40/44] KVM: VMX: Set MSR index auto-load entry if and only if entry is "new"
` [PATCH v6 41/44] KVM: VMX: Compartmentalize adding MSRs to host vs. guest auto-load list
` [PATCH v6 42/44] KVM: VMX: Dedup code for adding MSR to VMCS's auto list
` [PATCH v6 43/44] KVM: VMX: Initialize vmcs01.VM_EXIT_MSR_STORE_ADDR with list address
` [PATCH v6 44/44] KVM: VMX: Add mediated PMU support for CPUs without "save perf global ctrl"
[PATCH v3 00/10] crypto: virtio: Add ecb aes algo support
2025-12-09 4:32 UTC (12+ messages)
` [PATCH v3 01/10] crypto: virtio: Add spinlock protection with virtqueue notification
` [PATCH v3 02/10] crypto: virtio: Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req
` [PATCH v3 03/10] crypto: virtio: Replace package id with numa node id
` [PATCH v3 04/10] crypto: virtio: Add algo pointer in virtio_crypto_skcipher_ctx
` [PATCH v3 05/10] crypto: virtio: Use generic API aes_check_keylen()
` [PATCH v3 06/10] crypto: virtio: Remove AES specified marcro AES_BLOCK_SIZE
` [PATCH v3 07/10] crypto: virtio: Add req_data with structure virtio_crypto_sym_request
` [PATCH v3 08/10] crypto: virtio: Add IV buffer in "
` [PATCH v3 09/10] crypto: virtio: Add skcipher support without IV
` [PATCH v3 10/10] crypto: virtio: Add ecb aes algo support
[Bug 220740] New: Host crash when do PF passthrough to KVM guest with some devices
2025-12-09 2:54 UTC (4+ messages)
` [Bug 220740] "
[kvm-unit-tests PATCH 0/2] x86/svm: Add testing for L1 intercept bug
2025-12-09 1:34 UTC (5+ messages)
` [kvm-unit-tests PATCH 1/2] x86/svm: Add missing svm intercepts
` [kvm-unit-tests PATCH 2/2] x86/svm: Add unsupported instruction intercept test
[PATCH v16 00/51] KVM: x86: Super Mega CET
2025-12-09 0:48 UTC (4+ messages)
` [PATCH v16 36/51] KVM: nSVM: Save/load CET Shadow Stack state to/from vmcb12/vmcb02
[kvm-unit-tests PATCH] Skip PMU portion of vmware_backdoors test if PMU is not enabled
2025-12-08 23:39 UTC
[PATCH v9 00/22] Enable FRED with KVM VMX
2025-12-08 22:51 UTC (6+ messages)
` [PATCH v9 19/22] KVM: nVMX: Handle FRED VMCS fields in nested VMX context
` [PATCH v9 21/22] KVM: nVMX: Guard SHADOW_FIELD_R[OW] macros with VMX feature checks
[PATCH v4] KVM: selftests: Test TPR / CR8 sync and interrupt masking
2025-12-08 21:11 UTC (2+ messages)
[PATCH v4 00/16] TDX: Enable Dynamic PAMT
2025-12-08 20:27 UTC (4+ messages)
` [PATCH v4 07/16] x86/virt/tdx: Add tdx_alloc/free_page() helpers
[PATCH 0/2] Enable GICv5 Legacy CPUIF trapping & fix TDIR cap test
2025-12-08 15:53 UTC (5+ messages)
` [PATCH 1/2] KVM: arm64: gic: Enable GICv3 CPUIF trapping on GICv5 hosts if required
` [PATCH 2/2] KVM: arm64: Correct test for ICH_HCR_EL2_TDIR cap for GICv5 hosts
[PATCH 3/3] KVM: guest_memfd: GUP source pages prior to populating guest memory
2025-12-08 11:07 UTC (4+ messages)
[PATCH] KVM: Remove subtle "struct kvm_stats_desc" pseudo-overlay
2025-12-08 10:42 UTC (6+ messages)
[PATCH 0/6] TDX: Stop metadata auto-generation, improve readability
2025-12-08 10:17 UTC (3+ messages)
[PATCH v1 00/26] PCI/TSM: TDX Connect: SPDM Session and IDE Establishment
2025-12-08 10:02 UTC (10+ messages)
` [PATCH v1 08/26] x86/virt/tdx: Add tdx_enable_ext() to enable of TDX Module Extensions
[PATCH 0/4] RISC-V: KVM: Add Zicfiss/Zicfilp support
2025-12-08 9:53 UTC (4+ messages)
` [PATCH 1/4] RISC-V: KVM: Allow zicfiss/zicfilp exts for Guest/VM
[PATCH v2 0/4] mm/vfio: huge pfnmaps with !MAP_FIXED mappings
2025-12-08 9:21 UTC (9+ messages)
` [PATCH v2 2/4] mm: Add file_operations.get_mapping_order()
` [PATCH v2 4/4] vfio-pci: Best-effort huge pfnmaps with !MAP_FIXED mappings
[PATCH v8 00/13] Direct Map Removal Support for guest_memfd
2025-12-08 9:10 UTC (10+ messages)
` [PATCH v8 03/13] mm: introduce AS_NO_DIRECT_MAP
` [PATCH v8 04/13] KVM: guest_memfd: Add stub for kvm_arch_gmem_invalidate
` [PATCH v8 05/13] KVM: guest_memfd: Add flag to remove from direct map
[PATCH] vfio/pci: Skip hot reset on Link-Down
2025-12-08 7:44 UTC
[RFC PATCH v2 00/23] KVM: TDX huge page support for private memory
2025-12-08 5:49 UTC (4+ messages)
` [RFC PATCH v2 21/23] KVM: TDX: Preallocate PAMT pages to be used in split path
[PATCH v3 0/4] LongArch: KVM: Add AVEC support irqchip in kernel
2025-12-08 4:04 UTC (9+ messages)
` [PATCH v3 1/4] LongArch: KVM: Add some maccros for AVEC
` [PATCH v3 2/4] LongArch: KVM: Add DINTC device support
` [PATCH v3 3/4] LongArch: KVM: Add irqfd set dintc msi
` [PATCH v3 4/4] LongArch: KVM: Add dintc inject msi to the dest vcpu
[PATCH v2] x86/kvm: Avoid freeing stack-allocated node in kvm_async_pf_queue_task
2025-12-06 14:09 UTC
[PATCH v3 0/2] LoongArch: KVM: Add paravirt preempt support
2025-12-06 13:04 UTC (3+ messages)
` [PATCH v3 2/2] LoongArch: Add paravirt support with vcpu_is_preempted() in guest side
Kernel 6.18 not respecting my VFIO bindings
2025-12-06 1:52 UTC
[GIT PULL] KVM changes for Linux 6.19-rc1
2025-12-06 1:20 UTC (2+ messages)
[PATCH 0/9] KVM: x86: APIC and I/O APIC cleanups
2025-12-06 0:43 UTC (10+ messages)
` [PATCH 1/9] KVM: x86: Drop ASSERT()s on APIC/vCPU being non-NULL
` [PATCH 2/9] KVM: x86: Drop guest/user-triggerable asserts on IRR/ISR vectors
` [PATCH 3/9] KVM: x86: Drop ASSERT() on I/O APIC EOIs being only for LEVEL_to WARN_ON_ONCE
` [PATCH 4/9] KVM: x86: Drop guest-triggerable ASSERT()s on I/O APIC access alignment
` [PATCH 5/9] KVM: x86: Drop MAX_NR_RESERVED_IOAPIC_PINS, use KVM_MAX_IRQ_ROUTES directly
` [PATCH 6/9] KVM: x86: Add a wrapper to handle common case of IRQ delivery without dest_map
` [PATCH 7/9] KVM: x86: Fold "struct dest_map" into "struct rtc_status"
` [PATCH 8/9] KVM: x86: Bury ioapic.h definitions behind CONFIG_KVM_IOAPIC
` [PATCH 9/9] KVM: x86: Hide KVM_IRQCHIP_KERNEL behind CONFIG_KVM_IOAPIC=y
[PATCH v3 00/10] KVM: VMX: Fix APICv activation bugs
2025-12-05 23:19 UTC (11+ messages)
` [PATCH v3 01/10] KVM: VMX: Update SVI during runtime APICv activation
` [PATCH v3 02/10] KVM: nVMX: Immediately refresh APICv controls as needed on nested VM-Exit
` [PATCH v3 03/10] KVM: selftests: Add a test to verify APICv updates (while L2 is active)
` [PATCH v3 04/10] KVM: nVMX: Switch to vmcs01 to update PML controls on-demand if L2 is active
` [PATCH v3 05/10] KVM: nVMX: Switch to vmcs01 to update TPR threshold "
` [PATCH v3 06/10] KVM: nVMX: Switch to vmcs01 to update SVI "
` [PATCH v3 07/10] KVM: nVMX: Switch to vmcs01 to refresh APICv controls "
` [PATCH v3 08/10] KVM: nVMX: Switch to vmcs01 to update APIC page "
` [PATCH v3 09/10] KVM: nVMX: Switch to vmcs01 to set virtual APICv mode "
` [PATCH v3 10/10] KVM: x86: Update APICv ISR (a.k.a. SVI) as part of kvm_apic_update_apicv()
[PATCH v2 1/1] KVM: VMX: configure SVI during runtime APICv activation
2025-12-05 18:27 UTC (8+ messages)
[PATCH 0/7] KVM: x86: Improve the handling of debug exceptions during instruction emulation
2025-12-05 18:23 UTC (11+ messages)
` [PATCH 2/7] KVM: x86: Check guest debug in DR access "
` [PATCH 4/7] KVM: x86: Consolidate KVM_GUESTDBG_SINGLESTEP check into the kvm_inject_emulated_db()
` [PATCH 5/7] KVM: VMX: Set 'BS' bit in pending debug exceptions during instruction emulation
` [PATCH 6/7] KVM: selftests: Verify guest debug DR7.GD checking "
` [PATCH 7/7] KVM: selftests: Verify 'BS' bit checking in pending debug exception during VM entry
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox