public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-12-12 08:17:21 to 2025-12-15 19:28:29 UTC [more...]

[PATCH] KVM: SVM: Fix redundant updates of LBR MSR intercepts
 2025-12-15 19:27 UTC  (9+ messages)
` [PATCH v3 00/26] Nested SVM fixes, cleanups, and hardening
` [PATCH v3 01/26] KVM: SVM: Switch svm_copy_lbrs() to a macro
` [PATCH v3 02/26] KVM: SVM: Add missing save/restore handling of LBR MSRs
` [PATCH v3 03/26] KVM: selftests: Add a test for LBR save/restore (ft. nested)
` [PATCH v3 04/26] KVM: nSVM: Always inject a #GP if mapping VMCB12 fails on nested VMRUN
` [PATCH v3 05/26] KVM: nSVM: Triple fault if mapping VMCB12 fails on nested #VMEXIT
` [PATCH v3 06/26] KVM: nSVM: Triple fault if restore host CR3 "
` [PATCH v3 07/26] KVM: nSVM: Drop nested_vmcb_check_{save/control}() wrappers

[PATCH v3] KVM: SVM: Don't allow L1 intercepts for instructions not advertised
 2025-12-15 19:25 UTC 

[PATCH v2] KVM: SVM: Don't allow L1 intercepts for instructions not advertised
 2025-12-15 18:51 UTC  (2+ messages)

[PATCH v3 00/16] Add Nested NPT support in selftests
 2025-12-15 18:38 UTC  (3+ messages)
` [PATCH v3 09/16] KVM: selftests: Stop passing VMX metadata to TDP mapping functions

[PATCH v2 00/13] Nested SVM fixes, cleanups, and hardening
 2025-12-15 18:34 UTC  (26+ messages)
` [PATCH v2 04/13] KVM: nSVM: Fix consistency checks for NP_ENABLE
` [PATCH v2 10/13] KVM: nSVM: Restrict mapping VMCB12 on nested VMRUN
` [PATCH v2 11/13] KVM: nSVM: Simplify nested_svm_vmrun()

[PATCH v5 19/24] KVM: arm64: Implement lazy PMU context swaps
 2025-12-15 18:06 UTC  (3+ messages)

[PATCH v6 0/9] VMSCAPE optimization for BHI variant
 2025-12-15 18:01 UTC  (11+ messages)
` [PATCH v6 2/9] x86/bhi: Make clear_bhb_loop() effective on newer CPUs
` [PATCH v6 6/9] x86/vmscape: Use static_call() for predictor flush

[PATCH v5 21/24] KVM: arm64: Inject recorded guest interrupts
 2025-12-15 17:50 UTC  (3+ messages)

[PATCH 00/32] KVM: arm64: Introduce vGIC-v5 with PPI support
 2025-12-15 17:37 UTC  (48+ messages)
` [PATCH 02/32] KVM: arm64: gic-v3: Switch vGIC-v3 to use generated ICH_VMCR_EL2
` [PATCH 01/32] KVM: arm64: Account for RES1 bits in DECLARE_FEAT_MAP() and co
` [PATCH 04/32] arm64/sysreg: Add remaining GICv5 ICC_ & ICH_ sysregs for KVM support
` [PATCH 03/32] arm64/sysreg: Drop ICH_HFGRTR_EL2.ICC_HAPR_EL1 and make RES1
` [PATCH 05/32] arm64/sysreg: Add GICR CDNMIA encoding
` [PATCH 08/32] KVM: arm64: gic-v5: Sanitize ID_AA64PFR2_EL1.GCIE
` [PATCH 07/32] KVM: arm64: gic: Introduce interrupt type helpers
` [PATCH 06/32] KVM: arm64: gic-v5: Add ARM_VGIC_V5 device to KVM headers
` [PATCH 10/32] KVM: arm64: gic-v5: Add emulation for ICC_IAFFID_EL1 accesses
` [PATCH 09/32] KVM: arm64: gic-v5: Compute GICv5 FGTs on vcpu load
` [PATCH 11/32] KVM: arm64: gic-v5: Trap and emulate ICH_PPI_HMRx_EL1 accesses
` [PATCH 13/32] KVM: arm64: gic-v5: Add vgic-v5 save/restore hyp interface
` [PATCH 12/32] KVM: arm64: gic: Set vgic_model before initing private IRQs
` [PATCH 14/32] KVM: arm64: gic-v5: Implement GICv5 load/put and save/restore
` [PATCH 16/32] KVM: arm64: gic: Introduce irq_queue and set_pending_state to irq_ops
` [PATCH 15/32] KVM: arm64: gic-v5: Implement direct injection of PPIs
` [PATCH 18/32] KVM: arm64: gic-v5: Check for pending PPIs
` [PATCH 19/32] KVM: arm64: gic-v5: Init Private IRQs (PPIs) for GICv5
` [PATCH 17/32] KVM: arm64: gic-v5: Implement PPI interrupt injection
` [PATCH 20/32] KVM: arm64: gic-v5: Support GICv5 interrupts with KVM_IRQ_LINE
` [PATCH 21/32] KVM: arm64: gic-v5: Create, init vgic_v5
` [PATCH 22/32] KVM: arm64: gic-v5: Reset vcpu state
` [PATCH 24/32] KVM: arm64: gic-v5: Mandate architected PPI for PMU emulation on GICv5
` [PATCH 23/32] KVM: arm64: gic-v5: Bump arch timer for GICv5
` [PATCH 27/32] KVM: arm64: gic-v5: Introduce kvm_arm_vgic_v5_ops and register them
` [PATCH 28/32] KVM: arm64: gic-v5: Set ICH_VCTLR_EL2.En on boot
` [PATCH 26/32] KVM: arm64: gic-v5: Hide FEAT_GCIE from NV GICv5 guests
` [PATCH 25/32] KVM: arm64: gic: Hide GICv5 for protected guests
` [PATCH 30/32] KVM: arm64: gic-v5: Probe for GICv5 device
` [PATCH 29/32] irqchip/gic-v5: Check if impl is virt capable
` [PATCH 32/32] KVM: arm64: selftests: Introduce a minimal GICv5 PPI selftest
` [PATCH 31/32] Documentation: KVM: Introduce documentation for VGICv5

[PATCH v2 0/5] KVM: selftests: Alignment fixes and arm64 MMU cleanup
 2025-12-15 16:51 UTC  (6+ messages)
` [PATCH v2 1/5] KVM: arm64: selftests: Disable unused TTBR1_EL1 translations
` [PATCH v2 2/5] KVM: arm64: selftests: Fix incorrect rounding in page_align()
` [PATCH v2 3/5] KVM: riscv: "
` [PATCH v2 4/5] KVM: selftests: Move page_align() to shared header
` [PATCH v2 5/5] KVM: selftests: Fix typos and stale comments in kvm_util

[PATCH v1 0/5] KVM: selftests: Alignment fixes and arm64 MMU cleanup
 2025-12-15 15:55 UTC  (6+ messages)
` [PATCH v1 1/5] KVM: arm64: selftests: Disable unused TTBR1_EL1 translations
` [PATCH v1 2/5] KVM: arm64: selftests: Fix incorrect rounding in page_align()
` [PATCH v1 3/5] KVM: riscv: "
` [PATCH v1 4/5] KVM: selftests: Move page_align() to shared header
` [PATCH v1 5/5] KVM: selftests: Fix typos and stale comments in kvm_util

[PATCH v2 0/5] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
 2025-12-15 15:34 UTC  (6+ messages)
` [PATCH v2 1/5] KVM: guest_memfd: Remove partial hugepage handling from kvm_gmem_populate()
` [PATCH v2 2/5] KVM: guest_memfd: Remove preparation tracking
` [PATCH v2 3/5] KVM: SEV: Document/enforce page-alignment for KVM_SEV_SNP_LAUNCH_UPDATE
` [PATCH v2 4/5] KVM: TDX: Document alignment requirements for KVM_TDX_INIT_MEM_REGION
` [PATCH v2 5/5] KVM: guest_memfd: GUP source pages prior to populating guest memory

[PATCH v2 0/4] LongArch: KVM: Add AVEC support irqchip in kernel
 2025-12-15 15:34 UTC  (3+ messages)
` [PATCH v2 1/4] LongArch: KVM: Add some maccros for AVEC

[PATCH 0/4] Clean up TSAN warnings
 2025-12-15 14:52 UTC  (8+ messages)
` [PATCH 1/4] apic: Resize APICBASE
` [PATCH 2/4] thread-pool: Fix thread race
` [PATCH 3/4] qmp: "
` [PATCH 4/4] apic: Make apicbase accesses atomic to fix data race

[PATCH v3] KVM: SEV: Add KVM_SEV_SNP_HV_REPORT_REQ command
 2025-12-15 14:09 UTC 

[PATCH net v3] vsock/virtio: cap TX credit to local buffer size
 2025-12-15 14:15 UTC  (12+ messages)

[PATCH v3] KVM: SEV: Add KVM_SEV_SNP_HV_REPORT_REQ command
 2025-12-15 14:14 UTC 

[PATCH net-next v12 00/12] vsock: add namespace support to vhost-vsock and loopback
 2025-12-15 14:11 UTC  (8+ messages)
` [PATCH net-next v12 04/12] vsock: add netns support to virtio transports

[RESEND PATCH] vfio/pci: Skip hot reset on Link-Down
 2025-12-15 12:30 UTC 

[PATCH v11 RESEND 0/9] support FEAT_LSUI
 2025-12-15  9:56 UTC  (12+ messages)
` [PATCH v11 RESEND 1/9] arm64: cpufeature: add FEAT_LSUI
` [PATCH v11 RESEND 2/9] KVM: arm64: expose FEAT_LSUI to guest
` [PATCH v11 RESEND 3/9] KVM: arm64: kselftest: set_id_regs: add test for FEAT_LSUI
` [PATCH v11 RESEND 4/9] arm64: Kconfig: Detect toolchain support for LSUI
` [PATCH v11 RESEND 5/9] arm64: futex: refactor futex atomic operation
` [PATCH v11 RESEND 6/9] arm64: futex: support futex with FEAT_LSUI
` [PATCH v11 RESEND 7/9] arm64: separate common LSUI definitions into lsui.h
` [PATCH v11 RESEND 8/9] arm64: armv8_deprecated: convert user_swpX to inline function
` [PATCH v11 RESEND 9/9] arm64: armv8_deprecated: apply FEAT_LSUI for swpX emulation

[PATCH v4 00/21] paravirt: cleanup and reorg
 2025-12-15  8:27 UTC  (2+ messages)

[PATCH 0/5] x86: Cleanups around slow_down_io()
 2025-12-15  6:36 UTC  (3+ messages)

[PATCH v2] KVM: x86: Don't read guest CR3 when doing async pf while the MMU is direct
 2025-12-15  2:30 UTC  (5+ messages)

Status of "Drop nested support for CPUs without NRIPS" patch
 2025-12-14 16:08 UTC 

[PATCH net-next v4] net: restore the iterator to its original state when an error occurs
 2025-12-14  2:49 UTC  (3+ messages)

[PATCH 0/7] KVM: x86: Improve the handling of debug exceptions during instruction emulation
 2025-12-13 16:15 UTC  (8+ messages)
` [PATCH 4/7] KVM: x86: Consolidate KVM_GUESTDBG_SINGLESTEP check into the kvm_inject_emulated_db()

[PATCH] KVM: SVM: Don't allow L1 intercepts for instructions not advertised
 2025-12-13 16:11 UTC  (3+ messages)

[kvm-unit-tests PATCH 0/4] riscv: sbi: Add support to test PMU extension
 2025-12-13 15:08 UTC  (5+ messages)
` [kvm-unit-tests PATCH 1/4] lib: riscv: Add SBI PMU CSRs and enums
` [kvm-unit-tests PATCH 2/4] lib: riscv: Add SBI PMU support
` [kvm-unit-tests PATCH 3/4] lib: riscv: Add SBI PMU helper functions
` [kvm-unit-tests PATCH 4/4] riscv: sbi: Add tests for PMU extension

[PATCH v3 0/4] LongArch: KVM: Add AVEC support irqchip in kernel
 2025-12-13 12:39 UTC  (2+ messages)

[PATCH v2 0/3] mm: fixup pfnmap memory failure handling
 2025-12-13  8:00 UTC  (5+ messages)
` [PATCH v2 1/3] mm: fixup pfnmap memory failure handling to use pgoff
` [PATCH v2 2/3] mm: add stubs for PFNMAP memory failure registration functions
` [PATCH v2 3/3] vfio/nvgrace-gpu: register device memory for poison handling

[PATCH v1 0/3] mm: fixup pfnmap memory failure handling
 2025-12-13  4:52 UTC  (4+ messages)
` [PATCH v1 3/3] vfio/nvgrace-gpu: register device memory for poison handling

[PATCH v5 22/24] KVM: arm64: Add KVM_CAP to partition the PMU
 2025-12-12 22:59 UTC  (2+ messages)

[PATCH v4 0/3] VMM can handle guest SEA via KVM_EXIT_ARM_SEA
 2025-12-12 22:42 UTC  (6+ messages)
` [PATCH v4 2/3] KVM: selftests: Test for KVM_EXIT_ARM_SEA

[PATCH v5 20/24] perf: arm_pmuv3: Handle IRQs for Partitioned PMU guest counters
 2025-12-12 22:36 UTC  (2+ messages)

[PATCH v5 18/24] KVM: arm64: Enforce PMU event filter at vcpu_load()
 2025-12-12 21:59 UTC  (2+ messages)

[PATCH v5 17/24] KVM: arm64: Context swap Partitioned PMU guest registers
 2025-12-12 21:57 UTC  (2+ messages)

[PATCH v5 16/24] KVM: arm64: Account for partitioning in PMCR_EL0 access
 2025-12-12 21:31 UTC  (2+ messages)

[PATCH v5 15/24] KVM: arm64: Setup MDCR_EL2 to handle a partitioned PMU
 2025-12-12 21:22 UTC  (2+ messages)

[PATCH v5 13/24] KVM: arm64: Writethrough trapped PMOVS register
 2025-12-12 21:06 UTC  (2+ messages)

[PATCH v5 12/24] KVM: arm64: Use physical PMSELR for PMXEVTYPER if partitioned
 2025-12-12 20:54 UTC  (2+ messages)

[PATCH v5 10/24] KVM: arm64: Set up FGT for Partitioned PMU
 2025-12-12 20:51 UTC  (2+ messages)

[PATCH v5 09/24] perf: arm_pmuv3: Keep out of guest counter partition
 2025-12-12 20:29 UTC  (2+ messages)

[PATCH v5 11/24] KVM: arm64: Writethrough trapped PMEVTYPER register
 2025-12-12 20:27 UTC  (2+ messages)

[PATCH v5 01/24] arm64: cpufeature: Add cpucap for HPMN0
 2025-12-12 19:22 UTC  (2+ messages)

[PATCH v2 0/7] KVM: x86/tdx: Have TDX handle VMXON during bringup
 2025-12-12 18:56 UTC  (4+ messages)
` [PATCH v2 3/7] KVM: x86/tdx: Do VMXON and TDX-Module initialization during subsys init

[PATCH v2 0/6] vfio: selftest: Add SR-IOV UAPI test
 2025-12-12 18:27 UTC  (5+ messages)
` [PATCH v2 2/6] vfio: selftests: Introduce a sysfs lib
` [PATCH v2 6/6] vfio: selftests: Add tests to validate SR-IOV UAPI

[PATCH v3 00/10] KVM: VMX: Fix APICv activation bugs
 2025-12-12 18:01 UTC  (4+ messages)
` [PATCH v3 03/10] KVM: selftests: Add a test to verify APICv updates (while L2 is active)

[kvm-unit-tests PATCH v4 00/11] arm64: EL2 support
 2025-12-12 16:03 UTC  (4+ messages)
` [kvm-unit-tests PATCH v4 11/11] arm64: add EL2 environment variable

[PATCH v2 0/6] KVM: arm64: VTCR_EL2 conversion to feature dependency framework
 2025-12-12 16:00 UTC  (5+ messages)
` [PATCH v2 6/6] KVM: arm64: Honor UX/PX attributes for EL2 S1 mappings

[PATCH v1 01/28] i386/kvm: avoid installing duplicate msr entries in msr_handlers
 2025-12-12 15:03 UTC  (18+ messages)
` [PATCH v1 04/28] accel/kvm: add changes required to support KVM VM file descriptor change
` [PATCH v1 05/28] accel/kvm: mark guest state as unprotected after vm "
` [PATCH v1 06/28] accel/kvm: add a notifier to indicate KVM VM file descriptor has changed
` [PATCH v1 07/28] kvm/i386: implement architecture support for kvm file descriptor change
` [PATCH v1 09/28] kvm/i386: reload firmware for confidential guest reset
` [PATCH v1 10/28] accel/kvm: Add notifier to inform that the KVM VM file fd is about to be changed
` [PATCH v1 11/28] accel/kvm: rebind current VCPUs to the new KVM VM file descriptor upon reset
` [PATCH v1 12/28] i386/tdx: refactor TDX firmware memory initialization code into a new function
` [PATCH v1 13/28] i386/tdx: finalize TDX guest state upon reset
` [PATCH v1 14/28] i386/tdx: add a pre-vmfd change notifier to reset tdx state
` [PATCH v1 15/28] i386/sev: add migration blockers only once
` [PATCH v1 16/28] i386/sev: add notifiers "
` [PATCH v1 17/28] i386/sev: free existing launch update data and kernel hashes data on init
` [PATCH v1 18/28] i386/sev: add support for confidential guest reset
` [PATCH v1 22/28] accel/kvm: add a per-confidential class callback to unlock guest state
` [PATCH v1 23/28] kvm/xen-emu: re-initialize capabilities during confidential guest reset
` [PATCH v1 26/28] kvm/vcpu: add notifiers to inform vcpu file descriptor change

[PATCH 0/1] Clean up TSAN warnings
 2025-12-12 11:20 UTC  (3+ messages)
` [PATCH 1/1] qemu: TSAN Clean up

[PATCH v2] KVM: SEV: Add KVM_SEV_SNP_HV_REPORT_REQ command
 2025-12-12 10:19 UTC  (5+ messages)

[PATCH v4] KVM: x86: Add x2APIC "features" to control EOI broadcast suppression
 2025-12-12  8:30 UTC  (8+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox