public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2026-01-08 06:14:09 to 2026-01-09 10:07:34 UTC [more...]

[PATCH] Add query-tdx-capabilities
 2026-01-09 10:07 UTC  (6+ messages)

[PATCH net-next v7 0/9] tun/tap & vhost-net: apply qdisc backpressure on full ptr_ring to reduce TX drops
 2026-01-09  9:57 UTC  (24+ messages)
` [PATCH net-next v7 2/9] ptr_ring: add helper to detect newly freed space on consume
` [PATCH net-next v7 3/9] tun/tap: add ptr_ring consume helper with netdev queue wakeup
` [PATCH net-next v7 7/9] vhost-net: vhost-net: replace rx_ring with tun/tap ring wrappers
` [PATCH net-next v7 9/9] tun/tap & vhost-net: avoid ptr_ring tail-drop when qdisc is present

[PATCH v3 00/24] KVM: TDX huge page support for private memory
 2026-01-09  9:18 UTC  (16+ messages)
` [PATCH v3 01/24] x86/tdx: Enhance tdh_mem_page_aug() to support huge pages

[PATCH 0/5] i386: Add support for CPUID 0x80000026 and Bus Lock Detect
 2026-01-09  9:03 UTC  (8+ messages)
` [PATCH 1/5] i386: Implement CPUID 0x80000026
` [PATCH 2/5] i386: Add CPU property x-force-cpuid-0x80000026

[PATCH v4 0/5] KVM: selftests: Alignment fixes and arm64 MMU cleanup
 2026-01-09  8:22 UTC  (6+ messages)
` [PATCH v4 1/5] KVM: arm64: selftests: Disable unused TTBR1_EL1 translations
` [PATCH v4 2/5] KVM: arm64: selftests: Fix incorrect rounding in page_align()
` [PATCH v4 3/5] KVM: riscv: "
` [PATCH v4 4/5] KVM: selftests: Move page_align() to shared header
` [PATCH v4 5/5] KVM: selftests: Fix typos and stale comments in kvm_util

[PATCH v9 0/5] target/i386/kvm/pmu: PMU Enhancement, Bugfix and Cleanup
 2026-01-09  7:54 UTC  (6+ messages)
` [PATCH v9 1/5] target/i386/kvm: set KVM_PMU_CAP_DISABLE if "-pmu" is configured
` [PATCH v9 2/5] target/i386/kvm: extract unrelated code out of kvm_x86_build_cpuid()
` [PATCH v9 3/5] target/i386/kvm: rename architectural PMU variables
` [PATCH v9 4/5] target/i386/kvm: reset AMD PMU registers during VM reset
` [PATCH v9 5/5] target/i386/kvm: support perfmon-v2 for reset

[PATCH v2 0/5] Support the FEAT_HDBSS introduced in Armv9.5
 2026-01-09  7:52 UTC  (6+ messages)
` [PATCH v2 4/5] KVM: arm64: Enable HDBSS support and handle HDBSSF events

[PATCH v4] RISC-V: KVM: Transparent huge page support
 2026-01-09  7:09 UTC  (2+ messages)

[PATCH v3 0/4] KVM: nVMX: Disallow access to vmcs12 fields that aren't supported by "hardware"
 2026-01-09  4:15 UTC  (5+ messages)
` [PATCH v3 1/4] KVM: nVMX: Setup VMX MSRs on loading CPU during nested_vmx_hardware_setup()
` [PATCH v3 2/4] KVM: VMX: Add a wrapper around ROL16() to get a vmcs12 from a field encoding
` [PATCH v3 3/4] KVM: nVMX: Disallow access to vmcs12 fields that aren't supported by "hardware"
` [PATCH v3 4/4] KVM: nVMX: Remove explicit filtering of GUEST_INTR_STATUS from shadow VMCS fields

[PATCH v2] KVM: SVM: Fix an off-by-one typo in the comment for enabling AVIC by default
 2026-01-09  3:50 UTC 

[PATCH v4 0/8] KVM: VMX: Rip out "deferred nested VM-Exit updates"
 2026-01-09  3:45 UTC  (9+ messages)
` [PATCH v4 1/8] KVM: selftests: Add a test to verify APICv updates (while L2 is active)
` [PATCH v4 2/8] KVM: nVMX: Switch to vmcs01 to update PML controls on-demand if L2 is active
` [PATCH v4 3/8] KVM: nVMX: Switch to vmcs01 to update TPR threshold "
` [PATCH v4 4/8] KVM: nVMX: Switch to vmcs01 to update SVI "
` [PATCH v4 5/8] KVM: nVMX: Switch to vmcs01 to refresh APICv controls "
` [PATCH v4 6/8] KVM: nVMX: Switch to vmcs01 to update APIC page "
` [PATCH v4 7/8] KVM: nVMX: Switch to vmcs01 to set virtual APICv mode "
` [PATCH v4 8/8] KVM: x86: Update APICv ISR (a.k.a. SVI) as part of kvm_apic_update_apicv()

[PATCH 0/2] KVM: SVM: Drop SEV-ES DebugSwap module param
 2026-01-09  3:31 UTC  (3+ messages)
` [PATCH 1/2] KVM: SVM: Drop the module param to control SEV-ES DebugSwap
` [PATCH 2/2] KVM: SVM: Tag sev_supported_vmsa_features as read-only after init

[PATCH] KVM: x86: Ignore -EBUSY when checking nested events from vcpu_block()
 2026-01-09  3:06 UTC 

[PATCH kvmtool 00/15] arm64: Handle PSCI calls in userspace
 2026-01-09  2:36 UTC  (8+ messages)
` [PATCH kvmtool v4 01/15] Allow pausing the VM from vcpu thread
` [PATCH kvmtool v4 15/15] arm64: smccc: Start sending PSCI to userspace

[PATCH v4 00/16] TDX: Enable Dynamic PAMT
 2026-01-09  2:18 UTC  (11+ messages)
` [PATCH v4 04/16] x86/virt/tdx: Allocate page bitmap for "

[PATCH] vfio: selftests: Add vfio_dma_mapping_mmio_test
 2026-01-09  0:54 UTC  (18+ messages)

[PATCH 3/3] vfio: selftests: Add iommufd hwpt replace test
 2026-01-09  0:42 UTC  (2+ messages)

[PATCH v6 00/44] KVM: x86: Add support for mediated vPMUs
 2026-01-09  0:29 UTC  (5+ messages)
` [PATCH v6 39/44] KVM: VMX: Bug the VM if either MSR auto-load list is full

[PATCH v3 0/4] KVM: SVM: GIF and EFER.SVME are independent
 2026-01-08 22:17 UTC  (5+ messages)
` [PATCH v3 1/4] KVM: SVM: Allow KVM_SET_NESTED_STATE to clear GIF when SVME==0

[PATCH v3 00/62] KVM: iommu: Overhaul device posted IRQs support
 2026-01-08 21:53 UTC  (6+ messages)
` [PATCH v3 38/62] KVM: SVM: Take and hold ir_list_lock across IRTE updates in IOMMU
    ` possible deadlock due to irq_set_thread_affinity() calling into the scheduler (was Re: [PATCH v3 38/62] KVM: SVM: Take and hold ir_list_lock across IRTE updates in IOMMU)

[PATCH v3 0/6] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
 2026-01-08 21:46 UTC  (7+ messages)
` [PATCH v3 1/6] KVM: SVM: Fix a missing kunmap_local() in sev_gmem_post_populate()
` [PATCH v3 2/6] KVM: guest_memfd: Remove partial hugepage handling from kvm_gmem_populate()
` [PATCH v3 3/6] KVM: guest_memfd: Remove preparation tracking
` [PATCH v3 4/6] KVM: SEV: Document/enforce page-alignment for KVM_SEV_SNP_LAUNCH_UPDATE
` [PATCH v3 5/6] KVM: TDX: Document alignment requirements for KVM_TDX_INIT_MEM_REGION
` [PATCH v3 6/6] KVM: guest_memfd: GUP source pages prior to populating guest memory

[PATCH v2 0/6] vfio: selftest: Add SR-IOV UAPI test
 2026-01-08 21:47 UTC  (13+ messages)
` [PATCH v2 2/6] vfio: selftests: Introduce a sysfs lib
` [PATCH v2 3/6] vfio: selftests: Extend container/iommufd setup for passing vf_token
` [PATCH v2 4/6] vfio: selftests: Export more vfio_pci functions
` [PATCH v2 5/6] vfio: selftests: Add helper to set/override a vf_token

[PATCH v2 0/5] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
 2026-01-08 21:38 UTC  (4+ messages)
` [PATCH v2 2/5] KVM: guest_memfd: Remove preparation tracking

[PATCH 0/2] x86/virt/tdx: Print TDX module version to dmesg
 2026-01-08 20:49 UTC  (12+ messages)
` [PATCH 1/2] x86/virt/tdx: Retrieve TDX module version
` [PATCH 2/2] x86/virt/tdx: Print TDX module version during init

[PATCH v4 00/21] KVM: selftests: Add Nested NPT support
 2026-01-08 20:33 UTC  (10+ messages)
` [PATCH v4 21/21] KVM: selftests: Test READ=>WRITE dirty logging behavior for shadow MMU

[PATCH v2 0/4] x86, fpu/kvm: fix crash with AMX
 2026-01-08 20:26 UTC  (8+ messages)
` [PATCH 1/4] x86/fpu: Clear XSTATE_BV[i] in save state whenever XFD[i]=1
` [PATCH 2/4] selftests: kvm: replace numbered sync points with actions

[PATCH v1 0/2] Register device memory for poison handling
 2026-01-08 19:21 UTC  (5+ messages)
` [PATCH v1 1/2] mm: add stubs for PFNMAP memory failure registration functions
` [PATCH v1 2/2] vfio/nvgrace-gpu: register device memory for poison handling

[kvmtool PATCH v5 00/15] arm64: Handle PSCI calls in userspace
 2026-01-08 17:57 UTC  (16+ messages)
` [kvmtool PATCH v5 01/15] Allow pausing the VM from vcpu thread
` [kvmtool PATCH v5 02/15] update_headers: arm64: Track psci.h for PSCI definitions
` [kvmtool PATCH v5 03/15] update headers: Linux v6.18
` [kvmtool PATCH v5 04/15] Import arm-smccc.h from "
` [kvmtool PATCH v5 05/15] arm64: Stash kvm_vcpu_init for later use
` [kvmtool PATCH v5 06/15] arm64: Use KVM_SET_MP_STATE ioctl to power off non-boot vCPUs
` [kvmtool PATCH v5 07/15] arm64: Expose ARM64_CORE_REG() for general use
` [kvmtool PATCH v5 08/15] arm64: Add support for finding vCPU for given MPIDR
` [kvmtool PATCH v5 09/15] arm64: Add skeleton implementation for PSCI
` [kvmtool PATCH v5 10/15] arm64: psci: Implement CPU_SUSPEND
` [kvmtool PATCH v5 11/15] arm64: psci: Implement CPU_ON
` [kvmtool PATCH v5 12/15] arm64: psci: Implement AFFINITY_INFO
` [kvmtool PATCH v5 13/15] arm64: psci: Implement MIGRATE_INFO_TYPE
` [kvmtool PATCH v5 14/15] arm64: psci: Implement SYSTEM_{OFF,RESET}
` [kvmtool PATCH v5 15/15] arm64: smccc: Start sending PSCI to userspace

[PATCH v4 0/9] KVM: arm64: Add support for FEAT_IDST
 2026-01-08 17:32 UTC  (10+ messages)
` [PATCH v4 1/9] arm64: Repaint ID_AA64MMFR2_EL1.IDS description
` [PATCH v4 2/9] KVM: arm64: Add trap routing for GMID_EL1
` [PATCH v4 3/9] KVM: arm64: Add a generic synchronous exception injection primitive
` [PATCH v4 4/9] KVM: arm64: Handle FEAT_IDST for sysregs without specific handlers
` [PATCH v4 5/9] KVM: arm64: Handle CSSIDR2_EL1 and SMIDR_EL1 in a generic way
` [PATCH v4 6/9] KVM: arm64: Force trap of GMID_EL1 when the guest doesn't have MTE
` [PATCH v4 7/9] KVM: arm64: pkvm: Add a generic synchronous exception injection primitive
` [PATCH v4 8/9] KVM: arm64: pkvm: Report optional ID register traps with a 0x18 syndrome
` [PATCH v4 9/9] KVM: arm64: selftests: Add a test for FEAT_IDST

[PATCH] KVM: SVM: Fix an off-by-one typo in the comment for enabling AVIC by default
 2026-01-08 17:06 UTC  (3+ messages)

[PATCH v2 00/36] KVM: arm64: Introduce vGIC-v5 with PPI support
 2026-01-08 16:57 UTC  (43+ messages)
` [PATCH v2 01/36] KVM: arm64: Account for RES1 bits in DECLARE_FEAT_MAP() and co
` [PATCH v2 07/36] KVM: arm64: gic: Introduce interrupt type helpers
` [PATCH v2 08/36] KVM: arm64: Introduce kvm_call_hyp_nvhe_res()
` [PATCH v2 11/36] KVM: arm64: gic-v5: Support GICv5 FGTs & FGUs
` [PATCH v2 10/36] KVM: arm64: gic-v5: Sanitize ID_AA64PFR2_EL1.GCIE
` [PATCH v2 13/36] KVM: arm64: gic: Set vgic_model before initing private IRQs
` [PATCH v2 15/36] KVM: arm64: gic-v5: Implement GICv5 load/put and save/restore
` [PATCH v2 19/36] KVM: arm64: gic-v5: Check for pending PPIs
` [PATCH v2 18/36] KVM: arm64: gic-v5: Implement PPI interrupt injection
` [PATCH v2 21/36] KVM: arm64: gic-v5: Finalize GICv5 PPIs and generate mask
` [PATCH v2 23/36] KVM: arm64: gic-v5: Support GICv5 interrupts with KVM_IRQ_LINE
` [PATCH v2 24/36] KVM: arm64: gic-v5: Create, init vgic_v5

[PATCH v9 00/30] KVM: arm64: Implement support for SME
 2026-01-08 16:42 UTC  (18+ messages)
` [PATCH v9 02/30] arm64/fpsimd: Update FA64 and ZT0 enables when loading SME state
` [PATCH v9 06/30] KVM: arm64: Pay attention to FFR parameter in SVE save and load
` [PATCH v9 07/30] KVM: arm64: Pull ctxt_has_ helpers to start of sysreg-sr.h
` [PATCH v9 08/30] KVM: arm64: Move SVE state access macros after feature test macros
` [PATCH v9 09/30] KVM: arm64: Rename SVE finalization constants to be more general
` [PATCH v9 10/30] KVM: arm64: Document the KVM ABI for SME

[PATCH v2 00/15] fix DMA aligment issues around virtio
 2026-01-08 14:45 UTC  (17+ messages)
` [PATCH v2 07/15] vsock/virtio: fix DMA alignment for event_list
` [PATCH v2 08/15] vsock/virtio: use virtqueue_add_inbuf_cache_clean for events
` [PATCH v2 13/15] vsock/virtio: reorder fields to reduce padding
  ` [PATCH v2 03/15] dma-mapping: add DMA_ATTR_CPU_CACHE_CLEAN
  ` [PATCH v2 04/15] docs: dma-api: document DMA_ATTR_CPU_CACHE_CLEAN

[PATCH net v4 0/4] vsock/virtio: fix TX credit handling
 2026-01-08 11:27 UTC  (3+ messages)

[PATCH 0/2] vsock/virtio: Fix data loss/disclosure due to joining of non-linear skb in RX queue
 2026-01-08  9:58 UTC  (4+ messages)
` [PATCH 1/2] vsock/virtio: Coalesce only linear skb
` [PATCH 2/2] vsock/test: Add test for a linear and non-linear skb getting coalesced

[PATCH] KVM: x86: Disallow setting CPUID and/or feature MSRs if L2 is active
 2026-01-08  7:59 UTC  (4+ messages)

[PATCH 2/2] monitor/hmp: Reduce target-specific definitions
 2026-01-08  7:42 UTC  (2+ messages)

[RFC PATCH 00/14] Support multiple KVM modules on the same host
 2026-01-08  6:55 UTC  (6+ messages)

[PATCH v6 00/27] hw/i386/pc: Remove deprecated 2.6 and 2.7 PC machines
 2026-01-08  6:14 UTC  (3+ messages)
` [PATCH v6 14/27] hw/i386: Assume fw_cfg DMA is always enabled


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox