public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2026-01-08 17:59:04 to 2026-01-09 20:00:45 UTC [more...]

[PATCH v2 0/2] x86/virt/tdx: Print TDX module version to dmesg
 2026-01-09 20:00 UTC  (4+ messages)
` [PATCH v2 1/2] x86/virt/tdx: Retrieve TDX module version
` [PATCH v2 2/2] x86/virt/tdx: Print TDX module version during init

[BUG] KVM: hung task during vCPU destruction in kvm_clear_async_pf_completion_queue()
 2026-01-09 19:45 UTC 

[PATCH v5 0/5] KVM: x86: allow DEBUGCTL.DEBUGCTLMSR_FREEZE_IN_SMM passthrough
 2026-01-09 19:33 UTC  (6+ messages)
` [PATCH v5 3/5] KVM: nVMX: check vmcs12->guest_ia32_debugctl value given by L2

[PATCH v2 0/6] vfio: selftest: Add SR-IOV UAPI test
 2026-01-09 19:05 UTC  (16+ messages)
` [PATCH v2 2/6] vfio: selftests: Introduce a sysfs lib
` [PATCH v2 3/6] vfio: selftests: Extend container/iommufd setup for passing vf_token
` [PATCH v2 4/6] vfio: selftests: Export more vfio_pci functions
` [PATCH v2 5/6] vfio: selftests: Add helper to set/override a vf_token
` [PATCH v2 6/6] vfio: selftests: Add tests to validate SR-IOV UAPI

[PATCH v3 00/24] KVM: TDX huge page support for private memory
 2026-01-09 18:29 UTC  (21+ messages)
` [PATCH v3 01/24] x86/tdx: Enhance tdh_mem_page_aug() to support huge pages

[PATCH v9 00/30] KVM: arm64: Implement support for SME
 2026-01-09 18:01 UTC  (15+ messages)
` [PATCH v9 11/30] KVM: arm64: Define internal features "
` [PATCH v9 12/30] KVM: arm64: Rename sve_state_reg_region
` [PATCH v9 13/30] KVM: arm64: Store vector lengths in an array
` [PATCH v9 14/30] KVM: arm64: Implement SME vector length configuration
` [PATCH v9 15/30] KVM: arm64: Support SME control registers
` [PATCH v9 16/30] KVM: arm64: Support TPIDR2_EL0
` [PATCH v9 17/30] KVM: arm64: Support SME identification registers for guests

[PATCH] vfio: selftests: Add vfio_dma_mapping_mmio_test
 2026-01-09 18:01 UTC  (20+ messages)

[PATCH v3 0/6] igvm: Supply MADT via IGVM parameter
 2026-01-09 17:37 UTC  (8+ messages)
` [PATCH v3 1/6] hw/acpi: Make BIOS linker optional
` [PATCH v3 2/6] hw/acpi: Add standalone function to build MADT
` [PATCH v3 3/6] igvm: Add missing NULL check
` [PATCH v3 4/6] igvm: Add common function for finding parameter entries
` [PATCH v3 5/6] igvm: Pass machine state to IGVM file processing
` [PATCH v3 6/6] igvm: Fill MADT IGVM parameter field

[PATCH kvmtool 00/15] arm64: Handle PSCI calls in userspace
 2026-01-09 17:14 UTC  (7+ messages)
` [PATCH kvmtool v4 15/15] arm64: smccc: Start sending PSCI to userspace

[PATCH v3 00/36] KVM: arm64: Introduce vGIC-v5 with PPI support
 2026-01-09 17:04 UTC  (37+ messages)
` [PATCH v3 01/36] KVM: arm64: Account for RES1 bits in DECLARE_FEAT_MAP() and co
` [PATCH v3 03/36] arm64/sysreg: Drop ICH_HFGRTR_EL2.ICC_HAPR_EL1 and make RES1
` [PATCH v3 02/36] KVM: arm64: gic-v3: Switch vGIC-v3 to use generated ICH_VMCR_EL2
` [PATCH v3 05/36] arm64/sysreg: Add GICR CDNMIA encoding
` [PATCH v3 04/36] arm64/sysreg: Add remaining GICv5 ICC_ & ICH_ sysregs for KVM support
` [PATCH v3 06/36] KVM: arm64: gic: Set vgic_model before initing private IRQs
` [PATCH v3 08/36] KVM: arm64: gic: Introduce interrupt type helpers
` [PATCH v3 07/36] KVM: arm64: gic-v5: Add ARM_VGIC_V5 device to KVM headers
` [PATCH v3 09/36] KVM: arm64: gic-v5: Add Arm copyright header
` [PATCH v3 11/36] KVM: arm64: gic-v5: Sanitize ID_AA64PFR2_EL1.GCIE
` [PATCH v3 12/36] KVM: arm64: gic-v5: Support GICv5 FGTs & FGUs
` [PATCH v3 10/36] KVM: arm64: gic-v5: Detect implemented PPIs on boot
` [PATCH v3 13/36] KVM: arm64: gic-v5: Add emulation for ICC_IAFFIDR_EL1 accesses
` [PATCH v3 14/36] KVM: arm64: gic-v5: Add vgic-v5 save/restore hyp interface
` [PATCH v3 15/36] KVM: arm64: gic-v5: Implement GICv5 load/put and save/restore
` [PATCH v3 16/36] KVM: arm64: gic-v5: Implement direct injection of PPIs
` [PATCH v3 17/36] KVM: arm64: gic-v5: Finalize GICv5 PPIs and generate mask
` [PATCH v3 18/36] KVM: arm64: gic: Introduce queue_irq_unlock and set_pending_state to irq_ops
` [PATCH v3 20/36] KVM: arm64: gic-v5: Init Private IRQs (PPIs) for GICv5
` [PATCH v3 19/36] KVM: arm64: gic-v5: Implement PPI interrupt injection
` [PATCH v3 23/36] KVM: arm64: gic-v5: Support GICv5 interrupts with KVM_IRQ_LINE
` [PATCH v3 22/36] KVM: arm64: gic-v5: Trap and mask guest ICC_PPI_ENABLERx_EL1 writes
` [PATCH v3 21/36] KVM: arm64: gic-v5: Check for pending PPIs
` [PATCH v3 26/36] KVM: arm64: gic-v5: Bump arch timer for GICv5
` [PATCH v3 25/36] KVM: arm64: gic-v5: Reset vcpu state
` [PATCH v3 24/36] KVM: arm64: gic-v5: Create, init vgic_v5
` [PATCH v3 27/36] KVM: arm64: gic-v5: Mandate architected PPI for PMU emulation on GICv5
` [PATCH v3 30/36] KVM: arm64: gic-v5: Introduce kvm_arm_vgic_v5_ops and register them
` [PATCH v3 29/36] KVM: arm64: gic-v5: Hide FEAT_GCIE from NV GICv5 guests
` [PATCH v3 28/36] KVM: arm64: gic: Hide GICv5 for protected guests
` [PATCH v3 34/36] Documentation: KVM: Introduce documentation for VGICv5
` [PATCH v3 33/36] KVM: arm64: gic-v5: Probe for GICv5 device
` [PATCH v3 31/36] KVM: arm64: gic-v5: Set ICH_VCTLR_EL2.En on boot
` [PATCH v3 32/36] irqchip/gic-v5: Check if impl is virt capable
` [PATCH v3 35/36] KVM: arm64: selftests: Introduce a minimal GICv5 PPI selftest
` [PATCH v3 36/36] KVM: arm64: gic-v5: Communicate userspace-driveable PPIs via a UAPI

[PATCH v2 00/36] KVM: arm64: Introduce vGIC-v5 with PPI support
 2026-01-09 17:00 UTC  (16+ messages)
` [PATCH v2 02/36] KVM: arm64: gic-v3: Switch vGIC-v3 to use generated ICH_VMCR_EL2
` [PATCH v2 22/36] KVM: arm64: gic-v5: Trap and mask guest PPI register accesses
` [PATCH v2 26/36] KVM: arm64: gic-v5: Bump arch timer for GICv5
` [PATCH v2 33/36] KVM: arm64: gic-v5: Probe for GICv5 device
` [PATCH v2 36/36] KVM: arm64: gic-v5: Communicate userspace-drivable PPIs via a UAPI

[PATCH 0/2] vsock/virtio: Fix data loss/disclosure due to joining of non-linear skb in RX queue
 2026-01-09 16:32 UTC  (5+ messages)
` [PATCH 1/2] vsock/virtio: Coalesce only linear skb
` [PATCH 2/2] vsock/test: Add test for a linear and non-linear skb getting coalesced

[PATCH v4 00/16] TDX: Enable Dynamic PAMT
 2026-01-09 16:05 UTC  (12+ messages)
` [PATCH v4 04/16] x86/virt/tdx: Allocate page bitmap for "

[PATCH v3 0/4] KVM: nVMX: Disallow access to vmcs12 fields that aren't supported by "hardware"
 2026-01-09 15:17 UTC  (10+ messages)
` [PATCH v3 1/4] KVM: nVMX: Setup VMX MSRs on loading CPU during nested_vmx_hardware_setup()
` [PATCH v3 2/4] KVM: VMX: Add a wrapper around ROL16() to get a vmcs12 from a field encoding
` [PATCH v3 3/4] KVM: nVMX: Disallow access to vmcs12 fields that aren't supported by "hardware"
` [PATCH v3 4/4] KVM: nVMX: Remove explicit filtering of GUEST_INTR_STATUS from shadow VMCS fields

[PATCH v4] irqchip/riscv-imsic: Adjust the number of available guest irq files
 2026-01-09 12:32 UTC  (3+ messages)

[PATCH] Add query-tdx-capabilities
 2026-01-09 12:26 UTC  (9+ messages)

[PATCH v2 0/5] x86: Cleanups around slow_down_io()
 2026-01-09 12:07 UTC  (2+ messages)

[PATCH 0/5] i386: Add support for CPUID 0x80000026 and Bus Lock Detect
 2026-01-09 11:41 UTC  (9+ messages)
` [PATCH 1/5] i386: Implement CPUID 0x80000026
` [PATCH 2/5] i386: Add CPU property x-force-cpuid-0x80000026

[PATCH net-next v7 0/9] tun/tap & vhost-net: apply qdisc backpressure on full ptr_ring to reduce TX drops
 2026-01-09 10:14 UTC  (25+ messages)
` [PATCH net-next v7 2/9] ptr_ring: add helper to detect newly freed space on consume
` [PATCH net-next v7 3/9] tun/tap: add ptr_ring consume helper with netdev queue wakeup
` [PATCH net-next v7 7/9] vhost-net: vhost-net: replace rx_ring with tun/tap ring wrappers
` [PATCH net-next v7 9/9] tun/tap & vhost-net: avoid ptr_ring tail-drop when qdisc is present

[PATCH v4 0/5] KVM: selftests: Alignment fixes and arm64 MMU cleanup
 2026-01-09  8:22 UTC  (6+ messages)
` [PATCH v4 1/5] KVM: arm64: selftests: Disable unused TTBR1_EL1 translations
` [PATCH v4 2/5] KVM: arm64: selftests: Fix incorrect rounding in page_align()
` [PATCH v4 3/5] KVM: riscv: "
` [PATCH v4 4/5] KVM: selftests: Move page_align() to shared header
` [PATCH v4 5/5] KVM: selftests: Fix typos and stale comments in kvm_util

[PATCH v9 0/5] target/i386/kvm/pmu: PMU Enhancement, Bugfix and Cleanup
 2026-01-09  7:54 UTC  (6+ messages)
` [PATCH v9 1/5] target/i386/kvm: set KVM_PMU_CAP_DISABLE if "-pmu" is configured
` [PATCH v9 2/5] target/i386/kvm: extract unrelated code out of kvm_x86_build_cpuid()
` [PATCH v9 3/5] target/i386/kvm: rename architectural PMU variables
` [PATCH v9 4/5] target/i386/kvm: reset AMD PMU registers during VM reset
` [PATCH v9 5/5] target/i386/kvm: support perfmon-v2 for reset

[PATCH v2 0/5] Support the FEAT_HDBSS introduced in Armv9.5
 2026-01-09  7:52 UTC  (6+ messages)
` [PATCH v2 4/5] KVM: arm64: Enable HDBSS support and handle HDBSSF events

[PATCH v4] RISC-V: KVM: Transparent huge page support
 2026-01-09  7:09 UTC  (2+ messages)

[PATCH v2] KVM: SVM: Fix an off-by-one typo in the comment for enabling AVIC by default
 2026-01-09  3:50 UTC 

[PATCH v4 0/8] KVM: VMX: Rip out "deferred nested VM-Exit updates"
 2026-01-09  3:45 UTC  (9+ messages)
` [PATCH v4 1/8] KVM: selftests: Add a test to verify APICv updates (while L2 is active)
` [PATCH v4 2/8] KVM: nVMX: Switch to vmcs01 to update PML controls on-demand if L2 is active
` [PATCH v4 3/8] KVM: nVMX: Switch to vmcs01 to update TPR threshold "
` [PATCH v4 4/8] KVM: nVMX: Switch to vmcs01 to update SVI "
` [PATCH v4 5/8] KVM: nVMX: Switch to vmcs01 to refresh APICv controls "
` [PATCH v4 6/8] KVM: nVMX: Switch to vmcs01 to update APIC page "
` [PATCH v4 7/8] KVM: nVMX: Switch to vmcs01 to set virtual APICv mode "
` [PATCH v4 8/8] KVM: x86: Update APICv ISR (a.k.a. SVI) as part of kvm_apic_update_apicv()

[PATCH 0/2] KVM: SVM: Drop SEV-ES DebugSwap module param
 2026-01-09  3:31 UTC  (3+ messages)
` [PATCH 1/2] KVM: SVM: Drop the module param to control SEV-ES DebugSwap
` [PATCH 2/2] KVM: SVM: Tag sev_supported_vmsa_features as read-only after init

[PATCH] KVM: x86: Ignore -EBUSY when checking nested events from vcpu_block()
 2026-01-09  3:06 UTC 

[PATCH 3/3] vfio: selftests: Add iommufd hwpt replace test
 2026-01-09  0:42 UTC  (2+ messages)

[PATCH v6 00/44] KVM: x86: Add support for mediated vPMUs
 2026-01-09  0:29 UTC  (5+ messages)
` [PATCH v6 39/44] KVM: VMX: Bug the VM if either MSR auto-load list is full

[PATCH v3 0/4] KVM: SVM: GIF and EFER.SVME are independent
 2026-01-08 22:17 UTC  (5+ messages)
` [PATCH v3 1/4] KVM: SVM: Allow KVM_SET_NESTED_STATE to clear GIF when SVME==0

[PATCH v3 00/62] KVM: iommu: Overhaul device posted IRQs support
 2026-01-08 21:53 UTC  (6+ messages)
` [PATCH v3 38/62] KVM: SVM: Take and hold ir_list_lock across IRTE updates in IOMMU
    ` possible deadlock due to irq_set_thread_affinity() calling into the scheduler (was Re: [PATCH v3 38/62] KVM: SVM: Take and hold ir_list_lock across IRTE updates in IOMMU)

[PATCH v3 0/6] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
 2026-01-08 21:46 UTC  (7+ messages)
` [PATCH v3 1/6] KVM: SVM: Fix a missing kunmap_local() in sev_gmem_post_populate()
` [PATCH v3 2/6] KVM: guest_memfd: Remove partial hugepage handling from kvm_gmem_populate()
` [PATCH v3 3/6] KVM: guest_memfd: Remove preparation tracking
` [PATCH v3 4/6] KVM: SEV: Document/enforce page-alignment for KVM_SEV_SNP_LAUNCH_UPDATE
` [PATCH v3 5/6] KVM: TDX: Document alignment requirements for KVM_TDX_INIT_MEM_REGION
` [PATCH v3 6/6] KVM: guest_memfd: GUP source pages prior to populating guest memory

[PATCH v2 0/5] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
 2026-01-08 21:38 UTC  (4+ messages)
` [PATCH v2 2/5] KVM: guest_memfd: Remove preparation tracking

[PATCH 0/2] x86/virt/tdx: Print TDX module version to dmesg
 2026-01-08 20:49 UTC  (11+ messages)
` [PATCH 1/2] x86/virt/tdx: Retrieve TDX module version
` [PATCH 2/2] x86/virt/tdx: Print TDX module version during init

[PATCH v4 00/21] KVM: selftests: Add Nested NPT support
 2026-01-08 20:33 UTC  (10+ messages)
` [PATCH v4 21/21] KVM: selftests: Test READ=>WRITE dirty logging behavior for shadow MMU

[PATCH v2 0/4] x86, fpu/kvm: fix crash with AMX
 2026-01-08 20:26 UTC  (5+ messages)
` [PATCH 2/4] selftests: kvm: replace numbered sync points with actions

[PATCH v1 0/2] Register device memory for poison handling
 2026-01-08 19:21 UTC  (4+ messages)
` [PATCH v1 2/2] vfio/nvgrace-gpu: register "

[kvmtool PATCH v5 00/15] arm64: Handle PSCI calls in userspace
 2026-01-08 17:57 UTC  (12+ messages)
` [kvmtool PATCH v5 05/15] arm64: Stash kvm_vcpu_init for later use
` [kvmtool PATCH v5 06/15] arm64: Use KVM_SET_MP_STATE ioctl to power off non-boot vCPUs
` [kvmtool PATCH v5 07/15] arm64: Expose ARM64_CORE_REG() for general use
` [kvmtool PATCH v5 08/15] arm64: Add support for finding vCPU for given MPIDR
` [kvmtool PATCH v5 09/15] arm64: Add skeleton implementation for PSCI
` [kvmtool PATCH v5 10/15] arm64: psci: Implement CPU_SUSPEND
` [kvmtool PATCH v5 11/15] arm64: psci: Implement CPU_ON
` [kvmtool PATCH v5 12/15] arm64: psci: Implement AFFINITY_INFO
` [kvmtool PATCH v5 13/15] arm64: psci: Implement MIGRATE_INFO_TYPE
` [kvmtool PATCH v5 14/15] arm64: psci: Implement SYSTEM_{OFF,RESET}
` [kvmtool PATCH v5 15/15] arm64: smccc: Start sending PSCI to userspace


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox