public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2026-01-28 01:34:37 to 2026-01-29 03:03:32 UTC [more...]

[PATCH v2] KVM: x86/mmu: move reused pages to the top of active_mmu_pages
 2026-01-29  3:02 UTC 

[PATCH v2 0/3] KVM: x86: CET vs. nVMX fix and hardening
 2026-01-29  2:55 UTC  (5+ messages)
` [PATCH v2 1/3] KVM: x86: Explicitly configure supported XSS from {svm,vmx}_set_cpu_caps()
` [PATCH v2 2/3] KVM: x86: Harden against unexpected adjustments to kvm_cpu_caps
` [PATCH v2 3/3] KVM: VMX: Print out "bad" offsets+value on VMCS config mismatch

[PATCH] KVM: LoongArch: selftests: Add steal time test case
 2026-01-29  2:18 UTC 

[PATCH v3 00/26] Runtime TDX Module update support
 2026-01-29  1:51 UTC  (44+ messages)
` [PATCH v3 01/26] x86/virt/tdx: Print SEAMCALL leaf numbers in decimal
` [PATCH v3 02/26] x86/virt/tdx: Use %# prefix for hex values in SEAMCALL error messages
` [PATCH v3 03/26] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v3 04/26] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v3 05/26] coco/tdx-host: Expose TDX Module version
` [PATCH v3 06/26] x86/virt/tdx: Prepare to support P-SEAMLDR SEAMCALLs
` [PATCH v3 07/26] x86/virt/seamldr: Introduce a wrapper for "
` [PATCH v3 08/26] x86/virt/seamldr: Retrieve P-SEAMLDR information
` [PATCH v3 09/26] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v3 10/26] coco/tdx-host: Implement FW_UPLOAD sysfs ABI for TDX Module updates
` [PATCH v3 13/26] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v3 24/26] x86/virt/seamldr: Extend sigstruct to 16KB

[PATCH v4 00/16] TDX: Enable Dynamic PAMT
 2026-01-29  1:19 UTC  (5+ messages)
` [PATCH v4 07/16] x86/virt/tdx: Add tdx_alloc/free_page() helpers

[RFC PATCH v5 00/45] TDX: Dynamic PAMT + S-EPT Hugepage
 2026-01-29  1:15 UTC  (46+ messages)
` [RFC PATCH v5 01/45] x86/tdx: Use pg_level in TDX APIs, not the TDX-Module's 0-based level
` [RFC PATCH v5 02/45] KVM: x86/mmu: Update iter->old_spte if cmpxchg64 on mirror SPTE "fails"
` [RFC PATCH v5 03/45] KVM: TDX: Account all non-transient page allocations for per-TD structures
` [RFC PATCH v5 04/45] KVM: x86: Make "external SPTE" ops that can fail RET0 static calls
` [RFC PATCH v5 05/45] KVM: TDX: Drop kvm_x86_ops.link_external_spt(), use .set_external_spte() for all
` [RFC PATCH v5 06/45] KVM: x86/mmu: Fold set_external_spte_present() into its sole caller
` [RFC PATCH v5 07/45] KVM: x86/mmu: Plumb the SPTE _pointer_ into the TDP MMU's handle_changed_spte()
` [RFC PATCH v5 08/45] KVM: x86/mmu: Propagate mirror SPTE removal to S-EPT in handle_changed_spte()
` [RFC PATCH v5 09/45] KVM: x86: Rework .free_external_spt() into .reclaim_external_sp()
` [RFC PATCH v5 10/45] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [RFC PATCH v5 11/45] x86/tdx: Add helpers to check return status codes
` [RFC PATCH v5 12/45] x86/virt/tdx: Simplify tdmr_get_pamt_sz()
` [RFC PATCH v5 13/45] x86/virt/tdx: Allocate page bitmap for Dynamic PAMT
` [RFC PATCH v5 14/45] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC PATCH v5 15/45] x86/virt/tdx: Improve PAMT refcounts allocation for sparse memory
` [RFC PATCH v5 16/45] x86/virt/tdx: Add tdx_alloc/free_control_page() helpers
` [RFC PATCH v5 17/45] x86/virt/tdx: Optimize "
` [RFC PATCH v5 18/45] KVM: TDX: Allocate PAMT memory for TD and vCPU control structures
` [RFC PATCH v5 19/45] KVM: Allow owner of kvm_mmu_memory_cache to provide a custom page allocator
` [RFC PATCH v5 20/45] KVM: x86/mmu: Allocate/free S-EPT pages using tdx_{alloc,free}_control_page()
` [RFC PATCH v5 21/45] x86/tdx: Add APIs to support get/put of DPAMT entries from KVM, under spinlock
` [RFC PATCH v5 22/45] KVM: TDX: Get/put PAMT pages when (un)mapping private memory
` [RFC PATCH v5 23/45] x86/virt/tdx: Enable Dynamic PAMT
` [RFC PATCH v5 24/45] Documentation/x86: Add documentation for TDX's "
` [RFC PATCH v5 25/45] *** DO NOT MERGE *** x86/virt/tdx: Don't assume guest memory is backed by struct page
` [RFC PATCH v5 26/45] x86/virt/tdx: Enhance tdh_mem_page_aug() to support huge pages
` [RFC PATCH v5 27/45] x86/virt/tdx: Enhance tdh_phymem_page_wbinvd_hkid() to invalidate "
` [RFC PATCH v5 28/45] x86/virt/tdx: Extend "reset page" quirk to support "
` [RFC PATCH v5 29/45] x86/virt/tdx: Get/Put DPAMT page pair if and only if mapping size is 4KB
` [RFC PATCH v5 30/45] x86/virt/tdx: Add API to demote a 2MB mapping to 512 4KB mappings
` [RFC PATCH v5 31/45] KVM: x86/mmu: Prevent hugepage promotion for mirror roots in fault path
` [RFC PATCH v5 32/45] KVM: x86/mmu: Plumb the old_spte into kvm_x86_ops.set_external_spte()
` [RFC PATCH v5 33/45] KVM: TDX: Hoist tdx_sept_remove_private_spte() above set_private_spte()
` [RFC PATCH v5 34/45] KVM: TDX: Handle removal of leaf SPTEs in .set_private_spte()
` [RFC PATCH v5 35/45] KVM: TDX: Add helper to handle mapping leaf SPTE into S-EPT
` [RFC PATCH v5 36/45] KVM: TDX: Move S-EPT page demotion TODO to tdx_sept_set_private_spte()
` [RFC PATCH v5 37/45] KVM: x86/tdp_mmu: Alloc external_spt page for mirror page table splitting
` [RFC PATCH v5 38/45] KVM: x86/mmu: Add Dynamic PAMT support in TDP MMU for vCPU-induced page split
` [RFC PATCH v5 39/45] KVM: TDX: Add core support for splitting/demoting 2MiB S-EPT to 4KiB
` [RFC PATCH v5 40/45] KVM: x86: Introduce hugepage_set_guest_inhibit()
` [RFC PATCH v5 41/45] KVM: TDX: Honor the guest's accept level contained in an EPT violation
` [RFC PATCH v5 42/45] KVM: guest_memfd: Add helpers to get start/end gfns give gmem+slot+pgoff
` [RFC PATCH v5 43/45] *** DO NOT MERGE *** KVM: guest_memfd: Add pre-zap arch hook for shared<=>private conversion
` [RFC PATCH v5 44/45] KVM: x86/mmu: Add support for splitting S-EPT hugepages on conversion
` [RFC PATCH v5 45/45] KVM: TDX: Turn on PG_LEVEL_2M

[RFC PATCH v1 00/37] guest_memfd: In-place conversion support
 2026-01-29  1:16 UTC  (12+ messages)
` [RFC PATCH v1 01/37] KVM: guest_memfd: Introduce per-gmem attributes, use to guard user mappings
` [RFC PATCH v1 05/37] KVM: guest_memfd: Wire up kvm_get_memory_attributes() to per-gmem attributes

[PATCH net-next v7 0/9] tun/tap & vhost-net: apply qdisc backpressure on full ptr_ring to reduce TX drops
 2026-01-29  1:14 UTC  (13+ messages)
` [PATCH net-next v7 3/9] tun/tap: add ptr_ring consume helper with netdev queue wakeup

[PATCH 0/2] KVM: SEV: Add support for IBPB-on-Entry
 2026-01-29  0:38 UTC  (7+ messages)
` [PATCH 1/2] KVM: SEV: IBPB-on-Entry guest support
` [PATCH 2/2] KVM: SEV: Add support for IBPB-on-Entry

[PATCH 0/6] KVM: x86/pmu: Add support for AMD HG_ONLY bits
 2026-01-28 23:47 UTC  (7+ messages)
` [PATCH 4/6] KVM: x86/pmu: [De]activate HG_ONLY PMCs at SVME changes and nested transitions
` [PATCH 6/6] KVM: selftests: x86: Add svm_pmu_hg_test for HG_ONLY bits

[PATCH V2 00/11] target/i386: Misc PMU, PEBS, and MSR fixes and improvements
 2026-01-28 23:09 UTC  (12+ messages)
` [PATCH V2 01/11] target/i386: Disable unsupported BTS for guest
` [PATCH V2 02/11] target/i386: Don't save/restore PERF_GLOBAL_OVF_CTRL MSR
` [PATCH V2 03/11] target/i386: Gate enable_pmu on kvm_enabled()
` [PATCH V2 04/11] target/i386: Support full-width writes for perf counters
` [PATCH V2 05/11] target/i386: Increase MSR_BUF_SIZE and split KVM_[GET/SET]_MSRS calls
` [PATCH V2 06/11] target/i386: Save/Restore DS based PEBS specfic MSRs
` [PATCH V2 07/11] target/i386: Make some PEBS features user-visible
` [PATCH V2 08/11] target/i386: Clean up LBR format handling
` [PATCH V2 09/11] target/i386: Refactor "
` [PATCH V2 10/11] target/i386: Add pebs-fmt CPU option
` [PATCH V2 11/11] target/i386: Disable guest PEBS capability when not enabled

[PATCH] KVM: nSVM: Expose SVM DecodeAssists to guest hypervisors
 2026-01-28 23:15 UTC  (2+ messages)

[PATCH v3 00/24] KVM: TDX huge page support for private memory
 2026-01-28 22:49 UTC  (13+ messages)
` [PATCH v3 02/24] x86/virt/tdx: Add SEAMCALL wrapper tdh_mem_page_demote()
` [PATCH v3 06/24] KVM: x86/mmu: Disallow page merging (huge page adjustment) for mirror root
` [PATCH v3 07/24] KVM: x86/tdp_mmu: Introduce split_external_spte() under write mmu_lock
` [PATCH v3 16/24] KVM: guest_memfd: Split for punch hole and private-to-shared conversion

[RFC PATCH 00/19] x86,fs/resctrl: Support for Global Bandwidth Enforcement and Priviledge Level Zero Association
 2026-01-28 22:03 UTC  (10+ messages)
` [RFC PATCH 13/19] x86/resctrl: Add PLZA state tracking and context switch handling
          `  "
` [RFC PATCH 16/19] fs/resctrl: Implement rdtgroup_plza_write() to configure PLZA in a group

[PATCH v6] KVM: x86: Add x2APIC "features" to control EOI broadcast suppression
 2026-01-28 21:10 UTC  (14+ messages)

[PATCH v6 0/1] KVM: SEV: Add KVM_SEV_SNP_HV_REPORT_REQ command
 2026-01-28 20:35 UTC  (4+ messages)
` [PATCH v6 1/1] "

[PATCH v2 15/15] gpio: virtio: reorder fields to reduce struct padding
 2026-01-28 20:31 UTC  (2+ messages)
` [PATCH v3 15/15] vsock/virtio: reorder fields to reduce padding

[PATCH] vfio: selftests: fix format conversion compiler warning
 2026-01-28 19:21 UTC  (4+ messages)

[PATCH v4 00/36] KVM: arm64: Introduce vGIC-v5 with PPI support
 2026-01-28 18:08 UTC  (37+ messages)
` [PATCH v4 01/36] KVM: arm64: Account for RES1 bits in DECLARE_FEAT_MAP() and co
` [PATCH v4 02/36] KVM: arm64: gic-v3: Switch vGIC-v3 to use generated ICH_VMCR_EL2
` [PATCH v4 03/36] arm64/sysreg: Drop ICH_HFGRTR_EL2.ICC_HAPR_EL1 and make RES1
` [PATCH v4 04/36] arm64/sysreg: Add remaining GICv5 ICC_ & ICH_ sysregs for KVM support
` [PATCH v4 05/36] arm64/sysreg: Add GICR CDNMIA encoding
` [PATCH v4 06/36] KVM: arm64: gic: Set vgic_model before initing private IRQs
` [PATCH v4 07/36] KVM: arm64: gic-v5: Add ARM_VGIC_V5 device to KVM headers
` [PATCH v4 08/36] KVM: arm64: gic: Introduce interrupt type helpers
` [PATCH v4 09/36] KVM: arm64: gic-v5: Add Arm copyright header
` [PATCH v4 10/36] KVM: arm64: gic-v5: Detect implemented PPIs on boot
` [PATCH v4 11/36] KVM: arm64: gic-v5: Sanitize ID_AA64PFR2_EL1.GCIE
` [PATCH v4 12/36] KVM: arm64: gic-v5: Support GICv5 FGTs & FGUs
` [PATCH v4 13/36] KVM: arm64: gic-v5: Add emulation for ICC_IAFFIDR_EL1 accesses
` [PATCH v4 14/36] KVM: arm64: gic-v5: Add vgic-v5 save/restore hyp interface
` [PATCH v4 15/36] KVM: arm64: gic-v5: Implement GICv5 load/put and save/restore
` [PATCH v4 16/36] KVM: arm64: gic-v5: Implement direct injection of PPIs
` [PATCH v4 17/36] KVM: arm64: gic-v5: Finalize GICv5 PPIs and generate mask
` [PATCH v4 18/36] KVM: arm64: gic: Introduce queue_irq_unlock to irq_ops
` [PATCH v4 19/36] KVM: arm64: gic-v5: Implement PPI interrupt injection
` [PATCH v4 20/36] KVM: arm64: gic-v5: Init Private IRQs (PPIs) for GICv5
` [PATCH v4 21/36] KVM: arm64: gic-v5: Check for pending PPIs
` [PATCH v4 22/36] KVM: arm64: gic-v5: Trap and mask guest ICC_PPI_ENABLERx_EL1 writes
` [PATCH v4 23/36] KVM: arm64: gic-v5: Support GICv5 interrupts with KVM_IRQ_LINE
` [PATCH v4 24/36] KVM: arm64: gic-v5: Create and initialise vgic_v5
` [PATCH v4 25/36] KVM: arm64: gic-v5: Reset vcpu state
` [PATCH v4 26/36] KVM: arm64: gic-v5: Bump arch timer for GICv5
` [PATCH v4 27/36] KVM: arm64: gic-v5: Mandate architected PPI for PMU emulation on GICv5
` [PATCH v4 28/36] KVM: arm64: gic: Hide GICv5 for protected guests
` [PATCH v4 29/36] KVM: arm64: gic-v5: Hide FEAT_GCIE from NV GICv5 guests
` [PATCH v4 30/36] KVM: arm64: gic-v5: Introduce kvm_arm_vgic_v5_ops and register them
` [PATCH v4 31/36] KVM: arm64: gic-v5: Set ICH_VCTLR_EL2.En on boot
` [PATCH v4 32/36] irqchip/gic-v5: Check if impl is virt capable
` [PATCH v4 33/36] KVM: arm64: gic-v5: Probe for GICv5 device
` [PATCH v4 34/36] Documentation: KVM: Introduce documentation for VGICv5
` [PATCH v4 35/36] KVM: arm64: selftests: Introduce a minimal GICv5 PPI selftest
` [PATCH v4 36/36] KVM: arm64: gic-v5: Communicate userspace-driveable PPIs via a UAPI

[PATCH 00/20] KVM: arm64: Generalise RESx handling
 2026-01-28 17:43 UTC  (3+ messages)
` [PATCH 12/20] KVM: arm64: Add RESx_WHEN_E2Hx constraints as configuration flags

[PATCH v3 00/36] KVM: arm64: Introduce vGIC-v5 with PPI support
 2026-01-28 17:31 UTC  (10+ messages)
` [PATCH v3 02/36] KVM: arm64: gic-v3: Switch vGIC-v3 to use generated ICH_VMCR_EL2
` [PATCH v3 10/36] KVM: arm64: gic-v5: Detect implemented PPIs on boot
` [PATCH v3 15/36] KVM: arm64: gic-v5: Implement GICv5 load/put and save/restore

[PATCH 0/3] KVM: arm64: Reschedule as needed when destroying the stage-2 page-tables
 2026-01-28 16:47 UTC  (2+ messages)

[PATCH 0/3] KVM: SVM: Set PFERR_GUEST_{PAGE,FINAL}_MASK for nested NPF and add selftest
 2026-01-28 15:48 UTC  (5+ messages)
` [PATCH 1/3] KVM: SVM: Fix nested NPF injection to set PFERR_GUEST_{PAGE,FINAL}_MASK

[PATCH] RISC-V: KVM: Skip IMSIC update if vCPU IMSIC state is not initialized
 2026-01-28 15:08 UTC  (2+ messages)

[PATCH] RISC-V: KVM: Fix null pointer dereference in kvm_riscv_aia_imsic_rw_attr()
 2026-01-28 15:08 UTC  (2+ messages)

[PATCH v10 01/15] set_memory: set_direct_map_* to take address
 2026-01-28 12:18 UTC  (2+ messages)

[RFC PATCH RESEND 0/5] amd_iommu: support up to 2048 MSI vectors per IRT
 2026-01-28 11:23 UTC  (7+ messages)
` [RFC PATCH RESEND 3/5] amd-iommu: Add support for set/unset IOMMU for VFIO PCI devices
` [RFC PATCH RESEND 5/5] amd_iommu: Add support for upto 2048 interrupts per IRT

[RFC PATCH] powerpc: iommu: Initial IOMMUFD support for PPC64
 2026-01-28 10:53 UTC  (2+ messages)

[PATCH v2 0/3] LoongArch: KVM: Add FPU delay load support
 2026-01-28  7:38 UTC  (5+ messages)
` [PATCH v2 3/3] "

[PATCH 0/4] LoongArch: KVM: Code cleanup about feature detect
 2026-01-28  3:03 UTC  (5+ messages)
` [PATCH 1/4] LoongArch: KVM: Move feature detection in function kvm_vm_init_features
` [PATCH 2/4] LoongArch: KVM: Add msgint registers in function kvm_init_gcsr_flag
` [PATCH 3/4] LoongArch: KVM: Check VM msgint feature during interrupt handling
` [PATCH 4/4] LoongArch: KVM: Add register LOONGARCH_CSR_IPR during vCPU context switch

[PATCH 0/2] KVM: x86: Plug an intra-guest Spectre v2 hole
 2026-01-28  1:34 UTC  (3+ messages)
` [PATCH 1/2] KVM: x86: Defer IBPBs for vCPU and nested transitions until core run loop
` [PATCH 2/2] KVM: x86: Emit IBPB on pCPU migration if IBPB is advertised to guest


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox