public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2026-04-09 05:51:47 to 2026-04-10 05:08:56 UTC [more...]

[PATCH] KVM: SVM: Fix page overflow in sev_dbg_crypt() for ENCRYPT path
 2026-04-10  5:08 UTC 

[PATCH v2 1/1] vfio/nvgrace-gpu: Add Blackwell-Next GPU readiness check via CXL DVSEC
 2026-04-10  4:40 UTC  (4+ messages)

[PATCH v4 0/6] KVM: x86/pmu: Add support for AMD Host-Only/Guest-Only bits
 2026-04-10  3:50 UTC  (10+ messages)
` [PATCH v4 4/6] KVM: x86/pmu: Re-evaluate Host-Only/Guest-Only on nested SVM transitions

[PATCH v2 00/16] fs,x86/resctrl: Add kernel-mode (e.g., PLZA) support to the resctrl subsystem
 2026-04-10  3:41 UTC  (20+ messages)

[PATCH 0/2] x86/tdx: Fix memory hotplug in TDX guests
 2026-04-10  1:05 UTC  (16+ messages)
` [PATCH 2/2] x86/tdx: Accept hotplugged memory before online

[PATCH 0/7] KVM: VMX/SVM: use the same SPEC_CTRL assembly code
 2026-04-10  0:16 UTC  (8+ messages)
` [PATCH 2/7] KVM: VMX: more cleanups to __vmx_vcpu_run
` [PATCH 7/7] KVM: VMX: replace vmx_spec_ctrl_restore_host with RESTORE_HOST_SPEC_CTRL_BODY

[PATCH 00/11] KVM: x86: Clean up kvm_<reg>_{read,write}() mess
 2026-04-09 23:56 UTC  (12+ messages)
` [PATCH 01/11] KVM: SVM: Truncate INVLPGA address in compatibility mode
` [PATCH 02/11] KVM: x86/xen: Bug the VM if 32-bit KVM observes a 64-bit mode hypercall
` [PATCH 03/11] KVM: x86/xen: Don't truncate RAX when handling hypercall from protected guest
` [PATCH 04/11] KVM: VMX: Read 32-bit GPR values for ENCLS instructions outside of 64-bit mode
` [PATCH 05/11] KVM: x86: Trace hypercall register *after* truncating values for 32-bit
` [PATCH 06/11] KVM: x86: Move kvm_<reg>_{read,write}() definitions to x86.h
` [PATCH 07/11] KVM: x86: Add mode-aware versions of kvm_<reg>_{read,write}() helpers
` [PATCH 08/11] KVM: x86: Drop non-raw kvm_<reg>_write() helpers
` [PATCH 09/11] KVM: nSVM: Use kvm_rax_read() now that it's mode-aware
` [PATCH 10/11] Revert "KVM: VMX: Read 32-bit GPR values for ENCLS instructions outside of 64-bit mode"
` [PATCH 11/11] KVM: x86: Harden is_64_bit_hypercall() against bugs on 32-bit kernels

[PATCH v9 02/10] x86/bhi: Make clear_bhb_loop() effective on newer CPUs
 2026-04-09 23:48 UTC  (17+ messages)

[PATCH v2 0/6] KVM: x86: Reg cleanups / prep work for APX
 2026-04-09 22:42 UTC  (7+ messages)
` [PATCH v2 1/6] KVM: x86: Add dedicated storage for guest RIP
` [PATCH v2 2/6] KVM: x86: Drop the "EX" part of "EXREG" to avoid collision with APX
` [PATCH v2 3/6] KVM: nVMX: Do a bitwise-AND of regs_avail when switching active VMCS
` [PATCH v2 4/6] KVM: x86: Add wrapper APIs to reset dirty/available register masks
` [PATCH v2 5/6] KVM: x86: Track available/dirty register masks as "unsigned long" values
` [PATCH v2 6/6] KVM: x86: Use a proper bitmap for tracking available/dirty registers

[PATCH 0/3] KVM: SVM: Fix x2AVIC MSR interception mess
 2026-04-09 22:24 UTC  (4+ messages)
` [PATCH 1/3] KVM: SVM: Disable x2AVIC RDMSR interception for MSRs KVM actually supports
` [PATCH 2/3] KVM: SVM: Always intercept RDMSR for TMCCT (current APIC timer count)
` [PATCH 3/3] KVM: SVM: Only disable x2AVIC WRMSR interception for MSRs that are accelerated

[PATCH] KVM: Drop kvm_vcpu.ready to squash race where "ready" can get stuck "true"
 2026-04-09 21:33 UTC 

[PATCH v2 0/5] Revoke supported SEV VM types
 2026-04-09 21:17 UTC  (3+ messages)
` [PATCH v2 4/5] KVM: SEV: mask off firmware unsupported vm types

[RFC PATCH v1] x86/split_lock: Provide KVM helper to log guest bus lock exits
 2026-04-09 20:56 UTC  (4+ messages)

[REGRESSION 6.19, BISECTED] KVM: x86: kvmclock rate-limit removal causes IPI storm and high guest steal time
 2026-04-09 19:21 UTC  (7+ messages)
` [PATCH v1] KVM: x86: Rate-limit global clock updates on vCPU load
    ` [PATCH v2] "

[PATCH 0/3] KVM, vfio: remove exported KVM symbols
 2026-04-09 18:59 UTC  (9+ messages)
` [PATCH 1/3] VFIO: take reference to the KVM module
` [PATCH 2/3] KVM, vfio: remove symbol_get(kvm_get_kvm_safe) from vfio
` [PATCH 3/3] KVM, vfio: remove symbol_get(kvm_put_kvm) "

[PATCH 00/21] Fixes and lock cleanup+hardening
 2026-04-09 18:48 UTC  (4+ messages)
` [PATCH 12/21] KVM: SEV: WARN on unhandled VM type when initializing VM

[PATCH 00/61] treewide: Use IS_ERR_OR_NULL over manual NULL check - refactor
 2026-04-09 18:16 UTC  (2+ messages)

[PATCH v4 00/15] mm, kvm: allow uffd support in guest_memfd
 2026-04-09 17:18 UTC  (7+ messages)
` [PATCH v4 07/15] userfaultfd: introduce vm_uffd_ops
` [PATCH v4 13/15] KVM: guest_memfd: implement userfaultfd operations

[PATCH] KVM: selftests: elf: Include <endian.h> instead of <bits/endian.h>
 2026-04-09 16:40 UTC 

[PATCH] KVM: selftests: Guard execinfo.h inclusion for non-glibc builds
 2026-04-09 15:38 UTC  (8+ messages)
` [PATCH v2] "

[PATCH 0/3] KVM: arm64: vgic: Fix IIDR revision handling and add revision 1
 2026-04-09 15:01 UTC  (6+ messages)
` [PATCH 2/3] KVM: arm64: vgic: Allow userspace to set IIDR "
        ` [EXTERNAL] "

[PATCH v2 00/16] s390/vfio-ap: Add live guest migration support
 2026-04-09 14:23 UTC  (2+ messages)

[PATCH v3 0/6] KVM: s390: Enable 4k granularity for memslots
 2026-04-09 13:41 UTC  (5+ messages)
` [PATCH v3 1/6] KVM: s390: Add some useful mask macros
` [PATCH v3 5/6] KVM: s390: selftests: enable some common memory-related tests

[PATCH v10 0/2] LoongArch: KVM: Add DMSINTC support irqchip in kernel
 2026-04-09 12:39 UTC  (2+ messages)

[PATCH v2 0/6] LoongArch: KVM: Set max VM supported FPU type with FPU exception
 2026-04-09 12:11 UTC  (6+ messages)

[PATCH] VFIO: remove dead notifier code
 2026-04-09 11:55 UTC  (5+ messages)

[PATCH 1/2] vfio/xe: Reorganize the init to decouple migration from reset
 2026-04-09  9:28 UTC  (5+ messages)
` [PATCH 2/2] vfio/xe: Add a missing vfio_pci_core_release_dev()

[PATCH 0/2] struct page to PFN conversion for TDX guest private memory
 2026-04-09  7:42 UTC  (11+ messages)
` [PATCH 2/2] x86/virt/tdx: Use PFN directly for unmapping "

[PATCH v2 00/31] PCI/TSM: PCIe Link Encryption Establishment via TDX platform services
 2026-04-09  8:02 UTC  (19+ messages)
` [PATCH v2 18/31] iommu/vt-d: Cache max domain ID to avoid redundant calculation
` [PATCH v2 19/31] iommu/vt-d: Reserve the MSB domain ID bit for the TDX module
` [PATCH v2 20/31] x86/virt/tdx: Add a helper to loop on TDX_INTERRUPTED_RESUMABLE
` [PATCH v2 21/31] x86/virt/tdx: Add SEAMCALL wrappers for trusted IOMMU setup and clear
` [PATCH v2 22/31] iommu/vt-d: Export a helper to do function for each dmar_drhd_unit
` [PATCH v2 23/31] coco/tdx-host: Setup all trusted IOMMUs on TDX Connect init
` [PATCH v2 24/31] coco/tdx-host: Add a helper to exchange SPDM messages through DOE
` [PATCH v2 25/31] x86/virt/tdx: Add SEAMCALL wrappers for SPDM management
` [PATCH v2 30/31] coco/tdx-host: Implement IDE stream setup/teardown

[PATCH v3 0/3] KVM: x86: Async #PF MSR fix and cleanups
 2026-04-09  7:42 UTC  (7+ messages)
` [PATCH v3 1/3] KVM: x86: Don't leave APF half-enabled on bad APF data GPA
` [PATCH v3 2/3] KVM: x86: Drop superfluous caching of KVM_ASYNC_PF_DELIVERY_AS_PF_VMEXIT
` [PATCH v3 3/3] KVM: x86: Drop superfluous caching of KVM_ASYNC_PF_SEND_ALWAYS

[PATCH 0/3] KVM: x86/pmu: Add hardware Topdown metrics support
 2026-04-09  6:25 UTC  (2+ messages)

[PATCH v3] RISC-V: KVM: Batch stage-2 remote TLB flushes
 2026-04-09  6:03 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox