messages from 2026-04-27 17:17:32 to 2026-04-28 11:21:25 UTC [more...]
[RFC PATCH v1 0/9] uaccess: Convert small fixed size copy_{to/from}_user() to scoped user access
2026-04-28 11:20 UTC (26+ messages)
` [RFC PATCH v1 2/9] uaccess: Convert INLINE_COPY_{TO/FROM}_USER to kconfig and reduce ifdefery
` [RFC PATCH v1 3/9] x86/umip: Be stricter in fixup_umip_exception()
` [RFC PATCH v1 4/9] uaccess: Introduce copy_{to/from}_user_partial()
` [RFC PATCH v1 5/9] uaccess: Switch to copy_{to/from}_user_partial() when relevant
` [RFC PATCH v1 6/9] uaccess: Change copy_{to/from}_user to return -EFAULT
` [RFC PATCH v1 7/9] x86: Add unsafe_copy_from_user()
` [RFC PATCH v1 8/9] arm64: "
` [RFC PATCH v1 9/9] uaccess: Convert small fixed size copy_{to/from}_user() to scoped user access
[PATCH] LoongArch: KVM: Cap KVM_CAP_NR_VCPUS by KVM_CAP_MAX_VCPUS
2026-04-28 11:17 UTC (3+ messages)
[PATCH v4 0/7] Add SEV-SNP restricted injection hypervisor support
2026-04-28 11:12 UTC (7+ messages)
` [PATCH v4 3/7] KVM: SVM: Inject #HV when Restricted Injection is active
` [PATCH v4 5/7] KVM: SVM: Inject MCEs "
` [PATCH v4 7/7] KVM: SVM: Enable Restricted Injection for an SEV-SNP guest
[PATCH] KVM: VMX: Fall back to IRR scan when PIR is empty despite PID.ON being set
2026-04-28 11:10 UTC (4+ messages)
[PATCH v4 00/28] KVM: combined patchset for MBEC/GMET support
2026-04-28 11:09 UTC (29+ messages)
` [PATCH 01/28] KVM: TDX/VMX: rework EPT_VIOLATION_EXEC_FOR_RING3_LIN into PROT_MASK
` [PATCH 02/28] KVM: x86/mmu: remove SPTE_PERM_MASK
` [PATCH 03/28] KVM: x86/mmu: free up bit 10 of PTEs in preparation for MBEC
` [PATCH 04/28] KVM: x86/mmu: shuffle high bits of SPTEs "
` [PATCH 05/28] KVM: x86/mmu: remove SPTE_EPT_*
` [PATCH 06/28] KVM: x86/mmu: merge make_spte_{non,}executable
` [PATCH 07/28] KVM: x86/mmu: rename and clarify BYTE_MASK
` [PATCH 08/28] KVM: x86/mmu: introduce ACC_READ_MASK
` [PATCH 09/28] KVM: x86/mmu: separate more EPT/non-EPT permission_fault()
` [PATCH 10/28] KVM: x86/mmu: pass PFERR_GUEST_PAGE/FINAL_MASK to kvm_translate_gpa
` [PATCH 11/28] KVM: x86/mmu: pass pte_access for final nGPA->GPA walk
` [PATCH 12/28] KVM: x86: make translate_nested_gpa vendor-specific
` [PATCH 13/28] KVM: x86/mmu: split XS/XU bits for EPT
` [PATCH 14/28] KVM: x86/mmu: move cr4_smep to base role
` [PATCH 15/28] KVM: VMX: enable use of MBEC
` [PATCH 16/28] KVM: nVMX: pass advanced EPT violation vmexit info to guest
` [PATCH 17/28] KVM: nVMX: pass PFERR_USER_MASK to MMU on EPT violations
` [PATCH 18/28] KVM: x86/mmu: add support for MBEC to EPT page table walks
` [PATCH 19/28] KVM: nVMX: advertise MBEC to nested guests
` [PATCH 20/28] KVM: nVMX: allow MBEC with EVMCS
` [PATCH 21/28] KVM: x86/mmu: propagate access mask from root pages down
` [PATCH 22/28] KVM: x86/mmu: introduce cpu_role bit for availability of PFEC.I/D
` [PATCH 23/28] KVM: SVM: add GMET bit definitions
` [PATCH 24/28] KVM: x86/mmu: set CR0.WP=1 for shadow NPT MMU
` [PATCH 25/28] KVM: x86/mmu: add support for GMET to NPT page table walks
` [PATCH 26/28] KVM: SVM: enable GMET and set it in MMU role
` [PATCH 27/28] KVM: SVM: work around errata 1218
` [PATCH 28/28] KVM: nSVM: enable GMET for guests
[PATCH v3 0/8] KVM: VMX/SVM: use the same SPEC_CTRL assembly code
2026-04-28 11:05 UTC (9+ messages)
` [PATCH 1/8] KVM: VMX: remove regs argument of __vmx_vcpu_run
` [PATCH 2/8] KVM: VMX: more cleanups to __vmx_vcpu_run
` [PATCH 3/8] KVM: SVM: prepare for making SPEC_CTRL switch common with VMX
` [PATCH 4/8] KVM: SVM: pass struct vcpu_svm to msr_write_intercepted
` [PATCH 5/8] KVM: SVM: adopt the same VMX_RUN_* flags as VMX
` [PATCH 6/8] KVM: SVM: extract RESTORE_*_SPEC_CTRL_BODY out of svm/vmenter.S
` [PATCH 7/8] KVM: VMX: switch to RESTORE_GUEST_SPEC_CTRL_BODY
` [PATCH 8/8] KVM: VMX: replace vmx_spec_ctrl_restore_host with RESTORE_HOST_SPEC_CTRL_BODY
[PATCH 0/2] Fix MSR_IA32_PLATFORM_ID access for TDX guests
2026-04-28 9:57 UTC (6+ messages)
` [PATCH 1/2] KVM: TDX: Allow TDs to read MSR_IA32_PLATFORM_ID
` [PATCH 2/2] x86/cpu: Skip reading MSR_IA32_PLATFORM_ID in virtualized environment
[PATCH] mm_types: remove references to s390 gmap
2026-04-28 9:43 UTC (5+ messages)
[PATCH 0/2] x86/kvm/vmx: Fix VMX interrupt injection vs hrtimer_rearm_deferred()
2026-04-28 9:43 UTC (3+ messages)
` [PATCH 1/2] x86/kvm/vmx: Move IRQ/NMI dispatch from KVM into x86 core
[PATCH v5 0/9] Introduce SMP Cache Topology
2026-04-28 9:43 UTC (4+ messages)
` [PATCH v5 2/9] hw/core: Make CPU topology enumeration arch-agnostic
[PATCH v3 00/20] KVM: x86: Enable APX for guests
2026-04-28 9:31 UTC (24+ messages)
` [PATCH v3 01/20] KVM: VMX: Macrofy 64-bit GPR swapping in __vmx_vcpu_run()
` [PATCH v3 02/20] KVM: SVM: Macrofy 64-bit GPR swapping in __svm_vcpu_run()
` [PATCH v3 03/20] KVM: SEV: Macrofy 64-bit GPR swapping in __svm_sev_es_vcpu_run()
` [PATCH v3 04/20] KVM: x86: Extend VCPU registers for EGPRs
` [PATCH v3 05/20] KVM: VMX: Save guest EGPRs in VCPU cache
` [PATCH v3 06/20] KVM: x86: Support APX state for XSAVE ABI
` [PATCH v3 07/20] KVM: VMX: Refactor VMX instruction information access
` [PATCH v3 08/20] KVM: VMX: Refactor instruction information decoding
` [PATCH v3 09/20] KVM: VMX: Refactor register index retrieval from exit qualification
` [PATCH v3 10/20] KVM: VMX: Support instruction information extension
` [PATCH v3 11/20] KVM: nVMX: Propagate the extended instruction info field
` [PATCH v3 12/20] KVM: x86: Support EGPR accessing and tracking for emulator
` [PATCH v3 13/20] KVM: x86: Handle EGPR index and REX2-incompatible opcodes
` [PATCH v3 14/20] KVM: x86: Support REX2-prefixed opcode decode
` [PATCH v3 15/20] KVM: x86: Reject EVEX-prefixed instructions
` [PATCH v3 16/20] KVM: x86: Guard valid XCR0.APX settings
` [PATCH v3 17/20] KVM: x86: Expose APX foundation feature to guests
` [PATCH v3 18/20] KVM: x86: Expose APX sub-features "
` [PATCH v3 19/20] KVM: x86: selftests: Add APX state and ABI test
` [PATCH v3 20/20] KVM: x86: selftests: Add APX state handling and XCR0 sanity checks
[PATCH] KVM: selftests: Fix typo in comment in hyperv_features.c
2026-04-28 9:26 UTC (2+ messages)
[PATCH] vsock/virtio: fix memory leak in virtio_transport_recv_listen()
2026-04-28 8:57 UTC (4+ messages)
[PATCH v2] KVM: PPC: Book3S HV: Add H_FAC_UNAVAIL mapping for tracing exits
2026-04-28 8:45 UTC
[kvm-unit-tests PATCH v5 0/6] s390x: Add test for STFLE interpretive execution (format-2)
2026-04-28 8:15 UTC (7+ messages)
` [kvm-unit-tests PATCH v5 1/6] s390x: snippets: Add reset_guest() to lib
` [kvm-unit-tests PATCH v5 2/6] s390x: sclp: Remove unnecessary padding from struct sclp_facilities
` [kvm-unit-tests PATCH v5 3/6] s390x: sclp: Check sclp byte before reading feature bits
` [kvm-unit-tests PATCH v5 4/6] s390x: sclp: Use sclp_feat_check directly to read DIAG318 feature bit
` [kvm-unit-tests PATCH v5 5/6] s390x: sclp: Add detection of alternate STFLE facilities
` [kvm-unit-tests PATCH v5 6/6] s390x: Add test for STFLE interpretive execution (format-2)
[PATCH] target/arm/kvm: Cache host CPU probe failure
2026-04-28 8:07 UTC
[PATCH] KVM: PPC: Book3S HV: Add H_FAC_UNAVAIL mapping for tracing exits
2026-04-28 8:02 UTC (3+ messages)
[kvm-unit-tests PATCH v2 0/4] scripts: Configure and update tools to allow basic b4 usage
2026-04-28 7:42 UTC (6+ messages)
` [kvm-unit-tests PATCH v2 1/4] scripts/checkpatch.pl: Add empty codespell and const_structs configs
` [kvm-unit-tests PATCH v2 2/4] scripts/checkpatch.pl: Create a project specific codespell config
` [kvm-unit-tests PATCH v2 3/4] scripts/get_maintainer.pl: Ignore --nogit-chief-penguins option
` [kvm-unit-tests PATCH v2 4/4] b4: Add b4 config with default prefix
[kvm-unit-tests PATCH v4 0/6] s390x: Add test for STFLE interpretive execution (format-2)
2026-04-28 7:37 UTC (5+ messages)
` [kvm-unit-tests PATCH v4 3/6] s390x: sclp: Check sclp byte before reading feature bits
` [kvm-unit-tests PATCH v4 4/6] s390x: sclp: Use sclp_feat_check directly to read DIAG318 feature bit
[PATCH] KVM: selftests: Convert comma to semicolon
2026-04-28 5:32 UTC
[PATCH v2 0/4] perf/x86: Don't write PEBS_ENABLED on KVM transitions
2026-04-28 2:32 UTC (9+ messages)
` [PATCH v2 1/4] perf/x86/intel: Don't write PEBS_ENABLED on host<=>guest xfers if CPU has isolation
` [PATCH v2 2/4] perf/x86/intel: Don't context switch DS_AREA (and PEBS config) if PEBS is unused
[PATCH v2] vfio: selftests: only build tests on arm64 and x86_64
2026-04-28 1:55 UTC (4+ messages)
[PATCH] KVM: selftests: Include sys/mman.h *and* linux/mman.h, via kvm_syscalls.h
2026-04-28 1:25 UTC
[PATCH v4 0/6] KVM: x86/pmu: Add support for AMD Host-Only/Guest-Only bits
2026-04-28 0:37 UTC (14+ messages)
` [PATCH v4 3/6] KVM: x86/pmu: Disable counters based on Host-Only/Guest-Only bits in SVM
[PATCH] KVM: selftests: Include linux version of mman.h
2026-04-27 23:59 UTC (5+ messages)
[PATCH] vfio: selftests: Fix out-of-tree build with make O=
2026-04-27 23:15 UTC (2+ messages)
[PATCH v5 1/6] PCI/TPH: Fix pcie_tph_get_st_table_loc() field extraction
2026-04-27 22:25 UTC (2+ messages)
[PATCH v2 0/4] Allow disabling RAPL during SNP initialization
2026-04-27 21:20 UTC (6+ messages)
` [PATCH v2 1/4] crypto/ccp: Pass init_args to __sev_snp_init_locked()
` [PATCH v2 2/4] crypto/ccp: Support setting RAPL_DIS in SNP_INIT_EX
` [PATCH v2 3/4] KVM: SEV: Add the kvm-amd.rapl_disable module parameter
` [PATCH v2 4/4] KVM: selftests: Add a smoke test support for RAPL_DIS
[PATCH v6 0/7] KVM: SVM: Add Page Modification Logging (PML) support
2026-04-27 20:16 UTC (11+ messages)
` [PATCH v6 7/7] KVM: SVM: Add Page modification logging support
[PATCH 00/41] Fix various QOM object life-cycle issues
2026-04-27 19:42 UTC (4+ messages)
` [PATCH 20/41] target/i386/sev: add finalize functions and fix leaking setters
` [PATCH 21/41] target/i386/kvm/tdx: free strings in tdx_guest_finalize
` [PATCH 26/41] accel/kvm: free device path on finalization
[PATCH] KVM: x86: enrich kvm_fast_mmio trace event fields
2026-04-27 18:37 UTC (2+ messages)
[RFC 0/9] QEMU: CXL Type-2 device passthrough via vfio-pci
2026-04-27 18:12 UTC (10+ messages)
` [RFC 1/9] hw/arm/virt: Add CXL FMWS PA window for device memory
` [RFC 2/9] cxl: Add preserve_config to pxb-cxl OSC method
` [RFC 3/9] linux-headers: Update vfio.h for CXL Type-2 device passthrough
` [RFC 4/9] hw/vfio/region: Add vfio_region_setup_with_ops() for custom region ops
` [RFC 5/9] hw/vfio/pci: Add CXL Type-2 device detection and region setup
` [RFC 6/9] hw/vfio/pci: Wire CXL component-register BAR with COMP_REGS overlay
` [RFC 7/9] hw/vfio+cxl: Program HDM decoder 0 at machine_done for firmware-committed devices
` [RFC 8/9] hw/arm/smmu-common: Allow pxb-cxl as SMMUv3 primary bus
` [RFC 9/9] vfio/listener: Skip DMA mapping for VFIO-owned RAM-device regions
[PATCH v8 00/21] Runtime TDX module update support
2026-04-27 18:12 UTC (3+ messages)
` [PATCH v8 01/21] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
[PATCH v2 0/7] KVM: VMX/SVM: use the same SPEC_CTRL assembly code
2026-04-27 18:01 UTC (6+ messages)
` [PATCH v2 4/7] KVM: SVM: adopt the same VMX_RUN_* flags as VMX
` [PATCH v2 7/7] KVM: VMX: replace vmx_spec_ctrl_restore_host with RESTORE_HOST_SPEC_CTRL_BODY
[PATCH v2 00/16] iommu: Add live update state preservation
2026-04-27 17:56 UTC (17+ messages)
` [PATCH v2 01/16] liveupdate: luo_file: Add internal APIs for file preservation
` [PATCH v2 02/16] iommu: Implement IOMMU Live update FLB callbacks
` [PATCH v2 03/16] iommu: Implement IOMMU domain preservation
` [PATCH v2 04/16] iommu: Implement device and IOMMU HW preservation
` [PATCH v2 05/16] iommu/pages: Add APIs to preserve/unpreserve/restore iommu pages
` [PATCH v2 06/16] iommupt: Implement preserve/unpreserve/restore callbacks
` [PATCH v2 07/16] iommu/vt-d: Implement device and iommu preserve/unpreserve ops
` [PATCH v2 08/16] iommu: Add APIs to get iommu and device preserved state
` [PATCH v2 09/16] iommu/vt-d: Restore IOMMU state and reclaimed domain ids
` [PATCH v2 10/16] iommu: Restore and reattach preserved domains to devices
` [PATCH v2 11/16] iommu/vt-d: preserve PASID table of preserved device
` [PATCH v2 12/16] iommufd: Implement ioctl to mark HWPT for preservation
` [PATCH v2 13/16] iommufd: Persist iommu hardware pagetables for live update
` [PATCH v2 14/16] iommufd: Add APIs to preserve/unpreserve a vfio cdev
` [PATCH v2 15/16] vfio/pci: Preserve the iommufd state of the "
` [PATCH v2 16/16] iommufd/selftest: Add test to verify iommufd preservation
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox