messages from 2026-04-27 18:14:31 to 2026-04-28 13:38:02 UTC [more...]
[RFC PATCH 00/11] iommu/riscv: Add hardware dirty tracking for second-stage domains
2026-04-28 13:38 UTC (17+ messages)
` [RFC PATCH 01/11] iommupt: Add RISC-V Second-stage (iohgatp) page table support
` [RFC PATCH 02/11] iommu/riscv: report iommu capabilities
` [RFC PATCH 03/11] iommu/riscv: use data structure instead of individual values
` [RFC PATCH 04/11] iommu/riscv: support GSCID and GVMA invalidation command
` [RFC PATCH 05/11] RISC-V: KVM: Enable KVM_VFIO interfaces on RISC-V arch
` [RFC PATCH 06/11] iommu/riscv: Add domain_alloc_paging_flags for second-stage domain
` [RFC PATCH 07/11] iommupt: Don't preset D when RISC-V IOMMU dirty tracking on
` [RFC PATCH 08/11] iommu/riscv: Add dirty tracking support for second-stage domains
` [RFC PATCH 09/11] iommu/riscv: Add IOTINVAL.GVMA after updating DDT/PDT entries
` [RFC PATCH 10/11] iommupt: Add RISC-V dirty tracking PTE ops
` [RFC PATCH 11/11] iommu/riscv: support nested iommu for getting iommu hardware information
[kvm-unit-tests PATCH 0/2] x86/apic: fix false test_apic_change_mode failures on stalled vCPUs
2026-04-28 13:35 UTC (3+ messages)
` [kvm-unit-tests PATCH 1/2] x86/apic: separate reporting from actual measurements
` [kvm-unit-tests PATCH 2/2] x86/apic: add retry logic to test_apic_change_mode
[kvm-unit-tests PATCH] arm: add wfx test case
2026-04-28 13:26 UTC (2+ messages)
[PATCH net-next v9 0/4] tun/tap & vhost-net: apply qdisc backpressure on full ptr_ring to reduce TX drops
2026-04-28 13:22 UTC (8+ messages)
` [PATCH net-next v9 1/4] tun/tap: add ptr_ring consume helper with netdev queue wakeup
` [PATCH net-next v9 2/4] vhost-net: wake queue of tun/tap after ptr_ring consume
` [PATCH net-next v9 3/4] ptr_ring: move free-space check into separate helper
` [PATCH net-next v9 4/4] tun/tap & vhost-net: avoid ptr_ring tail-drop when a qdisc is present
[PATCH v2 00/16] s390/vfio-ap: Add live guest migration support
2026-04-28 13:10 UTC (2+ messages)
[PATCH v2] LoongArch: KVM: Cap KVM_CAP_NR_VCPUS by KVM_CAP_MAX_VCPUS
2026-04-28 12:56 UTC (2+ messages)
[PATCH v2 0/2] x86/tdx: Port I/O emulation fixes
2026-04-28 12:56 UTC (3+ messages)
` [PATCH v2 1/2] x86/tdx: Fix off-by-one in port I/O handling
` [PATCH v2 2/2] x86/tdx: Fix zero-extension for 32-bit port I/O
[PATCH v4 0/4] Add iommufd ioctls to support TSM operations
2026-04-28 12:50 UTC (9+ messages)
` [PATCH v4 1/4] iommufd/device: Associate a kvm pointer to iommufd_device
` [PATCH v4 4/4] iommufd/vdevice: add TSM guest request ioctl
[PATCH 0/2] Fix MSR_IA32_PLATFORM_ID access for TDX guests
2026-04-28 11:44 UTC (7+ messages)
` [PATCH 1/2] KVM: TDX: Allow TDs to read MSR_IA32_PLATFORM_ID
` [PATCH 2/2] x86/cpu: Skip reading MSR_IA32_PLATFORM_ID in virtualized environment
[RFC PATCH v1 0/9] uaccess: Convert small fixed size copy_{to/from}_user() to scoped user access
2026-04-28 11:34 UTC (23+ messages)
` [RFC PATCH v1 2/9] uaccess: Convert INLINE_COPY_{TO/FROM}_USER to kconfig and reduce ifdefery
` [RFC PATCH v1 4/9] uaccess: Introduce copy_{to/from}_user_partial()
` [RFC PATCH v1 5/9] uaccess: Switch to copy_{to/from}_user_partial() when relevant
` [RFC PATCH v1 7/9] x86: Add unsafe_copy_from_user()
` [RFC PATCH v1 9/9] uaccess: Convert small fixed size copy_{to/from}_user() to scoped user access
[PATCH 0/2] x86/kvm/vmx: Fix VMX interrupt injection vs hrtimer_rearm_deferred()
2026-04-28 11:25 UTC (4+ messages)
` [PATCH 1/2] x86/kvm/vmx: Move IRQ/NMI dispatch from KVM into x86 core
[PATCH] LoongArch: KVM: Cap KVM_CAP_NR_VCPUS by KVM_CAP_MAX_VCPUS
2026-04-28 11:17 UTC (3+ messages)
[PATCH v4 0/7] Add SEV-SNP restricted injection hypervisor support
2026-04-28 11:12 UTC (7+ messages)
` [PATCH v4 3/7] KVM: SVM: Inject #HV when Restricted Injection is active
` [PATCH v4 5/7] KVM: SVM: Inject MCEs "
` [PATCH v4 7/7] KVM: SVM: Enable Restricted Injection for an SEV-SNP guest
[PATCH] KVM: VMX: Fall back to IRR scan when PIR is empty despite PID.ON being set
2026-04-28 11:10 UTC (4+ messages)
[PATCH v4 00/28] KVM: combined patchset for MBEC/GMET support
2026-04-28 11:09 UTC (29+ messages)
` [PATCH 01/28] KVM: TDX/VMX: rework EPT_VIOLATION_EXEC_FOR_RING3_LIN into PROT_MASK
` [PATCH 02/28] KVM: x86/mmu: remove SPTE_PERM_MASK
` [PATCH 03/28] KVM: x86/mmu: free up bit 10 of PTEs in preparation for MBEC
` [PATCH 04/28] KVM: x86/mmu: shuffle high bits of SPTEs "
` [PATCH 05/28] KVM: x86/mmu: remove SPTE_EPT_*
` [PATCH 06/28] KVM: x86/mmu: merge make_spte_{non,}executable
` [PATCH 07/28] KVM: x86/mmu: rename and clarify BYTE_MASK
` [PATCH 08/28] KVM: x86/mmu: introduce ACC_READ_MASK
` [PATCH 09/28] KVM: x86/mmu: separate more EPT/non-EPT permission_fault()
` [PATCH 10/28] KVM: x86/mmu: pass PFERR_GUEST_PAGE/FINAL_MASK to kvm_translate_gpa
` [PATCH 11/28] KVM: x86/mmu: pass pte_access for final nGPA->GPA walk
` [PATCH 12/28] KVM: x86: make translate_nested_gpa vendor-specific
` [PATCH 13/28] KVM: x86/mmu: split XS/XU bits for EPT
` [PATCH 14/28] KVM: x86/mmu: move cr4_smep to base role
` [PATCH 15/28] KVM: VMX: enable use of MBEC
` [PATCH 16/28] KVM: nVMX: pass advanced EPT violation vmexit info to guest
` [PATCH 17/28] KVM: nVMX: pass PFERR_USER_MASK to MMU on EPT violations
` [PATCH 18/28] KVM: x86/mmu: add support for MBEC to EPT page table walks
` [PATCH 19/28] KVM: nVMX: advertise MBEC to nested guests
` [PATCH 20/28] KVM: nVMX: allow MBEC with EVMCS
` [PATCH 21/28] KVM: x86/mmu: propagate access mask from root pages down
` [PATCH 22/28] KVM: x86/mmu: introduce cpu_role bit for availability of PFEC.I/D
` [PATCH 23/28] KVM: SVM: add GMET bit definitions
` [PATCH 24/28] KVM: x86/mmu: set CR0.WP=1 for shadow NPT MMU
` [PATCH 25/28] KVM: x86/mmu: add support for GMET to NPT page table walks
` [PATCH 26/28] KVM: SVM: enable GMET and set it in MMU role
` [PATCH 27/28] KVM: SVM: work around errata 1218
` [PATCH 28/28] KVM: nSVM: enable GMET for guests
[PATCH v3 0/8] KVM: VMX/SVM: use the same SPEC_CTRL assembly code
2026-04-28 11:05 UTC (9+ messages)
` [PATCH 1/8] KVM: VMX: remove regs argument of __vmx_vcpu_run
` [PATCH 2/8] KVM: VMX: more cleanups to __vmx_vcpu_run
` [PATCH 3/8] KVM: SVM: prepare for making SPEC_CTRL switch common with VMX
` [PATCH 4/8] KVM: SVM: pass struct vcpu_svm to msr_write_intercepted
` [PATCH 5/8] KVM: SVM: adopt the same VMX_RUN_* flags as VMX
` [PATCH 6/8] KVM: SVM: extract RESTORE_*_SPEC_CTRL_BODY out of svm/vmenter.S
` [PATCH 7/8] KVM: VMX: switch to RESTORE_GUEST_SPEC_CTRL_BODY
` [PATCH 8/8] KVM: VMX: replace vmx_spec_ctrl_restore_host with RESTORE_HOST_SPEC_CTRL_BODY
[PATCH] mm_types: remove references to s390 gmap
2026-04-28 9:43 UTC (5+ messages)
[PATCH v5 0/9] Introduce SMP Cache Topology
2026-04-28 9:43 UTC (4+ messages)
` [PATCH v5 2/9] hw/core: Make CPU topology enumeration arch-agnostic
[PATCH v3 00/20] KVM: x86: Enable APX for guests
2026-04-28 9:31 UTC (24+ messages)
` [PATCH v3 01/20] KVM: VMX: Macrofy 64-bit GPR swapping in __vmx_vcpu_run()
` [PATCH v3 02/20] KVM: SVM: Macrofy 64-bit GPR swapping in __svm_vcpu_run()
` [PATCH v3 03/20] KVM: SEV: Macrofy 64-bit GPR swapping in __svm_sev_es_vcpu_run()
` [PATCH v3 04/20] KVM: x86: Extend VCPU registers for EGPRs
` [PATCH v3 05/20] KVM: VMX: Save guest EGPRs in VCPU cache
` [PATCH v3 06/20] KVM: x86: Support APX state for XSAVE ABI
` [PATCH v3 07/20] KVM: VMX: Refactor VMX instruction information access
` [PATCH v3 08/20] KVM: VMX: Refactor instruction information decoding
` [PATCH v3 09/20] KVM: VMX: Refactor register index retrieval from exit qualification
` [PATCH v3 10/20] KVM: VMX: Support instruction information extension
` [PATCH v3 11/20] KVM: nVMX: Propagate the extended instruction info field
` [PATCH v3 12/20] KVM: x86: Support EGPR accessing and tracking for emulator
` [PATCH v3 13/20] KVM: x86: Handle EGPR index and REX2-incompatible opcodes
` [PATCH v3 14/20] KVM: x86: Support REX2-prefixed opcode decode
` [PATCH v3 15/20] KVM: x86: Reject EVEX-prefixed instructions
` [PATCH v3 16/20] KVM: x86: Guard valid XCR0.APX settings
` [PATCH v3 17/20] KVM: x86: Expose APX foundation feature to guests
` [PATCH v3 18/20] KVM: x86: Expose APX sub-features "
` [PATCH v3 19/20] KVM: x86: selftests: Add APX state and ABI test
` [PATCH v3 20/20] KVM: x86: selftests: Add APX state handling and XCR0 sanity checks
[PATCH] KVM: selftests: Fix typo in comment in hyperv_features.c
2026-04-28 9:26 UTC (2+ messages)
[PATCH] vsock/virtio: fix memory leak in virtio_transport_recv_listen()
2026-04-28 8:57 UTC (4+ messages)
[PATCH v2] KVM: PPC: Book3S HV: Add H_FAC_UNAVAIL mapping for tracing exits
2026-04-28 8:45 UTC
[kvm-unit-tests PATCH v5 0/6] s390x: Add test for STFLE interpretive execution (format-2)
2026-04-28 8:15 UTC (7+ messages)
` [kvm-unit-tests PATCH v5 1/6] s390x: snippets: Add reset_guest() to lib
` [kvm-unit-tests PATCH v5 2/6] s390x: sclp: Remove unnecessary padding from struct sclp_facilities
` [kvm-unit-tests PATCH v5 3/6] s390x: sclp: Check sclp byte before reading feature bits
` [kvm-unit-tests PATCH v5 4/6] s390x: sclp: Use sclp_feat_check directly to read DIAG318 feature bit
` [kvm-unit-tests PATCH v5 5/6] s390x: sclp: Add detection of alternate STFLE facilities
` [kvm-unit-tests PATCH v5 6/6] s390x: Add test for STFLE interpretive execution (format-2)
[PATCH] target/arm/kvm: Cache host CPU probe failure
2026-04-28 8:07 UTC
[PATCH] KVM: PPC: Book3S HV: Add H_FAC_UNAVAIL mapping for tracing exits
2026-04-28 8:02 UTC (3+ messages)
[kvm-unit-tests PATCH v2 0/4] scripts: Configure and update tools to allow basic b4 usage
2026-04-28 7:42 UTC (3+ messages)
` [kvm-unit-tests PATCH v2 2/4] scripts/checkpatch.pl: Create a project specific codespell config
[kvm-unit-tests PATCH v4 0/6] s390x: Add test for STFLE interpretive execution (format-2)
2026-04-28 7:37 UTC (5+ messages)
` [kvm-unit-tests PATCH v4 3/6] s390x: sclp: Check sclp byte before reading feature bits
` [kvm-unit-tests PATCH v4 4/6] s390x: sclp: Use sclp_feat_check directly to read DIAG318 feature bit
[PATCH] KVM: selftests: Convert comma to semicolon
2026-04-28 5:32 UTC
[PATCH v2 0/4] perf/x86: Don't write PEBS_ENABLED on KVM transitions
2026-04-28 2:32 UTC (6+ messages)
` [PATCH v2 1/4] perf/x86/intel: Don't write PEBS_ENABLED on host<=>guest xfers if CPU has isolation
[PATCH v2] vfio: selftests: only build tests on arm64 and x86_64
2026-04-28 1:55 UTC (4+ messages)
[PATCH] KVM: selftests: Include sys/mman.h *and* linux/mman.h, via kvm_syscalls.h
2026-04-28 1:25 UTC
[PATCH v4 0/6] KVM: x86/pmu: Add support for AMD Host-Only/Guest-Only bits
2026-04-28 0:37 UTC (14+ messages)
` [PATCH v4 3/6] KVM: x86/pmu: Disable counters based on Host-Only/Guest-Only bits in SVM
[PATCH] KVM: selftests: Include linux version of mman.h
2026-04-27 23:59 UTC (5+ messages)
[PATCH] vfio: selftests: Fix out-of-tree build with make O=
2026-04-27 23:15 UTC (2+ messages)
[PATCH v5 1/6] PCI/TPH: Fix pcie_tph_get_st_table_loc() field extraction
2026-04-27 22:25 UTC (2+ messages)
[PATCH v2 0/4] Allow disabling RAPL during SNP initialization
2026-04-27 21:20 UTC (6+ messages)
` [PATCH v2 1/4] crypto/ccp: Pass init_args to __sev_snp_init_locked()
` [PATCH v2 2/4] crypto/ccp: Support setting RAPL_DIS in SNP_INIT_EX
` [PATCH v2 3/4] KVM: SEV: Add the kvm-amd.rapl_disable module parameter
` [PATCH v2 4/4] KVM: selftests: Add a smoke test support for RAPL_DIS
[PATCH v6 0/7] KVM: SVM: Add Page Modification Logging (PML) support
2026-04-27 20:16 UTC (11+ messages)
` [PATCH v6 7/7] KVM: SVM: Add Page modification logging support
[PATCH 00/41] Fix various QOM object life-cycle issues
2026-04-27 19:42 UTC (4+ messages)
` [PATCH 20/41] target/i386/sev: add finalize functions and fix leaking setters
` [PATCH 21/41] target/i386/kvm/tdx: free strings in tdx_guest_finalize
` [PATCH 26/41] accel/kvm: free device path on finalization
[PATCH] KVM: x86: enrich kvm_fast_mmio trace event fields
2026-04-27 18:37 UTC (2+ messages)
[RFC 0/9] QEMU: CXL Type-2 device passthrough via vfio-pci
2026-04-27 18:12 UTC (7+ messages)
` [RFC 2/9] cxl: Add preserve_config to pxb-cxl OSC method
` [RFC 5/9] hw/vfio/pci: Add CXL Type-2 device detection and region setup
` [RFC 6/9] hw/vfio/pci: Wire CXL component-register BAR with COMP_REGS overlay
` [RFC 7/9] hw/vfio+cxl: Program HDM decoder 0 at machine_done for firmware-committed devices
` [RFC 8/9] hw/arm/smmu-common: Allow pxb-cxl as SMMUv3 primary bus
` [RFC 9/9] vfio/listener: Skip DMA mapping for VFIO-owned RAM-device regions
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox