messages from 2026-05-12 22:31:37 to 2026-05-13 17:42:45 UTC [more...]
[PATCH v4 00/21] KVM: x86: Enable APX for guests
2026-05-13 17:42 UTC (3+ messages)
` [PATCH v4 06/21] x86/fpu: Ignore APX when copying from/to guest FPU
[PATCH v2 0/3] KVM: Fix and clean up kvm_vcpu_map[_readonly]() usages
2026-05-13 17:33 UTC (6+ messages)
[PATCH] KVM: selftests: Check guest memfd validity with flags
2026-05-13 17:02 UTC (5+ messages)
[PATCH v2 0/6] KVM: x86: Reg cleanups / prep work for APX
2026-05-13 16:50 UTC (2+ messages)
[PATCH v7 13/20] KVM: arm64: Apply dynamic guest counter reservations
2026-05-13 16:45 UTC (2+ messages)
[PATCH v7 10/20] KVM: arm64: Context swap Partitioned PMU guest registers
2026-05-13 16:38 UTC (2+ messages)
[GIT PULL] KVM changes for Linux 7.1-rc4
2026-05-13 16:31 UTC
[PATCH] Documentation: KVM: Document guest-visible compatibility expectations
2026-05-13 16:24 UTC (10+ messages)
[PATCH v6 0/4] KVM: s390: Introducing kvm_arch_set_irq_inatomic Fast Inject
2026-05-13 16:16 UTC (5+ messages)
` [PATCH v6 1/4] KVM: s390: Add map/unmap ioctl and clean mappings post-guest
` [PATCH v6 2/4] KVM: s390: Enable adapter_indicators_set to use mapped pages
[PATCH v7 06/20] perf: arm_pmuv3: Add method to partition the PMU
2026-05-13 16:13 UTC (2+ messages)
[PATCH] KVM: VMX: introduce module parameter to disable CET
2026-05-13 15:51 UTC (3+ messages)
[PATCH 6.18 091/270] LoongArch: KVM: Compile switch.S directly into the kernel
2026-05-13 15:29 UTC (8+ messages)
` "
[PATCH v9 00/23] Runtime TDX module update support
2026-05-13 15:10 UTC (24+ messages)
` [PATCH v9 01/23] x86/virt/tdx: Consolidate TDX global initialization states
` [PATCH v9 02/23] x86/virt/tdx: Move TDX_FEATURES0 bits to asm/tdx.h
` [PATCH v9 03/23] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v9 04/23] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v9 05/23] coco/tdx-host: Expose TDX module version
` [PATCH v9 06/23] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v9 07/23] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v9 08/23] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v9 09/23] coco/tdx-host: Don't expose P-SEAMLDR information on CPUs with erratum
` [PATCH v9 10/23] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v9 11/23] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v9 12/23] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v9 13/23] x86/virt/seamldr: Abort updates after a failed step
` [PATCH v9 14/23] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v9 15/23] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v9 16/23] x86/virt/seamldr: Install a new TDX module
` [PATCH v9 17/23] x86/virt/seamldr: Do TDX per-CPU initialization after module installation
` [PATCH v9 18/23] x86/virt/tdx: Restore TDX module state
` [PATCH v9 19/23] x86/virt/tdx: Refresh TDX module version after update
` [PATCH v9 20/23] x86/virt/tdx: Reject updates during compatibility-sensitive operations
` [PATCH v9 21/23] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v9 22/23] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v9 23/23] x86/virt/tdx: Document TDX module update
[PATCH v2] vhost/vsock: Refuse the connection immediately when guest isn't ready
2026-05-13 14:50 UTC
[PATCH v2] x86/cpu: Skip reading MSR_IA32_PLATFORM_ID in virtualized environment
2026-05-13 14:41 UTC (9+ messages)
[PATCH v2 0/5] KVM: SVM: Fix x2AVIC MSR interception issues
2026-05-13 13:33 UTC (4+ messages)
` [PATCH v2 3/5] KVM: SVM: Only disable x2AVIC WRMSR interception for MSRs that are accelerated
[PATCH v14 00/44] arm64: Support for Arm CCA in KVM
2026-05-13 13:17 UTC (45+ messages)
` [PATCH v14 01/44] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v14 02/44] kvm: arm64: Avoid including linux/kvm_host.h in kvm_pgtable.h
` [PATCH v14 03/44] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v14 04/44] arm64: RMI: Add SMC definitions for calling the RMM
` [PATCH v14 05/44] arm64: RMI: Add wrappers for RMI calls
` [PATCH v14 06/44] arm64: RMI: Check for RMI support at init
` [PATCH v14 07/44] arm64: RMI: Configure the RMM with the host's page size
` [PATCH v14 08/44] arm64: RMI: Ensure that the RMM has GPT entries for memory
` [PATCH v14 09/44] arm64: RMI: Provide functions to delegate/undelegate ranges of memory
` [PATCH v14 10/44] arm64: RMI: Add support for SRO
` [PATCH v14 11/44] arm64: RMI: Check for RMI support at KVM init
` [PATCH v14 12/44] arm64: RMI: Check for LPA2 support
` [PATCH v14 13/44] arm64: RMI: Define the user ABI
` [PATCH v14 14/44] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v14 15/44] kvm: arm64: Don't expose unsupported capabilities for realm guests
` [PATCH v14 16/44] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v14 17/44] arm64: RMI: RTT tear down
` [PATCH v14 18/44] arm64: RMI: Activate realm on first VCPU run
` [PATCH v14 19/44] arm64: RMI: Allocate/free RECs to match vCPUs
` [PATCH v14 20/44] arm64: RMI: Support for the VGIC in realms
` [PATCH v14 21/44] KVM: arm64: Support timers in realm RECs
` [PATCH v14 22/44] arm64: RMI: Handle realm enter/exit
` [PATCH v14 23/44] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v14 24/44] KVM: arm64: Handle realm MMIO emulation
` [PATCH v14 25/44] KVM: arm64: Expose support for private memory
` [PATCH v14 26/44] arm64: RMI: Allow populating initial contents
` [PATCH v14 27/44] arm64: RMI: Set RIPAS of initial memslots
` [PATCH v14 28/44] arm64: RMI: Create the realm descriptor
` [PATCH v14 29/44] arm64: RMI: Runtime faulting of memory
` [PATCH v14 30/44] KVM: arm64: Handle realm VCPU load
` [PATCH v14 31/44] KVM: arm64: Validate register access for a Realm VM
` [PATCH v14 32/44] KVM: arm64: Handle Realm PSCI requests
` [PATCH v14 33/44] KVM: arm64: WARN on injected undef exceptions
` [PATCH v14 34/44] arm64: RMI: allow userspace to inject aborts
` [PATCH v14 35/44] arm64: RMI: support RSI_HOST_CALL
` [PATCH v14 36/44] arm64: RMI: Allow checking SVE on VM instance
` [PATCH v14 37/44] arm64: RMI: Prevent Device mappings for Realms
` [PATCH v14 38/44] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v14 39/44] arm64: RMI: Set breakpoint parameters through SET_ONE_REG
` [PATCH v14 40/44] arm64: RMI: Propagate max SVE vector length from RMM
` [PATCH v14 41/44] arm64: RMI: Configure max SVE vector length for a Realm
` [PATCH v14 42/44] arm64: RMI: Provide register list for unfinalized RMI RECs
` [PATCH v14 43/44] arm64: RMI: Provide accurate register list
` [PATCH v14 44/44] arm64: RMI: Enable realms to be created
[PATCH v2 0/9] sched/kvm: Semantics-aware vCPU scheduling for oversubscribed KVM
2026-05-13 12:52 UTC (6+ messages)
[PATCH 0/2] KVM: arm64: nv: Reduce FP/SVE overhead on exception/exception return
2026-05-13 12:49 UTC (4+ messages)
` [PATCH 2/2] KVM: arm64: nv: Don't save/restore FP register during a nested ERET or exception
[PATCH v1 0/5] KVM: x86: Expose Zhaoxin CPUID 0xC0000001 EDX cryptographic features
2026-05-13 12:48 UTC (6+ messages)
` [PATCH v1 1/5] KVM: x86: Expose Zhaoxin SM2 CPUID feature
` [PATCH v1 2/5] KVM: x86: Expose Zhaoxin CCS (SM3 + SM4) "
` [PATCH v1 3/5] KVM: x86: Expose Zhaoxin RNG2 "
` [PATCH v1 4/5] KVM: x86: Expose Zhaoxin PHE2 "
` [PATCH v1 5/5] KVM: x86: Expose Zhaoxin RSA "
[PATCH 0/2] KVM: selftests: Fixes for guest_memfd_test and FD double-close
2026-05-13 12:48 UTC (4+ messages)
` [PATCH 2/2] KVM: selftests: Fix FD double-close in kvm_vm_release()
[PATCH v2 0/2] x86/tdx: Port I/O emulation fixes
2026-05-13 12:48 UTC (5+ messages)
` [PATCH v2 2/2] x86/tdx: Fix zero-extension for 32-bit port I/O
[PATCH v2 0/2] vfio: Fix racy bitfields and tighten struct layout
2026-05-13 12:31 UTC (5+ messages)
` [PATCH v2 1/2] vfio/pci: "
[PATCH 1/3] KVM: selftests: Add unit to dirty_log_test
2026-05-13 12:27 UTC (3+ messages)
[PATCH] vhost/vsock: Refuse the connection immediately when guest isn't ready
2026-05-13 11:18 UTC (9+ messages)
[PATCH net v3 0/2] vsock/virtio: fix skb overhead accounting to preserve full buf_alloc
2026-05-13 10:54 UTC (3+ messages)
` [PATCH net v3 1/2] vsock/virtio: reset connection on receiving queue overflow
` [PATCH net v3 2/2] vsock/virtio: fix skb overhead accounting to preserve full buf_alloc
[PATCH 0/5] KVM: x86: Expose Zhaoxin CPUID 0xC0000001 EDX cryptographic features
2026-05-13 10:36 UTC (7+ messages)
` [PATCH 1/5] KVM: x86: Expose Zhaoxin SM2 CPUID feature
` [PATCH 2/5] KVM: x86: Expose Zhaoxin CCS (SM3 + SM4) "
` [PATCH 3/5] KVM: x86: Expose Zhaoxin RNG2 "
` [PATCH 4/5] KVM: x86: Expose Zhaoxin PHE2 "
` [PATCH 5/5] KVM: x86: Expose Zhaoxin RSA "
[PATCH v2 0/5] KVM: PPC: Handle CPU compatibility mode for nested guests
2026-05-13 10:07 UTC (6+ messages)
` [PATCH v2 1/5] KVM: PPC: Book3S HV: Validate arch_compat against host compatibility mode
` [PATCH v2 2/5] KVM: PPC: Introduce KVM_CAP_PPC_COMPAT_CAPS and wire up ioctl
` [PATCH v2 3/5] KVM: PPC: Book3S HV: Implement compat CPU capability retrieval for KVM on PowerVM
` [PATCH v2 4/5] KVM: PPC: Book3S HV: Add support for compat CPU capabilities for KVM on PowerNV
` [PATCH v2 5/5] KVM: PPC: Document KVM_PPC_GET_COMPAT_CAPS ioctl
[PATCH 0/5] KVM: x86: Expose Zhaoxin CPUID 0xC0000001 EDX cryptographic features
2026-05-13 9:32 UTC (7+ messages)
` [PATCH 1/5] KVM: x86: Expose Zhaoxin SM2 CPUID feature
` [PATCH 2/5] KVM: x86: Expose Zhaoxin CCS (SM3 + SM4) "
` [PATCH 3/5] KVM: x86: Expose Zhaoxin RNG2 "
` [PATCH 4/5] KVM: x86: Expose Zhaoxin PHE2 "
` [PATCH 5/5] KVM: x86: Expose Zhaoxin RSA "
[PATCH] RISC-V: KVM: Fix NULL pointer dereference in SBI v0.1 SEND_IPI handler
2026-05-13 9:26 UTC
[PATCH v7 00/20] ARM64 PMU Partitioning
2026-05-13 9:18 UTC (9+ messages)
` [PATCH v7 07/20] KVM: arm64: Set up FGT for Partitioned PMU
` [PATCH v7 08/20] KVM: arm64: Add Partitioned PMU register trap handlers
` [PATCH v7 09/20] KVM: arm64: Set up MDCR_EL2 to handle a Partitioned PMU
` [PATCH v7 10/20] KVM: arm64: Context swap Partitioned PMU guest registers
[PATCH v2 0/5] KVM: s390: some vSIE and UCONTROL fixes
2026-05-13 7:56 UTC (5+ messages)
` [PATCH v2 1/5] KVM: s390: vsie: Fix memory leak when unshadowing
` [PATCH v2 2/5] KVM: s390: Fix leaking kvm_s390_mmu_cache in case of errors
[PATCH v9 0/5] riscv: add SBI Supervisor Software Events support
2026-05-13 7:49 UTC (3+ messages)
` [PATCH v9 3/5] drivers: firmware: add riscv SSE support
[PATCH 0/4] Implement Eager Page Splitting for RISC-V
2026-05-13 7:45 UTC (5+ messages)
` [PATCH 1/4] RISC-V: KVM: Add the split page cache for ioctl context
` [PATCH 2/4] RISC-V: KVM: Split huge pages when dirty logging is enabled
` [PATCH 3/4] RISC-V: KVM: Split huge pages during KVM_CLEAR_DIRTY_LOG
` [PATCH 4/4] RISC-V: KVM: Add the eager_page_split module parameter
[PATCH v6 1/6] PCI/TPH: Fix pcie_tph_get_st_table_loc() field extraction
2026-05-13 7:01 UTC (3+ messages)
[PATCH v3 0/2] vfio/dma-buf: add TPH support for peer-to-peer access
2026-05-13 6:37 UTC (6+ messages)
` [PATCH v3 1/2] vfio: add dma-buf get_tph callback and DMA_BUF_TPH feature
` [PATCH v3 2/2] RDMA/mlx5: get tph for p2p access when registering dma-buf mr
[PATCH v2 1/2] vfio: add dma-buf get_tph callback and DMA_BUF_TPH feature
2026-05-13 6:31 UTC (2+ messages)
[PATCH v2 00/14] userfaultfd: working set tracking for VM guest memory
2026-05-13 6:26 UTC (5+ messages)
` [PATCH v2 13/14] selftests/mm: add userfaultfd RWP tests
` [PATCH v2 14/14] Documentation/userfaultfd: document RWP working set tracking
[GIT PULL 0/2] KVM: s390: pci: fix array indexing for master
2026-05-13 6:00 UTC (2+ messages)
[PATCH v3] KVM: PPC: Book3S HV: Add missing mappings for tracing exits
2026-05-13 3:52 UTC (2+ messages)
[PATCH for 6.18] LoongArch: KVM: Compile switch.S directly into the kernel
2026-05-13 3:12 UTC
[PATCH for 6.12] LoongArch: KVM: Compile switch.S directly into the kernel
2026-05-13 3:12 UTC
[PATCH] vfio: selftests: Add driver for IGB QEMU device
2026-05-13 2:12 UTC (3+ messages)
[PATCH v2] LoongArch: KVM: Remove timer interrupt injection with SW timer expired
2026-05-13 1:55 UTC
VMX Preemption Timer appears to be buggy on SKX, CLX, and ICX
2026-05-13 1:31 UTC
[PATCH RFC 0/4] selftests: harness: Provide global metadata pointer to allow clean teardown from selftest libraries
2026-05-13 1:01 UTC (2+ messages)
[PATCH v4 1/1] KVM: x86: Introduce has_protected_pmu state for TDX VMs
2026-05-13 0:15 UTC (3+ messages)
[PATCH v2 0/3] KVM: x86: Virtualize AMD CPUID faulting
2026-05-13 0:04 UTC (5+ messages)
` [PATCH v2 2/3] "
[PATCH 0/5] Fix and enhance KVM steal accounting for both guest and host
2026-05-12 23:43 UTC (15+ messages)
` [PATCH 2/5] KVM: x86: Reset vcpu->arch.st.last_steal when enabling steal time
` [PATCH 3/5] KVM: x86: account KVM_SET_CLOCK downtime in "
[PATCH 0/3] KVM: x86: Mitigate kvm-clock drift caused by masterclock update
2026-05-12 23:23 UTC (6+ messages)
` [PATCH 3/3] KVM: x86: conditionally update masterclock data in pvclock_update_vm_gtod_copy()
[PATCH] x86/tdx: Fix zero-extension for CPUID emulation
2026-05-12 22:43 UTC (7+ messages)
[PATCH 0/2] x86/kvm/vmx: Fix VMX interrupt injection vs hrtimer_rearm_deferred()
2026-05-12 22:32 UTC (7+ messages)
` [PATCH 1/2] x86/kvm/vmx: Move IRQ/NMI dispatch from KVM into x86 core
` [PATCH v3 "
` [PATCH 2/2] x86/kvm/vmx: Fix VMX vs hrtimer_rearm_deferred()
page: | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox