Kernel KVM virtualization development
 help / color / mirror / Atom feed
 messages from 2026-05-13 11:18:26 to 2026-05-13 15:12:03 UTC [more...]

[PATCH v9 00/23] Runtime TDX module update support
 2026-05-13 15:10 UTC  (24+ messages)
` [PATCH v9 01/23] x86/virt/tdx: Consolidate TDX global initialization states
` [PATCH v9 02/23] x86/virt/tdx: Move TDX_FEATURES0 bits to asm/tdx.h
` [PATCH v9 03/23] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v9 04/23] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v9 05/23] coco/tdx-host: Expose TDX module version
` [PATCH v9 06/23] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v9 07/23] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v9 08/23] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v9 09/23] coco/tdx-host: Don't expose P-SEAMLDR information on CPUs with erratum
` [PATCH v9 10/23] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v9 11/23] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v9 12/23] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v9 13/23] x86/virt/seamldr: Abort updates after a failed step
` [PATCH v9 14/23] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v9 15/23] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v9 16/23] x86/virt/seamldr: Install a new TDX module
` [PATCH v9 17/23] x86/virt/seamldr: Do TDX per-CPU initialization after module installation
` [PATCH v9 18/23] x86/virt/tdx: Restore TDX module state
` [PATCH v9 19/23] x86/virt/tdx: Refresh TDX module version after update
` [PATCH v9 20/23] x86/virt/tdx: Reject updates during compatibility-sensitive operations
` [PATCH v9 21/23] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v9 22/23] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v9 23/23] x86/virt/tdx: Document TDX module update

[PATCH v2] vhost/vsock: Refuse the connection immediately when guest isn't ready
 2026-05-13 14:50 UTC 

[PATCH v2] x86/cpu: Skip reading MSR_IA32_PLATFORM_ID in virtualized environment
 2026-05-13 14:41 UTC  (9+ messages)

[PATCH] Documentation: KVM: Document guest-visible compatibility expectations
 2026-05-13 13:57 UTC  (9+ messages)

[PATCH] KVM: selftests: Check guest memfd validity with flags
 2026-05-13 13:52 UTC  (4+ messages)

[PATCH v2 0/5] KVM: SVM: Fix x2AVIC MSR interception issues
 2026-05-13 13:33 UTC  (4+ messages)
` [PATCH v2 3/5] KVM: SVM: Only disable x2AVIC WRMSR interception for MSRs that are accelerated

[PATCH v14 00/44] arm64: Support for Arm CCA in KVM
 2026-05-13 13:17 UTC  (45+ messages)
` [PATCH v14 01/44] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v14 02/44] kvm: arm64: Avoid including linux/kvm_host.h in kvm_pgtable.h
` [PATCH v14 03/44] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v14 04/44] arm64: RMI: Add SMC definitions for calling the RMM
` [PATCH v14 05/44] arm64: RMI: Add wrappers for RMI calls
` [PATCH v14 06/44] arm64: RMI: Check for RMI support at init
` [PATCH v14 07/44] arm64: RMI: Configure the RMM with the host's page size
` [PATCH v14 08/44] arm64: RMI: Ensure that the RMM has GPT entries for memory
` [PATCH v14 09/44] arm64: RMI: Provide functions to delegate/undelegate ranges of memory
` [PATCH v14 10/44] arm64: RMI: Add support for SRO
` [PATCH v14 11/44] arm64: RMI: Check for RMI support at KVM init
` [PATCH v14 12/44] arm64: RMI: Check for LPA2 support
` [PATCH v14 13/44] arm64: RMI: Define the user ABI
` [PATCH v14 14/44] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v14 15/44] kvm: arm64: Don't expose unsupported capabilities for realm guests
` [PATCH v14 16/44] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v14 17/44] arm64: RMI: RTT tear down
` [PATCH v14 18/44] arm64: RMI: Activate realm on first VCPU run
` [PATCH v14 19/44] arm64: RMI: Allocate/free RECs to match vCPUs
` [PATCH v14 20/44] arm64: RMI: Support for the VGIC in realms
` [PATCH v14 21/44] KVM: arm64: Support timers in realm RECs
` [PATCH v14 22/44] arm64: RMI: Handle realm enter/exit
` [PATCH v14 23/44] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v14 24/44] KVM: arm64: Handle realm MMIO emulation
` [PATCH v14 25/44] KVM: arm64: Expose support for private memory
` [PATCH v14 26/44] arm64: RMI: Allow populating initial contents
` [PATCH v14 27/44] arm64: RMI: Set RIPAS of initial memslots
` [PATCH v14 28/44] arm64: RMI: Create the realm descriptor
` [PATCH v14 29/44] arm64: RMI: Runtime faulting of memory
` [PATCH v14 30/44] KVM: arm64: Handle realm VCPU load
` [PATCH v14 31/44] KVM: arm64: Validate register access for a Realm VM
` [PATCH v14 32/44] KVM: arm64: Handle Realm PSCI requests
` [PATCH v14 33/44] KVM: arm64: WARN on injected undef exceptions
` [PATCH v14 34/44] arm64: RMI: allow userspace to inject aborts
` [PATCH v14 35/44] arm64: RMI: support RSI_HOST_CALL
` [PATCH v14 36/44] arm64: RMI: Allow checking SVE on VM instance
` [PATCH v14 37/44] arm64: RMI: Prevent Device mappings for Realms
` [PATCH v14 38/44] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v14 39/44] arm64: RMI: Set breakpoint parameters through SET_ONE_REG
` [PATCH v14 40/44] arm64: RMI: Propagate max SVE vector length from RMM
` [PATCH v14 41/44] arm64: RMI: Configure max SVE vector length for a Realm
` [PATCH v14 42/44] arm64: RMI: Provide register list for unfinalized RMI RECs
` [PATCH v14 43/44] arm64: RMI: Provide accurate register list
` [PATCH v14 44/44] arm64: RMI: Enable realms to be created

[PATCH v2 0/9] sched/kvm: Semantics-aware vCPU scheduling for oversubscribed KVM
 2026-05-13 12:52 UTC  (6+ messages)

[PATCH 0/2] KVM: arm64: nv: Reduce FP/SVE overhead on exception/exception return
 2026-05-13 12:49 UTC  (4+ messages)
` [PATCH 2/2] KVM: arm64: nv: Don't save/restore FP register during a nested ERET or exception

[PATCH v1 0/5] KVM: x86: Expose Zhaoxin CPUID 0xC0000001 EDX cryptographic features
 2026-05-13 12:48 UTC  (6+ messages)
` [PATCH v1 1/5] KVM: x86: Expose Zhaoxin SM2 CPUID feature
` [PATCH v1 2/5] KVM: x86: Expose Zhaoxin CCS (SM3 + SM4) "
` [PATCH v1 3/5] KVM: x86: Expose Zhaoxin RNG2 "
` [PATCH v1 4/5] KVM: x86: Expose Zhaoxin PHE2 "
` [PATCH v1 5/5] KVM: x86: Expose Zhaoxin RSA "

[PATCH 0/2] KVM: selftests: Fixes for guest_memfd_test and FD double-close
 2026-05-13 12:48 UTC  (4+ messages)
` [PATCH 2/2] KVM: selftests: Fix FD double-close in kvm_vm_release()

[PATCH v2 0/2] x86/tdx: Port I/O emulation fixes
 2026-05-13 12:48 UTC  (5+ messages)
` [PATCH v2 2/2] x86/tdx: Fix zero-extension for 32-bit port I/O

[PATCH v2 0/2] vfio: Fix racy bitfields and tighten struct layout
 2026-05-13 12:31 UTC  (5+ messages)
` [PATCH v2 1/2] vfio/pci: "

[PATCH 1/3] KVM: selftests: Add unit to dirty_log_test
 2026-05-13 12:27 UTC  (3+ messages)

[PATCH 6.18 091/270] LoongArch: KVM: Compile switch.S directly into the kernel
 2026-05-13 12:08 UTC  (4+ messages)
`  "

[PATCH] vhost/vsock: Refuse the connection immediately when guest isn't ready
 2026-05-13 11:18 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox