messages from 2026-05-13 13:20:32 to 2026-05-14 09:33:43 UTC [more...]
[PATCH v14 00/44] arm64: Support for Arm CCA in KVM
2026-05-14 9:33 UTC (25+ messages)
` [PATCH v14 10/44] arm64: RMI: Add support for SRO
` [PATCH v14 24/44] KVM: arm64: Handle realm MMIO emulation
` [PATCH v14 25/44] KVM: arm64: Expose support for private memory
` [PATCH v14 26/44] arm64: RMI: Allow populating initial contents
` [PATCH v14 27/44] arm64: RMI: Set RIPAS of initial memslots
` [PATCH v14 28/44] arm64: RMI: Create the realm descriptor
` [PATCH v14 29/44] arm64: RMI: Runtime faulting of memory
` [PATCH v14 30/44] KVM: arm64: Handle realm VCPU load
` [PATCH v14 31/44] KVM: arm64: Validate register access for a Realm VM
` [PATCH v14 32/44] KVM: arm64: Handle Realm PSCI requests
` [PATCH v14 33/44] KVM: arm64: WARN on injected undef exceptions
` [PATCH v14 34/44] arm64: RMI: allow userspace to inject aborts
` [PATCH v14 35/44] arm64: RMI: support RSI_HOST_CALL
` [PATCH v14 36/44] arm64: RMI: Allow checking SVE on VM instance
` [PATCH v14 37/44] arm64: RMI: Prevent Device mappings for Realms
` [PATCH v14 38/44] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v14 39/44] arm64: RMI: Set breakpoint parameters through SET_ONE_REG
` [PATCH v14 40/44] arm64: RMI: Propagate max SVE vector length from RMM
` [PATCH v14 41/44] arm64: RMI: Configure max SVE vector length for a Realm
` [PATCH v14 42/44] arm64: RMI: Provide register list for unfinalized RMI RECs
` [PATCH v14 43/44] arm64: RMI: Provide accurate register list
` [PATCH v14 44/44] arm64: RMI: Enable realms to be created
[PATCH net] vsock/virtio: fix zerocopy completion for multi-skb sends
2026-05-14 9:29 UTC
[kvm:queue 4/24] arch/x86/kvm/vmx/vmenter.S:98: Error: invalid operands (*UND* and *ABS* sections) for `*'
2026-05-14 9:25 UTC (2+ messages)
[PATCH] hisi_acc_vfio_pci: simplify the command for reading device information
2026-05-14 9:20 UTC
[PATCH v7 13/20] KVM: arm64: Apply dynamic guest counter reservations
2026-05-14 9:10 UTC (3+ messages)
[PATCH v3 0/4] KVM: x86: Virtualize AMD's "disable CPUID in usermode"
2026-05-14 8:51 UTC (7+ messages)
` [PATCH v3 1/4] KVM: x86: Consolidate CPUID fault handling for emulator and interception logic
` [PATCH v3 2/4] KVM: x86: Remove supports_cpuid_fault() helper
` [PATCH v3 3/4] KVM: x86: Virtualize AMD CPUID faulting
` [PATCH v3 4/4] KVM: selftests: Update hwcr_msr_test for CPUID faulting bit
[PATCH] RISC-V: KVM: Fix sign extension for MMIO loads
2026-05-14 8:17 UTC
[PATCH 0/5] KVM: x86: Expose Zhaoxin CPUID 0xC0000001 EDX cryptographic features
2026-05-14 6:58 UTC (6+ messages)
` [PATCH 1/5] KVM: x86: Expose Zhaoxin SM2 CPUID feature
[PATCH v9 0/5] riscv: add SBI Supervisor Software Events support
2026-05-14 6:52 UTC (4+ messages)
` [PATCH v9 3/5] drivers: firmware: add riscv SSE support
` [External] "
[PATCH v2 0/5] LoongArch: KVM: Small enhancement about interrupt injection
2026-05-14 6:28 UTC (6+ messages)
` [PATCH v2 1/5] LoongArch: KVM: Check irq validility in kvm_vcpu_ioctl_interrupt()
` [PATCH v2 2/5] LoongArch: KVM: Use existing macro about interrupt bit mask
` [PATCH v2 3/5] LoongArch: KVM: Inject interrupt with batch method
` [PATCH v2 4/5] LoongArch: KVM: Add valid bit check when set ESTAT CSR register
` [PATCH v2 5/5] LoongArch: KVM: Simple interrupt status acquire interface
[PATCH v2] x86/cpu: Skip reading MSR_IA32_PLATFORM_ID in virtualized environment
2026-05-14 6:25 UTC (10+ messages)
` [PATCH 1/2] x86/microcode: Do not access MSR_IA32_PLATFORM_ID when running as a guest
` [PATCH 2/2] x86/cpu: Move intel_get_platform_id() to cpu/intel.c
[PATCH v3 0/2] vfio/dma-buf: add TPH support for peer-to-peer access
2026-05-14 6:08 UTC (4+ messages)
` [PATCH v3 1/2] vfio: add dma-buf get_tph callback and DMA_BUF_TPH feature
[PATCH v2 1/2] vfio: add dma-buf get_tph callback and DMA_BUF_TPH feature
2026-05-14 5:52 UTC (3+ messages)
[PATCH v2 0/9] KVM: x86: Improve the handling of debug exceptions during instruction emulation
2026-05-14 5:31 UTC (4+ messages)
` [PATCH v2 9/9] KVM: selftests: Verify 'BS' bit checking in pending debug exception state during VM-Entry
[PATCH v6 0/7] KVM: SVM: Add Page Modification Logging (PML) support
2026-05-14 4:14 UTC (12+ messages)
` [PATCH v6 7/7] KVM: SVM: Add Page modification logging support
[PATCH v2 0/5] KVM: PPC: Handle CPU compatibility mode for nested guests
2026-05-14 3:19 UTC (2+ messages)
[kvm:queue 5/24] arch/x86/kvm/svm/vmenter.S:95: Error: invalid operands (*UND* and *ABS* sections) for `*'
2026-05-14 3:44 UTC
[PATCH v6 00/28] KVM: combined patchset for MBEC/GMET support
2026-05-14 2:11 UTC (5+ messages)
[PATCH] KVM: selftests: Check guest memfd validity with flags
2026-05-14 1:30 UTC (6+ messages)
[PATCH v2 03/14] mm: rename uffd-wp PTE accessors to uffd
2026-05-14 1:31 UTC (2+ messages)
[PATCH net-next v12 0/4] tun/tap & vhost-net: apply qdisc backpressure on full ptr_ring to reduce TX drops
2026-05-14 1:10 UTC (2+ messages)
[PATCH v1 0/1] KVM: x86: Merge pending debug causes when vectoring #DB
2026-05-14 1:08 UTC (3+ messages)
` [PATCH v1 1/1] "
[PATCH v8 0/8] vfio: selftest: Add SR-IOV UAPI test
2026-05-13 23:47 UTC (2+ messages)
[PATCH] vfio: selftests: Add driver for IGB QEMU device
2026-05-13 23:33 UTC (6+ messages)
[PATCH v4 00/16] vfio/pci: Base Live Update support for VFIO
2026-05-13 22:42 UTC (5+ messages)
` [PATCH v4 02/16] vfio/pci: Preserve vfio-pci device files across Live Update
[RFC PATCH 00/22] KVM: apply chainsaw to struct kvm_mmu
2026-05-13 21:36 UTC (3+ messages)
` [PATCH 17/22] KVM: x86/mmu: pull struct kvm_pagewalk out of "
[kvm-unit-tests PATCH] arm: io: Set is_pl011_uart flag in ACPI initialization
2026-05-13 21:16 UTC
[PATCH v4 00/21] KVM: x86: Enable APX for guests
2026-05-13 19:10 UTC (5+ messages)
` [PATCH v4 06/21] x86/fpu: Ignore APX when copying from/to guest FPU
[GIT PULL] KVM changes for Linux 7.1-rc4
2026-05-13 19:03 UTC (2+ messages)
[PATCH 0/9] vfio/pci: Add mmap() for DMABUFs
2026-05-13 18:27 UTC (9+ messages)
` [PATCH 9/9] vfio/pci: Add mmap() attributes to DMABUF feature
[PATCH] Documentation: KVM: Document guest-visible compatibility expectations
2026-05-13 18:26 UTC (10+ messages)
[PATCH 0/2] KVM: TDX: Disable PMU virtualization for TDX VMs
2026-05-13 18:25 UTC (7+ messages)
` [PATCH 2/2] KVM: TDX: Disable pmu "
[PATCH 0/3] KVM: Macrofy GPR swapping in assembly code
2026-05-13 17:49 UTC (4+ messages)
` [PATCH 1/3] KVM: VMX: Macrofy GPR swapping in __vmx_vcpu_run()
` [PATCH 2/3] KVM: SVM: Macrofy GPR swapping in __svm_vcpu_run()
` [PATCH 3/3] KVM: SEV: Macrofy GPR swapping in __svm_sev_es_vcpu_run()
[PATCH v2 0/3] KVM: Fix and clean up kvm_vcpu_map[_readonly]() usages
2026-05-13 17:33 UTC (6+ messages)
[PATCH v2 0/6] KVM: x86: Reg cleanups / prep work for APX
2026-05-13 16:50 UTC (2+ messages)
[PATCH v7 10/20] KVM: arm64: Context swap Partitioned PMU guest registers
2026-05-13 16:38 UTC (2+ messages)
[PATCH v6 0/4] KVM: s390: Introducing kvm_arch_set_irq_inatomic Fast Inject
2026-05-13 16:16 UTC (5+ messages)
` [PATCH v6 1/4] KVM: s390: Add map/unmap ioctl and clean mappings post-guest
` [PATCH v6 2/4] KVM: s390: Enable adapter_indicators_set to use mapped pages
[PATCH v7 06/20] perf: arm_pmuv3: Add method to partition the PMU
2026-05-13 16:13 UTC (2+ messages)
[PATCH] KVM: VMX: introduce module parameter to disable CET
2026-05-13 15:51 UTC (3+ messages)
Re: [PATCH 6.18 091/270] LoongArch: KVM: Compile switch.S directly into the kernel
2026-05-13 15:29 UTC (3+ messages)
[PATCH v9 00/23] Runtime TDX module update support
2026-05-13 15:10 UTC (24+ messages)
` [PATCH v9 01/23] x86/virt/tdx: Consolidate TDX global initialization states
` [PATCH v9 02/23] x86/virt/tdx: Move TDX_FEATURES0 bits to asm/tdx.h
` [PATCH v9 03/23] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v9 04/23] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v9 05/23] coco/tdx-host: Expose TDX module version
` [PATCH v9 06/23] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v9 07/23] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v9 08/23] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v9 09/23] coco/tdx-host: Don't expose P-SEAMLDR information on CPUs with erratum
` [PATCH v9 10/23] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v9 11/23] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v9 12/23] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v9 13/23] x86/virt/seamldr: Abort updates after a failed step
` [PATCH v9 14/23] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v9 15/23] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v9 16/23] x86/virt/seamldr: Install a new TDX module
` [PATCH v9 17/23] x86/virt/seamldr: Do TDX per-CPU initialization after module installation
` [PATCH v9 18/23] x86/virt/tdx: Restore TDX module state
` [PATCH v9 19/23] x86/virt/tdx: Refresh TDX module version after update
` [PATCH v9 20/23] x86/virt/tdx: Reject updates during compatibility-sensitive operations
` [PATCH v9 21/23] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v9 22/23] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v9 23/23] x86/virt/tdx: Document TDX module update
[PATCH v2] vhost/vsock: Refuse the connection immediately when guest isn't ready
2026-05-13 14:50 UTC
[PATCH v2 0/5] KVM: SVM: Fix x2AVIC MSR interception issues
2026-05-13 13:33 UTC (4+ messages)
` [PATCH v2 3/5] KVM: SVM: Only disable x2AVIC WRMSR interception for MSRs that are accelerated
page: | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox