Toggle navigation
Patchwork
KVM development
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: State =
Action Required
| 115930 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Mainlined
Queued
Needs ACK
Handled Elsewhere
In Next
Search
Archived
No
Yes
Both
Delegate
------
Nobody
holtmann
holtmann
holtmann
agk
mchehab
mchehab
gregkh
gregkh
mtosatti
lethal
lethal
avi
cvaroqui
jbrassow
mikulas
dtor
bmarzins
tmlind
jmberg
jmberg
mcgrof
mcgrof
mcgrof
lenb
lenb
kyle
felipebalbi
varenet
helge
helge
khilman
khilman
khilman
khilman
jwoithe
mlin
Zhang Rui
Zhang Rui
iksaif
cjackiewicz
hmh
jbarnes
jbarnes
jbarnes
willy
snitzer
iwamatsu
dougsland
mjg59
rafael
rafael
rafael
ericvh@gmail.com
ykzhao
venkip
sandeen
pwsan
lucho@ionkov.net
rminnich
anholt
aystarik
roland
shefty
mason
glikely
krh
djbw
djbw
djbw
cmarinas
doyu
jrn
sage
tomba
mmarek
cjb
trondmy
jikos
bcousson
jic23
olof
olof
olof
nsekhar
weiny2
horms
horms
bwidawsk
bwidawsk
shemminger
eulfhan
josef
josef
josef
dianders
jpan9
hal
kdave
bleung
evalenti
jlbec
wsa
bhelgaas
vkoul
vkoul
szlin
davejiang
markgross
tagr
tiwai
vireshk
mmind
dledford
geert
geert
herbert
herbert
kvalo
kvalo
kvalo
bentiss
arend
rzwisler
stellarhopper
stellarhopper
jejb
matthias_bgg
dvhart
axboe
axboe
pcmoore
pcmoore
pcmoore
mkp
mkp
stefan_schmidt
leon
lucvoo
jsakkine
jsakkine
jsakkine
bamse
bamse
demarchi
krzk
groeck
groeck
sboyd
sboyd
mturquette
mturquette
0andriy
carlocaione
luca
dgc
kbingham
derosier
narmstrong
narmstrong
atull
tytso
tytso
djwong
bvanassche
omos
jpirko
jpirko
GustavoARSilva
pkshih
patersonc
brauner
shuahkh
shuahkh
shuahkh
palmer
palmer
jgg
Kishon
idosch
labbott
jsimmons
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
lfadmin
broonie
broonie
broonie
mricon
mricon
mricon
kees
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
lfgitoliteapi
arnd
linusw
perfinion
bbrezillon
bachradsusi
rostedt
rostedt
kholk
nbd
ebiggers
ebiggers
pavelm
sds
m0reeze
ganis
jwcart2
matttbe
andmur01
lorpie01
chanwoochoi
dlezcano
jhedberg
vudentz
robertfoss
bgix
tedd_an
tsbogend
wens
wcrobert
robher
kstewart
kwilczynski
hansg
bpf
netdev
dsa
ethtool
netdrv
martineau
abelloni
trix
pabeni
mani_sadhasivam
mlimonci
liusong6
mjp
tohojo
pmalani
prestwoj
prestwoj
dhowells
tzungbi
conchuod
paulmck
jes
mtkaczyk
colyli
cem
pateldipen1984
iweiny
iweiny
bjorn
mhiramat
JanKiszka
jaegeuk
mraynal
aring
konradybcio
ij
Hailan
jstitt007
denkenz
denkenz
mkorenbl
jjohnson
frank_li
geliang
mdraidci
mdraidci
peluse
joelgranados
Apply
«
1
2
...
33
34
35
…
1159
1160
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
KVM: x86: Document an erratum in KVM_SET_VCPU_EVENTS on Intel CPUs
KVM: x86: Document an erratum in KVM_SET_VCPU_EVENTS on Intel CPUs
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[2/2] KVM: Protect vCPU's "last run PID" with rwlock, not RCU
KVM: Protect vCPU's PID with a rwlock
- 1 -
-
-
-
2024-08-02
Sean Christopherson
New
[1/2] KVM: Return '0' directly when there's no task to yield to
KVM: Protect vCPU's PID with a rwlock
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[5/5] KVM: x86: Add fastpath handling of HLT VM-Exits
KVM: x86: Fastpath cleanup, fix, and enhancement
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[4/5] KVM: x86: Reorganize code in x86.c to co-locate vCPU blocking/running helpers
KVM: x86: Fastpath cleanup, fix, and enhancement
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[3/5] KVM: x86: Exit to userspace if fastpath triggers one on instruction skip
KVM: x86: Fastpath cleanup, fix, and enhancement
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[2/5] KVM: x86: Dedup fastpath MSR post-handling logic
KVM: x86: Fastpath cleanup, fix, and enhancement
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[1/5] KVM: x86: Re-enter guest if WRMSR(X2APIC_ICR) fastpath is successful
KVM: x86: Fastpath cleanup, fix, and enhancement
- - -
-
-
-
2024-08-02
Sean Christopherson
New
KVM: Use precise range-based flush in mmu_notifier hooks when possible
KVM: Use precise range-based flush in mmu_notifier hooks when possible
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[9/9] KVM: selftests: Add a testcase for disabling feature MSRs init quirk
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[8/9] KVM: selftests: Verify get/set PERF_CAPABILITIES w/o guest PDMC behavior
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[7/9] KVM: x86: Remove ordering check b/w MSR_PLATFORM_INFO and MISC_FEATURES_ENABLES
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[6/9] KVM: x86: Reject userspace attempts to access ARCH_CAPABILITIES w/o support
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[5/9] KVM: VMX: Remove restriction that PMU version > 0 for PERF_CAPABILITIES
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[4/9] KVM: x86: Reject userspace attempts to access PERF_CAPABILITIES w/o PDCM
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[3/9] KVM: x86: Quirk initialization of feature MSRs to KVM's max configuration
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[2/9] KVM: x86: Disallow changing MSR_PLATFORM_INFO after vCPU has run
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[1/9] KVM: x86: Co-locate initialization of feature MSRs in kvm_arch_vcpu_create()
KVM: x86: Add a quirk for feature MSR initialization
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[6/6] KVM: x86: selftests: Test PerfMonV2
Extend pmu_counters_test to AMD CPUs
- - -
-
-
-
2024-08-02
Colton Lewis
New
[5/6] KVM: x86: selftests: Test core events
Extend pmu_counters_test to AMD CPUs
- - -
-
-
-
2024-08-02
Colton Lewis
New
[4/6] KVM: x86: selftests: Test read/write core counters
Extend pmu_counters_test to AMD CPUs
- - -
-
-
-
2024-08-02
Colton Lewis
New
[3/6] KVM: x86: selftests: Set up AMD VM in pmu_counters_test
Extend pmu_counters_test to AMD CPUs
- - -
-
-
-
2024-08-02
Colton Lewis
New
[2/6] KVM: x86: selftests: Define AMD PMU CPUID leaves
Extend pmu_counters_test to AMD CPUs
- - -
-
-
-
2024-08-02
Colton Lewis
New
[1/6] KVM: x86: selftests: Fix typos in macro variable use
Extend pmu_counters_test to AMD CPUs
- - -
-
-
-
2024-08-02
Colton Lewis
New
[v2,10/10] KVM: x86: Suppress userspace access failures on unsupported, "emulated" MSRs
KVM: x86: Clean up MSR access/failure handling
- 1 -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,09/10] KVM: x86: Suppress failures on userspace access to advertised, unsupported MSRs
KVM: x86: Clean up MSR access/failure handling
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,08/10] KVM: x86: Hoist x86.c's global msr_* variables up above kvm_do_msr_access()
KVM: x86: Clean up MSR access/failure handling
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,07/10] KVM: x86: Funnel all fancy MSR return value handling into a common helper
KVM: x86: Clean up MSR access/failure handling
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,06/10] KVM: x86: Refactor kvm_get_feature_msr() to avoid struct kvm_msr_entry
KVM: x86: Clean up MSR access/failure handling
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,05/10] KVM: x86: Rename get_msr_feature() APIs to get_feature_msr()
KVM: x86: Clean up MSR access/failure handling
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,04/10] KVM: x86: Refactor kvm_x86_ops.get_msr_feature() to avoid kvm_msr_entry
KVM: x86: Clean up MSR access/failure handling
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,03/10] KVM: x86: Rename KVM_MSR_RET_INVALID to KVM_MSR_RET_UNSUPPORTED
KVM: x86: Clean up MSR access/failure handling
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,02/10] KVM: x86: Move MSR_TYPE_{R,W,RW} values from VMX to x86, as enums
KVM: x86: Clean up MSR access/failure handling
- - -
-
-
-
2024-08-02
Sean Christopherson
New
[v2,01/10] KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value
KVM: x86: Clean up MSR access/failure handling
- 1 -
-
-
-
2024-08-02
Sean Christopherson
New
[GIT,PULL] KVM changes for Linux 6.11-rc2
[GIT,PULL] KVM changes for Linux 6.11-rc2
- - -
-
-
-
2024-08-02
Paolo Bonzini
New
[v4,10/10] s390: Enable KVM_S390_UCONTROL config in debug_defconfig
selftests: kvm: s390: Add s390x ucontrol selftests
- 1 -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,09/10] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
selftests: kvm: s390: Add s390x ucontrol selftests
- 1 -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,08/10] selftests: kvm: s390: Add uc_skey VM test case
selftests: kvm: s390: Add s390x ucontrol selftests
- - -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,07/10] selftests: kvm: s390: Add uc_map_unmap VM test case
selftests: kvm: s390: Add s390x ucontrol selftests
- - -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,06/10] selftests: kvm: s390: Add VM run test case
selftests: kvm: s390: Add s390x ucontrol selftests
- 1 -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,05/10] selftests: kvm: s390: Add debug print functions
selftests: kvm: s390: Add s390x ucontrol selftests
1 - -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,04/10] selftests: kvm: s390: Add test fixture and simple VM setup tests
selftests: kvm: s390: Add s390x ucontrol selftests
- 1 -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,03/10] selftests: kvm: s390: Add s390x ucontrol test suite with hpage test
selftests: kvm: s390: Add s390x ucontrol selftests
- 1 -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,02/10] selftests: kvm: s390: Add kvm_s390_sie_block definition for userspace tests
selftests: kvm: s390: Add s390x ucontrol selftests
- 1 -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v4,01/10] selftests: kvm: s390: Define page sizes in shared header
selftests: kvm: s390: Add s390x ucontrol selftests
- 2 -
-
-
-
2024-08-02
Christoph Schlameuss
New
[v1,11/11] mm/ksm: convert break_ksm() from walk_page_range_vma() to folio_walk
mm: replace follow_page() by folio_walk
- - -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,10/11] mm: remove follow_page()
mm: replace follow_page() by folio_walk
- - -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,09/11] s390/mm/fault: convert do_secure_storage_access() from follow_page() to folio_walk
mm: replace follow_page() by folio_walk
- 1 -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,08/11] s390/uv: convert gmap_destroy_page() from follow_page() to folio_walk
mm: replace follow_page() by folio_walk
- 1 -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,07/11] mm/huge_memory: convert split_huge_pages_pid() from follow_page() to folio_walk
mm: replace follow_page() by folio_walk
- 1 -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,06/11] mm/ksm: convert scan_get_next_rmap_item() from follow_page() to folio_walk
mm: replace follow_page() by folio_walk
- - -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,05/11] mm/ksm: convert get_mergeable_page() from follow_page() to folio_walk
mm: replace follow_page() by folio_walk
- - -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,04/11] mm/migrate: convert add_page_for_migration() from follow_page() to folio_walk
mm: replace follow_page() by folio_walk
- - -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,03/11] mm/migrate: convert do_pages_stat_array() from follow_page() to folio_walk
mm: replace follow_page() by folio_walk
- - -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,02/11] mm/pagewalk: introduce folio_walk_start() + folio_walk_end()
mm: replace follow_page() by folio_walk
- - -
-
-
-
2024-08-02
David Hildenbrand
New
[v1,01/11] mm: provide vm_normal_(page|folio)_pmd() with CONFIG_PGTABLE_HAS_HUGE_LEAVES
mm: replace follow_page() by folio_walk
- - -
-
-
-
2024-08-02
David Hildenbrand
New
[v2,2/2] KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE
Relax canonical checks on some arch msrs
- - -
-
-
-
2024-08-02
Maxim Levitsky
New
[v2,1/2] KVM: x86: relax canonical check for some x86 architectural msrs
Relax canonical checks on some arch msrs
- - -
-
-
-
2024-08-02
Maxim Levitsky
New
KVM: x86: Use gfn_to_pfn_cache for steal_time
KVM: x86: Use gfn_to_pfn_cache for steal_time
- 1 -
-
-
-
2024-08-02
Carsten Stollmaier
New
[GIT,PULL] KVM/riscv fixes for 6.11 take #1
[GIT,PULL] KVM/riscv fixes for 6.11 take #1
- - -
-
-
-
2024-08-02
Anup Patel
New
[2/1] i8253: Fix stop sequence for timer 0
i8253: Disable PIT timer 0 when not in use
- - -
-
-
-
2024-08-02
David Woodhouse
New
[2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
- 1 -
-
-
-
2024-08-02
Kim Phillips
New
[1/2] x86/cpufeatures: Add "Allowed SEV Features" Feature
KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
- - -
-
-
-
2024-08-02
Kim Phillips
New
KVM: SEV: allow KVM_SEV_GET_ATTESTATION_REPORT for SNP guests
KVM: SEV: allow KVM_SEV_GET_ATTESTATION_REPORT for SNP guests
- - -
-
-
-
2024-08-01
Paolo Bonzini
New
[RFC,9/9] KVM: x86/mmu: Track SPTE accessed info across mmu_notifier PROT changes
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
[RFC,8/9] KVM: Plumb mmu_notifier invalidation event type into arch code
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
[RFC,7/9] KVM: x86/mmu: Stop processing TDP MMU roots for test_age if young SPTE found
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
[RFC,6/9] KVM: x86/mmu: Process only valid TDP MMU roots when aging a gfn range
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
[RFC,5/9] KVM: x86/mmu: Free up A/D bits in FROZEN_SPTE
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
[RFC,4/9] KVM: x86/mmu: Use Accessed bit even when _hardware_ A/D bits are disabled
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
[RFC,3/9] KVM: x86/mmu: Set shadow_dirty_mask for EPT even if A/D bits disabled
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
[RFC,2/9] KVM: x86/mmu: Set shadow_accessed_mask for EPT even if A/D bits disabled
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
[RFC,1/9] KVM: x86/mmu: Add a dedicated flag to track if A/D bits are globally enabled
KVM: x86/mmu: Preserve Accessed bits on PROT changes
- - -
-
-
-
2024-08-01
Sean Christopherson
New
Fixes: f32fb32820b1 ("KVM: x86: Add hook for determining max NPT mapping level")
Fixes: f32fb32820b1 ("KVM: x86: Add hook for determining max NPT mapping level")
- - -
-
-
-
2024-08-01
Ackerley Tng
New
i8253: Disable PIT timer 0 when not in use
i8253: Disable PIT timer 0 when not in use
- - -
-
-
-
2024-08-01
David Woodhouse
New
[RFC,vhost] vhost-vdpa: Fix invalid irq bypass unregister
[RFC,vhost] vhost-vdpa: Fix invalid irq bypass unregister
- - -
-
-
-
2024-08-01
Dragos Tatulea
New
[1/1] virtio_blk: implement init_hctx MQ operation
[1/1] virtio_blk: implement init_hctx MQ operation
- 1 -
-
-
-
2024-08-01
Max Gurtovoy
New
[v2] KVM: s390: fix validity interception issue when gisa is switched off
[v2] KVM: s390: fix validity interception issue when gisa is switched off
- 1 1
-
-
-
2024-08-01
Michael Mueller
New
[v1,1/1] s390/uv: Panic if the security of the system cannot be guaranteed.
[v1,1/1] s390/uv: Panic if the security of the system cannot be guaranteed.
- 3 -
-
-
-
2024-08-01
Claudio Imbrenda
New
[kvmtool] remove wordsize.h inclusion (for musl compatibility)
[kvmtool] remove wordsize.h inclusion (for musl compatibility)
- 1 -
-
-
-
2024-08-01
Andre Przywara
New
[v2,8/8] KVM: arm64: Expose ID_AA64PFR2_EL1 to userspace and guests
KVM: arm64: Add support for FP8
- - -
-
-
-
2024-08-01
Marc Zyngier
New
[v2,7/8] KVM: arm64: Enable FP8 support when available and configured
KVM: arm64: Add support for FP8
- - -
-
-
-
2024-08-01
Marc Zyngier
New
[v2,6/8] KVM: arm64: Expose ID_AA64FPFR0_EL1 as a writable ID reg
KVM: arm64: Add support for FP8
- - -
-
-
-
2024-08-01
Marc Zyngier
New
[v2,5/8] KVM: arm64: Honor trap routing for FPMR
KVM: arm64: Add support for FP8
- - -
-
-
-
2024-08-01
Marc Zyngier
New
[v2,4/8] KVM: arm64: Add save/restore support for FPMR
KVM: arm64: Add support for FP8
- - -
-
-
-
2024-08-01
Marc Zyngier
New
[v2,3/8] KVM: arm64: Move FPMR into the sysreg array
KVM: arm64: Add support for FP8
- - -
-
-
-
2024-08-01
Marc Zyngier
New
[v2,2/8] KVM: arm64: Add predicate for FPMR support in a VM
KVM: arm64: Add support for FP8
- - -
-
-
-
2024-08-01
Marc Zyngier
New
[v2,1/8] KVM: arm64: Move SVCR into the sysreg array
KVM: arm64: Add support for FP8
- - -
-
-
-
2024-08-01
Marc Zyngier
New
[RFC,v2,10/10] KVM: arm64: Enable private memory kconfig for arm64
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,09/10] KVM: arm64: arm64 has private memory support when config is enabled
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,08/10] KVM: arm64: Handle guest_memfd()-backed guest page faults
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,07/10] KVM: arm64: Do not allow changes to private memory slots
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,06/10] KVM: arm64: Skip VMA checks for slots without userspace address
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,05/10] KVM: selftests: guest_memfd mmap() test when mapping is allowed
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,04/10] KVM: Add KVM capability to check if guest_memfd can be mapped by the host
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,03/10] KVM: Implement kvm_(read|/write)_guest_page for private memory slots
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,02/10] KVM: Add restricted support for mapping guestmem by the host
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v2,01/10] KVM: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- - -
-
-
-
2024-08-01
Fuad Tabba
New
[RFC,v3,58/58] perf/x86/amd: Support PERF_PMU_CAP_PASSTHROUGH_VPMU for AMD host
Mediated Passthrough vPMU 3.0 for x86
- - -
-
-
-
2024-08-01
Mingwei Zhang
New
[RFC,v3,57/58] KVM: x86/pmu/svm: Implement callback to increment counters
Mediated Passthrough vPMU 3.0 for x86
- - -
-
-
-
2024-08-01
Mingwei Zhang
New
«
1
2
...
33
34
35
…
1159
1160
»