Show patches with: State = Action Required       |    Archived = No       |   1185 patches
« 1 2 3 411 12 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[kvm-unit-tests,v4,5/5] s390x: uv-guest: Add attestation tests s390x: Attestation tests - - - --- 2022-04-21 Steffen Eiden Under Review
[v4,1/1] KVM: s390: pv: don't allow userspace to set the clock under PV KVM: s390: pv: fix clock comparator late after suspend/resume - 2 - --- 2022-10-11 Nico Boehr Queued
[v2,1/2] vringh: fix range used in iotlb_translate() vhost: fix ranges when call vhost_iotlb_itree_first() 1 - - --- 2022-11-09 Stefano Garzarella New
[v2,2/2] vhost: fix range used in translate_desc() vhost: fix ranges when call vhost_iotlb_itree_first() 1 - - --- 2022-11-09 Stefano Garzarella New
KVM: svm/avic: Drop "struct kvm_x86_ops" for avic_hardware_setup() KVM: svm/avic: Drop "struct kvm_x86_ops" for avic_hardware_setup() - 1 - --- 2022-11-09 Like Xu New
[v2] x86/paravirt: use common macro for creating simple asm paravirt functions [v2] x86/paravirt: use common macro for creating simple asm paravirt functions - 1 - --- 2022-11-09 Juergen Gross New
[01/11] KVM: x86: use a separate asm-offsets.c file KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[02/11] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[03/11] KVM: SVM: adjust register allocation for __svm_vcpu_run KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[04/11] KVM: SVM: retrieve VMCB from assembly KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[05/11] KVM: SVM: remove unused field from struct vcpu_svm KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[06/11] KVM: SVM: remove dead field from struct svm_cpu_data KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[07/11] KVM: SVM: do not allocate struct svm_cpu_data dynamically KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[08/11] KVM: SVM: move guest vmsave/vmload back to assembly KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[09/11] KVM: SVM: restore host save area from assembly KVM: SVM: fixes for vmentry code - 1 1 --- 2022-11-09 Paolo Bonzini New
[10/11] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly KVM: SVM: fixes for vmentry code - 1 - --- 2022-11-09 Paolo Bonzini New
[11/11] x86, KVM: remove unnecessary argument to x86_virt_spec_ctrl and callers KVM: SVM: fixes for vmentry code - - - --- 2022-11-09 Paolo Bonzini New
vhost-vdpa: fix potential memory leak during the release vhost-vdpa: fix potential memory leak during the release 1 - - --- 2022-11-09 Stefano Garzarella New
[v3,1/2] KVM: selftests: Introduce a selftest to measure execution performance KVM: Split huge pages mapped by the TDP MMU on fault - - - --- 2022-11-09 David Matlack New
[v3,2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault KVM: Split huge pages mapped by the TDP MMU on fault - 2 - --- 2022-11-09 David Matlack New
[v7,1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup Introduce and test masked events - - - --- 2022-11-09 Aaron Lewis New
[v7,2/7] kvm: x86/pmu: Remove impossible events from the pmu event filter Introduce and test masked events - - - --- 2022-11-09 Aaron Lewis New
[v7,3/7] kvm: x86/pmu: prepare the pmu event filter for masked events Introduce and test masked events - - - --- 2022-11-09 Aaron Lewis New
[v7,4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter Introduce and test masked events - - - --- 2022-11-09 Aaron Lewis New
[v7,5/7] selftests: kvm/x86: Add flags when creating a pmu event filter Introduce and test masked events - - - --- 2022-11-09 Aaron Lewis New
[v7,6/7] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER Introduce and test masked events - - - --- 2022-11-09 Aaron Lewis New
[v7,7/7] selftests: kvm/x86: Test masked events Introduce and test masked events - - - --- 2022-11-09 Aaron Lewis New
[1/2] vfio-ccw: sort out physical vs virtual pointers usage s390/vfio-ccw: addressing fixes - 2 - --- 2022-11-09 Eric Farman New
[2/2] vfio/ccw: identify CCW data addresses as physical s390/vfio-ccw: addressing fixes - 2 - --- 2022-11-09 Eric Farman New
[RFC,01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,02/17] x86/sev: Pvalidate memory gab for decompressing kernel x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,03/17] x86/hyperv: Add sev-snp enlightened guest specific config x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,04/17] x86/hyperv: apic change for sev-snp enlightened guest x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,05/17] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,06/17] x86/hyperv: Get Virtual Trust Level via hvcall x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,07/17] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,08/17] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,09/17] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,10/17] x86/hyperv: set target vtl in the vmbus init message x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,11/17] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,12/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,13/17] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,14/17] x86/hyperv: Add smp support for sev-snp guest x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,15/17] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,16/17] x86/sev: Add a #HV exception handler x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[RFC,17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv - - - --- 2022-11-09 Tianyu Lan New
[1/2] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes KVM: nVMX: Fix another case where KVM overrides VMX MSRs - - - --- 2022-11-10 Sean Christopherson New
[2/2] KVM: selftests: Test KVM's handling of VMX's sec exec MSR on KVM_SET_CPUID KVM: nVMX: Fix another case where KVM overrides VMX MSRs - - - --- 2022-11-10 Sean Christopherson New
KVM: x86: Remove unnecessary export of kvm_cpu_has_pending_timer() KVM: x86: Remove unnecessary export of kvm_cpu_has_pending_timer() - - - --- 2022-11-10 Sean Christopherson New
KVM: do not prepare new memslot for KVM_MR_DELETE KVM: do not prepare new memslot for KVM_MR_DELETE - - - --- 2022-11-10 Yan Zhao New
[1/3] KVM: VMX: Make module params and other variables read-only after init KVM: Mark vendor module param read-only after init - - - --- 2022-11-10 Sean Christopherson New
[2/3] KVM: SVM: Make MSR permission bitmap offsets read-only after init KVM: Mark vendor module param read-only after init - - - --- 2022-11-10 Sean Christopherson New
[3/3] KVM: SVM: Make module params and other variables read-only after init KVM: Mark vendor module param read-only after init - - - --- 2022-11-10 Sean Christopherson New
[v6,1/3] vfio: Fix container device registration life cycle vfio/pci: Check the device set open count on reset - 3 - --- 2022-11-10 Anthony DeRossi New
[v6,2/3] vfio: Export the device set open count vfio/pci: Check the device set open count on reset - 3 - --- 2022-11-10 Anthony DeRossi New
[v6,3/3] vfio/pci: Check the device set open count on reset vfio/pci: Check the device set open count on reset - 2 - --- 2022-11-10 Anthony DeRossi New
[1/2] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change KVM: x86/mmu: Use page-track only for... page tracking - - - --- 2022-11-10 Sean Christopherson New
[2/2] KVM: x86/mmu: Register page-tracker on first shadow root allocation KVM: x86/mmu: Use page-track only for... page tracking - - - --- 2022-11-10 Sean Christopherson New
[v3,1/7] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf x86: KVM: Advertise CPUID of new Intel platform - - - --- 2022-11-10 Jiaxi Chen New
[v3,2/7] x86: KVM: Advertise CMPccXADD CPUID to user space x86: KVM: Advertise CPUID of new Intel platform - - - --- 2022-11-10 Jiaxi Chen New
[v3,3/7] x86: KVM: Advertise AMX-FP16 CPUID to user space x86: KVM: Advertise CPUID of new Intel platform - - - --- 2022-11-10 Jiaxi Chen New
[v3,4/7] x86: KVM: Advertise AVX-IFMA CPUID to user space x86: KVM: Advertise CPUID of new Intel platform - - - --- 2022-11-10 Jiaxi Chen New
[v3,5/7] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space x86: KVM: Advertise CPUID of new Intel platform - - - --- 2022-11-10 Jiaxi Chen New
[v3,6/7] x86: KVM: Advertise AVX-NE-CONVERT CPUID to user space x86: KVM: Advertise CPUID of new Intel platform - - - --- 2022-11-10 Jiaxi Chen New
[v3,7/7] x86: KVM: Advertise PREFETCHIT0/1 CPUID to user space x86: KVM: Advertise CPUID of new Intel platform - - - --- 2022-11-10 Jiaxi Chen New
[RFC,2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges Untitled series #693857 - - - --- 2022-11-10 Oliver Upton New
[RFC,3/3] KVM: selftests: Test user hypercalls Untitled series #693857 - - - --- 2022-11-10 Oliver Upton New
linux-next: manual merge of the tip tree with the kvm-fixes tree linux-next: manual merge of the tip tree with the kvm-fixes tree - - - --- 2022-11-10 Stephen Rothwell New
KVM: x86/mmu: avoid accidentally go to shadow path for 0 count tdp root KVM: x86/mmu: avoid accidentally go to shadow path for 0 count tdp root - - - --- 2022-11-10 Yan Zhao New
[1/6] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[2/6] x86/traps: add a system interrupt table for system interrupt dispatch x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[3/6] x86/traps: add install_system_interrupt_handler() x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[4/6] x86/traps: add external_interrupt() to dispatch external interrupts x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[6/6] x86/traps: remove unused NMI entry exc_nmi_noist() x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[RESEND,1/6] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[RESEND,2/6] x86/traps: add a system interrupt table for system interrupt dispatch x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[RESEND,3/6] x86/traps: add install_system_interrupt_handler() x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[RESEND,4/6] x86/traps: add external_interrupt() to dispatch external interrupts x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[RESEND,5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[RESEND,6/6] x86/traps: remove unused NMI entry exc_nmi_noist() x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection - - - --- 2022-11-10 Li, Xin3 New
[v10,1/7] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL KVM: arm64: Enable ring-based dirty memory tracking - 2 - --- 2022-11-10 Gavin Shan New
[v10,2/7] KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h KVM: arm64: Enable ring-based dirty memory tracking - 1 - --- 2022-11-10 Gavin Shan New
[v10,3/7] KVM: Support dirty ring in conjunction with bitmap KVM: arm64: Enable ring-based dirty memory tracking 1 - - --- 2022-11-10 Gavin Shan New
[v10,4/7] KVM: arm64: Enable ring-based dirty memory tracking KVM: arm64: Enable ring-based dirty memory tracking - - - --- 2022-11-10 Gavin Shan New
[v10,5/7] KVM: selftests: Use host page size to map ring buffer in dirty_log_test KVM: arm64: Enable ring-based dirty memory tracking - - - --- 2022-11-10 Gavin Shan New
[v10,6/7] KVM: selftests: Clear dirty ring states between two modes in dirty_log_test KVM: arm64: Enable ring-based dirty memory tracking - - - --- 2022-11-10 Gavin Shan New
[v10,7/7] KVM: selftests: Automate choosing dirty ring size in dirty_log_test KVM: arm64: Enable ring-based dirty memory tracking - - - --- 2022-11-10 Gavin Shan New
[v2,1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable Linear Address Masking (LAM) KVM Enabling - - - --- 2022-11-10 Robert Hoo New
[v2,2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits Linear Address Masking (LAM) KVM Enabling - 1 - --- 2022-11-10 Robert Hoo New
[v2,3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd Linear Address Masking (LAM) KVM Enabling - 1 - --- 2022-11-10 Robert Hoo New
[v2,4/9,Trivial] KVM: x86: MMU: Commets update Linear Address Masking (LAM) KVM Enabling - - - --- 2022-11-10 Robert Hoo New
[v2,5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3 Linear Address Masking (LAM) KVM Enabling - 1 - --- 2022-11-10 Robert Hoo New
[v2,6/9] KVM: x86: Untag LAM bits when applicable Linear Address Masking (LAM) KVM Enabling - 1 - --- 2022-11-10 Robert Hoo New
[v2,7/9] KVM: x86: When judging setting CR3 valid or not, consider LAM bits Linear Address Masking (LAM) KVM Enabling - 1 - --- 2022-11-10 Robert Hoo New
[v2,8/9] KVM: x86: When guest set CR3, handle LAM bits semantics Linear Address Masking (LAM) KVM Enabling - - - --- 2022-11-10 Robert Hoo New
[v2,9/9] KVM: x86: LAM: Expose LAM CPUID to user space VMM Linear Address Masking (LAM) KVM Enabling - 1 - --- 2022-11-10 Robert Hoo New
[v2,1/3] accel: introduce accelerator blocker API KVM: allow listener to stop all vcpus before - - - --- 2022-11-10 Emanuele Giuseppe Esposito New
[v2,2/3] KVM: keep track of running ioctls KVM: allow listener to stop all vcpus before - - - --- 2022-11-10 Emanuele Giuseppe Esposito New
[v2,3/3] kvm: Atomic memslot updates KVM: allow listener to stop all vcpus before - - 1 --- 2022-11-10 Emanuele Giuseppe Esposito New
« 1 2 3 411 12 »