{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":59218642,"defaultBranch":"master","name":"linux","ownerLogin":"sean-jc","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2016-05-19T15:22:03.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/18535971?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1727113550.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"50cb476bebb4240ff5dc276cb6c2d2f22f969044","ref":"refs/heads/x86/revert_precise_zap","pushedAt":"2024-09-23T17:45:50.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"Revert \"KVM: x86/mmu: Introduce a quirk to control memslot zap behavior\"\n\nThis reverts commit aa8d1f48d353b0469bff357183ee9df137d15ef0.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"Revert \"KVM: x86/mmu: Introduce a quirk to control memslot zap behavior\""}},{"before":null,"after":"76db4592e1eeb92098ff9fa5775e710789b07bac","ref":"refs/heads/slf/avx_support","pushedAt":"2024-09-23T12:47:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"tmp\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"tmp"}},{"before":"74716b78a77fc5aa79eae58d3be43d460ce7d201","after":"4de383ce727fd5ded7bd3456c88942cb2114d801","ref":"refs/heads/slf/mmu_stress_test","pushedAt":"2024-09-22T09:24:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)\n\nAdd two phases to mmu_stress_test to verify that KVM correctly handles\nguest memory that was writable, and then made read-only in the primary MMU,\nand then made writable again.\n\nAdd bonus coverage for x86 and arm64 to verify that all of guest memory was\nmarked read-only. Making forward progress (without making memory writable)\nrequires arch specific code to skip over the faulting instruction, but the\ntest can at least verify each vCPU's starting page was made read-only for\nother architectures.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)"}},{"before":"72a79f16001a10d7365ae11931426b13d7804e5f","after":"ee1baa1b63d3af0458f46a959a696c102faf82ba","ref":"refs/heads/x86/vcpu_fd_create_race","pushedAt":"2024-09-22T07:41:19.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu->mutex\n\nThis effectively reverts commit 42a90008f890 (\"KVM: Ensure lockdep knows\nabout kvm->lock vs. vcpu->mutex ordering rule\").\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu-…"}},{"before":"cc608c831f916a714abb4b7f6589325de4a260c8","after":"72a79f16001a10d7365ae11931426b13d7804e5f","ref":"refs/heads/x86/vcpu_fd_create_race","pushedAt":"2024-09-22T06:19:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu->mutex\n\nThis effectively reverts commit 42a90008f890 (\"KVM: Ensure lockdep knows\nabout kvm->lock vs. vcpu->mutex ordering rule\").\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu-…"}},{"before":"890f3938caf1616b8e675cd95000b406273876d6","after":"cc608c831f916a714abb4b7f6589325de4a260c8","ref":"refs/heads/x86/vcpu_fd_create_race","pushedAt":"2024-09-20T08:50:55.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu->mutex\n\nThis effectively reverts commit 42a90008f890 (\"KVM: Ensure lockdep knows\nabout kvm->lock vs. vcpu->mutex ordering rule\").\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu-…"}},{"before":"71e3700dc1f2d3dd66a0692b19009c266915e90d","after":"890f3938caf1616b8e675cd95000b406273876d6","ref":"refs/heads/x86/vcpu_fd_create_race","pushedAt":"2024-09-18T19:52:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu->mutex\n\nThis effectively reverts commit 42a90008f890 (\"KVM: Ensure lockdep knows\nabout kvm->lock vs. vcpu->mutex ordering rule\").\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu-…"}},{"before":"8bcc0d33a4cef28f8449220111800b767faa1756","after":"71e3700dc1f2d3dd66a0692b19009c266915e90d","ref":"refs/heads/x86/vcpu_fd_create_race","pushedAt":"2024-09-18T19:34:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu->mutex\n\nThis effectively reverts commit 42a90008f890 (\"KVM: Ensure lockdep knows\nabout kvm->lock vs. vcpu->mutex ordering rule\").\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: Drop hack that \"manually\" informs lockdep of kvm->lock vs. vcpu-…"}},{"before":null,"after":"8bcc0d33a4cef28f8449220111800b767faa1756","ref":"refs/heads/x86/vcpu_fd_create_race","pushedAt":"2024-09-18T17:35:53.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"tmp","shortMessageHtmlLink":"tmp"}},{"before":"203556f01f85e5bd79043293089d7a2173d200f3","after":"b60589d8ac62ef9538493521b9c08bfe2d70457b","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-13T17:44:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bits are disabled\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bit…"}},{"before":"749ec2df7f033eb5796ba4a39eafa63e4a114dde","after":"203556f01f85e5bd79043293089d7a2173d200f3","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-13T15:46:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bits are disabled\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bit…"}},{"before":"1aaef86e868e4e5e1004be1d5fadd93a89d82f60","after":"749ec2df7f033eb5796ba4a39eafa63e4a114dde","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-13T00:17:38.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bits are disabled\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bit…"}},{"before":"8ed134911e454550ed3e6381779ecb5fa71b0316","after":"1aaef86e868e4e5e1004be1d5fadd93a89d82f60","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T23:02:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nNow that make_spte() no longer uses a funky goto to bail out for a special\ncase of its unsync handling, combine all of the unsync vs. writable logic\ninto a single if-else statement.\n\nNo functional change intended.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"c982ea7c6e9424836246bbfc10e44408e9cdec1d","after":"8ed134911e454550ed3e6381779ecb5fa71b0316","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T23:00:36.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"3e250925196ba785a32eb152783d964d48cc104f","after":"c982ea7c6e9424836246bbfc10e44408e9cdec1d","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T22:36:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"7d2e50e907235b830fcd12956f91d9fbc5aa6cf1","after":"3e250925196ba785a32eb152783d964d48cc104f","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T21:42:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"47e9385d01b3d82c6fcd215dbac0156451e92142","after":"7d2e50e907235b830fcd12956f91d9fbc5aa6cf1","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T21:16:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"ddb37e64980a6b8b26cbdf29a13b13fe5115e953","after":"47e9385d01b3d82c6fcd215dbac0156451e92142","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T21:15:06.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"2f6c605f31c667254f3532ddd94a055d48289ebf","after":"ddb37e64980a6b8b26cbdf29a13b13fe5115e953","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T21:09:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"2e498ce6244420a94b9f3f3ff2e37ff247b53108","after":"2f6c605f31c667254f3532ddd94a055d48289ebf","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T20:53:46.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"bc3d2a80b639969b52b004f1783a003bdbdaa3fc","after":"2e498ce6244420a94b9f3f3ff2e37ff247b53108","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T20:47:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"d5be2ca917ca015a465f61870ff9891294b6bebc","after":"bc3d2a80b639969b52b004f1783a003bdbdaa3fc","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T20:33:35.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"0e4cddf0524b5a90a9bfd07b6bcb5133f28fe2a8","after":"d5be2ca917ca015a465f61870ff9891294b6bebc","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T20:07:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"611850ae46de0bdd0ae46c81ea4050547fd65346","after":"0e4cddf0524b5a90a9bfd07b6bcb5133f28fe2a8","ref":"refs/heads/x86/mmu_follow_pfn","pushedAt":"2024-09-12T19:47:18.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if…"}},{"before":"4d801ef9efcc295bff6ba89c9a7e07d34ee7a062","after":"74716b78a77fc5aa79eae58d3be43d460ce7d201","ref":"refs/heads/slf/mmu_stress_test","pushedAt":"2024-09-11T20:17:26.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)\n\nAdd two phases to mmu_stress_test to verify that KVM correctly handles\nguest memory that was writable, and then made read-only in the primary MMU,\nand then made writable again.\n\nAdd bonus coverage for x86 and arm64 to verify that all of guest memory was\nmarked read-only. Making forward progress (without making memory writable)\nrequires arch specific code to skip over the faulting instruction, but the\ntest can at least verify each vCPU's starting page was made read-only for\nother architectures.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)"}},{"before":"6a4bde9d07ce298ed1e3f2f908f91fc2396187e2","after":"4d801ef9efcc295bff6ba89c9a7e07d34ee7a062","ref":"refs/heads/slf/mmu_stress_test","pushedAt":"2024-09-11T19:50:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)\n\nAdd two phases to mmu_stress_test to verify that KVM correctly handles\nguest memory that was writable, and then made read-only in the primary MMU,\nand then made writable again.\n\nAdd bonus coverage for x86 and arm64 to verify that all of guest memory was\nmarked read-only. Making forward progress (without making memory writable)\nrequires arch specific code to skip over the faulting instruction, but the\ntest can at least verify each vCPU's starting page was made read-only for\nother architectures.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)"}},{"before":"41101183a5e0720aaf0014ccc8812bce63dd0e88","after":"6a4bde9d07ce298ed1e3f2f908f91fc2396187e2","ref":"refs/heads/slf/mmu_stress_test","pushedAt":"2024-09-11T19:30:32.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)\n\nAdd two phases to mmu_stress_test to verify that KVM correctly handles\nguest memory that was writable, and then made read-only in the primary MMU,\nand then made writable again.\n\nAdd bonus coverage for x86 and arm64 to verify that all of guest memory was\nmarked read-only. Making forward progress (without making memory writable)\nrequires arch specific code to skip over the faulting instruction, but the\ntest can at least verify each vCPU's starting page was made read-only for\nother architectures.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)"}},{"before":"c19a6845a3c3a8d8ea68295d304920f64447a69e","after":"41101183a5e0720aaf0014ccc8812bce63dd0e88","ref":"refs/heads/slf/mmu_stress_test","pushedAt":"2024-09-11T19:28:25.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)\n\nAdd two phases to mmu_stress_test to verify that KVM correctly handles\nguest memory that was writable, and then made read-only in the primary MMU,\nand then made writable again.\n\nAdd bonus coverage for x86 and arm64 to verify that all of guest memory was\nmarked read-only. Making forward progress (without making memory writable)\nrequires arch specific code to skip over the faulting instruction, but the\ntest can at least verify each vCPU's starting page was made read-only for\nother architectures.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)"}},{"before":"82f5d3dc712362afc07f095212500b6d1333b763","after":"c19a6845a3c3a8d8ea68295d304920f64447a69e","ref":"refs/heads/slf/mmu_stress_test","pushedAt":"2024-09-11T17:50:09.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)\n\nAdd two phases to mmu_stress_test to verify that KVM correctly handles\nguest memory that was writable, and then made read-only in the primary MMU,\nand then made writable again.\n\nAdd bonus coverage for x86 and arm64 to verify that all of guest memory was\nmarked read-only. Making forward progress (without making memory writable)\nrequires arch specific code to skip over the faulting instruction, but the\ntest can at least verify each vCPU's starting page was made read-only for\nother architectures.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)"}},{"before":"303d5a5916a5f24123775851aff25b0dcc87f193","after":"82f5d3dc712362afc07f095212500b6d1333b763","ref":"refs/heads/slf/mmu_stress_test","pushedAt":"2024-09-11T17:19:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"sean-jc","name":"Sean Christopherson","path":"/sean-jc","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/18535971?s=80&v=4"},"commit":{"message":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)\n\nAdd two phases to mmu_stress_test to verify that KVM correctly handles\nguest memory that was writable, and then made read-only in the primary MMU,\nand then made writable again.\n\nAdd bonus coverage for x86 and arm64 to verify that all of guest memory was\nmarked read-only. Making forward progress (without making memory writable)\nrequires arch specific code to skip over the faulting instruction, but the\ntest can at least verify each vCPU's starting page was made read-only for\nother architectures.\n\nSigned-off-by: Sean Christopherson ","shortMessageHtmlLink":"KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yM1QxNzo0NTo1MC4wMDAwMDBazwAAAAS-RopD","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xMVQxNzoxOTowNy4wMDAwMDBazwAAAASze0bC"}},"title":"Activity · sean-jc/linux"}