public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2021-10-06 17:58:27 to 2021-10-08 18:50:20 UTC [more...]

[kvm-unit-tests PATCH] arm64: Add mmio_addr arg to arm/micro-bench
 2021-10-08 18:50 UTC  (3+ messages)

[PATCH v6 00/42] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-10-08 18:04 UTC  (43+ messages)
` [PATCH v6 01/42] x86/mm: Extend cc_attr to include AMD SEV-SNP
` [PATCH v6 02/42] x86/sev: Shorten GHCB terminate macro names
` [PATCH v6 03/42] x86/sev: Get rid of excessive use of defines
` [PATCH v6 04/42] x86/head64: Carve out the guest encryption postprocessing into a helper
` [PATCH v6 05/42] x86/sev: Define the Linux specific guest termination reasons
` [PATCH v6 06/42] x86/sev: Save the negotiated GHCB version
` [PATCH v6 07/42] x86/sev: Add support for hypervisor feature VMGEXIT
` [PATCH v6 08/42] x86/sev-es: initialize sev_status/features within #VC handler
` [PATCH v6 09/42] x86/sev: Check SEV-SNP features support
` [PATCH v6 10/42] x86/sev: Add a helper for the PVALIDATE instruction
` [PATCH v6 11/42] x86/sev: Check the vmpl level
` [PATCH v6 12/42] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH v6 13/42] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH v6 14/42] x86/sev: "
` [PATCH v6 15/42] x86/sev: Remove do_early_exception() forward declarations
` [PATCH v6 16/42] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH v6 17/42] x86/kernel: Make the bss.decrypted section shared in RMP table
` [PATCH v6 18/42] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
` [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit
` [PATCH v6 20/42] KVM: SVM: Define sev_features and vmpl field in the VMSA
` [PATCH v6 21/42] KVM: SVM: Create a separate mapping for the SEV-ES save area
` [PATCH v6 22/42] KVM: SVM: Create a separate mapping for the GHCB "
` [PATCH v6 23/42] KVM: SVM: Update the SEV-ES save area mapping
` [PATCH v6 24/42] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
` [PATCH v6 25/42] x86/head: re-enable stack protection for 32/64-bit builds
` [PATCH v6 26/42] x86/sev: move MSR-based VMGEXITs for CPUID to helper
` [PATCH v6 27/42] KVM: x86: move lookup of indexed CPUID leafs "
` [PATCH v6 28/42] x86/compressed/acpi: move EFI system table lookup "
` [PATCH v6 29/42] x86/compressed/acpi: move EFI config "
` [PATCH v6 30/42] x86/compressed/acpi: move EFI vendor "
` [PATCH v6 31/42] x86/boot: Add Confidential Computing type to setup_data
` [PATCH v6 32/42] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
` [PATCH v6 33/42] boot/compressed/64: use firmware-validated CPUID for SEV-SNP guests
` [PATCH v6 34/42] x86/boot: add a pointer to Confidential Computing blob in bootparams
` [PATCH v6 35/42] x86/compressed/64: store Confidential Computing blob address "
` [PATCH v6 36/42] x86/compressed/64: add identity mapping for Confidential Computing blob
` [PATCH v6 37/42] x86/sev: use firmware-validated CPUID for SEV-SNP guests
` [PATCH v6 38/42] x86/sev: Provide support for SNP guest request NAEs
` [PATCH v6 39/42] x86/sev: Register SNP guest request platform device
` [PATCH v6 40/42] virt: Add SEV-SNP guest driver
` [PATCH v6 41/42] virt: sevguest: Add support to derive key
` [PATCH v6 42/42] virt: sevguest: Add support to get extended report

[kvm-unit-tests PATCH v2] arm64: Add mmio_addr arg to arm/micro-bench
 2021-10-08 17:40 UTC 

[PATCH 0/4 V9] Add AMD SEV and SEV-ES intra host migration support
 2021-10-08 17:26 UTC  (4+ messages)
` [PATCH 2/4 V9] KVM: SEV: Add support for SEV-ES intra host migration

[PATCH kvm-unit-tests] parse_keyval: Allow hex vals
 2021-10-08 16:40 UTC  (3+ messages)

[PATCH 1/3] KVM: emulate: #GP when emulating rdpmc if CR0.PE is 1
 2021-10-08 15:59 UTC  (9+ messages)
` [PATCH 2/3] KVM: vPMU: Fill get_msr MSR_CORE_PERF_GLOBAL_OVF_CTRL w/ 0
` [PATCH 3/3] KVM: LAPIC: Optimize PMI delivering overhead

[PATCH v7 00/11] KVM: arm64: Fixed features for protected VMs
 2021-10-08 15:58 UTC  (12+ messages)
` [PATCH v7 01/11] KVM: arm64: Move __get_fault_info() and co into their own include file
` [PATCH v7 02/11] KVM: arm64: Don't include switch.h into nvhe/kvm-main.c
` [PATCH v7 03/11] KVM: arm64: Move early handlers to per-EC handlers
` [PATCH v7 04/11] KVM: arm64: Pass struct kvm "
` [PATCH v7 05/11] KVM: arm64: Add missing field descriptor for MDCR_EL2
` [PATCH v7 06/11] KVM: arm64: Simplify masking out MTE in feature id reg
` [PATCH v7 07/11] KVM: arm64: Add handlers for protected VM System Registers
` [PATCH v7 08/11] KVM: arm64: Initialize trap registers for protected VMs
` [PATCH v7 09/11] KVM: arm64: Move sanitized copies of CPU features
` [PATCH v7 10/11] KVM: arm64: Trap access to pVM restricted features
` [PATCH v7 11/11] KVM: arm64: Handle protected guests at 32 bits

[PATCH v3 00/22] target/i386/sev: Housekeeping SEV + measured Linux SEV guest
 2021-10-08 15:46 UTC  (20+ messages)
` [PATCH v3 05/22] target/i386/monitor: Return QMP error when SEV is disabled in build
` [PATCH v3 13/22] target/i386/sev: Remove stubs by using code elision
` [PATCH v3 14/22] target/i386/sev: Move qmp_query_sev_attestation_report() to sev.c
` [PATCH v3 19/22] monitor: Restrict 'info sev' to x86 targets
` [PATCH v3 22/22] MAINTAINERS: Cover AMD SEV files

[PATCH v1 3/5] KVM: x86: nVMX: VMCS12 field's read/write respects field existence bitmap
 2021-10-08 15:09 UTC  (12+ messages)

[PATCH v3 0/5] Add SBI v0.2 support for KVM
 2021-10-08 15:02 UTC  (8+ messages)
` [PATCH v3 1/5] RISC-V: Mark the existing SBI v0.1 implementation as legacy
` [PATCH v3 2/5] RISC-V: Reorganize SBI code by moving legacy SBI to its own file
` [PATCH v3 3/5] RISC-V: Add SBI v0.2 base extension
` [PATCH v3 4/5] RISC-V: Add v0.1 replacement SBI extensions defined in v02
` [PATCH v3 5/5] RISC-V: Add SBI HSM extension in KVM

Need Information
 2021-10-08 14:09 UTC 

[PATCH v4 00/23] target/i386/sev: Housekeeping SEV + measured Linux SEV guest
 2021-10-08 11:46 UTC  (34+ messages)
` [PATCH v4 01/23] qapi/misc-target: Wrap long 'SEV Attestation Report' long lines
` [PATCH v4 02/23] qapi/misc-target: Group SEV QAPI definitions
` [PATCH v4 03/23] target/i386/kvm: Introduce i386_softmmu_kvm Meson source set
` [PATCH v4 04/23] target/i386/kvm: Restrict SEV stubs to x86 architecture
` [PATCH v4 05/23] target/i386/sev: Prefix QMP errors with 'SEV'
` [PATCH v4 06/23] target/i386/monitor: Return QMP error when SEV is not enabled for guest
` [PATCH v4 07/23] target/i386/cpu: Add missing 'qapi/error.h' header
` [PATCH v4 08/23] target/i386/sev_i386.h: Remove unused headers
` [PATCH v4 09/23] target/i386/sev: Remove sev_get_me_mask()
` [PATCH v4 10/23] target/i386/sev: Mark unreachable code with g_assert_not_reached()
` [PATCH v4 11/23] target/i386/sev: sev_get_attestation_report use g_autofree
` [PATCH v4 12/23] target/i386/sev: Use g_autofree in sev_launch_get_measure()
` [PATCH v4 13/23] target/i386/sev: Restrict SEV to system emulation
` [PATCH v4 14/23] target/i386/sev: Rename sev_i386.h -> sev.h
` [PATCH v4 15/23] target/i386/sev: Declare system-specific functions in 'sev.h'
` [PATCH v4 16/23] target/i386/sev: Remove stubs by using code elision
` [PATCH v4 17/23] target/i386/sev: Move qmp_query_sev_attestation_report() to sev.c
` [PATCH v4 18/23] target/i386/sev: Move qmp_sev_inject_launch_secret() "
` [PATCH v4 19/23] target/i386/sev: Move qmp_query_sev_capabilities() "
` [PATCH v4 20/23] target/i386/sev: Move qmp_query_sev_launch_measure() "
` [PATCH v4 21/23] target/i386/sev: Move qmp_query_sev() & hmp_info_sev() "
` [PATCH v4 22/23] monitor: Reduce hmp_info_sev() declaration
` [PATCH v4 23/23] MAINTAINERS: Cover SEV-related files with X86/KVM section

[kvm-unit-tests PATCH] s390x/snippets: Define all things that are needed to link the libc
 2021-10-08  9:26 UTC 

linux-next: manual merge of the kvm tree with the asm-generic tree
 2021-10-08  8:28 UTC  (2+ messages)

[kvm-unit-tests PATCH v3 0/9] s390x: Cleanup and maintenance 2
 2021-10-08  8:13 UTC  (21+ messages)
` [kvm-unit-tests PATCH v3 1/9] s390x: uv: Tolerate 0x100 query return code
` [kvm-unit-tests PATCH v3 2/9] s390x: uv-host: Fence a destroy cpu test on z15
` [kvm-unit-tests PATCH v3 3/9] lib: s390x: uv: Fix share return value and print
` [kvm-unit-tests PATCH v3 4/9] lib: s390x: uv: Add UVC_ERR_DEBUG switch
` [kvm-unit-tests PATCH v3 5/9] lib: s390x: Add access key argument to tprot
` [kvm-unit-tests PATCH v3 6/9] lib: s390x: Print PGM code as hex
` [kvm-unit-tests PATCH v3 7/9] s390x: Add sthyi cc==0 r2+1 verification
` [kvm-unit-tests PATCH v3 8/9] s390x: snippets: Set stackptr and stacktop in cstart.S
` [kvm-unit-tests PATCH v3 9/9] s390x: snippets: Define all things that are needed to link the lib

[PATCH v8 00/15] KVM: arm64: selftests: Introduce arch_timer selftest
 2021-10-07 23:34 UTC  (16+ messages)
` [PATCH v8 01/15] KVM: arm64: selftests: Add MMIO readl/writel support
` [PATCH v8 02/15] tools: arm64: Import sysreg.h
` [PATCH v8 03/15] KVM: arm64: selftests: Use read/write definitions from sysreg.h
` [PATCH v8 04/15] KVM: arm64: selftests: Introduce ARM64_SYS_KVM_REG
` [PATCH v8 05/15] KVM: arm64: selftests: Add support for cpu_relax
` [PATCH v8 06/15] KVM: arm64: selftests: Add basic support for arch_timers
` [PATCH v8 07/15] KVM: arm64: selftests: Add basic support to generate delays
` [PATCH v8 08/15] KVM: arm64: selftests: Add support to disable and enable local IRQs
` [PATCH v8 09/15] KVM: arm64: selftests: Maintain consistency for vcpuid type
` [PATCH v8 10/15] KVM: arm64: selftests: Add guest support to get the vcpuid
` [PATCH v8 11/15] KVM: arm64: selftests: Add light-weight spinlock support
` [PATCH v8 12/15] KVM: arm64: selftests: Add basic GICv3 support
` [PATCH v8 13/15] KVM: arm64: selftests: Add host support for vGIC
` [PATCH v8 14/15] KVM: arm64: selftests: Add arch_timer test
` [PATCH v8 15/15] KVM: arm64: selftests: arch_timer: Support vCPU migration

[PATCH] KVM: x86: Account for 32-bit kernels when handling address in TSC attrs
 2021-10-07 23:16 UTC 

[PATCH MANUALSEL 5.14 1/9] selftests: KVM: Align SMCCC call with the spec in steal_time
 2021-10-07 17:47 UTC  (5+ messages)
` [PATCH MANUALSEL 5.14 4/9] KVM: x86: reset pdptrs_from_userspace when exiting smm

[PATCH v2] KVM: arm64: Allow KVM to be disabled from the command line
 2021-10-07 16:59 UTC  (2+ messages)

[PATCH v2 00/16] KVM: arm64: MMIO guard PV services
 2021-10-07 15:52 UTC  (13+ messages)
` [PATCH v2 06/16] KVM: arm64: Force a full unmap on vpcu reinit
` [PATCH v2 07/16] KVM: arm64: Wire MMIO guard hypercalls
` [PATCH v2 09/16] KVM: arm64: Advertise a capability for MMIO guard
` [PATCH v2 10/16] KVM: arm64: Add some documentation for the MMIO guard feature
` [PATCH v2 13/16] arm64: Implement ioremap/iounmap hooks calling into KVM's MMIO guard

[PATCH v20 00/17] KVM RISC-V Support
 2021-10-07 14:31 UTC  (4+ messages)

[PATCH 0/2] s390: downsize my responsibilities
 2021-10-07 11:55 UTC  (8+ messages)
` [PATCH 1/2] KVM: s390: remove myself as reviewer
` [PATCH 2/2] vfio-ccw: step down as maintainer

[RFC 00/20] Introduce /dev/iommu for userspace I/O address space management
 2021-10-07 11:35 UTC  (8+ messages)
` [RFC 07/20] iommu/iommufd: Add iommufd_[un]bind_device()

[PATCH] iommu: intel: remove flooding of non-error logs, when new-DMA-PTE is the same as old-DMA-PTE
 2021-10-07  9:03 UTC  (5+ messages)

[kvm-unit-tests PATCH] s390x/mvpg-sie: Remove unused variable
 2021-10-07  8:14 UTC  (3+ messages)

[GIT PULL] KVM/riscv for 5.16
 2021-10-07  6:59 UTC  (2+ messages)

[kvm-unit-tests PATCH v2 5/5] Use report_pass(...) instead of report(1/true, ...)
 2021-10-07  6:50 UTC  (2+ messages)

[PATCH v2 00/10] KVM: x86: Clean up RESET "emulation"
 2021-10-06 23:04 UTC  (4+ messages)
` [PATCH v2 06/10] KVM: x86: Fold fx_init() into kvm_arch_vcpu_create()

[syzbot] general protection fault in rcu_segcblist_enqueue
 2021-10-06 22:52 UTC  (3+ messages)

[RFC 00/16] KVM: selftests: Add tests for SEV, SEV-ES, and SEV-SNP guests
 2021-10-06 20:59 UTC  (8+ messages)
` [RFC 04/16] KVM: selftests: add library for creating/interacting with SEV guests
` [RFC 04/16] KVM: selftests: set CPUID before setting sregs in vcpu creation
` [RFC 05/16] KVM: selftests: add support for encrypted vm_vaddr_* allocations
` [RFC 06/16] KVM: selftests: add library for creating/interacting with SEV guests
` [RFC 07/16] KVM: selftests: add SEV boot tests
` [RFC 08/16] KVM: SVM: include CR3 in initial VMSA state for SEV-ES guests


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox