messages from 2022-05-05 14:27:04 to 2022-05-06 11:46:35 UTC [more...]
[PATCH RFC 00/19] IOMMUFD Dirty Tracking
2022-05-06 11:46 UTC (17+ messages)
[PATCH v10 00/19] KVM: s390: pv: implement lazy destroy for reboot
2022-05-06 11:33 UTC (7+ messages)
` [PATCH v10 01/19] KVM: s390: pv: leak the topmost page table when destroy fails
` [PATCH v10 02/19] KVM: s390: pv: handle secure storage violations for protected guests
[PATCH RFC 00/12] IOMMUFD Generic interface
2022-05-06 10:42 UTC (13+ messages)
` [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
[PATCH] KVM: LAPIC: Narrow down the timer fastpath to tscdeadline timer
2022-05-06 9:47 UTC
[PATCH] KVM: selftests: riscv: Remove unneeded semicolon
2022-05-06 9:45 UTC
[PATCH v9 0/3] s390x: KVM: CPU Topology
2022-05-06 9:24 UTC (4+ messages)
` [PATCH v9 1/3] s390x: KVM: ipte lock for SCA access should be contained in KVM
` [PATCH v9 2/3] s390x: KVM: guest support for topology function
` [PATCH v9 3/3] s390x: KVM: resetting the Topology-Change-Report
[PATCH v5 0/9] s390x/pci: zPCI interpretation support
2022-05-06 9:03 UTC (3+ messages)
` [PATCH v5 9/9] s390x/pci: reflect proper maxstbl for groups of interpreted devices
[RFC PATCH v6 000/104] KVM TDX basic feature support
2022-05-06 8:56 UTC (107+ messages)
` [RFC PATCH v6 001/104] KVM: x86: Move check_processor_compatibility from init ops to runtime ops
` [RFC PATCH v6 002/104] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
` [RFC PATCH v6 003/104] KVM: Refactor CPU compatibility check on module initialiization
` [RFC PATCH v6 004/104] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
` [RFC PATCH v6 005/104] x86/virt/vmx/tdx: export platform_has_tdx
` [RFC PATCH v6 006/104] KVM: TDX: Detect CPU feature on kernel module initialization
` [RFC PATCH v6 007/104] KVM: Enable hardware before doing arch VM initialization
` [RFC PATCH v6 008/104] KVM: x86: Refactor KVM VMX module init/exit functions
` [RFC PATCH v6 009/104] KVM: TDX: Add placeholders for TDX VM/vcpu structure
` [RFC PATCH v6 010/104] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [RFC PATCH v6 011/104] KVM: TDX: Initialize TDX module when loading kvm_intel.ko
` [RFC PATCH v6 012/104] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
` [RFC PATCH v6 013/104] KVM: TDX: Make TDX VM type supported
` [RFC PATCH v6 014/104] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [RFC PATCH v6 015/104] KVM: TDX: Define "
` [RFC PATCH v6 016/104] KVM: TDX: Add TDX "architectural" error codes
` [RFC PATCH v6 017/104] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [RFC PATCH v6 018/104] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [RFC PATCH v6 019/104] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
` [RFC PATCH v6 020/104] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
` [RFC PATCH v6 021/104] x86/cpu: Add helper functions to allocate/free TDX private host key id
` [RFC PATCH v6 022/104] KVM: TDX: create/destroy VM structure
` [RFC PATCH v6 023/104] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [RFC PATCH v6 024/104] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [RFC PATCH v6 025/104] KVM: TDX: initialize VM with TDX specific parameters
` [RFC PATCH v6 026/104] KVM: TDX: Make KVM_CAP_SET_IDENTITY_MAP_ADDR unsupported for TDX
` [RFC PATCH v6 027/104] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [RFC PATCH v6 028/104] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [RFC PATCH v6 029/104] KVM: TDX: allocate/free TDX vcpu structure
` [RFC PATCH v6 030/104] "
` [RFC PATCH v6 031/104] KVM: TDX: Do TDX specific vcpu initialization
` [RFC PATCH v6 032/104] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [RFC PATCH v6 033/104] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [RFC PATCH v6 034/104] KVM: x86/mmu: Add address conversion functions for TDX shared bits
` [RFC PATCH v6 035/104] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [RFC PATCH v6 036/104] KVM: x86/mmu: Explicitly check for MMIO spte in fast page fault
` [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
` [RFC PATCH v6 038/104] KVM: x86/mmu: Track shadow MMIO value/mask on a per-VM basis
` [RFC PATCH v6 039/104] KVM: x86/mmu: Disallow fast page fault on private GPA
` [RFC PATCH v6 040/104] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [RFC PATCH v6 041/104] KVM: x86/mmu: Zap only leaf SPTEs for deleted/moved memslot for private mmu
` [RFC PATCH v6 042/104] KVM: VMX: Introduce test mode related to EPT violation VE
` [RFC PATCH v6 043/104] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [RFC PATCH v6 044/104] KVM: x86/mmu: Focibly use TDP MMU for TDX
` [RFC PATCH v6 045/104] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [RFC PATCH v6 046/104] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
` [RFC PATCH v6 047/104] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [RFC PATCH v6 048/104] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [RFC PATCH v6 049/104] KVM: x86/mmu: Disallow dirty logging for x86 TDX
` [RFC PATCH v6 050/104] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
` [RFC PATCH v6 051/104] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [RFC PATCH v6 052/104] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [RFC PATCH v6 053/104] KVM: TDX: Add load_mmu_pgd method for TDX
` [RFC PATCH v6 054/104] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
` [RFC PATCH v6 055/104] KVM: TDX: TDP MMU TDX support
` [RFC PATCH v6 056/104] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
` [RFC PATCH v6 057/104] KVM: x86/mmu: steal software usable git to record if GFN is for shared or not
` [RFC PATCH v6 058/104] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
` [RFC PATCH v6 059/104] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [RFC PATCH v6 060/104] [MARKER] The start of TDX KVM patch series: TD finalization
` [RFC PATCH v6 061/104] KVM: TDX: Create initial guest memory
` [RFC PATCH v6 062/104] KVM: TDX: Finalize VM initialization
` [RFC PATCH v6 063/104] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [RFC PATCH v6 064/104] KVM: TDX: Add helper assembly function to TDX vcpu
` [RFC PATCH v6 065/104] KVM: TDX: Implement TDX vcpu enter/exit path
` [RFC PATCH v6 066/104] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [RFC PATCH v6 067/104] KVM: TDX: restore host xsave state when exit from the guest TD
` [RFC PATCH v6 068/104] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [RFC PATCH v6 069/104] KVM: TDX: restore user ret MSRs
` [RFC PATCH v6 070/104] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [RFC PATCH v6 071/104] KVM: TDX: complete interrupts after tdexit
` [RFC PATCH v6 072/104] KVM: TDX: restore debug store when TD exit
` [RFC PATCH v6 073/104] KVM: TDX: handle vcpu migration over logical processor
` [RFC PATCH v6 074/104] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [RFC PATCH v6 075/104] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [RFC PATCH v6 076/104] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [RFC PATCH v6 077/104] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [RFC PATCH v6 078/104] KVM: TDX: Implement interrupt injection
` [RFC PATCH v6 079/104] KVM: TDX: Implements vcpu request_immediate_exit
` [RFC PATCH v6 080/104] KVM: TDX: Implement methods to inject NMI
` [RFC PATCH v6 081/104] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [RFC PATCH v6 082/104] KVM: VMX: Move NMI/exception handler to common helper
` [RFC PATCH v6 083/104] KVM: x86: Split core of hypercall emulation to helper function
` [RFC PATCH v6 084/104] KVM: TDX: Add a place holder to handle TDX VM exit
` [RFC PATCH v6 085/104] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [RFC PATCH v6 086/104] KVM: TDX: handle ept violation/misconfig exit
` [RFC PATCH v6 087/104] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [RFC PATCH v6 088/104] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [RFC PATCH v6 089/104] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [RFC PATCH v6 090/104] KVM: TDX: Handle TDX PV CPUID hypercall
` [RFC PATCH v6 091/104] KVM: TDX: Handle TDX PV HLT hypercall
` [RFC PATCH v6 092/104] KVM: TDX: Handle TDX PV port io hypercall
` [RFC PATCH v6 093/104] KVM: TDX: Handle TDX PV MMIO hypercall
` [RFC PATCH v6 094/104] KVM: TDX: Implement callbacks for MSR operations for TDX
` [RFC PATCH v6 095/104] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [RFC PATCH v6 096/104] KVM: TDX: Handle TDX PV report fatal error hypercall
` [RFC PATCH v6 097/104] KVM: TDX: Handle TDX PV map_gpa hypercall
` [RFC PATCH v6 098/104] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [RFC PATCH v6 099/104] KVM: TDX: Silently discard SMI request
` [RFC PATCH v6 100/104] KVM: TDX: Silently ignore INIT/SIPI
` [RFC PATCH v6 101/104] KVM: TDX: Add methods to ignore accesses to CPU state
` [RFC PATCH v6 102/104] Documentation/virtual/kvm: Document on Trust Domain Extensions(TDX)
` [RFC PATCH v6 103/104] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [RFC PATCH v6 104/104] [MARKER] the end of (the first phase of) TDX KVM patch series
[PATCH] x86: The return type of the function could be void
2022-05-06 7:59 UTC (2+ messages)
[PATCH v2 0/7] KVM RISC-V Sv57x4 support and HFENCE improvements
2022-05-06 7:53 UTC (7+ messages)
` [PATCH v2 4/7] RISC-V: KVM: Introduce range based local HFENCE functions
` [PATCH v2 6/7] RISC-V: KVM: Add remote HFENCE functions based on VCPU requests
` [PATCH v2 7/7] RISC-V: KVM: Cleanup stale TLB entries when host CPU changes
[PATCH v7 0/8] KVM: PKS Virtualization support
2022-05-06 7:32 UTC (2+ messages)
[PATCH RESEND] KVM: powerpc: remove extraneous asterisk from rm_host_ipi_action comment
2022-05-06 7:07 UTC
Causing VMEXITs when kprobes are hit in the guest VM
2022-05-06 5:14 UTC (3+ messages)
[PATCH v11 00/16] Introduce Architectural LBR for vPMU
2022-05-06 3:33 UTC (17+ messages)
` [PATCH v11 01/16] perf/x86/intel: Fix the comment about guest LBR support on KVM
` [PATCH v11 02/16] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
` [PATCH v11 03/16] KVM: x86: Report XSS as an MSR to be saved if there are supported features
` [PATCH v11 04/16] KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS
` [PATCH v11 05/16] KVM: x86: Add Arch LBR MSRs to msrs_to_save_all list
` [PATCH v11 06/16] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
` [PATCH v11 07/16] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL "
` [PATCH v11 08/16] KVM: x86/pmu: Refactor code to support "
` [PATCH v11 09/16] KVM: x86: Refine the matching and clearing logic for supported_xss
` [PATCH v11 10/16] KVM: x86: Add XSAVE Support for Architectural LBR
` [PATCH v11 11/16] KVM: x86/vmx: Check Arch LBR config when return perf capabilities
` [PATCH v11 12/16] KVM: nVMX: Add necessary Arch LBR settings for nested VM
` [PATCH v11 13/16] KVM: x86/vmx: Clear Arch LBREn bit before inject #DB to guest
` [PATCH v11 14/16] KVM: x86/vmx: Flip Arch LBREn bit on guest state change
` [PATCH v11 15/16] KVM: x86: Add Arch LBR data MSR access interface
` [PATCH v11 16/16] KVM: x86/cpuid: Advertise Arch LBR feature in CPUID
[PATCH v6 0/3] Introduce Notify VM exit
2022-05-06 2:43 UTC (2+ messages)
[PATCH v3 00/21] TDX host kernel support
2022-05-06 1:46 UTC (18+ messages)
[PATCH 0/6] Fully lock the container members of struct vfio_group
2022-05-06 0:25 UTC (7+ messages)
` [PATCH 1/6] vfio: Add missing locking for struct vfio_group::kvm
` [PATCH 2/6] vfio: Change struct vfio_group::opened from an atomic to bool
` [PATCH 3/6] vfio: Split up vfio_group_get_device_fd()
` [PATCH 4/6] vfio: Fully lock struct vfio_group::container
` [PATCH 5/6] vfio: Simplify the life cycle of the group FD
` [PATCH 6/6] vfio: Change struct vfio_group::container_users to a non-atomic int
[PATCH v4 0/7] Make the rest of the VFIO driver interface use vfio_device
2022-05-06 0:08 UTC (8+ messages)
` [PATCH v4 1/7] vfio: Make vfio_(un)register_notifier accept a vfio_device
` [PATCH v4 2/7] vfio/ccw: Remove mdev from struct channel_program
` [PATCH v4 3/7] vfio/mdev: Pass in a struct vfio_device * to vfio_pin/unpin_pages()
` [PATCH v4 4/7] vfio/mdev: Pass in a struct vfio_device * to vfio_dma_rw()
` [PATCH v4 5/7] drm/i915/gvt: Change from vfio_group_(un)pin_pages to vfio_(un)pin_pages
` [PATCH v4 6/7] vfio: Remove dead code
` [PATCH v4 7/7] vfio: Remove calls to vfio_group_add_container_user()
[PATCH v4 00/20] KVM: Extend Eager Page Splitting to the shadow MMU
2022-05-05 23:46 UTC (17+ messages)
` [PATCH v4 03/20] KVM: x86/mmu: Derive shadow MMU page role from parent
` [PATCH v4 04/20] KVM: x86/mmu: Decompose kvm_mmu_get_page() into separate functions
` [PATCH v4 05/20] KVM: x86/mmu: Consolidate shadow page allocation and initialization
` [PATCH v4 06/20] KVM: x86/mmu: Rename shadow MMU functions that deal with shadow pages
` [PATCH v4 07/20] KVM: x86/mmu: Move guest PT write-protection to account_shadowed()
` [PATCH v4 08/20] KVM: x86/mmu: Pass memory caches to allocate SPs separately
` [PATCH v4 11/20] KVM: x86/mmu: Allow for NULL vcpu pointer in __kvm_mmu_get_shadow_page()
` [PATCH v4 13/20] KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu
opportunity
2022-05-05 23:46 UTC
[PATCH v4 0/2] Remove vfio_device_get_from_dev()
2022-05-05 23:21 UTC (3+ messages)
` [PATCH v4 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
` [PATCH v4 2/2] vfio/pci: Remove vfio_device_get_from_dev()
[PATCH v3 0/7] Make the rest of the VFIO driver interface use vfio_device
2022-05-05 19:44 UTC (4+ messages)
[PATCH v3 0/2] Remove vfio_device_get_from_dev()
2022-05-05 19:28 UTC (6+ messages)
` [PATCH v3 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
[PATCH v7 00/11] KVM: x86: Add a cap to disable NX hugepages on a VM
2022-05-05 19:14 UTC (11+ messages)
` [PATCH v7 03/11] KVM: selftests: Read binary stats desc in lib
` [PATCH v7 05/11] KVM: selftests: Read binary stat data "
` [PATCH v7 06/11] KVM: selftests: Add NX huge pages test
` [PATCH v7 10/11] KVM: selftests: Test disabling NX hugepages on a VM
[PATCH RFC] KVM: x86/mmu: Remove KVM memory shrinker
2022-05-05 16:30 UTC (2+ messages)
[PATCH] KVM: VMX: unify VMX instruction error reporting
2022-05-05 15:28 UTC (2+ messages)
[PATCH] x86: Function missing integer return value
2022-05-05 15:28 UTC (2+ messages)
[PATCH v3 0/3] KVM: Dirty quota-based throttling
2022-05-05 15:17 UTC (8+ messages)
` [PATCH v3 1/3] KVM: Implement dirty quota-based throttling of vcpus
[PATCH 000/128] KVM: selftests: Overhaul APIs, purge VCPU_ID
2022-05-05 14:26 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox