public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2022-10-25 12:43:19 to 2022-10-27 00:09:50 UTC [more...]

[PATCH v1 00/18] KVM selftests code consolidation and cleanup
 2022-10-27  0:09 UTC  (6+ messages)
` [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
` [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads

[PATCH v6 00/21] TDX host kernel support
 2022-10-26 23:51 UTC  (24+ messages)
` [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
` [PATCH v6 02/21] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v6 03/21] x86/virt/tdx: Disable TDX if X2APIC is not enabled
` [PATCH v6 04/21] x86/virt/tdx: Use all boot-time system memory as TDX memory
` [PATCH v6 05/21] x86/virt/tdx: Add skeleton to initialize TDX on demand
` [PATCH v6 06/21] x86/virt/tdx: Implement functions to make SEAMCALL
` [PATCH v6 07/21] x86/virt/tdx: Shut down TDX module in case of error
` [PATCH v6 08/21] x86/virt/tdx: Do TDX module global initialization
` [PATCH v6 09/21] x86/virt/tdx: Do logical-cpu scope TDX module initialization
` [PATCH v6 10/21] x86/virt/tdx: Get information about TDX module and TDX-capable memory
` [PATCH v6 11/21] x86/virt/tdx: Sanity check all TDX memory ranges are convertible memory
` [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v6 13/21] x86/virt/tdx: Create "
` [PATCH v6 14/21] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v6 15/21] x86/virt/tdx: Set up reserved areas for all TDMRs
` [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID
` [PATCH v6 17/21] x86/virt/tdx: Configure TDX module with TDMRs and "
` [PATCH v6 18/21] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v6 19/21] x86/virt/tdx: Initialize all TDMRs
` [PATCH v6 20/21] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
` [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support

[PATCH 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
 2022-10-26 23:34 UTC  (5+ messages)
` [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
` [PATCH 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V

[PATCH v3 00/15] IOMMUFD Generic interface
 2022-10-26 23:17 UTC  (23+ messages)
` [PATCH v3 01/15] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
` [PATCH v3 02/15] iommu: Add device-centric DMA ownership interfaces
` [PATCH v3 03/15] interval-tree: Add a utility to iterate over spans in an interval tree
` [PATCH v3 04/15] iommufd: Overview documentation
` [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
` [PATCH v3 06/15] kernel/user: Allow user::locked_vm to be usable for iommufd
` [PATCH v3 07/15] iommufd: PFN handling for iopt_pages
` [PATCH v3 08/15] iommufd: Algorithms for PFN storage
` [PATCH v3 09/15] iommufd: Data structure to provide IOVA to PFN mapping
  ` [PATCH v3 9/15] "
` [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
` [PATCH v3 11/15] iommufd: Add a HW pagetable object
` [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
` [PATCH v3 13/15] iommufd: Add kAPI toward external drivers for kernel access
` [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
` [PATCH v3 15/15] iommufd: Add a selftest

[PATCH v4 0/4] kvm/mm: Allow GUP to respond to non fatal signals
 2022-10-26 22:52 UTC  (8+ messages)
` [PATCH v4 2/4] kvm: Add KVM_PFN_ERR_SIGPENDING
` [PATCH v4 3/4] kvm: Add interruptible flag to __gfn_to_pfn_memslot()
` [PATCH v4 4/4] kvm: x86: Allow to respond to generic signals during slow PF

[PATCH] x86/kvm: Fix state restore in em_rsm
 2022-10-26 22:33 UTC  (2+ messages)

[PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
 2022-10-26 22:31 UTC  (13+ messages)
` [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
` [PATCH v12 34/46] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
` [PATCH v12 36/46] KVM: selftests: Drop helpers to read/write page table entries
` [PATCH v12 44/46] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
` [PATCH v12 45/46] KVM: selftests: hyperv_svm_test: "

[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-10-26 21:54 UTC  (14+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
` [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
` [PATCH v9 7/8] KVM: Handle page fault for private memory
` [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE

[PATCH 00/10] Connect VFIO to IOMMUFD
 2022-10-26 21:31 UTC  (13+ messages)
` [PATCH 01/10] vfio: Move vfio_device driver open/close code to a function
` [PATCH 02/10] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
` [PATCH 03/10] vfio: Rename vfio_device_assign/unassign_container()
` [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
` [PATCH 05/10] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
` [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
` [PATCH 07/10] vfio-iommufd: Support iommufd for physical VFIO devices
` [PATCH 08/10] vfio-iommufd: Support iommufd for emulated "
` [PATCH 09/10] vfio: Make vfio_container optionally compiled
` [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio

[PATCH v7 0/3] KVM: selftests: randomize memory access of dirty_log_perf_test
 2022-10-26 21:13 UTC  (6+ messages)
` [PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
` [PATCH v7 3/3] KVM: selftests: randomize page access order

[PATCH] vfio: Decrement open_count before close_device()
 2022-10-26 19:57 UTC  (3+ messages)

[PATCH v2] vfio-pci: Accept a non-zero open_count on reset
 2022-10-26 19:42 UTC 

[PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
 2022-10-26 19:33 UTC  (11+ messages)
                ` Hyper-V VTLs, permission bitmaps and userspace exits (was Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm)

[PATCH v6 0/5] dirty_log_perf_test vCPU pinning
 2022-10-26 18:17 UTC  (12+ messages)
` [PATCH v6 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
` [PATCH v6 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
` [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs

[PATCH] x86/pmu: Disable inlining of measure()
 2022-10-26 18:02 UTC  (5+ messages)
      ` [kvm-unit-tests PATCH] "

[PATCH 0/6] x86: KVM: Expose CPUID to guest for new Intel platform instructions
 2022-10-26 17:15 UTC  (10+ messages)
` [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
` [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 "

[PATCH v3] KVM: nVMX: Advertise ENCLS_EXITING to L1 iff SGX is fully supported
 2022-10-26 16:53 UTC  (2+ messages)

[syzbot] WARNING in vcpu_enter_guest (2)
 2022-10-26 16:51 UTC  (3+ messages)

[kvm-unit-tests PATCH] x86: Increase timeout for vmx_vmcs_shadow_test to 10 mins
 2022-10-26 16:32 UTC  (2+ messages)

[PATCH v3] target/i386: Set maximum APIC ID to KVM prior to vCPU creation
 2022-10-26 16:30 UTC  (2+ messages)

[PATCH v3 0/2] arm: enable MTE for QEMU + kvm
 2022-10-26 16:05 UTC  (3+ messages)
` [PATCH v3 1/2] arm/kvm: add support for MTE
` [PATCH v3 2/2] qtests/arm: add some mte tests

[PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
 2022-10-26 14:54 UTC  (4+ messages)

[PATCH 0/9] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
 2022-10-26 14:43 UTC  (5+ messages)
` [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation

[syzbot] riscv/fixes build error
 2022-10-26 12:37 UTC 

[PATCH v4 0/1] KVM: s390: pv: fix clock comparator late after suspend/resume
 2022-10-26 12:25 UTC  (2+ messages)

[kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
 2022-10-26 10:03 UTC  (2+ messages)

[PATCH v10 0/9] s390x: CPU Topology
 2022-10-26  9:04 UTC  (7+ messages)
` [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
` [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute

[PATCH v2 0/1] KVM: s390: vsie: clarifications on setting the APCB
 2022-10-26  8:18 UTC  (6+ messages)
` [PATCH v2 1/1] "

[PATCH V1] vfio: Add an option to get migration data size
 2022-10-26  7:24 UTC 

[PATCH] KVM: x86: fire timer when it is migrated and expired, and in oneshot mode
 2022-10-26  7:22 UTC 

[PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
 2022-10-25 23:30 UTC  (3+ messages)

[PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
 2022-10-25 21:31 UTC  (5+ messages)

[PATCH v1 0/2] vfio/iova_bitmap: bug fixes
 2022-10-25 19:31 UTC  (3+ messages)
` [PATCH v1 1/2] vfio/iova_bitmap: Explicitly include linux/slab.h
` [PATCH v1 2/2] vfio/iova_bitmap: Fix PAGE_SIZE unaligned bitmaps

[PATCH v6 0/8] KVM: arm64: Enable ring-based dirty memory tracking
 2022-10-25 17:47 UTC  (10+ messages)
` [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap

[PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
 2022-10-25 17:21 UTC  (2+ messages)

[PATCH] KVM: x86: disable halt polling when powersave governor is used
 2022-10-25 17:06 UTC  (4+ messages)

[PATCH] KVM: x86: Fix the initial value of mcg_cap
 2022-10-25 16:22 UTC  (8+ messages)

[PATCH] vfio: Add an option to get migration data size
 2022-10-25 14:43 UTC  (3+ messages)

[kvm-unit-tests GIT PULL 00/22] s390x: tests and fixes for PV, timing
 2022-10-25 14:04 UTC  (2+ messages)

[PATCH 0/4] nSVM: fix L0 crash if L2 has shutdown condtion which L1 doesn't intercept
 2022-10-25 13:37 UTC  (4+ messages)
` [PATCH 4/4] KVM: x86: forcibly leave nested mode on vCPU reset

[PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
 2022-10-25 12:47 UTC  (24+ messages)
` [PATCH RESEND v4 01/23] KVM: x86: start moving SMM-related functions to new files
` [PATCH RESEND v4 02/23] KVM: x86: move SMM entry to a new file
` [PATCH RESEND v4 03/23] KVM: x86: move SMM exit "
` [PATCH RESEND v4 04/23] KVM: x86: do not go through ctxt->ops when emulating rsm
` [PATCH RESEND v4 05/23] KVM: allow compiling out SMM support
` [PATCH RESEND v4 06/23] KVM: x86: compile out vendor-specific code if SMM is disabled
` [PATCH RESEND v4 07/23] KVM: x86: remove SMRAM address space if SMM is not supported
` [PATCH RESEND v4 08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
` [PATCH RESEND v4 09/23] bug: introduce ASSERT_STRUCT_OFFSET
` [PATCH RESEND v4 10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode
` [PATCH RESEND v4 11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode
` [PATCH RESEND v4 12/23] KVM: x86: emulator: update the emulation mode after rsm
` [PATCH RESEND v4 13/23] KVM: x86: emulator: update the emulation mode after CR0 write
` [PATCH RESEND v4 14/23] KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format
` [PATCH RESEND v4 15/23] KVM: x86: smm: check for failures on smm entry
` [PATCH RESEND v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
` [PATCH RESEND v4 17/23] KVM: x86: smm: use smram structs in the common code
` [PATCH RESEND v4 18/23] KVM: x86: smm: use smram struct for 32 bit smram load/restore
` [PATCH RESEND v4 19/23] KVM: x86: smm: use smram struct for 64 "
` [PATCH RESEND v4 20/23] KVM: svm: drop explicit return value of kvm_vcpu_map
` [PATCH RESEND v4 21/23] KVM: x86: SVM: use smram structs
` [PATCH RESEND v4 22/23] KVM: x86: SVM: don't save SVM state to SMRAM when VM is not long mode capable
` [PATCH RESEND v4 23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM

[PATCH v4 00/23] SMM emulation and interrupt shadow fixes
 2022-10-25 12:42 UTC  (15+ messages)
` [PATCH v4 04/23] KVM: x86: do not go through ctxt->ops when emulating rsm
` [PATCH v4 05/23] KVM: allow compiling out SMM support
` [PATCH v4 06/23] KVM: x86: compile out vendor-specific code if SMM is disabled
` [PATCH v4 07/23] KVM: x86: remove SMRAM address space if SMM is not supported
` [PATCH v4 08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
` [PATCH v4 09/23] bug: introduce ASSERT_STRUCT_OFFSET
` [PATCH v4 10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode
` [PATCH v4 11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode
` [PATCH v4 12/23] KVM: x86: emulator: update the emulation mode after rsm
` [PATCH v4 13/23] KVM: x86: emulator: update the emulation mode after CR0 write
` [PATCH v4 14/23] KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format
` [PATCH v4 15/23] KVM: x86: smm: check for failures on smm entry
` [PATCH v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
` [PATCH v4 17/23] KVM: x86: smm: use smram structs in the common code


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox