messages from 2022-10-30 06:29:14 to 2022-11-01 14:56:54 UTC [more...]
[PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
2022-11-01 14:53 UTC (16+ messages)
` [PATCH v13 01/48] x86/hyperv: Move VMCB enlightenment definitions to hyperv-tlfs.h
` [PATCH v13 02/48] KVM: selftests: Move "struct hv_enlightenments" to x86_64/svm.h
` [PATCH v13 03/48] KVM: SVM: Add a proper field for Hyper-V VMCB enlightenments
` [PATCH v13 04/48] x86/hyperv: KVM: Rename "hv_enlightenments" to "hv_vmcb_enlightenments"
` [PATCH v13 05/48] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
` [PATCH v13 06/48] KVM: VMX: Rename "vmx/evmcs.{ch}" to "vmx/hyperv.{ch}"
` [PATCH v13 07/48] KVM: x86: Move clearing of TLB_FLUSH_CURRENT to kvm_vcpu_flush_tlb_all()
` [PATCH v13 08/48] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
` [PATCH v13 09/48] KVM: x86: hyper-v: Introduce TLB flush fifo
` [PATCH v13 10/48] KVM: x86: hyper-v: Add helper to read hypercall data for array
` [PATCH v13 11/48] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
` [PATCH v13 12/48] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
` [PATCH v13 13/48] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
` [PATCH v13 15/48] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
` [PATCH v13 16/48] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
[PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
2022-11-01 14:54 UTC (5+ messages)
[PATCH 00/10] Connect VFIO to IOMMUFD
2022-11-01 14:39 UTC (44+ messages)
` [PATCH 01/10] vfio: Move vfio_device driver open/close code to a function
` [PATCH 02/10] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
` [PATCH 03/10] vfio: Rename vfio_device_assign/unassign_container()
` [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
` [PATCH 05/10] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
` [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
` [PATCH 07/10] vfio-iommufd: Support iommufd for physical VFIO devices
` [PATCH 08/10] vfio-iommufd: Support iommufd for emulated "
` [PATCH 09/10] vfio: Make vfio_container optionally compiled
` [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
[RFC 0/9] KVM perf support
2022-11-01 14:35 UTC (11+ messages)
` [RFC 1/9] RISC-V: Define a helper function to probe number of hardware counters
` [RFC 4/9] RISC-V: KVM: Improve privilege mode filtering for perf
` [RFC 5/9] RISC-V: KVM: Add skeleton support "
` [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
` [RFC 7/9] RISC-V: KVM: Implement trap & emulate for hpmcounters
[GIT PULL] KVM changes for 6.1-rc4
2022-11-01 14:24 UTC
[PATCH v1 0/7] vfio-ccw parent rework
2022-11-01 14:05 UTC (10+ messages)
` [PATCH v1 4/7] vfio/ccw: move private to mdev lifecycle
` [PATCH v1 5/7] vfio/ccw: remove release completion
` [PATCH v1 6/7] vfio/ccw: replace vfio_init_device with _alloc_
` [PATCH v1 7/7] vfio: Remove vfio_free_device
[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
2022-11-01 11:38 UTC (12+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v9 7/8] KVM: Handle page fault for "
[PATCH v2] vfio-pci: Accept a non-zero open_count on reset
2022-11-01 11:38 UTC (3+ messages)
[PATCH v2] KVM: x86: fix undefined behavior in bit shift for __feature_bit
2022-11-01 11:35 UTC (3+ messages)
[PATCH] KVM: replace ternary operator with min()
2022-11-01 11:16 UTC (2+ messages)
[PATCH kernel v2] swiotlb: Half the size if allocation failed
2022-11-01 11:09 UTC (3+ messages)
[V3 PATCH 0/4] Minor improvements to the selftest setup logic
2022-11-01 10:47 UTC (4+ messages)
` [V3 PATCH 4/4] KVM: selftests: x86: Precompute the cpu type
[PATCH v10 000/108] KVM TDX basic feature support
2022-11-01 10:21 UTC (44+ messages)
` [PATCH v10 010/108] KVM: TDX: Add TDX "architectural" error codes
` [PATCH v10 014/108] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
` [PATCH v10 060/108] KVM: Add functions to set GFN to private or shared
` [PATCH v10 069/108] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v10 070/108] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v10 071/108] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v10 072/108] KVM: TDX: restore user ret MSRs
` [PATCH v10 073/108] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v10 074/108] KVM: TDX: complete interrupts after tdexit
` [PATCH v10 075/108] KVM: TDX: restore debug store when TD exit
` [PATCH v10 076/108] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v10 077/108] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v10 078/108] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v10 079/108] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v10 080/108] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v10 081/108] KVM: TDX: Implement interrupt injection
` [PATCH v10 082/108] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v10 083/108] KVM: TDX: Implement methods to inject NMI
` [PATCH v10 084/108] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v10 085/108] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v10 086/108] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v10 087/108] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v10 088/108] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v10 089/108] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v10 090/108] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v10 091/108] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v10 092/108] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v10 093/108] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v10 094/108] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v10 095/108] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v10 096/108] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v10 097/108] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v10 099/108] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v10 106/108] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v10 107/108] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v10 108/108] [MARKER] the end of (the first phase of) TDX KVM patch series
[PATCH v5 00/15] KVM: nVMX: VMX MSR quirk+fixes, CR4 fixes
2022-11-01 10:18 UTC (5+ messages)
` [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
[PATCH 0/6] x86: KVM: Expose CPUID to guest for new Intel platform instructions
2022-11-01 9:07 UTC (6+ messages)
` [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
[KVM] e923b0537d: kernel-selftests.kvm.rseq_test.fail
2022-11-01 8:32 UTC (4+ messages)
[PATCH] KVM: replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
2022-11-01 7:25 UTC
[PATCH] RISC-V: KVM: use vma_lookup() instead of find_vma_intersection()
2022-11-01 5:38 UTC
[PATCH] KVM: x86: fix undefined behavior in bit shift for __feature_bit
2022-11-01 2:37 UTC (5+ messages)
[PATCH 0/9] Linear Address Masking (LAM) KVM Enabling
2022-11-01 2:26 UTC (6+ messages)
` [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
[RESEND PATCH v3] KVM: VMX: Allow exposing EDECCSSA user leaf function to KVM guest
2022-11-01 2:24 UTC
iommufd branch into linux-next
2022-11-01 0:32 UTC
KVM: x86: snapshotted TSC frequency causing time drifts in vms
2022-10-31 23:00 UTC (3+ messages)
[PATCH v7 0/9] KVM: arm64: Enable ring-based dirty memory tracking
2022-10-31 23:08 UTC (14+ messages)
` [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
` [PATCH v7 2/9] KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
` [PATCH v7 3/9] KVM: Check KVM_CAP_DIRTY_LOG_{RING, RING_ACQ_REL} prior to enabling them
` [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
` [PATCH v7 5/9] KVM: arm64: Improve no-running-vcpu report for dirty ring
` [PATCH v7 6/9] KVM: arm64: Enable ring-based dirty memory tracking
` [PATCH v7 7/9] KVM: selftests: Use host page size to map ring buffer in dirty_log_test
` [PATCH v7 8/9] KVM: selftests: Clear dirty ring states between two modes "
` [PATCH v7 9/9] KVM: selftests: Automate choosing dirty ring size "
` (subset) [PATCH v7 0/9] KVM: arm64: Enable ring-based dirty memory tracking
[PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
2022-10-31 22:48 UTC (14+ messages)
[PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP)
2022-10-31 21:58 UTC (8+ messages)
` [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
[PATCH v7 0/5] dirty_log_perf_test vCPU pinning
2022-10-31 19:49 UTC (13+ messages)
` [PATCH v7 1/5] KVM: selftests: Add missing break between -e and -g option in dirty_log_perf_test
` [PATCH v7 2/5] KVM: selftests: Put command line options in alphabetical order "
` [PATCH v7 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
` [PATCH v7 4/5] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
` [PATCH v7 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
[PATCH v3 00/10] KVM: selftests: Fix and clean up emulator_error_test
2022-10-31 18:37 UTC (17+ messages)
` [PATCH v3 01/10] KVM: selftests: Rename emulator_error_test to smaller_maxphyaddr_emulation_test
` [PATCH v3 02/10] KVM: selftests: Explicitly require instructions bytes
` [PATCH v3 03/10] KVM: selftests: Delete dead ucall code
` [PATCH v3 04/10] KVM: selftests: Move flds instruction emulation failure handling to header
` [PATCH v3 05/10] KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks
` [PATCH v3 06/10] KVM: selftests: Copy KVM PFERR masks into selftests
` [PATCH v3 07/10] KVM: selftests: Avoid JMP in non-faulting path of KVM_ASM_SAFE()
` [PATCH v3 08/10] KVM: selftests: Provide error code as a KVM_ASM_SAFE() output
` [PATCH v3 09/10] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
` [PATCH v3 10/10] KVM: selftests: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE
[RFC PATCH 0/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
2022-10-31 17:37 UTC (3+ messages)
` [PATCH 1/7] KVM: VMX: remove regs argument of __vmx_vcpu_run
[PATCH v2 0/8] KVM: selftests: Fix and clean up emulator_error_test
2022-10-31 16:47 UTC (5+ messages)
` [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
[PATCH v8 2/4] KVM: selftests: create -r argument to specify random seed
2022-10-31 16:05 UTC (2+ messages)
[PATCH v3 00/15] IOMMUFD Generic interface
2022-10-31 16:01 UTC (3+ messages)
` [PATCH v3 08/15] iommufd: Algorithms for PFN storage
` [PATCH v3 8/15] "
[PATCH v5 0/6] ASID support in vhost-vdpa net
2022-10-31 12:36 UTC (10+ messages)
` [PATCH v5 2/6] vdpa: Allocate SVQ unconditionally
` [PATCH v5 6/6] vdpa: Always start CVQ in SVQ mode
[RESEND PATCH v2] kvm: x86: Keep the lock order consistent
2022-10-31 7:20 UTC
[PATCH 4.14 00/34] Retbleed & PBRSB Mitigations
2022-10-31 7:00 UTC (2+ messages)
[PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
2022-10-30 8:23 UTC (4+ messages)
` [PATCH RESEND v4 23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM
[PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
2022-10-30 8:05 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).