kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-11-18 16:59:19 to 2022-11-22 00:01:36 UTC [more...]

[PATCH v7 00/20] TDX host kernel support
 2022-11-22  0:01 UTC  (37+ messages)
` [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
` [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
` [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
` [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
` [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
` [PATCH v7 07/20] x86/virt/tdx: Do TDX module global initialization
` [PATCH v7 08/20] x86/virt/tdx: Do logical-cpu scope TDX module initialization
` [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
` [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
` [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v7 12/20] x86/virt/tdx: Create "
` [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
` [PATCH v7 15/20] x86/virt/tdx: Reserve TDX module global KeyID
` [PATCH v7 16/20] x86/virt/tdx: Configure TDX module with TDMRs and "
` [PATCH v7 17/20] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v7 18/20] x86/virt/tdx: Initialize all TDMRs
` [PATCH v7 19/20] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
` [PATCH v7 20/20] Documentation/x86: Add documentation for TDX host support

[PATCH v10 000/108] KVM TDX basic feature support
 2022-11-21 23:55 UTC  (3+ messages)
` [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD

[RFC 0/9] KVM perf support
 2022-11-21 23:50 UTC  (4+ messages)
` [RFC 1/9] RISC-V: Define a helper function to probe number of hardware counters

[PATCH v2 0/6] Add Hyper-v extended hypercall support in KVM
 2022-11-21 23:40 UTC  (7+ messages)
` [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
` [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
` [PATCH v2 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement
` [PATCH v2 4/6] KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
` [PATCH v2 5/6] KVM: selftests: Make vCPU exit reason test assertion common
` [PATCH v2 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace

[PATCH v1 00/16] vfio/ccw: channel program cleanup
 2022-11-21 21:40 UTC  (17+ messages)
` [PATCH v1 01/16] vfio/ccw: cleanup some of the mdev commentary
` [PATCH v1 02/16] vfio/ccw: simplify the cp_get_orb interface
` [PATCH v1 03/16] vfio/ccw: allow non-zero storage keys
` [PATCH v1 04/16] vfio/ccw: move where IDA flag is set in ORB
` [PATCH v1 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
` [PATCH v1 06/16] vfio/ccw: simplify CCW chain fetch routines
` [PATCH v1 07/16] vfio/ccw: remove unnecessary malloc alignment
` [PATCH v1 08/16] vfio/ccw: pass page count to page_array struct
` [PATCH v1 09/16] vfio/ccw: populate page_array struct inline
` [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
` [PATCH v1 11/16] vfio/ccw: discard second fmt-1 IDAW
` [PATCH v1 12/16] vfio/ccw: calculate number of IDAWs regardless of format
` [PATCH v1 13/16] vfio/ccw: allocate/populate the guest idal
` [PATCH v1 14/16] vfio/ccw: handle a guest Format-1 IDAL
` [PATCH v1 15/16] vfio/ccw: don't group contiguous pages on 2K IDAWs
` [PATCH v1 16/16] vfio/ccw: remove old IDA format restrictions

[PATCH 0/3] kvm: fix two svm pmu virtualization bugs
 2022-11-21 21:33 UTC  (11+ messages)
` [PATCH 1/3] kvm: introduce a helper before creating the 1st vcpu
` [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
` [PATCH 3/3] target/i386/kvm: get and put AMD pmu registers

[PATCH v2 00/16] KVM: x86: gfn_to_pfn_cache fixes and cleanups
 2022-11-21 20:02 UTC  (5+ messages)
` [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property

[PATCH v4 0/6] x86: KVM: Advertise CPUID of new Intel platform instructions to user space
 2022-11-21 19:50 UTC  (17+ messages)
` [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID "
` [PATCH v4 3/6] x86: KVM: Advertise AVX-IFMA "
` [PATCH v4 4/6] x86: KVM: Advertise AVX-VNNI-INT8 "

[PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
 2022-11-21 18:09 UTC  (5+ messages)
` [PATCH v4 1/3] KVM: arm64: Take a pointer to walker data in kvm_dereference_pteref()
` [PATCH v4 2/3] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
` [PATCH v4 3/3] KVM: arm64: Reject shared table walks in the hyp code

[PATCH 00/13] SVM: vNMI (with my fixes)
 2022-11-21 17:51 UTC  (17+ messages)
` [PATCH 02/13] KVM: nSVM: don't call nested_sync_control_from_vmcb02 on each VM exit
` [PATCH 04/13] KVM: nSVM: clean up copying of int_ctl fields back to vmcb01/vmcb12
` [PATCH 07/13] KVM: SVM: Add VNMI support in get/set_nmi_mask
` [PATCH 09/13] KVM: SVM: allow NMI window with vNMI
` [PATCH 10/13] KVM: SVM: Add VNMI support in inject_nmi

[PATCH v3 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
 2022-11-21 17:44 UTC  (7+ messages)
` [PATCH v3 1/9] "
` [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG

[PATCH v2 0/2] s390/vfio-ccw: addressing fixes
 2022-11-21 16:58 UTC  (3+ messages)
` [PATCH v2 1/2] vfio/ccw: sort out physical vs virtual pointers usage
` [PATCH v2 2/2] vfio/ccw: identify CCW data addresses as physical

[PATCH v2 0/9] nSVM: Security and correctness fixes
 2022-11-21 16:34 UTC  (22+ messages)
` [PATCH v2 1/9] KVM: x86: nSVM: leave nested mode on vCPU free
` [PATCH v2 2/9] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use
` [PATCH v2 3/9] KVM: x86: add kvm_leave_nested
` [PATCH v2 4/9] KVM: x86: forcibly leave nested mode on vCPU reset
` [PATCH v2 5/9] KVM: selftests: move idt_entry to header
` [PATCH v2 6/9] kvm: selftests: add svm nested shutdown test
` [PATCH v2 7/9] KVM: x86: allow L1 to not intercept triple fault
` [PATCH v2 8/9] KVM: selftests: add svm part to triple_fault_test
` [PATCH v2 9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit

[PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
 2022-11-21 16:14 UTC  (6+ messages)

[PATCH] KVM: x86: Allow APICv APIC ID inhibit to be cleared on legacy kernels
 2022-11-21 15:18 UTC  (3+ messages)
` [PATCH v3] KVM: x86: Allow APICv APIC ID inhibit to be cleared

[RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
 2022-11-21 15:05 UTC  (20+ messages)
` [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
` [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
` [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
` [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in "
` [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
` [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
` [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page "
` [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for "
` [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
` [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
` [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
` [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
` [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
` [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
` [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
` [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
` [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception
` [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths "

[PATCH v11 00/11] s390x: CPU Topology
 2022-11-21 14:13 UTC  (5+ messages)
` [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest

[PATCH -next] RISC-V: KVM: optimize kvm_arch_hardware_enable()
 2022-11-21 13:38 UTC  (3+ messages)

[PATCH 4.19 00/34] Intel RETBleed mitigations for 4.19
 2022-11-21 12:26 UTC  (2+ messages)

[PATCH] KVM: s390: remove unused gisa_clear_ipm_gisc() function
 2022-11-21 12:07 UTC  (2+ messages)

[RFC PATCH 0/1] QEMU: Dirty quota-based throttling of vcpus
 2022-11-21 11:35 UTC  (3+ messages)
` [RFC PATCH 1/1] "

[RFC PATCH 0/3] KVM: Restore original behavior of kvm.halt_poll_ns
 2022-11-21  9:39 UTC  (10+ messages)
` [RFC PATCH 2/3] KVM: Avoid re-reading kvm->max_halt_poll_ns during halt-polling
` [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL

KVM 6.2 state
 2022-11-21  9:25 UTC  (4+ messages)

[PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
 2022-11-21  9:20 UTC  (5+ messages)

[PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace
 2022-11-21  8:36 UTC  (3+ messages)
  ` [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace. #forregzbot

[PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP)
 2022-11-20 21:34 UTC  (6+ messages)
` [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled

[syzbot] inconsistent lock state in sync_info_debugfs_show
 2022-11-20 20:51 UTC 

[PATCH] KVM: Using __weak instead of __attribute__((weak))
 2022-11-20 15:01 UTC 

[PATCH V5] virt: sev: Prevent IV reuse in SNP guest driver
 2022-11-19 18:25 UTC  (4+ messages)

[PATCH v4 00/16] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
 2022-11-19 12:54 UTC  (9+ messages)
` [PATCH v4 09/16] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
` [PATCH v4 11/16] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
` [PATCH v4 12/16] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon "

[PATCH 1/4] MAINTAINERS: Add KVM x86/xen maintainer list
 2022-11-19 11:46 UTC  (8+ messages)
` [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
` [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
` [PATCH 4/4] KVM: x86/xen: Add runstate tests for 32-bit mode and crossing page boundary

[PATCH 1/2] KVM: Mark KVM_SET_MEMORY_REGION and KVM_SET_MEMORY_ALIAS as obsoleted
 2022-11-19  8:56 UTC  (2+ messages)
` [PATCH 2/2] KVM: Add missing arch for KVM_CREATE_DEVICE and KVM_{SET,GET}_DEVICE_ATTR

[PATCH] KVM: VMX: Access @flags as a 32-bit value in __vmx_vcpu_run()
 2022-11-19  3:17 UTC  (2+ messages)

[PATCH 0/9] tools: Make {clear,set}_bit() atomic for reals
 2022-11-19  1:34 UTC  (10+ messages)
` [PATCH 1/9] KVM: selftests: Add rdmsr_from_l2() implementation in Hyper-V eVMCS test
` [PATCH 2/9] KVM: selftests: Remove unused "vcpu" param to fix build error
` [PATCH 3/9] KVM: arm64: selftests: Enable single-step without a "full" ucall()
` [PATCH 4/9] tools: Take @bit as an "unsigned long" in {clear,set}_bit() helpers
` [PATCH 5/9] perf tools: Use dedicated non-atomic clear/set bit helpers
` [PATCH 6/9] KVM: selftests: Use non-atomic clear/set bit helpers in KVM tests
` [PATCH 7/9] tools: Drop conflicting non-atomic test_and_{clear,set}_bit() helpers
` [PATCH 8/9] tools: Drop "atomic_" prefix from atomic test_and_set_bit()
` [PATCH 9/9] tools: KVM: selftests: Convert clear/set_bit() to actual atomics

[PATCH v2 0/2] KVM: selftests: Enable access_tracking_perf_test for arm64
 2022-11-18 21:15 UTC  (3+ messages)
` [PATCH v2 1/2] KVM: selftests: Have perf_test_util signal when to stop vCPUs
` [PATCH v2 2/2] KVM: selftests: Build access_tracking_perf_test for arm64

[PATCH v3 00/11] Connect VFIO to IOMMUFD
 2022-11-18 20:36 UTC  (5+ messages)
` [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c

[PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
 2022-11-18 20:25 UTC  (3+ messages)

[PATCH v5 06/19] iommufd: File descriptor, context, kconfig and makefiles
 2022-11-18 20:23 UTC  (3+ messages)

[PATCH] kvm, vmx: don't use "unsigned long" in vmx_vcpu_enter_exit()
 2022-11-18 17:44 UTC  (2+ messages)

[PATCH] kvm: account allocation in generic version of kvm_arch_alloc_vm()
 2022-11-18 17:30 UTC  (2+ messages)

[PATCH v2] KVM: x86: avoid memslot check in NX hugepage recovery if it cannot succeed
 2022-11-18 17:21 UTC  (2+ messages)

[PATCH v3 0/2] KVM: arm64: Fixes for parallel faults series
 2022-11-18 17:12 UTC  (6+ messages)
` [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks

[RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
 2022-11-18 17:04 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).