messages from 2022-12-08 00:27:13 to 2022-12-09 01:53:46 UTC [more...]
[PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
2022-12-09 1:53 UTC (4+ messages)
` [PATCH v2 1/7] KVM: selftests: Fix build due to ucall_uninit() removal
` [PATCH v2 2/7] KVM: selftests: Setup ucall after loading program into guest memory
` [PATCH v2 3/7] KVM: selftests: Mark correct page as mapped in virt_map()
[PATCH] KVM: x86: ioapic: Fix level-triggered EOI and userspace IOAPIC reconfigure race
2022-12-09 1:34 UTC (3+ messages)
` [PATCH v2] KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC "
[PATCH] KVM: use unified srcu interface function
2022-12-09 1:22 UTC (2+ messages)
[PATCH v2] KVM: x86: hyper-v: Fix 'using uninitialized value' Coverity warning
2022-12-09 1:12 UTC (2+ messages)
[PATCH 0/4] KVM: selftests: Fixes for ucall pool + page_fault_test
2022-12-09 1:08 UTC (15+ messages)
` [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
` [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
[PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
2022-12-09 0:56 UTC (51+ messages)
` [PATCH v4 01/32] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
` [PATCH v4 02/32] KVM: x86: Purge "highest ISR" cache when updating APICv state
` [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
` [PATCH v4 05/32] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
` [PATCH v4 06/32] KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated
` [PATCH v4 07/32] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
` [PATCH v4 08/32] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
` [PATCH v4 09/32] KVM: x86: Handle APICv updates for APIC "mode" changes via request
` [PATCH v4 10/32] KVM: x86: Move APIC access page helper to common x86 code
` [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
` [PATCH v4 15/32] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
` [PATCH v4 18/32] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
` [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
` [PATCH v4 20/32] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
` [PATCH v4 23/32] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
` [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
` [PATCH v4 25/32] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
` [PATCH v4 26/32] KVM: SVM: Always update local APIC on writes to logical dest register
` [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
` [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
` [PATCH v4 29/32] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
` [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
` [PATCH v4 32/32] KVM: x86: Track required APICv inhibits with variable, not callback
[PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
2022-12-09 0:44 UTC (14+ messages)
` [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
` [PATCH iommufd 2/9] vfio/type1: Check that every device supports IOMMU_CAP_INTR_REMAP
` [PATCH iommufd 3/9] vfio/type1: Convert to msi_device_has_secure_msi()
` [PATCH iommufd 4/9] iommufd: "
` [PATCH iommufd 5/9] irq: Remove unused irq_domain_check_msi_remap() code
` [PATCH iommufd 6/9] irq: Rename MSI_REMAP to SECURE_MSI
` [PATCH iommufd 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_SECURE_MSI
` [PATCH iommufd 8/9] irq/s390: Add arch_is_secure_msi() for s390
` [PATCH iommufd 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
[Patch v2 0/2] NUMA aware page table allocation
2022-12-09 0:27 UTC (15+ messages)
` [Patch v2 1/2] KVM: x86/mmu: Allocate page table pages on TDP splits during dirty log enable on the underlying page's numa node
` [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
[PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
2022-12-09 0:01 UTC (2+ messages)
[RFC PATCH v2 00/15] KVM TDX: TDP MMU: large page support
2022-12-08 23:35 UTC (16+ messages)
` [RFC PATCH v2 01/15] KVM: TDP_MMU: Go to next level if smaller private mapping exists
` [RFC PATCH v2 02/15] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
` [RFC PATCH v2 03/15] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
` [RFC PATCH v2 04/15] KVM: TDX: Pass size to tdx_measure_page()
` [RFC PATCH v2 05/15] KVM: TDX: Pass size to reclaim_page()
` [RFC PATCH v2 06/15] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
` [RFC PATCH v2 07/15] KVM: MMU: Introduce level info in PFERR code
` [RFC PATCH v2 08/15] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
` [RFC PATCH v2 09/15] KVM: TDX: Pass desired page level in err code for page fault handler
` [RFC PATCH v2 10/15] KVM: x86/tdp_mmu: Split the large page when zap leaf
` [RFC PATCH v2 11/15] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
` [RFC PATCH v2 12/15] KVM: x86/tdp_mmu: Try to merge pages into a large page
` [RFC PATCH v2 13/15] KVM: x86/tdp_mmu: TDX: Implement "
` [RFC PATCH v2 14/15] KVM: x86/mmu: Make kvm fault handelr aware of large page of private memslot
` [RFC PATCH v2 15/15] KVM: TDX: Allow 2MB large page for TD GUEST
[PATCH v7 00/20] TDX host kernel support
2022-12-08 23:29 UTC (12+ messages)
` [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
[PATCH V1 0/8] vfio virtual address update redo
2022-12-08 22:18 UTC (16+ messages)
` [PATCH V1 1/8] vfio: delete interfaces to update vaddr
` [PATCH V1 2/8] vfio/type1: dma owner permission
` [PATCH V1 7/8] vfio: change dma owner
[PATCH v2] samples: vfio-mdev: Fix missing pci_disable_device() in mdpy_fb_probe()
2022-12-08 22:16 UTC (2+ messages)
[PATCH 1/2] vfio/mlx5: fix error code in mlx5vf_precopy_ioctl()
2022-12-08 22:15 UTC (5+ messages)
` [PATCH 2/2] vfio/mlx5: error pointer dereference in error handling
[V1 PATCH 0/6] selftests: KVM: selftests for fd-based private memory
2022-12-08 21:56 UTC (5+ messages)
` [V1 PATCH 4/6] KVM: selftests: x86: Execute VMs with "
[RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
2022-12-08 21:52 UTC (12+ messages)
` [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
` [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
` [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
[RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
2022-12-08 19:38 UTC (38+ messages)
` [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
` [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
` [RFC PATCH 03/37] KVM: MMU: Move tdp_ptep_t "
` [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
` [RFC PATCH 05/37] KVM: x86/mmu: Unify TDP MMU and Shadow MMU root refcounts
` [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
` [RFC PATCH 07/37] mm: Introduce architecture-neutral PG_LEVEL macros
` [RFC PATCH 08/37] KVM: selftests: Stop assuming stats are contiguous in kvm_binary_stats_test
` [RFC PATCH 09/37] KVM: Move page size stats into common code
` [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to "
` [RFC PATCH 11/37] KVM: MMU: Move RET_PF_* into "
` [RFC PATCH 12/37] KVM: x86/mmu: Use PG_LEVEL_{PTE,PMD,PUD} in the TDP MMU
` [RFC PATCH 13/37] KVM: MMU: Move sptep_to_sp() to common code
` [RFC PATCH 14/37] KVM: MMU: Introduce common macros for TDP page tables
` [RFC PATCH 15/37] KVM: x86/mmu: Add a common API for inspecting/modifying TDP PTEs
` [RFC PATCH 16/37] KVM: x86/mmu: Abstract away TDP MMU root lookup
` [RFC PATCH 17/37] KVM: Move struct kvm_gfn_range to kvm_types.h
` [RFC PATCH 18/37] KVM: x86/mmu: Add common API for creating TDP PTEs
` [RFC PATCH 19/37] KVM: x86/mmu: Add arch hooks for NX Huge Pages
` [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
` [RFC PATCH 21/37] KVM: Introduce CONFIG_HAVE_TDP_MMU
` [RFC PATCH 22/37] KVM: x86: Select HAVE_TDP_MMU if X86_64
` [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
` [RFC PATCH 24/37] KVM: x86/mmu: Move kvm_mmu_hugepage_adjust() up to fault handler
` [RFC PATCH 25/37] KVM: x86/mmu: Pass root role to kvm_tdp_mmu_get_vcpu_root_hpa()
` [RFC PATCH 26/37] KVM: Move page table cache to struct kvm_vcpu
` [RFC PATCH 27/37] KVM: MMU: Move mmu_page_header_cache to common code
` [RFC PATCH 28/37] KVM: MMU: Stub out tracepoints on non-x86 architectures
` [RFC PATCH 29/37] KVM: x86/mmu: Collapse kvm_flush_remote_tlbs_with_{range,address}() together
` [RFC PATCH 30/37] KVM: x86/mmu: Rename kvm_flush_remote_tlbs_with_address()
` [RFC PATCH 31/37] KVM: x86/MMU: Use gfn_t in kvm_flush_remote_tlbs_range()
` [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code
` [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to "
` [RFC PATCH 34/37] KVM: MMU: Move the TDP iterator "
` [RFC PATCH 35/37] KVM: x86/mmu: Move tdp_mmu_max_gfn_exclusive() to tdp_pgtable.c
` [RFC PATCH 36/37] KVM: x86/mmu: Move is_tdp_mmu_page() to mmu_internal.h
` [RFC PATCH 37/37] KVM: MMU: Move the TDP MMU to common code
vfio-pci rejects binding to devices having same pcie vendor id and device id
2022-12-08 18:48 UTC (5+ messages)
[RFC] Improving userfaultfd scalability for live migration
2022-12-08 17:50 UTC (12+ messages)
[kvm-unit-tests v2 PATCH] s390x: sie: Test whether the epoch extension field is working as expected
2022-12-08 17:05 UTC
[PATCH 0/3] x86/cpu: KVM: Make SGX and VMX depend on FEAT_CTL
2022-12-08 16:45 UTC (5+ messages)
` [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
[PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
2022-12-08 16:40 UTC (3+ messages)
[kvm-unit-tests PATCH] s390x: sie: Test whether the epoch extension field is working as expected
2022-12-08 16:15 UTC (3+ messages)
[PATCH-for-8.0 v2 0/4] target/cpu: System/User cleanups around hwaddr/vaddr
2022-12-08 15:58 UTC (6+ messages)
` [PATCH-for-8.0 v2 1/4] cputlb: Restrict SavedIOTLB to system emulation
` [PATCH-for-8.0 v2 2/4] gdbstub: Use vaddr type for generic insert/remove_breakpoint() API
` [PATCH-for-8.0 v2 3/4] target/cpu: Restrict cpu_get_phys_page_debug() handlers to sysemu
` [PATCH-for-8.0 v2 4/4] target/sparc/sysemu: Remove pointless CONFIG_USER_ONLY guard
[PATCH v2 00/11] SVM: vNMI (with my fixes)
2022-12-08 13:44 UTC (10+ messages)
` [PATCH v2 06/11] KVM: SVM: add wrappers to enable/disable IRET interception
` [PATCH v2 11/11] KVM: nSVM: implement support for nested VNMI
[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
2022-12-08 11:30 UTC (17+ messages)
` [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
` [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
` [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
` [PATCH v10 8/9] KVM: Handle page fault for private memory
[PATCH kernel 0/3] KVM: SEV: Enable AMD SEV-ES DebugSwap
2022-12-08 11:01 UTC (11+ messages)
` [PATCH kernel 1/3] x86/amd/dr_addr_mask: Cache values in percpu variables
` [PATCH kernel 3/3] x86/sev: Do not handle #VC for DR7 read/write
[PATCH v13 0/7] s390x: CPU Topology
2022-12-08 9:44 UTC (8+ messages)
` [PATCH v13 1/7] s390x/cpu topology: Creating CPU topology device
` [PATCH v13 2/7] s390x/cpu topology: reporting the CPU topology to the guest
` [PATCH v13 3/7] s390x/cpu_topology: resetting the Topology-Change-Report
` [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
` [PATCH v13 5/7] s390x/cpu_topology: interception of PTF instruction
` [PATCH v13 6/7] s390x/cpu_topology: activating CPU topology
` [PATCH v13 7/7] docs/s390x: document s390x cpu topology
[PATCH v7 0/4] KVM: Dirty quota-based throttling
2022-12-08 7:30 UTC (10+ messages)
` [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
[PATCH V1 8/8] vfio/type1: change dma owner
2022-12-08 7:22 UTC (2+ messages)
[PATCH v1] drivers/vhost/vhost: fix overflow checks in vhost_overflow
2022-12-08 7:21 UTC (3+ messages)
[PATCH v3 0/8] Make Intel PT configurable
2022-12-08 6:25 UTC (9+ messages)
` [PATCH v3 1/8] target/i386: Print CPUID subleaf info for unsupported feature
` [PATCH v3 2/8] target/i386/intel-pt: Fix INTEL_PT_ADDR_RANGES_NUM_MASK
` [PATCH v3 3/8] target/i386/intel-pt: Introduce FeatureWordInfo for Intel PT CPUID leaf 0x14
` [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
` [PATCH v3 5/8] target/i386/intel-pt: Rework/rename the default INTEL-PT feature set
` [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
` [PATCH v3 7/8] target/i386/intel-pt: Define specific PT feature set for IceLake-server and Snowridge
` [PATCH v3 8/8] target/i386/intel-pt: Access MSR_IA32_RTIT_ADDRn based on guest CPUID configuration
[RFC 0/9] KVM perf support
2022-12-08 1:11 UTC (6+ messages)
` [RFC 8/9] RISC-V: KVM: Implement "
[PATCH] samples: vfio-mdev: Fix missing pci_disable_device() in mdpy_fb_probe()
2022-12-08 1:07 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox