messages from 2023-01-05 22:54:35 to 2023-01-08 19:07:57 UTC [more...]
[PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
2023-01-08 19:07 UTC (3+ messages)
` [PATCH 1/7] KVM: arm64: PMU: Have reset_pmu_reg() to clear a register
[PATCH 0/6] KVM: x86: x2APIC reserved bits/regs fixes
2023-01-08 18:09 UTC (13+ messages)
` [PATCH 1/6] KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI
` [PATCH 2/6] KVM: x86: Inject #GP on x2APIC WRMSR that sets reserved bits 63:32
` [PATCH 3/6] KVM: x86: Mark x2APIC DFR reg as non-existent for x2APIC
` [PATCH 4/6] KVM: x86: Split out logic to generate "readable" APIC regs mask to helper
` [PATCH 5/6] KVM: VMX: Always intercept accesses to unsupported "extended" x2APIC regs
` [PATCH 6/6] KVM: VMX: Intercept reads to invalid and write-only x2APIC registers
[PATCH V1 vfio 0/6] Move to use cgroups for userspace persistent allocations
2023-01-08 15:44 UTC (7+ messages)
` [PATCH V1 vfio 1/6] vfio/mlx5: Fix UBSAN note
` [PATCH V1 vfio 2/6] vfio/mlx5: Allow loading of larger images than 512 MB
` [PATCH V1 vfio 3/6] vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
` [PATCH V1 vfio 4/6] vfio/hisi: "
` [PATCH V1 vfio 5/6] vfio/fsl-mc: "
` [PATCH V1 vfio 6/6] vfio/platform: "
[PATCH v5 00/33] KVM: x86: AVIC and local APIC fixes+cleanups
2023-01-08 15:32 UTC (40+ messages)
` [PATCH v5 01/33] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
` [PATCH v5 02/33] KVM: x86: Purge "highest ISR" cache when updating APICv state
` [PATCH v5 03/33] KVM: SVM: Flush the "current" TLB when activating AVIC
` [PATCH v5 04/33] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
` [PATCH v5 05/33] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
` [PATCH v5 06/33] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
` [PATCH v5 07/33] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
` [PATCH v5 08/33] KVM: x86: Handle APICv updates for APIC "mode" changes via request
` [PATCH v5 09/33] KVM: x86: Move APIC access page helper to common x86 code
` [PATCH v5 10/33] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
` [PATCH v5 11/33] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean
` [PATCH v5 12/33] KVM: SVM: Compute dest based on sender's x2APIC status for AVIC kick
` [PATCH v5 13/33] KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast
` [PATCH v5 14/33] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
` [PATCH v5 15/33] KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch
` [PATCH v5 16/33] KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU
` [PATCH v5 17/33] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
` [PATCH v5 18/33] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
` [PATCH v5 19/33] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
` [PATCH v5 20/33] KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
` [PATCH v5 21/33] KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
` [PATCH v5 22/33] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
` [PATCH v5 23/33] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
` [PATCH v5 24/33] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
` [PATCH v5 25/33] KVM: SVM: Always update local APIC on writes to logical dest register
` [PATCH v5 26/33] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
` [PATCH v5 27/33] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
` [PATCH v5 28/33] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
` [PATCH v5 29/33] KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps
` [PATCH v5 30/33] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
` [PATCH v5 31/33] KVM: x86: Track required APICv inhibits with variable, not callback
` [PATCH v5 32/33] KVM: x86: Allow APICv APIC ID inhibit to be cleared
` [PATCH v5 33/33] KVM: x86: Add helpers to recalc physical vs. logical optimized APIC maps
[PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
2023-01-08 14:18 UTC (13+ messages)
` [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
` [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
` [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
[PATCH v7 0/4] KVM: Dirty quota-based throttling
2023-01-07 21:44 UTC (13+ messages)
` [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
[PATCH rcu 05/27] arch/riscv/kvm: Remove "select SRCU"
2023-01-07 16:03 UTC (3+ messages)
[PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
2023-01-07 10:40 UTC (2+ messages)
[PATCH] vfio: platform: No need to check res again
2023-01-07 3:47 UTC
[PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
2023-01-07 2:19 UTC (4+ messages)
[kvm-unit-tests PATCH 0/3] x86: Add testcases for x2APIC MSRs
2023-01-07 1:17 UTC (4+ messages)
` [kvm-unit-tests PATCH 1/3] x86/msr: Skip built-in testcases if user provides custom MSR+value to test
` [kvm-unit-tests PATCH 2/3] x86/apic: Refactor x2APIC reg helper to provide exact semantics
` [kvm-unit-tests PATCH 3/3] x86/msr: Add testcases for x2APIC MSRs
[PATCH v8 00/16] TDX host kernel support
2023-01-07 0:47 UTC (32+ messages)
` [PATCH v8 01/16] x86/tdx: Define TDX supported page sizes as macros
` [PATCH v8 02/16] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v8 03/16] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
` [PATCH v8 04/16] x86/virt/tdx: Add skeleton to initialize TDX on demand
` [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
` [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
` [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
` [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v8 09/16] x86/virt/tdx: Fill out "
` [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
` [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
` [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v8 14/16] x86/virt/tdx: Initialize all TDMRs
` [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
[PATCH net-next v9] virtio/vsock: replace virtio_vsock_pkt with sk_buff
2023-01-07 0:29 UTC
[PATCH v2 0/6] kvm->lock vs. SRCU sync optimizations
2023-01-07 0:12 UTC (7+ messages)
` [PATCH v2 1/6] KVM: x86: Optimize kvm->lock and SRCU interaction (KVM_SET_PMU_EVENT_FILTER)
` [PATCH v2 2/6] KVM: x86: Optimize kvm->lock and SRCU interaction (KVM_X86_SET_MSR_FILTER)
` [PATCH v2 3/6] KVM: x86: Simplify msr_filter update
` [PATCH v2 4/6] KVM: x86: Explicitly state lockdep condition of "
` [PATCH v2 5/6] KVM: x86: Remove unnecessary initialization in kvm_vm_ioctl_set_msr_filter()
` [PATCH v2 6/6] KVM: x86: Simplify msr_io()
[RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
2023-01-07 0:06 UTC (10+ messages)
` [PATCH 0/2] Fix deadlocks in kvm_vm_ioctl_set_msr_filter() and
` [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
[PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
2023-01-06 23:01 UTC (8+ messages)
` [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
[RFC PATCH v2 00/32] x86: enable FRED for x86-64
2023-01-06 23:00 UTC (35+ messages)
` [RFC PATCH v2 01/32] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
` [RFC PATCH v2 02/32] x86/traps: add a system interrupt table for system interrupt dispatch
` [RFC PATCH v2 03/32] x86/traps: add install_system_interrupt_handler()
` [RFC PATCH v2 04/32] x86/traps: add external_interrupt() to dispatch external interrupts
` [RFC PATCH v2 05/32] x86/traps: add exc_raise_irq() for VMX IRQ reinjection
` [RFC PATCH v2 06/32] x86/cpufeature: add the cpu feature bit for FRED
` [RFC PATCH v2 07/32] x86/opcode: add ERETU, ERETS instructions to x86-opcode-map
` [RFC PATCH v2 08/32] x86/objtool: teach objtool about ERETU and ERETS
` [RFC PATCH v2 09/32] x86/cpu: add X86_CR4_FRED macro
` [RFC PATCH v2 10/32] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
` [RFC PATCH v2 11/32] x86/fred: if CONFIG_X86_FRED is disabled, disable FRED support
` [RFC PATCH v2 12/32] x86/cpu: add MSR numbers for FRED configuration
` [RFC PATCH v2 13/32] x86/fred: header file for event types
` [RFC PATCH v2 14/32] x86/fred: header file with FRED definitions
` [RFC PATCH v2 15/32] x86/fred: make unions for the cs and ss fields in struct pt_regs
` [RFC PATCH v2 16/32] x86/fred: reserve space for the FRED stack frame
` [RFC PATCH v2 17/32] x86/fred: add a page fault entry stub for FRED
` [RFC PATCH v2 18/32] x86/fred: add a debug "
` [RFC PATCH v2 19/32] x86/fred: add a NMI "
` [RFC PATCH v2 20/32] x86/fred: add a machine check "
` [RFC PATCH v2 21/32] x86/fred: FRED entry/exit and dispatch code
` [RFC PATCH v2 22/32] x86/fred: FRED initialization code
` [RFC PATCH v2 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
` [RFC PATCH v2 24/32] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
` [RFC PATCH v2 25/32] x86/fred: disallow the swapgs instruction "
` [RFC PATCH v2 26/32] x86/fred: no ESPFIX needed "
` [RFC PATCH v2 27/32] x86/fred: allow single-step trap and NMI when starting a new thread
` [RFC PATCH v2 28/32] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
` [RFC PATCH v2 29/32] x86/ia32: do not modify the DPL bits for a null selector
` [RFC PATCH v2 30/32] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
` [RFC PATCH v2 31/32] x86/fred: allow dynamic stack frame size
` [RFC PATCH v2 32/32] x86/fred: disable FRED by default in its early stage
[RFC 00/14] KVM: x86/MMU: Formalize the Shadow MMU
2023-01-06 19:49 UTC (4+ messages)
` [RFC 04/14] KVM: x86/MMU: Expose functions for paging_tmpl.h
[kvm-unit-tests PATCH v2 0/4] arm: pmu: Add support for PMUv3p5
2023-01-06 19:28 UTC (3+ messages)
` [kvm-unit-tests PATCH v2 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
[PATCH] KVM: selftests: Fix build of rseq test
2023-01-06 19:24 UTC
[PATCH v2 0/5] target/i386: Update AMD EPYC CPU Models
2023-01-06 18:57 UTC (6+ messages)
` [PATCH v2 1/5] target/i386: allow versioned CPUs to specify new cache_info
` [PATCH v2 2/5] target/i386: Add new EPYC CPU versions with updated cache_info
` [PATCH v2 3/5] target/i386: Add a couple of feature bits in 8000_0008_EBX
` [PATCH v2 4/5] target/i386: Add feature bits for CPUID_Fn80000021_EAX
` [PATCH v2 5/5] target/i386: Add missing feature bits in EPYC-Milan model
[PATCH v2 0/1] vfio/type1: Fix vfio-pci pass-through of ISM devices
2023-01-06 18:03 UTC (4+ messages)
` [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
[kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
2023-01-06 17:37 UTC (4+ messages)
[PATCH 0/8] Let iommufd charge IOPTE allocations to the memory cgroup
2023-01-06 17:24 UTC (11+ messages)
` [PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
` [PATCH 2/8] iommu: Remove iommu_map_atomic()
` [PATCH 3/8] iommu: Add a gfp parameter to iommu_map_sg()
` [PATCH 4/8] iommu/dma: Use the gfp parameter in __iommu_dma_alloc_noncontiguous()
` [PATCH 5/8] iommufd: Use GFP_KERNEL_ACCOUNT for iommu_map()
` [PATCH 6/8] iommu/intel: Add a gfp parameter to alloc_pgtable_page()
` [PATCH 7/8] iommu/intel: Support the gfp argument to the map_pages op
` [PATCH 8/8] iommu/s390: Push the gfp parameter to the kmem_cache_alloc()'s
[RFC 00/12] Add vfio_device cdev for iommufd support
2023-01-06 16:08 UTC (7+ messages)
` [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
[PATCH V7 0/7] fixes for virtual address update
2023-01-06 15:14 UTC (6+ messages)
` [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
[PATCH v3 0/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
2023-01-06 14:29 UTC (8+ messages)
` [PATCH v3 1/1] "
[PATCH iommufd v3 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
2023-01-06 11:45 UTC (2+ messages)
[PATCH iommufd v3 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
2023-01-06 11:42 UTC (2+ messages)
[PATCH iommufd v3 4/9] iommufd: Convert to msi_device_has_isolated_msi()
2023-01-06 11:36 UTC (2+ messages)
[PATCH iommufd v3 3/9] vfio/type1: Convert to iommu_group_has_isolated_msi()
2023-01-06 11:34 UTC (2+ messages)
[PATCH v7 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
2023-01-06 10:36 UTC (3+ messages)
` [PATCH v7 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
` [PATCH v7 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
2023-01-06 9:40 UTC (7+ messages)
` [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
` [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
[PATCH v6 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
2023-01-06 9:20 UTC (6+ messages)
` [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
[PATCH][resend] KVM: x86: fire timer when it is migrated and expired, and in oneshot mode
2023-01-06 4:06 UTC
[PATCH] kvm: x86/mmu: Remove FNAME(is_self_change_mapping)
2023-01-06 1:45 UTC (2+ messages)
[Bug 216891] New: The interface for creating SR-IOV VF doesn't exist
2023-01-06 1:40 UTC (2+ messages)
` [Bug 216891] "
[PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-01-05 23:37 UTC (7+ messages)
` [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
[PATCH v2 0/6] Clean up the supported xfeatures
2023-01-05 23:10 UTC (5+ messages)
` [PATCH v2 6/6] KVM: selftests: Add XCR0 Test
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).