messages from 2023-02-20 18:48:28 to 2023-02-21 22:36:23 UTC [more...]
[PATCH v10 0/8] Parallel CPU bringup for x86_64
2023-02-21 22:33 UTC (5+ messages)
` [PATCH v10 1/8] x86/apic/x2apic: Allow CPU cluster_mask to be populated in parallel
` [PATCH v10 2/8] cpu/hotplug: Move idle_thread_get() to <linux/smpboot.h>
` [PATCH v10 5/8] x86/smpboot: Split up native_cpu_up into separate phases and document them
` [PATCH v10 8/8] x86/smpboot: Serialize topology updates for secondary bringup
[PATCH 00/16] KVM: arm64: Rework timer offsetting for fun and profit
2023-02-21 22:17 UTC (3+ messages)
[PATCH RFC v8 00/56] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-02-21 22:06 UTC (61+ messages)
` [PATCH RFC v8 01/56] KVM: x86: Add 'fault_is_private' x86 op
` [PATCH RFC v8 02/56] KVM: x86: Add 'update_mem_attr' "
` [PATCH RFC v8 03/56] KVM: x86: Add platform hooks for private memory invalidations
` [PATCH RFC v8 04/56] KVM: Add HVA range operator
` [PATCH RFC v8 05/56] KVM: SEV: Require KVM_PROTECTED_VM when AMD_MEM_ENCRYPT is enabled
` [PATCH RFC v8 06/56] KVM: Split out memory attribute xarray updates to helper function
` [PATCH RFC v8 07/56] KVM: SEV: Populate private memory fd during LAUNCH_UPDATE_DATA
` [PATCH RFC v8 08/56] KVM: SEV: Rename sev_{pin,unpin}_memory
` [PATCH RFC v8 10/56] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH RFC v8 11/56] x86/sev: Add the host SEV-SNP initialization support
` [PATCH RFC v8 18/56] x86/fault: fix handle_split_page_fault() to work with memfd backed pages
` [PATCH RFC v8 19/56] x86/fault: Return pfn from dump_pagetable() for SEV-specific fault handling
` [PATCH RFC v8 20/56] crypto:ccp: Define the SEV-SNP commands
` [PATCH RFC v8 21/56] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH RFC v8 22/56] crypto:ccp: Provide API to issue SEV and SNP commands
` [PATCH RFC v8 23/56] crypto: ccp: Introduce snp leaked pages list
` [PATCH RFC v8 24/56] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH RFC v8 25/56] crypto: ccp: Handle the legacy SEV command "
` [PATCH RFC v8 26/56] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH RFC v8 27/56] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH RFC v8 28/56] crypto: ccp: Provide APIs to query extended attestation report
` [PATCH RFC v8 29/56] KVM: SVM: Add support to handle AP reset MSR protocol
` [PATCH RFC v8 30/56] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
` [PATCH RFC v8 31/56] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH RFC v8 32/56] KVM: SVM: Add initial SEV-SNP support
` [PATCH RFC v8 33/56] KVM: SVM: Add KVM_SNP_INIT command
` [PATCH RFC v8 34/56] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH RFC v8 35/56] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH RFC v8 36/56] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH RFC v8 37/56] KVM: X86: Keep the NPT and RMP page level in sync
` [PATCH RFC v8 38/56] KVM: x86: Define RMP page fault error bits for #NPF
` [PATCH RFC v8 39/56] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
` [PATCH RFC v8 40/56] KVM: SVM: Add KVM_EXIT_VMGEXIT
` [PATCH RFC v8 41/56] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH RFC v8 42/56] KVM: SVM: Add support to handle "
` [PATCH RFC v8 43/56] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
` [PATCH RFC v8 44/56] KVM: SVM: Add support to handle the RMP nested page fault
` [PATCH RFC v8 45/56] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH RFC v8 46/56] KVM: SVM: Use a VMSA physical address variable for populating VMCB
` [PATCH RFC v8 47/56] KVM: SVM: Support SEV-SNP AP Creation NAE event
` [PATCH RFC v8 48/56] KVM: SVM: Add SNP-specific handling for memory attribute updates
` [PATCH RFC v8 49/56] KVM: SVM: Implement .fault_is_private callback for SNP
` [PATCH RFC v8 50/56] KVM: SEV: Handle restricted memory invalidations "
` [PATCH RFC v8 51/56] KVM: SVM: Add module parameter to enable the SEV-SNP
` [PATCH RFC v8 52/56] ccp: Add support to decrypt the page
` [PATCH RFC v8 53/56] KVM: SVM: Make VMSAVE target area memory allocation SNP safe
` [PATCH RFC v8 54/56] x86/sev: Add KVM commands for instance certs
` [PATCH RFC v8 55/56] x86/sev: Document KVM_SEV_SNP_{G,S}ET_CERTS
` [PATCH RFC v8 56/56] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
[PATCH v9 0/8] Parallel CPU bringup for x86_64
2023-02-21 21:44 UTC (37+ messages)
` [External] "
[PATCH v3 00/13] Overhauling amx_test
2023-02-21 20:54 UTC (15+ messages)
` [PATCH v3 01/13] x86/fpu/xstate: Avoid getting xstate address of init_fpstate if fpstate contains the component
` [PATCH v3 02/13] KVM: selftests: x86: Add a working xstate data structure
` [PATCH v3 03/13] KVM: selftests: x86: Fix an error in comment of amx_test
` [PATCH v3 04/13] KVM: selftests: x86: Enable checking on xcomp_bv in amx_test
` [PATCH v3 05/13] KVM: selftests: x86: Add check of CR0.TS in the #NM handler "
` [PATCH v3 06/13] KVM: selftests: x86: Add the XFD check to IA32_XFD in #NM handler
` [PATCH v3 07/13] KVM: selftests: x86: Fix the checks to XFD_ERR using and operation
` [PATCH v3 08/13] KVM: selftests: x86: Repeat the checking of xheader when IA32_XFD[XTILEDATA] is set in amx_test
` [PATCH v3 09/13] KVM: selftests: x86: Assert that XTILE is XSAVE-enabled
` [PATCH v3 10/13] KVM: selftests: x86: Assert that both XTILE{CFG,DATA} are XSAVE-enabled
` [PATCH v3 11/13] KVM: selftests: x86: Remove redundant check that XSAVE is supported
` [PATCH v3 12/13] KVM: selftests: x86: Check that the palette table exists before using it
` [PATCH v3 13/13] KVM: selftests: x86: Check that XTILEDATA supports XFD
[PATCH 0/2] Documentation/process: Add a maintainer handbook for KVM x86
2023-02-21 19:54 UTC (5+ messages)
` [PATCH 2/2] "
[PATCH] docs: kvm: vfio: Require call KVM_DEV_VFIO_GROUP_ADD before VFIO_GROUP_GET_DEVICE_FD
2023-02-21 18:03 UTC (4+ messages)
[kvm-unit-tests PATCH v2 1/3] s390x/spec_ex: Use PSW macro
2023-02-21 17:50 UTC (4+ messages)
` [kvm-unit-tests PATCH v2 2/3] s390x/spec_ex: Add test introducing odd address into PSW
` [kvm-unit-tests PATCH v2 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
[PATCH 00/12] KVM: x86: Add "governed" X86_FEATURE framework
2023-02-21 17:12 UTC (8+ messages)
` [PATCH 01/12] KVM: x86: Add a framework for enabling KVM-governed x86 features
` [PATCH 05/12] KVM: x86: Use KVM-governed feature framework to track "XSAVES enabled"
` [PATCH 08/12] KVM: nSVM: Use KVM-governed feature framework to track "vVM{SAVE,LOAD} enabled"
[RFC PATCH V3 00/16] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
2023-02-21 16:44 UTC (3+ messages)
` [RFC PATCH V3 16/16] x86/sev: Fix interrupt exit code paths from #HV exception
[PATCH] KVM: x86: Remove duplicated calls of reverse_cpuid_check()
2023-02-21 15:54 UTC (2+ messages)
[GIT PULL] Please pull IOMMUFD subsystem changes
2023-02-21 15:39 UTC
[PATCH v4 0/9] Linear Address Masking (LAM) KVM Enabling
2023-02-21 14:36 UTC (8+ messages)
` [PATCH v4 9/9] KVM: x86: LAM: Expose LAM CPUID to user space VMM
[PATCH v2 00/29] Add KVM LoongArch support
2023-02-21 13:00 UTC (37+ messages)
` [PATCH v2 01/29] LoongArch: KVM: Add kvm related header files
` [PATCH v2 02/29] LoongArch: KVM: Implement kvm module related interface
` [PATCH v2 05/29] LoongArch: KVM: Add vcpu related header files
` [PATCH v2 08/29] LoongArch: KVM: Implement vcpu handle exit interface
` [PATCH v2 13/29] LoongArch: KVM: Implement misc vcpu related interfaces
` [PATCH v2 22/29] LoongArch: KVM: Implement handle idle exception
` [PATCH v2 27/29] LoongArch: KVM: Implement vcpu world switch
[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
2023-02-21 12:11 UTC (8+ messages)
[PATCH v2 2/7] RISC-V: Detect AIA CSRs from ISA string
2023-02-21 11:22 UTC (9+ messages)
[PATCH v3 0/8] Make Intel PT configurable
2023-02-21 9:37 UTC (4+ messages)
` [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
[kvm-unit-tests PATCH 0/3] s390x: Add PV SIE intercepts and ipl tests
2023-02-21 9:26 UTC (7+ messages)
` [kvm-unit-tests PATCH 2/3] s390x: pv: Test sie entry intercepts and validities
` [kvm-unit-tests PATCH 3/3] s390x: pv: Add IPL reset tests
[PATCH v4 00/12] KVM: x86: Add AMD Guest PerfMonV2 PMU support
2023-02-21 8:44 UTC (4+ messages)
` [PATCH v4 02/12] KVM: VMX: Refactor intel_pmu_set_msr() to align with other set_msr() helpers
[PATCH kvm-unit-tests] x86/pmu: Check counter is working properly before AMD pmu init
2023-02-21 8:29 UTC
[PATCH kernel v3 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
2023-02-21 5:19 UTC (3+ messages)
` [PATCH kernel v4] "
[PATCH v4 00/19] Add vfio_device cdev for iommufd support
2023-02-21 3:48 UTC (20+ messages)
` [PATCH v4 01/19] vfio: Allocate per device file structure
` [PATCH v4 02/19] vfio: Refine vfio file kAPIs
` [PATCH v4 03/19] vfio: Accept vfio device file in the driver facing kAPI
` [PATCH v4 04/19] kvm/vfio: Rename kvm_vfio_group to prepare for accepting vfio device fd
` [PATCH v4 05/19] kvm/vfio: Accept vfio device file from userspace
` [PATCH v4 06/19] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
` [PATCH v4 07/19] vfio: Block device access via device fd until device is opened
` [PATCH v4 08/19] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
` [PATCH v4 09/19] vfio/pci: Accept device fd for hot reset
` [PATCH v4 10/19] vfio: Add infrastructure for bind_iommufd from userspace
` [PATCH v4 11/19] vfio-iommufd: Add detach_ioas support for physical VFIO devices
` [PATCH v4 12/19] vfio-iommufd: Add detach_ioas for emulated "
` [PATCH v4 13/19] vfio: Add cdev_device_open_cnt to vfio_group
` [PATCH v4 14/19] vfio: Make vfio_device_open() single open for device cdev path
` [PATCH v4 15/19] vfio: Add cdev for vfio_device
` [PATCH v4 16/19] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
` [PATCH v4 17/19] vfio: Add VFIO_DEVICE_AT[DE]TACH_IOMMUFD_PT
` [PATCH v4 18/19] vfio: Compile group optionally
` [PATCH v4 19/19] docs: vfio: Add vfio device cdev description
[PATCH v3 vfio 0/7] pds vfio driver
2023-02-21 1:11 UTC (4+ messages)
[GIT PULL] virtio,vhost,vdpa: features, fixes
2023-02-21 0:40 UTC
[PATCH] KVM: selftests: Depend on kernel headers when making selftests
2023-02-20 20:35 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).