messages from 2023-02-27 08:24:34 to 2023-02-27 19:20:52 UTC [more...]
[PATCH v5 00/19] Add vfio_device cdev for iommufd support
2023-02-27 19:20 UTC (39+ messages)
` [PATCH v5 01/19] vfio: Allocate per device file structure
` [PATCH v5 02/19] vfio: Refine vfio file kAPIs for KVM
` [PATCH v5 03/19] vfio: Accept vfio device file in the KVM facing kAPI
` [PATCH v5 04/19] kvm/vfio: Rename kvm_vfio_group to prepare for accepting vfio device fd
` [PATCH v5 05/19] kvm/vfio: Accept vfio device file from userspace
` [PATCH v5 06/19] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
` [PATCH v5 07/19] vfio: Block device access via device fd until device is opened
` [PATCH v5 08/19] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
` [PATCH v5 09/19] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
` [PATCH v5 10/19] vfio: Add infrastructure for bind_iommufd from userspace
` [PATCH v5 11/19] vfio-iommufd: Add detach_ioas support for physical VFIO devices
` [PATCH v5 12/19] vfio-iommufd: Add detach_ioas for emulated "
` [PATCH v5 13/19] vfio: Add cdev_device_open_cnt to vfio_group
` [PATCH v5 14/19] vfio: Make vfio_device_open() single open for device cdev path
` [PATCH v5 15/19] vfio: Add cdev for vfio_device
` [PATCH v5 16/19] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
` [PATCH v5 17/19] vfio: Add VFIO_DEVICE_AT[DE]TACH_IOMMUFD_PT
` [PATCH v5 18/19] vfio: Compile group optionally
` [PATCH v5 19/19] docs: vfio: Add vfio device cdev description
[PATCH v2 1/1] KVM: selftests: Adjust VM's initial stack address to align with SysV ABI spec
2023-02-27 18:06 UTC
[PATCH v16 00/11] s390x: CPU Topology
2023-02-27 17:34 UTC (36+ messages)
` [PATCH v16 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
` [PATCH v16 06/11] s390x/cpu topology: interception of PTF instruction
` [PATCH v16 07/11] target/s390x/cpu topology: activating CPU topology
` [PATCH v16 08/11] qapi/s390x/cpu topology: set-cpu-topology monitor command
` [PATCH v17 08/12] "
` [PATCH v17 12/12] machine: adding s390 topology to info hotpluggable-cpus
` [PATCH v16 09/11] machine: adding s390 topology to query-cpu-fast
` [PATCH v16 10/11] qapi/s390x/cpu topology: CPU_POLARIZATION_CHANGE qapi event
` [PATCH v16 11/11] docs/s390x/cpu topology: document s390x cpu topology
[PATCH] KVM: SVM: Disable TDP MMU when running on Hyper-V
2023-02-27 17:17 UTC
[PATCH v9 0/8] x86/cpu, kvm: Support AMD Automatic IBRS
2023-02-27 16:39 UTC (13+ messages)
` [PATCH v9 7/8] x86/cpu: "
` [PATCH] x86/CPU/AMD: Make sure EFER[AIBRSE] is set
[PATCH v12 00/11] Parallel CPU bringup for x86_64
2023-02-27 16:32 UTC (6+ messages)
` [External] "
[kvm-unit-tests PATCH v2] s390x: Add tests for execute-type instructions
2023-02-27 15:44 UTC (2+ messages)
[PATCH v5 0/3] arm: enable MTE for QEMU + kvm
2023-02-27 15:16 UTC (14+ messages)
` [PATCH v5 2/3] arm/kvm: add support for MTE
` [PATCH v5 3/3] qtests/arm: add some mte tests
[PATCH 00/14] Add iommufd physical device operations for replace and alloc hwpt
2023-02-27 15:02 UTC (4+ messages)
` [PATCH 14/14] iommufd/selftest: Add a selftest for IOMMU_HWPT_ALLOC
[PATCH v2 0/5] bitmap: fix conversion from/to fix-sized arrays
2023-02-27 14:59 UTC (7+ messages)
` [PATCH 3/5] lib/bitmap: add test for bitmap_{from,to}_arr64
[PATCH 09/14] iommufd: Add iommufd_device_replace()
2023-02-27 14:00 UTC (5+ messages)
[PATCH -next v14 00/19] riscv: Add vector ISA support
2023-02-27 13:58 UTC (5+ messages)
` [PATCH -next v14 19/19] riscv: Enable Vector code to be built
[PULL 004/123] gdbstub: Use vaddr type for generic insert/remove_breakpoint() API
2023-02-27 12:36 UTC
[bug report] KVM: Don't null dereference ops->destroy
2023-02-27 11:24 UTC (3+ messages)
[PATCHv4 00/11] SVM: virtual NMI
2023-02-27 8:40 UTC (12+ messages)
` [PATCHv4 01/11] KVM: nSVM: Don't sync vmcb02 V_IRQ back to vmcb12 if KVM (L0) is intercepting VINTR
` [PATCHv4 02/11] KVM: nSVM: Disable intercept of VINTR if saved RFLAG.IF is 0
` [PATCHv4 03/11] KVM: nSVM: Raise event on nested VM exit if L1 doesn't intercept IRQs
` [PATCHv4 04/11] KVM: SVM: add wrappers to enable/disable IRET interception
` [PATCHv4 05/11] KVM: x86: Raise an event request when processing NMIs if an NMI is pending
` [PATCHv4 06/11] KVM: x86: Tweak the code and comment related to handling concurrent NMIs
` [PATCHv4 07/11] KVM: x86: Save/restore all NMIs when multiple NMIs are pending
` [PATCHv4 08/11] x86/cpu: Add CPUID feature bit for VNMI
` [PATCHv4 09/11] KVM: SVM: Add VNMI bit definition
` [PATCHv4 10/11] KVM: x86: add support for delayed virtual NMI injection interface
` [PATCHv4 11/11] KVM: nSVM: implement support for nested VNMI
[PATCH v5 0/5] Linear Address Masking (LAM) KVM Enabling
2023-02-27 8:45 UTC (6+ messages)
` [PATCH v5 1/5] KVM: x86: Virtualize CR4.LAM_SUP
` [PATCH v5 2/5] [Trivial]KVM: x86: Explicitly cast ulong to bool in kvm_set_cr3()
` [PATCH v5 3/5] KVM: x86: Virtualize CR3.LAM_{U48,U57}
` [PATCH v5 4/5] KVM: x86: emulation: Apply LAM mask when emulating data access in 64-bit mode
` [PATCH v5 5/5] KVM: x86: LAM: Expose LAM CPUID to user space VMM
[kvm-unit-tests PATCH v1] x86: Add test case for LAM_SUP
2023-02-27 8:25 UTC
[PATCH v12 000/106] KVM TDX basic feature support
2023-02-27 8:23 UTC (94+ messages)
` [PATCH v12 013/106] KVM: TDX: create/destroy VM structure
` [PATCH v12 014/106] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v12 016/106] KVM: TDX: Refuse to unplug the last cpu on the package
` [PATCH v12 017/106] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [PATCH v12 018/106] KVM: TDX: allocate/free TDX vcpu structure
` [PATCH v12 019/106] KVM: TDX: Do TDX specific vcpu initialization
` [PATCH v12 020/106] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [PATCH v12 021/106] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [PATCH v12 022/106] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
` [PATCH v12 023/106] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [PATCH v12 024/106] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
` [PATCH v12 025/106] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
` [PATCH v12 026/106] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
` [PATCH v12 027/106] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
` [PATCH v12 028/106] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
` [PATCH v12 029/106] KVM: x86/mmu: Disallow fast page fault on private GPA
` [PATCH v12 030/106] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [PATCH v12 031/106] KVM: VMX: Introduce test mode related to EPT violation VE
` [PATCH v12 032/106] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [PATCH v12 033/106] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v12 034/106] KVM: x86/mmu: Require TDP MMU and mmio caching for TDX
` [PATCH v12 035/106] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v12 036/106] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v12 037/106] KVM: Add flags to struct kvm_gfn_range
` [PATCH v12 038/106] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v12 039/106] KVM: x86/tdp_mmu: Sprinkle __must_check
` [PATCH v12 040/106] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v12 041/106] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v12 042/106] KVM: x86/mmu: Disallow dirty logging for x86 TDX
` [PATCH v12 043/106] KVM: x86/mmu: TDX: Do not enable page track for TD guest
` [PATCH v12 044/106] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v12 045/106] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v12 046/106] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v12 047/106] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v12 048/106] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v12 049/106] KVM: TDX: TDP MMU TDX support
` [PATCH v12 050/106] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v12 051/106] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v12 052/106] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v12 053/106] KVM: TDX: Create initial guest memory
` [PATCH v12 054/106] KVM: TDX: Finalize VM initialization
` [PATCH v12 055/106] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v12 056/106] KVM: TDX: Add helper assembly function to TDX vcpu
` [PATCH v12 057/106] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v12 058/106] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v12 059/106] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v12 060/106] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v12 061/106] KVM: TDX: restore user ret MSRs
` [PATCH v12 062/106] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v12 063/106] KVM: TDX: complete interrupts after tdexit
` [PATCH v12 064/106] KVM: TDX: restore debug store when TD exit
` [PATCH v12 065/106] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v12 066/106] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v12 067/106] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v12 068/106] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v12 069/106] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v12 070/106] KVM: TDX: Implement interrupt injection
` [PATCH v12 071/106] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v12 072/106] KVM: TDX: Implement methods to inject NMI
` [PATCH v12 073/106] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v12 074/106] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v12 075/106] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v12 076/106] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v12 077/106] KVM: TDX: Handle vmentry failure for INTEL TD guest
` [PATCH v12 078/106] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v12 079/106] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v12 080/106] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v12 081/106] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v12 082/106] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v12 083/106] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
` [PATCH v12 084/106] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v12 085/106] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v12 086/106] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v12 087/106] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v12 088/106] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v12 089/106] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v12 090/106] KVM: TDX: Handle TDX PV report fatal error hypercall
` [PATCH v12 091/106] KVM: TDX: Handle TDX PV map_gpa hypercall
` [PATCH v12 092/106] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v12 093/106] KVM: TDX: Silently discard SMI request
` [PATCH v12 094/106] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v12 095/106] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v12 096/106] KVM: TDX: Add methods to ignore guest instruction emulation
` [PATCH v12 097/106] KVM: TDX: Add a method to ignore dirty logging
` [PATCH v12 098/106] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v12 099/106] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v12 100/106] KVM: TDX: Ignore setting up mce
` [PATCH v12 101/106] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
` [PATCH v12 102/106] KVM: TDX: Add methods to ignore virtual apic related operation
` [PATCH v12 103/106] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v12 104/106] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v12 105/106] RFC: KVM: TDX: Make busy with S-EPT on entry bug
` [PATCH v12 106/106] [MARKER] the end of (the first phase of) TDX KVM patch series
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).