messages from 2023-05-25 15:55:36 to 2023-05-29 04:21:46 UTC [more...]
[PATCH v14 000/113] KVM TDX basic feature support
2023-05-29 4:19 UTC (21+ messages)
` [PATCH v14 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
` [PATCH v14 002/113] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
` [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
` [PATCH v14 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
` [PATCH v14 006/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
` [PATCH v14 007/113] KVM: TDX: Make TDX VM type supported
` [PATCH v14 008/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [PATCH v14 009/113] KVM: TDX: Define "
` [PATCH v14 010/113] KVM: TDX: Add TDX "architectural" error codes
` [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v14 012/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v14 013/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
` [PATCH v14 014/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
` [PATCH v14 015/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [PATCH v14 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [PATCH v14 017/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v14 018/113] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
` [PATCH v14 019/113] KVM: TDX: create/destroy VM structure
` [PATCH v14 020/113] KVM: TDX: initialize VM with TDX specific parameters
[PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
2023-05-29 3:35 UTC (12+ messages)
[PATCH 0/3] Out-of-bounds access in kvm_recalculate_phys_map()
2023-05-28 17:26 UTC (12+ messages)
` [PATCH 1/3] KVM: x86: Fix out-of-bounds "
` [PATCH 2/3] KVM: x86: Simplify APIC ID selection "
` [PATCH 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
2023-05-28 12:44 UTC (6+ messages)
[PATCH v10 0/5] Support writable CPU ID registers from userspace
2023-05-28 11:04 UTC (12+ messages)
` [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
` [PATCH v10 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
` [PATCH v10 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
` [PATCH v10 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
` [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
[PATCH v13 000/113] KVM TDX basic feature support
2023-05-28 8:38 UTC (14+ messages)
` [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
` [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v13 064/113] KVM: TDX: Implement TDX vcpu enter/exit path
[PATCH v2 00/34] Split ptdesc from struct page
2023-05-28 5:47 UTC (21+ messages)
` [PATCH v2 01/34] mm: Add PAGE_TYPE_OP folio functions
` [PATCH v2 02/34] s390: Use _pt_s390_gaddr for gmap address tracking
` [PATCH v2 05/34] mm: add utility functions for ptdesc
` [PATCH v2 13/34] mm: Create ptdesc equivalents for pgtable_{pte,pmd}_page_{ctor,dtor}
[PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
2023-05-28 0:02 UTC (5+ messages)
` [PATCH 2/2] arm64: Notify on pte permission upgrades
[PATCH mm-unstable v2 00/10] mm/kvm: locklessly clear the accessed bit
2023-05-27 20:13 UTC (13+ messages)
` [PATCH mm-unstable v2 01/10] mm/kvm: add mmu_notifier_ops->test_clear_young()
` [PATCH mm-unstable v2 02/10] mm/kvm: use mmu_notifier_ops->test_clear_young()
` [PATCH mm-unstable v2 03/10] kvm/arm64: export stage2_try_set_pte() and macros
` [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
` [PATCH mm-unstable v2 05/10] kvm/arm64: add kvm_arch_test_clear_young()
` [PATCH mm-unstable v2 06/10] kvm/powerpc: make radix page tables RCU safe
` [PATCH mm-unstable v2 07/10] kvm/powerpc: add kvm_arch_test_clear_young()
` [PATCH mm-unstable v2 08/10] kvm/x86: move tdp_mmu_enabled and shadow_accessed_mask
` [PATCH mm-unstable v2 09/10] kvm/x86: add kvm_arch_test_clear_young()
` [PATCH mm-unstable v2 10/10] mm: multi-gen LRU: use mmu_notifier_test_clear_young()
[PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
2023-05-27 17:35 UTC (6+ messages)
` [PATCH 1/4] KVM: arm64: PMU: Introduce a helper to set the guest's PMU
` [PATCH 2/4] KVM: arm64: PMU: Set the default PMU for the guest on vCPU reset
` [PATCH 3/4] KVM: arm64: PMU: Use PMUVer of the guest's PMU for ID_AA64DFR0.PMUVer
` [PATCH 4/4] KVM: arm64: PMU: Don't use the PMUVer of the PMU set for guest
[PATCH v2 00/11] RISCV: Add KVM_GET_REG_LIST API
2023-05-27 4:39 UTC (13+ messages)
` [PATCH v2 09/11] KVM: riscv: selftests: Make check_supported arch specific
` [PATCH v2 10/11] KVM: riscv: selftests: Skip some registers set operation
` [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
[PATCH v3 0/2] KVM: arm64: PMU: Correct the handling of PMUSERENR_EL0
2023-05-27 4:16 UTC (4+ messages)
` [PATCH v3 2/2] KVM: arm64: PMU: Don't overwrite PMUSERENR with vcpu loaded
[GIT PULL] VFIO fix for v6.4-rc4
2023-05-26 23:51 UTC (2+ messages)
[PATCH v2 0/3] KVM: x86: Out-of-bounds access in kvm_recalculate_phys_map()
2023-05-26 23:50 UTC (4+ messages)
` [PATCH v2 1/3] KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is out-of-bounds
` [PATCH v2 2/3] KVM: x86: Retry APIC optimized map recalc if vCPU is added/enabled
` [PATCH v2 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
[PATCH kvmtool 00/21] arm64: Handle PSCI calls in userspace
2023-05-26 22:19 UTC (22+ messages)
` [PATCH kvmtool 01/21] update_headers: Use a list for arch-generic headers
` [PATCH kvmtool 02/21] update_headers: Add missing entries to list of headers to copy
` [PATCH kvmtool 03/21] Copy 64-bit alignment attrtibutes from Linux 6.4-rc1
` [PATCH kvmtool 04/21] Update headers with "
` [PATCH kvmtool 05/21] Import arm-smccc.h from "
` [PATCH kvmtool 06/21] aarch64: Copy cputype.h "
` [PATCH kvmtool 07/21] arm: Stash kvm_vcpu_init for later use
` [PATCH kvmtool 08/21] arm: Add support for resetting a vCPU
` [PATCH kvmtool 09/21] arm: Use KVM_SET_MP_STATE ioctl to power off non-boot vCPUs
` [PATCH kvmtool 10/21] aarch64: Expose ARM64_CORE_REG() for general use
` [PATCH kvmtool 11/21] arm: Generalize execution state specific VM initialization
` [PATCH kvmtool 12/21] Add helpers to pause the VM from vCPU thread
` [PATCH kvmtool 13/21] aarch64: Add support for finding vCPU for given MPIDR
` [PATCH kvmtool 14/21] aarch64: Add skeleton implementation for PSCI
` [PATCH kvmtool 15/21] aarch64: psci: Implement CPU_SUSPEND
` [PATCH kvmtool 16/21] aarch64: psci: Implement CPU_OFF
` [PATCH kvmtool 17/21] aarch64: psci: Implement CPU_ON
` [PATCH kvmtool 18/21] aarch64: psci: Implement AFFINITY_INFO
` [PATCH kvmtool 19/21] aarch64: psci: Implement MIGRATE_INFO_TYPE
` [PATCH kvmtool 20/21] aarch64: psci: Implement SYSTEM_{OFF,RESET}
` [PATCH kvmtool 21/21] aarch64: smccc: Start sending PSCI to userspace
[PATCH v3 0/2] KVM: x86: Report actual nent from KVM_GET_CPUID2
2023-05-26 21:03 UTC (3+ messages)
` [PATCH v3 1/2] KVM: x86: Update number of entries for KVM_GET_CPUID2 on success, not failure
` [PATCH v3 2/2] KVM: selftests: Extend cpuid_test to verify KVM_GET_CPUID2 "nent" updates
Deadlock due to EPT_VIOLATION
2023-05-26 21:02 UTC (5+ messages)
[EXTERNAL][PATCH v2] KVM: x86/xen: Implement hvm_op/HVMOP_flush_tlbs hypercall
2023-05-26 20:32 UTC (3+ messages)
` [PATCH v3] "
[PATCH v2] KVM: x86: Update KVM_GET_CPUID2 to return valid entry count
2023-05-26 20:25 UTC (2+ messages)
[PATCH] KVM: x86/mmu: Add comment on try_cmpxchg64 usage in tdp_mmu_set_spte_atomic
2023-05-26 18:13 UTC (2+ messages)
[ANNOUNCE] KVM Microconference at LPC 2023
2023-05-26 17:08 UTC (5+ messages)
[RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
2023-05-26 16:49 UTC (15+ messages)
` [PATCH v1 6/9] KVM: x86: Add Heki hypervisor support
[PATCH v2 0/6] KVM: x86/mmu: refine memtype related mmu zap
2023-05-26 16:09 UTC (14+ messages)
` [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
[PATCH v2 00/17] KVM: arm64: Allow using VHE in the nVHE hypervisor
2023-05-26 14:33 UTC (18+ messages)
` [PATCH v2 01/17] KVM: arm64: Drop is_kernel_in_hyp_mode() from __invalidate_icache_guest_page()
` [PATCH v2 02/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
` [PATCH v2 03/17] arm64: Turn kaslr_feature_override into a generic SW feature override
` [PATCH v2 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
` [PATCH v2 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
` [PATCH v2 06/17] arm64: Allow EL1 physical timer access when running VHE
` [PATCH v2 07/17] arm64: Use CPACR_EL1 format to set CPTR_EL2 when E2H is set
` [PATCH v2 08/17] KVM: arm64: Remove alternatives from sysreg accessors in VHE hypervisor context
` [PATCH v2 09/17] KVM: arm64: Key use of VHE instructions in nVHE code off ARM64_KVM_HVHE
` [PATCH v2 10/17] KVM: arm64: Force HCR_EL2.E2H when ARM64_KVM_HVHE is set
` [PATCH v2 11/17] KVM: arm64: Disable TTBR1_EL2 when using ARM64_KVM_HVHE
` [PATCH v2 12/17] KVM: arm64: Adjust EL2 stage-1 leaf AP bits when ARM64_KVM_HVHE is set
` [PATCH v2 13/17] KVM: arm64: Rework CPTR_EL2 programming for HVHE configuration
` [PATCH v2 14/17] KVM: arm64: Program the timer traps with VHE layout in hVHE mode
` [PATCH v2 15/17] KVM: arm64: Force HCR_E2H in guest context when ARM64_KVM_HVHE is set
` [PATCH v2 16/17] arm64: Allow arm64_sw.hvhe on command line
` [PATCH v2 17/17] KVM: arm64: Terrible timer hack for M1 with hVHE
[PATCH kernel v5 0/6] KVM: SEV: Enable AMD SEV-ES DebugSwap
2023-05-26 14:39 UTC (7+ messages)
` [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
[RFC PATCH v3 00/17] vsock: MSG_ZEROCOPY flag support
2023-05-26 12:28 UTC (6+ messages)
[PATCH] KVM: Don't kfree(NULL) on kzalloc() failure in kvm_assign_ioeventfd_idx()
2023-05-26 11:39 UTC (2+ messages)
[PATCH v3 00/10] Add Intel VT-d nested translation
2023-05-26 11:25 UTC (16+ messages)
` [PATCH v3 02/10] iommu/vt-d: Extend dmar_domain to support nested domain
` [PATCH v3 04/10] iommu/vt-d: Add helper to setup pasid nested translation
` [PATCH v3 06/10] iommu/vt-d: Set the nested domain to a device
` [PATCH v3 10/10] iommu/vt-d: Disallow nesting on domains with read-only mappings
[PATCH v11 00/23] Add vfio_device cdev for iommufd support
2023-05-26 8:38 UTC (10+ messages)
` [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
[PATCH v3 1/6] update-linux-headers: sync-up header with Linux for KVM AIA support placeholder
2023-05-26 6:25 UTC (3+ messages)
` [PATCH v3 3/6] target/riscv: check the in-kernel irqchip support
` [PATCH v3 4/6] target/riscv: Create an KVM AIA irqchip
[PATCH v2 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
2023-05-26 5:57 UTC (2+ messages)
[PATCH v2 00/17] Add Nested Translation Support for SMMUv3
2023-05-26 5:10 UTC (7+ messages)
[PATCH v6 00/10] Enhance vfio PCI hot reset for vfio cdev device
2023-05-26 2:04 UTC (5+ messages)
` [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
[ANNOUNCE] PUCK Agenda - 2023.05.31 - guest_memfd()
2023-05-25 23:47 UTC
[PATCH 0/2] KVM support for Intel PMU v5 fixed function PMC bitmap
2023-05-25 22:35 UTC (5+ messages)
` [PATCH 1/2] KVM: vmx/pmu: Indicate available fixed function PMCs through a bitmap
[PATCH v4] vfio/pci: Propagate ACPI notifications to user-space via eventfd
2023-05-25 20:40 UTC (2+ messages)
[Bug 217472] New: ACPI _OSC features have different values in Host OS and Guest OS
2023-05-25 20:33 UTC (3+ messages)
` FW: "
[PATCH v2 0/7] KVM: selftests: Add tests for pmu event filter
2023-05-25 18:12 UTC (17+ messages)
` [PATCH v2 1/7] KVM: selftests: Replace int with uint32_t for nevents
` [PATCH v2 2/7] KVM: selftests: Apply create_pmu_event_filter() to fixed ctrs
` [PATCH v2 3/7] KVM: selftests: Test unavailable event filters are rejected
` [PATCH v2 4/7] KVM: x86/pmu: Add documentation for fixed ctr on PMU filter
` [PATCH v2 5/7] KVM: selftests: Check if pmu_event_filter meets expectations on fixed ctrs
` [PATCH v2 6/7] KVM: selftests: Check gp event filters without affecting fixed event filters
` [PATCH v2 7/7] KVM: selftests: Test pmu event filter with incompatible kvm_pmu_event_filter
[PATCH v8 0/6] Linear Address Masking (LAM) KVM Enabling
2023-05-25 15:59 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox