messages from 2023-05-26 21:03:02 to 2023-05-29 14:18:36 UTC [more...]
[PATCH v4 0/6] KVM: arm64: Add support for FEAT_TLBIRANGE
2023-05-29 14:18 UTC (7+ messages)
` [PATCH v4 2/6] KVM: arm64: Implement __kvm_tlb_flush_vmid_range()
` [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
` [PATCH v4 6/6] KVM: arm64: Use TLBI range-based intructions for unmap
[Bug] AMD nested: commit broke VMware
2023-05-29 13:43 UTC (2+ messages)
[PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
2023-05-29 13:39 UTC (7+ messages)
` [PATCH 1/4] KVM: arm64: PMU: Introduce a helper to set the guest's PMU
` [PATCH 2/4] KVM: arm64: PMU: Set the default PMU for the guest on vCPU reset
` [PATCH 3/4] KVM: arm64: PMU: Use PMUVer of the guest's PMU for ID_AA64DFR0.PMUVer
` [PATCH 4/4] KVM: arm64: PMU: Don't use the PMUVer of the PMU set for guest
[PATCH v2 00/11] RISCV: Add KVM_GET_REG_LIST API
2023-05-29 12:20 UTC (11+ messages)
` [PATCH v2 09/11] KVM: riscv: selftests: Make check_supported arch specific
` [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
[PATCH v7 0/1] arm: enable MTE for QEMU + kvm
2023-05-29 10:27 UTC (4+ messages)
[PATCH v6] vfio/cdx: add support for CDX bus
2023-05-29 8:06 UTC (4+ messages)
[PATCH v14 000/113] KVM TDX basic feature support
2023-05-29 4:20 UTC (114+ messages)
` [PATCH v14 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
` [PATCH v14 002/113] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
` [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
` [PATCH v14 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
` [PATCH v14 006/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
` [PATCH v14 007/113] KVM: TDX: Make TDX VM type supported
` [PATCH v14 008/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [PATCH v14 009/113] KVM: TDX: Define "
` [PATCH v14 010/113] KVM: TDX: Add TDX "architectural" error codes
` [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v14 012/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v14 013/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
` [PATCH v14 014/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
` [PATCH v14 015/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [PATCH v14 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [PATCH v14 017/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v14 018/113] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
` [PATCH v14 019/113] KVM: TDX: create/destroy VM structure
` [PATCH v14 020/113] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v14 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v14 022/113] KVM: TDX: Refuse to unplug the last cpu on the package
` [PATCH v14 023/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [PATCH v14 024/113] KVM: TDX: allocate/free TDX vcpu structure
` [PATCH v14 025/113] KVM: TDX: Do TDX specific vcpu initialization
` [PATCH v14 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [PATCH v14 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [PATCH v14 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
` [PATCH v14 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [PATCH v14 030/113] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
` [PATCH v14 031/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
` [PATCH v14 032/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
` [PATCH v14 033/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
` [PATCH v14 034/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
` [PATCH v14 035/113] KVM: x86/mmu: Disallow fast page fault on private GPA
` [PATCH v14 036/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [PATCH v14 037/113] KVM: VMX: Introduce test mode related to EPT violation VE
` [PATCH v14 038/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [PATCH v14 039/113] KVM: x86/mmu: Assume guest MMIOs are shared
` [PATCH v14 040/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v14 041/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v14 042/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v14 043/113] KVM: Add flags to struct kvm_gfn_range
` [PATCH v14 044/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v14 045/113] KVM: x86/tdp_mmu: Sprinkle __must_check
` [PATCH v14 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v14 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v14 048/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest
` [PATCH v14 049/113] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v14 050/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v14 051/113] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v14 052/113] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v14 053/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v14 054/113] KVM: TDX: Require TDP MMU and mmio caching for TDX
` [PATCH v14 055/113] KVM: TDX: TDP MMU TDX support
` [PATCH v14 056/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v14 057/113] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v14 058/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v14 059/113] KVM: TDX: Create initial guest memory
` [PATCH v14 060/113] KVM: TDX: Finalize VM initialization
` [PATCH v14 061/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v14 062/113] KVM: TDX: Add helper assembly function to TDX vcpu
` [PATCH v14 063/113] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v14 064/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v14 065/113] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v14 066/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v14 067/113] KVM: TDX: restore user ret MSRs
` [PATCH v14 068/113] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
` [PATCH v14 069/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v14 070/113] KVM: TDX: complete interrupts after tdexit
` [PATCH v14 071/113] KVM: TDX: restore debug store when TD exit
` [PATCH v14 072/113] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v14 073/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v14 074/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v14 075/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v14 076/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v14 077/113] KVM: TDX: Implement interrupt injection
` [PATCH v14 078/113] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v14 079/113] KVM: TDX: Implement methods to inject NMI
` [PATCH v14 080/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v14 081/113] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v14 082/113] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v14 083/113] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v14 084/113] KVM: TDX: Handle vmentry failure for INTEL TD guest
` [PATCH v14 085/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v14 086/113] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v14 087/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v14 088/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v14 089/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v14 090/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
` [PATCH v14 091/113] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v14 092/113] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v14 093/113] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v14 094/113] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v14 095/113] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v14 096/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v14 097/113] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
` [PATCH v14 098/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v14 099/113] KVM: TDX: Silently discard SMI request
` [PATCH v14 100/113] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v14 101/113] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v14 102/113] KVM: TDX: Add methods to ignore guest instruction emulation
` [PATCH v14 103/113] KVM: TDX: Add a method to ignore dirty logging
` [PATCH v14 104/113] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v14 105/113] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v14 106/113] KVM: TDX: Ignore setting up mce
` [PATCH v14 107/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
` [PATCH v14 108/113] KVM: TDX: Add methods to ignore virtual apic related operation
` [PATCH v14 109/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v14 110/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v14 111/113] RFC: KVM: x86, TDX: Add check for setting CPUID
` [PATCH v14 112/113] RFC: KVM: TDX: Make busy with S-EPT on entry bug
` [PATCH v14 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series
[PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
2023-05-29 3:35 UTC (4+ messages)
[PATCH 0/3] Out-of-bounds access in kvm_recalculate_phys_map()
2023-05-28 17:26 UTC (10+ messages)
` [PATCH 1/3] KVM: x86: Fix out-of-bounds "
` [PATCH 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
2023-05-28 12:44 UTC (5+ messages)
[PATCH v10 0/5] Support writable CPU ID registers from userspace
2023-05-28 11:04 UTC (12+ messages)
` [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
` [PATCH v10 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
` [PATCH v10 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
` [PATCH v10 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
` [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
[PATCH v13 000/113] KVM TDX basic feature support
2023-05-28 8:38 UTC (14+ messages)
` [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
` [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v13 064/113] KVM: TDX: Implement TDX vcpu enter/exit path
[PATCH v2 00/34] Split ptdesc from struct page
2023-05-28 5:47 UTC (9+ messages)
` [PATCH v2 05/34] mm: add utility functions for ptdesc
[PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
2023-05-28 0:02 UTC (5+ messages)
` [PATCH 2/2] arm64: Notify on pte permission upgrades
[PATCH mm-unstable v2 00/10] mm/kvm: locklessly clear the accessed bit
2023-05-27 20:13 UTC (13+ messages)
` [PATCH mm-unstable v2 01/10] mm/kvm: add mmu_notifier_ops->test_clear_young()
` [PATCH mm-unstable v2 02/10] mm/kvm: use mmu_notifier_ops->test_clear_young()
` [PATCH mm-unstable v2 03/10] kvm/arm64: export stage2_try_set_pte() and macros
` [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
` [PATCH mm-unstable v2 05/10] kvm/arm64: add kvm_arch_test_clear_young()
` [PATCH mm-unstable v2 06/10] kvm/powerpc: make radix page tables RCU safe
` [PATCH mm-unstable v2 07/10] kvm/powerpc: add kvm_arch_test_clear_young()
` [PATCH mm-unstable v2 08/10] kvm/x86: move tdp_mmu_enabled and shadow_accessed_mask
` [PATCH mm-unstable v2 09/10] kvm/x86: add kvm_arch_test_clear_young()
` [PATCH mm-unstable v2 10/10] mm: multi-gen LRU: use mmu_notifier_test_clear_young()
[PATCH v3 0/2] KVM: arm64: PMU: Correct the handling of PMUSERENR_EL0
2023-05-27 4:16 UTC (4+ messages)
` [PATCH v3 2/2] KVM: arm64: PMU: Don't overwrite PMUSERENR with vcpu loaded
[GIT PULL] VFIO fix for v6.4-rc4
2023-05-26 23:51 UTC (2+ messages)
[PATCH v2 0/3] KVM: x86: Out-of-bounds access in kvm_recalculate_phys_map()
2023-05-26 23:50 UTC (4+ messages)
` [PATCH v2 1/3] KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is out-of-bounds
` [PATCH v2 2/3] KVM: x86: Retry APIC optimized map recalc if vCPU is added/enabled
` [PATCH v2 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
[PATCH kvmtool 00/21] arm64: Handle PSCI calls in userspace
2023-05-26 22:19 UTC (22+ messages)
` [PATCH kvmtool 01/21] update_headers: Use a list for arch-generic headers
` [PATCH kvmtool 02/21] update_headers: Add missing entries to list of headers to copy
` [PATCH kvmtool 03/21] Copy 64-bit alignment attrtibutes from Linux 6.4-rc1
` [PATCH kvmtool 04/21] Update headers with "
` [PATCH kvmtool 05/21] Import arm-smccc.h from "
` [PATCH kvmtool 06/21] aarch64: Copy cputype.h "
` [PATCH kvmtool 07/21] arm: Stash kvm_vcpu_init for later use
` [PATCH kvmtool 08/21] arm: Add support for resetting a vCPU
` [PATCH kvmtool 09/21] arm: Use KVM_SET_MP_STATE ioctl to power off non-boot vCPUs
` [PATCH kvmtool 10/21] aarch64: Expose ARM64_CORE_REG() for general use
` [PATCH kvmtool 11/21] arm: Generalize execution state specific VM initialization
` [PATCH kvmtool 12/21] Add helpers to pause the VM from vCPU thread
` [PATCH kvmtool 13/21] aarch64: Add support for finding vCPU for given MPIDR
` [PATCH kvmtool 14/21] aarch64: Add skeleton implementation for PSCI
` [PATCH kvmtool 15/21] aarch64: psci: Implement CPU_SUSPEND
` [PATCH kvmtool 16/21] aarch64: psci: Implement CPU_OFF
` [PATCH kvmtool 17/21] aarch64: psci: Implement CPU_ON
` [PATCH kvmtool 18/21] aarch64: psci: Implement AFFINITY_INFO
` [PATCH kvmtool 19/21] aarch64: psci: Implement MIGRATE_INFO_TYPE
` [PATCH kvmtool 20/21] aarch64: psci: Implement SYSTEM_{OFF,RESET}
` [PATCH kvmtool 21/21] aarch64: smccc: Start sending PSCI to userspace
[PATCH v3 0/2] KVM: x86: Report actual nent from KVM_GET_CPUID2
2023-05-26 21:03 UTC (3+ messages)
` [PATCH v3 1/2] KVM: x86: Update number of entries for KVM_GET_CPUID2 on success, not failure
` [PATCH v3 2/2] KVM: selftests: Extend cpuid_test to verify KVM_GET_CPUID2 "nent" updates
Deadlock due to EPT_VIOLATION
2023-05-26 21:02 UTC (5+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).