messages from 2023-10-13 23:48:19 to 2023-10-16 16:21:04 UTC [more...]
[PATCH v16 000/116] KVM TDX basic feature support
2023-10-16 16:14 UTC (29+ messages)
` [PATCH v16 040/116] KVM: x86/mmu: Assume guest MMIOs are shared
` [PATCH v16 041/116] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v16 044/116] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v16 045/116] KVM: x86/tdp_mmu: Sprinkle __must_check
` [PATCH v16 046/116] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v16 047/116] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v16 048/116] KVM: x86/mmu: TDX: Do not enable page track for TD guest
` [PATCH v16 049/116] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v16 050/116] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v16 051/116] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v16 052/116] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v16 053/116] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v16 054/116] KVM: TDX: Require TDP MMU and mmio caching for TDX
` [PATCH v16 055/116] KVM: TDX: TDP MMU TDX support
` [PATCH v16 056/116] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v16 057/116] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v16 058/116] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v16 059/116] KVM: TDX: Create initial guest memory
` [PATCH v16 060/116] KVM: TDX: Finalize VM initialization
` [PATCH v16 061/116] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v16 062/116] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v16 064/116] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v16 066/116] KVM: TDX: restore user ret MSRs
` [PATCH v16 069/116] KVM: TDX: complete interrupts after tdexit
` [PATCH v16 073/116] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v16 074/116] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v16 076/116] KVM: TDX: Implement interrupt injection
` [PATCH v16 077/116] KVM: TDX: Implements vcpu request_immediate_exit
[PATCH v3 00/19] IOMMUFD Dirty Tracking
2023-10-16 16:00 UTC (33+ messages)
` [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
` [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
[PATCH RFC 1/1] KVM: x86: add param to update master clock periodically
2023-10-16 15:47 UTC (13+ messages)
[PATCH RFC 00/11] KVM: x86: Make Hyper-V emulation optional (AKA introduce CONFIG_KVM_HYPERV)
2023-10-16 15:43 UTC (15+ messages)
` [PATCH RFC 02/11] KVM: x86: hyper-v: Move Hyper-V partition assist page out of Hyper-V emulation context
` [PATCH RFC 06/11] KVM: VMX: Split off hyperv_evmcs.{ch}
` [PATCH RFC 07/11] KVM: x86: Make Hyper-V emulation optional
` [PATCH RFC 08/11] KVM: nVMX: hyper-v: Introduce nested_vmx_evmptr() accessor
[PATCH v3 0/5] KVM: selftests: Add ID reg test, update headers
2023-10-16 15:30 UTC (3+ messages)
` [PATCH v3 5/5] KVM: arm64: selftests: Test for setting ID register from usersapce
[PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-10-16 15:21 UTC (56+ messages)
` [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
` [PATCH v10 02/50] KVM: SVM: Fix TSC_AUX virtualization setup
` [PATCH v10 03/50] KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests
` [PATCH v10 04/50] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
` [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
` [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
` [PATCH v10 10/50] x86/fault: Report RMP page faults for kernel addresses
` [PATCH v10 11/50] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v10 12/50] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v10 13/50] crypto: ccp: Define the SEV-SNP commands
` [PATCH v10 14/50] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v10 15/50] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v10 16/50] x86/sev: Introduce snp leaked pages list
` [PATCH v10 17/50] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH v10 18/50] crypto: ccp: Handle the legacy SEV command "
` [PATCH v10 19/50] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
` [PATCH v10 21/50] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v10 22/50] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v10 23/50] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v10 24/50] KVM: SEV: Add initial SEV-SNP support
` [PATCH v10 25/50] KVM: SEV: Add KVM_SNP_INIT command
` [PATCH v10 26/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v10 27/50] KVM: Add HVA range operator
` [PATCH v10 28/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v10 29/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v10 30/50] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v10 31/50] KVM: SEV: Add KVM_EXIT_VMGEXIT
` [PATCH v10 32/50] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v10 33/50] KVM: SEV: Add support to handle "
` [PATCH v10 34/50] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
` [PATCH v10 35/50] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v10 36/50] KVM: SEV: Use a VMSA physical address variable for populating VMCB
` [PATCH v10 37/50] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v10 39/50] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v10 40/50] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v10 41/50] KVM: x86: Add gmem hook for determining max NPT mapping level
` [PATCH v10 42/50] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v10 43/50] KVM: SVM: Add module parameter to enable the SEV-SNP
` [PATCH v10 44/50] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
` [PATCH v10 45/50] iommu/amd: Report all cases inhibiting SNP enablement
` [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH v10 47/50] x86/sev: Add KVM commands for per-instance certs
` [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v10 49/50] crypto: ccp: Add debug support for decrypting pages
` [PATCH v10 50/50] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
[PATCH gmem FIXUP] kvm: guestmem: do not use a file system
2023-10-16 15:19 UTC (12+ messages)
[PATCH 0/12] Get Xen PV shim running in qemu
2023-10-16 15:19 UTC (13+ messages)
` [PATCH 01/12] i386/xen: fix per-vCPU upcall vector for Xen emulation
` [PATCH 02/12] hw/xen: select kernel mode for per-vCPU event channel upcall vector
` [PATCH 03/12] include: update Xen public headers to Xen 4.17.2 release
` [PATCH 04/12] i386/xen: advertise XEN_HVM_CPUID_UPCALL_VECTOR in CPUID
` [PATCH 05/12] hw/xen: populate store frontend nodes with XenStore PFN/port
` [PATCH 06/12] hw/xen: add get_frontend_path() method to XenDeviceClass
` [PATCH 07/12] hw/xen: update Xen console to XenDevice model
` [PATCH 08/12] hw/xen: do not repeatedly try to create a failing backend device
` [PATCH 09/12] hw/xen: prevent duplicate device registrations
` [PATCH 10/12] hw/xen: automatically assign device index to console devices
` [PATCH 11/12] hw/xen: automatically assign device index to block devices
` [PATCH 12/12] hw/xen: add support for Xen primary console in emulated mode
[PATCH v17 0/2] add debugfs to migration driver
2023-10-16 15:17 UTC (3+ messages)
` [PATCH v17 1/2] vfio/migration: Add debugfs to live "
[PATCH] KVM: arm64: Do not let a L1 hypervisor access the *32_EL2 sysregs
2023-10-16 15:01 UTC (6+ messages)
[PATCH v2 vfio 0/3] pds/vfio: Fixes for locking bugs
2023-10-16 14:49 UTC (3+ messages)
[PATCH 0/2] vfio/mtty: Add migration support
2023-10-16 14:29 UTC (5+ messages)
` [PATCH 1/2] vfio/mtty: Fix eventfd leak
` [PATCH 2/2] vfio/mtty: Enable migration support
Bug? Incompatible APF for 4.14 guest on 5.10 and later host
2023-10-16 14:18 UTC (3+ messages)
` [RFC PATCH 4.14] KVM: x86: Backport support for interrupt-based APF page-ready delivery in guest
[PATCH v7 00/12] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
2023-10-16 13:35 UTC (8+ messages)
` [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
` [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
[PATCH v2 0/2] KVM: arm64: PMU event filtering fixes
2023-10-16 12:47 UTC (2+ messages)
[PATCH] KVM: x86: hyper-v: Don't auto-enable stimer during deserialization
2023-10-16 12:42 UTC (3+ messages)
[PATCH v2 0/4] x86/paravirt: Get rid of paravirt patching
2023-10-16 12:39 UTC (2+ messages)
` [PATCH v2 1/4] x86/paravirt: move some functions and defines to alternative
[PATCH v2 0/6] iommufd support allocating nested parent domain
2023-10-16 12:04 UTC (4+ messages)
` [PATCH v2 1/6] iommu: Add new iommu op to create domains owned by userspace
[PATCH v4 00/17] iommufd: Add nesting infrastructure
2023-10-16 12:02 UTC (36+ messages)
` [PATCH v4 01/17] iommu: Add hwpt_type with user_data for domain_alloc_user op
` [PATCH v4 02/17] iommu: Add nested domain support
` [PATCH v4 05/17] iommufd: Separate kernel-managed HWPT alloc/destroy/abort functions
` [PATCH v4 07/17] iommufd: Add user-managed hw_pagetable support
` [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
` [PATCH v4 10/17] iommufd: Support IOMMU_HWPT_ALLOC allocation with user data
[PATCH RFC gmem v1 0/8] KVM: gmem hooks/changes needed for x86 (other archs?)
2023-10-16 11:50 UTC (9+ messages)
` [PATCH RFC gmem v1 1/8] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
` [PATCH RFC gmem v1 2/8] KVM: Use AS_INACCESSIBLE when creating guest_memfd inode
` [PATCH RFC gmem v1 3/8] KVM: x86: Add gmem hook for initializing memory
` [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory
` [PATCH RFC gmem v1 5/8] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
` [PATCH RFC gmem v1 6/8] KVM: x86: Add KVM_X86_SNP_VM vm_type
` [PATCH RFC gmem v1 7/8] KVM: x86: Define RMP page fault error bits for #NPF
` [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type
[PATCH kvmtool] virtio: Cancel and join threads when exiting devices
2023-10-16 11:52 UTC (2+ messages)
[PATCH vfio 10/11] vfio/virtio: Expose admin commands over virtio device
2023-10-16 9:53 UTC (13+ messages)
[PATCH v5 00/11] Add Intel VT-d nested translation
2023-10-16 8:30 UTC (5+ messages)
` [PATCH v5 04/11] iommu/vt-d: Add helper to setup pasid "
[PATCH iwl-next v3 00/13] Add E800 live migration driver
2023-10-16 8:26 UTC (5+ messages)
` [PATCH iwl-next v3 13/13] vfio/ice: Implement vfio_pci driver for E800 devices
[RESEND PATCH v2] vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE
2023-10-16 7:18 UTC (2+ messages)
[PATCH v6 0/8] Add printf attribute to kselftest functions
2023-10-16 5:28 UTC (3+ messages)
[RFC PATCH v2 0/7] tun: Introduce virtio-net hashing feature
2023-10-15 17:10 UTC (10+ messages)
` [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
` [RFC PATCH v2 2/7] bpf: Add vnet_hash members to __sk_buff
` [RFC PATCH v2 3/7] skbuff: Introduce SKB_EXT_TUN_VNET_HASH
` [RFC PATCH v2 4/7] virtio_net: Add virtio_net_hdr_v1_hash_from_skb()
` [RFC PATCH v2 5/7] tun: Support BPF_PROG_TYPE_VNET_HASH
` [RFC PATCH v2 6/7] selftests/bpf: Test BPF_PROG_TYPE_VNET_HASH
` [RFC PATCH v2 7/7] vhost_net: Support VIRTIO_NET_F_HASH_REPORT
[PATCH v12 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
2023-10-15 16:30 UTC
[PATCH net-next v4 00/12] vsock/virtio: continue MSG_ZEROCOPY support
2023-10-15 12:30 UTC (2+ messages)
[GIT PULL] KVM: x86: PMU fixes for 6.6
2023-10-15 12:25 UTC (4+ messages)
` [GIT PULL] KVM: x86: Selftests "
[GIT PULL] KVM/arm64 fixes for 6.6, take #2
2023-10-15 12:23 UTC (2+ messages)
[PATCH AUTOSEL 6.5 1/7] x86/reboot: VMCLEAR active VMCSes before emergency reboot
2023-10-15 11:59 UTC (2+ messages)
[kvm-unit-tests PATCH v2 0/1] x86/apic: test_pv_ipi checks cpuid
2023-10-15 11:01 UTC (2+ messages)
` [kvm-unit-tests PATCH v2 1/1] x86/apic: test_pv_ipi checks cpuid before issuing KVM Hypercall
[PATCH] KVM: SVM: Don't intercept IRET when injecting NMI and vNMI is enabled
2023-10-14 14:49 UTC (5+ messages)
[PATCH 0/9] SVM guest shadow stack support
2023-10-14 0:31 UTC (3+ messages)
` [PATCH 6/9] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel
[RFC] KVM: x86: Don't wipe TDP MMU when guest sets %cr4
2023-10-14 0:12 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox