messages from 2023-10-16 16:30:56 to 2023-10-17 10:17:45 UTC [more...]
[PATCH v14 00/23] TDX host kernel support
2023-10-17 10:14 UTC (14+ messages)
` [PATCH v14 01/23] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v14 02/23] x86/tdx: Define TDX supported page sizes as macros
` [PATCH v14 03/23] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
` [PATCH v14 04/23] x86/cpu: Detect TDX partial write machine check erratum
` [PATCH v14 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
` [PATCH v14 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
` [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
` [PATCH v14 08/23] x86/virt/tdx: Get information about TDX module and TDX-capable memory
` [PATCH v14 09/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
` [PATCH v14 11/23] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
` [PATCH v14 12/23] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v14 13/23] x86/virt/tdx: Designate reserved areas for all TDMRs
` [PATCH v14 14/23] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID
[PATCH v3 00/19] IOMMUFD Dirty Tracking
2023-10-17 9:54 UTC (33+ messages)
` [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
` [PATCH v3 16/19] iommu/amd: Add domain_alloc_user based domain allocation
` [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
` [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
` [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
[PATCH] KVM: x86: Clean up included but non-essential header declarations
2023-10-17 9:33 UTC
[PATCH v4 00/17] iommufd: Add nesting infrastructure
2023-10-17 9:28 UTC (29+ messages)
` [PATCH v4 01/17] iommu: Add hwpt_type with user_data for domain_alloc_user op
` [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
` [PATCH v4 10/17] iommufd: Support IOMMU_HWPT_ALLOC allocation with user data
[PATCH v7 00/12] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
2023-10-17 9:23 UTC (25+ messages)
` [PATCH v7 01/12] KVM: arm64: PMU: Introduce helpers to set the guest's PMU
` [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
` [PATCH v7 04/12] KVM: arm64: PMU: Don't define the sysreg reset() for PM{USERENR,CCFILTR}_EL0
` [PATCH v7 05/12] KVM: arm64: PMU: Add a helper to read a vCPU's PMCR_EL0
` [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
` [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
[RFC PATCH v1 00/10] mm/prmem: Implement the Persistent-Across-Kexec memory feature (prmem)
2023-10-17 8:31 UTC
[PATCH v3 0/5] KVM: selftests: Add ID reg test, update headers
2023-10-17 8:03 UTC (4+ messages)
` [PATCH v3 5/5] KVM: arm64: selftests: Test for setting ID register from usersapce
[PATCH v2 0/5] KVM: arm64: Load stage-2 in vcpu_load() on VHE
2023-10-17 7:58 UTC (2+ messages)
[PATCH] KVM: arm64: Move VTCR_EL2 into struct s2_mmu
2023-10-17 7:58 UTC (2+ messages)
[PATCH v2 0/6] iommufd support allocating nested parent domain
2023-10-17 3:46 UTC (8+ messages)
` [PATCH v2 1/6] iommu: Add new iommu op to create domains owned by userspace
` [PATCH v2 2/6] iommufd/hw_pagetable: Use domain_alloc_user op for domain allocation
[RFC PATCH 00/12] iommu/vt-d: Remove superfluous IOMMU IOTLB invalidations
2023-10-17 3:20 UTC (14+ messages)
` [RFC PATCH 01/12] iommu/vt-d: Retire the treatment for revoking PASIDs with pending pgfaults
` [RFC PATCH 02/12] iommu/vt-d: Remove initialization for dynamically heap-allocated rcu_head
` [RFC PATCH 03/12] iommu/vt-d: Retire intel_svm_bind_mm()
` [RFC PATCH 04/12] iommu/vt-d: Make dev_to_intel_iommu() helper global
` [RFC PATCH 05/12] iommu/vt-d: Retire struct intel_svm_dev
` [RFC PATCH 06/12] iommu: Add mmu_notifier to sva domain
` [RFC PATCH 07/12] iommu/vt-d: Retire struct intel_svm
` [RFC PATCH 08/12] iommu/vt-d: Use RCU for dev_pasids list updates in set/remove_dev_pasid()
` [RFC PATCH 09/12] iommu/vt-d: Refactor intel_iommu_set_dev_pasid()
` [RFC PATCH 10/12] iommu/vt-d: Refactor intel_iommu_remove_dev_pasid()
` [RFC PATCH 11/12] iommu/vt-d: Use intel_iommu_set_dev_pasid() for sva domain
` [RFC PATCH 12/12] iommu/vt-d: Remove superfluous IOMMU IOTLB invalidations
[RFC PATCH v2 0/7] tun: Introduce virtio-net hashing feature
2023-10-17 2:38 UTC (7+ messages)
` [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
[GIT PULL] KVM fixes for Linux 6.6-rc7
2023-10-17 1:57 UTC (2+ messages)
[PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-10-16 23:18 UTC (5+ messages)
` [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
[PATCH v2 0/2] vfio/mtty: Add migration support
2023-10-16 22:47 UTC (3+ messages)
` [PATCH v2 1/2] vfio/mtty: Overhaul mtty interrupt handling
` [PATCH v2 2/2] vfio/mtty: Enable migration support
[PATCH RFC 1/1] KVM: x86: add param to update master clock periodically
2023-10-16 22:48 UTC (18+ messages)
[PATCH] KVM: x86/mmu: Stop kicking vCPUs to sync the dirty log when PML is disabled
2023-10-16 22:12 UTC
Bug? Incompatible APF for 4.14 guest on 5.10 and later host
2023-10-16 21:57 UTC (4+ messages)
` [RFC PATCH 4.14] KVM: x86: Backport support for interrupt-based APF page-ready delivery in guest
[PATCH 0/2] vfio/mtty: Add migration support
2023-10-16 20:16 UTC (4+ messages)
` [PATCH 1/2] vfio/mtty: Fix eventfd leak
[PATCH v5 00/17] Improve KVM + userfaultfd live migration via annotated memory faults
2023-10-16 19:38 UTC (10+ messages)
` [PATCH v5 04/17] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
` [PATCH v5 09/17] KVM: Introduce KVM_CAP_USERFAULT_ON_MISSING without implementation
[PATCH gmem] KVM: selftests: Fix gmem conversion tests for multiple vCPUs
2023-10-16 18:47 UTC
[kvm-unit-tests PATCH 0/3] migration: fixes and multiple migration
2023-10-16 18:32 UTC (6+ messages)
` [kvm-unit-tests PATCH 2/3] migration: Fix test harness hang if source does not reach migration point
[RFC PATCH V2 00/18] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
2023-10-16 17:48 UTC (4+ messages)
` [RFC PATCH V2 14/18] vfio/pci: Add core IMS support
[PATCH v2] KVM: x86: hyper-v: Don't auto-enable stimer during deserialization
2023-10-16 16:56 UTC
[PATCH] KVM: x86: hyper-v: Don't auto-enable stimer during deserialization
2023-10-16 17:04 UTC (5+ messages)
[PATCH RFC 00/11] KVM: x86: Make Hyper-V emulation optional (AKA introduce CONFIG_KVM_HYPERV)
2023-10-16 16:55 UTC (11+ messages)
` [PATCH RFC 07/11] KVM: x86: Make Hyper-V emulation optional
` [PATCH RFC 08/11] KVM: nVMX: hyper-v: Introduce nested_vmx_evmptr() accessor
[PATCH v16 000/116] KVM TDX basic feature support
2023-10-16 16:15 UTC (83+ messages)
` [PATCH v16 001/116] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
` [PATCH v16 002/116] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
` [PATCH v16 003/116] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v16 005/116] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
` [PATCH v16 006/116] KVM: TDX: Add placeholders for TDX VM/vcpu structure
` [PATCH v16 007/116] KVM: TDX: Make TDX VM type supported
` [PATCH v16 008/116] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [PATCH v16 009/116] KVM: TDX: Define "
` [PATCH v16 010/116] KVM: TDX: Add TDX "architectural" error codes
` [PATCH v16 011/116] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v16 012/116] KVM: TDX: Retry SEAMCALL on the lack of entropy error
` [PATCH v16 013/116] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v16 014/116] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
` [PATCH v16 015/116] x86/cpu: Add helper functions to allocate/free TDX private host key id
` [PATCH v16 016/116] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [PATCH v16 017/116] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [PATCH v16 018/116] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v16 019/116] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
` [PATCH v16 020/116] KVM: TDX: create/destroy VM structure
` [PATCH v16 021/116] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v16 022/116] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v16 023/116] KVM: TDX: Refuse to unplug the last cpu on the package
` [PATCH v16 024/116] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [PATCH v16 025/116] KVM: TDX: allocate/free TDX vcpu structure
` [PATCH v16 026/116] KVM: TDX: Do TDX specific vcpu initialization
` [PATCH v16 027/116] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [PATCH v16 028/116] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [PATCH v16 029/116] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
` [PATCH v16 030/116] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [PATCH v16 031/116] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
` [PATCH v16 032/116] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
` [PATCH v16 033/116] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
` [PATCH v16 034/116] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
` [PATCH v16 035/116] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
` [PATCH v16 036/116] KVM: x86/mmu: Disallow fast page fault on private GPA
` [PATCH v16 037/116] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [PATCH v16 038/116] KVM: VMX: Introduce test mode related to EPT violation VE
` [PATCH v16 039/116] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [PATCH v16 042/116] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v16 043/116] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v16 063/116] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v16 067/116] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
` [PATCH v16 075/116] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v16 078/116] KVM: TDX: Implement methods to inject NMI
` [PATCH v16 079/116] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v16 080/116] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v16 081/116] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v16 082/116] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v16 083/116] KVM: TDX: Handle vmentry failure for INTEL TD guest
` [PATCH v16 084/116] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v16 085/116] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v16 086/116] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v16 087/116] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
` [PATCH v16 088/116] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v16 089/116] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v16 090/116] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
` [PATCH v16 091/116] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v16 092/116] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v16 093/116] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v16 094/116] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v16 095/116] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v16 096/116] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v16 097/116] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
` [PATCH v16 098/116] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
` [PATCH v16 099/116] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v16 100/116] KVM: TDX: Silently discard SMI request
` [PATCH v16 101/116] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v16 102/116] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v16 103/116] KVM: TDX: Add methods to ignore guest instruction emulation
` [PATCH v16 104/116] KVM: TDX: Add a method to ignore dirty logging
` [PATCH v16 105/116] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v16 106/116] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v16 107/116] KVM: TDX: Ignore setting up mce
` [PATCH v16 108/116] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
` [PATCH v16 109/116] KVM: TDX: Add methods to ignore virtual apic related operation
` [PATCH v16 110/116] KVM: TDX: Inhibit APICv for TDX guest
` [PATCH v16 111/116] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v16 112/116] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v16 113/116] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
` [PATCH v16 114/116] RFC: KVM: x86: Add x86 callback to check cpuid
` [PATCH v16 115/116] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
` [PATCH v16 116/116] [MARKER] the end of (the first phase of) TDX KVM patch series
[PATCH iwl-next v3 00/13] Add E800 live migration driver
2023-10-16 16:51 UTC (2+ messages)
[RFC PATCH v5 00/16] KVM TDX: TDP MMU: large page support
2023-10-16 16:21 UTC (17+ messages)
` [RFC PATCH v5 01/16] KVM: TDP_MMU: Go to next level if smaller private mapping exists
` [RFC PATCH v5 02/16] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
` [RFC PATCH v5 03/16] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
` [RFC PATCH v5 04/16] KVM: TDX: Pass size to tdx_measure_page()
` [RFC PATCH v5 05/16] KVM: TDX: Pass size to reclaim_page()
` [RFC PATCH v5 06/16] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
` [RFC PATCH v5 07/16] KVM: MMU: Introduce level info in PFERR code
` [RFC PATCH v5 08/16] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
` [RFC PATCH v5 09/16] KVM: TDX: Pass desired page level in err code for page fault handler
` [RFC PATCH v5 10/16] KVM: x86/tdp_mmu: Allocate private page table for large page split
` [RFC PATCH v5 11/16] KVM: x86/tdp_mmu: Split the large page when zap leaf
` [RFC PATCH v5 12/16] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
` [RFC PATCH v5 13/16] KVM: x86/tdp_mmu: Try to merge pages into a large page
` [RFC PATCH v5 14/16] KVM: x86/tdp_mmu: TDX: Implement "
` [RFC PATCH v5 15/16] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
` [RFC PATCH v5 16/16] KVM: TDX: Allow 2MB large page for TD GUEST
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox