messages from 2023-11-06 14:35:24 to 2023-11-07 15:01:49 UTC [more...]
[PATCH v17 000/116] KVM TDX basic feature support
2023-11-07 14:56 UTC (64+ messages)
` [PATCH v17 001/116] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
` [PATCH v17 002/116] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
` [PATCH v17 003/116] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v17 004/116] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
` [PATCH v17 005/116] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
` [PATCH v17 006/116] KVM: TDX: Add placeholders for TDX VM/vcpu structure
` [PATCH v17 007/116] KVM: TDX: Make TDX VM type supported
` [PATCH v17 008/116] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [PATCH v17 009/116] KVM: TDX: Define "
` [PATCH v17 010/116] KVM: TDX: Add TDX "architectural" error codes
` [PATCH v17 011/116] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v17 012/116] KVM: TDX: Retry SEAMCALL on the lack of entropy error
` [PATCH v17 013/116] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v17 014/116] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
` [PATCH v17 015/116] x86/cpu: Add helper functions to allocate/free TDX private host key id
` [PATCH v17 016/116] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [PATCH v17 017/116] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [PATCH v17 018/116] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v17 019/116] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
` [PATCH v17 020/116] KVM: TDX: create/destroy VM structure
` [PATCH v17 021/116] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v17 022/116] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v17 023/116] KVM: TDX: Refuse to unplug the last cpu on the package
` [PATCH v17 024/116] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [PATCH v17 025/116] KVM: TDX: allocate/free TDX vcpu structure
` [PATCH v17 026/116] KVM: TDX: Do TDX specific vcpu initialization
` [PATCH v17 027/116] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [PATCH v17 028/116] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [PATCH v17 029/116] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
` [PATCH v17 030/116] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [PATCH v17 031/116] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
` [PATCH v17 032/116] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
` [PATCH v17 033/116] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
` [PATCH v17 034/116] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
` [PATCH v17 035/116] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
` [PATCH v17 036/116] KVM: x86/mmu: Disallow fast page fault on private GPA
` [PATCH v17 037/116] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [PATCH v17 038/116] KVM: VMX: Introduce test mode related to EPT violation VE
` [PATCH v17 039/116] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [PATCH v17 040/116] KVM: x86/mmu: Assume guest MMIOs are shared
` [PATCH v17 041/116] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v17 042/116] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v17 043/116] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v17 044/116] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v17 045/116] KVM: x86/tdp_mmu: Sprinkle __must_check
` [PATCH v17 046/116] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v17 047/116] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v17 048/116] KVM: x86/mmu: TDX: Do not enable page track for TD guest
` [PATCH v17 049/116] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v17 050/116] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v17 051/116] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v17 052/116] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v17 053/116] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v17 054/116] KVM: TDX: Require TDP MMU and mmio caching for TDX
` [PATCH v17 055/116] KVM: TDX: TDP MMU TDX support
` [PATCH v17 056/116] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v17 057/116] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v17 058/116] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v17 060/116] KVM: TDX: Finalize VM initialization
` [PATCH v17 062/116] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v17 063/116] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v17 064/116] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v17 069/116] KVM: TDX: complete interrupts after tdexit
[PATCH v14 00/34] KVM: guest_memfd() and per-page attributes
2023-11-07 14:38 UTC (19+ messages)
` [PATCH 08/34] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
` [PATCH 14/34] fs: Rename anon_inode_getfile_secure() and anon_inode_getfd_secure()
` [PATCH 25/34] KVM: selftests: Add helpers to convert guest memory b/w private and shared
` [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
` [PATCH 30/34] KVM: selftests: Add KVM_SET_USER_MEMORY_REGION2 helper
` [PATCH 32/34] KVM: selftests: Add basic selftest for guest_memfd()
` [PATCH 33/34] KVM: selftests: Test KVM exit behavior for private memory/access
[kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
2023-11-07 14:28 UTC (5+ messages)
RFC: A KVM-specific alternative to UserfaultFD
2023-11-07 14:21 UTC (6+ messages)
[kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
2023-11-07 13:53 UTC (6+ messages)
` [kvm-unit-tests PATCH "
[PULL 00/15] xenfv.for-upstream queue
2023-11-07 13:40 UTC (17+ messages)
` [PULL 01/15] i386/xen: Ignore VCPU_SSHOTTMR_future flag in set_singleshot_timer()
` [PULL 02/15] hw/xen: Clean up event channel 'type_val' handling to use union
` [PULL 03/15] include: update Xen public headers to Xen 4.17.2 release
` [PULL 04/15] i386/xen: advertise XEN_HVM_CPUID_UPCALL_VECTOR in CPUID
` [PULL 05/15] hw/xen: populate store frontend nodes with XenStore PFN/port
` [PULL 06/15] hw/xen: automatically assign device index to block devices
` [PULL 07/15] hw/xen: add get_frontend_path() method to XenDeviceClass
` [PULL 08/15] hw/xen: do not repeatedly try to create a failing backend device
` [PULL 09/15] hw/xen: update Xen console to XenDevice model
` [PULL 10/15] hw/xen: add support for Xen primary console in emulated mode
` [PULL 11/15] hw/xen: only remove peers of PCI NICs on unplug
` [PULL 12/15] hw/xen: update Xen PV NIC to XenDevice model
` [PULL 13/15] hw/i386/pc: support '-nic' for xen-net-device
` [PULL 14/15] xen-platform: unplug AHCI disks
` [PULL 15/15] docs: update Xen-on-KVM documentation
[kvm-unit-tests PATCH v2 0/3] s390x: Align SIE tests to 2GB
2023-11-07 12:54 UTC (6+ messages)
` [kvm-unit-tests PATCH v2 1/3] s390x: spec_ex-sie: refactor to use snippet API
` [kvm-unit-tests PATCH v2 2/3] s390x: sie: ensure guests are aligned to 2GB
` [kvm-unit-tests PATCH v2 3/3] s390x: mvpg-sie: fix virtual-physical address confusion
[kvm-unit-tests PATCH v8 0/8] s390x: Add support for running guests without MSO/MSL
2023-11-07 12:48 UTC (12+ messages)
` [kvm-unit-tests PATCH v8 1/8] lib: s390x: introduce bitfield for PSW mask
` [kvm-unit-tests PATCH v8 2/8] s390x: add function to set DAT mode for all interrupts
` [kvm-unit-tests PATCH v8 3/8] s390x: sie: switch to home space mode before entering SIE
` [kvm-unit-tests PATCH v8 4/8] s390x: lib: don't forward PSW when handling exception in SIE
` [kvm-unit-tests PATCH v8 5/8] s390x: lib: sie: don't reenter SIE on pgm int
` [kvm-unit-tests PATCH v8 6/8] s390x: add test source dir to include paths
` [kvm-unit-tests PATCH v8 7/8] s390x: add a test for SIE without MSO/MSL
` [kvm-unit-tests PATCH v8 8/8] lib: s390x: interrupt: remove TEID_ASCE defines
[PATCH 1/1] s390/cio: make sch->lock a spinlock (is a pointer)
2023-11-07 12:39 UTC (2+ messages)
[PATCH v2 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
2023-11-07 12:31 UTC (5+ messages)
` [PATCH v2 1/4] KVM: s390: vsie: Fix STFLE interpretive execution identification
` [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
` [PATCH v2 3/4] KVM: s390: cpu model: Use proper define for facility mask size
` [PATCH v2 4/4] KVM: s390: Minor refactor of base/ext facility lists
[PATCH v2 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
2023-11-07 12:04 UTC (4+ messages)
` [PATCH v2 1/3] "
` [PATCH v2 2/3] LoongArch: KVM: Allow to access HW timer CSR registers always
` [PATCH v2 3/3] LoongArch: KVM: Remove kvm_acquire_timer before entering guest
[kvmtool PATCH v2 0/6] RISC-V AIA irqchip and Svnapot support
2023-11-07 11:11 UTC (3+ messages)
[PATCH kvmtool] virtio: Cancel and join threads when exiting devices
2023-11-07 11:08 UTC (3+ messages)
[PATCH v6 00/20] KVM: x86/pmu: selftests: Fixes and new tests
2023-11-07 10:51 UTC (26+ messages)
` [PATCH v6 01/20] KVM: x86/pmu: Don't allow exposing unsupported architectural events
` [PATCH v6 02/20] KVM: x86/pmu: Don't enumerate support for fixed counters KVM can't virtualize
` [PATCH v6 03/20] KVM: x86/pmu: Don't enumerate arch events KVM doesn't support
` [PATCH v6 05/20] KVM: x86/pmu: Allow programming events that match unsupported arch events
` [PATCH v6 06/20] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
` [PATCH v6 08/20] KVM: selftests: Extend {kvm,this}_pmu_has() to support fixed counters
` [PATCH v6 09/20] KVM: selftests: Add pmu.h and lib/pmu.c for common PMU assets
` [PATCH v6 11/20] KVM: selftests: Test Intel PMU architectural events on fixed counters
A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
2023-11-07 9:26 UTC (9+ messages)
[PATCH v4 00/17] Get Xen PV shim running in QEMU, add net and console
2023-11-07 9:26 UTC (23+ messages)
` [PATCH v4 02/17] hw/xen: Clean up event channel 'type_val' handling to use union
` [PATCH v4 03/17] include: update Xen public headers to Xen 4.17.2 release
` [PATCH v4 04/17] i386/xen: advertise XEN_HVM_CPUID_UPCALL_VECTOR in CPUID
` [PATCH v4 05/17] hw/xen: populate store frontend nodes with XenStore PFN/port
` [PATCH v4 06/17] hw/xen: automatically assign device index to block devices
` [PATCH v4 07/17] hw/xen: add get_frontend_path() method to XenDeviceClass
` [PATCH v4 08/17] hw/xen: do not repeatedly try to create a failing backend device
` [PATCH v4 09/17] hw/xen: update Xen console to XenDevice model
` [PATCH v4 10/17] hw/xen: add support for Xen primary console in emulated mode
` [PATCH v4 11/17] hw/xen: only remove peers of PCI NICs on unplug
` [PATCH v4 12/17] hw/xen: update Xen PV NIC to XenDevice model
` [PATCH v4 13/17] hw/i386/pc: support '-nic' for xen-net-device
` [PATCH v4 14/17] net: do not delete nics in net_cleanup()
` [PATCH v4 15/17] xen-platform: unplug AHCI disks
` [PATCH v4 16/17] doc/sphinx/hxtool.py: add optional label argument to SRST directive
` [PATCH v4 17/17] docs: update Xen-on-KVM documentation
[kvm-unit-tests PATCH v2 0/3] s390x: Improve console handling
2023-11-07 9:05 UTC (2+ messages)
[kvm-unit-tests PATCH v3 00/10] s390x: topology: Fixes and extension
2023-11-07 9:04 UTC (2+ messages)
[kvm-unit-tests RFC PATCH 00/19] arm/arm64: Rework cache maintenance at boot
2023-11-07 9:01 UTC (4+ messages)
[PULL 00/60] Misc HW/UI patches for 2023-11-06
2023-11-07 8:51 UTC (3+ messages)
[kvm-unit-tests PATCH v1 00/10] RFC: Add clang-format and kerneldoc check
2023-11-07 8:37 UTC (7+ messages)
` [kvm-unit-tests PATCH v1 02/10] powerpc: properly format non-kernel-doc comments
` [kvm-unit-tests PATCH v1 04/10] s390x: "
[RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
2023-11-07 8:29 UTC (8+ messages)
[PATCH] KVM: x86/xen: improve accuracy of Xen timers
2023-11-07 8:17 UTC (4+ messages)
` [PATCH v2] "
[PATCH] s390/vfio-ap: fix sysfs status attribute for AP queue devices
2023-11-07 8:07 UTC (4+ messages)
[PATCH v2 0/5] riscv: cleanup assembly usage of ENTRY()/END() and use local labels
2023-11-07 6:50 UTC (2+ messages)
[PATCH v3 0/5] KVM: selftests: Add ID reg test, update headers
2023-11-07 6:10 UTC (5+ messages)
` [PATCH v3 2/5] perf build: Generate arm64's sysreg-defs.h and add to include path
[PULL 0/7] xenfv-stable queue
2023-11-07 3:01 UTC (2+ messages)
[PATCH] x86/mm: Guard adding .bbs..decrypted section with CONFIG_AMD_MEM_ENCRYPT
2023-11-06 22:16 UTC (2+ messages)
` [PATCH v2] "
[PATCH V11 00/17] riscv: Add Native/Paravirt qspinlock support
2023-11-06 20:42 UTC (2+ messages)
[PATCH v2 5/5] riscv: kvm: use ".L" local labels in assembly when applicable
2023-11-06 17:47 UTC (2+ messages)
[PATCH v2 4/5] riscv: kvm: Use SYM_*() assembly macros instead of deprecated ones
2023-11-06 17:47 UTC (2+ messages)
[PATCH 0/9] SVM guest shadow stack support
2023-11-06 16:45 UTC (7+ messages)
` [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
[kvm-unit-tests PATCH v7 0/8] s390x: Add support for running guests without MSO/MSL
2023-11-06 16:36 UTC (7+ messages)
` [kvm-unit-tests PATCH v7 5/8] s390x: lib: sie: don't reenter SIE on pgm int
` [kvm-unit-tests PATCH v7 7/8] s390x: add a test for SIE without MSO/MSL
[PATCH v13 00/35] KVM: guest_memfd() and per-page attributes
2023-11-06 15:56 UTC (9+ messages)
` [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
` [PATCH v13 20/35] KVM: x86/mmu: Handle page fault for private memory
[PATCH] Add class property to configure KVM device node to use
2023-11-06 15:35 UTC (5+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox