public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2023-11-07 11:09:03 to 2023-11-07 20:20:10 UTC [more...]

[RFC PATCH 00/14] Support multiple KVM modules on the same host
 2023-11-07 20:19 UTC 

RFC: A KVM-specific alternative to UserfaultFD
 2023-11-07 20:04 UTC  (11+ messages)

[PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer configurable
 2023-11-07 20:03 UTC  (6+ messages)
` [PATCH 1/2] KVM: x86: Make the hardcoded APIC bus frequency vm variable
` [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
` KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable

[RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
 2023-11-07 19:48 UTC  (9+ messages)

[PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-11-07 19:19 UTC  (7+ messages)
` [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support

[PATCH v3 2/3] KVM: arm64: selftests: Guarantee interrupts are handled
 2023-11-07 18:45 UTC  (2+ messages)

[kvm-unit-tests PATCH v1 00/10] RFC: Add clang-format and kerneldoc check
 2023-11-07 18:42 UTC  (5+ messages)
` [kvm-unit-tests PATCH v1 02/10] powerpc: properly format non-kernel-doc comments

[PATCH v6 00/25] Enable CET Virtualization
 2023-11-07 18:39 UTC  (25+ messages)
` [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
` [PATCH v6 18/25] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
` [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs

[PATCH 00/14] KVM: x86: Make Hyper-V emulation optional
 2023-11-07 18:26 UTC  (13+ messages)
` [PATCH 02/14] KVM: x86: hyper-v: Move Hyper-V partition assist page out of Hyper-V emulation context
` [PATCH 07/14] KVM: x86: hyper-v: Introduce kvm_hv_nested_transtion_tlb_flush() helper
` [PATCH 08/14] KVM: selftests: Make all Hyper-V tests explicitly dependent on Hyper-V emulation support in KVM
` [PATCH 09/14] KVM: selftests: Fix vmxon_pa == vmcs12_pa == -1ull vmx_set_nested_state_test for !eVMCS case
` [PATCH 10/14] KVM: x86: Make Hyper-V emulation optional
` [PATCH 11/14] KVM: nVMX: hyper-v: Introduce nested_vmx_evmptr12() and nested_vmx_is_evmptr12_valid() helpers

[PATCH] KVM: selftests: Fix MWAIT error message when guest assertion fails
 2023-11-07 18:21 UTC 

[PATCH 0/9] SVM guest shadow stack support
 2023-11-07 18:20 UTC  (12+ messages)
` [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
` [PATCH 6/9] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel

A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
 2023-11-07 18:06 UTC  (10+ messages)

[PATCH v6 00/20] KVM: x86/pmu: selftests: Fixes and new tests
 2023-11-07 17:27 UTC  (5+ messages)
` [PATCH v6 03/20] KVM: x86/pmu: Don't enumerate arch events KVM doesn't support

[PATCH v2 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
 2023-11-07 17:11 UTC  (8+ messages)
` [PATCH v2 1/4] KVM: s390: vsie: Fix STFLE interpretive execution identification
` [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
` [PATCH v2 3/4] KVM: s390: cpu model: Use proper define for facility mask size
` [PATCH v2 4/4] KVM: s390: Minor refactor of base/ext facility lists

[PATCH v17 000/116] KVM TDX basic feature support
 2023-11-07 16:56 UTC  (118+ messages)
` [PATCH v17 001/116] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
` [PATCH v17 002/116] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
` [PATCH v17 003/116] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v17 004/116] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
` [PATCH v17 005/116] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
` [PATCH v17 006/116] KVM: TDX: Add placeholders for TDX VM/vcpu structure
` [PATCH v17 007/116] KVM: TDX: Make TDX VM type supported
` [PATCH v17 008/116] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [PATCH v17 009/116] KVM: TDX: Define "
` [PATCH v17 010/116] KVM: TDX: Add TDX "architectural" error codes
` [PATCH v17 011/116] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v17 012/116] KVM: TDX: Retry SEAMCALL on the lack of entropy error
` [PATCH v17 013/116] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v17 014/116] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
` [PATCH v17 015/116] x86/cpu: Add helper functions to allocate/free TDX private host key id
` [PATCH v17 016/116] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [PATCH v17 017/116] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [PATCH v17 018/116] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v17 019/116] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
` [PATCH v17 020/116] KVM: TDX: create/destroy VM structure
` [PATCH v17 021/116] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v17 022/116] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v17 023/116] KVM: TDX: Refuse to unplug the last cpu on the package
` [PATCH v17 024/116] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [PATCH v17 025/116] KVM: TDX: allocate/free TDX vcpu structure
` [PATCH v17 026/116] KVM: TDX: Do TDX specific vcpu initialization
` [PATCH v17 027/116] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [PATCH v17 028/116] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [PATCH v17 029/116] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
` [PATCH v17 030/116] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [PATCH v17 031/116] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
` [PATCH v17 032/116] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
` [PATCH v17 033/116] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
` [PATCH v17 034/116] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
` [PATCH v17 035/116] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
` [PATCH v17 036/116] KVM: x86/mmu: Disallow fast page fault on private GPA
` [PATCH v17 037/116] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [PATCH v17 038/116] KVM: VMX: Introduce test mode related to EPT violation VE
` [PATCH v17 039/116] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [PATCH v17 040/116] KVM: x86/mmu: Assume guest MMIOs are shared
` [PATCH v17 041/116] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v17 042/116] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v17 043/116] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v17 044/116] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v17 045/116] KVM: x86/tdp_mmu: Sprinkle __must_check
` [PATCH v17 046/116] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v17 047/116] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v17 048/116] KVM: x86/mmu: TDX: Do not enable page track for TD guest
` [PATCH v17 049/116] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v17 050/116] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v17 051/116] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v17 052/116] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v17 053/116] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v17 054/116] KVM: TDX: Require TDP MMU and mmio caching for TDX
` [PATCH v17 055/116] KVM: TDX: TDP MMU TDX support
` [PATCH v17 056/116] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v17 057/116] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v17 058/116] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v17 059/116] KVM: TDX: Create initial guest memory
` [PATCH v17 060/116] KVM: TDX: Finalize VM initialization
` [PATCH v17 061/116] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v17 062/116] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v17 063/116] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v17 064/116] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v17 065/116] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v17 066/116] KVM: TDX: restore user ret MSRs
` [PATCH v17 067/116] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
` [PATCH v17 068/116] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v17 069/116] KVM: TDX: complete interrupts after tdexit
` [PATCH v17 070/116] KVM: TDX: restore debug store when TD exit
` [PATCH v17 071/116] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v17 072/116] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v17 073/116] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v17 074/116] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v17 075/116] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v17 076/116] KVM: TDX: Implement interrupt injection
` [PATCH v17 077/116] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v17 078/116] KVM: TDX: Implement methods to inject NMI
` [PATCH v17 079/116] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v17 080/116] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v17 081/116] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v17 082/116] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v17 083/116] KVM: TDX: Handle vmentry failure for INTEL TD guest
` [PATCH v17 084/116] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v17 085/116] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v17 086/116] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v17 087/116] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
` [PATCH v17 088/116] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v17 089/116] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v17 090/116] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
` [PATCH v17 091/116] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v17 092/116] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v17 093/116] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v17 094/116] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v17 095/116] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v17 096/116] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v17 097/116] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
` [PATCH v17 098/116] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
` [PATCH v17 099/116] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v17 100/116] KVM: TDX: Silently discard SMI request
` [PATCH v17 101/116] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v17 102/116] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v17 103/116] KVM: TDX: Add methods to ignore guest instruction emulation
` [PATCH v17 104/116] KVM: TDX: Add a method to ignore dirty logging
` [PATCH v17 105/116] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v17 106/116] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v17 107/116] KVM: TDX: Ignore setting up mce
` [PATCH v17 108/116] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
` [PATCH v17 109/116] KVM: TDX: Add methods to ignore virtual apic related operation
` [PATCH v17 110/116] KVM: TDX: Inhibit APICv for TDX guest
` [PATCH v17 111/116] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v17 112/116] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v17 113/116] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
` [PATCH v17 114/116] RFC: KVM: x86: Add x86 callback to check cpuid
` [PATCH v17 115/116] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
` [PATCH v17 116/116] [MARKER] the end of (the first phase of) TDX KVM patch series

[kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
 2023-11-07 15:29 UTC  (6+ messages)

[PATCH v6 00/16] KVM TDX: TDP MMU: large page support
 2023-11-07 15:00 UTC  (17+ messages)
` [PATCH v6 01/16] KVM: TDP_MMU: Go to next level if smaller private mapping exists
` [PATCH v6 02/16] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
` [PATCH v6 03/16] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
` [PATCH v6 04/16] KVM: TDX: Pass size to tdx_measure_page()
` [PATCH v6 05/16] KVM: TDX: Pass size to reclaim_page()
` [PATCH v6 06/16] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
` [PATCH v6 07/16] KVM: MMU: Introduce level info in PFERR code
` [PATCH v6 08/16] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
` [PATCH v6 09/16] KVM: TDX: Pass desired page level in err code for page fault handler
` [PATCH v6 10/16] KVM: x86/tdp_mmu: Allocate private page table for large page split
` [PATCH v6 11/16] KVM: x86/tdp_mmu: Split the large page when zap leaf
` [PATCH v6 12/16] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
` [PATCH v6 13/16] KVM: x86/tdp_mmu: Try to merge pages into a large page
` [PATCH v6 14/16] KVM: x86/tdp_mmu: TDX: Implement "
` [PATCH v6 15/16] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
` [PATCH v6 16/16] KVM: TDX: Allow 2MB large page for TD GUEST

[PATCH v14 00/34] KVM: guest_memfd() and per-page attributes
 2023-11-07 14:38 UTC  (7+ messages)
` [PATCH 30/34] KVM: selftests: Add KVM_SET_USER_MEMORY_REGION2 helper
` [PATCH 32/34] KVM: selftests: Add basic selftest for guest_memfd()
` [PATCH 33/34] KVM: selftests: Test KVM exit behavior for private memory/access

[kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
 2023-11-07 13:53 UTC  (4+ messages)
` [kvm-unit-tests PATCH "

[PULL 00/15] xenfv.for-upstream queue
 2023-11-07 13:40 UTC  (2+ messages)

[kvm-unit-tests PATCH v2 0/3] s390x: Align SIE tests to 2GB
 2023-11-07 12:54 UTC  (5+ messages)
` [kvm-unit-tests PATCH v2 2/3] s390x: sie: ensure guests are aligned "
` [kvm-unit-tests PATCH v2 3/3] s390x: mvpg-sie: fix virtual-physical address confusion

[kvm-unit-tests PATCH v8 0/8] s390x: Add support for running guests without MSO/MSL
 2023-11-07 12:48 UTC  (5+ messages)
` [kvm-unit-tests PATCH v8 5/8] s390x: lib: sie: don't reenter SIE on pgm int
` [kvm-unit-tests PATCH v8 7/8] s390x: add a test for SIE without MSO/MSL

[PATCH 1/1] s390/cio: make sch->lock a spinlock (is a pointer)
 2023-11-07 12:39 UTC  (2+ messages)

[PATCH v2 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
 2023-11-07 12:04 UTC  (4+ messages)
` [PATCH v2 1/3] "
` [PATCH v2 2/3] LoongArch: KVM: Allow to access HW timer CSR registers always
` [PATCH v2 3/3] LoongArch: KVM: Remove kvm_acquire_timer before entering guest

[kvmtool PATCH v2 0/6] RISC-V AIA irqchip and Svnapot support
 2023-11-07 11:11 UTC  (3+ messages)

[PATCH kvmtool] virtio: Cancel and join threads when exiting devices
 2023-11-07 11:08 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox