messages from 2023-11-08 11:21:56 to 2023-11-09 21:03:44 UTC [more...]
[PATCH v6 00/14] Improve KVM + userfaultfd performance via KVM_MEMORY_FAULT_EXITs on stage-2 faults
2023-11-09 21:03 UTC
[PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
2023-11-09 20:13 UTC (5+ messages)
` [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
` KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
[PATCH 0/6] RISC-V: KVM: change get_reg/set_reg error codes
2023-11-09 19:33 UTC (4+ messages)
` [PATCH 1/6] RISC-V: KVM: return ENOENT in *_one_reg() when reg is unknown
RFC: A KVM-specific alternative to UserfaultFD
2023-11-09 19:20 UTC (21+ messages)
[PATCH v3 0/3] s390/vfio-ap: a couple of corrections to the IRQ enablement function
2023-11-09 16:44 UTC (4+ messages)
` [PATCH v3 1/3] s390/vfio-ap: unpin pages on gisc registration failure
` [PATCH v3 2/3] s390/vfio-ap: set status response code to 06 "
` [PATCH v3 3/3] s390/vfio-ap: improve reaction to response code 07 from PQAP(AQIC) command
[PATCH v15 00/23] TDX host kernel support
2023-11-09 16:38 UTC (25+ messages)
` [PATCH v15 01/23] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v15 02/23] x86/tdx: Define TDX supported page sizes as macros
` [PATCH v15 03/23] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
` [PATCH v15 04/23] x86/cpu: Detect TDX partial write machine check erratum
` [PATCH v15 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
` [PATCH v15 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
` [PATCH v15 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
` [PATCH v15 08/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
` [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
` [PATCH v15 10/23] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v15 11/23] x86/virt/tdx: Fill out "
` [PATCH v15 12/23] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v15 13/23] x86/virt/tdx: Designate reserved areas for all TDMRs
` [PATCH v15 14/23] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID
` [PATCH v15 15/23] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v15 16/23] x86/virt/tdx: Initialize all TDMRs
` [PATCH v15 17/23] x86/kexec: Flush cache of TDX private memory
` [PATCH v15 18/23] x86/virt/tdx: Keep TDMRs when module initialization is successful
` [PATCH v15 19/23] x86/virt/tdx: Improve readability of module initialization error handling
` [PATCH v15 20/23] x86/kexec(): Reset TDX private memory on platforms with TDX erratum
` [PATCH v15 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
` [PATCH v15 22/23] x86/mce: Improve error log of kernel space TDX #MC due to erratum
` [PATCH v15 23/23] Documentation/x86: Add documentation for TDX host support
[kvm:guestmemfd 27/48] htmldocs: Documentation/filesystems/api-summary:74: ./fs/anon_inodes.c:167: WARNING: Unexpected indentation
2023-11-09 16:12 UTC
[PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer configurable
2023-11-09 15:55 UTC (8+ messages)
` [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
` KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
[PATCH v7 00/19] KVM: x86/pmu: selftests: Fixes and new tests
2023-11-09 15:23 UTC (29+ messages)
` [PATCH v7 02/19] KVM: x86/pmu: Allow programming events that match unsupported arch events
` [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
` [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
` [PATCH v7 05/19] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
` [PATCH v7 09/19] KVM: selftests: Test Intel PMU architectural events on gp counters
` [PATCH v7 10/19] KVM: selftests: Test Intel PMU architectural events on fixed counters
` [PATCH v7 12/19] KVM: selftests: Test consistency of CPUID with num of "
` [PATCH v7 13/19] KVM: selftests: Add functional test for Intel's fixed PMU counters
` [PATCH v7 14/19] KVM: selftests: Expand PMU counters test to verify LLC events
` [PATCH v7 15/19] KVM: selftests: Add a helper to query if the PMU module param is enabled
` [PATCH v7 19/19] KVM: selftests: Test PMC virtualization with forced emulation
[PATCH v1 00/23] Enable FRED with KVM VMX
2023-11-09 15:15 UTC (29+ messages)
` [PATCH v1 01/23] KVM: VMX: Cleanup VMX basic information defines and usages
` [PATCH v1 02/23] KVM: VMX: Cleanup VMX misc "
` [PATCH v1 03/23] KVM: VMX: Add support for the secondary VM exit controls
` [PATCH v1 04/23] KVM: x86: Mark CR4.FRED as not reserved
` [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
` [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
` [PATCH v1 07/23] KVM: VMX: Disable intercepting FRED MSRs
` [PATCH v1 08/23] KVM: VMX: Initialize VMCS FRED fields
` [PATCH v1 09/23] KVM: VMX: Switch FRED RSP0 between host and guest
` [PATCH v1 10/23] KVM: VMX: Add support for FRED context save/restore
` [PATCH v1 11/23] KVM: x86: Add kvm_is_fred_enabled()
` [PATCH v1 12/23] KVM: VMX: Handle FRED event data
` [PATCH v1 13/23] KVM: VMX: Handle VMX nested exception for FRED
` [PATCH v1 14/23] KVM: VMX: Dump FRED context in dump_vmcs()
` [PATCH v1 15/23] KVM: nVMX: Add support for the secondary VM exit controls
` [PATCH v1 16/23] KVM: nVMX: Add FRED VMCS fields
` [PATCH v1 17/23] KVM: nVMX: Add support for VMX FRED controls
` [PATCH v1 18/23] KVM: nVMX: Add VMCS FRED states checking
` [PATCH v1 19/23] KVM: x86: Allow FRED/LKGS/WRMSRNS to be exposed to guests
` [PATCH v1 20/23] KVM: selftests: Add FRED VMCS fields to evmcs
` [PATCH v1 21/23] KVM: selftests: Run debug_regs test with FRED enabled
` [PATCH v1 22/23] KVM: selftests: Add a new VM guest mode to run user level code
` [PATCH v1 23/23] KVM: selftests: Add fred exception tests
[PULL 00/15] xenfv.for-upstream queue
2023-11-09 14:55 UTC (4+ messages)
` [PULL 06/15] hw/xen: automatically assign device index to block devices
[PATCH v1 1/1] KVM: s390/mm: Properly reset no-dat
2023-11-09 13:11 UTC (3+ messages)
[PATCH v3 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
2023-11-09 12:28 UTC (8+ messages)
` [PATCH v3 1/4] KVM: s390: vsie: Fix STFLE interpretive execution identification
` [PATCH v3 2/4] KVM: s390: vsie: Fix length of facility list shadowed
` [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
` [PATCH v3 4/4] KVM: s390: Minor refactor of base/ext facility lists
[PATCH v7 00/11] KVM: xen: update shared_info and vcpu_info handling
2023-11-09 10:06 UTC (10+ messages)
` [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
[PATCH v14 00/34] KVM: guest_memfd() and per-page attributes
2023-11-09 8:54 UTC (10+ messages)
` [PATCH 09/34] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
` [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
` [PATCH 34/34] KVM: selftests: Add a memory region subtest to validate invalid flags
[RFC 0/7] Add SIOV virtual device support
2023-11-09 8:21 UTC (10+ messages)
` [RFC 4/7] iommufd: Support attach/replace for SIOV virtual device {dev, pasid}
` [RFC 6/7] iommufd/selftest: Add test coverage for SIOV virtual device
` [RFC 7/7] vfio: Add vfio_register_pasid_iommu_dev()
[PATCH v3 0/6] target/i386: add support for FRED
2023-11-09 7:20 UTC (7+ messages)
` [PATCH v3 1/6] target/i386: add support for FRED in CPUID enumeration
` [PATCH v3 2/6] target/i386: mark CR4.FRED not reserved
` [PATCH v3 3/6] target/i386: add the secondary VM exit controls MSR
` [PATCH v3 4/6] target/i386: add support for VMX FRED controls
` [PATCH v3 5/6] target/i386: enumerate VMX nested-exception support
` [PATCH v3 6/6] target/i386: Add get/set/migrate support for FRED MSRs
[PATCH v12 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
2023-11-09 4:27 UTC (10+ messages)
[kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
2023-11-08 20:31 UTC (3+ messages)
[PATCH v2] s390/vfio-ap: fix sysfs status attribute for AP queue devices
2023-11-08 20:21 UTC (2+ messages)
[PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-11-08 19:53 UTC (15+ messages)
` [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
[PATCH] KVM: x86/xen: improve accuracy of Xen timers
2023-11-08 19:14 UTC (10+ messages)
` [PATCH v2] "
[PATCH v5] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
2023-11-08 18:39 UTC (2+ messages)
[RFC 0/33] KVM: x86: hyperv: Introduce VSM support
2023-11-08 18:33 UTC (55+ messages)
` [RFC 01/33] KVM: x86: Decouple lapic.h from hyperv.h
` [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
` [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
` [RFC 05/33] KVM: x86: hyper-v: Introduce VTL call/return prologues in hypercall page
` [RFC 09/33] KVM: x86: hyper-v: Introduce per-VTL vcpu helpers
` [RFC 11/33] KVM: x86: hyper-v: Handle GET/SET_VP_REGISTER hcall in user-space
` [RFC 14/33] KVM: x86: Add VTL to the MMU role
` [RFC 17/33] KVM: x86/mmu: Allow setting memory attributes if VSM enabled
` [RFC 18/33] KVM: x86: Decouple kvm_get_memory_attributes() from struct kvm's mem_attr_array
` [RFC 19/33] KVM: x86: Decouple kvm_range_has_memory_attributes() "
` [RFC 20/33] KVM: x86/mmu: Decouple hugepage_has_attrs() "
` [RFC 21/33] KVM: Pass memory attribute array as a MMU notifier argument
` [RFC 22/33] KVM: Decouple kvm_ioctl_set_mem_attributes() from kvm's mem_attr_array
` [RFC 23/33] KVM: Expose memory attribute helper functions unanimously
` [RFC 24/33] KVM: x86: hyper-v: Introduce KVM VTL device
` [RFC 25/33] KVM: Introduce a set of new memory attributes
` [RFC 26/33] KVM: x86: hyper-vsm: Allow setting per-VTL "
` [RFC 27/33] KVM: x86/mmu/hyper-v: Validate memory faults against per-VTL memprots
` [RFC 28/33] x86/hyper-v: Introduce memory intercept message structure
` [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
` [RFC 30/33] KVM: x86: hyper-v: Introduce KVM_REQ_HV_INJECT_INTERCEPT request
` [RFC 31/33] KVM: x86: hyper-v: Inject intercept on VTL memory protection fault
` [RFC 32/33] KVM: x86: hyper-v: Implement HVCALL_TRANSLATE_VIRTUAL_ADDRESS
` [RFC 33/33] Documentation: KVM: Introduce "Emulating Hyper-V VSM with KVM"
[RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
2023-11-08 16:52 UTC (11+ messages)
[kvm:guestmemfd 59/59] arch/loongarch/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
2023-11-08 16:24 UTC
[PATCH v2 0/2] KVM: selftests: Detect if KVM bugged the VM
2023-11-08 16:07 UTC (4+ messages)
` [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
[PATCH v2 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
2023-11-08 15:52 UTC (5+ messages)
` [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
[PATCH] s390/vfio-ap: fix sysfs status attribute for AP queue devices
2023-11-08 14:44 UTC (4+ messages)
[PATCH v12 00/37] x86: enable FRED for x86-64
2023-11-08 12:36 UTC (3+ messages)
` [PATCH v12 01/37] x86/cpufeatures: Add the cpu feature bit for WRMSRNS
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).