kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-12-25 12:59:03 to 2023-12-30 17:36:16 UTC [more...]

[PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-12-30 17:23 UTC  (35+ messages)
` [PATCH v11 01/35] KVM: Add hugepage support for dedicated guest memory
` [PATCH v11 02/35] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
` [PATCH v11 03/35] KVM: Use AS_INACCESSIBLE when creating guest_memfd inode
` [PATCH v11 04/35] KVM: x86: Add gmem hook for initializing memory
` [PATCH v11 05/35] KVM: x86: Add gmem hook for invalidating memory
` [PATCH v11 06/35] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
` [PATCH v11 07/35] KVM: x86: Add KVM_X86_SNP_VM vm_type
` [PATCH v11 09/35] KVM: x86: Determine shared/private faults based on vm_type
` [PATCH v11 10/35] KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests
` [PATCH v11 11/35] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
` [PATCH v11 12/35] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v11 13/35] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v11 14/35] KVM: SEV: Add initial SEV-SNP support
` [PATCH v11 15/35] KVM: SEV: Add KVM_SNP_INIT command
` [PATCH v11 16/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v11 17/35] KVM: Add HVA range operator
` [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v11 19/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v11 20/35] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v11 21/35] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v11 22/35] KVM: SEV: Add support to handle "
` [PATCH v11 23/35] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
` [PATCH v11 24/35] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v11 25/35] KVM: SEV: Use a VMSA physical address variable for populating VMCB
` [PATCH v11 26/35] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v11 27/35] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v11 28/35] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v11 29/35] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v11 30/35] KVM: x86: Add gmem hook for determining max NPT mapping level
` [PATCH v11 31/35] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v11 32/35] KVM: SVM: Add module parameter to enable the SEV-SNP
` [PATCH v11 33/35] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v11 34/35] crypto: ccp: Add the SNP_SET_CONFIG_{START,END} commands
` [PATCH v11 35/35] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event

[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2023-12-30 16:19 UTC  (27+ messages)
` [PATCH v1 01/26] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v1 02/26] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
` [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v1 05/26] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
` [PATCH v1 06/26] x86/sev: Add RMP entry lookup helpers
` [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
` [PATCH v1 08/26] x86/traps: Define RMP violation #PF error code
` [PATCH v1 09/26] x86/fault: Dump RMP table information when RMP page faults occur
` [PATCH v1 10/26] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
` [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
` [PATCH v1 16/26] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data "
` [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands "
` [PATCH v1 19/26] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
` [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages
` [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v1 23/26] x86/cpufeatures: Enable/unmask SEV-SNP CPU feature
` [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v1 25/26] crypto: ccp: Add the SNP_COMMIT command
` [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command

[PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-12-29 21:41 UTC  (9+ messages)
` [PATCH v10 18/50] crypto: ccp: Handle the legacy SEV command when SNP is enabled
` [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y

[v2 00/10] RISC-V SBI v2.0 PMU improvements and Perf sampling in KVM guest
 2023-12-30  8:10 UTC  (18+ messages)
` [v2 01/10] RISC-V: Fix the typo in Scountovf CSR name
` [v2 02/10] RISC-V: Add FIRMWARE_READ_HI definition
` [v2 03/10] drivers/perf: riscv: Read upper bits of a firmware counter
` [v2 04/10] RISC-V: Add SBI PMU snapshot definitions
` [v2 05/10] drivers/perf: riscv: Implement SBI PMU snapshot function
` [v2 06/10] RISC-V: KVM: No need to update the counter value during reset
` [v2 07/10] RISC-V: KVM: No need to exit to the user space if perf event failed
` [v2 08/10] RISC-V: KVM: Implement SBI PMU Snapshot feature
` [v2 09/10] RISC-V: KVM: Add perf sampling support for guests
` [v2 10/10] RISC-V: KVM: Support 64 bit firmware counters on RV32

About patch bdedff263132 - KVM: x86: Route pending NMIs
 2023-12-29 17:58 UTC  (3+ messages)
      ` Fwd: "

[PATCH v9 00/10] Add iommufd nesting (part 2/2)
 2023-12-29 14:50 UTC  (16+ messages)
` [PATCH v9 01/10] iommu: Add cache_invalidate_user op
` [PATCH v9 02/10] iommufd: Add IOMMU_HWPT_INVALIDATE
` [PATCH v9 03/10] iommu: Add iommu_copy_struct_from_user_array helper
` [PATCH v9 04/10] iommufd/selftest: Add mock_domain_cache_invalidate_user support
` [PATCH v9 05/10] iommufd/selftest: Add IOMMU_TEST_OP_MD_CHECK_IOTLB test op
` [PATCH v9 06/10] iommufd/selftest: Add coverage for IOMMU_HWPT_INVALIDATE ioctl
` [PATCH v9 07/10] iommu/vt-d: Allow qi_submit_sync() to return the QI faults
` [PATCH v9 08/10] iommu/vt-d: Convert stage-1 cache invalidation to return QI fault
` [PATCH v9 09/10] iommufd: Add data structure for Intel VT-d stage-1 cache invalidation
` [PATCH v9 10/10] iommu/vt-d: Add iotlb flush for nested domain

[PATCH v3 0/4] KVM: X86: Make bus clock frequency for vapic timer configurable
 2023-12-29  4:41 UTC  (6+ messages)
` [PATCH v3 1/4] KVM: x86/hyperv: Calculate APIC bus frequency for hyper-v
` [PATCH v3 3/4] KVM: X86: Add a capability to configure bus frequency for APIC timer

[PATCH v3 00/70] QEMU Guest memfd + QEMU TDX support
 2023-12-29  2:30 UTC  (4+ messages)
` [PATCH v3 52/70] i386/tdx: handle TDG.VP.VMCALL<GetQuote>

[PATCH] KVM: VMX: Report up-to-date exit qualification to userspace
 2023-12-29  2:26 UTC 

[v1 05/10] drivers/perf: riscv: Implement SBI PMU snapshot function
 2023-12-29  1:44 UTC  (2+ messages)

[v1 04/10] RISC-V: Add SBI PMU snapshot definitions
 2023-12-29  1:44 UTC  (2+ messages)

[v1 03/10] drivers/perf: riscv: Read upper bits of a firmware counter
 2023-12-29  1:44 UTC  (2+ messages)

[PATCH] LoongArch: KVM: Add cpucfg area for kvm hypervisor
 2023-12-28 12:21 UTC 

[PATCH v8 00/10] Add iommufd nesting (part 2/2)
 2023-12-28  8:42 UTC  (24+ messages)
` [PATCH v8 01/10] iommu: Add cache_invalidate_user op
` [PATCH v8 02/10] iommufd: Add IOMMU_HWPT_INVALIDATE
` [PATCH v8 03/10] iommu: Add iommu_copy_struct_from_user_array helper
` [PATCH v8 04/10] iommufd/selftest: Add mock_domain_cache_invalidate_user support
` [PATCH v8 05/10] iommufd/selftest: Add IOMMU_TEST_OP_MD_CHECK_IOTLB test op
` [PATCH v8 06/10] iommufd/selftest: Add coverage for IOMMU_HWPT_INVALIDATE ioctl
` [PATCH v8 07/10] iommu/vt-d: Allow qi_submit_sync() to return the QI faults
` [PATCH v8 08/10] iommu/vt-d: Convert stage-1 cache invalidation to return QI fault
` [PATCH v8 09/10] iommufd: Add data structure for Intel VT-d stage-1 cache invalidation
` [PATCH v8 10/10] iommu/vt-d: Add iotlb flush for nested domain

[PATCH v7 0/9] Add iommufd nesting (part 2/2)
 2023-12-28  5:39 UTC  (40+ messages)
` [PATCH v7 1/9] iommu: Add cache_invalidate_user op
` [PATCH v7 2/9] iommufd: Add IOMMU_HWPT_INVALIDATE
` [PATCH v7 4/9] iommufd/selftest: Add mock_domain_cache_invalidate_user support
` [PATCH v7 6/9] iommufd/selftest: Add coverage for IOMMU_HWPT_INVALIDATE ioctl
` [PATCH v7 7/9] iommu/vt-d: Allow qi_submit_sync() to return the QI faults
` [PATCH v7 8/9] iommu/vt-d: Convert pasid based cache invalidation to return QI fault
` [PATCH v7 9/9] iommu/vt-d: Add iotlb flush for nested domain

[PATCH] LoongArch: KVM: Add hypercall instruction emulation support
 2023-12-27  7:09 UTC 

[PATCH v2] LoongArch: KVM: add returns to SIMD stubs
 2023-12-27  1:22 UTC 

[PATCH] LoongArch: KVM: add a return kvm_own_lasx() stub
 2023-12-27  1:15 UTC  (3+ messages)

[PATCH] LoongArch: KVM: add a return kvm_own_lasx() stub
 2023-12-27  1:06 UTC 

[PATCH v2] vhost-vdpa: account iommu allocations
 2023-12-26 20:19 UTC  (2+ messages)

[PATCH 00/16] IOMMU memory observability
 2023-12-26 18:23 UTC  (4+ messages)
` [PATCH 15/16] vhost-vdpa: account iommu allocations

[kvm-unit-tests RFC v2 00/18] X86: TDX framework support
 2023-12-26  7:50 UTC  (4+ messages)
` [kvm-unit-tests RFC v2 02/18] x86 TDX: Add support functions for TDX framework

[kvm-unit-tests PATCH v2] x86/asyncpf: fix async page fault issues
 2023-12-26  5:15 UTC  (3+ messages)

[PATCH V12 00/14] riscv: Add Native/Paravirt qspinlock support
 2023-12-26  0:35 UTC  (16+ messages)
` [PATCH V12 01/14] asm-generic: ticket-lock: Reuse arch_spinlock_t of qspinlock
` [PATCH V12 02/14] asm-generic: ticket-lock: Add separate ticket-lock.h
` [PATCH V12 03/14] riscv: errata: Move errata vendor func-id into vendorid_list.h
` [PATCH V12 04/14] riscv: qspinlock: errata: Add ERRATA_THEAD_WRITE_ONCE fixup
` [PATCH V12 05/14] riscv: qspinlock: Add basic queued_spinlock support
` [PATCH V12 06/14] riscv: qspinlock: Introduce combo spinlock
` [PATCH V12 07/14] riscv: qspinlock: Add virt_spin_lock() support for VM guest
` [PATCH V12 08/14] riscv: qspinlock: Force virt_spin_lock for KVM guests
` [PATCH V12 09/14] RISC-V: paravirt: Add pvqspinlock KVM backend
` [PATCH V12 10/14] RISC-V: paravirt: Add pvqspinlock frontend skeleton
` [PATCH V12 11/14] RISC-V: paravirt: pvqspinlock: Add SBI implementation
` [PATCH V12 12/14] RISC-V: paravirt: pvqspinlock: Add nopvspin kernel parameter
` [PATCH V12 13/14] RISC-V: paravirt: pvqspinlock: Add kconfig entry
` [PATCH V12 14/14] RISC-V: paravirt: pvqspinlock: Add trace point for pv_kick/wait

[GIT PULL] virtio: bugfixes
 2023-12-25 23:32 UTC  (2+ messages)

[PATCH vhost v5 0/8] vdpa/mlx5: Add support for resumable vqs
 2023-12-25 15:12 UTC  (9+ messages)
` [PATCH mlx5-vhost v5 1/8] vdpa/mlx5: Expose resumable vq capability
` [PATCH vhost v5 2/8] vdpa/mlx5: Allow modifying multiple vq fields in one modify command
` [PATCH vhost v5 3/8] vdpa/mlx5: Introduce per vq and device resume
` [PATCH vhost v5 4/8] vdpa/mlx5: Mark vq addrs for modification in hw vq
` [PATCH vhost v5 5/8] vdpa/mlx5: Mark vq state "
` [PATCH vhost v5 6/8] vdpa/mlx5: Use vq suspend/resume during .set_map
` [PATCH vhost v5 7/8] vdpa/mlx5: Introduce reference counting to mrs
` [PATCH vhost v5 8/8] vdpa/mlx5: Add mkey leak detection

[PATCH 0/2] vdpa: Block vq property change in DRIVER_OK
 2023-12-25 15:09 UTC  (5+ messages)
` [PATCH 1/2] vdpa: Track device suspended state
` [PATCH 2/2] vdpa: Block vq property changes in DRIVER_OK

[PATCH vhost v4 00/15] vdpa/mlx5: Add support for resumable vqs
 2023-12-25 15:05 UTC  (3+ messages)

[PATCH vhost v4 02/15] vdpa: Add VHOST_BACKEND_F_CHANGEABLE_VQ_ADDR_IN_SUSPEND flag
 2023-12-25 13:45 UTC  (13+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).