public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-01-22 23:55:41 to 2024-01-24 10:21:51 UTC [more...]

[kvm-unit-tests PATCH 00/24] Introduce RISC-V
 2024-01-24 10:21 UTC  (33+ messages)
` [kvm-unit-tests PATCH 01/24] configure: Add ARCH_LIBDIR
` [kvm-unit-tests PATCH 02/24] riscv: Initial port, hello world
` [kvm-unit-tests PATCH 03/24] arm/arm64: Move cpumask.h to common lib
` [kvm-unit-tests PATCH 04/24] arm/arm64: Share cpu online, present and idle masks
` [kvm-unit-tests PATCH 05/24] riscv: Add DT parsing
` [kvm-unit-tests PATCH 06/24] riscv: Add initial SBI support
` [kvm-unit-tests PATCH 07/24] riscv: Add run script and unittests.cfg
` [kvm-unit-tests PATCH 08/24] riscv: Add riscv32 support
` [kvm-unit-tests PATCH 09/24] riscv: Add exception handling
` [kvm-unit-tests PATCH 10/24] riscv: Add backtrace support
` [kvm-unit-tests PATCH 11/24] arm/arm64: Generalize wfe/sev names in smp.c
` [kvm-unit-tests PATCH 12/24] arm/arm64: Remove spinlocks from on_cpu_async
` [kvm-unit-tests PATCH 13/24] arm/arm64: Share on_cpus
` [kvm-unit-tests PATCH 14/24] riscv: Compile with march
` [kvm-unit-tests PATCH 15/24] riscv: Add SMP support
` [kvm-unit-tests PATCH 16/24] arm/arm64: Share memregions
` [kvm-unit-tests PATCH 17/24] riscv: Populate memregions and switch to page allocator
` [kvm-unit-tests PATCH 18/24] riscv: Add MMU support
` [kvm-unit-tests PATCH 19/24] riscv: Enable the MMU in secondaries
` [kvm-unit-tests PATCH 20/24] riscv: Enable vmalloc
` [kvm-unit-tests PATCH 21/24] lib: Add strcasecmp and strncasecmp
` [kvm-unit-tests PATCH 22/24] riscv: Add isa string parsing
` [kvm-unit-tests PATCH 23/24] gitlab-ci: Add riscv64 tests
    `  "
` [kvm-unit-tests PATCH 24/24] MAINTAINERS: Add riscv

[PATCH] KVM: PPC: code cleanup for kvmppc_book3s_irqprio_deliver
 2024-01-24  9:36 UTC 

[PATCH net-next 2/2] tun: AF_XDP Rx zero-copy support
 2024-01-24  9:37 UTC 

[PATCH net-next 1/2] xsk: Remove non-zero 'dma_page' check in xp_assign_dev
 2024-01-24  9:37 UTC 

[PATCH net-next 0/2] tun: AF_XDP Rx zero-copy support
 2024-01-24  9:37 UTC 

[kvm-unit-tests Patch v3 00/11] pmu test bugs fix and improvements
 2024-01-24  8:18 UTC  (2+ messages)

[PATCH v3 00/21] plugin updates (register access) for 9.0 (pre-PR?)
 2024-01-24  8:16 UTC  (8+ messages)
` [PATCH v3 01/21] hw/riscv: Use misa_mxl instead of misa_mxl_max
      `  "
` [PATCH v3 19/21] contrib/plugins: extend execlog to track register changes

[PATCH v6 0/6] Delay VERW
 2024-01-24  7:42 UTC  (7+ messages)
` [PATCH v6 1/6] x86/bugs: Add asm helpers for executing VERW
` [PATCH v6 2/6] x86/entry_64: Add VERW just before userspace transition
` [PATCH v6 3/6] x86/entry_32: "
` [PATCH v6 4/6] x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key
` [PATCH v6 5/6] KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH
` [PATCH v6 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation

[PATCH] KVM: PPC: Book3S HV: Fix L2 guest reboot failure due to empty 'arch_compat'
 2024-01-24  7:36 UTC  (3+ messages)

[PATCH v9 00/27] Enable CET Virtualization
 2024-01-24  2:42 UTC  (28+ messages)
` [PATCH v9 01/27] x86/fpu/xstate: Always preserve non-user xfeatures/flags in __state_perm
` [PATCH v9 02/27] x86/fpu/xstate: Refine CET user xstate bit enabling
` [PATCH v9 03/27] x86/fpu/xstate: Add CET supervisor mode state support
` [PATCH v9 04/27] x86/fpu/xstate: Introduce XFEATURE_MASK_KERNEL_DYNAMIC xfeature set
` [PATCH v9 05/27] x86/fpu/xstate: Introduce fpu_guest_cfg for guest FPU configuration
` [PATCH v9 06/27] x86/fpu/xstate: Create guest fpstate with guest specific config
` [PATCH v9 07/27] x86/fpu/xstate: Warn if kernel dynamic xfeatures detected in normal fpstate
` [PATCH v9 08/27] KVM: x86: Rework cpuid_get_supported_xcr0() to operate on vCPU data
` [PATCH v9 09/27] KVM: x86: Rename kvm_{g,s}et_msr() to menifest emulation operations
` [PATCH v9 10/27] KVM: x86: Refine xsave-managed guest register/MSR reset handling
` [PATCH v9 11/27] KVM: x86: Add kvm_msr_{read,write}() helpers
` [PATCH v9 12/27] KVM: x86: Report XSS as to-be-saved if there are supported features
` [PATCH v9 13/27] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
` [PATCH v9 14/27] KVM: x86: Initialize kvm_caps.supported_xss
` [PATCH v9 15/27] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
` [PATCH v9 16/27] KVM: x86: Add fault checks for guest CR4.CET setting
` [PATCH v9 17/27] KVM: x86: Report KVM supported CET MSRs as to-be-saved
` [PATCH v9 18/27] KVM: VMX: Introduce CET VMCS fields and control bits
` [PATCH v9 19/27] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
` [PATCH v9 20/27] KVM: VMX: Emulate read and write to CET MSRs
` [PATCH v9 21/27] KVM: x86: Save and reload SSP to/from SMRAM
` [PATCH v9 22/27] KVM: VMX: Set up interception for CET MSRs
` [PATCH v9 23/27] KVM: VMX: Set host constant supervisor states to VMCS fields
` [PATCH v9 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
` [PATCH v9 25/27] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
` [PATCH v9 26/27] KVM: nVMX: Enable CET support for nested guest
` [PATCH v9 27/27] KVM: x86: Stop emulating for CET protected branch instructions

[v2 0/4] KVM: irqchip: synchronize srcu only if needed
 2024-01-24  2:16 UTC  (7+ messages)
` [v2 1/4] KVM: irqchip: add setup empty irq routing function
` [v2 4/4] KVM: s390: don't setup dummy routing when KVM_CREATE_IRQCHIP

[RFC PATCH 0/8] Dynamic vcpu priority management in kvm
 2024-01-24  2:15 UTC  (6+ messages)

[PATCH v18 000/121] KVM TDX basic feature support
 2024-01-24  1:17 UTC  (79+ messages)
` [PATCH v18 007/121] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
` [PATCH v18 015/121] KVM: TDX: Retry SEAMCALL on the lack of entropy error
` [PATCH v18 018/121] KVM: TDX: Add helper functions to allocate/free TDX private host key id
` [PATCH v18 023/121] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
` [PATCH v18 053/121] KVM: x86/mmu: TDX: Do not enable page track for TD guest
` [PATCH v18 054/121] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v18 055/121] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v18 056/121] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v18 057/121] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v18 058/121] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v18 059/121] KVM: TDX: Require TDP MMU and mmio caching for TDX
` [PATCH v18 060/121] KVM: TDX: TDP MMU TDX support
` [PATCH v18 061/121] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v18 062/121] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v18 063/121] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v18 064/121] KVM: TDX: Create initial guest memory
` [PATCH v18 065/121] KVM: TDX: Finalize VM initialization
` [PATCH v18 066/121] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v18 067/121] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v18 068/121] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v18 069/121] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v18 070/121] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v18 071/121] KVM: TDX: restore user ret MSRs
` [PATCH v18 072/121] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
` [PATCH v18 073/121] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v18 074/121] KVM: TDX: complete interrupts after tdexit
` [PATCH v18 075/121] KVM: TDX: restore debug store when TD exit
` [PATCH v18 076/121] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v18 077/121] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v18 078/121] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v18 079/121] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v18 080/121] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v18 081/121] KVM: TDX: Implement interrupt injection
` [PATCH v18 082/121] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v18 083/121] KVM: TDX: Implement methods to inject NMI
` [PATCH v18 084/121] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v18 085/121] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v18 086/121] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v18 087/121] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v18 088/121] KVM: TDX: Handle vmentry failure for INTEL TD guest
` [PATCH v18 089/121] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v18 090/121] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v18 091/121] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v18 092/121] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
` [PATCH v18 093/121] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v18 094/121] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v18 095/121] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
` [PATCH v18 096/121] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v18 097/121] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v18 098/121] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v18 099/121] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v18 100/121] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v18 101/121] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v18 102/121] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
` [PATCH v18 103/121] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
` [PATCH v18 104/121] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v18 105/121] KVM: TDX: Silently discard SMI request
` [PATCH v18 106/121] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v18 107/121] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v18 108/121] KVM: TDX: Add methods to ignore guest instruction emulation
` [PATCH v18 109/121] KVM: TDX: Add a method to ignore dirty logging
` [PATCH v18 110/121] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v18 111/121] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v18 112/121] KVM: TDX: Ignore setting up mce
` [PATCH v18 113/121] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
` [PATCH v18 114/121] KVM: TDX: Add methods to ignore virtual apic related operation
` [PATCH v18 115/121] KVM: TDX: Inhibit APICv for TDX guest
` [PATCH v18 116/121] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v18 117/121] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v18 118/121] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
` [PATCH v18 119/121] RFC: KVM: x86: Add x86 callback to check cpuid
` [PATCH v18 120/121] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
` [PATCH v18 121/121] [MARKER] the end of (the first phase of) TDX KVM patch series

[PATCH 0/2] minor fix on perf_capabilities in KVM/x86
 2024-01-24  0:38 UTC  (3+ messages)
` [PATCH 1/2] KVM: x86/pmu: Reset perf_capabilities in vcpu to 0 if PDCM is disabled
` [PATCH 2/2] KVM: x86/pmu: Remove vcpu_get_perf_capabilities()

[ANNOUNCE] PUCK Agenda - 2024.01.24 - Memtypes for non-coherent DMA
 2024-01-23 23:00 UTC 

[PATCH] KVM: x86/pmu: Fix type length error when reading pmu->fixed_ctr_ctrl
 2024-01-23 22:12 UTC 

[PATCH] vfio/pds: Potential memory leak in pds_vfio_dirty_enable()
 2024-01-23 17:52 UTC  (3+ messages)

[PATCH net-next v2] vsock/test: add '--peer-port' input argument
 2024-01-23 15:19 UTC  (3+ messages)

[PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
 2024-01-23 15:06 UTC  (3+ messages)

[PATCH v1] KVM: nVMX: Fix handling triple fault on RSM instruction
 2024-01-23 14:48 UTC  (3+ messages)

[PATCH v11 00/43] KVM: arm64: Nested Virtualization support (FEAT_NV2 only)
 2024-01-23 14:26 UTC  (4+ messages)
` [PATCH v11 17/43] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures

[RFC PATCH v7] ppc: Enable 2nd DAWR support on p10
 2024-01-23 12:06 UTC  (2+ messages)

[PATCH net-next v3 2/5] page_frag: unify gfp bits for order 3 page allocation
 2024-01-23 10:42 UTC  (2+ messages)
` [PATCH net-next v3 4/5] vhost/net: remove vhost_net_page_frag_refill()

[PATCH v7 00/16] Support smp.clusters for x86 in QEMU
 2024-01-23  9:56 UTC  (4+ messages)
` [PATCH v7 05/16] i386: Decouple CPUID[0x1F] subleaf with specific topology level

[Bug 218297] New: Kernel Panic and crash
 2024-01-23  5:23 UTC  (2+ messages)
` [Bug 218297] "

[kvmtool PATCH 1/1] riscv: Add zacas extension
 2024-01-23  2:57 UTC 

[kvmtool PATCH 0/1] riscv: Add zacas extension
 2024-01-23  2:55 UTC 

[PATCH 23/82] KVM: Refactor intentional wrap-around calculation
 2024-01-23  0:27 UTC  (4+ messages)
` [PATCH 25/82] KVM: SVM: "
` [PATCH 32/82] vringh: "
` [PATCH 58/82] s390/mm: Refactor intentional wrap-around test

[PATCH v7 00/13] KVM TDX: TDP MMU: large page support
 2024-01-23  0:22 UTC  (14+ messages)
` [PATCH v7 01/13] KVM: TDX: Flush cache based on page size before TDX SEAMCALL
` [PATCH v7 02/13] KVM: TDX: Pass KVM page level to tdh_mem_page_aug()
` [PATCH v7 03/13] KVM: TDX: Pass size to reclaim_page()
` [PATCH v7 04/13] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
` [PATCH v7 05/13] KVM: MMU: Introduce level info in PFERR code
` [PATCH v7 06/13] KVM: TDX: Pass desired page level in err code for page fault handler
` [PATCH v7 07/13] KVM: x86/tdp_mmu: Allocate private page table for large page split
` [PATCH v7 08/13] KVM: x86/tdp_mmu: Split the large page when zap leaf
` [PATCH v7 09/13] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
` [PATCH v7 10/13] KVM: x86/tdp_mmu: Try to merge pages into a large page
` [PATCH v7 11/13] KVM: TDX: Implement "
` [PATCH v7 12/13] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
` [PATCH v7 13/13] KVM: TDX: Allow 2MB large page for TD GUEST

[PATCH v2] KVM: x86: nSVM/nVMX: Fix handling triple fault on RSM instruction
 2024-01-23  0:15 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox