public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-02-26 08:28:20 to 2024-02-26 14:35:33 UTC [more...]

[RFC PATCH 00/73] KVM: x86/PVM: Introduce a new hypervisor
 2024-02-26 14:35 UTC  (17+ messages)
` [RFC PATCH 01/73] KVM: Documentation: Add the specification for PVM
` [RFC PATCH 02/73] x86/ABI/PVM: Add PVM-specific ABI header file
` [RFC PATCH 03/73] x86/entry: Implement switcher for PVM VM enter/exit
` [RFC PATCH 04/73] x86/entry: Implement direct switching for the switcher
` [RFC PATCH 05/73] KVM: x86: Set 'vcpu->arch.exception.injected' as true before vendor callback
` [RFC PATCH 06/73] KVM: x86: Move VMX interrupt/nmi handling into kvm.ko
` [RFC PATCH 07/73] KVM: x86/mmu: Adapt shadow MMU for PVM
` [RFC PATCH 08/73] KVM: x86: Allow hypercall handling to not skip the instruction
` [RFC PATCH 09/73] KVM: x86: Add PVM virtual MSRs into emulated_msrs_all[]
` [RFC PATCH 10/73] KVM: x86: Introduce vendor feature to expose vendor-specific CPUID
` [RFC PATCH 11/73] KVM: x86: Implement gpc refresh for guest usage
` [RFC PATCH 12/73] KVM: x86: Add NR_VCPU_SREG in SREG enum
` [RFC PATCH 13/73] KVM: x86/emulator: Reinject #GP if instruction emulation failed for PVM
` [RFC PATCH 14/73] KVM: x86: Create stubs for PVM module as a new vendor
` [RFC PATCH 15/73] mm/vmalloc: Add a helper to reserve a contiguous and aligned kernel virtual area
` [RFC PATCH 16/73] KVM: x86/PVM: Implement host mmu initialization

[PATCH v19 000/130] KVM TDX basic feature support
 2024-02-26 14:32 UTC  (78+ messages)
` [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes
` [PATCH v19 056/130] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v19 057/130] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v19 058/130] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v19 059/130] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v19 060/130] KVM: x86/tdp_mmu: Apply mmu notifier callback to only shared GPA
` [PATCH v19 061/130] KVM: x86/tdp_mmu: Sprinkle __must_check
` [PATCH v19 062/130] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v19 063/130] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v19 064/130] KVM: x86/mmu: Do not enable page track for TD guest
` [PATCH v19 065/130] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v19 066/130] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v19 067/130] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v19 068/130] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v19 069/130] KVM: TDX: Require TDP MMU and mmio caching for TDX
` [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support
` [PATCH v19 071/130] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v19 072/130] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v19 073/130] KVM: x86: Add hooks in kvm_arch_vcpu_memory_mapping()
` [PATCH v19 074/130] KVM: TDX: Create initial guest memory
` [PATCH v19 075/130] KVM: TDX: Extend memory measurement with "
` [PATCH v19 076/130] KVM: TDX: Finalize VM initialization
` [PATCH v19 077/130] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v19 078/130] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v19 079/130] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v19 080/130] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v19 081/130] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v19 082/130] KVM: TDX: restore user ret MSRs
` [PATCH v19 083/130] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
` [PATCH v19 084/130] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v19 085/130] KVM: TDX: Complete interrupts after tdexit
` [PATCH v19 086/130] KVM: TDX: restore debug store when TD exit
` [PATCH v19 087/130] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v19 088/130] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v19 089/130] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v19 090/130] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v19 091/130] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v19 092/130] KVM: TDX: Implement interrupt injection
` [PATCH v19 093/130] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v19 094/130] KVM: TDX: Implement methods to inject NMI
` [PATCH v19 095/130] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v19 096/130] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v19 097/130] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v19 098/130] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v19 099/130] KVM: TDX: Handle vmentry failure for INTEL TD guest
` [PATCH v19 100/130] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v19 101/130] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v19 102/130] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v19 103/130] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
` [PATCH v19 104/130] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v19 105/130] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v19 106/130] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
` [PATCH v19 107/130] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v19 108/130] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v19 109/130] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v19 110/130] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v19 111/130] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v19 112/130] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v19 113/130] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
` [PATCH v19 114/130] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
` [PATCH v19 115/130] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v19 116/130] KVM: TDX: Silently discard SMI request
` [PATCH v19 117/130] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v19 118/130] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v19 119/130] KVM: TDX: Add methods to ignore guest instruction emulation
` [PATCH v19 120/130] KVM: TDX: Add a method to ignore dirty logging
` [PATCH v19 121/130] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v19 122/130] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v19 123/130] KVM: TDX: Ignore setting up mce
` [PATCH v19 124/130] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
` [PATCH v19 125/130] KVM: TDX: Add methods to ignore virtual apic related operation
` [PATCH v19 126/130] KVM: TDX: Inhibit APICv for TDX guest
` [PATCH v19 127/130] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v19 128/130] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v19 129/130] RFC: KVM: x86: Add x86 callback to check cpuid
` [PATCH v19 130/130] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2

[PATCH 0/2] LoongArch: KVM: Start SW timer only when vcpu is blocking
 2024-02-26 12:59 UTC  (5+ messages)
` [PATCH 1/2] "
` [PATCH 2/2] LoongArch: KVM: Do not restart SW timer when it is expired

[PATCH] LoongArch: KVM: Remove unnecessary CSR register saving during enter guest
 2024-02-26 12:58 UTC  (4+ messages)

[GIT PULL 0/3] KVM: s390: Changes for 6.9
 2024-02-26 12:13 UTC  (4+ messages)
` [GIT PULL 1/3] KVM: s390: fix virtual vs physical address confusion
` [GIT PULL 2/3] KVM: s390: only deliver the set service event bits
` [GIT PULL 3/3] KVM: s390: selftest: memop: Fix undefined behavior

[PATCH vhost v2 00/19] virtio: drivers maintain dma info for premapped vq
 2024-02-26 12:12 UTC  (19+ messages)
` [PATCH vhost v2 19/19] virtio_net: sq support premapped mode

[kvm-unit-tests PATCH 00/32] powerpc improvements
 2024-02-26 11:35 UTC  (35+ messages)
` [kvm-unit-tests PATCH 01/32] powerpc: Fix KVM caps on POWER9 hosts
` [kvm-unit-tests PATCH 02/32] powerpc: Fix pseries getchar return value
` [kvm-unit-tests PATCH 03/32] powerpc: Fix stack backtrace termination
` [kvm-unit-tests PATCH 04/32] powerpc: interrupt stack backtracing
` [kvm-unit-tests PATCH 05/32] powerpc: Cleanup SPR and MSR definitions
` [kvm-unit-tests PATCH 06/32] powerpc/sprs: Specify SPRs with data rather than code
` [kvm-unit-tests PATCH 07/32] powerpc/sprs: Don't fail changed SPRs that are used by the test harness
` [kvm-unit-tests PATCH 08/32] powerpc/sprs: Avoid taking PMU interrupts caused by register fuzzing
` [kvm-unit-tests PATCH 09/32] scripts: allow machine option to be specified in unittests.cfg
` [kvm-unit-tests PATCH 10/32] scripts: Accommodate powerpc powernv machine differences
` [kvm-unit-tests PATCH 11/32] powerpc: Support powernv machine with QEMU TCG
` [kvm-unit-tests PATCH 12/32] powerpc: Fix emulator illegal instruction test for powernv
` [kvm-unit-tests PATCH 13/32] powerpc/sprs: Test hypervisor registers on powernv machine
` [kvm-unit-tests PATCH 14/32] powerpc: general interrupt tests
` [kvm-unit-tests PATCH 15/32] powerpc: Add rtas stop-self support
` [kvm-unit-tests PATCH 16/32] powerpc: Remove broken SMP exception stack setup
` [kvm-unit-tests PATCH 17/32] arch-run: Fix handling multiple exit status messages
` [kvm-unit-tests PATCH 18/32] powerpc: add SMP and IPI support
` [kvm-unit-tests PATCH 19/32] powerpc: Permit ACCEL=tcg,thread=single
` [kvm-unit-tests PATCH 20/32] powerpc: Avoid using larx/stcx. in spinlocks when only one CPU is running
` [kvm-unit-tests PATCH 21/32] powerpc: Add atomics tests
` [kvm-unit-tests PATCH 22/32] powerpc: Add timebase tests
` [kvm-unit-tests PATCH 23/32] powerpc: Add MMU support
` [kvm-unit-tests PATCH 24/32] common/sieve: Use vmalloc.h for setup_mmu definition
` [kvm-unit-tests PATCH 25/32] common/sieve: Support machines without MMU
` [kvm-unit-tests PATCH 26/32] powerpc: Add sieve.c common test
` [kvm-unit-tests PATCH 27/32] powerpc: add usermode support
` [kvm-unit-tests PATCH 28/32] powerpc: add pmu tests
` [kvm-unit-tests PATCH 29/32] configure: Fail on unknown arch
` [kvm-unit-tests PATCH 30/32] configure: Make arch_libdir a first-class entity
` [kvm-unit-tests PATCH 31/32] powerpc: Remove remnants of ppc64 directory and build structure
` [kvm-unit-tests PATCH 32/32] powerpc: gitlab CI update

[PATCH] vfio: amba: Rename pl330_ids[] to vfio_amba_ids[]
 2024-02-26 11:11 UTC  (2+ messages)

[PATCH 1/1] vhost: Added pad cleanup if vnet_hdr is not present
 2024-02-26 10:30 UTC  (4+ messages)

[PATCH v2 00/13] KVM/arm64: Add NV support for ERET and PAuth
 2024-02-26 10:06 UTC  (14+ messages)
` [PATCH v2 01/13] KVM: arm64: Harden __ctxt_sys_reg() against out-of-range values
` [PATCH v2 02/13] KVM: arm64: Add helpers for ESR_ELx_ERET_ISS_ERET*
` [PATCH v2 03/13] KVM: arm64: nv: Drop VCPU_HYP_CONTEXT flag
` [PATCH v2 04/13] KVM: arm64: nv: Configure HCR_EL2 for FEAT_NV2
` [PATCH v2 05/13] KVM: arm64: nv: Add trap forwarding for ERET and SMC
` [PATCH v2 06/13] KVM: arm64: nv: Fast-track 'InHost' exception returns
` [PATCH v2 07/13] KVM: arm64: nv: Honor HFGITR_EL2.ERET being set
` [PATCH v2 08/13] KVM: arm64: nv: Handle HCR_EL2.{API,APK} independently
` [PATCH v2 09/13] KVM: arm64: nv: Reinject PAC exceptions caused by HCR_EL2.API==0
` [PATCH v2 10/13] KVM: arm64: nv: Add kvm_has_pauth() helper
` [PATCH v2 11/13] KVM: arm64: nv: Add emulation for ERETAx instructions
` [PATCH v2 12/13] KVM: arm64: nv: Handle ERETA[AB] instructions
` [PATCH v2 13/13] KVM: arm64: nv: Advertise support for PAuth

[RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
 2024-02-26  9:57 UTC  (12+ messages)
` [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
  ` folio_mmapped

[kvm-unit-tests PATCH 0/7] more migration enhancements and tests
 2024-02-26  9:38 UTC  (8+ messages)
` [kvm-unit-tests PATCH 1/7] arch-run: Keep infifo open
` [kvm-unit-tests PATCH 2/7] migration: Add a migrate_skip command
` [kvm-unit-tests PATCH 3/7] (arm|s390): Use migrate_skip in test cases
` [kvm-unit-tests PATCH 4/7] powerpc: add asm/time.h header with delay and get_clock_us/ms
` [kvm-unit-tests PATCH 5/7] arch-run: Add a "continuous" migration option for tests
` [kvm-unit-tests PATCH 6/7] gitlab-ci: Run migration selftest on s390x and powerpc
` [kvm-unit-tests PATCH 7/7] common: add memory dirtying vs migration test

[kvm-unit-tests PATCH v5 0/8] Multi-migration support
 2024-02-26  9:08 UTC  (4+ messages)

[PATCH v3 1/2] genirq/msi: add wrapper msi allocation API and export msi functions
 2024-02-26  8:48 UTC  (2+ messages)
` [PATCH v3 2/2] vfio/cdx: add interrupt support

[PATCH v4] Enable haltpoll for arm64
 2024-02-26  8:36 UTC  (5+ messages)
` [PATCH v4 6/8] cpuidle-haltpoll: ARM64 support
` [PATCH v4 7/8] cpuidle/poll_state: replace cpu_relax with smp_cond_load_relaxed

[PATCH v8 00/14] KVM TDX: TDP MMU: large page support
 2024-02-26  8:29 UTC  (15+ messages)
` [PATCH v8 01/14] KVM: Add transparent hugepage support for dedicated guest memory
` [PATCH v8 02/14] KVM: TDX: Flush cache based on page size before TDX SEAMCALL
` [PATCH v8 03/14] KVM: TDX: Pass KVM page level to tdh_mem_page_aug()
` [PATCH v8 04/14] KVM: TDX: Pass size to reclaim_page()
` [PATCH v8 05/14] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
` [PATCH v8 06/14] KVM: MMU: Introduce level info in PFERR code
` [PATCH v8 07/14] KVM: TDX: Pass desired page level in err code for page fault handler
` [PATCH v8 08/14] KVM: x86/tdp_mmu: Allocate private page table for large page split
` [PATCH v8 09/14] KVM: x86/tdp_mmu: Split the large page when zap leaf
` [PATCH v8 10/14] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
` [PATCH v8 11/14] KVM: x86/tdp_mmu: Try to merge pages into a large page
` [PATCH v8 12/14] KVM: TDX: Implement "
` [PATCH v8 13/14] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
` [PATCH v8 14/14] KVM: TDX: Allow 2MB large page for TD GUEST


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox