public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-05-30 23:12:47 to 2024-06-03 14:20:01 UTC [more...]

[PATCH 0/5] cpus: a few tweaks to CPU realization
 2024-06-03 14:19 UTC  (21+ messages)
` [PATCH 1/5] hw/core: expand on the alignment of CPUState
` [PATCH 2/5] cpu: move Qemu[Thread|Cond] setup into common code
` [PATCH 3/5] cpu-target: don't set cpu->thread_id to bogus value
` [PATCH 4/5] plugins: remove special casing for cpu->realized
` [PATCH 5/5] core/cpu-common: initialise plugin state before thread creation

[PATCH v4 00/31] Add AMD Secure Nested Paging (SEV-SNP) support
 2024-06-03 14:15 UTC  (38+ messages)
` [PATCH v4 01/31] i386/sev: Replace error_report with error_setg
` [PATCH v4 02/31] linux-headers: Update to current kvm/next
` [PATCH v4 04/31] i386/sev: Introduce "sev-common" type to encapsulate common SEV state
` [PATCH v4 07/31] i386/sev: Introduce 'sev-snp-guest' object
` [PATCH v4 09/31] i386/sev: Add sev_kvm_init() override for SEV class
` [PATCH v4 10/31] i386/sev: Add snp_kvm_init() override for SNP class
` [PATCH v4 18/31] hw/i386/sev: Add function to get SEV metadata from OVMF header
` [PATCH v4 22/31] i386/sev: Reorder struct declarations
` [PATCH v4 23/31] i386/sev: Allow measured direct kernel boot on SNP
` [PATCH v4 25/31] i386/sev: Invoke launch_updata_data() for SEV class
` [PATCH v4 27/31] hw/i386/sev: Use guest_memfd for legacy ROMs
` [PATCH v4 28/31] hw/i386: Add support for loading BIOS using guest_memfd
` [PATCH v4 29/31] hw/i386/sev: Allow use of pflash in conjunction with -bios

[PATCH v4 00/13] KVM: arm64: Add support for hypervisor kCFI
 2024-06-03 14:05 UTC  (4+ messages)
` [PATCH v4 01/13] KVM: arm64: Fix clobbered ELR in sync abort/SError

[PATCH v3 00/12] KVM: arm64: Add support for hypervisor kCFI
 2024-06-03 13:10 UTC  (9+ messages)
` [PATCH v3 09/12] KVM: arm64: VHE: Add test module for hyp kCFI
` [PATCH v3 10/12] KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2

[kvm-unit-tests PATCH 00/33] Support for Arm Confidential Compute Architecture
 2024-06-03 12:50 UTC  (2+ messages)

[PATCH 00/11] KVM: arm64: nv: FPSIMD/SVE support
 2024-06-03 12:36 UTC  (18+ messages)
` [PATCH 01/11] KVM: arm64: nv: Forward FP/ASIMD traps to guest hypervisor
` [PATCH 02/11] KVM: arm64: nv: Forward SVE "
` [PATCH 03/11] KVM: arm64: nv: Load guest FP state for ZCR_EL2 trap
` [PATCH 04/11] KVM: arm64: nv: Load guest hyp's ZCR into EL1 state
` [PATCH 05/11] KVM: arm64: nv: Handle ZCR_EL2 traps
` [PATCH 06/11] KVM: arm64: nv: Save guest's ZCR_EL2 when in hyp context
` [PATCH 07/11] KVM: arm64: nv: Use guest hypervisor's max VL when running nested guest
` [PATCH 08/11] KVM: arm64: nv: Ensure correct VL is loaded before saving SVE state
` [PATCH 09/11] KVM: arm64: Spin off helper for programming CPTR traps
` [PATCH 10/11] KVM: arm64: nv: Honor guest hypervisor's FP/SVE traps in CPTR_EL2
` [PATCH 11/11] KVM: arm64: Allow the use of SVE+NV

[PATCH 0/2] ppc: spapr: Nested kvm guest migration fixes
 2024-06-03 12:29 UTC  (4+ messages)
` [PATCH 1/2] target/ppc/cpu_init: Synchronize DEXCR with KVM for migration
` [PATCH 2/2] target/ppc/cpu_init: Synchronize HASHKEYR "

[RFC v2 0/7] Introduce SMP Cache Topology
 2024-06-03 12:25 UTC  (4+ messages)
` [RFC v2 1/7] hw/core: Make CPU topology enumeration arch-agnostic

[PATCH] KVM: selftests: Fix RISC-V compilation
 2024-06-03 12:20 UTC 

[kvm-unit-tests PATCH] scripts/s390x: Fix the execution of the PV tests
 2024-06-03 11:56 UTC  (3+ messages)

[kvm-unit-tests PATCH 0/2] s390x: Fix build error messages
 2024-06-03 11:54 UTC  (4+ messages)
` [kvm-unit-tests PATCH 1/2] s390x: Only run genprotimg if necessary
` [kvm-unit-tests PATCH 2/2] s390x: Specify program headers with flags to avoid linker warnings

xave kvm-unit-test sometimes failing in CI
 2024-06-03 11:51 UTC  (4+ messages)

[RFC PATCH v4 0/5] Add Svadu Extension Support
 2024-06-03 11:40 UTC  (9+ messages)
` [RFC PATCH v4 1/5] RISC-V: Detect and Enable "

[PATCH 0/6] KVM: PPC: Book3S HV: Nested guest migration fixes
 2024-06-03 11:15 UTC  (7+ messages)
` [PATCH 1/6] KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3
` [PATCH 2/6] KVM: PPC: Book3S HV: Fix the get_one_reg of SDAR
` [PATCH 3/6] KVM: PPC: Book3S HV nestedv2: Keep nested guest DEXCR in sync
` [PATCH 4/6] KVM: PPC: Book3S HV: Add one-reg interface for DEXCR register
` [PATCH 5/6] KVM: PPC: Book3S HV nestedv2: Keep nested guest HASHKEYR in sync
` [PATCH 6/6] KVM: PPC: Book3S HV: Add one-reg interface for HASHKEYR register

[kvm-unit-tests PATCH] MAINTAINERS: Add scripts/s390x/ to the s390x section
 2024-06-03 10:57 UTC  (2+ messages)

[PATCH kvm-unit-tests] svm: add test for VMRUN with interrupt shadow enabled
 2024-06-03 10:22 UTC 

[PATCH kvm-unit-tests] svm: make the interrupt_test a bit longer
 2024-06-03 10:19 UTC 

[PATCH kvm-unit-tests] debug: add testcase for singlestepping over STI;HLT
 2024-06-03 10:18 UTC 

[kvm-unit-tests PATCH v9 00/31] powerpc improvements
 2024-06-03  9:34 UTC  (5+ messages)
` [kvm-unit-tests PATCH v9 14/31] powerpc: Remove broken SMP exception stack setup
` [kvm-unit-tests PATCH v9 15/31] powerpc: Enable page alloc operations

[PATCH] vfio/pci: add msi interrupt affinity support
 2024-06-03  9:32 UTC  (2+ messages)

[PATCH kvm-unit-tests] svm: allow CR4.PKS
 2024-06-03  9:27 UTC 

[PATCH kvm-unit-tests] gitlab-ci: store artifacts even on failure
 2024-06-03  9:27 UTC 

[kvm-unit-tests PATCH 0/4] powerpc fix and misc docs/build/CI improvements
 2024-06-03  8:56 UTC  (15+ messages)
` [kvm-unit-tests PATCH 1/4] powerpc/sprs: Fix report_kfail call
` [kvm-unit-tests PATCH 2/4] doc: update unittests doc
` [kvm-unit-tests PATCH 3/4] build: Make build output pretty
` [kvm-unit-tests PATCH 4/4] gitlab-ci: Always save artifacts

[PATCH v1 RESEND] arch/powerpc/kvm: Fix doorbell emulation by adding DPDES support
 2024-06-03  8:06 UTC  (4+ messages)

[PATCH v2] KVM: x86: Advertise AVX10.1 CPUID to userspace
 2024-06-03  6:40 UTC 

[PATCH] KVM: selftests: remove unused struct 'memslot_antagonist_args'
 2024-06-03  3:13 UTC  (2+ messages)

[PATCH v2 0/2] vfio/pci: vfio device address space mapping
 2024-06-03  3:00 UTC  (7+ messages)
` [PATCH v2 1/2] vfio: Create vfio_fs_type with inode per device
` [PATCH v2 2/2] vfio/pci: Use unmap_mapping_range()

[v2] Support for Arm CCA VMs on Linux
 2024-06-01 20:40 UTC  (8+ messages)
` [PATCH v2 00/43] arm64: Support for Arm CCA in KVM
  ` [PATCH v2 21/43] arm64: RME: Runtime faulting of memory

[PATCH 0/5] Enforce CPU cache flush for non-coherent device assignment
 2024-06-01 19:46 UTC  (7+ messages)
` [PATCH 3/5] x86/mm: Introduce and export interface arch_clean_nonsnoop_dma()

[PATCH] vdpa: Add support for no-IOMMU mode
 2024-06-01 19:13 UTC  (3+ messages)

[PATCH 5/5] iommufd: Flush CPU caches on DMA pages in non-coherent domains
 2024-06-01 16:48 UTC  (11+ messages)

[PATCH v19 000/130] KVM TDX basic feature support
 2024-05-31 22:16 UTC  (8+ messages)
` [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support

[PATCH v4 0/7] mm: multi-gen LRU: Walk secondary MMU page tables while aging
 2024-05-31 21:18 UTC  (19+ messages)
` [PATCH v4 2/7] mm: multi-gen LRU: Have secondary MMUs participate in aging
` [PATCH v4 6/7] KVM: arm64: Relax locking for kvm_test_age_gfn and kvm_age_gfn

[GIT PULL] KVM/riscv fixes for 6.10 take #1
 2024-05-31 16:51 UTC 

[PATCH v2 00/14] arm64: Support for running as a guest in Arm CCA
 2024-05-31 16:29 UTC  (5+ messages)
` [PATCH v2 13/14] arm64: rsi: Interfaces to query attestation token

[PATCH 10/16] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
 2024-05-31 14:11 UTC  (11+ messages)

[PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-05-31 13:10 UTC  (11+ messages)
` [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT

[PATCH 0/2] KVM RISC-V HW IMSIC guest files
 2024-05-31 11:25 UTC  (2+ messages)

[PATCH v5 00/65] QEMU Guest memfd + QEMU TDX support
 2024-05-31  9:27 UTC  (7+ messages)
` [PATCH v5 17/65] i386/tdx: Adjust the supported CPUID based on TDX restrictions
` [PATCH v5 18/65] i386/tdx: Make Intel-PT unsupported for TD guest
` [PATCH v5 19/65] i386/tdx: Update tdx_cpuid_lookup[].tdx_fixed0/1 by tdx_caps.cpuid_config[]

[PATCH 0/4] Export APICv-related state via binary stats interface
 2024-05-31  9:27 UTC  (8+ messages)
` [PATCH 1/4] KVM: x86: Expose per-vCPU APICv status
` [PATCH 3/4] KVM: x86: Add a VM stat exposing when KVM PIT is set to reinject mode
` [PATCH 4/4] KVM: x86: Add vCPU stat for APICv interrupt injections causing #VMEXIT

[PATCH 0/6] Introduce CET supervisor state support
 2024-05-31  9:03 UTC  (7+ messages)
` [PATCH 1/6] x86/fpu/xstate: Always preserve non-user xfeatures/flags in __state_perm
` [PATCH 2/6] x86/fpu/xstate: Add CET supervisor mode state support
` [PATCH 3/6] x86/fpu/xstate: Introduce XFEATURE_MASK_KERNEL_DYNAMIC xfeature set
` [PATCH 4/6] x86/fpu/xstate: Introduce fpu_guest_cfg for guest FPU configuration
` [PATCH 5/6] x86/fpu/xstate: Create guest fpstate with guest specific config
` [PATCH 6/6] x86/fpu/xstate: Warn if CET supervisor state is detected in normal fpstate

[PATCH] arch/powerpc/kvm: Fix doorbell emulation by adding DPDES support
 2024-05-31  7:01 UTC  (4+ messages)

[PATCH v3 0/5] Add support for the Idle HLT intercept feature
 2024-05-31  6:49 UTC  (5+ messages)
` [PATCH v3 5/5] KVM: selftests: KVM: SVM: Add Idle HLT intercept test

[PATCH] RISC-V: KVM: Fix incorrect reg_subtype labels in kvm_riscv_vcpu_set_reg_isa_ext function
 2024-05-31  5:42 UTC  (2+ messages)

[PATCH v4 0/3] KVM: SEV-ES: Fix KVM_{GET|SET}_MSRS and LBRV handling
 2024-05-31  4:46 UTC  (4+ messages)
` [PATCH v4 1/3] KVM: SEV-ES: Prevent MSR access post VMSA encryption
` [PATCH v4 2/3] KVM: SEV-ES: Disallow SEV-ES guests when X86_FEATURE_LBRV is absent
` [PATCH v4 3/3] KVM: SEV-ES: Fix LBRV code

[PATCH v9 00/24] Add Secure TSC support for SNP guests
 2024-05-31  4:30 UTC  (25+ messages)
` [PATCH v9 01/24] virt: sev-guest: Use AES GCM crypto library
` [PATCH v9 02/24] virt: sev-guest: Replace dev_dbg with pr_debug
` [PATCH v9 03/24] virt: sev-guest: Make payload a variable length array
` [PATCH v9 04/24] virt: sev-guest: Add SNP guest request structure
` [PATCH v9 05/24] virt: sev-guest: Fix user-visible strings
` [PATCH v9 06/24] virt: sev-guest: Simplify VMPCK and sequence number assignments
` [PATCH v9 07/24] virt: sev-guest: Store VMPCK index to SNP guest device structure
` [PATCH v9 08/24] virt: sev-guest: Take mutex in snp_send_guest_request()
` [PATCH v9 09/24] virt: sev-guest: Carve out SNP guest messaging init/exit
` [PATCH v9 10/24] x86/sev: Move core SEV guest driver routines to common code
` [PATCH v9 11/24] x86/sev: Replace dev_[err,alert] with pr_[err,alert]
` [PATCH v9 12/24] x86/sev: Make snp_issue_guest_request() static
` [PATCH v9 13/24] x86/sev: Make sev-guest driver functional again
` [PATCH v9 14/24] x86/sev: Handle failures from snp_init()
` [PATCH v9 15/24] x86/sev: Cache the secrets page address
` [PATCH v9 16/24] x86/sev: Drop sev_guest_platform_data structure
` [PATCH v9 17/24] x86/cc: Add CC_ATTR_GUEST_SECURE_TSC
` [PATCH v9 18/24] x86/sev: Add Secure TSC support for SNP guests
` [PATCH v9 19/24] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v9 20/24] x86/sev: Prevent RDTSC/RDTSCP interception "
` [PATCH v9 21/24] x86/kvmclock: Skip kvmclock when Secure TSC is available
` [PATCH v9 22/24] x86/sev: Mark Secure TSC as reliable
` [PATCH v9 23/24] x86/cpu/amd: Do not print FW_BUG for Secure TSC
` [PATCH v9 24/24] x86/sev: Enable Secure TSC for SNP guests

[PATCH 1/1] RISC-V: KVM: No need to use mask when hart-index-bit is 0
 2024-05-31  4:34 UTC  (2+ messages)

[PATCH v3 0/3] KVM: SEV-ES: Fix KVM_{GET|SET}_MSRS and LBRV handling
 2024-05-31  4:06 UTC  (4+ messages)
` [PATCH v3 3/3] KVM: SEV-ES: Fix LBRV code

[PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-05-31  3:22 UTC  (2+ messages)

[PATCH] vfio/qat: add PCI_IOV dependency
 2024-05-31  2:56 UTC  (5+ messages)

[PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
 2024-05-31  0:36 UTC  (12+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox