public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-06-07 22:55:00 to 2024-06-11 06:09:41 UTC [more...]

[PATCH 00/11] KVM: guest_memfd: New hooks and functionality for SEV-SNP and TDX
 2024-06-11  6:09 UTC  (14+ messages)
` [PATCH 09/11] KVM: guest_memfd: Add interface for populating gmem pages with user data

[PATCH v5 0/9] mm: multi-gen LRU: Walk secondary MMU page tables while aging
 2024-06-11  5:57 UTC  (12+ messages)
` [PATCH v5 1/9] KVM: Add lockless memslot walk to KVM
` [PATCH v5 2/9] KVM: x86: Relax locking for kvm_test_age_gfn and kvm_age_gfn
` [PATCH v5 3/9] KVM: arm64: "
` [PATCH v5 4/9] mm: Add test_clear_young_fast_only MMU notifier
` [PATCH v5 5/9] KVM: Add kvm_fast_age_gfn and kvm_fast_test_age_gfn
` [PATCH v5 6/9] KVM: x86: Move tdp_mmu_enabled and shadow_accessed_mask
` [PATCH v5 7/9] KVM: x86: Implement kvm_fast_test_age_gfn and kvm_fast_age_gfn
` [PATCH v5 8/9] mm: multi-gen LRU: Have secondary MMUs participate in aging
` [PATCH v5 9/9] KVM: selftests: Add multi-gen LRU aging to access_tracking_perf_test

[PATCH 1/2] vdpa: support set mac address from vdpa tool
 2024-06-11  5:32 UTC  (2+ messages)
` [PATCH 2/2] vdpa_sim_net: Add the support of set mac address

[PATCH 0/9] Test the consistency of AMD PMU counters and their features
 2024-06-11  3:48 UTC  (3+ messages)

[PATCH] KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes
 2024-06-11  3:47 UTC  (2+ messages)

[PATCH] LoongArch: KVM: Mark page accessed and dirty with mmu_lock
 2024-06-11  3:46 UTC 

[PATCH] vfio/qat: add PCI_IOV dependency
 2024-06-11  3:20 UTC  (8+ messages)

[RFC PATCH 1/2] KVM: x86: Introduce KVM_{G,S}ET_ONE_REG uAPIs support
 2024-06-11  2:53 UTC  (6+ messages)
` [RFC PATCH 2/2] KVM: x86: Enable guest SSP read/write interface with new uAPIs

[v5 0/3] KVM: irqchip: synchronize srcu only if needed
 2024-06-11  1:54 UTC  (6+ messages)
` [v5 2/3] KVM: x86: don't setup empty irq routing when KVM_CAP_SPLIT_IRQCHIP
` [v5 3/3] KVM: s390: don't setup dummy routing when KVM_CREATE_IRQCHIP

[PATCH] KVM: x86/pmu: Add a helper to enable bits in FIXED_CTR_CTRL
 2024-06-11  1:45 UTC  (2+ messages)

[RFC PATCH v3 00/10] Virtualize Intel IA32_SPEC_CTRL
 2024-06-11  1:34 UTC  (3+ messages)
` [RFC PATCH v3 09/10] KVM: VMX: Advertise MITI_CTRL_BHB_CLEAR_SEQ_S_SUPPORT

[PATCH V8 0/2] KVM: x86: Make bus clock frequency for vAPIC timer configurable
 2024-06-11  0:51 UTC  (5+ messages)
` [PATCH V8 1/2] KVM: selftests: Add x86_64 guest udelay() utility
` [PATCH V8 2/2] KVM: selftests: Add test for configure of x86 APIC bus frequency

[PATCH] kvm: do not account temporary allocations to kmem
 2024-06-10 22:33 UTC  (3+ messages)

[RFC RESEND 00/16] Split IOMMU DMA mapping operation to two steps
 2024-06-10 21:28 UTC  (9+ messages)

[PATCH v2] KVM: selftest: Add a common check to identify AMD cpu in perf event filter test
 2024-06-10 21:27 UTC  (2+ messages)

[RFC] UAF in acrn_irqfd_assign() and vfio_virqfd_enable()
 2024-06-10 20:53 UTC  (4+ messages)

[PATCH v5 0/2] vfio/pci: add msi interrupt affinity support
 2024-06-10 19:32 UTC  (5+ messages)
` [PATCH v5 1/2] cgroup/cpuset: export cpuset_cpus_allowed()
` [PATCH v5 2/2] vfio/pci: add msi interrupt affinity support

[Bug 218739] New: pmu_counters_test kvm-selftest fails with (count != NUM_INSNS_RETIRED)
 2024-06-10 19:22 UTC  (2+ messages)
` [Bug 218739] "

[PATCH v3 00/14] arm64: Support for running as a guest in Arm CCA
 2024-06-10 17:49 UTC  (16+ messages)
` [PATCH v3 01/14] arm64: rsi: Add RSI definitions
` [PATCH v3 02/14] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v3 06/14] arm64: Override set_fixmap_io
` [PATCH v3 09/14] arm64: Enable memory encrypt for Realms

[PATCH v2 00/54] Mediated Passthrough vPMU 2.0 for x86
 2024-06-10 17:23 UTC  (4+ messages)
` [PATCH v2 07/54] perf: Add generic exclude_guest support

[PATCH] MAINTAINERS: Drop Wanpeng Li as a Reviewer for KVM Paravirt support
 2024-06-10 16:34 UTC 

[Bug 218949] New: Kernel panic after upgrading to 6.10-rc2
 2024-06-10 16:17 UTC  (9+ messages)
` [Bug 218949] "

[PATCH v2 00/15] TDX MMU prep series part 1
 2024-06-10 16:00 UTC  (29+ messages)
` [PATCH v2 06/15] KVM: x86/mmu: Support GFN direct mask
` [PATCH v2 09/15] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
` [PATCH v2 11/15] KVM: x86/tdp_mmu: Reflect tearing down mirror page tables
` [PATCH v2 13/15] KVM: x86/tdp_mmu: Make mmu notifier callbacks to check kvm_process
` [PATCH v2 15/15] KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU

[PATCH] crypto: qat - fix linking errors when PCI_IOV is disabled
 2024-06-10 14:37 UTC 

[PATCH v3 00/43] arm64: Support for Arm CCA in KVM
 2024-06-10 13:42 UTC  (44+ messages)
` [PATCH v3 01/43] KVM: Prepare for handling only shared mappings in mmu_notifier events
` [PATCH v3 02/43] kvm: arm64: pgtable: Track the number of pages in the entry level
` [PATCH v3 03/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v3 04/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v3 05/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v3 06/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v3 07/43] arm64: RME: Check for RME support at KVM init
` [PATCH v3 08/43] arm64: RME: Define the user ABI
` [PATCH v3 09/43] arm64: RME: ioctls to create and configure realms
` [PATCH v3 10/43] kvm: arm64: Expose debug HW register numbers for Realm
` [PATCH v3 11/43] arm64: kvm: Allow passing machine type in KVM creation
` [PATCH v3 12/43] arm64: RME: Keep a spare page delegated to the RMM
` [PATCH v3 13/43] arm64: RME: RTT tear down
` [PATCH v3 14/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v3 15/43] arm64: RME: Support for the VGIC in realms
` [PATCH v3 16/43] KVM: arm64: Support timers in realm RECs
` [PATCH v3 17/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v3 18/43] arm64: RME: Handle realm enter/exit
` [PATCH v3 19/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v3 20/43] arm64: RME: Allow populating initial contents
` [PATCH v3 21/43] arm64: RME: Runtime faulting of memory
` [PATCH v3 22/43] KVM: arm64: Handle realm VCPU load
` [PATCH v3 23/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v3 24/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v3 25/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v3 26/43] arm64: Don't expose stolen time for realm guests
` [PATCH v3 27/43] arm64: rme: allow userspace to inject aborts
` [PATCH v3 28/43] arm64: rme: support RSI_HOST_CALL
` [PATCH v3 29/43] arm64: rme: Allow checking SVE on VM instance
` [PATCH v3 30/43] arm64: RME: Always use 4k pages for realms
` [PATCH v3 31/43] arm64: rme: Prevent Device mappings for Realms
` [PATCH v3 32/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v3 33/43] arm64: rme: Enable PMU support with a realm guest
` [PATCH v3 34/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v3 35/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v3 36/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v3 37/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v3 38/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v3 39/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v3 40/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v3 41/43] arm64: RME: Provide accurate register list
` [PATCH v3 42/43] arm64: kvm: Expose support for private memory
` [PATCH v3 43/43] KVM: arm64: Allow activating realms

[PATCH v8 00/10] x86/cpu: KVM: Clean up PAT and VMX macros
 2024-06-10 10:31 UTC  (3+ messages)
` [PATCH v8 01/10] x86/cpu: KVM: Add common defines for architectural memory types (PAT, MTRRs, etc.)

[PATCH v6 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
 2024-06-10 10:30 UTC  (12+ messages)
` [PATCH v6 01/10] x86/kexec/64: Disable kexec when SEV-ES is active
` [PATCH v6 02/10] x86/sev: Save and print negotiated GHCB protocol version
` [PATCH v6 03/10] x86/sev: Set GHCB data structure version
` [PATCH v6 04/10] x86/sev: Setup code to park APs in the AP Jump Table
` [PATCH v6 05/10] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
` [PATCH v6 06/10] x86/sev: Use AP Jump Table blob to stop CPU
` [PATCH v6 07/10] x86/sev: Add MMIO handling support to boot/compressed/ code
` [PATCH v6 08/10] x86/sev: Handle CLFLUSH MMIO events
` [PATCH v6 09/10] x86/kexec/64: Support kexec under SEV-ES with AP Jump Table Blob
` [PATCH v6 10/10] x86/sev: Exclude AP jump table related code for SEV-SNP guests

[PATCH v3 0/2] vfio/pci: add msi interrupt affinity support
 2024-06-10  8:21 UTC  (6+ messages)
` [PATCH v4 2/2] "

[PATCH v5 0/8] KVM: arm64: Add support for hypervisor kCFI
 2024-06-10  6:32 UTC  (9+ messages)
` [PATCH v5 1/8] KVM: arm64: Fix clobbered ELR in sync abort/SError
` [PATCH v5 2/8] KVM: arm64: Fix __pkvm_init_switch_pgd call ABI
` [PATCH v5 3/8] KVM: arm64: nVHE: Simplify invalid_host_el2_vect
` [PATCH v5 4/8] KVM: arm64: nVHE: gen-hyprel: Skip R_AARCH64_ABS32
` [PATCH v5 5/8] KVM: arm64: VHE: Mark __hyp_call_panic __noreturn
` [PATCH v5 6/8] arm64: Introduce esr_brk_comment, esr_is_cfi_brk
` [PATCH v5 7/8] KVM: arm64: Introduce print_nvhe_hyp_panic helper
` [PATCH v5 8/8] KVM: arm64: nVHE: Support CONFIG_CFI_CLANG at EL2

[PATCH v3 0/8] KVM: Register cpuhp/syscore callbacks when enabling virt
 2024-06-10  0:59 UTC  (12+ messages)
` [PATCH v3 1/8] KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock
` [PATCH v3 2/8] KVM: Register cpuhp and syscore callbacks when enabling hardware
` [PATCH v3 3/8] KVM: Rename functions related to enabling virtualization hardware
` [PATCH v3 4/8] KVM: Add a module param to allow enabling virtualization when KVM is loaded
` [PATCH v3 5/8] KVM: Add arch hooks for enabling/disabling virtualization
` [PATCH v3 6/8] x86/reboot: Unconditionally define cpu_emergency_virt_cb typedef
` [PATCH v3 7/8] KVM: x86: Register "emergency disable" callbacks when virt is enabled
` [PATCH v3 8/8] KVM: Enable virtualization at load/initialization by default

[PATCH 00/18] Introducing Core Building Blocks for Hyper-V VSM Emulation
 2024-06-09 15:49 UTC  (19+ messages)
` [PATCH 01/18] KVM: x86: hyper-v: Introduce XMM output support
` [PATCH 02/18] KVM: x86: hyper-v: Introduce helpers to check if VSM is exposed to guest
` [PATCH 03/18] hyperv-tlfs: Update struct hv_send_ipi{_ex}'s declarations
` [PATCH 04/18] KVM: x86: hyper-v: Introduce VTL awareness to Hyper-V's PV-IPIs
` [PATCH 05/18] KVM: x86: hyper-v: Introduce MP_STATE_HV_INACTIVE_VTL
` [PATCH 06/18] KVM: x86: hyper-v: Exit on Get/SetVpRegisters hcall
` [PATCH 07/18] KVM: x86: hyper-v: Exit on TranslateVirtualAddress hcall
` [PATCH 08/18] KVM: x86: hyper-v: Exit on StartVirtualProcessor and GetVpIndexFromApicId hcalls
` [PATCH 09/18] KVM: Define and communicate KVM_EXIT_MEMORY_FAULT RWX flags to userspace
` [PATCH 10/18] KVM: x86: Keep track of instruction length during faults
` [PATCH 11/18] KVM: x86: Pass the instruction length on memory fault user-space exits
` [PATCH 12/18] KVM: x86/mmu: Introduce infrastructure to handle non-executable mappings
` [PATCH 13/18] KVM: x86/mmu: Avoid warning when installing non-private memory attributes
` [PATCH 14/18] KVM: x86/mmu: Init memslot if memory attributes available
` [PATCH 15/18] KVM: Introduce RWX memory attributes
` [PATCH 16/18] KVM: x86: Take mem attributes into account when faulting memory
` [PATCH 17/18] KVM: Introduce traces to track memory attributes modification
` [PATCH 18/18] KVM: x86: hyper-v: Handle VSM hcalls in user-space

[PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
 2024-06-09  8:27 UTC  (2+ messages)
` [PATCH 03/14] KVM: PPC: "

[PATCH V7 0/2] KVM: x86: Make bus clock frequency for vAPIC timer configurable
 2024-06-08 15:12 UTC  (3+ messages)
` [PATCH V7 1/2] KVM: selftests: Add x86_64 guest udelay() utility

[PATCH] KVM: x86/mmu: Rephrase comment about synthetic PFERR flags in #PF handler
 2024-06-08  0:11 UTC 

[PATCH] KVM: VMX: Remove unnecessary INVEPT[GLOBAL] from hardware enable path
 2024-06-08  0:10 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox