messages from 2024-10-07 10:22:20 to 2024-10-09 15:05:02 UTC [more...]
[PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
2024-10-09 15:04 UTC (3+ messages)
` [PATCH 1/6] KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
` [PATCH 2/6] KVM: Verify there's at least one online vCPU when iterating over all vCPUs
[PATCH 00/25] TDX vCPU/VM creation
2024-10-09 15:01 UTC (4+ messages)
` [PATCH 18/25] KVM: TDX: Do TDX specific vcpu initialization
[PATCH] KVM: selftests: memslot_perf_test: increase guest sync timeout
2024-10-09 14:58 UTC (3+ messages)
[PATCH] KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
2024-10-09 14:08 UTC
[PATCH RFC v5 00/10] tun: Introduce virtio-net hashing feature
2024-10-09 13:57 UTC (17+ messages)
` [PATCH RFC v5 01/10] virtio_net: Add functions for hashing
` [PATCH RFC v5 02/10] skbuff: Introduce SKB_EXT_TUN_VNET_HASH
` [PATCH RFC v5 03/10] net: flow_dissector: Export flow_keys_dissector_symmetric
` [PATCH RFC v5 04/10] tun: Unify vnet implementation
` [PATCH RFC v5 05/10] tun: Pad virtio header with zero
` [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
` [PATCH RFC v5 07/10] tun: Introduce virtio-net RSS
` [PATCH RFC v5 08/10] selftest: tun: Test vnet ioctls without device
` [PATCH RFC v5 09/10] selftest: tun: Add tests for virtio-net hashing
` [PATCH RFC v5 10/10] vhost/net: Support VIRTIO_NET_F_HASH_REPORT
[RFC 00/14] AMD: Add Secure AVIC Guest Support
2024-10-09 13:53 UTC (18+ messages)
` [RFC 01/14] x86/apic: Add new driver for Secure AVIC
[RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
2024-10-09 13:52 UTC (8+ messages)
[PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
2024-10-09 13:14 UTC (14+ messages)
[PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
2024-10-09 13:05 UTC (5+ messages)
[RFC PATCH 00/13] Support iommu(fd) persistence for live update
2024-10-09 12:28 UTC (11+ messages)
` [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
KVM default behavior change on module loading in kernel 6.12
2024-10-09 12:17 UTC (2+ messages)
[PATCH v4 0/8] TDX host: metadata reading tweaks, bug fix and info dump
2024-10-09 11:10 UTC (14+ messages)
` [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
[RFC PATCH 00/13] Remove implicit devres from pci_intx()
2024-10-09 10:55 UTC (20+ messages)
` [RFC PATCH 01/13] PCI: Prepare removing "
` [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
` [RFC PATCH 03/13] drivers/xen: Use never-managed version of pci_intx()
` [RFC PATCH 04/13] net/ethernet: "
` [RFC PATCH 05/13] net/ntb: "
` [RFC PATCH 06/13] misc: "
` [RFC PATCH 07/13] vfio/pci: "
` [RFC PATCH 08/13] PCI: MSI: "
` [RFC PATCH 09/13] ata: Use always-managed "
` [RFC PATCH 10/13] staging: rts5280: "
` [RFC PATCH 11/13] wifi: qtnfmac: use always-managed version of pcim_intx()
` [RFC PATCH 12/13] HID: amd_sfh: Use "
` [RFC PATCH 13/13] Remove devres from pci_intx()
[PATCH v2 1/1] x86: Add support save/load HWCR MSR
2024-10-09 9:51 UTC
[PATCH v12 00/19] Add Secure TSC support for SNP guests
2024-10-09 9:28 UTC (20+ messages)
` [PATCH v12 01/19] virt: sev-guest: Use AES GCM crypto library
` [PATCH v12 02/19] x86/sev: Handle failures from snp_init()
` [PATCH v12 03/19] x86/sev: Cache the secrets page address
` [PATCH v12 04/19] virt: sev-guest: Consolidate SNP guest messaging parameters to a struct
` [PATCH v12 05/19] virt: sev-guest: Reduce the scope of SNP command mutex
` [PATCH v12 06/19] virt: sev-guest: Carve out SNP message context structure
` [PATCH v12 07/19] x86/sev: Carve out and export SNP guest messaging init routines
` [PATCH v12 08/19] x86/sev: Relocate SNP guest messaging routines to common code
` [PATCH v12 09/19] x86/cc: Add CC_ATTR_GUEST_SNP_SECURE_TSC
` [PATCH v12 10/19] x86/sev: Add Secure TSC support for SNP guests
` [PATCH v12 11/19] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v12 12/19] x86/sev: Prevent RDTSC/RDTSCP interception "
` [PATCH v12 13/19] x86/sev: Mark Secure TSC as reliable clocksource
` [PATCH v12 14/19] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
` [PATCH v12 15/19] tsc: Upgrade TSC clocksource rating
` [PATCH v12 16/19] x86/kvmclock: Use clock source callback to update kvm sched clock
` [PATCH v12 17/19] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
` [PATCH v12 18/19] x86/cpu/amd: Do not print FW_BUG for Secure TSC
` [PATCH v12 19/19] x86/sev: Allow Secure TSC feature for SNP guests
[PATCH v1 1/1] x86: Add support save/load HWCR MSR
2024-10-09 8:59 UTC
[PATCH v1 1/1] x86: Add support save/load HWCR MSR
2024-10-09 8:52 UTC (3+ messages)
[PATCH v5 0/4] selftests: kvm: s390: Add ucontrol memory selftests
2024-10-09 8:13 UTC (9+ messages)
` [PATCH v5 1/4] selftests: kvm: s390: Add uc_map_unmap VM test case
` [PATCH v5 2/4] selftests: kvm: s390: Add uc_skey "
` [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
` [PATCH v5 4/4] selftests: kvm: s390: Fix whitespace confusion in ucontrol test
[PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
2024-10-09 8:12 UTC
[BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
2024-10-09 8:05 UTC (12+ messages)
[PATCH v5 42/43] arm64: kvm: Expose support for private memory
2024-10-09 7:03 UTC (2+ messages)
[PATCH v3 0/2] KVM: x86: Check hypercall's exit to userspace generically
2024-10-09 6:49 UTC (6+ messages)
` [PATCH v3 1/2] "
` [PATCH v3 2/2] KVM: x86: Use user_exit_on_hypercall() instead of opencode
[kvm-unit-tests PATCH 0/5] nVMX: Simple posted interrupts test
2024-10-09 6:48 UTC (2+ messages)
[RFC v2 00/12] Introduce Hybrid CPU Topology via Custom Topology Tree
2024-10-09 6:51 UTC (15+ messages)
` [RFC v2 01/12] qdev: Allow qdev_device_add() to add specific category device
` [RFC v2 03/12] system/vl: Create CPU topology devices from CLI early
` [RFC v2 05/12] hw/core/machine: Introduce custom CPU topology with max limitations
[PATCH v8 00/11] Enable haltpoll on arm64
2024-10-09 2:37 UTC (2+ messages)
[Bug 219009] New: Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
2024-10-08 21:35 UTC (8+ messages)
` [Bug 219009] "
[PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
2024-10-08 20:02 UTC (13+ messages)
[PATCH 0/5] KVM: x86: Fastpath cleanup, fix, and enhancement
2024-10-08 17:39 UTC (4+ messages)
` [PATCH 5/5] KVM: x86: Add fastpath handling of HLT VM-Exits
[PATCH] KVM: SVM: Increase X2AVIC limit to 4096 vcpus
2024-10-08 17:11 UTC
[PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
2024-10-08 16:36 UTC (2+ messages)
[PATCH v5 00/43] arm64: Support for Arm CCA in KVM
2024-10-08 16:31 UTC (8+ messages)
` [PATCH v5 07/43] arm64: RME: Check for RME support at KVM init
` [PATCH v5 09/43] arm64: RME: ioctls to create and configure realms
` [PATCH v5 19/43] KVM: arm64: Handle realm MMIO emulation
[PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
2024-10-08 14:51 UTC (11+ messages)
[RFC PATCH 00/28] x86: Rely on toolchain for relocatable code
2024-10-08 14:36 UTC (6+ messages)
` [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
[PATCH 1/1] s390/virtio_ccw: fix dma_parm pointer not set up
2024-10-08 11:50 UTC (5+ messages)
[PATCH net-next v20 04/14] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
2024-10-08 11:20 UTC
[PATCH v6 00/11] arm64: Support for running as a guest in Arm CCA
2024-10-08 11:05 UTC (24+ messages)
` [PATCH v6 01/11] arm64: rsi: Add RSI definitions
` [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v6 03/11] arm64: realm: Query IPA size from the RMM
` [PATCH v6 04/11] arm64: rsi: Add support for checking whether an MMIO is protected
` [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
` [PATCH v6 06/11] efi: arm64: Map Device with Prot Shared
` [PATCH v6 07/11] arm64: Enforce bounce buffers for realm DMA
` [PATCH v6 08/11] arm64: mm: Avoid TLBI when marking pages as valid
` [PATCH v6 09/11] arm64: Enable memory encrypt for Realms
` [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
` [PATCH v6 11/11] arm64: Document Arm Confidential Compute
[PATCH 0/2] Fixup two comments
2024-10-08 10:45 UTC (3+ messages)
` [PATCH 1/2] KVM: x86: Fix a comment inside kvm_vcpu_update_apicv()
` [PATCH 2/2] KVM: x86: Fix a comment inside __kvm_set_or_clear_apicv_inhibit()
[RFC PATCH 0/6] Enable shared device assignment
2024-10-08 8:59 UTC (3+ messages)
[Bug 218025] New: Assertion Failure happens in kvm selftest vmx_preemption_timer_test
2024-10-08 8:30 UTC (2+ messages)
` [Bug 218025] "
[PATCH v1 0/3] vfio/nvgrace-gpu: Enable grace blackwell boards
2024-10-08 7:22 UTC (5+ messages)
[PATCH 1/1] target/riscv: enable floating point unit
2024-10-08 0:45 UTC (8+ messages)
[GIT PULL] virtio: bugfixes
2024-10-07 18:37 UTC (2+ messages)
[PATCH v4 0/3] Distinguish between variants of IBPB
2024-10-07 17:38 UTC (4+ messages)
` [PATCH v4 1/3] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
[PATCH 0/5] Add new headers for Hyper-V Dom0
2024-10-07 16:26 UTC (6+ messages)
` [PATCH 1/5] hyperv: Move hv_connection_id to hyperv-tlfs.h
` [PATCH 2/5] hyperv: Remove unnecessary #includes
[PATCH] vsock/virtio: use GFP_ATOMIC under RCU read lock
2024-10-07 15:46 UTC (3+ messages)
[PATCH 0/5] KVM: VMX: Drop MTRR virtualization, honor guest PAT
2024-10-07 14:04 UTC (6+ messages)
` [PATCH 5/5] KVM: VMX: Always honor guest PAT on CPUs that support self-snoop
[PATCH v2 0/7] Introduce SMP Cache Topology
2024-10-07 11:53 UTC (13+ messages)
` [PATCH v2 2/7] qapi/qom: Define cache enumeration and properties
` [PATCH v2 3/7] hw/core: Add smp cache topology for machine
` [PATCH v2 4/7] hw/core: Check smp cache topology support "
` [PATCH v2 5/7] i386/cpu: Support thread and module level cache topology
` [PATCH v2 6/7] i386/cpu: Update cache topology with machine's configuration
` [PATCH v2 7/7] i386/pc: Support cache topology in -machine for PC machine
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox