messages from 2024-10-09 06:48:33 to 2024-10-10 07:12:35 UTC [more...]
[kvm-unit-tests PATCH v4 0/2] s390x: add tests for diag258
2024-10-10 7:11 UTC (3+ messages)
` [kvm-unit-tests PATCH v4 1/2] s390x: edat: move LC_SIZE to arch_def.h
` [kvm-unit-tests PATCH v4 2/2] s390x: add test for diag258
[PATCH 0/3] KVM: x86/mmu: Don't zap "direct" non-leaf SPTEs on memslot removal
2024-10-10 7:01 UTC (5+ messages)
` [PATCH 1/3] KVM: x86/mmu: Zap only SPs that shadow gPTEs when deleting memslot
` [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
` [PATCH 3/3] KVM: x86: Clean up documentation for KVM_X86_QUIRK_SLOT_ZAP_ALL
[PATCH v12 00/19] Add Secure TSC support for SNP guests
2024-10-10 6:44 UTC (25+ messages)
` [PATCH v12 01/19] virt: sev-guest: Use AES GCM crypto library
` [PATCH v12 02/19] x86/sev: Handle failures from snp_init()
` [PATCH v12 03/19] x86/sev: Cache the secrets page address
` [PATCH v12 04/19] virt: sev-guest: Consolidate SNP guest messaging parameters to a struct
` [PATCH v12 05/19] virt: sev-guest: Reduce the scope of SNP command mutex
` [PATCH v12 06/19] virt: sev-guest: Carve out SNP message context structure
` [PATCH v12 07/19] x86/sev: Carve out and export SNP guest messaging init routines
` [PATCH v12 08/19] x86/sev: Relocate SNP guest messaging routines to common code
` [PATCH v12 09/19] x86/cc: Add CC_ATTR_GUEST_SNP_SECURE_TSC
` [PATCH v12 10/19] x86/sev: Add Secure TSC support for SNP guests
` [PATCH v12 11/19] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v12 12/19] x86/sev: Prevent RDTSC/RDTSCP interception "
` [PATCH v12 13/19] x86/sev: Mark Secure TSC as reliable clocksource
` [PATCH v12 14/19] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
` [PATCH v12 15/19] tsc: Upgrade TSC clocksource rating
` [PATCH v12 16/19] x86/kvmclock: Use clock source callback to update kvm sched clock
` [PATCH v12 17/19] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
` [PATCH v12 18/19] x86/cpu/amd: Do not print FW_BUG for Secure TSC
` [PATCH v12 19/19] x86/sev: Allow Secure TSC feature for SNP guests
[PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
2024-10-10 5:33 UTC (9+ messages)
` [PATCH 1/6] KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()
` [PATCH 2/6] KVM: Verify there's at least one online vCPU when iterating over all vCPUs
` [PATCH 3/6] KVM: Grab vcpu->mutex across installing the vCPU's fd and bumping online_vcpus
` [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
` [PATCH 5/6] KVM: Don't BUG() the kernel if xa_insert() fails with -EBUSY
` [PATCH 6/6] KVM: Drop hack that "manually" informs lockdep of kvm->lock vs. vcpu->mutex
[PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
2024-10-10 5:23 UTC (11+ messages)
[RFC PATCH 00/13] Remove implicit devres from pci_intx()
2024-10-10 4:42 UTC (24+ messages)
` [RFC PATCH 01/13] PCI: Prepare removing "
` [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
` [RFC PATCH 03/13] drivers/xen: Use never-managed version of pci_intx()
` [RFC PATCH 04/13] net/ethernet: "
` [RFC PATCH 05/13] net/ntb: "
` [RFC PATCH 06/13] misc: "
` [RFC PATCH 07/13] vfio/pci: "
` [RFC PATCH 08/13] PCI: MSI: "
` [RFC PATCH 09/13] ata: Use always-managed "
` [RFC PATCH 10/13] staging: rts5280: "
` [RFC PATCH 11/13] wifi: qtnfmac: use always-managed version of pcim_intx()
` [RFC PATCH 12/13] HID: amd_sfh: Use "
` [RFC PATCH 13/13] Remove devres from pci_intx()
[PATCH 17/24] sched/fair: Implement delayed dequeue
2024-10-10 2:49 UTC
[PATCH v3 0/9] Initial support for SMMUv3 nested translation
2024-10-10 1:48 UTC (15+ messages)
` [PATCH v3 1/9] vfio: Remove VFIO_TYPE1_NESTING_IOMMU
` [PATCH v3 2/9] ACPICA: IORT: Update for revision E.f
` [PATCH v3 3/9] ACPI/IORT: Support CANWBS memory access flag
` [PATCH v3 4/9] iommu/arm-smmu-v3: Report IOMMU_CAP_ENFORCE_CACHE_COHERENCY for CANWBS
` [PATCH v3 5/9] iommu/arm-smmu-v3: Support IOMMU_GET_HW_INFO via struct arm_smmu_hw_info
` [PATCH v3 6/9] iommu/arm-smmu-v3: Implement IOMMU_HWPT_ALLOC_NEST_PARENT
` [PATCH v3 7/9] iommu/arm-smmu-v3: Expose the arm_smmu_attach interface
` [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
` [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
[PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
2024-10-09 21:02 UTC (13+ messages)
[PATCH v2 0/6] KVM: x86/mmu: Optimize TDP MMU huge page recovery during disable-dirty-log
2024-10-09 20:21 UTC (5+ messages)
` [PATCH v2 4/6] KVM: x86/mmu: Recover TDP MMU huge page mappings in-place instead of zapping
[PATCH RFC v2 0/5] mm: Introduce guest_memfd library
2024-10-09 20:14 UTC (3+ messages)
` [PATCH RFC v2 2/5] mm: guest_memfd: Allow folios to be accessible to host
[PATCH v4 00/36] KVM: arm64: Add EL2 support to FEAT_S1PIE/S1POE
2024-10-09 19:55 UTC (38+ messages)
` [PATCH v4 01/36] arm64: Drop SKL0/SKL1 from TCR2_EL2
` [PATCH v4 02/36] arm64: Remove VNCR definition for PIRE0_EL2
` [PATCH v4 03/36] arm64: Add encoding "
` [PATCH v4 04/36] KVM: arm64: Drop useless struct s2_mmu in __kvm_at_s1e2()
` [PATCH v4 05/36] KVM: arm64: nv: Add missing EL2->EL1 mappings in get_el2_to_el1_mapping()
` [PATCH v4 06/36] KVM: arm64: nv: Handle CNTHCTL_EL2 specially
` [PATCH v4 07/36] KVM: arm64: nv: Save/Restore vEL2 sysregs
` [PATCH v4 08/36] KVM: arm64: Correctly access TCR2_EL1, PIR_EL1, PIRE0_EL1 with VHE
` [PATCH v4 09/36] KVM: arm64: Extend masking facility to arbitrary registers
` [PATCH v4 10/36] arm64: Define ID_AA64MMFR1_EL1.HAFDBS advertising FEAT_HAFT
` [PATCH v4 11/36] KVM: arm64: Add TCR2_EL2 to the sysreg arrays
` [PATCH v4 12/36] KVM: arm64: Sanitise TCR2_EL2
` [PATCH v4 13/36] KVM: arm64: Add save/restore for TCR2_EL2
` [PATCH v4 14/36] KVM: arm64: Add PIR{,E0}_EL2 to the sysreg arrays
` [PATCH v4 15/36] KVM: arm64: Add save/restore for PIR{,E0}_EL2
` [PATCH v4 16/36] KVM: arm64: Handle PIR{,E0}_EL2 traps
` [PATCH v4 17/36] KVM: arm64: Sanitise ID_AA64MMFR3_EL1
` [PATCH v4 18/36] KVM: arm64: Add AT fast-path support for S1PIE
` [PATCH v4 19/36] KVM: arm64: Split S1 permission evaluation into direct and hierarchical parts
` [PATCH v4 20/36] KVM: arm64: Disable hierarchical permissions when S1PIE is enabled
` [PATCH v4 21/36] KVM: arm64: Implement AT S1PIE support
` [PATCH v4 22/36] KVM: arm64: Define helper for EL2 registers with custom visibility
` [PATCH v4 23/36] KVM: arm64: Hide TCR2_EL1 from userspace when disabled for guests
` [PATCH v4 24/36] KVM: arm64: Hide S1PIE registers "
` [PATCH v4 25/36] KVM: arm64: Rely on visibility to let PIR*_ELx/TCR2_ELx UNDEF
` [PATCH v4 26/36] arm64: Add encoding for POR_EL2
` [PATCH v4 27/36] KVM: arm64: Add a composite EL2 visibility helper
` [PATCH v4 28/36] KVM: arm64: Drop bogus CPTR_EL2.E0POE trap routing
` [PATCH v4 29/36] KVM: arm64: Subject S1PIE/S1POE registers to HCR_EL2.{TVM,TRVM}
` [PATCH v4 30/36] KVM: arm64: Add basic support for POR_EL2
` [PATCH v4 31/36] KVM: arm64: Add save/retore "
` [PATCH v4 32/36] KVM: arm64: Add POE save/restore for AT emulation fast-path
` [PATCH v4 33/36] KVM: arm64: Disable hierarchical permissions when POE is enabled
` [PATCH v4 34/36] KVM: arm64: Make PAN conditions part of the S1 walk context
` [PATCH v4 35/36] KVM: arm64: Handle stage-1 permission overlays
` [PATCH v4 36/36] KVM: arm64: Handle WXN attribute
[PATCH 0/7] KVM: x86: Clean up MSR_IA32_APICBASE_BASE code
2024-10-09 18:17 UTC (8+ messages)
` [PATCH 1/7] KVM: x86: Short-circuit all kvm_lapic_set_base() if MSR value isn't changing
` [PATCH 2/7] KVM: x86: Drop superfluous kvm_lapic_set_base() call when setting APIC state
` [PATCH 3/7] KVM: x86: Get vcpu->arch.apic_base directly and drop kvm_get_apic_base()
` [PATCH 4/7] KVM: x86: Inline kvm_get_apic_mode() in lapic.h
` [PATCH 5/7] KVM: x86: Move kvm_set_apic_base() implementation to lapic.c (from x86.c)
` [PATCH 6/7] KVM: x86: Rename APIC base setters to better capture their relationship
` [PATCH 7/7] KVM: x86: Make kvm_recalculate_apic_map() local to lapic.c
[RFC 00/14] AMD: Add Secure AVIC Guest Support
2024-10-09 17:52 UTC (23+ messages)
` [RFC 01/14] x86/apic: Add new driver for Secure AVIC
` [RFC 02/14] x86/apic: Initialize Secure AVIC APIC backing page
[PATCH v4 0/4] KVM: x86: Fix and harden reg caching from !TASK context
2024-10-09 17:50 UTC (5+ messages)
` [PATCH v4 1/4] KVM: x86: Bypass register cache when querying CPL from kvm_sched_out()
` [PATCH v4 2/4] KVM: VMX: reset the segment cache after segment init in vmx_vcpu_reset()
` [PATCH v4 3/4] KVM: x86: Add lockdep-guarded asserts on register cache usage
` [PATCH v4 4/4] KVM: x86: Use '0' for guest RIP if PMI encounters protected guest state
[PATCH v3 00/14] KVM: selftests: Morph max_guest_mem to mmu_stress
2024-10-09 15:49 UTC (15+ messages)
` [PATCH v3 01/14] KVM: Move KVM_REG_SIZE() definition to common uAPI header
` [PATCH v3 02/14] KVM: selftests: Disable strict aliasing
` [PATCH v3 03/14] KVM: selftests: Return a value from vcpu_get_reg() instead of using an out-param
` [PATCH v3 04/14] KVM: selftests: Assert that vcpu_{g,s}et_reg() won't truncate
` [PATCH v3 05/14] KVM: selftests: Check for a potential unhandled exception iff KVM_RUN succeeded
` [PATCH v3 06/14] KVM: selftests: Rename max_guest_memory_test to mmu_stress_test
` [PATCH v3 07/14] KVM: selftests: Only muck with SREGS on x86 in mmu_stress_test
` [PATCH v3 08/14] KVM: selftests: Compute number of extra pages needed "
` [PATCH v3 09/14] KVM: sefltests: Explicitly include ucall_common.h in mmu_stress_test.c
` [PATCH v3 10/14] KVM: selftests: Enable mmu_stress_test on arm64
` [PATCH v3 11/14] KVM: selftests: Use vcpu_arch_put_guest() in mmu_stress_test
` [PATCH v3 12/14] KVM: selftests: Precisely limit the number of guest loops "
` [PATCH v3 13/14] KVM: selftests: Add a read-only mprotect() phase to mmu_stress_test
` [PATCH v3 14/14] KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)
[RFC RESEND 0/6] hugetlbfs largepage RAS project
2024-10-09 15:45 UTC (7+ messages)
[PATCH 00/25] TDX vCPU/VM creation
2024-10-09 15:01 UTC (4+ messages)
` [PATCH 18/25] KVM: TDX: Do TDX specific vcpu initialization
[PATCH] KVM: selftests: memslot_perf_test: increase guest sync timeout
2024-10-09 14:58 UTC (2+ messages)
[PATCH] KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory
2024-10-09 14:08 UTC
[PATCH RFC v5 00/10] tun: Introduce virtio-net hashing feature
2024-10-09 13:57 UTC (12+ messages)
` [PATCH RFC v5 01/10] virtio_net: Add functions for hashing
` [PATCH RFC v5 04/10] tun: Unify vnet implementation
` [PATCH RFC v5 05/10] tun: Pad virtio header with zero
` [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
` [PATCH RFC v5 07/10] tun: Introduce virtio-net RSS
[RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
2024-10-09 13:52 UTC (3+ messages)
[PATCH] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
2024-10-09 13:14 UTC (9+ messages)
[PATCH] KVM: x86/mmu: fix KVM_X86_QUIRK_SLOT_ZAP_ALL for shadow MMU
2024-10-09 13:05 UTC (4+ messages)
[RFC PATCH 00/13] Support iommu(fd) persistence for live update
2024-10-09 12:28 UTC (9+ messages)
` [RFC PATCH 05/13] iommufd: Serialise persisted iommufds and ioas
KVM default behavior change on module loading in kernel 6.12
2024-10-09 12:17 UTC (2+ messages)
[PATCH v4 0/8] TDX host: metadata reading tweaks, bug fix and info dump
2024-10-09 11:10 UTC (14+ messages)
` [PATCH v4 3/8] x86/virt/tdx: Prepare to support reading other global metadata fields
[PATCH v2 1/1] x86: Add support save/load HWCR MSR
2024-10-09 9:51 UTC
[PATCH v1 1/1] x86: Add support save/load HWCR MSR
2024-10-09 8:59 UTC
[PATCH v1 1/1] x86: Add support save/load HWCR MSR
2024-10-09 8:52 UTC (2+ messages)
[PATCH v5 0/4] selftests: kvm: s390: Add ucontrol memory selftests
2024-10-09 8:13 UTC (5+ messages)
` [PATCH v5 3/4] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
[PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
2024-10-09 8:12 UTC
[BUG] ARM64 KVM: Data abort executing post-indexed LDR on MMIO address
2024-10-09 8:05 UTC (12+ messages)
[PATCH v5 42/43] arm64: kvm: Expose support for private memory
2024-10-09 7:03 UTC (2+ messages)
[PATCH v3 0/2] KVM: x86: Check hypercall's exit to userspace generically
2024-10-09 6:49 UTC (5+ messages)
` [PATCH v3 1/2] "
` [PATCH v3 2/2] KVM: x86: Use user_exit_on_hypercall() instead of opencode
[kvm-unit-tests PATCH 0/5] nVMX: Simple posted interrupts test
2024-10-09 6:48 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox