messages from 2024-10-10 18:24:57 to 2024-10-12 10:28:31 UTC [more...]
[PATCH v3 0/7] Introduce SMP Cache Topology
2024-10-12 10:44 UTC
[PATCH RFC v5 00/10] tun: Introduce virtio-net hashing feature
2024-10-12 10:13 UTC (4+ messages)
` [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
[PATCH v5 0/5] Add PSCI v1.3 SYSTEM_OFF2 support for hibernation
2024-10-12 9:28 UTC (4+ messages)
` [PATCH v5 4/5] KVM: selftests: Add test for PSCI SYSTEM_OFF2
[PATCH v9 0/4] debugfs to hisilicon migration driver
2024-10-12 9:03 UTC (4+ messages)
` [PATCH v9 3/4] hisi_acc_vfio_pci: register debugfs for "
[kvm:kvm-coco-queue 62/109] arch/x86/kvm/mmu/tdp_mmu.c:474:14: sparse: sparse: incorrect type in argument 1 (different address spaces)
2024-10-12 8:09 UTC
[PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
2024-10-12 7:55 UTC (3+ messages)
` [PATCH 1/2] KVM: x86: Push down setting vcpu.arch.user_set_tsc
` [PATCH 2/2] KVM: x86: Don't allow tsc_offset, tsc_scaling_ratio to change
[PATCH v2 0/2] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
2024-10-12 7:39 UTC (3+ messages)
` [PATCH v2 1/2] KVM: x86/tdp_mmu: Add WARN_ON_ONCE() in tdp_mmu_map_handle_target_level()
` [PATCH v2 2/2] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
[PATCH v3 01/11] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
2024-10-12 6:12 UTC (2+ messages)
[PATCH v6 00/11] arm64: Support for running as a guest in Arm CCA
2024-10-12 6:06 UTC (27+ messages)
` [PATCH v6 01/11] arm64: rsi: Add RSI definitions
` [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v6 04/11] arm64: rsi: Add support for checking whether an MMIO is protected
` [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
` [PATCH v6 06/11] efi: arm64: Map Device with Prot Shared
` [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
` [PATCH v6 11/11] arm64: Document Arm Confidential Compute
Proposal: bi-weekly guest_memfd upstream call
2024-10-12 3:58 UTC (5+ messages)
[PATCH 0/3] Handle MMIO during event delivery error on SVM
2024-10-12 0:21 UTC (8+ messages)
` [PATCH 1/3] KVM: x86, vmx: Add function for event delivery error generation
` [PATCH 2/3] KVM: vmx, svm, mmu: Process MMIO during event delivery
` [PATCH 3/3] selftests: KVM: Add test case for "
[kvm:kvm-coco-queue 60/109] arch/x86/kvm/mmu/tdp_mmu.c:1176:25: sparse: sparse: incorrect type in argument 1 (different address spaces)
2024-10-12 0:10 UTC
[RFC PATCH 00/39] 1G page support for guest_memfd
2024-10-11 23:32 UTC (4+ messages)
` [RFC PATCH 26/39] KVM: guest_memfd: Track faultability within a struct kvm_gmem_private
[RFC 0/1] Introduce vfio-cxl to support CXL type-2 device passthrough
2024-10-11 21:47 UTC (3+ messages)
` [RFC 1/1] vfio: support CXL device in VFIO stub
[PATCH v5 0/4] Distinguish between variants of IBPB
2024-10-11 21:43 UTC (5+ messages)
` [PATCH v5 1/4] x86/cpufeatures: Clarify semantics of X86_FEATURE_IBPB
` [PATCH v5 2/4] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
` [PATCH v5 3/4] KVM: x86: Advertise AMD_IBPB_RET to userspace
` [PATCH v5 4/4] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB
[PATCH 0/3] KVM: x86/mmu: Don't zap "direct" non-leaf SPTEs on memslot removal
2024-10-11 21:22 UTC (6+ messages)
` [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()
[RFC 00/13] vfio: introduce vfio-cxl to support CXL type-2 accelerator passthrough
2024-10-11 21:14 UTC (11+ messages)
` [RFC 04/13] vfio: introduce vfio-cxl core preludes
` [RFC 05/13] vfio/cxl: expose CXL region to the usersapce via a new VFIO device region
` [RFC 09/13] vfio/pci: introduce CXL device awareness
` [RFC 10/13] vfio/pci: emulate CXL DVSEC registers in the configuration space
` [RFC 11/13] vfio/cxl: introduce VFIO CXL device cap
[RFC PATCH v3 00/58] Mediated Passthrough vPMU 3.0 for x86
2024-10-11 19:49 UTC (11+ messages)
` [RFC PATCH v3 07/58] perf: Skip pmu_ctx based on event_type
` [RFC PATCH v3 08/58] perf: Clean up perf ctx time
` [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
Proposal: bi-weekly guest_memfd upstream call
2024-10-11 17:48 UTC (4+ messages)
[PATCH v2 0/3] Add SEV-SNP CipherTextHiding feature support
2024-10-11 16:10 UTC (6+ messages)
` [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
[PATCH v3 0/9] Initial support for SMMUv3 nested translation
2024-10-11 14:00 UTC (7+ messages)
` [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
` [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains
[RFC PATCH 00/13] Remove implicit devres from pci_intx()
2024-10-11 13:50 UTC (16+ messages)
` [RFC PATCH 01/13] PCI: Prepare removing "
` [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
` [RFC PATCH 13/13] Remove devres from pci_intx()
[GIT PULL] KVM/arm64 fixes for 6.12, take #2
2024-10-11 13:27 UTC
[PATCH v1 0/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
2024-10-11 11:43 UTC (10+ messages)
` [PATCH v1 1/2] mm: huge_memory: add vma_thp_disabled() and thp_disabled_by_hw()
` [PATCH v1 2/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
[RFC] powerpc/kvm: Fix spinlock member access for PREEMPT_RT
2024-10-11 10:08 UTC (5+ messages)
[PATCH] accel/kvm: check for KVM_CAP_READONLY_MEM on VM
2024-10-11 8:51 UTC (3+ messages)
` Ping: "
[RFC 00/14] AMD: Add Secure AVIC Guest Support
2024-10-11 7:29 UTC (9+ messages)
` [RFC 01/14] x86/apic: Add new driver for Secure AVIC
[PATCH v2 1/1] x86: Add support save/load HWCR MSR
2024-10-11 4:26 UTC (2+ messages)
[PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
2024-10-11 4:22 UTC (3+ messages)
[PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
2024-10-11 2:30 UTC (14+ messages)
[PATCH 00/18] KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
2024-10-11 2:10 UTC (19+ messages)
` [PATCH 01/18] KVM: x86/mmu: Flush remote TLBs iff MMU-writable flag is cleared from RO SPTE
` [PATCH 02/18] KVM: x86/mmu: Always set SPTE's dirty bit if it's created as writable
` [PATCH 03/18] KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else
` [PATCH 04/18] KVM: x86/mmu: Don't force flush if SPTE update clears Accessed bit
` [PATCH 05/18] KVM: x86/mmu: Don't flush TLBs when clearing Dirty bit in shadow MMU
` [PATCH 06/18] KVM: x86/mmu: Drop ignored return value from kvm_tdp_mmu_clear_dirty_slot()
` [PATCH 07/18] KVM: x86/mmu: Fold mmu_spte_update_no_track() into mmu_spte_update()
` [PATCH 08/18] KVM: x86/mmu: WARN and flush if resolving a TDP MMU fault clears MMU-writable
` [PATCH 09/18] KVM: x86/mmu: Add a dedicated flag to track if A/D bits are globally enabled
` [PATCH 10/18] KVM: x86/mmu: Set shadow_accessed_mask for EPT even if A/D bits disabled
` [PATCH 11/18] KVM: x86/mmu: Set shadow_dirty_mask "
` [PATCH 12/18] KVM: x86/mmu: Use Accessed bit even when _hardware_ A/D bits are disabled
` [PATCH 13/18] KVM: x86/mmu: Process only valid TDP MMU roots when aging a gfn range
` [PATCH 14/18] KVM: x86/mmu: Stop processing TDP MMU roots for test_age if young SPTE found
` [PATCH 15/18] KVM: x86/mmu: Dedup logic for detecting TLB flushes on leaf SPTE changes
` [PATCH 16/18] KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bits are disabled
` [PATCH 17/18] KVM: Allow arch code to elide TLB flushes when aging a young page
` [PATCH 18/18] KVM: x86: Don't emit TLB flushes when aging SPTEs for mmu_notifiers
[PATCH 0/5] Add new headers for Hyper-V Dom0
2024-10-11 1:34 UTC (6+ messages)
` [PATCH 3/5] hyperv: Add new Hyper-V headers
` [EXTERNAL] "
` [EXTERNAL] RE: [PATCH 0/5] Add new headers for Hyper-V Dom0
[PATCH kvmtool] riscv: Use the count parameter of term_putc in SBI_EXT_DBCN_CONSOLE_WRITE
2024-10-10 23:29 UTC
[PATCH RFC v2 0/5] mm: Introduce guest_memfd library
2024-10-10 21:20 UTC (3+ messages)
[RFC RESEND 0/6] hugetlbfs largepage RAS project
2024-10-10 20:35 UTC (8+ messages)
[PATCH v12 00/19] Add Secure TSC support for SNP guests
2024-10-10 19:49 UTC (9+ messages)
` [PATCH v12 05/19] virt: sev-guest: Reduce the scope of SNP command mutex
` [PATCH v12 09/19] x86/cc: Add CC_ATTR_GUEST_SNP_SECURE_TSC
` [PATCH v12 14/19] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
` [PATCH v12 17/19] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
[RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
2024-10-10 19:27 UTC (2+ messages)
[PATCH v13 00/85] KVM: Stop grabbing references to PFNMAP'd pages
2024-10-10 18:24 UTC (83+ messages)
` [PATCH v13 04/85] KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE
` [PATCH v13 05/85] KVM: x86/mmu: Don't overwrite shadow-present MMU SPTEs when prefaulting
` [PATCH v13 06/85] KVM: x86/mmu: Invert @can_unsync and renamed to @synchronizing
` [PATCH v13 07/85] KVM: x86/mmu: Mark new SPTE as Accessed when synchronizing existing SPTE
` [PATCH v13 08/85] KVM: x86/mmu: Mark folio dirty when creating SPTE, not when zapping/modifying
` [PATCH v13 09/85] KVM: x86/mmu: Mark page/folio accessed only when zapping leaf SPTEs
` [PATCH v13 10/85] KVM: x86/mmu: Use gfn_to_page_many_atomic() when prefetching indirect PTEs
` [PATCH v13 11/85] KVM: Rename gfn_to_page_many_atomic() to kvm_prefetch_pages()
` [PATCH v13 12/85] KVM: Drop @atomic param from gfn=>pfn and hva=>pfn APIs
` [PATCH v13 13/85] KVM: Annotate that all paths in hva_to_pfn() might sleep
` [PATCH v13 14/85] KVM: Return ERR_SIGPENDING from hva_to_pfn() if GUP returns -EGAIN
` [PATCH v13 15/85] KVM: Drop extra GUP (via check_user_page_hwpoison()) to detect poisoned page
` [PATCH v13 16/85] KVM: Replace "async" pointer in gfn=>pfn with "no_wait" and error code
` [PATCH v13 17/85] KVM: x86/mmu: Drop kvm_page_fault.hva, i.e. don't track intermediate hva
` [PATCH v13 18/85] KVM: Drop unused "hva" pointer from __gfn_to_pfn_memslot()
` [PATCH v13 19/85] KVM: Introduce kvm_follow_pfn() to eventually replace "gfn_to_pfn" APIs
` [PATCH v13 20/85] KVM: Remove pointless sanity check on @map param to kvm_vcpu_(un)map()
` [PATCH v13 21/85] KVM: Explicitly initialize all fields at the start of kvm_vcpu_map()
` [PATCH v13 22/85] KVM: Use NULL for struct page pointer to indicate mremapped memory
` [PATCH v13 23/85] KVM: nVMX: Rely on kvm_vcpu_unmap() to track validity of eVMCS mapping
` [PATCH v13 24/85] KVM: nVMX: Drop pointless msr_bitmap_map field from struct nested_vmx
` [PATCH v13 25/85] KVM: nVMX: Add helper to put (unmap) vmcs12 pages
` [PATCH v13 26/85] KVM: Use plain "struct page" pointer instead of single-entry array
` [PATCH v13 27/85] KVM: Provide refcounted page as output field in struct kvm_follow_pfn
` [PATCH v13 28/85] KVM: Move kvm_{set,release}_page_{clean,dirty}() helpers up in kvm_main.c
` [PATCH v13 29/85] KVM: pfncache: Precisely track refcounted pages
` [PATCH v13 30/85] KVM: Migrate kvm_vcpu_map() to kvm_follow_pfn()
` [PATCH v13 31/85] KVM: Pin (as in FOLL_PIN) pages during kvm_vcpu_map()
` [PATCH v13 32/85] KVM: nVMX: Mark vmcs12's APIC access page dirty when unmapping
` [PATCH v13 33/85] KVM: Pass in write/dirty to kvm_vcpu_map(), not kvm_vcpu_unmap()
` [PATCH v13 34/85] KVM: Get writable mapping for __kvm_vcpu_map() only when necessary
` [PATCH v13 35/85] KVM: Disallow direct access (w/o mmu_notifier) to unpinned pfn by default
` [PATCH v13 36/85] KVM: x86: Don't fault-in APIC access page during initial allocation
` [PATCH v13 37/85] KVM: x86/mmu: Add "mmu" prefix fault-in helpers to free up generic names
` [PATCH v13 38/85] KVM: x86/mmu: Put direct prefetched pages via kvm_release_page_clean()
` [PATCH v13 39/85] KVM: x86/mmu: Add common helper to handle prefetching SPTEs
` [PATCH v13 40/85] KVM: x86/mmu: Add helper to "finish" handling a guest page fault
` [PATCH v13 41/85] KVM: x86/mmu: Mark pages/folios dirty at the origin of make_spte()
` [PATCH v13 42/85] KVM: Move declarations of memslot accessors up in kvm_host.h
` [PATCH v13 43/85] KVM: Add kvm_faultin_pfn() to specifically service guest page faults
` [PATCH v13 44/85] KVM: x86/mmu: Convert page fault paths to kvm_faultin_pfn()
` [PATCH v13 45/85] KVM: guest_memfd: Pass index, not gfn, to __kvm_gmem_get_pfn()
` [PATCH v13 46/85] KVM: guest_memfd: Provide "struct page" as output from kvm_gmem_get_pfn()
` [PATCH v13 47/85] KVM: x86/mmu: Put refcounted pages instead of blindly releasing pfns
` [PATCH v13 48/85] KVM: x86/mmu: Don't mark unused faultin pages as accessed
` [PATCH v13 49/85] KVM: Move x86's API to release a faultin page to common KVM
` [PATCH v13 50/85] KVM: VMX: Hold mmu_lock until page is released when updating APIC access page
` [PATCH v13 51/85] KVM: VMX: Use __kvm_faultin_page() to get APIC access page/pfn
` [PATCH v13 52/85] KVM: PPC: e500: Mark "struct page" dirty in kvmppc_e500_shadow_map()
` [PATCH v13 53/85] KVM: PPC: e500: Mark "struct page" pfn accessed before dropping mmu_lock
` [PATCH v13 54/85] KVM: PPC: e500: Use __kvm_faultin_pfn() to handle page faults
` [PATCH v13 55/85] KVM: arm64: Mark "struct page" pfns accessed/dirty before dropping mmu_lock
` [PATCH v13 56/85] KVM: arm64: Use __kvm_faultin_pfn() to handle memory aborts
` [PATCH v13 57/85] KVM: RISC-V: Mark "struct page" pfns dirty iff a stage-2 PTE is installed
` [PATCH v13 58/85] KVM: RISC-V: Mark "struct page" pfns accessed before dropping mmu_lock
` [PATCH v13 59/85] KVM: RISC-V: Use kvm_faultin_pfn() when mapping pfns into the guest
` [PATCH v13 60/85] KVM: PPC: Use __kvm_faultin_pfn() to handle page faults on Book3s HV
` [PATCH v13 61/85] KVM: PPC: Use __kvm_faultin_pfn() to handle page faults on Book3s Radix
` [PATCH v13 62/85] KVM: PPC: Drop unused @kvm_ro param from kvmppc_book3s_instantiate_page()
` [PATCH v13 63/85] KVM: PPC: Book3S: Mark "struct page" pfns dirty/accessed after installing PTE
` [PATCH v13 64/85] KVM: PPC: Use kvm_faultin_pfn() to handle page faults on Book3s PR
` [PATCH v13 65/85] KVM: LoongArch: Mark "struct page" pfns dirty only in "slow" page fault path
` [PATCH v13 66/85] KVM: LoongArch: Mark "struct page" pfns accessed "
` [PATCH v13 67/85] KVM: LoongArch: Mark "struct page" pfn accessed before dropping mmu_lock
` [PATCH v13 68/85] KVM: LoongArch: Use kvm_faultin_pfn() to map pfns into the guest
` [PATCH v13 69/85] KVM: MIPS: Mark "struct page" pfns dirty only in "slow" page fault path
` [PATCH v13 70/85] KVM: MIPS: Mark "struct page" pfns accessed "
` [PATCH v13 71/85] KVM: MIPS: Mark "struct page" pfns accessed prior to dropping mmu_lock
` [PATCH v13 72/85] KVM: MIPS: Use kvm_faultin_pfn() to map pfns into the guest
` [PATCH v13 73/85] KVM: PPC: Remove extra get_page() to fix page refcount leak
` [PATCH v13 74/85] KVM: PPC: Use kvm_vcpu_map() to map guest memory to patch dcbz instructions
` [PATCH v13 75/85] KVM: Convert gfn_to_page() to use kvm_follow_pfn()
` [PATCH v13 76/85] KVM: Add support for read-only usage of gfn_to_page()
` [PATCH v13 77/85] KVM: arm64: Use __gfn_to_page() when copying MTE tags to/from userspace
` [PATCH v13 78/85] KVM: PPC: Explicitly require struct page memory for Ultravisor sharing
` [PATCH v13 79/85] KVM: Drop gfn_to_pfn() APIs now that all users are gone
` [PATCH v13 80/85] KVM: s390: Use kvm_release_page_dirty() to unpin "struct page" memory
` [PATCH v13 81/85] KVM: Make kvm_follow_pfn.refcounted_page a required field
` [PATCH v13 82/85] KVM: x86/mmu: Don't mark "struct page" accessed when zapping SPTEs
` [PATCH v13 83/85] KVM: arm64: Don't mark "struct page" accessed when making SPTE young
` [PATCH v13 84/85] KVM: Drop APIs that manipulate "struct page" via pfns
` [PATCH v13 85/85] KVM: Don't grab reference on VM_MIXEDMAP pfns that have a "struct page"
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox