messages from 2024-11-27 20:19:51 to 2024-11-30 23:43:01 UTC [more...]
[GIT PULL] Second batch of KVM changes for Linux 6.13
2024-11-30 23:42 UTC (5+ messages)
[PATCH v3 0/7] Add SEV-SNP restricted injection hypervisor support
2024-11-30 21:02 UTC (10+ messages)
` [PATCH v3 1/7] x86/sev: Define the #HV doorbell page structure
` [PATCH v3 2/7] KVM: SVM: Add support for the SEV-SNP #HV doorbell page NAE event
` [PATCH v3 3/7] KVM: SVM: Inject #HV when restricted injection is active
` [PATCH v3 4/7] KVM: SVM: Inject NMIs "
` [PATCH v3 5/7] KVM: SVM: Inject MCEs "
` [PATCH v3 6/7] KVM: SVM: Add support for the SEV-SNP #HV IPI NAE event
` [PATCH v3 7/7] KVM: SVM: Enable restricted injection for an SEV-SNP guest
[PATCH] net: mana: Fix memory leak in mana_gd_setup_irqs
2024-11-30 18:37 UTC (4+ messages)
[PATCH v2 0/2] x86/bugs: RSB tweaks
2024-11-30 15:31 UTC (6+ messages)
` [PATCH v2 1/2] x86/bugs: Don't fill RSB on VMEXIT with eIBRS+retpoline
` [RFC PATCH v3 0/2] Add support for the ERAPS feature
` [RFC PATCH v3 1/2] x86: cpu/bugs: add AMD ERAPS support; hardware flushes RSB
` [RFC PATCH v3 2/2] x86: kvm: svm: advertise ERAPS (larger RSB) support to guests
[PATCH 6.6] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn()
2024-11-30 13:27 UTC
[RFC PATCH v3 00/15] context_tracking,x86: Defer some IPIs until a user->kernel transition
2024-11-29 22:19 UTC (10+ messages)
` [RFC PATCH v3 11/15] context-tracking: Introduce work deferral infrastructure
[PATCH v4 00/12] Initial support for SMMUv3 nested translation
2024-11-29 15:06 UTC (4+ messages)
` [PATCH v4 08/12] iommu/arm-smmu-v3: Support IOMMU_VIOMMU_ALLOC
[PATCH v5 00/43] arm64: Support for Arm CCA in KVM
2024-11-29 14:55 UTC (6+ messages)
` [PATCH v5 18/43] arm64: RME: Handle realm enter/exit
[RFC PATCH v2 0/2] KVM: guest_memfd: use write for population
2024-11-29 12:39 UTC (3+ messages)
` [RFC PATCH v2 1/2] KVM: guest_memfd: add generic population via write
` [RFC PATCH v2 2/2] KVM: selftests: update guest_memfd write tests
[PATCH 0/7] KVM: TDX: TD vcpu enter/exit
2024-11-29 11:39 UTC (21+ messages)
` [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
` [PATCH 2/7] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
[PATCH] i386/kvm: Fix kvm_enable_x2apic link error in non-KVM builds
2024-11-29 10:59 UTC (6+ messages)
[PATCH v1 00/11] fs/proc/vmcore: kdump support for virtio-mem on s390
2024-11-29 10:38 UTC (6+ messages)
` [PATCH v1 03/11] fs/proc/vmcore: disallow vmcore modifications after the vmcore was opened
[PATCH v4 0/6] KVM: x86: Prep KVM hypercall handling for TDX
2024-11-29 9:01 UTC (14+ messages)
` [PATCH v4 1/6] KVM: x86: Play nice with protected guests in complete_hypercall_exit()
` [PATCH v4 2/6] KVM: x86: Add a helper to check for user interception of KVM hypercalls
` [PATCH v4 3/6] KVM: x86: Move "emulate hypercall" function declarations to x86.h
` [PATCH v4 4/6] KVM: x86: Bump hypercall stat prior to fully completing hypercall
` [PATCH v4 5/6] KVM: x86: Always complete hypercall via function callback
` [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
Deadlock during PCIe hot remove and SPDK exit
2024-11-29 8:05 UTC (2+ messages)
[PATCH kvmtool v2] riscv: Use the count parameter of term_putc in SBI_EXT_DBCN_CONSOLE_WRITE
2024-11-29 4:59 UTC
[PATCH 00/15] Unify MSR intercepts in x86
2024-11-28 16:46 UTC (22+ messages)
` [PATCH 01/15] KVM: x86: Use non-atomic bit ops to manipulate "shadow" MSR intercepts
` [PATCH 03/15] KVM: SVM: Invert the polarity of the "shadow" MSR interception bitmaps
` [PATCH 04/15] KVM: SVM: Track MSRPM as "unsigned long", not "u32"
` [PATCH 05/15] KVM: x86: SVM: Adopt VMX style MSR intercepts in SVM
` [PATCH 06/15] KVM: SVM: Disable intercepts for all direct access MSRs on MSR filter changes
` [PATCH 07/15] KVM: SVM: Delete old SVM MSR management code
` [PATCH 08/15] KVM: SVM: Pass through GHCB MSR if and only if VM is SEV-ES
` [PATCH 09/15] KVM: SVM: Drop "always" flag from list of possible passthrough MSRs
` [PATCH 10/15] KVM: SVM: Don't "NULL terminate" the "
` [PATCH 11/15] KVM: VMX: Make list of possible passthrough MSRs "const"
` [PATCH 12/15] KVM: x86: Track possible passthrough MSRs in kvm_x86_ops
` [PATCH 13/15] KVM: x86: Move ownership of passthrough MSR "shadow" to common x86
` [PATCH 14/15] KVM: x86: Hoist SVM MSR intercepts to common x86 code
` [PATCH 15/15] KVM: x86: Hoist VMX "
[RFC PATCH 0/7] KVM: SEV-SNP support for running an SVSM
2024-11-28 16:07 UTC (3+ messages)
` [RFC PATCH 1/7] KVM: SVM: Implement GET_AP_APIC_IDS NAE event
[PATCH RESEND kvmtool 0/4] arm: Payload memory layout change
2024-11-28 16:06 UTC (6+ messages)
` [PATCH kvmtool 1/4] arm: Fix off-by-one errors when computing payload memory layout
` [PATCH kvmtool 2/4] arm: Check return value for host_to_guest_flat()
` [PATCH kvmtool 3/4] arm64: Use the kernel header image_size when loading into memory
` [RFC PATCH kvmtool 4/4] arm64: Increase the payload memory region size to 512MB
[PATCH kvmtool 0/4] arm: Payload memory layout change
2024-11-28 15:09 UTC
[PATCH v4 0/4] Add support for the Idle HLT intercept feature
2024-11-28 15:09 UTC (2+ messages)
[PATCH v1 0/4] KVM selftests enhancements
2024-11-28 15:06 UTC (2+ messages)
M&E- Consult-RQ387690
2024-11-28 13:57 UTC
[PATCH kvmtool] builtin-run: Allow octal and hex numbers for -m/--mem
2024-11-28 13:50 UTC
[PATCH 0/8] Add SBI v3.0 PMU enhancements
2024-11-28 13:10 UTC (3+ messages)
` [PATCH 2/8] drivers/perf: riscv: Fix Platform firmware event data
[RFC PATCH 0/4] KVM: ioctl for populating guest_memfd
2024-11-28 12:11 UTC (12+ messages)
[PATCH RFCv1 0/7] vfio: Allow userspace to specify the address for each MSI vector
2024-11-28 11:15 UTC (9+ messages)
[PATCH 0/4] RISC-V: KVM: Allow Svvptc/Zabha/Ziccrse exts for guests
2024-11-28 9:00 UTC (9+ messages)
` [PATCH 1/4] RISC-V: KVM: Allow Svvptc extension for Guest/VM
` [PATCH 2/4] RISC-V: KVM: Allow Zabha "
` [PATCH 3/4] RISC-V: KVM: Allow Ziccrse "
` [PATCH 4/4] KVM: riscv: selftests: Add Svvptc/Zabha/Ziccrse exts to get-reg-list test
[PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
2024-11-28 8:43 UTC (25+ messages)
` [PATCH v4 01/16] KVM: Move KVM_REG_SIZE() definition to common uAPI header
` [PATCH v4 02/16] KVM: selftests: Return a value from vcpu_get_reg() instead of using an out-param
` [PATCH v4 03/16] KVM: selftests: Assert that vcpu_{g,s}et_reg() won't truncate
` [PATCH v4 04/16] KVM: selftests: Check for a potential unhandled exception iff KVM_RUN succeeded
` [PATCH v4 05/16] KVM: selftests: Rename max_guest_memory_test to mmu_stress_test
` [PATCH v4 06/16] KVM: selftests: Only muck with SREGS on x86 in mmu_stress_test
` [PATCH v4 07/16] KVM: selftests: Compute number of extra pages needed "
` [PATCH v4 08/16] KVM: sefltests: Explicitly include ucall_common.h in mmu_stress_test.c
` [PATCH v4 09/16] KVM: selftests: Enable mmu_stress_test on arm64
` [PATCH v4 10/16] KVM: selftests: Use vcpu_arch_put_guest() in mmu_stress_test
` [PATCH v4 11/16] KVM: selftests: Precisely limit the number of guest loops "
` [PATCH v4 12/16] KVM: selftests: Add a read-only mprotect() phase to mmu_stress_test
` [PATCH v4 13/16] KVM: selftests: Verify KVM correctly handles mprotect(PROT_READ)
` [PATCH v4 14/16] KVM: selftests: Provide empty 'all' and 'clean' targets for unsupported ARCHs
` [PATCH v4 15/16] KVM: selftests: Use canonical $(ARCH) paths for KVM selftests directories
` [PATCH v4 16/16] KVM: selftests: Override ARCH for x86_64 instead of using ARCH_DIR
[PATCH v2 0/2] KVM: nVMX: Fix an SVI update bug with passthrough APIC
2024-11-28 3:53 UTC (4+ messages)
` [PATCH v2 1/2] KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update()
` [PATCH v2 2/2] KVM: nVMX: Defer SVI update to vmcs01 on EOI when L2 is active w/o VID
[PATCH v3 0/3] KVM: VMX: Initialize TDX during KVM module load
2024-11-28 3:34 UTC (5+ messages)
` [PATCH 3/3] "
[PATCH v2 00/24] TDX MMU Part 2
2024-11-28 2:20 UTC (4+ messages)
` [PATCH v2 21/24] KVM: TDX: Add an ioctl to create initial guest memory
[PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
2024-11-28 1:34 UTC (58+ messages)
` [PATCH v3 01/57] KVM: x86: Use feature_bit() to clear CONSTANT_TSC when emulating CPUID
` [PATCH v3 02/57] KVM: x86: Limit use of F() and SF() to kvm_cpu_cap_{mask,init_kvm_defined}()
` [PATCH v3 03/57] KVM: x86: Do all post-set CPUID processing during vCPU creation
` [PATCH v3 04/57] KVM: x86: Explicitly do runtime CPUID updates "after" initial setup
` [PATCH v3 05/57] KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX
` [PATCH v3 06/57] KVM: selftests: Update x86's set_sregs_test to match KVM's CPUID enforcement
` [PATCH v3 07/57] KVM: selftests: Assert that vcpu->cpuid is non-NULL when getting CPUID entries
` [PATCH v3 08/57] KVM: selftests: Refresh vCPU CPUID cache in __vcpu_get_cpuid_entry()
` [PATCH v3 09/57] KVM: selftests: Verify KVM stuffs runtime CPUID OS bits on CR4 writes
` [PATCH v3 10/57] KVM: x86: Move __kvm_is_valid_cr4() definition to x86.h
` [PATCH v3 11/57] KVM: x86/pmu: Drop now-redundant refresh() during init()
` [PATCH v3 12/57] KVM: x86: Drop now-redundant MAXPHYADDR and GPA rsvd bits from vCPU creation
` [PATCH v3 13/57] KVM: x86: Disallow KVM_CAP_X86_DISABLE_EXITS after "
` [PATCH v3 14/57] KVM: x86: Reject disabling of MWAIT/HLT interception when not allowed
` [PATCH v3 15/57] KVM: x86: Drop the now unused KVM_X86_DISABLE_VALID_EXITS
` [PATCH v3 16/57] KVM: selftests: Fix a bad TEST_REQUIRE() in x86's KVM PV test
` [PATCH v3 17/57] KVM: selftests: Update x86's KVM PV test to match KVM's disabling exits behavior
` [PATCH v3 18/57] KVM: x86: Zero out PV features cache when the CPUID leaf is not present
` [PATCH v3 19/57] KVM: x86: Don't update PV features caches when enabling enforcement capability
` [PATCH v3 20/57] KVM: x86: Do reverse CPUID sanity checks in __feature_leaf()
` [PATCH v3 21/57] KVM: x86: Account for max supported CPUID leaf when getting raw host CPUID
` [PATCH v3 22/57] KVM: x86: Unpack F() CPUID feature flag macros to one flag per line of code
` [PATCH v3 23/57] KVM: x86: Rename kvm_cpu_cap_mask() to kvm_cpu_cap_init()
` [PATCH v3 24/57] KVM: x86: Add a macro to init CPUID features that are 64-bit only
` [PATCH v3 25/57] KVM: x86: Add a macro to precisely handle aliased 0x1.EDX CPUID features
` [PATCH v3 26/57] KVM: x86: Handle kernel- and KVM-defined CPUID words in a single helper
` [PATCH v3 27/57] KVM: x86: #undef SPEC_CTRL_SSBD in cpuid.c to avoid macro collisions
` [PATCH v3 28/57] KVM: x86: Harden CPU capabilities processing against out-of-scope features
` [PATCH v3 29/57] KVM: x86: Add a macro to init CPUID features that ignore host kernel support
` [PATCH v3 30/57] KVM: x86: Add a macro to init CPUID features that KVM emulates in software
` [PATCH v3 31/57] KVM: x86: Swap incoming guest CPUID into vCPU before massaging in KVM_SET_CPUID2
` [PATCH v3 32/57] KVM: x86: Clear PV_UNHALT for !HLT-exiting only when userspace sets CPUID
` [PATCH v3 33/57] KVM: x86: Remove unnecessary caching of KVM's PV CPUID base
` [PATCH v3 34/57] KVM: x86: Always operate on kvm_vcpu data in cpuid_entry2_find()
` [PATCH v3 35/57] KVM: x86: Move kvm_find_cpuid_entry{,_index}() up near cpuid_entry2_find()
` [PATCH v3 36/57] KVM: x86: Remove all direct usage of cpuid_entry2_find()
` [PATCH v3 37/57] KVM: x86: Advertise TSC_DEADLINE_TIMER in KVM_GET_SUPPORTED_CPUID
` [PATCH v3 38/57] KVM: x86: Advertise HYPERVISOR "
` [PATCH v3 39/57] KVM: x86: Rename "governed features" helpers to use "guest_cpu_cap"
` [PATCH v3 40/57] KVM: x86: Replace guts of "governed" features with comprehensive cpu_caps
` [PATCH v3 41/57] KVM: x86: Initialize guest cpu_caps based on guest CPUID
` [PATCH v3 42/57] KVM: x86: Extract code for generating per-entry emulated CPUID information
` [PATCH v3 43/57] KVM: x86: Treat MONTIOR/MWAIT as a "partially emulated" feature
` [PATCH v3 44/57] KVM: x86: Initialize guest cpu_caps based on KVM support
` [PATCH v3 45/57] KVM: x86: Avoid double CPUID lookup when updating MWAIT at runtime
` [PATCH v3 46/57] KVM: x86: Drop unnecessary check that cpuid_entry2_find() returns right leaf
` [PATCH v3 47/57] KVM: x86: Update OS{XSAVE,PKE} bits in guest CPUID irrespective of host support
` [PATCH v3 48/57] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
` [PATCH v3 49/57] KVM: x86: Shuffle code to prepare for dropping guest_cpuid_has()
` [PATCH v3 50/57] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps
` [PATCH v3 51/57] KVM: x86: Drop superfluous host XSAVE check when adjusting guest XSAVES caps
` [PATCH v3 52/57] KVM: x86: Add a macro for features that are synthesized into boot_cpu_data
` [PATCH v3 53/57] KVM: x86: Pull CPUID capabilities from boot_cpu_data only as needed
` [PATCH v3 54/57] KVM: x86: Rename "SF" macro to "SCATTERED_F"
` [PATCH v3 55/57] KVM: x86: Explicitly track feature flags that require vendor enabling
` [PATCH v3 56/57] KVM: x86: Explicitly track feature flags that are enabled at runtime
` [PATCH v3 57/57] KVM: x86: Use only local variables (no bitmask) to init kvm_cpu_caps
[PATCH] KVM: selftests: Use data load to trigger LLC references/misses in Intel PMU
2024-11-27 23:56 UTC
[PATCH] KVM: SVM: Remove redundant TLB flush on guest CR4.PGE change
2024-11-27 23:53 UTC
[PATCH] KVM: SVM: Macrofy SEV=n versions of sev_xxx_guest()
2024-11-27 23:46 UTC
[RFC PATCH 0/6] SEAMCALL Wrappers
2024-11-27 23:04 UTC (8+ messages)
` [RFC PATCH 1/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
[GIT PULL] Please pull IOMMUFD subsystem changes #2
2024-11-27 22:58 UTC (2+ messages)
[GIT PULL] VFIO updates for v6.13-rc1
2024-11-27 21:41 UTC (2+ messages)
[GIT PULL] virtio: features, fixes, cleanups
2024-11-27 21:40 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox