messages from 2024-12-10 18:22:20 to 2024-12-12 17:52:49 UTC [more...]
[PATCH v6 00/60] QEMU TDX support
2024-12-12 17:52 UTC (8+ messages)
` [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
` [PATCH v6 55/60] i386/tdx: Fetch and validate CPUID of TD guest
[PATCH v2 0/6] Enhance event delivery error handling
2024-12-12 17:11 UTC (16+ messages)
` [PATCH v2 1/6] KVM: x86: Add function for vectoring error generation
` [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
` [PATCH v2 4/6] KVM: SVM: Handle MMIO during vectroing error
` [PATCH v2 6/6] selftests: KVM: Add test case for MMIO during vectoring
[PATCH v6 00/43] arm64: Support for Arm CCA in KVM
2024-12-12 16:54 UTC (45+ messages)
` [PATCH v6 01/43] KVM: Prepare for handling only shared mappings in mmu_notifier events
` [PATCH v6 02/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v6 05/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v6 06/43] arm64: RME: Check for RME support at KVM init
` [PATCH v6 07/43] arm64: RME: Define the user ABI
` [PATCH v6 08/43] arm64: RME: ioctls to create and configure realms
` [PATCH v6 09/43] kvm: arm64: Expose debug HW register numbers for Realm
` [PATCH v6 10/43] arm64: kvm: Allow passing machine type in KVM creation
` [PATCH v6 11/43] arm64: RME: RTT tear down
` [PATCH v6 12/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v6 13/43] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v6 14/43] arm64: RME: Support for the VGIC in realms
` [PATCH v6 15/43] KVM: arm64: Support timers in realm RECs
` [PATCH v6 16/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v6 17/43] arm64: RME: Handle realm enter/exit
` [PATCH v6 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v6 19/43] arm64: RME: Allow populating initial contents
` [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v6 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v6 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v6 23/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v6 24/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests
` [PATCH v6 26/43] arm64: rme: allow userspace to inject aborts
` [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL
` [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance
` [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms
` [PATCH v6 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
` [PATCH v6 33/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v6 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v6 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v6 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v6 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v6 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v6 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v6 40/43] arm64: RME: Provide accurate register list
` [PATCH v6 41/43] arm64: kvm: Expose support for private memory
` [PATCH v6 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v6 43/43] KVM: arm64: Allow activating realms
[PATCH v4 0/4] Add support for the Idle HLT intercept feature
2024-12-12 16:37 UTC (3+ messages)
[RFC 0/5] KVM: drop 32-bit host support on all architectures
2024-12-12 16:27 UTC (8+ messages)
` [RFC 1/5] mips: kvm: drop support for 32-bit hosts
` [RFC 2/5] powerpc: kvm: drop 32-bit booke
` [RFC 3/5] powerpc: kvm: drop 32-bit book3s
` [RFC 4/5] riscv: kvm: drop 32-bit host support
` [RFC 5/5] x86: kvm "
[PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
2024-12-12 16:03 UTC (8+ messages)
[PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
2024-12-12 16:00 UTC (3+ messages)
[PATCH v4 0/6] KVM: x86: Prep KVM hypercall handling for TDX
2024-12-12 15:42 UTC (9+ messages)
` [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro
[kvm-unit-tests PATCH v4 0/6] s390x: STFLE nested interpretation
2024-12-12 15:33 UTC (4+ messages)
` [kvm-unit-tests PATCH v4 4/6] s390x: Add library functions for exiting from snippet
[PATCH v2] KVM: x86: Drop the kvm_has_noapic_vcpu optimization
2024-12-12 15:16 UTC (7+ messages)
[PATCH v3 00/11] Remove implicit devres from pci_intx()
2024-12-12 14:58 UTC (5+ messages)
` [PATCH v3 03/11] net/ethernet: Use never-managed version of pci_intx()
` [PATCH v3 11/11] Remove devres from pci_intx()
[PATCH 0/3] KVM: x86: Small changes to support VMware guests
2024-12-12 12:19 UTC (16+ messages)
` [PATCH 2/3] KVM: x86: Add support for VMware guest specific hypercalls
[PATCH RESEND kvmtool 0/4] arm: Payload memory layout change
2024-12-12 9:41 UTC (4+ messages)
[PATCH v4 00/18] Provide a new two step DMA mapping API
2024-12-12 8:54 UTC (17+ messages)
` [PATCH v4 04/18] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast
` [PATCH v4 05/18] dma-mapping: Add check if IOVA can be used
` [PATCH v4 06/18] dma: Provide an interface to allow allocate IOVA
` [PATCH v4 08/18] dma-mapping: Implement link/unlink ranges API
` [PATCH v4 11/18] mm/hmm: let users to tag specific PFN with DMA mapped bit
` [PATCH v4 12/18] mm/hmm: provide generic DMA managing logic
[PATCH v5 00/12] iommufd support pasid attach/replace
2024-12-12 7:13 UTC (12+ messages)
` [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
[PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
2024-12-12 6:36 UTC (6+ messages)
` [PATCH 1/5] KVM: gmem: Don't rely on __kvm_gmem_get_pfn() for preparedness
` [PATCH 2/5] KVM: gmem: Don't clear pages that have already been prepared
` [PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios
` [PATCH 4/5] KVM: SEV: Improve handling of large ranges in gmem prepare callback
` [PATCH 5/5] KVM: Add hugepage support for dedicated guest memory
[PATCH v15 00/13] Add Secure TSC support for SNP guests
2024-12-12 5:07 UTC (17+ messages)
` [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception "
` [PATCH v15 07/13] x86/sev: Mark Secure TSC as reliable clocksource
[PATCH 2/3] vfio/mdev: inline needed class_compat functionality
2024-12-12 4:42 UTC (11+ messages)
[PATCH v2 0/2] MANA: Fix few memory leaks in mana_gd_setup_irqs
2024-12-12 4:30 UTC (3+ messages)
[PATCH 0/3] driver core: class: remove class_compat code
2024-12-12 4:27 UTC (2+ messages)
[PATCH 0/5] bugfix some driver issues
2024-12-12 2:04 UTC (7+ messages)
` [PATCH 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
` [PATCH 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver
[PATCH 0/4] KVM: selftests: dirty_log_test: fixes for running the test nested
2024-12-12 0:44 UTC (6+ messages)
` [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
` [PATCH 2/4] KVM: selftests: dirty_log_test: Limit s390x workaround to s390x
` [PATCH 3/4] KVM: selftests: dirty_log_test: run the guest until some dirty ring entries were harvested
` [PATCH 4/4] KVM: selftests: dirty_log_test: support multiple write retires
[PATCH v2 00/25] TDX vCPU/VM creation
2024-12-12 0:31 UTC (8+ messages)
` [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM
[PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
2024-12-12 0:02 UTC (16+ messages)
[kvmtool] Reset all VCPUs before any entering run loops
2024-12-11 23:44 UTC (2+ messages)
[PATCH kvmtool] builtin-run: Allow octal and hex numbers for -m/--mem
2024-12-11 23:44 UTC (2+ messages)
[GIT PULL] KVM/riscv changes for 6.13
2024-12-11 22:49 UTC (3+ messages)
[PATCH v2 0/4] x86/bugs: Adjust SRSO mitigation to new features
2024-12-11 22:35 UTC (9+ messages)
` [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
` [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
[PATCH v2 1/1] RISC-V: KVM: Fix APLIC in_clrip and clripnum write emulation
2024-12-11 22:32 UTC (2+ messages)
[PATCH v5 0/2] riscv: Add perf support to collect KVM guest statistics from host side
2024-12-11 22:32 UTC (2+ messages)
[PATCH v8 0/5] Add Svade and Svadu Extensions Support
2024-12-11 22:32 UTC (2+ messages)
[GIT PULL] VFIO fixes for v6.13-rc3
2024-12-11 22:20 UTC (2+ messages)
[PATCH 00/15] KVM: x86: Introduce new ioctl KVM_TRANSLATE2
2024-12-11 22:06 UTC (4+ messages)
` [PATCH 14/15] KVM: x86: Implement KVM_TRANSLATE2
[PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
2024-12-11 22:01 UTC (11+ messages)
` [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags
[PATCH v13] PCI/ASPM: Make pci_save_aspm_l1ss_state save both child and parent's L1SS configuration
2024-12-11 20:47 UTC
[PATCH 0/7] KVM: TDX: TD vcpu enter/exit
2024-12-11 18:43 UTC (9+ messages)
` [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
[PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
2024-12-11 18:14 UTC (2+ messages)
[REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
2024-12-11 17:42 UTC (8+ messages)
[syzbot] [kvm?] WARNING in __srcu_check_read_flavor
2024-12-11 17:23 UTC
[PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
2024-12-11 16:42 UTC (7+ messages)
` [PATCH 1/5] KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init
` [PATCH 2/5] KVM: x86: Use for-loop to iterate over XSTATE size entries
` [PATCH 3/5] KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vCPU has RTM or HLE
` [PATCH 4/5] KVM: x86: Query X86_FEATURE_MWAIT iff userspace owns the CPUID feature bit
` [PATCH 5/5] KVM: x86: Defer runtime updates of dynamic CPUID bits until CPUID emulation
[Bug 219588] New: [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
2024-12-11 16:12 UTC (3+ messages)
` [Bug 219588] "
[Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
2024-12-11 13:53 UTC (4+ messages)
` [Invitation] bi-weekly guest_memfd upstream call on 2024-12-05
` [Invitation] bi-weekly guest_memfd upstream call on 2024-12-12
[syzbot] [kvm?] WARNING in vmx_handle_exit (2)
2024-12-11 13:12 UTC
[syzbot] Monthly kvm report (Dec 2024)
2024-12-11 11:27 UTC
[PATCH v6 0/7] Support attaching PASID to the blocked_domain
2024-12-11 8:24 UTC (3+ messages)
` [PATCH v6 1/7] iommu: Prevent pasid attach if no ops->remove_dev_pasid
[PATCH] RISC-V: KVM: Redirect instruction access fault trap to guest
2024-12-11 8:00 UTC (6+ messages)
[PATCH v5 0/5] vfio-pci support pasid attach/detach
2024-12-11 3:12 UTC (4+ messages)
` [PATCH v5 5/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability
[RFC PATCH v2 0/6] SEAMCALL Wrappers
2024-12-11 1:33 UTC (4+ messages)
` [RFC PATCH v2 4/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management
[PATCH 00/18] KVM: TDX: TDX "the rest" part
2024-12-11 1:31 UTC (3+ messages)
[PATCH v4 0/2] KVM: SVM: Flush cache only on CPUs running SEV guest
2024-12-10 23:56 UTC (6+ messages)
` [PATCH v4 2/2] "
[PATCH] selftests/rseq: Fix rseq for cases without glibc support
2024-12-10 22:44 UTC
[PATCH 0/7] Move initializing SEV/SNP functionality to KVM
2024-12-10 21:55 UTC (5+ messages)
` [PATCH 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
` [PATCH 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
[PATCH v9 00/15] arm64: support poll_idle()
2024-12-10 20:14 UTC (4+ messages)
` [PATCH v9 05/15] arm64: barrier: add support for smp_cond_relaxed_timeout()
[PATCH 00/16] KVM: TDX: TDX interrupts
2024-12-10 18:24 UTC (2+ messages)
[PATCH 0/7] KVM: TDX: TDX hypercalls may exit to userspace
2024-12-10 18:24 UTC (2+ messages)
[PATCH v2 00/24] TDX MMU Part 2
2024-12-10 18:21 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox