public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-12-10 18:22:20 to 2024-12-12 17:52:49 UTC [more...]

[PATCH v6 00/60] QEMU TDX support
 2024-12-12 17:52 UTC  (8+ messages)
` [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
` [PATCH v6 55/60] i386/tdx: Fetch and validate CPUID of TD guest

[PATCH v2 0/6] Enhance event delivery error handling
 2024-12-12 17:11 UTC  (16+ messages)
` [PATCH v2 1/6] KVM: x86: Add function for vectoring error generation
` [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
` [PATCH v2 4/6] KVM: SVM: Handle MMIO during vectroing error
` [PATCH v2 6/6] selftests: KVM: Add test case for MMIO during vectoring

[PATCH v6 00/43] arm64: Support for Arm CCA in KVM
 2024-12-12 16:54 UTC  (45+ messages)
` [PATCH v6 01/43] KVM: Prepare for handling only shared mappings in mmu_notifier events
` [PATCH v6 02/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v6 05/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v6 06/43] arm64: RME: Check for RME support at KVM init
` [PATCH v6 07/43] arm64: RME: Define the user ABI
` [PATCH v6 08/43] arm64: RME: ioctls to create and configure realms
` [PATCH v6 09/43] kvm: arm64: Expose debug HW register numbers for Realm
` [PATCH v6 10/43] arm64: kvm: Allow passing machine type in KVM creation
` [PATCH v6 11/43] arm64: RME: RTT tear down
` [PATCH v6 12/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v6 13/43] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v6 14/43] arm64: RME: Support for the VGIC in realms
` [PATCH v6 15/43] KVM: arm64: Support timers in realm RECs
` [PATCH v6 16/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v6 17/43] arm64: RME: Handle realm enter/exit
` [PATCH v6 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v6 19/43] arm64: RME: Allow populating initial contents
` [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v6 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v6 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v6 23/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v6 24/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests
` [PATCH v6 26/43] arm64: rme: allow userspace to inject aborts
` [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL
` [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance
` [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms
` [PATCH v6 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
` [PATCH v6 33/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v6 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v6 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v6 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v6 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v6 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v6 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v6 40/43] arm64: RME: Provide accurate register list
` [PATCH v6 41/43] arm64: kvm: Expose support for private memory
` [PATCH v6 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v6 43/43] KVM: arm64: Allow activating realms

[PATCH v4 0/4] Add support for the Idle HLT intercept feature
 2024-12-12 16:37 UTC  (3+ messages)

[RFC 0/5] KVM: drop 32-bit host support on all architectures
 2024-12-12 16:27 UTC  (8+ messages)
` [RFC 1/5] mips: kvm: drop support for 32-bit hosts
` [RFC 2/5] powerpc: kvm: drop 32-bit booke
` [RFC 3/5] powerpc: kvm: drop 32-bit book3s
` [RFC 4/5] riscv: kvm: drop 32-bit host support
` [RFC 5/5] x86: kvm "

[PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
 2024-12-12 16:03 UTC  (8+ messages)

[PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
 2024-12-12 16:00 UTC  (3+ messages)

[PATCH v4 0/6] KVM: x86: Prep KVM hypercall handling for TDX
 2024-12-12 15:42 UTC  (9+ messages)
` [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro

[kvm-unit-tests PATCH v4 0/6] s390x: STFLE nested interpretation
 2024-12-12 15:33 UTC  (4+ messages)
` [kvm-unit-tests PATCH v4 4/6] s390x: Add library functions for exiting from snippet

[PATCH v2] KVM: x86: Drop the kvm_has_noapic_vcpu optimization
 2024-12-12 15:16 UTC  (7+ messages)

[PATCH v3 00/11] Remove implicit devres from pci_intx()
 2024-12-12 14:58 UTC  (5+ messages)
` [PATCH v3 03/11] net/ethernet: Use never-managed version of pci_intx()
` [PATCH v3 11/11] Remove devres from pci_intx()

[PATCH 0/3] KVM: x86: Small changes to support VMware guests
 2024-12-12 12:19 UTC  (16+ messages)
` [PATCH 2/3] KVM: x86: Add support for VMware guest specific hypercalls

[PATCH RESEND kvmtool 0/4] arm: Payload memory layout change
 2024-12-12  9:41 UTC  (4+ messages)

[PATCH v4 00/18] Provide a new two step DMA mapping API
 2024-12-12  8:54 UTC  (17+ messages)
` [PATCH v4 04/18] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast
` [PATCH v4 05/18] dma-mapping: Add check if IOVA can be used
` [PATCH v4 06/18] dma: Provide an interface to allow allocate IOVA
` [PATCH v4 08/18] dma-mapping: Implement link/unlink ranges API
` [PATCH v4 11/18] mm/hmm: let users to tag specific PFN with DMA mapped bit
` [PATCH v4 12/18] mm/hmm: provide generic DMA managing logic

[PATCH v5 00/12] iommufd support pasid attach/replace
 2024-12-12  7:13 UTC  (12+ messages)
` [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device

[PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
 2024-12-12  6:36 UTC  (6+ messages)
` [PATCH 1/5] KVM: gmem: Don't rely on __kvm_gmem_get_pfn() for preparedness
` [PATCH 2/5] KVM: gmem: Don't clear pages that have already been prepared
` [PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios
` [PATCH 4/5] KVM: SEV: Improve handling of large ranges in gmem prepare callback
` [PATCH 5/5] KVM: Add hugepage support for dedicated guest memory

[PATCH v15 00/13] Add Secure TSC support for SNP guests
 2024-12-12  5:07 UTC  (17+ messages)
` [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception "
` [PATCH v15 07/13] x86/sev: Mark Secure TSC as reliable clocksource

[PATCH 2/3] vfio/mdev: inline needed class_compat functionality
 2024-12-12  4:42 UTC  (11+ messages)

[PATCH v2 0/2] MANA: Fix few memory leaks in mana_gd_setup_irqs
 2024-12-12  4:30 UTC  (3+ messages)

[PATCH 0/3] driver core: class: remove class_compat code
 2024-12-12  4:27 UTC  (2+ messages)

[PATCH 0/5] bugfix some driver issues
 2024-12-12  2:04 UTC  (7+ messages)
` [PATCH 4/5] hisi_acc_vfio_pci: bugfix the problem of uninstalling driver
` [PATCH 5/5] hisi_acc_vfio_pci: bugfix live migration function without VF device driver

[PATCH 0/4] KVM: selftests: dirty_log_test: fixes for running the test nested
 2024-12-12  0:44 UTC  (6+ messages)
` [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
` [PATCH 2/4] KVM: selftests: dirty_log_test: Limit s390x workaround to s390x
` [PATCH 3/4] KVM: selftests: dirty_log_test: run the guest until some dirty ring entries were harvested
` [PATCH 4/4] KVM: selftests: dirty_log_test: support multiple write retires

[PATCH v2 00/25] TDX vCPU/VM creation
 2024-12-12  0:31 UTC  (8+ messages)
` [PATCH v2 03/25] x86/virt/tdx: Read essential global metadata for KVM

[PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support
 2024-12-12  0:02 UTC  (16+ messages)

[kvmtool] Reset all VCPUs before any entering run loops
 2024-12-11 23:44 UTC  (2+ messages)

[PATCH kvmtool] builtin-run: Allow octal and hex numbers for -m/--mem
 2024-12-11 23:44 UTC  (2+ messages)

[GIT PULL] KVM/riscv changes for 6.13
 2024-12-11 22:49 UTC  (3+ messages)

[PATCH v2 0/4] x86/bugs: Adjust SRSO mitigation to new features
 2024-12-11 22:35 UTC  (9+ messages)
` [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
` [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX

[PATCH v2 1/1] RISC-V: KVM: Fix APLIC in_clrip and clripnum write emulation
 2024-12-11 22:32 UTC  (2+ messages)

[PATCH v5 0/2] riscv: Add perf support to collect KVM guest statistics from host side
 2024-12-11 22:32 UTC  (2+ messages)

[PATCH v8 0/5] Add Svade and Svadu Extensions Support
 2024-12-11 22:32 UTC  (2+ messages)

[GIT PULL] VFIO fixes for v6.13-rc3
 2024-12-11 22:20 UTC  (2+ messages)

[PATCH 00/15] KVM: x86: Introduce new ioctl KVM_TRANSLATE2
 2024-12-11 22:06 UTC  (4+ messages)
` [PATCH 14/15] KVM: x86: Implement KVM_TRANSLATE2

[PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
 2024-12-11 22:01 UTC  (11+ messages)
` [PATCH v2 1/1] KVM: arm64: Allow cacheable stage 2 mapping using VMA flags

[PATCH v13] PCI/ASPM: Make pci_save_aspm_l1ss_state save both child and parent's L1SS configuration
 2024-12-11 20:47 UTC 

[PATCH 0/7] KVM: TDX: TD vcpu enter/exit
 2024-12-11 18:43 UTC  (9+ messages)
` [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest

[PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
 2024-12-11 18:14 UTC  (2+ messages)

[REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works
 2024-12-11 17:42 UTC  (8+ messages)

[syzbot] [kvm?] WARNING in __srcu_check_read_flavor
 2024-12-11 17:23 UTC 

[PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
 2024-12-11 16:42 UTC  (7+ messages)
` [PATCH 1/5] KVM: x86: Cache CPUID.0xD XSTATE offsets+sizes during module init
` [PATCH 2/5] KVM: x86: Use for-loop to iterate over XSTATE size entries
` [PATCH 3/5] KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vCPU has RTM or HLE
` [PATCH 4/5] KVM: x86: Query X86_FEATURE_MWAIT iff userspace owns the CPUID feature bit
` [PATCH 5/5] KVM: x86: Defer runtime updates of dynamic CPUID bits until CPUID emulation

[Bug 219588] New: [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
 2024-12-11 16:12 UTC  (3+ messages)
` [Bug 219588] "

[Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
 2024-12-11 13:53 UTC  (4+ messages)
` [Invitation] bi-weekly guest_memfd upstream call on 2024-12-05
  ` [Invitation] bi-weekly guest_memfd upstream call on 2024-12-12

[syzbot] [kvm?] WARNING in vmx_handle_exit (2)
 2024-12-11 13:12 UTC 

[syzbot] Monthly kvm report (Dec 2024)
 2024-12-11 11:27 UTC 

[PATCH v6 0/7] Support attaching PASID to the blocked_domain
 2024-12-11  8:24 UTC  (3+ messages)
` [PATCH v6 1/7] iommu: Prevent pasid attach if no ops->remove_dev_pasid

[PATCH] RISC-V: KVM: Redirect instruction access fault trap to guest
 2024-12-11  8:00 UTC  (6+ messages)

[PATCH v5 0/5] vfio-pci support pasid attach/detach
 2024-12-11  3:12 UTC  (4+ messages)
` [PATCH v5 5/5] iommufd: Extend IOMMU_GET_HW_INFO to report PASID capability

[RFC PATCH v2 0/6] SEAMCALL Wrappers
 2024-12-11  1:33 UTC  (4+ messages)
` [RFC PATCH v2 4/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX page cache management

[PATCH 00/18] KVM: TDX: TDX "the rest" part
 2024-12-11  1:31 UTC  (3+ messages)

[PATCH v4 0/2] KVM: SVM: Flush cache only on CPUs running SEV guest
 2024-12-10 23:56 UTC  (6+ messages)
` [PATCH v4 2/2] "

[PATCH] selftests/rseq: Fix rseq for cases without glibc support
 2024-12-10 22:44 UTC 

[PATCH 0/7] Move initializing SEV/SNP functionality to KVM
 2024-12-10 21:55 UTC  (5+ messages)
` [PATCH 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
` [PATCH 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled

[PATCH v9 00/15] arm64: support poll_idle()
 2024-12-10 20:14 UTC  (4+ messages)
` [PATCH v9 05/15] arm64: barrier: add support for smp_cond_relaxed_timeout()

[PATCH 00/16] KVM: TDX: TDX interrupts
 2024-12-10 18:24 UTC  (2+ messages)

[PATCH 0/7] KVM: TDX: TDX hypercalls may exit to userspace
 2024-12-10 18:24 UTC  (2+ messages)

[PATCH v2 00/24] TDX MMU Part 2
 2024-12-10 18:21 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox