public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-12-12 15:39:12 to 2024-12-13 20:31:47 UTC [more...]

[PATCH 0/4] KVM: selftests: dirty_log_test: fixes for running the test nested
 2024-12-13 20:31 UTC  (7+ messages)
` [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written

[PATCH v2 0/6] Enhance event delivery error handling
 2024-12-13 20:09 UTC  (12+ messages)
` [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
` [PATCH v2 6/6] selftests: KVM: Add test case for MMIO during vectoring

[PATCH v5 00/18] TDX MMU prep series part 1
 2024-12-13 19:57 UTC  (19+ messages)
` [PATCH 01/18] KVM: x86/mmu: Zap invalid roots with mmu_lock holding for write at uninit
` [PATCH 02/18] KVM: Add member to struct kvm_gfn_range for target alias
` [PATCH 03/18] KVM: x86: Add a VM type define for TDX
` [PATCH 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
` [PATCH 05/18] KVM: x86/mmu: Add an is_mirror member for union kvm_mmu_page_role
` [PATCH 06/18] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
` [PATCH 07/18] KVM: x86/tdp_mmu: Take struct kvm in iter loops
` [PATCH 08/18] KVM: x86/mmu: Support GFN direct bits
` [PATCH 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
` [PATCH 10/18] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
` [PATCH 11/18] KVM: x86/tdp_mmu: Take root in tdp_mmu_for_each_pte()
` [PATCH 12/18] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
` [PATCH 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks
` [PATCH 14/18] KVM: x86/tdp_mmu: Propagate building mirror page tables
` [PATCH 15/18] KVM: x86/tdp_mmu: Propagate tearing down "
` [PATCH 16/18] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
` [PATCH 17/18] KVM: x86/tdp_mmu: Don't zap valid mirror roots in kvm_tdp_mmu_zap_all()
` [PATCH 18/18] KVM: x86/mmu: Prevent aliased memslot GFNs

[PATCH] KVM: x86: clear vcpu->run->hypercall.ret before exiting for KVM_EXIT_HYPERCALL
 2024-12-13 19:41 UTC 

[GIT PULL] KVM/riscv fixes for 6.13 take #1
 2024-12-13 19:00 UTC  (2+ messages)

[PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
 2024-12-13 18:58 UTC  (4+ messages)
` [PATCH 3/5] KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vCPU has RTM or HLE

[PATCH v3 00/27] Enable FRED with KVM VMX
 2024-12-13 18:43 UTC  (6+ messages)
` [PATCH v3 17/27] KVM: x86: Mark CR4.FRED as not reserved when guest can use FRED

[PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx()
 2024-12-13 17:53 UTC  (4+ messages)

[PATCH] PCI: Remove redundant macro
 2024-12-13 17:37 UTC  (2+ messages)

[Bug 218267] New: [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
 2024-12-13 17:25 UTC  (4+ messages)
` [Bug 218267] "

[RFC PATCH v4 00/14] KVM: Restricted mapping of guest_memfd at the host and arm64 support
 2024-12-13 16:48 UTC  (15+ messages)
` [RFC PATCH v4 01/14] mm: Consolidate freeing of typed folios on final folio_put()
` [RFC PATCH v4 02/14] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
` [RFC PATCH v4 03/14] KVM: guest_memfd: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
` [RFC PATCH v4 04/14] KVM: guest_memfd: Track mappability within a struct kvm_gmem_private
` [RFC PATCH v4 05/14] KVM: guest_memfd: Folio mappability states and functions that manage their transition
` [RFC PATCH v4 06/14] KVM: guest_memfd: Handle final folio_put() of guestmem pages
` [RFC PATCH v4 07/14] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
` [RFC PATCH v4 08/14] KVM: guest_memfd: Add guest_memfd support to kvm_(read|/write)_guest_page()
` [RFC PATCH v4 09/14] KVM: guest_memfd: Add KVM capability to check if guest_memfd is host mappable
` [RFC PATCH v4 10/14] KVM: guest_memfd: Add a guest_memfd() flag to initialize it as mappable
` [RFC PATCH v4 11/14] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
` [RFC PATCH v4 12/14] KVM: arm64: Skip VMA checks for slots without userspace address
` [RFC PATCH v4 13/14] KVM: arm64: Handle guest_memfd()-backed guest page faults
` [RFC PATCH v4 14/14] KVM: arm64: Enable guest_memfd private memory when pKVM is enabled

[PATCH 0/7] KVM: TDX: TD vcpu enter/exit
 2024-12-13 16:44 UTC  (12+ messages)
` [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest

[RFC PATCH v3 00/58] Mediated Passthrough vPMU 3.0 for x86
 2024-12-13 16:26 UTC  (4+ messages)
` [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag

[PATCH 2/3] vfio/mdev: inline needed class_compat functionality
 2024-12-13 14:53 UTC  (15+ messages)

[PATCH 00/26] Address Space Isolation (ASI) 2024
 2024-12-13 14:45 UTC  (9+ messages)
` [PATCH 01/26] mm: asi: Make some utility functions noinstr compatible

[PATCH v6 00/60] QEMU TDX support
 2024-12-13 14:42 UTC  (23+ messages)
` [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
` [PATCH v6 19/60] i386/tdx: Parse TDVF metadata for TDX VM
` [PATCH v6 34/60] i386/tdx: implement tdx_cpu_realizefn()
` [PATCH v6 35/60] i386/cpu: Introduce enable_cpuid_0x1f to force exposing CPUID 0x1f
` [PATCH v6 36/60] i386/tdx: Force "
` [PATCH v6 41/60] hw/i386: add option to forcibly report edge trigger in acpi tables
` [PATCH v6 43/60] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs
` [PATCH v6 55/60] i386/tdx: Fetch and validate CPUID of TD guest

[PATCH v5 00/12] iommufd support pasid attach/replace
 2024-12-13 12:40 UTC  (17+ messages)
` [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device

[syzbot] [tipc?] kernel BUG in __pskb_pull_tail
 2024-12-13 12:19 UTC  (2+ messages)

[PATCH RFC v4 0/3] riscv: add Svukte extension
 2024-12-13 11:33 UTC  (4+ messages)
` [PATCH RFC v4 1/3] dt-bindings: riscv: Add Svukte entry
` [PATCH RFC v4 2/3] riscv: Add Svukte extension support
` [PATCH RFC v4 3/3] riscv: KVM: Add Svukte extension support for Guest/VM

[PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
 2024-12-13 10:53 UTC  (7+ messages)
` [PATCH v3 01/57] KVM: x86: Use feature_bit() to clear CONSTANT_TSC when emulating CPUID
` [PATCH v3 05/57] KVM: x86: Account for KVM-reserved CR4 bits when passing through CR4 on VMX
` [PATCH v3 50/57] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps

[RFC 0/5] KVM: drop 32-bit host support on all architectures
 2024-12-13 10:39 UTC  (23+ messages)
` [RFC 1/5] mips: kvm: drop support for 32-bit hosts
` [RFC 2/5] powerpc: kvm: drop 32-bit booke
` [RFC 3/5] powerpc: kvm: drop 32-bit book3s
` [RFC 5/5] x86: kvm drop 32-bit host support

[PATCH 0/7] KVM: TDX: TDX hypercalls may exit to userspace
 2024-12-13  9:40 UTC  (7+ messages)
` [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
` [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>

[PATCH RFC/RFT] vfio/pci: Create feature to disable MSI virtualization
 2024-12-13  9:10 UTC  (4+ messages)

I urge you to understand my viewpoint accurately
 2024-12-13  4:25 UTC 

[PATCH v3 05/11] misc: Use never-managed version of pci_intx()
 2024-12-13  7:31 UTC  (3+ messages)

[PATCH 0/7] Enable shared device assignment
 2024-12-13  7:08 UTC  (8+ messages)
` [PATCH 1/7] memory: Export a helper to get intersection of a MemoryRegionSection with a given range
` [PATCH 2/7] guest_memfd: Introduce an object to manage the guest-memfd with RamDiscardManager
` [PATCH 3/7] guest_memfd: Introduce a callback to notify the shared/private state change
` [PATCH 4/7] KVM: Notify the state change event during shared/private conversion
` [PATCH 5/7] memory: Register the RamDiscardManager instance upon guest_memfd creation
` [PATCH 6/7] RAMBlock: make guest_memfd require coordinate discard
` [RFC PATCH 7/7] memory: Add a new argument to indicate the request attribute in RamDismcardManager helpers

[PATCH v3 00/11] Remove implicit devres from pci_intx()
 2024-12-13  5:25 UTC  (3+ messages)

[PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL
 2024-12-13  1:56 UTC  (9+ messages)

[PATCH v2 00/24] TDX MMU Part 2
 2024-12-13  1:01 UTC  (3+ messages)
` [RFC PATCH 0/2] SEPT SEAMCALL retry proposal

[PATCH 1/3] vfio/pci: Remove shadow rom specific code paths
 2024-12-12 23:00 UTC  (6+ messages)
` [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
` [PATCH 3/3] vfio/pci: Expose setup ROM at ROM bar when needed

[PATCH v2 6.1] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn()
 2024-12-12 22:25 UTC  (2+ messages)

[PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset
 2024-12-12 21:32 UTC  (4+ messages)

[PATCH 0/3] Collect guest/host statistics during the redirected traps
 2024-12-12 20:56 UTC  (4+ messages)
` [PATCH 1/3] RISC-V: KVM: Redirect instruction access fault trap to guest
` [PATCH 2/3] RISC-V: KVM: Update firmware counters for various events
` [PATCH 3/3] RISC-V: KVM: Add new exit statstics for redirected traps

[PATCH v3 06/11] vfio/pci: Use never-managed version of pci_intx()
 2024-12-12 19:49 UTC  (3+ messages)

[PATCH v3 03/11] net/ethernet: Use never-managed version of pci_intx()
 2024-12-12 19:24 UTC  (2+ messages)

[PATCH v4 0/6] KVM: x86: Prep KVM hypercall handling for TDX
 2024-12-12 18:40 UTC  (8+ messages)
` [PATCH v4 6/6] KVM: x86: Refactor __kvm_emulate_hypercall() into a macro

[PATCH v6 00/43] arm64: Support for Arm CCA in KVM
 2024-12-12 16:54 UTC  (45+ messages)
` [PATCH v6 01/43] KVM: Prepare for handling only shared mappings in mmu_notifier events
` [PATCH v6 02/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v6 05/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v6 06/43] arm64: RME: Check for RME support at KVM init
` [PATCH v6 07/43] arm64: RME: Define the user ABI
` [PATCH v6 08/43] arm64: RME: ioctls to create and configure realms
` [PATCH v6 09/43] kvm: arm64: Expose debug HW register numbers for Realm
` [PATCH v6 10/43] arm64: kvm: Allow passing machine type in KVM creation
` [PATCH v6 11/43] arm64: RME: RTT tear down
` [PATCH v6 12/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v6 13/43] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v6 14/43] arm64: RME: Support for the VGIC in realms
` [PATCH v6 15/43] KVM: arm64: Support timers in realm RECs
` [PATCH v6 16/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v6 17/43] arm64: RME: Handle realm enter/exit
` [PATCH v6 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v6 19/43] arm64: RME: Allow populating initial contents
` [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v6 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v6 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v6 23/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v6 24/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests
` [PATCH v6 26/43] arm64: rme: allow userspace to inject aborts
` [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL
` [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance
` [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms
` [PATCH v6 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
` [PATCH v6 33/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v6 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v6 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v6 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v6 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v6 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v6 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v6 40/43] arm64: RME: Provide accurate register list
` [PATCH v6 41/43] arm64: kvm: Expose support for private memory
` [PATCH v6 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v6 43/43] KVM: arm64: Allow activating realms

[PATCH v4 0/4] Add support for the Idle HLT intercept feature
 2024-12-12 16:37 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox