messages from 2024-12-13 07:32:24 to 2024-12-17 01:53:42 UTC [more...]
(Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
2024-12-17 1:53 UTC (5+ messages)
[ANNOUNCE] PUCK Agenda - 2024.12.17 *** On Tuesday the 17th!!! ***
2024-12-17 0:58 UTC (2+ messages)
[PATCH 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
2024-12-17 0:56 UTC (6+ messages)
` [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
` [PATCH 2/2] KVM: SVM: Provide helpers to set the error code
[PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
2024-12-17 0:05 UTC (6+ messages)
` [PATCH v3 01/57] KVM: x86: Use feature_bit() to clear CONSTANT_TSC when emulating CPUID
` [PATCH v3 50/57] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps
[PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
2024-12-17 0:00 UTC (10+ messages)
` [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
` [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
` [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
` [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
` [PATCH v2 5/9] crypto: ccp: Add new SEV platform shutdown API
` [PATCH v2 6/9] crypto: ccp: Add new SEV/SNP "
` [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
` [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
` [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM
[Bug 219588] New: [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
2024-12-16 23:53 UTC (4+ messages)
` [Bug 219588] "
[PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
2024-12-16 23:16 UTC (6+ messages)
` [PATCH 3/5] KVM: x86: Apply TSX_CTRL_CPUID_CLEAR if and only if the vCPU has RTM or HLE
[PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
2024-12-16 23:05 UTC (6+ messages)
` [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"
[PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
2024-12-16 22:33 UTC (2+ messages)
[REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
2024-12-16 20:40 UTC (5+ messages)
[PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
2024-12-16 19:28 UTC
[Bug 218267] New: [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
2024-12-16 19:08 UTC (6+ messages)
` [Bug 218267] "
[PATCH v2 0/4] x86/bugs: Adjust SRSO mitigation to new features
2024-12-16 18:51 UTC (12+ messages)
` [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
` [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX
[PATCH v6 00/43] arm64: Support for Arm CCA in KVM
2024-12-16 17:51 UTC (5+ messages)
` [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM
[PATCH 1/4] vfio: Add vfio_device_get()
2024-12-16 17:34 UTC (5+ messages)
` [PATCH 2/4] dma-buf: Add dma_buf_try_get()
` [PATCH 3/4] vfio/pci: Allow MMIO regions to be exported through dma-buf
` [PATCH 4/4] vfio/pci: Allow export dmabuf without move_notify from importer
` [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
[PATCH 1/4] vfio: Add vfio_device_get()
2024-12-16 16:54 UTC (6+ messages)
` [PATCH 2/4] dma-buf: Add dma_buf_try_get()
` [PATCH 3/4] vfio/pci: Allow MMIO regions to be exported through dma-buf
` [PATCH 4/4] vfio/pci: Allow export dmabuf without move_notify from importer
` [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf
[PATCH v15 00/13] Add Secure TSC support for SNP guests
2024-12-16 16:36 UTC (7+ messages)
` [PATCH v15 03/13] x86/sev: "
` [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
` [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected
[PATCH 1/3] vfio/pci: Remove shadow rom specific code paths
2024-12-16 13:48 UTC (4+ messages)
` [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw
[PATCH v2 0/6] selftests: kvm: s390: Reject invalid ioctls on ucontrol VMs
2024-12-16 13:01 UTC (8+ messages)
` [PATCH v2 1/6] kvm: s390: Reject setting flic pfault attributes "
` [PATCH v2 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
` [PATCH v2 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
` [PATCH v2 4/6] selftests: kvm: s390: Add ucontrol gis routing test
` [PATCH v2 5/6] selftests: kvm: s390: Streamline uc_skey test to issue iske after sske
` [PATCH v2 6/6] selftests: kvm: s390: Add has device attr check to uc_attr_mem_limit selftest
[PATCH v5 00/18] TDX MMU prep series part 1
2024-12-16 12:35 UTC (21+ messages)
` [PATCH 01/18] KVM: x86/mmu: Zap invalid roots with mmu_lock holding for write at uninit
` [PATCH 02/18] KVM: Add member to struct kvm_gfn_range for target alias
` [PATCH 03/18] KVM: x86: Add a VM type define for TDX
` [PATCH 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
` [PATCH 05/18] KVM: x86/mmu: Add an is_mirror member for union kvm_mmu_page_role
` [PATCH 06/18] KVM: x86/mmu: Make kvm_tdp_mmu_alloc_root() return void
` [PATCH 07/18] KVM: x86/tdp_mmu: Take struct kvm in iter loops
` [PATCH 08/18] KVM: x86/mmu: Support GFN direct bits
` [PATCH 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
` [PATCH 10/18] KVM: x86/tdp_mmu: Introduce KVM MMU root types to specify page table type
` [PATCH 11/18] KVM: x86/tdp_mmu: Take root in tdp_mmu_for_each_pte()
` [PATCH 12/18] KVM: x86/tdp_mmu: Support mirror root for TDP MMU
` [PATCH 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks
` [PATCH 14/18] KVM: x86/tdp_mmu: Propagate building mirror page tables
` [PATCH 15/18] KVM: x86/tdp_mmu: Propagate tearing down "
` [PATCH 16/18] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
` [PATCH 17/18] KVM: x86/tdp_mmu: Don't zap valid mirror roots in kvm_tdp_mmu_zap_all()
` [PATCH 18/18] KVM: x86/mmu: Prevent aliased memslot GFNs
[Bug 219602] New: Default of kvm.enable_virt_at_load breaks other virtualization solutions (by default)
2024-12-16 9:30 UTC (3+ messages)
` [Bug 219602] "
` [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions
[PATCH v5 00/12] iommufd support pasid attach/replace
2024-12-16 8:26 UTC (19+ messages)
` [PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
[PATCH 0/7] KVM: TDX: TDX hypercalls may exit to userspace
2024-12-16 6:03 UTC (12+ messages)
` [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
` [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>
[PATCH v2] PCI: Remove redundant macro
2024-12-16 1:35 UTC
[PATCH] PCI: Remove redundant macro
2024-12-16 1:22 UTC (3+ messages)
` "
[REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
2024-12-15 18:50 UTC (2+ messages)
[GIT PULL] KVM changes for Linux 6.13-rc3
2024-12-15 18:45 UTC (2+ messages)
[PATCH v1 10/13] KVM: selftests: Add KVM Userfault mode to demand_paging_test
2024-12-14 22:46 UTC (2+ messages)
[RFC RESEND 0/6] hugetlbfs largepage RAS project
2024-12-14 13:45 UTC (9+ messages)
` [PATCH v4 0/7] Poisoned memory recovery on reboot
` [PATCH v4 1/7] hwpoison_page_list and qemu_ram_remap are based on pages
` [PATCH v4 2/7] system/physmem: poisoned memory discard on reboot
` [PATCH v4 3/7] accel/kvm: Report the loss of a large memory page
` [PATCH v4 4/7] numa: Introduce and use ram_block_notify_remap()
` [PATCH v4 5/7] hostmem: Factor out applying settings
` [PATCH v4 6/7] hostmem: Handle remapping of RAM
` [PATCH v4 7/7] system/physmem: Memory settings applied on remap notification
[PATCH 00/20] KVM: selftests: Fixes and cleanups for dirty_log_test
2024-12-14 1:07 UTC (21+ messages)
` [PATCH 01/20] KVM: selftests: Support multiple write retires in dirty_log_test
` [PATCH 02/20] KVM: selftests: Sync dirty_log_test iteration to guest *before* resuming
` [PATCH 03/20] KVM: selftests: Drop signal/kick from dirty ring testcase
` [PATCH 04/20] KVM: selftests: Drop stale srandom() initialization from dirty_log_test
` [PATCH 05/20] KVM: selftests: Precisely track number of dirty/clear pages for each iteration
` [PATCH 06/20] KVM: selftests: Read per-page value into local var when verifying dirty_log_test
` [PATCH 07/20] KVM: selftests: Continuously reap dirty ring while vCPU is running
` [PATCH 08/20] KVM: selftests: Limit dirty_log_test's s390x workaround to s390x
` [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
` [PATCH 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
` [PATCH 11/20] KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_stop is true
` [PATCH 12/20] KVM: selftests: Use continue to handle all "pass" scenarios in dirty_log_test
` [PATCH 13/20] KVM: selftests: Print (previous) last_page on dirty page value mismatch
` [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
` [PATCH 15/20] KVM: sefltests: Verify value of dirty_log_test last page isn't bogus
` [PATCH 16/20] KVM: selftests: Ensure guest writes min number of pages in dirty_log_test
` [PATCH 17/20] KVM: selftests: Tighten checks around prev iter's last dirty page in ring
` [PATCH 18/20] KVM: selftests: Set per-iteration variables at the start of each iteration
` [PATCH 19/20] KVM: selftests: Fix an off-by-one in the number of dirty_log_test iterations
` [PATCH 20/20] KVM: selftests: Allow running a single iteration of dirty_log_test
[PATCH] KVM: x86: clear vcpu->run->hypercall.ret before exiting for KVM_EXIT_HYPERCALL
2024-12-14 0:46 UTC (2+ messages)
vmx_pmu_caps_test fails on Skylake based CPUS due to read only LBRs
2024-12-14 0:20 UTC (5+ messages)
[kvm-unit-tests PATCH 0/5] Collection of tests for canonical checks on LA57 enabled CPUs
2024-12-14 0:19 UTC (4+ messages)
[kvm-unit-tests PATCH] pmu_lbr: drop check for MSR_LBR_TOS != 0
2024-12-14 0:18 UTC (4+ messages)
[PATCH] KVM: selftests: Add printf attribute to _no_printf()
2024-12-13 22:30 UTC
[PATCH 0/4] KVM: selftests: dirty_log_test: fixes for running the test nested
2024-12-13 20:31 UTC (7+ messages)
` [PATCH 1/4] KVM: VMX: read the PML log in the same order as it was written
[PATCH v2 0/6] Enhance event delivery error handling
2024-12-13 20:09 UTC (9+ messages)
` [PATCH v2 3/6] KVM: VMX: Handle vectoring error in check_emulate_instruction
[GIT PULL] KVM/riscv fixes for 6.13 take #1
2024-12-13 19:00 UTC (2+ messages)
[PATCH v3 00/27] Enable FRED with KVM VMX
2024-12-13 18:43 UTC (6+ messages)
` [PATCH v3 17/27] KVM: x86: Mark CR4.FRED as not reserved when guest can use FRED
[PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx()
2024-12-13 17:53 UTC (3+ messages)
[RFC PATCH v4 00/14] KVM: Restricted mapping of guest_memfd at the host and arm64 support
2024-12-13 16:48 UTC (15+ messages)
` [RFC PATCH v4 01/14] mm: Consolidate freeing of typed folios on final folio_put()
` [RFC PATCH v4 02/14] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
` [RFC PATCH v4 03/14] KVM: guest_memfd: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
` [RFC PATCH v4 04/14] KVM: guest_memfd: Track mappability within a struct kvm_gmem_private
` [RFC PATCH v4 05/14] KVM: guest_memfd: Folio mappability states and functions that manage their transition
` [RFC PATCH v4 06/14] KVM: guest_memfd: Handle final folio_put() of guestmem pages
` [RFC PATCH v4 07/14] KVM: guest_memfd: Allow host to mmap guest_memfd() pages when shared
` [RFC PATCH v4 08/14] KVM: guest_memfd: Add guest_memfd support to kvm_(read|/write)_guest_page()
` [RFC PATCH v4 09/14] KVM: guest_memfd: Add KVM capability to check if guest_memfd is host mappable
` [RFC PATCH v4 10/14] KVM: guest_memfd: Add a guest_memfd() flag to initialize it as mappable
` [RFC PATCH v4 11/14] KVM: guest_memfd: selftests: guest_memfd mmap() test when mapping is allowed
` [RFC PATCH v4 12/14] KVM: arm64: Skip VMA checks for slots without userspace address
` [RFC PATCH v4 13/14] KVM: arm64: Handle guest_memfd()-backed guest page faults
` [RFC PATCH v4 14/14] KVM: arm64: Enable guest_memfd private memory when pKVM is enabled
[PATCH 0/7] KVM: TDX: TD vcpu enter/exit
2024-12-13 16:44 UTC (12+ messages)
` [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
[RFC PATCH v3 00/58] Mediated Passthrough vPMU 3.0 for x86
2024-12-13 16:26 UTC (4+ messages)
` [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
[PATCH 2/3] vfio/mdev: inline needed class_compat functionality
2024-12-13 14:53 UTC (11+ messages)
[PATCH 00/26] Address Space Isolation (ASI) 2024
2024-12-13 14:45 UTC (9+ messages)
` [PATCH 01/26] mm: asi: Make some utility functions noinstr compatible
[PATCH v6 00/60] QEMU TDX support
2024-12-13 14:42 UTC (3+ messages)
` [PATCH v6 43/60] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs
[syzbot] [tipc?] kernel BUG in __pskb_pull_tail
2024-12-13 12:19 UTC (2+ messages)
[PATCH RFC v4 0/3] riscv: add Svukte extension
2024-12-13 11:33 UTC (4+ messages)
` [PATCH RFC v4 1/3] dt-bindings: riscv: Add Svukte entry
` [PATCH RFC v4 2/3] riscv: Add Svukte extension support
` [PATCH RFC v4 3/3] riscv: KVM: Add Svukte extension support for Guest/VM
[RFC 0/5] KVM: drop 32-bit host support on all architectures
2024-12-13 10:39 UTC (23+ messages)
` [RFC 1/5] mips: kvm: drop support for 32-bit hosts
` [RFC 2/5] powerpc: kvm: drop 32-bit booke
` [RFC 3/5] powerpc: kvm: drop 32-bit book3s
` [RFC 5/5] x86: kvm drop 32-bit host support
[PATCH RFC/RFT] vfio/pci: Create feature to disable MSI virtualization
2024-12-13 9:10 UTC (4+ messages)
I urge you to understand my viewpoint accurately
2024-12-13 4:25 UTC
[PATCH v3 05/11] misc: Use never-managed version of pci_intx()
2024-12-13 7:31 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox