public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-12-14 01:07:40 to 2024-12-17 22:43:31 UTC [more...]

[PATCH 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
 2024-12-17 22:43 UTC  (8+ messages)
` [PATCH 1/2] KVM: SVM: Convert plain error code numbers to defines
` [PATCH 2/2] KVM: SVM: Provide helpers to set the error code

[PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
 2024-12-17 21:37 UTC  (13+ messages)
` [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
` [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
` [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
` [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
` [PATCH v2 5/9] crypto: ccp: Add new SEV platform shutdown API
` [PATCH v2 6/9] crypto: ccp: Add new SEV/SNP "
` [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
` [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
` [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM

(Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits
 2024-12-17 21:31 UTC  (7+ messages)

[PATCH] KVM: arm64: Fix set_id_regs selftest for ASIDBITS becoming unwritable
 2024-12-17 19:22 UTC  (9+ messages)

[PATCH] KVM: VMX: don't include '<linux/find.h>' directly
 2024-12-17 18:18 UTC  (3+ messages)

[PATCH v3 0/7] Enhance event delivery error handling
 2024-12-17 18:14 UTC  (8+ messages)
` [PATCH v3 1/7] KVM: x86: Add function for vectoring error generation
` [PATCH v3 2/7] KVM: x86: Add emulation status for unhandleable vectoring
` [PATCH v3 3/7] KVM: x86: Unprotect & retry before unhandleable vectoring check
` [PATCH v3 4/7] KVM: VMX: Handle vectoring error in check_emulate_instruction
` [PATCH v3 5/7] KVM: SVM: "
` [PATCH v3 6/7] selftests: KVM: extract lidt into helper function
` [PATCH v3 7/7] selftests: KVM: Add test case for MMIO during vectoring

[Bug 219602] New: Default of kvm.enable_virt_at_load breaks other virtualization solutions (by default)
 2024-12-17 17:50 UTC  (8+ messages)
` [Bug 219602] "
` [Bug 219602] By default kvm.enable_virt_at_load breaks other virtualization solutions

[PATCH 00/16] KVM: arm64: Add NV GICv3 support
 2024-12-17 17:38 UTC  (18+ messages)
` [PATCH 01/16] arm64: sysreg: Add layout for ICH_HCR_EL2
` [PATCH 02/16] arm64: sysreg: Add layout for ICH_VTR_EL2
` [PATCH 03/16] arm64: sysreg: Add layout for ICH_MISR_EL2
` [PATCH 04/16] KVM: arm64: Move host SVE/SME state flags out of vCPU
` [PATCH 05/16] KVM: arm64: nv: Load timer before the GIC
` [PATCH 06/16] KVM: arm64: nv: Add ICH_*_EL2 registers to vpcu_sysreg
` [PATCH 07/16] KVM: arm64: nv: Plumb handling of GICv3 EL2 accesses
` [PATCH 08/16] KVM: arm64: nv: Sanitise ICH_HCR_EL2 accesses
` [PATCH 09/16] KVM: arm64: nv: Nested GICv3 emulation
` [PATCH 10/16] KVM: arm64: nv: Handle L2->L1 transition on interrupt injection
` [PATCH 11/16] KVM: arm64: nv: Add Maintenance Interrupt emulation
` [PATCH 12/16] KVM: arm64: nv: Respect virtual HCR_EL2.TWx setting
` [PATCH 13/16] KVM: arm64: nv: Request vPE doorbell upon nested ERET to L2
` [PATCH 14/16] KVM: arm64: nv: Propagate used_lrs between L1 and L0 contexts
` [PATCH 15/16] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
` [PATCH 16/16] KVM: arm64: nv: Allow userland to set VGIC maintenance IRQ

[PATCH v2 00/24] TDX MMU Part 2
 2024-12-17 17:00 UTC  (3+ messages)
` [RFC PATCH 0/2] SEPT SEAMCALL retry proposal

[PATCH 0/7] KVM: TDX: TD vcpu enter/exit
 2024-12-17 16:09 UTC  (5+ messages)
` [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD

[PATCH v2 0/7] Introduce SMP Cache Topology
 2024-12-17 16:20 UTC  (3+ messages)

[PATCH v2 00/12] KVM: arm64: Add NV timer support
 2024-12-17 14:23 UTC  (13+ messages)
` [PATCH v2 01/12] KVM: arm64: nv: Add handling of EL2-specific timer registers
` [PATCH v2 02/12] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
` [PATCH v2 03/12] KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state
` [PATCH v2 04/12] KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers
` [PATCH v2 05/12] KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV in use
` [PATCH v2 06/12] KVM: arm64: nv: Accelerate EL0 counter accesses from hypervisor context
` [PATCH v2 07/12] KVM: arm64: Handle counter access early in non-HYP context
` [PATCH v2 08/12] KVM: arm64: nv: Add trap routing for CNTHCTL_EL2.EL1{NVPCT,NVVCT,TVT,TVCT}
` [PATCH v2 09/12] KVM: arm64: nv: Propagate CNTHCTL_EL2.EL1NV{P,V}CT bits
` [PATCH v2 10/12] KVM: arm64: nv: Sanitise CNTHCTL_EL2
` [PATCH v2 11/12] KVM: arm64: Work around x1e's CNTVOFF_EL2 bogosity
` [PATCH v2 12/12] KVM: arm64: nv: Document EL2 timer API

[PATCH v5 00/18] TDX MMU prep series part 1
 2024-12-17 12:53 UTC  (7+ messages)
` [PATCH 04/18] KVM: x86/mmu: Add an external pointer to struct kvm_mmu_page
` [PATCH 09/18] KVM: x86/tdp_mmu: Extract root invalid check from tdx_mmu_next_root()
` [PATCH 13/18] KVM: x86/tdp_mmu: Propagate attr_filter to MMU notifier callbacks

[PATCH v5 08/12] iommufd: Enforce pasid compatible domain for PASID-capable device
 2024-12-17 13:28 UTC  (14+ messages)

[PATCH v6 00/60] QEMU TDX support
 2024-12-17 13:10 UTC  (10+ messages)
` [PATCH v6 09/60] i386/tdx: Initialize TDX before creating TD vcpus
` [PATCH v6 43/60] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs

[PATCH v5 00/17] Provide a new two step DMA mapping API
 2024-12-17 13:00 UTC  (18+ messages)
` [PATCH v5 01/17] PCI/P2PDMA: Refactor the p2pdma mapping helpers
` [PATCH v5 02/17] dma-mapping: move the PCI P2PDMA mapping helpers to pci-p2pdma.h
` [PATCH v5 03/17] iommu: generalize the batched sync after map interface
` [PATCH v5 04/17] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast
` [PATCH v5 05/17] dma-mapping: Provide an interface to allow allocate IOVA
` [PATCH v5 06/17] iommu/dma: Factor out a iommu_dma_map_swiotlb helper
` [PATCH v5 07/17] dma-mapping: Implement link/unlink ranges API
` [PATCH v5 08/17] dma-mapping: add a dma_need_unmap helper
` [PATCH v5 09/17] docs: core-api: document the IOVA-based API
` [PATCH v5 10/17] mm/hmm: let users to tag specific PFN with DMA mapped bit
` [PATCH v5 11/17] mm/hmm: provide generic DMA managing logic
` [PATCH v5 12/17] RDMA/umem: Store ODP access mask information in PFN
` [PATCH v5 13/17] RDMA/core: Convert UMEM ODP DMA mapping to caching IOVA and page linkage
` [PATCH v5 14/17] RDMA/umem: Separate implicit ODP initialization from explicit ODP
` [PATCH v5 15/17] vfio/mlx5: Explicitly use number of pages instead of allocated length
` [PATCH v5 16/17] vfio/mlx5: Rewrite create mkey flow to allow better code reuse
` [PATCH v5 17/17] vfio/mlx5: Enable the DMA link API

[PATCH 1/4] vfio: Add vfio_device_get()
 2024-12-17 12:19 UTC  (6+ messages)
` [PATCH 2/4] dma-buf: Add dma_buf_try_get()
` [PATCH 3/4] vfio/pci: Allow MMIO regions to be exported through dma-buf
` [PATCH 4/4] vfio/pci: Allow export dmabuf without move_notify from importer
` [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf

[PATCH v15 00/13] Add Secure TSC support for SNP guests
 2024-12-17 11:10 UTC  (19+ messages)
` [PATCH v15 03/13] x86/sev: "
` [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
` [PATCH v15 08/13] x86/cpu/amd: Do not print FW_BUG for Secure TSC
` [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
` [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected

[PATCH 1/4] vfio: Add vfio_device_get()
 2024-12-17 11:06 UTC  (8+ messages)
` [PATCH 2/4] dma-buf: Add dma_buf_try_get()
` [PATCH 3/4] vfio/pci: Allow MMIO regions to be exported through dma-buf
` [PATCH 4/4] vfio/pci: Allow export dmabuf without move_notify from importer
` [PATCH 0/4] cover-letter: Allow MMIO regions to be exported through dmabuf

[PATCH v2 0/4] x86/bugs: Adjust SRSO mitigation to new features
 2024-12-17  9:34 UTC  (13+ messages)
` [PATCH v2 1/4] x86/bugs: Add SRSO_USER_KERNEL_NO support
` [PATCH v2 3/4] x86/bugs: KVM: Add support for SRSO_MSR_FIX

[Bug 219588] New: [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm]
 2024-12-17  9:03 UTC  (5+ messages)
` [Bug 219588] "

[REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
 2024-12-17  8:57 UTC  (6+ messages)

[Bug 218267] New: [Sapphire Rapids][Upstream]Boot up multiple Windows VMs hang
 2024-12-17  3:13 UTC  (4+ messages)
` [Bug 218267] "

[ANNOUNCE] PUCK Agenda - 2024.12.17 *** On Tuesday the 17th!!! ***
 2024-12-17  2:16 UTC  (3+ messages)

[PATCH v3 00/57] KVM: x86: CPUID overhaul, fixes, and caching
 2024-12-17  0:05 UTC  (4+ messages)
` [PATCH v3 50/57] KVM: x86: Replace (almost) all guest CPUID feature queries with cpu_caps

[PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression
 2024-12-16 23:16 UTC  (3+ messages)

[PATCH 0/6] KVM: Fix bugs in vCPUs xarray usage
 2024-12-16 23:05 UTC  (6+ messages)
` [PATCH 4/6] Revert "KVM: Fix vcpu_array[0] races"

[PATCH v4 00/16] KVM: selftests: "tree" wide overhauls
 2024-12-16 22:33 UTC  (2+ messages)

[PATCH v6 00/43] arm64: Support for Arm CCA in KVM
 2024-12-16 17:51 UTC  (5+ messages)
` [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM

[PATCH 1/3] vfio/pci: Remove shadow rom specific code paths
 2024-12-16 13:48 UTC  (4+ messages)
` [PATCH 2/3] vfio/pci: refactor vfio_pci_bar_rw

[PATCH v2 0/6] selftests: kvm: s390: Reject invalid ioctls on ucontrol VMs
 2024-12-16 13:01 UTC  (8+ messages)
` [PATCH v2 1/6] kvm: s390: Reject setting flic pfault attributes "
` [PATCH v2 2/6] selftests: kvm: s390: Add ucontrol flic attr selftests
` [PATCH v2 3/6] kvm: s390: Reject KVM_SET_GSI_ROUTING on ucontrol VMs
` [PATCH v2 4/6] selftests: kvm: s390: Add ucontrol gis routing test
` [PATCH v2 5/6] selftests: kvm: s390: Streamline uc_skey test to issue iske after sske
` [PATCH v2 6/6] selftests: kvm: s390: Add has device attr check to uc_attr_mem_limit selftest

[PATCH 0/7] KVM: TDX: TDX hypercalls may exit to userspace
 2024-12-16  6:03 UTC  (12+ messages)
` [PATCH 1/7] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH 4/7] KVM: TDX: Handle TDG.VP.VMCALL<MapGPA>
` [PATCH 5/7] KVM: TDX: Handle TDG.VP.VMCALL<ReportFatalError>

[PATCH v2] PCI: Remove redundant macro
 2024-12-16  1:35 UTC 

[PATCH] PCI: Remove redundant macro
 2024-12-16  1:22 UTC  (2+ messages)
`  "

[REGRESSION][BISECTED] from bd9bbc96e835: cannot boot Win11 KVM guest
 2024-12-15 18:50 UTC  (2+ messages)

[GIT PULL] KVM changes for Linux 6.13-rc3
 2024-12-15 18:45 UTC  (2+ messages)

[PATCH v1 10/13] KVM: selftests: Add KVM Userfault mode to demand_paging_test
 2024-12-14 22:46 UTC  (2+ messages)

[RFC RESEND 0/6] hugetlbfs largepage RAS project
 2024-12-14 13:45 UTC  (9+ messages)
` [PATCH v4 0/7] Poisoned memory recovery on reboot
  ` [PATCH v4 1/7] hwpoison_page_list and qemu_ram_remap are based on pages
  ` [PATCH v4 2/7] system/physmem: poisoned memory discard on reboot
  ` [PATCH v4 3/7] accel/kvm: Report the loss of a large memory page
  ` [PATCH v4 4/7] numa: Introduce and use ram_block_notify_remap()
  ` [PATCH v4 5/7] hostmem: Factor out applying settings
  ` [PATCH v4 6/7] hostmem: Handle remapping of RAM
  ` [PATCH v4 7/7] system/physmem: Memory settings applied on remap notification

[PATCH 00/20] KVM: selftests: Fixes and cleanups for dirty_log_test
 2024-12-14  1:07 UTC  (13+ messages)
` [PATCH 09/20] KVM: selftests: Honor "stop" request in dirty ring test
` [PATCH 10/20] KVM: selftests: Keep dirty_log_test vCPU in guest until it needs to stop
` [PATCH 11/20] KVM: selftests: Post to sem_vcpu_stop if and only if vcpu_stop is true
` [PATCH 12/20] KVM: selftests: Use continue to handle all "pass" scenarios in dirty_log_test
` [PATCH 13/20] KVM: selftests: Print (previous) last_page on dirty page value mismatch
` [PATCH 14/20] KVM: selftests: Collect *all* dirty entries in each dirty_log_test iteration
` [PATCH 15/20] KVM: sefltests: Verify value of dirty_log_test last page isn't bogus
` [PATCH 16/20] KVM: selftests: Ensure guest writes min number of pages in dirty_log_test
` [PATCH 17/20] KVM: selftests: Tighten checks around prev iter's last dirty page in ring
` [PATCH 18/20] KVM: selftests: Set per-iteration variables at the start of each iteration
` [PATCH 19/20] KVM: selftests: Fix an off-by-one in the number of dirty_log_test iterations
` [PATCH 20/20] KVM: selftests: Allow running a single iteration of dirty_log_test


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox