public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-02-26 19:55:56 to 2025-02-27 13:53:41 UTC [more...]

[PATCH v1 0/2] virtio: Add length checks for device writable portions
 2025-02-27 13:53 UTC  (4+ messages)

[PATCH v5 00/21]Change ghes to use HEST-based offsets and add support for error inject
 2025-02-27 13:30 UTC  (3+ messages)
` [PATCH v5 04/21] acpi/ghes: Cleanup the code which gets ghes ged state

[Bug 219009] New: Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
 2025-02-27 13:26 UTC  (2+ messages)
` [Bug 219009] "

[PATCH v2 00/38] x86: Try to wrangle PV clocks vs. TSC
 2025-02-27 13:17 UTC  (42+ messages)
` [PATCH v2 01/38] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
` [PATCH v2 02/38] x86/tsc: Add standalone helper for getting CPU frequency from CPUID
` [PATCH v2 03/38] x86/tsc: Add helper to register CPU and TSC freq calibration routines
` [PATCH v2 04/38] x86/sev: Mark TSC as reliable when configuring Secure TSC
` [PATCH v2 05/38] x86/sev: Move check for SNP Secure TSC support to tsc_early_init()
` [PATCH v2 06/38] x86/tdx: Override PV calibration routines with CPUID-based calibration
` [PATCH v2 07/38] x86/acrn: Mark TSC frequency as known when using ACRN for calibration
` [PATCH v2 08/38] clocksource: hyper-v: Register sched_clock save/restore iff it's necessary
` [PATCH v2 09/38] clocksource: hyper-v: Drop wrappers to sched_clock save/restore helpers
` [PATCH v2 10/38] clocksource: hyper-v: Don't save/restore TSC offset when using HV sched_clock
` [PATCH v2 11/38] x86/kvmclock: Setup kvmclock for secondary CPUs iff CONFIG_SMP=y
` [PATCH v2 12/38] x86/kvm: Don't disable kvmclock on BSP in syscore_suspend()
` [PATCH v2 13/38] x86/paravirt: Move handling of unstable PV clocks into paravirt_set_sched_clock()
` [PATCH v2 14/38] x86/kvmclock: Move sched_clock save/restore helpers up in kvmclock.c
` [PATCH v2 15/38] x86/xen/time: Nullify x86_platform's sched_clock save/restore hooks
` [PATCH v2 16/38] x86/vmware: Nullify save/restore hooks when using VMware's sched_clock
` [PATCH v2 17/38] x86/tsc: WARN if TSC sched_clock save/restore used with PV sched_clock
` [PATCH v2 18/38] x86/paravirt: Pass sched_clock save/restore helpers during registration
` [PATCH v2 19/38] x86/kvmclock: Move kvm_sched_clock_init() down in kvmclock.c
` [PATCH v2 20/38] x86/xen/time: Mark xen_setup_vsyscall_time_info() as __init
` [PATCH v2 21/38] x86/pvclock: Mark setup helpers and related various as __init/__ro_after_init
` [PATCH v2 22/38] x86/pvclock: WARN if pvclock's valid_flags are overwritten
` [PATCH v2 23/38] x86/kvmclock: Refactor handling of PVCLOCK_TSC_STABLE_BIT during kvmclock_init()
` [PATCH v2 24/38] timekeeping: Resume clocksources before reading persistent clock
` [PATCH v2 25/38] x86/kvmclock: Hook clocksource.suspend/resume when kvmclock isn't sched_clock
` [PATCH v2 26/38] x86/kvmclock: WARN if wall clock is read while kvmclock is suspended
` [PATCH v2 27/38] x86/kvmclock: Enable kvmclock on APs during onlining if kvmclock isn't sched_clock
` [PATCH v2 28/38] x86/paravirt: Mark __paravirt_set_sched_clock() as __init
` [PATCH v2 29/38] x86/paravirt: Plumb a return code into __paravirt_set_sched_clock()
` [PATCH v2 30/38] x86/paravirt: Don't use a PV sched_clock in CoCo guests with trusted TSC
` [PATCH v2 31/38] x86/tsc: Pass KNOWN_FREQ and RELIABLE as params to registration
` [PATCH v2 32/38] x86/tsc: Rejects attempts to override TSC calibration with lesser routine
` [PATCH v2 33/38] x86/kvmclock: Mark TSC as reliable when it's constant and nonstop
` [PATCH v2 34/38] x86/kvmclock: Get CPU base frequency from CPUID when it's available
` [PATCH v2 35/38] x86/kvmclock: Get TSC frequency from CPUID when its available
` [PATCH v2 36/38] x86/kvmclock: Stuff local APIC bus period when core crystal freq comes from CPUID
` [PATCH v2 37/38] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
` [PATCH v2 38/38] x86/paravirt: kvmclock: Setup kvmclock early iff it's sched_clock

[kvm-unit-tests PATCH v1] s390x: pv: fix arguments for out-of-tree-builds
 2025-02-27 13:15 UTC  (2+ messages)

[PATCH v3 0/1] KVM: s390: fix a newly introduced bug
 2025-02-27 13:09 UTC  (2+ messages)
` [PATCH v3 1/1] KVM: s390: pv: fix race when making a page secure

[kvm-unit-tests PATCH] arch-run: fix test skips when /dev/stderr does not point to /proc/self/fd/2
 2025-02-27 13:07 UTC 

[PATCH 0/7] x86, KVM: Optimize SEV cache flushing
 2025-02-27 12:45 UTC  (9+ messages)
` [PATCH 1/7] KVM: SVM: Remove wbinvd in sev_vm_destroy()
` [PATCH 2/7] x86, lib: Drop the unused return value from wbinvd_on_all_cpus()
` [PATCH 3/7] x86, lib: Add WBNOINVD helper functions
` [PATCH 4/7] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
` [PATCH 5/7] KVM: x86: Use wbinvd_on_cpu() instead of an open-coded equivalent
` [PATCH 6/7] x86, lib: Add wbinvd and wbnoinvd helpers to target multiple CPUs
` [PATCH 7/7] KVM: SVM: Flush cache only on CPUs running SEV guest

[PATCH] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
 2025-02-27 12:16 UTC  (4+ messages)
` [PATCH Resend] "

[PATCH RFC v2 00/29] Address Space Isolation (ASI)
 2025-02-27 12:06 UTC  (5+ messages)
` [PATCH RFC v2 03/29] mm: asi: Introduce ASI core API

[PATCH v4 00/14] Change ghes to use HEST-based offsets and add support for error inject
 2025-02-27 11:05 UTC  (3+ messages)

[PATCH v7 00/11] arm64: Support for running as a guest in Arm CCA
 2025-02-27 10:55 UTC  (7+ messages)
` [PATCH v7 09/11] arm64: Enable memory encrypt for Realms

[PATCH v2 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
 2025-02-27 10:25 UTC  (13+ messages)
` [PATCH v2 01/10] KVM: SVM: Save host DR masks on CPUs with DebugSwap
` [PATCH v2 02/10] KVM: SVM: Don't rely on DebugSwap to restore host DR0..DR3
` [PATCH v2 03/10] KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest has an invalid VMSA
` [PATCH v2 04/10] KVM: SVM: Don't change target vCPU state on AP Creation VMGEXIT error
` [PATCH v2 05/10] KVM: SVM: Require AP's "requested" SEV_FEATURES to match KVM's view
` [PATCH v2 06/10] KVM: SVM: Simplify request+kick logic in SNP AP Creation handling
` [PATCH v2 07/10] KVM: SVM: Use guard(mutex) to simplify SNP AP Creation error handling
` [PATCH v2 08/10] KVM: SVM: Mark VMCB dirty before processing incoming snp_vmsa_gpa
` [PATCH v2 09/10] KVM: SVM: Use guard(mutex) to simplify SNP vCPU state updates
` [PATCH v2 10/10] KVM: SVM: Invalidate "next" SNP VMSA GPA even on failure

[PATCHv2 0/2] kvm/x86: vhost task creation failure handling
 2025-02-27 10:21 UTC  (4+ messages)
` [PATCHv2 1/2] vhost: return task creation error instead of NULL
` [PATCHv2 2/2] kvm: retry nx_huge_page_recovery_thread creation

[RFC PATCH 0/3] kvm,sched: Add gtime halted
 2025-02-27  9:03 UTC  (9+ messages)
` [RFC PATCH 3/3] sched,x86: Make the scheduler guest unhalted aware
    ` [RFC PATCH 3/3] sched, x86: "

[PATCH 0/4] RISC-V KVM PMU fix and selftest improvement
 2025-02-27  8:49 UTC  (9+ messages)
` [PATCH 1/4] RISC-V: KVM: Disable the kernel perf counter during configure
` [PATCH 2/4] KVM: riscv: selftests: Do not start the counter in the overflow handler
` [PATCH 3/4] KVM: riscv: selftests: Change command line option
` [PATCH 4/4] KVM: riscv: selftests: Allow number of interrupts to be configurable

[PATCH v6 0/3] Add support for the Idle HLT intercept feature
 2025-02-27  8:21 UTC  (4+ messages)
` [PATCH v6 2/3] KVM: SVM: Add Idle HLT intercept support

[GIT PULL] KVM changes for Linux 6.14
 2025-02-27  8:15 UTC  (11+ messages)

[PATCH net-next v6 0/8] Device memory TCP TX
 2025-02-27  7:59 UTC  (10+ messages)
` [PATCH net-next v6 1/8] net: add get_netmem/put_netmem support
` [PATCH net-next v6 2/8] net: devmem: TCP tx netlink api
` [PATCH net-next v6 3/8] net: devmem: Implement TX path
` [PATCH net-next v6 4/8] net: add devmem TCP TX documentation
` [PATCH net-next v6 5/8] net: enable driver support for netmem TX
` [PATCH net-next v6 6/8] gve: add netmem TX support to GVE DQO-RDA mode
` [PATCH net-next v6 7/8] net: check for driver support in netmem TX
` [PATCH net-next v6 8/8] selftests: ncdevmem: Implement devmem TCP TX

[PATCH v2 0/2] KVM: VMX: Clean up EPT_VIOLATIONS_xxx #defines
 2025-02-27  6:52 UTC  (4+ messages)
` [PATCH v2 1/2] KVM: VMX: Remove EPT_VIOLATIONS_ACC_*_BIT defines
` [PATCH v2 2/2] KVM: nVMX: Decouple EPT RWX bits from EPT Violation protection bits

[PATCH v5 0/6] target/i386: Update EPYC CPU models for Cache property, RAS, SVM feature and add EPYC-Turin CPU model
 2025-02-27  6:42 UTC  (6+ messages)
` [PATCH v5 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits

[PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
 2025-02-27  5:45 UTC  (5+ messages)

[PATCH] KVM: selftests: access_tracking_perf_test: add option to skip the sanity check
 2025-02-27  4:15 UTC 

[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
 2025-02-27  3:59 UTC  (8+ messages)
` [RFC PATCH v2 14/22] iommufd: Add TIO calls

[PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
 2025-02-27  1:54 UTC  (8+ messages)

[PATCH v2 0/6] IBPB cleanups and a fixup
 2025-02-27  1:42 UTC  (9+ messages)
` [PATCH v2 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
` [PATCH v2 2/6] x86/mm: Remove X86_FEATURE_USE_IBPB checks in cond_mitigation()
` [PATCH v2 3/6] x86/bugs: Remove the X86_FEATURE_USE_IBPB check in ib_prctl_set()
` [PATCH v2 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU switch
` [PATCH v2 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
` [PATCH v2 6/6] x86/bugs: Remove X86_FEATURE_USE_IBPB

[PATCH v2 00/20] KVM: TDX: TDX "the rest" part
 2025-02-27  1:20 UTC  (21+ messages)
` [PATCH v2 01/20] KVM: TDX: Handle EPT violation/misconfig exit
` [PATCH v2 02/20] KVM: TDX: Detect unexpected SEPT violations due to pending SPTEs
` [PATCH v2 03/20] KVM: TDX: Retry locally in TDX EPT violation handler on RET_PF_RETRY
` [PATCH v2 04/20] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
` [PATCH v2 05/20] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v2 06/20] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v2 07/20] KVM: x86: Move KVM_MAX_MCE_BANKS to header file
` [PATCH v2 08/20] KVM: TDX: Implement callbacks for MSR operations
` [PATCH v2 09/20] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v2 10/20] KVM: TDX: Enable guest access to LMCE related MSRs
` [PATCH v2 11/20] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v2 12/20] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v2 13/20] KVM: TDX: Add method to ignore guest instruction emulation
` [PATCH v2 14/20] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v2 15/20] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v2 16/20] KVM: TDX: Ignore setting up mce
` [PATCH v2 17/20] KVM: TDX: Add a method to ignore hypercall patching
` [PATCH v2 18/20] KVM: TDX: Enable guest access to MTRR MSRs
` [PATCH v2 19/20] KVM: TDX: Make TDX VM type supported
` [PATCH v2 20/20] Documentation/virt/kvm: Document on Trust Domain Extensions (TDX)

[PATCH 0/2] KVM: x86: Advertise support for WRMSRNS
 2025-02-27  1:14 UTC  (4+ messages)
` [PATCH 1/2] x86/msr: Rename the WRMSRNS opcode macro to ASM_WRMSRNS (for KVM)
` [PATCH 2/2] KVM: x86: Advertise support for WRMSRNS

[PATCH v2 0/5] KVM: SVM: Fix DEBUGCTL bugs
 2025-02-27  1:13 UTC  (6+ messages)
` [PATCH v2 1/5] KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value
` [PATCH v2 2/5] KVM: x86: Snapshot the host's DEBUGCTL in common x86
` [PATCH v2 3/5] KVM: SVM: Manually context switch DEBUGCTL if LBR virtualization is disabled
` [PATCH v2 4/5] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs
` [PATCH v2 5/5] KVM: SVM: Treat DEBUGCTL[5:2] as reserved

[PATCH v4 00/21] Add Counter delegation ISA extension support
 2025-02-27  1:05 UTC  (10+ messages)
` [PATCH v4 08/21] RISC-V: Add Sscfg extension CSR definition
` [PATCH v4 09/21] RISC-V: Add Ssccfg ISA extension definition and parsing
` [PATCH v4 12/21] RISC-V: perf: Modify the counter discovery mechanism

[PATCH 0/6] IBPB cleanups and a fixup
 2025-02-27  0:54 UTC  (8+ messages)
` [PATCH 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU load

[PATCH] KVM: VMX: Extract checks on entry/exit control pairs to a helper macro
 2025-02-27  0:53 UTC 

[PATCH v7 0/3] KVM: SVM: Flush cache only on CPUs running SEV guest
 2025-02-26 23:58 UTC  (5+ messages)
` [PATCH v7 3/3] "

[PATCH] KVM: selftests: Relax assertion on HLT exits if CPU supports Idle HLT
 2025-02-26 23:18 UTC 

[RFC PATCH v5 04/15] KVM: guest_memfd: Track mappability within a struct kvm_gmem_private
 2025-02-26 22:29 UTC  (2+ messages)

[PATCH v4 00/33] TDX initialization + vCPU/VM creation
 2025-02-26 22:03 UTC  (3+ messages)
` [PATCH 25/33] KVM: x86: expose cpuid_entry2_find for TDX

[RFC 2/2] kvm: retry nx_huge_page_recovery_thread creation
 2025-02-26 20:22 UTC  (3+ messages)

[PATCH v1 0/4] iommu: Isolate iova_cookie to actual owners
 2025-02-26 20:16 UTC  (5+ messages)
` [PATCH v1 1/4] iommu: Define iommu_get/put_msi_cookie() under CONFIG_IRQ_MSI_IOMMU
` [PATCH v1 2/4] iommu: Add iommu_default_domain_free helper
` [PATCH v1 3/4] iommu: Request iova_cookie owner to put cookie explicitly
` [PATCH v1 4/4] iommu: Turn iova_cookie to dma-iommu private pointer

[PATCH v2 0/6] vfio: Improve DMA mapping performance for huge pfnmaps
 2025-02-26 20:05 UTC  (5+ messages)
` [PATCH v2 5/6] mm: Provide address mask in struct follow_pfnmap_args

[PATCH v3 00/29] TDX MMU part 2
 2025-02-26 19:55 UTC  (16+ messages)
` [PATCH 15/29] KVM: x86/mmu: Add setter for shadow_mmio_value
` [PATCH 16/29] KVM: TDX: Set per-VM shadow_mmio_value to 0
` [PATCH 17/29] KVM: TDX: Handle TLB tracking for TDX
` [PATCH 18/29] KVM: TDX: Implement hooks to propagate changes of TDP MMU mirror page table
` [PATCH 19/29] KVM: TDX: Implement hook to get max mapping level of private pages
` [PATCH 20/29] KVM: x86/mmu: Bail out kvm_tdp_map_page() when VM dead
` [PATCH 21/29] KVM: x86/mmu: Export kvm_tdp_map_page()
` [PATCH 22/29] KVM: TDX: Add an ioctl to create initial guest memory
` [PATCH 23/29] KVM: TDX: Finalize VM initialization
` [PATCH 24/29] KVM: TDX: Handle vCPU dissociation
` [PATCH 25/29] KVM: Add parameter "kvm" to kvm_cpu_dirty_log_size() and its callers
` [PATCH 26/29] KVM: x86/mmu: Add parameter "kvm" to kvm_mmu_page_ad_need_write_protect()
` [PATCH 27/29] KVM: x86: Make cpu_dirty_log_size a per-VM value
` [PATCH 28/29] KVM: TDX: Skip updating CPU dirty logging request for TDs
` [PATCH 29/29] KVM: TDX: Handle SEPT zap error due to page add error in premap


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox