public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2025-02-27 13:53:41 to 2025-02-28 23:41:02 UTC [more...]

[PATCH]][next] KVM: selftests: Fix spelling mistake "UFFDIO_CONINUE" -> "UFFDIO_CONTINUE"
 2025-02-28 23:40 UTC  (2+ messages)

[PATCH] KVM: x86/tdp_mmu: Remove tdp_mmu_for_each_pte()
 2025-02-28 23:40 UTC  (2+ messages)

[PATCH v3 0/6] KVM: SVM: Fix DEBUGCTL bugs
 2025-02-28 23:40 UTC  (10+ messages)
` [PATCH v3 1/6] KVM: SVM: Drop DEBUGCTL[5:2] from guest's effective value
` [PATCH v3 2/6] KVM: SVM: Suppress DEBUGCTL.BTF on AMD
` [PATCH v3 3/6] KVM: x86: Snapshot the host's DEBUGCTL in common x86
` [PATCH v3 4/6] KVM: SVM: Manually context switch DEBUGCTL if LBR virtualization is disabled
` [PATCH v3 5/6] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs
` [PATCH v3 6/6] KVM: SVM: Treat DEBUGCTL[5:2] as reserved

[PATCH v2 0/2] KVM: SVM: Fix an STI shadow on VMRUN bug
 2025-02-28 23:40 UTC  (2+ messages)

[PATCH] KVM: selftests: Fix printf() format goof in SEV smoke test
 2025-02-28 23:38 UTC 

[PATCH] KVM: selftests: Ensure all vCPUs hit -EFAULT during initial RO stage
 2025-02-28 23:08 UTC 

[PATCH v5 0/7] Move initializing SEV/SNP functionality to KVM
 2025-02-28 22:32 UTC  (5+ messages)
` [PATCH v5 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM

[PATCH v7 0/3] vfio/pci: s390: Fix issues preventing VFIO_PCI_MMAP=y for s390 and enable it
 2025-02-28 21:56 UTC  (3+ messages)
` [PATCH v7 1/3] s390/pci: Fix s390_mmio_read/write syscall page fault handling

[PATCH v3 0/1] KVM: s390: fix a newly introduced bug
 2025-02-28 21:15 UTC  (3+ messages)
` [PATCH v3 1/1] KVM: s390: pv: fix race when making a page secure

[PATCH v7 00/17] Provide a new two step DMA mapping API
 2025-02-28 19:54 UTC  (3+ messages)

[RFC PATCH] vfio/pci: add PCIe TPH to device feature ioctl
 2025-02-28 18:48 UTC  (2+ messages)

[PATCHv3 0/2]
 2025-02-28 18:34 UTC  (12+ messages)
` [PATCHv3 1/2] vhost: return task creation error instead of NULL
` [PATCHv3 2/2] kvm: retry nx_huge_page_recovery_thread creation

[PATCH v6 0/6] target/i386: Update EPYC CPU models for Cache property, RAS, SVM feature and add EPYC-Turin CPU model
 2025-02-28 18:07 UTC  (7+ messages)
` [PATCH v6 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits
` [PATCH v6 2/6] target/i386: Update EPYC-Rome "
` [PATCH v6 3/6] target/i386: Update EPYC-Milan "
` [PATCH v6 4/6] target/i386: Add feature that indicates WRMSR to BASE reg is non-serializing
` [PATCH v6 5/6] target/i386: Update EPYC-Genoa for Cache property, perfmon-v2, RAS and SVM feature bits
` [PATCH v6 6/6] target/i386: Add support for EPYC-Turin model

[kvm-unit-tests PATCH v7 0/6] riscv: add SBI SSE extension tests
 2025-02-28 17:51 UTC  (7+ messages)
` [kvm-unit-tests PATCH v7 2/6] riscv: Set .aux.o files as .PRECIOUS
` [kvm-unit-tests PATCH v7 5/6] lib: riscv: Add SBI SSE support
` [kvm-unit-tests PATCH v7 6/6] riscv: sbi: Add SSE extension tests

[PATCH v6 0/5] Add NUMA mempolicy support for KVM guest-memfd
 2025-02-28 17:51 UTC  (4+ messages)
` [PATCH v6 1/5] mm/filemap: add mempolicy support to the filemap layer

[PATCH v4 00/10] KVM: Mapping guest_memfd backed memory at the host for software protected VMs
 2025-02-28 17:33 UTC  (5+ messages)
` [PATCH v4 04/10] KVM: guest_memfd: Add KVM capability to check if guest_memfd is shared

[PATCH v6 4/5] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
 2025-02-28 17:25 UTC  (2+ messages)

[PATCH v2 0/5] KVM: x86/xen: Restrict hypercall MSR index
 2025-02-28 17:06 UTC  (2+ messages)

[PATCH v2] KVM: x86: Update Xen TSC leaves during CPUID emulation
 2025-02-28 17:06 UTC  (2+ messages)

[PATCH v6 0/3] Add support for the Idle HLT intercept feature
 2025-02-28 17:06 UTC  (12+ messages)
` [PATCH v6 2/3] KVM: SVM: Add Idle HLT intercept support
` [PATCH v6 3/3] KVM: selftests: Add self IPI HLT test

[PATCH v5 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable
 2025-02-28 17:06 UTC  (2+ messages)

[PATCH v3 00/27] Enable FRED with KVM VMX
 2025-02-28 17:06 UTC  (2+ messages)

[PATCH v2 00/11] KVM: x86: Fix emulation of (some) L2 instructions
 2025-02-28 17:06 UTC  (2+ messages)

[PATCH 0/2] KVM: x86: Fix and a cleanup for async #PFs
 2025-02-28 17:06 UTC  (2+ messages)

[PATCH v2 0/6] vfio: Improve DMA mapping performance for huge pfnmaps
 2025-02-28 16:32 UTC  (10+ messages)
` [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps

[PATCH v3] vfio/pci: match IGD devices in display controller class
 2025-02-28 16:32 UTC  (2+ messages)

[PATCH RFC v2 00/29] Address Space Isolation (ASI)
 2025-02-28 15:32 UTC  (3+ messages)
` [PATCH RFC v2 25/29] mm: asi: Restricted execution fore bare-metal processes

[PATCH net-next v7 0/6] tun: Introduce virtio-net hashing feature
 2025-02-28 14:29 UTC  (8+ messages)
` [PATCH net-next v7 1/6] virtio_net: Add functions for hashing
` [PATCH net-next v7 2/6] net: flow_dissector: Export flow_keys_dissector_symmetric
` [PATCH net-next v7 3/6] tun: Introduce virtio-net hash feature
` [PATCH net-next v7 4/6] selftest: tun: Test vnet ioctls without device
` [PATCH net-next v7 5/6] selftest: tun: Add tests for virtio-net hashing
` [PATCH net-next v7 6/6] vhost/net: Support VIRTIO_NET_F_HASH_REPORT

[PATCH net-next v6 0/8] Device memory TCP TX
 2025-02-28 14:25 UTC  (2+ messages)

[PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
 2025-02-28 14:00 UTC  (8+ messages)

[PATCH] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
 2025-02-28 12:25 UTC  (3+ messages)
` [PATCH v3] "

[PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
 2025-02-28 11:55 UTC  (3+ messages)

[PATCH v2 00/38] x86: Try to wrangle PV clocks vs. TSC
 2025-02-28 11:23 UTC  (2+ messages)

[PATCH v1 0/4] iommu: Isolate iova_cookie to actual owners
 2025-02-28 11:20 UTC  (7+ messages)
` [PATCH v1 2/4] iommu: Add iommu_default_domain_free helper

[RFC PATCH 00/31] AMD: Add Secure AVIC KVM selftests
 2025-02-28  9:30 UTC  (32+ messages)
` [RFC PATCH 01/31] Add GHCB with setters and getters
` [RFC PATCH 02/31] Add arch specific additional guest pages
` [RFC PATCH 03/31] Add vm_vaddr_alloc_pages_shared()
` [RFC PATCH 04/31] Add GHCB allocations and helpers
` [RFC PATCH 05/31] Add is_sev_enabled() helpers
` [RFC PATCH 06/31] Add ability for SEV-ES guests to use ucalls via GHCB
` [RFC PATCH 07/31] KVM: selftests: Fix ghcb_entry returned in ghcb_alloc()
` [RFC PATCH 08/31] KVM: selftests: Make GHCB entry page size aligned
` [RFC PATCH 09/31] KVM: selftests: Add support for #VC in x86 exception handlers
` [RFC PATCH 10/31] KVM: selftests: Add MSR VC handling support for SEV-ES VMs
` [RFC PATCH 11/31] KVM: selftests: Skip vm_is_gpa_protected() call for APIC MMIO base
` [RFC PATCH 12/31] KVM: selftests: Add instruction decoding support
` [RFC PATCH 13/31] "
` [RFC PATCH 14/31] KVM: selftests: Add MMIO VC exception handling for SEV-ES guests
` [RFC PATCH 15/31] KVM: selftests: Add instruction decoding for movabs instructions
` [RFC PATCH 16/31] KVM: selftests: Add SEV guests support in xapic_state_test
` [RFC PATCH 17/31] KVM: selftests: Add x2apic mode testing in xapic_ipi_test
` [RFC PATCH 18/31] KVM: selftests: Add SEV VM support "
` [RFC PATCH 19/31] KVM: selftests: Add Secure AVIC lib
` [RFC PATCH 20/31] KVM: selftests: Add unaccelerated APIC msrs #VC handling
` [RFC PATCH 21/31] KVM: selftests: Add IPI handling support for Secure AVIC
` [RFC PATCH 22/31] KVM: selftests: Add args param to kvm_arch_vm_post_create()
` [RFC PATCH 23/31] KVM: selftests: Add SAVIC GPA notification GHCB call
` [RFC PATCH 24/31] KVM: selftests: Add Secure AVIC mode to xapic_ipi_test
` [RFC PATCH 25/31] KVM: selftests: Add Secure AVIC APIC regs test
` [RFC PATCH 26/31] KVM: selftests: Add test to verify APIC MSR accesses for SAVIC guest
` [RFC PATCH 27/31] KVM: selftests: Extend savic test with idle halt testing
` [RFC PATCH 28/31] KVM: selftests: Add IOAPIC tests for Secure AVIC
` [RFC PATCH 29/31] KVM: selftests: Add cross-vCPU IPI testing for SAVIC guests
` [RFC PATCH 30/31] KVM: selftests: Add NMI test "
` [RFC PATCH 31/31] KVM: selftests: Add MSI injection test for SAVIC

[PATCH v2] mm: alloc_pages_bulk: remove assumption of populating only NULL elements
 2025-02-28  9:44 UTC 

[RFC PATCH 00/19] AMD: Add Secure AVIC KVM Support
 2025-02-28  8:51 UTC  (20+ messages)
` [RFC PATCH 01/19] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [RFC PATCH 02/19] KVM: x86: Assume timer IRQ was injected if APIC state is protected
` [RFC PATCH 03/19] KVM: x86: Convert guest_apic_protected bool to an enum type
` [RFC PATCH 04/19] x86/cpufeatures: Add Secure AVIC CPU Feature
` [RFC PATCH 05/19] KVM: SVM: Add support for Secure AVIC capability in KVM
` [RFC PATCH 06/19] KVM: SVM: Initialize apic protected state for SAVIC guests
` [RFC PATCH 07/19] KVM: SEV: Do not intercept SECURE_AVIC_CONTROL MSR
` [RFC PATCH 08/19] KVM: SVM/SEV/X86: Secure AVIC: Add support to inject interrupts
` [RFC PATCH 09/19] KVM: SVM/SEV/X86: Secure AVIC: Add hypervisor side IPI Delivery Support
` [RFC PATCH 10/19] KVM: SVM: Secure AVIC: Do not inject "Exceptions" for Secure AVIC
` [RFC PATCH 11/19] KVM: SVM/SEV: Do not intercept exceptions for Secure AVIC guest
` [RFC PATCH 12/19] KVM: SVM/SEV: Secure AVIC: Set VGIF in VMSA area
` [RFC PATCH 13/19] KVM: SVM/SEV: Secure AVIC: Enable NMI support
` [RFC PATCH 14/19] KVM: SVM/SEV: Add SVM_VMGEXIT_SECURE_AVIC GHCB protocol event handling
` [RFC PATCH 15/19] KVM: x86: Secure AVIC: Indicate APIC is enabled by guest SW _always_
` [RFC PATCH 16/19] KVM: x86: Secure AVIC: Add IOAPIC EOI support for level interrupts
` [RFC PATCH 17/19] KVM: x86/ioapic: Disable RTC_GSI EOI tracking for protected APIC
` [RFC PATCH 18/19] X86: SVM: Check injected vectors before waiting for timer expiry
` [RFC PATCH 19/19] KVM: SVM/SEV: Allow creating VMs with Secure AVIC enabled

[PATCH v6 00/19] Change ghes to use HEST-based offsets and add support for error inject
 2025-02-28  9:19 UTC  (4+ messages)
` [PATCH v6 04/19] acpi/ghes: Cleanup the code which gets ghes ged state

[PATCH RFC v2 03/29] mm: asi: Introduce ASI core API
 2025-02-28  8:43 UTC  (2+ messages)

[PATCH vfio] vfio/virtio: Enable support for virtio-block live migration
 2025-02-28  6:43 UTC  (5+ messages)

[PATCH v3 00/29] TDX MMU part 2
 2025-02-28  4:18 UTC  (3+ messages)
` [PATCH 22/29] KVM: TDX: Add an ioctl to create initial guest memory

[PATCH V2 00/12] KVM: TDX: TD vcpu enter/exit
 2025-02-28  1:58 UTC  (24+ messages)
` [PATCH V2 01/12] x86/virt/tdx: Make tdh_vp_enter() noinstr
` [PATCH V2 02/12] KVM: x86: Allow the use of kvm_load_host_xsave_state() with guest_state_protected
` [PATCH V2 03/12] KVM: TDX: Set arch.has_protected_state to true
` [PATCH V2 05/12] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH V2 07/12] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH V2 09/12] KVM: TDX: restore user ret MSRs

[PATCH v4 00/33] TDX initialization + vCPU/VM creation
 2025-02-28  1:56 UTC  (3+ messages)
` [PATCH 33/33] KVM: TDX: Register TDX host key IDs to cgroup misc controller

[RFC PATCH 0/6] KVM: x86: async PF user
 2025-02-27 23:47 UTC  (12+ messages)

[PATCH][next] KVM: selftests: Fix spelling mistake "avaialable" -> "available"
 2025-02-27 23:03 UTC 

[PATCH v7 00/11] arm64: Support for running as a guest in Arm CCA
 2025-02-27 21:21 UTC  (8+ messages)
` [PATCH v7 09/11] arm64: Enable memory encrypt for Realms

[PATCH 0/7] x86, KVM: Optimize SEV cache flushing
 2025-02-27 19:59 UTC  (3+ messages)
` [PATCH 2/7] x86, lib: Drop the unused return value from wbinvd_on_all_cpus()

[PATCH v2 0/2] KVM: VMX: Clean up EPT_VIOLATIONS_xxx #defines
 2025-02-27 19:51 UTC  (7+ messages)
` [PATCH v2 2/2] KVM: nVMX: Decouple EPT RWX bits from EPT Violation protection bits

[PATCH v5 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
 2025-02-27 18:57 UTC  (2+ messages)

[PATCH v4 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
 2025-02-27 18:57 UTC  (2+ messages)

[PATCH v2 0/5] KVM: SVM: Fix DEBUGCTL bugs
 2025-02-27 17:55 UTC  (9+ messages)
` [PATCH v2 3/5] KVM: SVM: Manually context switch DEBUGCTL if LBR virtualization is disabled

[kvm-unit-tests PATCH v1 0/7] arm64: support EL2
 2025-02-27 17:01 UTC  (11+ messages)
` [kvm-unit-tests PATCH v1 1/7] arm64: drop to EL1 if booted at EL2
` [kvm-unit-tests PATCH v1 2/7] arm64: timer: use hypervisor timers when "
` [kvm-unit-tests PATCH v1 3/7] arm64: micro-bench: fix timer IRQ
` [kvm-unit-tests PATCH v1 5/7] arm64: selftest: update test for running at EL2
` [kvm-unit-tests PATCH v1 6/7] arm64: pmu: count EL2 cycles

[PATCH v7 00/52] QEMU TDX support
 2025-02-27 16:57 UTC  (5+ messages)
` [PATCH v7 28/52] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
` [PATCH v7 38/52] i386/apic: Skip kvm_apic_put() for TDX

[PATCH v2 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
 2025-02-27 16:56 UTC  (11+ messages)
` [PATCH v2 03/10] KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest has an invalid VMSA
` [PATCH v2 05/10] KVM: SVM: Require AP's "requested" SEV_FEATURES to match KVM's view
` [PATCH v2 07/10] KVM: SVM: Use guard(mutex) to simplify SNP AP Creation error handling

[PATCH] KVM: selftests: Relax assertion on HLT exits if CPU supports Idle HLT
 2025-02-27 16:16 UTC  (2+ messages)

[PATCH 0/2] KVM: s390: Don't use %pK through debug printing or tracepoints
 2025-02-27 16:04 UTC  (2+ messages)

[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
 2025-02-27 16:01 UTC  (4+ messages)
` [RFC PATCH v2 20/22] sev-guest: Stop changing encrypted page state for TDISP devices

[PATCH] KVM: selftests: access_tracking_perf_test: add option to skip the sanity check
 2025-02-27 15:41 UTC  (2+ messages)

[PATCH v5 00/21]Change ghes to use HEST-based offsets and add support for error inject
 2025-02-27 15:13 UTC  (3+ messages)

[PATCHv2 0/2] kvm/x86: vhost task creation failure handling
 2025-02-27 15:09 UTC  (3+ messages)

[RFC PATCH 0/3] kvm,sched: Add gtime halted
 2025-02-27 14:39 UTC  (6+ messages)

[PATCH v1 0/2] virtio: Add length checks for device writable portions
 2025-02-27 13:53 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox