messages from 2025-02-27 01:13:30 to 2025-02-27 20:59:23 UTC [more...]
[PATCH v1 0/4] iommu: Isolate iova_cookie to actual owners
2025-02-27 20:59 UTC (4+ messages)
` [PATCH v1 2/4] iommu: Add iommu_default_domain_free helper
[PATCH v2 0/6] vfio: Improve DMA mapping performance for huge pfnmaps
2025-02-27 20:22 UTC (9+ messages)
` [PATCH v2 6/6] vfio/type1: Use mapping page mask for pfnmaps
[PATCH 0/7] x86, KVM: Optimize SEV cache flushing
2025-02-27 19:59 UTC (10+ messages)
` [PATCH 1/7] KVM: SVM: Remove wbinvd in sev_vm_destroy()
` [PATCH 2/7] x86, lib: Drop the unused return value from wbinvd_on_all_cpus()
` [PATCH 3/7] x86, lib: Add WBNOINVD helper functions
` [PATCH 4/7] KVM: SEV: Prefer WBNOINVD over WBINVD for cache maintenance efficiency
` [PATCH 5/7] KVM: x86: Use wbinvd_on_cpu() instead of an open-coded equivalent
` [PATCH 6/7] x86, lib: Add wbinvd and wbnoinvd helpers to target multiple CPUs
` [PATCH 7/7] KVM: SVM: Flush cache only on CPUs running SEV guest
[PATCH v2 0/2] KVM: VMX: Clean up EPT_VIOLATIONS_xxx #defines
2025-02-27 19:51 UTC (7+ messages)
` [PATCH v2 2/2] KVM: nVMX: Decouple EPT RWX bits from EPT Violation protection bits
[PATCH v5 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
2025-02-27 18:57 UTC (2+ messages)
[PATCH v4 4/6] kvm powerpc/book3s-apiv2: Introduce kvm-hv specific PMU
2025-02-27 18:57 UTC (2+ messages)
[PATCH V2 00/12] KVM: TDX: TD vcpu enter/exit
2025-02-27 18:37 UTC (23+ messages)
` [PATCH V2 01/12] x86/virt/tdx: Make tdh_vp_enter() noinstr
` [PATCH V2 02/12] KVM: x86: Allow the use of kvm_load_host_xsave_state() with guest_state_protected
` [PATCH V2 03/12] KVM: TDX: Set arch.has_protected_state to true
` [PATCH V2 05/12] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH V2 07/12] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH V2 09/12] KVM: TDX: restore user ret MSRs
[RFC PATCH 0/6] KVM: x86: async PF user
2025-02-27 18:24 UTC (11+ messages)
[PATCH v4 1/5] hisi_acc_vfio_pci: fix XQE dma address error
2025-02-27 18:00 UTC (2+ messages)
[PATCH v2 0/5] KVM: SVM: Fix DEBUGCTL bugs
2025-02-27 17:55 UTC (12+ messages)
` [PATCH v2 2/5] KVM: x86: Snapshot the host's DEBUGCTL in common x86
` [PATCH v2 3/5] KVM: SVM: Manually context switch DEBUGCTL if LBR virtualization is disabled
` [PATCH v2 4/5] KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs
` [PATCH v2 5/5] KVM: SVM: Treat DEBUGCTL[5:2] as reserved
[PATCH v7 00/11] arm64: Support for running as a guest in Arm CCA
2025-02-27 17:22 UTC (8+ messages)
` [PATCH v7 09/11] arm64: Enable memory encrypt for Realms
[kvm-unit-tests PATCH v1 0/7] arm64: support EL2
2025-02-27 17:01 UTC (11+ messages)
` [kvm-unit-tests PATCH v1 1/7] arm64: drop to EL1 if booted at EL2
` [kvm-unit-tests PATCH v1 2/7] arm64: timer: use hypervisor timers when "
` [kvm-unit-tests PATCH v1 3/7] arm64: micro-bench: fix timer IRQ
` [kvm-unit-tests PATCH v1 5/7] arm64: selftest: update test for running at EL2
` [kvm-unit-tests PATCH v1 6/7] arm64: pmu: count EL2 cycles
[PATCH v7 00/52] QEMU TDX support
2025-02-27 16:57 UTC (5+ messages)
` [PATCH v7 28/52] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
` [PATCH v7 38/52] i386/apic: Skip kvm_apic_put() for TDX
[PATCH v2 00/10] KVM: SVM: Attempt to cleanup SEV_FEATURES
2025-02-27 16:56 UTC (19+ messages)
` [PATCH v2 01/10] KVM: SVM: Save host DR masks on CPUs with DebugSwap
` [PATCH v2 02/10] KVM: SVM: Don't rely on DebugSwap to restore host DR0..DR3
` [PATCH v2 03/10] KVM: SVM: Refuse to attempt VRMUN if an SEV-ES+ guest has an invalid VMSA
` [PATCH v2 04/10] KVM: SVM: Don't change target vCPU state on AP Creation VMGEXIT error
` [PATCH v2 05/10] KVM: SVM: Require AP's "requested" SEV_FEATURES to match KVM's view
` [PATCH v2 06/10] KVM: SVM: Simplify request+kick logic in SNP AP Creation handling
` [PATCH v2 07/10] KVM: SVM: Use guard(mutex) to simplify SNP AP Creation error handling
` [PATCH v2 08/10] KVM: SVM: Mark VMCB dirty before processing incoming snp_vmsa_gpa
` [PATCH v2 09/10] KVM: SVM: Use guard(mutex) to simplify SNP vCPU state updates
` [PATCH v2 10/10] KVM: SVM: Invalidate "next" SNP VMSA GPA even on failure
[PATCH v6 00/19] Change ghes to use HEST-based offsets and add support for error inject
2025-02-27 16:43 UTC (3+ messages)
` [PATCH v6 04/19] acpi/ghes: Cleanup the code which gets ghes ged state
[PATCH] KVM: selftests: Relax assertion on HLT exits if CPU supports Idle HLT
2025-02-27 16:16 UTC (2+ messages)
[PATCH v6 0/3] Add support for the Idle HLT intercept feature
2025-02-27 16:11 UTC (7+ messages)
` [PATCH v6 2/3] KVM: SVM: Add Idle HLT intercept support
[PATCH 0/2] KVM: s390: Don't use %pK through debug printing or tracepoints
2025-02-27 16:04 UTC (2+ messages)
[kvm-unit-tests PATCH v7 0/6] riscv: add SBI SSE extension tests
2025-02-27 16:03 UTC (5+ messages)
` [kvm-unit-tests PATCH v7 2/6] riscv: Set .aux.o files as .PRECIOUS
` [kvm-unit-tests PATCH v7 5/6] lib: riscv: Add SBI SSE support
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-02-27 16:01 UTC (10+ messages)
` [RFC PATCH v2 14/22] iommufd: Add TIO calls
` [RFC PATCH v2 20/22] sev-guest: Stop changing encrypted page state for TDISP devices
[PATCH] KVM: selftests: access_tracking_perf_test: add option to skip the sanity check
2025-02-27 15:41 UTC (2+ messages)
[PATCH v5 00/21]Change ghes to use HEST-based offsets and add support for error inject
2025-02-27 15:13 UTC (4+ messages)
` [PATCH v5 04/21] acpi/ghes: Cleanup the code which gets ghes ged state
[PATCHv2 0/2] kvm/x86: vhost task creation failure handling
2025-02-27 15:09 UTC (3+ messages)
[RFC PATCH 0/3] kvm,sched: Add gtime halted
2025-02-27 14:39 UTC (10+ messages)
` [RFC PATCH 3/3] sched,x86: Make the scheduler guest unhalted aware
` [RFC PATCH 3/3] sched, x86: "
[PATCH v1 0/2] virtio: Add length checks for device writable portions
2025-02-27 13:53 UTC (4+ messages)
[Bug 219009] New: Random host reboots on Ryzen 7000/8000 using nested VMs (vls suspected)
2025-02-27 13:26 UTC (2+ messages)
` [Bug 219009] "
[PATCH v2 00/38] x86: Try to wrangle PV clocks vs. TSC
2025-02-27 13:17 UTC (42+ messages)
` [PATCH v2 01/38] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
` [PATCH v2 02/38] x86/tsc: Add standalone helper for getting CPU frequency from CPUID
` [PATCH v2 03/38] x86/tsc: Add helper to register CPU and TSC freq calibration routines
` [PATCH v2 04/38] x86/sev: Mark TSC as reliable when configuring Secure TSC
` [PATCH v2 05/38] x86/sev: Move check for SNP Secure TSC support to tsc_early_init()
` [PATCH v2 06/38] x86/tdx: Override PV calibration routines with CPUID-based calibration
` [PATCH v2 07/38] x86/acrn: Mark TSC frequency as known when using ACRN for calibration
` [PATCH v2 08/38] clocksource: hyper-v: Register sched_clock save/restore iff it's necessary
` [PATCH v2 09/38] clocksource: hyper-v: Drop wrappers to sched_clock save/restore helpers
` [PATCH v2 10/38] clocksource: hyper-v: Don't save/restore TSC offset when using HV sched_clock
` [PATCH v2 11/38] x86/kvmclock: Setup kvmclock for secondary CPUs iff CONFIG_SMP=y
` [PATCH v2 12/38] x86/kvm: Don't disable kvmclock on BSP in syscore_suspend()
` [PATCH v2 13/38] x86/paravirt: Move handling of unstable PV clocks into paravirt_set_sched_clock()
` [PATCH v2 14/38] x86/kvmclock: Move sched_clock save/restore helpers up in kvmclock.c
` [PATCH v2 15/38] x86/xen/time: Nullify x86_platform's sched_clock save/restore hooks
` [PATCH v2 16/38] x86/vmware: Nullify save/restore hooks when using VMware's sched_clock
` [PATCH v2 17/38] x86/tsc: WARN if TSC sched_clock save/restore used with PV sched_clock
` [PATCH v2 18/38] x86/paravirt: Pass sched_clock save/restore helpers during registration
` [PATCH v2 19/38] x86/kvmclock: Move kvm_sched_clock_init() down in kvmclock.c
` [PATCH v2 20/38] x86/xen/time: Mark xen_setup_vsyscall_time_info() as __init
` [PATCH v2 21/38] x86/pvclock: Mark setup helpers and related various as __init/__ro_after_init
` [PATCH v2 22/38] x86/pvclock: WARN if pvclock's valid_flags are overwritten
` [PATCH v2 23/38] x86/kvmclock: Refactor handling of PVCLOCK_TSC_STABLE_BIT during kvmclock_init()
` [PATCH v2 24/38] timekeeping: Resume clocksources before reading persistent clock
` [PATCH v2 25/38] x86/kvmclock: Hook clocksource.suspend/resume when kvmclock isn't sched_clock
` [PATCH v2 26/38] x86/kvmclock: WARN if wall clock is read while kvmclock is suspended
` [PATCH v2 27/38] x86/kvmclock: Enable kvmclock on APs during onlining if kvmclock isn't sched_clock
` [PATCH v2 28/38] x86/paravirt: Mark __paravirt_set_sched_clock() as __init
` [PATCH v2 29/38] x86/paravirt: Plumb a return code into __paravirt_set_sched_clock()
` [PATCH v2 30/38] x86/paravirt: Don't use a PV sched_clock in CoCo guests with trusted TSC
` [PATCH v2 31/38] x86/tsc: Pass KNOWN_FREQ and RELIABLE as params to registration
` [PATCH v2 32/38] x86/tsc: Rejects attempts to override TSC calibration with lesser routine
` [PATCH v2 33/38] x86/kvmclock: Mark TSC as reliable when it's constant and nonstop
` [PATCH v2 34/38] x86/kvmclock: Get CPU base frequency from CPUID when it's available
` [PATCH v2 35/38] x86/kvmclock: Get TSC frequency from CPUID when its available
` [PATCH v2 36/38] x86/kvmclock: Stuff local APIC bus period when core crystal freq comes from CPUID
` [PATCH v2 37/38] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
` [PATCH v2 38/38] x86/paravirt: kvmclock: Setup kvmclock early iff it's sched_clock
[kvm-unit-tests PATCH v1] s390x: pv: fix arguments for out-of-tree-builds
2025-02-27 13:15 UTC (2+ messages)
[PATCH v3 0/1] KVM: s390: fix a newly introduced bug
2025-02-27 13:09 UTC (2+ messages)
` [PATCH v3 1/1] KVM: s390: pv: fix race when making a page secure
[kvm-unit-tests PATCH] arch-run: fix test skips when /dev/stderr does not point to /proc/self/fd/2
2025-02-27 13:07 UTC
[PATCH] KVM: x86: ioapic: Optimize EOI handling to reduce unnecessary VM exits
2025-02-27 12:16 UTC (4+ messages)
` [PATCH Resend] "
[PATCH RFC v2 00/29] Address Space Isolation (ASI)
2025-02-27 12:06 UTC (5+ messages)
` [PATCH RFC v2 03/29] mm: asi: Introduce ASI core API
[PATCH v4 00/14] Change ghes to use HEST-based offsets and add support for error inject
2025-02-27 11:05 UTC (3+ messages)
[PATCH 0/4] RISC-V KVM PMU fix and selftest improvement
2025-02-27 8:49 UTC (9+ messages)
` [PATCH 1/4] RISC-V: KVM: Disable the kernel perf counter during configure
` [PATCH 2/4] KVM: riscv: selftests: Do not start the counter in the overflow handler
` [PATCH 3/4] KVM: riscv: selftests: Change command line option
` [PATCH 4/4] KVM: riscv: selftests: Allow number of interrupts to be configurable
[GIT PULL] KVM changes for Linux 6.14
2025-02-27 8:15 UTC (11+ messages)
[PATCH net-next v6 0/8] Device memory TCP TX
2025-02-27 7:59 UTC (10+ messages)
` [PATCH net-next v6 1/8] net: add get_netmem/put_netmem support
` [PATCH net-next v6 2/8] net: devmem: TCP tx netlink api
` [PATCH net-next v6 3/8] net: devmem: Implement TX path
` [PATCH net-next v6 4/8] net: add devmem TCP TX documentation
` [PATCH net-next v6 5/8] net: enable driver support for netmem TX
` [PATCH net-next v6 6/8] gve: add netmem TX support to GVE DQO-RDA mode
` [PATCH net-next v6 7/8] net: check for driver support in netmem TX
` [PATCH net-next v6 8/8] selftests: ncdevmem: Implement devmem TCP TX
[PATCH v5 0/6] target/i386: Update EPYC CPU models for Cache property, RAS, SVM feature and add EPYC-Turin CPU model
2025-02-27 6:42 UTC (6+ messages)
` [PATCH v5 1/6] target/i386: Update EPYC CPU model for Cache property, RAS, SVM feature bits
[PATCH] KVM: selftests: Wait mprotect_ro_done before write to RO in mmu_stress_test
2025-02-27 5:45 UTC (5+ messages)
[PATCH v9 00/11] KVM: x86/mmu: Age sptes locklessly
2025-02-27 1:54 UTC (8+ messages)
[PATCH v2 0/6] IBPB cleanups and a fixup
2025-02-27 1:42 UTC (9+ messages)
` [PATCH v2 1/6] x86/bugs: Move the X86_FEATURE_USE_IBPB check into callers
` [PATCH v2 2/6] x86/mm: Remove X86_FEATURE_USE_IBPB checks in cond_mitigation()
` [PATCH v2 3/6] x86/bugs: Remove the X86_FEATURE_USE_IBPB check in ib_prctl_set()
` [PATCH v2 4/6] x86/bugs: Use a static branch to guard IBPB on vCPU switch
` [PATCH v2 5/6] KVM: nVMX: Always use IBPB to properly virtualize IBRS
` [PATCH v2 6/6] x86/bugs: Remove X86_FEATURE_USE_IBPB
[PATCH v2 00/20] KVM: TDX: TDX "the rest" part
2025-02-27 1:20 UTC (21+ messages)
` [PATCH v2 01/20] KVM: TDX: Handle EPT violation/misconfig exit
` [PATCH v2 02/20] KVM: TDX: Detect unexpected SEPT violations due to pending SPTEs
` [PATCH v2 03/20] KVM: TDX: Retry locally in TDX EPT violation handler on RET_PF_RETRY
` [PATCH v2 04/20] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
` [PATCH v2 05/20] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v2 06/20] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v2 07/20] KVM: x86: Move KVM_MAX_MCE_BANKS to header file
` [PATCH v2 08/20] KVM: TDX: Implement callbacks for MSR operations
` [PATCH v2 09/20] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v2 10/20] KVM: TDX: Enable guest access to LMCE related MSRs
` [PATCH v2 11/20] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v2 12/20] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v2 13/20] KVM: TDX: Add method to ignore guest instruction emulation
` [PATCH v2 14/20] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v2 15/20] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v2 16/20] KVM: TDX: Ignore setting up mce
` [PATCH v2 17/20] KVM: TDX: Add a method to ignore hypercall patching
` [PATCH v2 18/20] KVM: TDX: Enable guest access to MTRR MSRs
` [PATCH v2 19/20] KVM: TDX: Make TDX VM type supported
` [PATCH v2 20/20] Documentation/virt/kvm: Document on Trust Domain Extensions (TDX)
[PATCH 0/2] KVM: x86: Advertise support for WRMSRNS
2025-02-27 1:14 UTC (3+ messages)
` [PATCH 1/2] x86/msr: Rename the WRMSRNS opcode macro to ASM_WRMSRNS (for KVM)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox