kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-07-14 16:32:53 to 2020-07-16 08:43:32 UTC [more...]

device compatibility interface for live migration with assigned devices
 2020-07-16  8:32 UTC  (15+ messages)

[PATCH v5 00/18] Add support for Nitro Enclaves
 2020-07-16  8:30 UTC  (20+ messages)
` [PATCH v5 01/18] nitro_enclaves: Add ioctl interface definition
` [PATCH v5 02/18] nitro_enclaves: Define the PCI device interface
` [PATCH v5 03/18] nitro_enclaves: Define enclave info for internal bookkeeping
` [PATCH v5 04/18] nitro_enclaves: Init PCI device driver
` [PATCH v5 05/18] nitro_enclaves: Handle PCI device command requests
` [PATCH v5 06/18] nitro_enclaves: Handle out-of-band PCI device events
` [PATCH v5 07/18] nitro_enclaves: Init misc device providing the ioctl interface
` [PATCH v5 08/18] nitro_enclaves: Add logic for creating an enclave VM
` [PATCH v5 09/18] nitro_enclaves: Add logic for setting an enclave vCPU
` [PATCH v5 10/18] nitro_enclaves: Add logic for getting the enclave image load info
` [PATCH v5 11/18] nitro_enclaves: Add logic for setting an enclave memory region
` [PATCH v5 12/18] nitro_enclaves: Add logic for starting an enclave
` [PATCH v5 13/18] nitro_enclaves: Add logic for terminating "
` [PATCH v5 14/18] nitro_enclaves: Add Kconfig for the Nitro Enclaves driver
` [PATCH v5 15/18] nitro_enclaves: Add Makefile "
` [PATCH v5 16/18] nitro_enclaves: Add sample for ioctl interface usage
` [PATCH v5 17/18] nitro_enclaves: Add overview documentation
` [PATCH v5 18/18] MAINTAINERS: Add entry for the Nitro Enclaves driver

[kvm-unit-tests PATCH v13 0/9] s390x: Testing the Channel Subsystem I/O
 2020-07-16  8:23 UTC  (10+ messages)
` [kvm-unit-tests PATCH v13 1/9] s390x: saving regs for interrupts
` [kvm-unit-tests PATCH v13 2/9] s390x: I/O interrupt registration
` [kvm-unit-tests PATCH v13 3/9] s390x: export the clock get_clock_ms() utility
` [kvm-unit-tests PATCH v13 4/9] s390x: clock and delays calculations
` [kvm-unit-tests PATCH v13 5/9] s390x: define function to wait for interrupt
` [kvm-unit-tests PATCH v13 6/9] s390x: Library resources for CSS tests
` [kvm-unit-tests PATCH v13 7/9] s390x: css: stsch, enumeration test
` [kvm-unit-tests PATCH v13 8/9] s390x: css: msch, enable test
` [kvm-unit-tests PATCH v13 9/9] s390x: css: ssch/tsch with sense and interrupt

[PATCH 0/7] *** IRQ offloading for vDPA ***
 2020-07-16  8:06 UTC  (7+ messages)

[kvm-unit-tests PATCH v2 0/2] Fix some compilation issues on 32bit
 2020-07-16  7:11 UTC  (6+ messages)
` [kvm-unit-tests PATCH v2 1/2] x86/cstart: Fix compilation issue in 32 bit mode
` [kvm-unit-tests PATCH v2 2/2] lib/alloc_page: Fix compilation issue on 32bit archs

[PATCH 0/3] KVM: VMX: Clean up RTIT MAXPHYADDR usage
 2020-07-16  3:44 UTC  (4+ messages)
` [PATCH 1/3] KVM: VMX: Use precomputed MAXPHYADDR for RTIT base MSR check
` [PATCH 2/3] KVM: VMX: Replace MSR_IA32_RTIT_OUTPUT_BASE_MASK with helper function
` [PATCH 3/3] KVM: x86: Unexport cpuid_query_maxphyaddr()

[PATCH 0/9] KVM: x86: TDP level cleanups and shadow NPT fix
 2020-07-16  3:41 UTC  (10+ messages)
` [PATCH 1/9] KVM: nSVM: Correctly set the shadow NPT root level in its MMU role
` [PATCH 2/9] KVM: x86/mmu: Add separate helper for shadow NPT root page role calc
` [PATCH 3/9] KVM: VMX: Drop a duplicate declaration of construct_eptp()
` [PATCH 4/9] KVM: VMX: Make vmx_load_mmu_pgd() static
` [PATCH 5/9] KVM: x86: Pull the PGD's level from the MMU instead of recalculating it
` [PATCH 6/9] KVM: VXM: Remove temporary WARN on expected vs. actual EPTP level mismatch
` [PATCH 7/9] KVM: x86: Dynamically calculate TDP level from max level and MAXPHYADDR
` [PATCH 8/9] KVM: x86/mmu: Rename max_page_level to max_huge_page_level
` [PATCH 9/9] KVM: x86: Specify max TDP level via kvm_configure_mmu()

[RESEND PATCH v13 00/11] Introduce support for guest CET feature
 2020-07-16  3:16 UTC  (12+ messages)
` [RESEND v13 01/11] KVM: x86: Include CET definitions for KVM test purpose
` [RESEND v13 02/11] KVM: VMX: Introduce CET VMCS fields and flags
` [RESEND v13 03/11] KVM: VMX: Set guest CET MSRs per KVM and host configuration
` [RESEND v13 04/11] KVM: VMX: Configure CET settings upon guest CR0/4 changing
` [RESEND v13 05/11] KVM: x86: Refresh CPUID once guest changes XSS bits
` [RESEND v13 06/11] KVM: x86: Load guest fpu state when access MSRs managed by XSAVES
` [RESEND v13 07/11] KVM: x86: Add userspace access interface for CET MSRs
` [RESEND v13 08/11] KVM: VMX: Enable CET support for nested VM
` [RESEND v13 09/11] KVM: VMX: Add VMCS dump and sanity check for CET states
` [RESEND v13 10/11] KVM: x86: Add #CP support in guest exception dispatch
` [RESEND v13 11/11] KVM: x86: Enable CET virtualization and advertise CET to userspace

[PATCH v6 0/5] clean up redundant 'kvm_run' parameters
 2020-07-16  2:19 UTC  (4+ messages)
` [PATCH v6 5/5] KVM: MIPS: clean up redundant kvm_run parameters in assembly

[PATCH] vfio/pci: fix racy on error and request eventfd ctx
 2020-07-16  1:28 UTC  (5+ messages)

[PATCH v3 0/4] iommu aux-domain APIs extensions
 2020-07-16  1:07 UTC  (11+ messages)
` [PATCH v3 2/4] iommu: Add iommu_aux_at(de)tach_group()
` [PATCH v3 4/4] vfio/type1: Use iommu_aux_at(de)tach_group() APIs

[PATCH] vsock/virtio: annotate 'the_virtio_vsock' RCU pointer
 2020-07-16  0:49 UTC  (4+ messages)

[kvm-unit-tests PATCH 0/2] nVMX: Two PCIDE related fixes
 2020-07-16  0:41 UTC  (8+ messages)
` [kvm-unit-tests PATCH 1/2] nVMX: Restore active host RIP/CR4 after test_host_addr_size()

[kvm-unit-tests PATCH] x86: svm: low CR3 bits are not MBZ
 2020-07-15 23:12 UTC  (10+ messages)

[PATCH v3 0/9] KVM: Support guest MAXPHYADDR < host MAXPHYADDR
 2020-07-15 23:00 UTC  (3+ messages)
` [PATCH v3 7/9] KVM: VMX: Add guest physical address check in EPT violation and misconfig

[kvm-unit-tests PATCH] cstart64: do not assume CR4 should be zero
 2020-07-15 21:46 UTC  (2+ messages)

[PATCH v3] kvm,x86: Exit to user space in case of page fault error
 2020-07-15 21:23 UTC  (2+ messages)

[PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
 2020-07-15 19:58 UTC  (10+ messages)

[PATCH v4 00/75] x86: SEV-ES Guest Support
 2020-07-15 19:49 UTC  (41+ messages)
` [PATCH v4 13/75] x86/boot/compressed/64: Rename kaslr_64.c to ident_map_64.c
` [PATCH v4 14/75] x86/boot/compressed/64: Add page-fault handler
` [PATCH v4 15/75] x86/boot/compressed/64: Always switch to own page-table
` [PATCH v4 16/75] x86/boot/compressed/64: Don't pre-map memory in KASLR code
` [PATCH v4 17/75] x86/boot/compressed/64: Change add_identity_map() to take start and end
` [PATCH v4 27/75] x86/idt: Move IDT to data segment
` [PATCH v4 28/75] x86/idt: Split idt_data setup out of set_intr_gate()
` [PATCH v4 29/75] x86/idt: Move two function from k/idt.c to i/a/desc.h
` [PATCH v4 34/75] x86/head/64: Build k/head64.c with -fno-stack-protector
` [PATCH v4 45/75] x86/sev-es: Adjust #VC IST Stack on entering NMI handler
` [PATCH v4 63/75] x86/sev-es: Handle #DB Events
` [PATCH v4 70/75] x86/head/64: Don't call verify_cpu() on starting APs

[PATCH] x86/bugs/multihit: Fix mitigation reporting when KVM is not in use
 2020-07-15 18:04 UTC  (11+ messages)

[RFC PATCH 00/22] Enhance VHOST to enable SoC-to-SoC communication
 2020-07-15 17:15 UTC  (11+ messages)

linux-next: manual merge of the kvms390 tree with the kvm tree
 2020-07-15 16:59 UTC  (3+ messages)

Inter-VM device emulation (call on Mon 20th July 2020)
 2020-07-15 16:44 UTC  (5+ messages)

[kvm-unit-tests PATCH] cstart: Fix typo in i386's cstart assembly
 2020-07-15 14:31 UTC  (2+ messages)

[PATCH v7 0/2] s390: virtio: let arch validate VIRTIO features
 2020-07-15 11:51 UTC  (8+ messages)
` [PATCH v7 1/2] "
` [PATCH v7 2/2] s390: virtio: PV needs VIRTIO I/O device protection

[PATCH 6/7] ifcvf: replace irq_request/free with helpers in vDPA core
 2020-07-15 11:10 UTC  (12+ messages)
  ` [PATCH 5/7] virtio_vdpa: init IRQ offloading function pointers to NULL
  ` [PATCH 3/7] vhost_vdpa: implement IRQ offloading functions in vhost_vdpa

[kvm-unit-tests PATCH v12 0/9] s390x: Testing the Channel Subsystem I/O
 2020-07-15 10:49 UTC  (4+ messages)
` [kvm-unit-tests PATCH v12 9/9] s390x: css: ssch/tsch with sense and interrupt

[PATCH v4 0/9] KVM: nSVM: fixes for CR3/MMU switch upon nested guest entry/exit
 2020-07-15  4:36 UTC  (5+ messages)
` [PATCH v4 5/9] KVM: nSVM: introduce nested_svm_load_cr3()/nested_npt_enabled()

[PATCH 0/8] KVM: x86/mmu: ITLB multi-hit workaround fixes
 2020-07-15  4:27 UTC  (9+ messages)
` [PATCH 1/8] KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages
` [PATCH 2/8] KVM: x86/mmu: Refactor the zap loop for recovering NX lpages
` [PATCH 3/8] KVM: x86/mmu: Move "huge page disallowed" calculation into mapping helpers
` [PATCH 4/8] KVM: x86/mmu: Capture requested page level before NX huge page workaround
` [PATCH 5/8] KVM: x86/mmu: Account NX huge page disallowed iff huge page was requested
` [PATCH 6/8] KVM: x86/mmu: Rename 'hlevel' to 'level' in FNAME(fetch)
` [PATCH 7/8] KVM: x86/mmu: Hoist ITLB multi-hit workaround check up a level
` [PATCH 8/8] KVM: x86/mmu: Track write/user faults using bools

[PATCH v2 0/4] Expose new features for intel processor
 2020-07-15  4:18 UTC  (7+ messages)
` [PATCH v2 3/4] x86: Expose SERIALIZE for supported cpuid

[PATCH 0/7] KVM: nVMX: Bug fixes and cleanup
 2020-07-15  4:05 UTC  (8+ messages)
` [PATCH 1/7] KVM: nVMX: Reset the segment cache when stuffing guest segs
` [PATCH 2/7] KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails
` [PATCH 3/7] KVM: nVMX: Explicitly check for valid guest state for !unrestricted guest
` [PATCH 4/7] KVM: nVMX: Move free_nested() below vmx_switch_vmcs()
` [PATCH 5/7] KVM: nVMX: Ensure vmcs01 is the loaded VMCS when freeing nested state
` [PATCH 6/7] KVM: nVMX: Drop redundant VMCS switch and free_nested() call
` [PATCH 7/7] KVM: nVMX: WARN on attempt to switch the currently loaded VMCS

[PATCH v13 00/11] Introduce support for guest CET feature
 2020-07-15  0:40 UTC  (3+ messages)

[PATCH v3 0/9] Generalize memory encryption models
 2020-07-14 19:36 UTC  (5+ messages)
` [PATCH v3 1/9] host trust limitation: Introduce new host trust limitation interface
` [PATCH v3 4/9] host trust limitation: Rework the "memory-encryption" property

[PATCH] KVM: x86: Don't attempt to load PDPTRs when 64-bit mode is enabled
 2020-07-14 19:02 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).