kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-12-08 16:02:31 to 2022-12-09 09:01:49 UTC [more...]

[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
 2022-12-09  9:01 UTC  (18+ messages)
` [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
` [PATCH v10 8/9] KVM: Handle page fault for private memory

[PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
 2022-12-09  8:29 UTC  (10+ messages)
` [PATCH v2 1/7] KVM: selftests: Fix build due to ucall_uninit() removal
` [PATCH v2 2/7] KVM: selftests: Setup ucall after loading program into guest memory
` [PATCH v2 3/7] KVM: selftests: Mark correct page as mapped in virt_map()
` [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
` [PATCH v2 5/7] KVM: arm64: selftests: Don't identity map the ucall MMIO hole
` [PATCH v2 6/7] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
` [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails

[GIT PULL] KVM/riscv changes for 6.2
 2022-12-09  8:16 UTC  (2+ messages)

[GIT PULL] KVM/arm64 updates for 6.2
 2022-12-09  8:08 UTC  (7+ messages)

[PATCH] KVM: X86: set EXITING_GUEST_MODE as soon as vCPU exits
 2022-12-09  8:06 UTC  (5+ messages)

[PATCH] kvm: x86/mmu: Remove duplicated "be split" in spte.h
 2022-12-09  7:58 UTC  (2+ messages)

[PATCH] kvm: Remove the unused macro KVM_MMU_READ_LOCK()
 2022-12-09  7:58 UTC  (2+ messages)

[PATCH v3 0/8] Make Intel PT configurable
 2022-12-09  7:11 UTC  (7+ messages)
` [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
` [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
` [PATCH v3 7/8] target/i386/intel-pt: Define specific PT feature set for IceLake-server and Snowridge

[PATCH v8 00/16] TDX host kernel support
 2022-12-09  6:52 UTC  (17+ messages)
` [PATCH v8 01/16] x86/tdx: Define TDX supported page sizes as macros
` [PATCH v8 02/16] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v8 03/16] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
` [PATCH v8 04/16] x86/virt/tdx: Add skeleton to initialize TDX on demand
` [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
` [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
` [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
` [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v8 09/16] x86/virt/tdx: Fill out "
` [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
` [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
` [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v8 14/16] x86/virt/tdx: Initialize all TDMRs
` [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
` [PATCH v8 16/16] Documentation/x86: Add documentation for TDX host support

[PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
 2022-12-09  6:01 UTC  (16+ messages)
` [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
` [PATCH iommufd 2/9] vfio/type1: Check that every device supports IOMMU_CAP_INTR_REMAP
` [PATCH iommufd 3/9] vfio/type1: Convert to msi_device_has_secure_msi()
` [PATCH iommufd 4/9] iommufd: "
` [PATCH iommufd 5/9] irq: Remove unused irq_domain_check_msi_remap() code
` [PATCH iommufd 6/9] irq: Rename MSI_REMAP to SECURE_MSI
` [PATCH iommufd 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_SECURE_MSI
` [PATCH iommufd 8/9] irq/s390: Add arch_is_secure_msi() for s390
` [PATCH iommufd 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP

[PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
 2022-12-09  4:45 UTC  (10+ messages)
` [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
` [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
` [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
` [PATCH v3 4/9] KVM: x86: MMU: Commets update
` [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
` [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
` [PATCH v3 7/9] KVM: x86: When judging setting CR3 valid or not, consider LAM bits
` [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
` [PATCH v3 9/9] KVM: x86: LAM: Expose LAM CPUID to user space VMM

[PATCH kernel v2 0/3] KVM: SEV: Enable AMD SEV-ES DebugSwap
 2022-12-09  4:38 UTC  (4+ messages)
` [PATCH kernel v2 1/3] x86/amd: Cache values in percpu variables
` [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
` [PATCH kernel v2 3/3] x86/sev: Do not handle #VC for DR7 read/write

[PATCH 6/9] RISC-V: Export sbi_get_mvendorid() and friends
 2022-12-09  4:33 UTC  (2+ messages)

[PATCH] KVM: X86: Use the common definition - 'GPA_INVALID' for X86
 2022-12-09  2:36 UTC 

[RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver
 2022-12-09  2:50 UTC  (21+ messages)

[RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
 2022-12-09  2:37 UTC  (39+ messages)
` [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
` [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
` [RFC PATCH 03/37] KVM: MMU: Move tdp_ptep_t "
` [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
` [RFC PATCH 05/37] KVM: x86/mmu: Unify TDP MMU and Shadow MMU root refcounts
` [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
` [RFC PATCH 07/37] mm: Introduce architecture-neutral PG_LEVEL macros
` [RFC PATCH 08/37] KVM: selftests: Stop assuming stats are contiguous in kvm_binary_stats_test
` [RFC PATCH 09/37] KVM: Move page size stats into common code
` [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to "
` [RFC PATCH 11/37] KVM: MMU: Move RET_PF_* into "
` [RFC PATCH 12/37] KVM: x86/mmu: Use PG_LEVEL_{PTE,PMD,PUD} in the TDP MMU
` [RFC PATCH 13/37] KVM: MMU: Move sptep_to_sp() to common code
` [RFC PATCH 14/37] KVM: MMU: Introduce common macros for TDP page tables
` [RFC PATCH 15/37] KVM: x86/mmu: Add a common API for inspecting/modifying TDP PTEs
` [RFC PATCH 16/37] KVM: x86/mmu: Abstract away TDP MMU root lookup
` [RFC PATCH 17/37] KVM: Move struct kvm_gfn_range to kvm_types.h
` [RFC PATCH 18/37] KVM: x86/mmu: Add common API for creating TDP PTEs
` [RFC PATCH 19/37] KVM: x86/mmu: Add arch hooks for NX Huge Pages
` [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
` [RFC PATCH 21/37] KVM: Introduce CONFIG_HAVE_TDP_MMU
` [RFC PATCH 22/37] KVM: x86: Select HAVE_TDP_MMU if X86_64
` [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
` [RFC PATCH 24/37] KVM: x86/mmu: Move kvm_mmu_hugepage_adjust() up to fault handler
` [RFC PATCH 25/37] KVM: x86/mmu: Pass root role to kvm_tdp_mmu_get_vcpu_root_hpa()
` [RFC PATCH 26/37] KVM: Move page table cache to struct kvm_vcpu
` [RFC PATCH 27/37] KVM: MMU: Move mmu_page_header_cache to common code
` [RFC PATCH 28/37] KVM: MMU: Stub out tracepoints on non-x86 architectures
` [RFC PATCH 29/37] KVM: x86/mmu: Collapse kvm_flush_remote_tlbs_with_{range,address}() together
` [RFC PATCH 30/37] KVM: x86/mmu: Rename kvm_flush_remote_tlbs_with_address()
` [RFC PATCH 31/37] KVM: x86/MMU: Use gfn_t in kvm_flush_remote_tlbs_range()
` [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code
` [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to "
` [RFC PATCH 34/37] KVM: MMU: Move the TDP iterator "
` [RFC PATCH 35/37] KVM: x86/mmu: Move tdp_mmu_max_gfn_exclusive() to tdp_pgtable.c
` [RFC PATCH 36/37] KVM: x86/mmu: Move is_tdp_mmu_page() to mmu_internal.h
` [RFC PATCH 37/37] KVM: MMU: Move the TDP MMU to common code

[PATCH kernel 0/3] KVM: SEV: Enable AMD SEV-ES DebugSwap
 2022-12-09  2:28 UTC  (4+ messages)
` [PATCH kernel 2/3] KVM: SEV: Enable DebugSwap

[RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
 2022-12-09  2:26 UTC  (4+ messages)
` [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest

[RFC PATCH 0/5] Add new VFIO PCI driver for NVMe devices
 2022-12-09  2:05 UTC  (6+ messages)
` [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device

[PATCH] KVM: x86: ioapic: Fix level-triggered EOI and userspace IOAPIC reconfigure race
 2022-12-09  1:34 UTC  (3+ messages)
` [PATCH v2] KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC "

[PATCH] KVM: use unified srcu interface function
 2022-12-09  1:22 UTC  (2+ messages)

[PATCH v2] KVM: x86: hyper-v: Fix 'using uninitialized value' Coverity warning
 2022-12-09  1:12 UTC  (2+ messages)

[PATCH 0/4] KVM: selftests: Fixes for ucall pool + page_fault_test
 2022-12-09  1:08 UTC  (15+ messages)
` [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
` [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0

[PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
 2022-12-09  0:56 UTC  (51+ messages)
` [PATCH v4 01/32] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
` [PATCH v4 02/32] KVM: x86: Purge "highest ISR" cache when updating APICv state
` [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
` [PATCH v4 05/32] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
` [PATCH v4 06/32] KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated
` [PATCH v4 07/32] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
` [PATCH v4 08/32] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
` [PATCH v4 09/32] KVM: x86: Handle APICv updates for APIC "mode" changes via request
` [PATCH v4 10/32] KVM: x86: Move APIC access page helper to common x86 code
` [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
` [PATCH v4 15/32] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
` [PATCH v4 18/32] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
` [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
` [PATCH v4 20/32] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
` [PATCH v4 23/32] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
` [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
` [PATCH v4 25/32] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
` [PATCH v4 26/32] KVM: SVM: Always update local APIC on writes to logical dest register
` [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
` [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
` [PATCH v4 29/32] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
` [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
` [PATCH v4 32/32] KVM: x86: Track required APICv inhibits with variable, not callback

[Patch v2 0/2] NUMA aware page table allocation
 2022-12-09  0:27 UTC  (15+ messages)
` [Patch v2 1/2] KVM: x86/mmu: Allocate page table pages on TDP splits during dirty log enable on the underlying page's numa node
` [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages

[PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
 2022-12-09  0:01 UTC  (2+ messages)

[RFC PATCH v2 00/15] KVM TDX: TDP MMU: large page support
 2022-12-08 23:35 UTC  (16+ messages)
` [RFC PATCH v2 01/15] KVM: TDP_MMU: Go to next level if smaller private mapping exists
` [RFC PATCH v2 02/15] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
` [RFC PATCH v2 03/15] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
` [RFC PATCH v2 04/15] KVM: TDX: Pass size to tdx_measure_page()
` [RFC PATCH v2 05/15] KVM: TDX: Pass size to reclaim_page()
` [RFC PATCH v2 06/15] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
` [RFC PATCH v2 07/15] KVM: MMU: Introduce level info in PFERR code
` [RFC PATCH v2 08/15] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
` [RFC PATCH v2 09/15] KVM: TDX: Pass desired page level in err code for page fault handler
` [RFC PATCH v2 10/15] KVM: x86/tdp_mmu: Split the large page when zap leaf
` [RFC PATCH v2 11/15] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
` [RFC PATCH v2 12/15] KVM: x86/tdp_mmu: Try to merge pages into a large page
` [RFC PATCH v2 13/15] KVM: x86/tdp_mmu: TDX: Implement "
` [RFC PATCH v2 14/15] KVM: x86/mmu: Make kvm fault handelr aware of large page of private memslot
` [RFC PATCH v2 15/15] KVM: TDX: Allow 2MB large page for TD GUEST

[PATCH v7 00/20] TDX host kernel support
 2022-12-08 23:29 UTC  (12+ messages)
` [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions

[PATCH V1 0/8] vfio virtual address update redo
 2022-12-08 22:18 UTC  (16+ messages)
` [PATCH V1 1/8] vfio: delete interfaces to update vaddr
` [PATCH V1 2/8] vfio/type1: dma owner permission
` [PATCH V1 7/8] vfio: change dma owner

[PATCH v2] samples: vfio-mdev: Fix missing pci_disable_device() in mdpy_fb_probe()
 2022-12-08 22:16 UTC  (2+ messages)

[PATCH 1/2] vfio/mlx5: fix error code in mlx5vf_precopy_ioctl()
 2022-12-08 22:15 UTC  (5+ messages)
` [PATCH 2/2] vfio/mlx5: error pointer dereference in error handling

[V1 PATCH 0/6] selftests: KVM: selftests for fd-based private memory
 2022-12-08 21:56 UTC  (5+ messages)
` [V1 PATCH 4/6] KVM: selftests: x86: Execute VMs with "

vfio-pci rejects binding to devices having same pcie vendor id and device id
 2022-12-08 18:48 UTC  (5+ messages)

[RFC] Improving userfaultfd scalability for live migration
 2022-12-08 17:50 UTC  (12+ messages)

[kvm-unit-tests v2 PATCH] s390x: sie: Test whether the epoch extension field is working as expected
 2022-12-08 17:05 UTC 

[PATCH 0/3] x86/cpu: KVM: Make SGX and VMX depend on FEAT_CTL
 2022-12-08 16:45 UTC  (5+ messages)
` [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info

[PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
 2022-12-08 16:40 UTC  (3+ messages)

[kvm-unit-tests PATCH] s390x: sie: Test whether the epoch extension field is working as expected
 2022-12-08 16:15 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).