kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-07-06 14:38:10 to 2021-07-07 18:38:39 UTC [more...]

[PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2021-07-07 18:36 UTC  (22+ messages)
` [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
` [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
` [PATCH Part2 RFC v4 03/40] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
` [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
` [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
` [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
` [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
` [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
` [PATCH Part2 RFC v4 11/40] crypto:ccp: Define the SEV-SNP commands
` [PATCH Part2 RFC v4 12/40] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH Part2 RFC v4 13/40] crypto: ccp: Shutdown SNP firmware on kexec
` [PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
` [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH Part2 RFC v4 16/40] crypto: ccp: Handle the legacy SEV command "
` [PATCH Part2 RFC v4 17/40] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH Part2 RFC v4 18/40] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH Part2 RFC v4 19/40] crypto: ccp: provide APIs to query extended attestation report
` [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command

[PATCH 4/4] x86/tsx: Add cmdline tsx=fake to not clear CPUID bits RTM and HLE
 2021-07-07 18:23 UTC  (12+ messages)

[PATCH Part1 RFC v4 00/36] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-07-07 18:15 UTC  (37+ messages)
` [PATCH Part1 RFC v4 01/36] x86/sev: shorten GHCB terminate macro names
` [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
` [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
` [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
` [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
` [PATCH Part1 RFC v4 06/36] x86/sev: check SEV-SNP features support
` [PATCH Part1 RFC v4 07/36] x86/sev: Add a helper for the PVALIDATE instruction
` [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
` [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH Part1 RFC v4 11/36] x86/sev: "
` [PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
` [PATCH Part1 RFC v4 14/36] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
` [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
` [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
` [PATCH Part1 RFC v4 17/36] KVM: SVM: Create a separate mapping for the SEV-ES save area
` [PATCH Part1 RFC v4 18/36] KVM: SVM: Create a separate mapping for the GHCB "
` [PATCH Part1 RFC v4 19/36] KVM: SVM: Update the SEV-ES save area mapping
` [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
` [PATCH Part1 RFC v4 21/36] x86/head/64: set up a startup %gs for stack protector
` [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
` [PATCH Part1 RFC v4 23/36] KVM: x86: move lookup of indexed CPUID leafs "
` [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
` [PATCH Part1 RFC v4 25/36] x86/boot: Add Confidential Computing type to setup_data
` [PATCH Part1 RFC v4 26/36] x86/compressed/64: enable SEV-SNP-validated CPUID in #VC handler
` [PATCH Part1 RFC v4 27/36] x86/boot: add a pointer to Confidential Computing blob in bootparams
` [PATCH Part1 RFC v4 28/36] x86/compressed/64: store Confidential Computing blob address "
` [PATCH Part1 RFC v4 29/36] x86/compressed/64: add identity mapping for Confidential Computing blob
` [PATCH Part1 RFC v4 30/36] x86/sev: enable SEV-SNP-validated CPUID in #VC handlers
` [PATCH Part1 RFC v4 31/36] x86/sev: Provide support for SNP guest request NAEs
` [PATCH Part1 RFC v4 32/36] x86/sev: Add snp_msg_seqno() helper
` [PATCH Part1 RFC v4 33/36] x86/sev: Register SNP guest request platform device
` [PATCH Part1 RFC v4 34/36] virt: Add SEV-SNP guest driver
` [PATCH Part1 RFC v4 35/36] virt: sevguest: Add support to derive key
` [PATCH Part1 RFC v4 36/36] virt: sevguest: Add support to get extended report

sched: Move SCHED_DEBUG sysctl to debugfs
 2021-07-07 18:07 UTC  (4+ messages)
` [PATCH 0/1] Improve yield (was: sched: Move SCHED_DEBUG sysctl to debugfs)
  ` [PATCH 1/1] sched/fair: improve yield_to vs fairness

[PATCH v2] KVM: X86: Fix exception untrigger on ret to user
 2021-07-07 17:39 UTC  (16+ messages)

[kvm-unit-tests GIT PULL 0/8] s390x update 2021-07-07
 2021-07-07 17:33 UTC  (10+ messages)
` [kvm-unit-tests GIT PULL 1/8] s390x: snippets: Add gitignore as well as linker script and start assembly
` [kvm-unit-tests GIT PULL 2/8] s390x: snippets: Add snippet compilation
` [kvm-unit-tests GIT PULL 3/8] s390x: mvpg: Add SIE mvpg test
` [kvm-unit-tests GIT PULL 4/8] s390x: sie: Add missing includes
` [kvm-unit-tests GIT PULL 5/8] s390x: sie: Fix sie.h integer types
` [kvm-unit-tests GIT PULL 6/8] lib: s390x: uv: Add offset comments to uv_query and extend it
` [kvm-unit-tests GIT PULL 7/8] lib: s390x: Print if a pgm happened while in SIE
` [kvm-unit-tests GIT PULL 8/8] lib: s390x: Remove left behing PGM report

[PATCH] KVM: VMX: Remove vmx_msr_index from vmx.h
 2021-07-07 23:57 UTC 

[PATCH v8 10/10] Documentation: Add documentation for VDUSE
 2021-07-07 15:54 UTC  (16+ messages)
  `  "
      `  "

[PATCH v2 0/4] bus: Make remove callback return void
 2021-07-07 14:34 UTC  (17+ messages)
` [PATCH v2 1/4] s390/cio: Make struct css_driver::remove "
` [PATCH v2 4/4] bus: Make remove callback "

[PATCH 0/4] KVM: x86: Require EFER.NX support unless EPT is on
 2021-07-07 14:15 UTC  (6+ messages)
` [PATCH 3/4] KVM: x86: WARN and reject loading KVM if NX is supported but not enabled

[PATCH 00/10] My AVIC patch queue
 2021-07-07 13:58 UTC  (6+ messages)
` [PATCH 02/10] KVM: x86: APICv: fix race in kvm_request_apicv_update on SVM

[PATCH 0/2] KVM: SVM: Fix error handling bugs in SEV migration
 2021-07-07 13:42 UTC  (2+ messages)

[PATCH v2] KVM: s390: Enable specification exception interpretation
 2021-07-07 12:59 UTC  (2+ messages)

[PATCH 0/3] KVM: SMM fixes
 2021-07-07 12:51 UTC  (4+ messages)
` [PATCH 1/3] KVM: SVM: #SMI interception must not skip the instruction
` [PATCH 2/3] KVM: SVM: remove INIT intercept handler
` [PATCH 3/3] KVM: SVM: add module param to control the #SMI interception

[PATCH] KVM: arm64: Disabling disabled PMU counters wastes a lot of time
 2021-07-07 12:48 UTC  (8+ messages)

[PATCH] KVM: s390: Enable specification exception interpretation
 2021-07-07 11:42 UTC  (14+ messages)

[PATCH 0/6] KVM: nSVM: Fix issues when SMM is entered from L2
 2021-07-07 10:35 UTC  (14+ messages)
` [PATCH 1/6] KVM: nSVM: Check the value written to MSR_VM_HSAVE_PA
` [PATCH 2/6] KVM: nSVM: Check that VM_HSAVE_PA MSR was set before VMRUN
` [PATCH 3/6] KVM: nSVM: Introduce svm_copy_nonvmloadsave_state()
` [PATCH 4/6] KVM: nSVM: Fix L1 state corruption upon return from SMM
` [PATCH 5/6] KVM: nSVM: Restore nested control upon leaving SMM
` [PATCH 6/6] KVM: selftests: smm_test: Test SMM enter from L2

[RFC PATCH 0/8] Derive XSAVE state component offsets from CPUID leaf 0xd where possible
 2021-07-07 10:10 UTC  (4+ messages)
` [RFC PATCH 8/8] target/i386: Move X86XSaveArea into TCG

[PATCH v8 00/10] Introduce VDUSE - vDPA Device in Userspace
 2021-07-07  9:19 UTC  (4+ messages)
` [PATCH v8 09/10] vduse: "

[PATCH 1/2] vdpa: support per virtqueue max queue size
 2021-07-07  5:38 UTC  (3+ messages)

guest/host mem out of sync on core2duo?
 2021-07-06 23:41 UTC  (15+ messages)
          ` exception vs SIGALRM race (was: Re: guest/host mem out of sync on core2duo?)

[RFC PATCH v2 00/69] KVM: X86: TDX support
 2021-07-06 19:04 UTC  (61+ messages)
` [RFC PATCH v2 19/69] KVM: x86: Use KVM_BUG/KVM_BUG_ON to handle bugs that are fatal to the VM
` [RFC PATCH v2 20/69] KVM: x86/mmu: Mark VM as bugged if page fault returns RET_PF_INVALID
` [RFC PATCH v2 21/69] KVM: Add max_vcpus field in common 'struct kvm'
` [RFC PATCH v2 22/69] KVM: x86: Add vm_type to differentiate legacy VMs from protected VMs
` [RFC PATCH v2 24/69] KVM: x86: Introduce "protected guest" concept and block disallowed ioctls
` [RFC PATCH v2 28/69] KVM: Add per-VM flag to mark read-only memory as unsupported
` [RFC PATCH v2 32/69] KVM: x86: Allow host-initiated WRMSR to set X2APIC regardless of CPUID
` [RFC PATCH v2 36/69] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [RFC PATCH v2 37/69] KVM: x86: Check for pending APICv interrupt in kvm_vcpu_has_events()
` [RFC PATCH v2 39/69] KVM: x86: Add guest_supported_xss placholder
` [RFC PATCH v2 41/69] KVM: x86: Add infrastructure for stolen GPA bits
` [RFC PATCH v2 42/69] KVM: x86/mmu: Explicitly check for MMIO spte in fast page fault
` [RFC PATCH v2 43/69] KVM: x86/mmu: Allow non-zero init value for shadow PTE
` [RFC PATCH v2 44/69] KVM: x86/mmu: Refactor shadow walk in __direct_map() to reduce indentation
` [RFC PATCH v2 45/69] KVM: x86/mmu: Return old SPTE from mmu_spte_clear_track_bits()
` [RFC PATCH v2 49/69] KVM: VMX: Modify NMI and INTR handlers to take intr_info as param
` [RFC PATCH v2 51/69] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [RFC PATCH v2 52/69] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [RFC PATCH v2 53/69] KVM: VMX: Define EPT Violation architectural bits
` [RFC PATCH v2 54/69] KVM: VMX: Define VMCS encodings for shared EPT pointer
` [RFC PATCH v2 55/69] KVM: VMX: Add 'main.c' to wrap VMX and TDX
` [RFC PATCH v2 56/69] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [RFC PATCH v2 57/69] KVM: VMX: Move register caching logic to common code
` [RFC PATCH v2 60/69] KVM: VMX: Add macro framework to read/write VMCS for VMs and TDs
` [RFC PATCH v2 61/69] KVM: VMX: Move AR_BYTES encoder/decoder helpers to common.h
` [RFC PATCH v2 62/69] KVM: VMX: MOVE GDT and IDT accessors to common code
` [RFC PATCH v2 67/69] KVM: TDX: add trace point for TDVMCALL and SEPT operation
` [RFC PATCH v2 68/69] KVM: TDX: add document on TDX MODULE

[PATCH v1 0/4] Linear and Logarithmic histogram statistics
 2021-07-06 18:03 UTC  (5+ messages)
` [PATCH v1 1/4] KVM: stats: Support linear and logarithmic "
` [PATCH v1 2/4] KVM: stats: Update doc for "
` [PATCH v1 3/4] KVM: selftests: Add checks for histogram stats parameters
` [PATCH v1 4/4] KVM: stats: Add halt polling related histogram stats

[PATCH v4 0/4] Add support for XMM fast hypercalls
 2021-07-06 16:36 UTC  (5+ messages)

[PATCH] bus: Make remove callback return void
 2021-07-06 15:11 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).