kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-07-07 08:54:12 to 2021-07-08 09:18:45 UTC [more...]

[PATCH V2] x86/kvmclock: Stop kvmclocks for hibernate restore
 2021-07-08  9:18 UTC  (3+ messages)

[PATCH 4/4] x86/tsx: Add cmdline tsx=fake to not clear CPUID bits RTM and HLE
 2021-07-08  9:15 UTC  (10+ messages)

[PATCH v8 10/10] Documentation: Add documentation for VDUSE
 2021-07-08  9:07 UTC  (19+ messages)
  `  "
      `  "

[PATCH Part1 RFC v4 00/36] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-07-08  8:53 UTC  (39+ messages)
` [PATCH Part1 RFC v4 01/36] x86/sev: shorten GHCB terminate macro names
` [PATCH Part1 RFC v4 02/36] x86/sev: Save the negotiated GHCB version
` [PATCH Part1 RFC v4 03/36] x86/sev: Add support for hypervisor feature VMGEXIT
` [PATCH Part1 RFC v4 04/36] x86/mm: Add sev_feature_enabled() helper
` [PATCH Part1 RFC v4 05/36] x86/sev: Define the Linux specific guest termination reasons
` [PATCH Part1 RFC v4 06/36] x86/sev: check SEV-SNP features support
` [PATCH Part1 RFC v4 07/36] x86/sev: Add a helper for the PVALIDATE instruction
` [PATCH Part1 RFC v4 08/36] x86/sev: check the vmpl level
` [PATCH Part1 RFC v4 09/36] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH Part1 RFC v4 10/36] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH Part1 RFC v4 11/36] x86/sev: "
` [PATCH Part1 RFC v4 12/36] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH Part1 RFC v4 13/36] x86/kernel: Make the bss.decrypted section shared in RMP table
` [PATCH Part1 RFC v4 14/36] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
` [PATCH Part1 RFC v4 15/36] x86/mm: Add support to validate memory when changing C-bit
` [PATCH Part1 RFC v4 16/36] KVM: SVM: define new SEV_FEATURES field in the VMCB Save State Area
` [PATCH Part1 RFC v4 17/36] KVM: SVM: Create a separate mapping for the SEV-ES save area
` [PATCH Part1 RFC v4 18/36] KVM: SVM: Create a separate mapping for the GHCB "
` [PATCH Part1 RFC v4 19/36] KVM: SVM: Update the SEV-ES save area mapping
` [PATCH Part1 RFC v4 20/36] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
` [PATCH Part1 RFC v4 21/36] x86/head/64: set up a startup %gs for stack protector
` [PATCH Part1 RFC v4 22/36] x86/sev: move MSR-based VMGEXITs for CPUID to helper
` [PATCH Part1 RFC v4 23/36] KVM: x86: move lookup of indexed CPUID leafs "
` [PATCH Part1 RFC v4 24/36] x86/compressed/acpi: move EFI config table access to common code
` [PATCH Part1 RFC v4 25/36] x86/boot: Add Confidential Computing type to setup_data
` [PATCH Part1 RFC v4 26/36] x86/compressed/64: enable SEV-SNP-validated CPUID in #VC handler
` [PATCH Part1 RFC v4 27/36] x86/boot: add a pointer to Confidential Computing blob in bootparams
` [PATCH Part1 RFC v4 28/36] x86/compressed/64: store Confidential Computing blob address "
` [PATCH Part1 RFC v4 29/36] x86/compressed/64: add identity mapping for Confidential Computing blob
` [PATCH Part1 RFC v4 30/36] x86/sev: enable SEV-SNP-validated CPUID in #VC handlers
` [PATCH Part1 RFC v4 31/36] x86/sev: Provide support for SNP guest request NAEs
` [PATCH Part1 RFC v4 32/36] x86/sev: Add snp_msg_seqno() helper
` [PATCH Part1 RFC v4 33/36] x86/sev: Register SNP guest request platform device
` [PATCH Part1 RFC v4 34/36] virt: Add SEV-SNP guest driver
` [PATCH Part1 RFC v4 35/36] virt: sevguest: Add support to derive key
` [PATCH Part1 RFC v4 36/36] virt: sevguest: Add support to get extended report

[PATCH V7 00/18] KVM: x86/pmu: Add *basic* support to enable guest PEBS via DS
 2021-07-08  8:53 UTC  (10+ messages)
` [PATCH V7 01/18] perf/core: Use static_call to optimize perf_guest_info_callbacks
` [PATCH V7 11/18] KVM: x86/pmu: Add IA32_DS_AREA MSR emulation to support guest DS
` [PATCH V7 15/18] KVM: x86/pmu: Disable guest PEBS temporarily in two rare situations

[RFC PATCH 0/8] Derive XSAVE state component offsets from CPUID leaf 0xd where possible
 2021-07-08  7:45 UTC  (5+ messages)
` [RFC PATCH 8/8] target/i386: Move X86XSaveArea into TCG

[Kvmtool] Some thoughts on using kvmtool Virtio for Xen
 2021-07-08  6:51 UTC  (5+ messages)

[PATCH v2 0/4] bus: Make remove callback return void
 2021-07-08  5:38 UTC  (11+ messages)
` [PATCH v2 1/4] s390/cio: Make struct css_driver::remove "
` [PATCH v2 4/4] bus: Make remove callback "

[RFC PATCH v2 00/44] TDX support
 2021-07-08  0:55 UTC  (45+ messages)
` [RFC PATCH v2 01/44] target/i386: Expose x86_cpu_get_supported_feature_word() for TDX
` [RFC PATCH v2 02/44] kvm: Switch KVM_CAP_READONLY_MEM to a per-VM ioctl()
` [RFC PATCH v2 03/44] i386/kvm: Move architectural CPUID leaf generation to separarte helper
` [RFC PATCH v2 04/44] vl: Introduce machine_init_done_late notifier
` [RFC PATCH v2 05/44] linux-headers: Update headers to pull in TDX API changes
` [RFC PATCH v2 06/44] hw/i386: Introduce kvm-type for TDX guest
` [RFC PATCH v2 07/44] i386/kvm: Squash getting/putting guest state for TDX VMs
` [RFC PATCH v2 08/44] i386/kvm: Skip KVM_X86_SETUP_MCE for TDX guests
` [RFC PATCH v2 09/44] target/i386: kvm: don't synchronize guest tsc for TD guest
` [RFC PATCH v2 10/44] hw/i386: Initialize TDX via KVM ioctl() when kvm_type is TDX
` [RFC PATCH v2 11/44] i386/tdx: Implement user specified tsc frequency
` [RFC PATCH v2 12/44] target/i386/tdx: Finalize the TD's measurement when machine is done
` [RFC PATCH v2 13/44] i386/tdx: Frame in tdx_get_supported_cpuid with KVM_TDX_CAPABILITIES
` [RFC PATCH v2 14/44] i386/tdx: Frame in the call for KVM_TDX_INIT_VCPU
` [RFC PATCH v2 15/44] i386/tdx: Add hook to require generic device loader
` [RFC PATCH v2 16/44] hw/i386: Add definitions from UEFI spec for volumes, resources, etc
` [RFC PATCH v2 17/44] i386/tdx: Add definitions for TDVF metadata
` [RFC PATCH v2 18/44] hw/i386: refactor e820_add_entry()
` [RFC PATCH v2 19/44] hw/i386/e820: introduce a helper function to change type of e820
` [RFC PATCH v2 20/44] i386/tdx: Parse tdx metadata and store the result into TdxGuestState
` [RFC PATCH v2 21/44] i386/tdx: Create the TD HOB list upon machine init done
` [RFC PATCH v2 22/44] i386/tdx: Add TDVF memory via INIT_MEM_REGION
` [RFC PATCH v2 23/44] i386/tdx: Use KVM_TDX_INIT_VCPU to pass HOB to TDVF
` [RFC PATCH v2 24/44] i386/tdx: Add MMIO HOB entries
` [RFC PATCH v2 25/44] q35: Move PCIe BAR check above PAM check in mch_write_config()
` [RFC PATCH v2 26/44] pci-host/q35: Move PAM initialization above SMRAM initialization
` [RFC PATCH v2 27/44] q35: Introduce smm_ranges property for q35-pci-host
` [RFC PATCH v2 28/44] i386/tdx: Force x2apic mode and routing for TDs
` [RFC PATCH v2 29/44] target/i386: Add machine option to disable PIC/8259
` [RFC PATCH v2 30/44] qom: implement property helper for sha384
` [RFC PATCH v2 31/44] target/i386/tdx: Allows mrconfigid/mrowner/mrownerconfig for TDX_INIT_VM
` [RFC PATCH v2 32/44] tdx: add kvm_tdx_enabled() accessor for later use
` [RFC PATCH v2 33/44] qmp: add query-tdx-capabilities query-tdx command
` [RFC PATCH v2 34/44] target/i386/tdx: set reboot action to shutdown when tdx
` [RFC PATCH v2 35/44] ioapic: add property to disable level interrupt
` [RFC PATCH v2 36/44] hw/i386: add eoi_intercept_unsupported member to X86MachineState
` [RFC PATCH v2 37/44] hw/i386: add option to forcibly report edge trigger in acpi tables
` [RFC PATCH v2 38/44] hw/i386: plug eoi_intercept_unsupported to ioapic
` [RFC PATCH v2 39/44] ioapic: add property to disallow SMI delivery mode
` [RFC PATCH v2 40/44] hw/i386: add a flag to disallow SMI
` [RFC PATCH v2 41/44] ioapic: add property to disallow INIT/SIPI delivery mode
` [RFC PATCH v2 42/44] hw/i386: add a flag to disable init/sipi delivery mode of interrupt
` [RFC PATCH v2 43/44] i386/tdx: disallow level interrupt and SMI/INIT/SIPI delivery mode
` [RFC PATCH v2 44/44] i386/tdx: disable S3/S4 unconditionally

[PATCH v1 0/4] Linear and Logarithmic histogram statistics
 2021-07-07 23:31 UTC  (3+ messages)
` [PATCH v1 2/4] KVM: stats: Update doc for "

[PATCH v2 0/2] kvm: x86: Convey the exit reason to user-space on emulation failure
 2021-07-07 23:22 UTC  (3+ messages)

[vhost:vhost 29/31] fs/fuse/virtio_fs.c:967:13: error: initialization of 'int (*)(struct virtio_device *, void *)' from incompatible pointer type 'int (*)(struct virtio_device *)'
 2021-07-07 21:21 UTC 

[vhost:vhost 29/31] drivers/crypto/virtio/virtio_crypto_core.c:516:25: error: initialization of 'int (*)(struct virtio_device *, void *)' from incompatible pointer type 'int (*)(struct virtio_device *)'
 2021-07-07 20:35 UTC 

[PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2021-07-07 19:21 UTC  (42+ messages)
` [PATCH Part2 RFC v4 01/40] KVM: SVM: Add support to handle AP reset MSR protocol
` [PATCH Part2 RFC v4 02/40] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
` [PATCH Part2 RFC v4 03/40] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support
` [PATCH Part2 RFC v4 05/40] x86/sev: Add RMP entry lookup helpers
` [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH Part2 RFC v4 07/40] x86/sev: Split the physmap when adding the page in RMP table
` [PATCH Part2 RFC v4 08/40] x86/traps: Define RMP violation #PF error code
` [PATCH Part2 RFC v4 09/40] x86/fault: Add support to dump RMP entry on fault
` [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
` [PATCH Part2 RFC v4 11/40] crypto:ccp: Define the SEV-SNP commands
` [PATCH Part2 RFC v4 12/40] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH Part2 RFC v4 13/40] crypto: ccp: Shutdown SNP firmware on kexec
` [PATCH Part2 RFC v4 14/40] crypto:ccp: Provide APIs to issue SEV-SNP commands
` [PATCH Part2 RFC v4 15/40] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH Part2 RFC v4 16/40] crypto: ccp: Handle the legacy SEV command "
` [PATCH Part2 RFC v4 17/40] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH Part2 RFC v4 18/40] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH Part2 RFC v4 19/40] crypto: ccp: provide APIs to query extended attestation report
` [PATCH Part2 RFC v4 20/40] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH Part2 RFC v4 21/40] KVM: SVM: Add initial SEV-SNP support
` [PATCH Part2 RFC v4 22/40] KVM: SVM: Add KVM_SNP_INIT command
` [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH Part2 RFC v4 24/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH Part2 RFC v4 25/40] KVM: SVM: Reclaim the guest pages when SEV-SNP VM terminates
` [PATCH Part2 RFC v4 26/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH Part2 RFC v4 27/40] KVM: X86: Add kvm_x86_ops to get the max page level for the TDP
` [PATCH Part2 RFC v4 28/40] KVM: X86: Introduce kvm_mmu_map_tdp_page() for use by SEV
` [PATCH Part2 RFC v4 29/40] KVM: X86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
` [PATCH Part2 RFC v4 30/40] KVM: X86: Define new RMP check related #NPF error bits
` [PATCH Part2 RFC v4 31/40] KVM: X86: update page-fault trace to log the 64-bit error code
` [PATCH Part2 RFC v4 32/40] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
` [PATCH Part2 RFC v4 33/40] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH Part2 RFC v4 34/40] KVM: SVM: Add support to handle "
` [PATCH Part2 RFC v4 35/40] KVM: Add arch hooks to track the host write to guest memory
` [PATCH Part2 RFC v4 36/40] KVM: X86: Export the kvm_zap_gfn_range() for the SNP use
` [PATCH Part2 RFC v4 37/40] KVM: SVM: Add support to handle the RMP nested page fault
` [PATCH Part2 RFC v4 38/40] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH Part2 RFC v4 39/40] KVM: SVM: Use a VMSA physical address variable for populating VMCB
` [PATCH Part2 RFC v4 40/40] KVM: SVM: Support SEV-SNP AP Creation NAE event

sched: Move SCHED_DEBUG sysctl to debugfs
 2021-07-07 18:07 UTC  (4+ messages)
` [PATCH 0/1] Improve yield (was: sched: Move SCHED_DEBUG sysctl to debugfs)
  ` [PATCH 1/1] sched/fair: improve yield_to vs fairness

[PATCH v2] KVM: X86: Fix exception untrigger on ret to user
 2021-07-07 17:39 UTC  (13+ messages)

[kvm-unit-tests GIT PULL 0/8] s390x update 2021-07-07
 2021-07-07 17:33 UTC  (10+ messages)
` [kvm-unit-tests GIT PULL 1/8] s390x: snippets: Add gitignore as well as linker script and start assembly
` [kvm-unit-tests GIT PULL 2/8] s390x: snippets: Add snippet compilation
` [kvm-unit-tests GIT PULL 3/8] s390x: mvpg: Add SIE mvpg test
` [kvm-unit-tests GIT PULL 4/8] s390x: sie: Add missing includes
` [kvm-unit-tests GIT PULL 5/8] s390x: sie: Fix sie.h integer types
` [kvm-unit-tests GIT PULL 6/8] lib: s390x: uv: Add offset comments to uv_query and extend it
` [kvm-unit-tests GIT PULL 7/8] lib: s390x: Print if a pgm happened while in SIE
` [kvm-unit-tests GIT PULL 8/8] lib: s390x: Remove left behing PGM report

[PATCH] KVM: VMX: Remove vmx_msr_index from vmx.h
 2021-07-07 23:57 UTC 

[PATCH 0/4] KVM: x86: Require EFER.NX support unless EPT is on
 2021-07-07 14:15 UTC  (6+ messages)
` [PATCH 3/4] KVM: x86: WARN and reject loading KVM if NX is supported but not enabled

[PATCH 00/10] My AVIC patch queue
 2021-07-07 13:58 UTC  (6+ messages)
` [PATCH 02/10] KVM: x86: APICv: fix race in kvm_request_apicv_update on SVM

[PATCH 0/2] KVM: SVM: Fix error handling bugs in SEV migration
 2021-07-07 13:42 UTC  (2+ messages)

[PATCH v2] KVM: s390: Enable specification exception interpretation
 2021-07-07 12:59 UTC  (2+ messages)

[PATCH 0/3] KVM: SMM fixes
 2021-07-07 12:51 UTC  (4+ messages)
` [PATCH 1/3] KVM: SVM: #SMI interception must not skip the instruction
` [PATCH 2/3] KVM: SVM: remove INIT intercept handler
` [PATCH 3/3] KVM: SVM: add module param to control the #SMI interception

[PATCH] KVM: arm64: Disabling disabled PMU counters wastes a lot of time
 2021-07-07 12:48 UTC  (7+ messages)

[PATCH] KVM: s390: Enable specification exception interpretation
 2021-07-07 11:42 UTC  (7+ messages)

[PATCH 0/6] KVM: nSVM: Fix issues when SMM is entered from L2
 2021-07-07 10:35 UTC  (14+ messages)
` [PATCH 1/6] KVM: nSVM: Check the value written to MSR_VM_HSAVE_PA
` [PATCH 2/6] KVM: nSVM: Check that VM_HSAVE_PA MSR was set before VMRUN
` [PATCH 3/6] KVM: nSVM: Introduce svm_copy_nonvmloadsave_state()
` [PATCH 4/6] KVM: nSVM: Fix L1 state corruption upon return from SMM
` [PATCH 5/6] KVM: nSVM: Restore nested control upon leaving SMM
` [PATCH 6/6] KVM: selftests: smm_test: Test SMM enter from L2

[PATCH v8 00/10] Introduce VDUSE - vDPA Device in Userspace
 2021-07-07  9:19 UTC  (4+ messages)
` [PATCH v8 09/10] vduse: "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).