messages from 2021-09-09 21:18:44 to 2021-09-13 15:57:11 UTC [more...]
[PATCH v2 00/12] x86/sev: KEXEC/KDUMP support for SEV-ES guests
2021-09-13 15:56 UTC (12+ messages)
` [PATCH v2 01/12] kexec: Allow architecture code to opt-out at runtime
` [PATCH v2 02/12] x86/kexec/64: Forbid kexec when running as an SEV-ES guest
` [PATCH v2 03/12] x86/sev: Save and print negotiated GHCB protocol version
` [PATCH v2 04/12] x86/sev: Do not hardcode "
` [PATCH v2 06/12] x86/sev: Cache AP Jump Table Address
` [PATCH v2 07/12] x86/sev: Setup code to park APs in the AP Jump Table
` [PATCH v2 08/12] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
` [PATCH v2 09/12] x86/sev: Use AP Jump Table blob to stop CPU
` [PATCH v2 10/12] x86/sev: Add MMIO handling support to boot/compressed/ code
` [PATCH v2 11/12] x86/sev: Handle CLFLUSH MMIO events
` [PATCH v2 12/12] x86/sev: Support kexec under SEV-ES with AP Jump Table blob
[PATCH v1 kvmtool 0/7] vfio/pci: Fix MSIX table and PBA size allocation
2021-09-13 15:44 UTC (7+ messages)
` [PATCH v1 kvmtool 1/7] arm/gicv2m: Set errno when gicv2_update_routing() fails
` [PATCH v1 kvmtool 2/7] vfio/pci.c: Remove double include for assert.h
` [PATCH v1 kvmtool 3/7] pci: Fix pci_dev_* print macros
` [PATCH v1 kvmtool 5/7] vfio/pci: Rework MSIX table and PBA physical size allocation
` [PATCH v1 kvmtool 6/7] vfio/pci: Print an error when offset is outside of the MSIX table or PBA
` [PATCH v1 kvmtool 7/7] vfio/pci: Align MSIX Table and PBA size allocation to 64k
[RFC/RFT PATCH 0/2] x86: sgx_vepc: implement ioctl to EREMOVE all pages
2021-09-13 15:29 UTC (8+ messages)
` [PATCH 1/2] x86: sgx_vepc: extract sgx_vepc_remove_page
` [PATCH 2/2] x86: sgx_vepc: implement SGX_IOC_VEPC_REMOVE ioctl
[PATCH v2] vfio/pci: Add OpRegion 2.0 Extended VBT support
2021-09-13 15:14 UTC (6+ messages)
` [PATCH v3] vfio/pci: Add OpRegion 2.0+ "
` [PATCH v4] "
[PATCH v3 1/1] virtio-blk: avoid preallocating big SGL for data
2021-09-13 14:50 UTC (4+ messages)
[PATCH v2 1/1] virtio-blk: add num_io_queues module parameter
2021-09-13 14:23 UTC (18+ messages)
[PATCH v3 0/4] KVM: SVM: Add initial GHCB protocol version 2 support
2021-09-13 14:13 UTC (5+ messages)
` [PATCH v3 1/4] KVM: SVM: Get rid of set_ghcb_msr() and *ghcb_msr_bits() functions
` [PATCH v3 2/4] KVM: SVM: Add support to handle AP reset MSR protocol
` [PATCH v3 3/4] KVM: SVM: Add support for Hypervisor Feature support "
` [PATCH v3 4/4] KVM: SVM: Increase supported GHCB protocol version
[PATCH v3 0/7] KVM: few more SMM fixes
2021-09-13 14:09 UTC (8+ messages)
` [PATCH v3 1/7] KVM: x86: nSVM: refactor svm_leave_smm and smm_enter_smm
` [PATCH v3 2/7] KVM: x86: nSVM: restore the L1 host state prior to resuming nested guest on SMM exit
` [PATCH v3 3/7] KVM: x86: reset pdptrs_from_userspace when exiting smm
` [PATCH v3 4/7] KVM: x86: SVM: call KVM_REQ_GET_NESTED_STATE_PAGES on exit from SMM mode
` [PATCH v3 5/7] KVM: x86: VMX: synthesize invalid VM exit when emulating invalid guest state
` [PATCH v3 6/7] KVM: x86: nVMX: don't fail nested VM entry on invalid guest state if !from_vmentry
` [PATCH v3 7/7] KVM: x86: nVMX: re-evaluate emulation_required on nested VM exit
[PATCH 0/2] kvm: fix KVM_MAX_VCPU_ID handling
2021-09-13 13:57 UTC (3+ messages)
` [PATCH 1/2] x86/kvm: revert commit 76b4f357d0e7d8f6f00
` [PATCH 2/2] kvm: rename KVM_MAX_VCPU_ID to KVM_MAX_VCPU_IDS
[PATCH v4 0/4] KVM: x86: Convey the exit reason, etc. to user-space on emulation failure
2021-09-13 13:19 UTC (4+ messages)
` [PATCH v4 3/4] KVM: x86: On emulation failure, convey the exit reason, etc. to userspace
[PATCH 0/4] KVM: nVMX: Enlightened MSR Bitmap feature for Hyper-V on KVM
2021-09-13 11:36 UTC (13+ messages)
` [PATCH 1/4] KVM: nVMX: Don't use Enlightened MSR Bitmap for L3
` [PATCH 2/4] KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper
` [PATCH 3/4] KVM: nVMX: Track whether changes in L0 require MSR bitmap for L2 to be rebuilt
` [PATCH 4/4] KVM: nVMX: Implement Enlightened MSR Bitmap feature
[PATCH Part2 v5 00/45] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2021-09-13 11:32 UTC (13+ messages)
` [PATCH Part2 v5 16/45] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH Part2 v5 17/45] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH Part2 v5 18/45] crypto: ccp: Provide APIs to query extended attestation report
` [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
[PATCH 1/7] KVM: X86: Fix missed remote tlb flush in rmap_write_protect()
2021-09-13 11:30 UTC (9+ messages)
` [PATCH 2/7] KVM: X86: Synchronize the shadow pagetable before link it
` [PATCH 4/7] KVM: X86: Remove FNAME(update_pte)
` [PATCH 5/7] KVM: X86: Don't unsync pagetables when speculative
[PATCH 0/2] KVM: arm64: vgic-v3: Missing check for redist region above the VM IPA size
2021-09-13 8:51 UTC (12+ messages)
` [PATCH 1/2] KVM: arm64: vgic: check redist region is not "
` [PATCH 2/2] KVM: arm64: selftests: test for vgic redist "
[PATCH v4 00/18] KVM: arm64: selftests: Introduce arch_timer selftest
2021-09-13 7:35 UTC (13+ messages)
` [PATCH v4 02/18] KVM: arm64: selftests: Add sysreg.h
` [PATCH v4 09/18] KVM: arm64: selftests: Add guest support to get the vcpuid
cleanup vfio iommu_group creation v5
2021-09-13 7:16 UTC (15+ messages)
` [PATCH 01/14] vfio: Move vfio_iommu_group_get() to vfio_register_group_dev()
` [PATCH 02/14] vfio: factor out a vfio_iommu_driver_allowed helper
` [PATCH 03/14] vfio: remove the iommudata check in vfio_noiommu_attach_group
` [PATCH 04/14] vfio: factor out a vfio_group_find_or_alloc helper
` [PATCH 05/14] vfio: refactor noiommu group creation
` [PATCH 06/14] vfio: remove the iommudata hack for noiommu groups
` [PATCH 07/14] vfio: simplify iommu group allocation for mediated devices
` [PATCH 08/14] vfio: remove unused method from vfio_iommu_driver_ops
` [PATCH 09/14] vfio: move the vfio_iommu_driver_ops interface out of <linux/vfio.h>
` [PATCH 10/14] vfio: remove the unused mdev iommu hook
` [PATCH 11/14] vfio: clean up the check for mediated device in vfio_iommu_type1
` [PATCH 12/14] vfio/spapr_tce: reject mediated devices
` [PATCH 13/14] vfio/iommu_type1: remove the "external" domain
` [PATCH 14/14] vfio/iommu_type1: remove IS_IOMMU_CAP_DOMAIN_IN_CONTAINER
[PATCH v19 00/17] KVM RISC-V Support
2021-09-13 7:11 UTC (5+ messages)
` [PATCH v19 13/17] RISC-V: KVM: FP lazy save/restore
[PATCH 0/2] KVM: x86: vcpu_idx related cleanups
2021-09-13 7:07 UTC (8+ messages)
` [PATCH 1/2] KVM: x86: Query vcpu->vcpu_idx directly and drop its accessor
` [PATCH 2/2] KVM: x86: Identify vCPU0 by its vcpu_idx instead of walking vCPUs array
[PATCH v2 0/3] kvm: x86: Set KVM_MAX_VCPUS=1024, KVM_SOFT_MAX_VCPUS=710
2021-09-13 5:09 UTC (5+ messages)
[PATCH v2] KVM: VMX: Enable Notify VM exit
2021-09-13 2:58 UTC (16+ messages)
BUG: spinlock bad magic in synchronize_srcu
2021-09-12 20:45 UTC (2+ messages)
` [syzbot] "
[PATCH] KVM: SVM: fix missing sev_decommission in sev_receive_start
2021-09-12 18:18 UTC
[PATCH v3 00/30] accel: Move has_work() from SysemuCPUOps to AccelOpsClass
2021-09-12 12:31 UTC (7+ messages)
` [PATCH v3 21/30] target/ppc: Introduce PowerPCCPUClass::has_work()
[RFC PATCH 0/3] KVM: nSVM: avoid TOC/TOU race when checking vmcb12
2021-09-12 10:42 UTC (7+ messages)
` [RFC PATCH 1/3] KVM: nSVM: move nested_vmcb_check_cr3_cr4 logic in nested_vmcb_valid_sregs
` [RFC PATCH 2/3] nSVM: introduce smv->nested.save to cache save area fields
` [RFC PATCH 3/3] nSVM: use svm->nested.save to load vmcb12 registers and avoid TOC/TOU races
[PATCH v2 0/3] KVM: few more SMM fixes
2021-09-12 10:35 UTC (10+ messages)
` [PATCH v2 1/3] KVM: nSVM: restore the L1 host state prior to resuming a nested guest on SMM exit
` [PATCH v2 2/3] KVM: x86: force PDPTRs reload "
` [PATCH v2 3/3] KVM: nSVM: call KVM_REQ_GET_NESTED_STATE_PAGES on exit from SMM mode
[GIT PULL V2] virtio,vdpa,vhost: features, fixes
2021-09-12 0:46 UTC (3+ messages)
[GIT PULL] virtio,vdpa,vhost: features, fixes
2021-09-12 0:43 UTC (6+ messages)
[PATCH v3 0/8] Implement generic cc_platform_has() helper function
2021-09-11 10:10 UTC (5+ messages)
` [PATCH v3 2/8] mm: Introduce a function to check for confidential computing features
` [PATCH v3 3/8] x86/sev: Add an x86 version of cc_platform_has()
[PATCH] kvm: x86: i8259: Converts mask values to logical binary values
2021-09-11 3:32 UTC (2+ messages)
[PATCH v4 0/6] IPI virtualization support for VM
2021-09-10 23:55 UTC (12+ messages)
` [PATCH v4 1/6] x86/feat_ctl: Add new VMX feature, Tertiary VM-Execution control
` [PATCH v4 2/6] KVM: VMX: Extend BUILD_CONTROLS_SHADOW macro to support 64-bit variation
` [PATCH v4 3/6] KVM: VMX: Detect Tertiary VM-Execution control when setup VMCS config
` [PATCH v4 5/6] KVM: x86: Support interrupt dispatch in x2APIC mode with APIC-write VM exit
` [PATCH v4 6/6] KVM: VMX: enable IPI virtualization
[PATCH v2] vfio/ap_ops: Add missed vfio_uninit_group_dev()
2021-09-10 23:06 UTC
[PATCH] vfio/ap_ops: Add missed vfio_uninit_group_dev()
2021-09-10 22:26 UTC (4+ messages)
[PATCH 0/2 V7] Add AMD SEV and SEV-ES intra host migration support
2021-09-10 22:14 UTC (16+ messages)
` [PATCH 1/3 V7] KVM, SEV: Add support for SEV intra host migration
` [PATCH 2/3 V7] KVM, SEV: Add support for SEV-ES "
` [PATCH 3/3 V7] selftest: KVM: Add intra host migration tests
[PATCH v4 0/7] ARM: support THREAD_INFO_IN_TASK
2021-09-10 20:20 UTC (3+ messages)
` [PATCH v4 4/7] Make sure task_struct is available for raw_smp_processor_id
[RFC] KVM: mm: fd-based approach for supporting KVM guest private memory
2021-09-10 17:18 UTC (6+ messages)
[PATCH v2 0/9] Move vfio_ccw to the new mdev API
2021-09-10 16:09 UTC (11+ messages)
` [PATCH v2 1/9] vfio/ccw: Use functions for alloc/free of the vfio_ccw_private
` [PATCH v2 2/9] vfio/ccw: Pass vfio_ccw_private not mdev_device to various functions
` [PATCH v2 5/9] vfio/mdev: Consolidate all the device_api sysfs into the core code
` [PATCH v2 6/9] vfio/mdev: Add mdev available instance checking to the core
[PATCH] KVM: nVMX: Fix nested bus lock VM exit
2021-09-10 15:19 UTC (6+ messages)
[PATCH RFC 0/9] s390: fixes, cleanups and optimizations for page table walkers
2021-09-10 14:52 UTC (10+ messages)
` [PATCH RFC 5/9] s390/uv: fully validate the VMA before calling follow_page()
` [PATCH RFC 6/9] s390/pci_mmio: fully validate the VMA before calling follow_pte()
[PATCH] kvm: irqfd: avoid update unmodified entries of the routing
2021-09-10 7:43 UTC (2+ messages)
[PATCH v2 0/7] KVM: VMX: PT (processor trace) optimization cleanup and fixes
2021-09-10 1:59 UTC (4+ messages)
` [PATCH v2 6/7] KVM: VMX: Check Intel PT related CPUID leaves
[PATCH v2 0/3] kvm: x86: some fixes of hypercall emulation
2021-09-10 1:53 UTC (5+ messages)
` [PATCH v2 1/3] kvm: x86: Introduce hypercall x86 ops for handling hypercall not in cpl0
[PATCH v2 0/4] clean up interface between KVM and psp
2021-09-10 1:23 UTC (11+ messages)
` [PATCH v2 3/4] KVM: SVM: move sev_bind_asid to psp
[PATCH v2 0/2] KVM: arm64: vgic-v3: Missing check for redist region above the VM IPA size
2021-09-10 0:49 UTC (3+ messages)
` [PATCH v2 1/2] KVM: arm64: vgic: check redist region is not "
` [PATCH v2 2/2] KVM: arm64: selftests: tests for vgic redist regions "
[PATCH AUTOSEL 5.13 58/88] vfio/type1: Fix vfio_find_dma_valid return
2021-09-10 0:17 UTC
[PATCH AUTOSEL 5.14 65/99] vfio/type1: Fix vfio_find_dma_valid return
2021-09-10 0:15 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).