kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-11-09 21:53:21 to 2021-11-11 13:47:58 UTC [more...]

[PATCH RFC] KVM: x86: Drop arbitraty KVM_SOFT_MAX_VCPUS
 2021-11-11 13:47 UTC 

[PATCH v4] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
 2021-11-11 13:24 UTC  (2+ messages)

[PATCH v2] kvm: x86: Convert return type of *is_valid_rdpmc_ecx() to bool
 2021-11-11 13:24 UTC  (2+ messages)

[PATCH] KVM: x86: Fix recording of guest steal time / preempted status
 2021-11-11 13:23 UTC  (7+ messages)
` [PATCH v2] "
        ` [PATCH v3] "

[PATCH 0/2] KVM: SEV: Fall back to __vmalloc() for SEV-ES scratch
 2021-11-11 12:52 UTC  (4+ messages)
` [PATCH 1/2] KVM: SEV: Return appropriate error codes if SEV-ES scratch setup fails
` [PATCH 2/2] KVM: SEV: Fall back to __vmalloc() for SEV-ES scratch area if necessary

[PATCH v6 0/5] Add Guest API & Guest Kernel support for SEV live migration
 2021-11-11 12:43 UTC  (2+ messages)

[RFC 02/20] vfio: Add device class for /dev/vfio/devices
 2021-11-11 12:32 UTC  (6+ messages)

[PATCH kvmtool RESENT] arm/pci: update interrupt-map only for legacy interrupts
 2021-11-11 12:02 UTC 

[kvm-unit-tests PATCH v2] s390x: fixing I/O memory allocation
 2021-11-11 11:55 UTC  (5+ messages)

[PATCH v4 00/17] perf: KVM: Fix, optimize, and clean up callbacks
 2021-11-11 11:19 UTC  (21+ messages)
` [PATCH v4 01/17] perf: Protect perf_guest_cbs with RCU
` [PATCH v4 02/17] KVM: x86: Register perf callbacks after calling vendor's hardware_setup()
` [PATCH v4 03/17] KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest
` [PATCH v4 04/17] perf: Stop pretending that perf can handle multiple guest callbacks
` [PATCH v4 05/17] perf: Drop dead and useless guest "support" from arm, csky, nds32 and riscv
` [PATCH v4 06/17] perf/core: Rework guest callbacks to prepare for static_call support
` [PATCH v4 07/17] perf: Add wrappers for invoking guest callbacks
` [PATCH v4 08/17] perf: Force architectures to opt-in to "
` [PATCH v4 09/17] perf/core: Use static_call to optimize perf_guest_info_callbacks
` [PATCH v4 10/17] KVM: x86: Drop current_vcpu for kvm_running_vcpu + kvm_arch_vcpu variable
` [PATCH v4 11/17] KVM: x86: More precisely identify NMI from guest when handling PMI
` [PATCH v4 12/17] KVM: Move x86's perf guest info callbacks to generic KVM
` [PATCH v4 13/17] KVM: x86: Move Intel Processor Trace interrupt handler to vmx.c
` [PATCH v4 14/17] KVM: arm64: Convert to the generic perf callbacks
` [PATCH v4 15/17] KVM: arm64: Hide kvm_arm_pmu_available behind CONFIG_HW_PERF_EVENTS=y
` [PATCH v4 16/17] KVM: arm64: Drop perf.c and fold its tiny bits of code into arm.c
` [PATCH v4 17/17] perf: Drop guest callback (un)register stubs

[PATCH v4 00/15] Support Asynchronous Page Fault
 2021-11-11 10:39 UTC  (16+ messages)
` [PATCH v4 01/15] KVM: async_pf: Move struct kvm_async_pf around
` [PATCH v4 02/15] KVM: async_pf: Add helper function to check completion queue
` [PATCH v4 03/15] KVM: async_pf: Make GFN slot management generic
` [PATCH v4 04/15] KVM: x86: Use generic async PF slot management
` [PATCH v4 05/15] KVM: arm64: Export kvm_handle_user_mem_abort()
` [PATCH v4 06/15] KVM: arm64: Add paravirtualization header files
` [PATCH v4 15/15] KVM: arm64: Add async PF document

[RFC PATCH v3 0/2] s390x: Improvements to SIGP handling [KVM]
 2021-11-11  9:15 UTC  (4+ messages)
` [RFC PATCH v3 1/2] Capability/IOCTL/Documentation
` [RFC PATCH v3 2/2] KVM: s390: Extend the USER_SIGP capability

[RFC PATCH v2 00/69] KVM: X86: TDX support
 2021-11-11  8:29 UTC  (13+ messages)
` [RFC PATCH v2 22/69] KVM: x86: Add vm_type to differentiate legacy VMs from protected VMs
` [RFC PATCH v2 24/69] KVM: x86: Introduce "protected guest" concept and block disallowed ioctls

drivers/vfio/vfio.c:293: warning: expecting prototype for Container objects(). Prototype was for vfio_container_get() instead
 2021-11-11  7:56 UTC  (3+ messages)

[kvm-unit-tests PATCH v3 0/1] Test spec exception interception
 2021-11-11  7:47 UTC  (3+ messages)
` [kvm-unit-tests PATCH v3 1/1] s390x: Add specification exception interception test

[RFC 00/19] KVM: x86/mmu: Optimize disabling dirty logging
 2021-11-11  7:06 UTC  (25+ messages)
` [RFC 01/19] KVM: x86/mmu: Fix TLB flush range when handling disconnected pt
` [RFC 02/19] KVM: x86/mmu: Batch TLB flushes for a single zap
` [RFC 03/19] KVM: x86/mmu: Factor flush and free up when zapping under MMU write lock
` [RFC 04/19] KVM: x86/mmu: Yield while processing disconnected_sps
` [RFC 05/19] KVM: x86/mmu: Remove redundant flushes when disabling dirty logging
` [RFC 06/19] KVM: x86/mmu: Introduce vcpu_make_spte
` [RFC 07/19] KVM: x86/mmu: Factor wrprot for nested PML out of make_spte
` [RFC 08/19] KVM: x86/mmu: Factor mt_mask "
` [RFC 09/19] KVM: x86/mmu: Remove need for a vcpu from kvm_slot_page_track_is_active
` [RFC 10/19] KVM: x86/mmu: Remove need for a vcpu from mmu_try_to_unsync_pages
` [RFC 11/19] KVM: x86/mmu: Factor shadow_zero_check out of make_spte
` [RFC 12/19] KVM: x86/mmu: Replace vcpu argument with kvm pointer in make_spte
` [RFC 13/19] KVM: x86/mmu: Factor out the meat of reset_tdp_shadow_zero_bits_mask
` [RFC 14/19] KVM: x86/mmu: Propagate memslot const qualifier
` [RFC 15/19] KVM: x86/MMU: Refactor vmx_get_mt_mask
` [RFC 16/19] KVM: x86/mmu: Factor out part of vmx_get_mt_mask which does not depend on vcpu
` [RFC 17/19] KVM: x86/mmu: Add try_get_mt_mask to x86_ops
` [RFC 18/19] KVM: x86/mmu: Make kvm_is_mmio_pfn usable outside of spte.c
` [RFC 19/19] KVM: x86/mmu: Promote pages in-place when disabling dirty logging

[PATCH v3 00/16] perf: KVM: Fix, optimize, and clean up callbacks
 2021-11-11  0:39 UTC  (13+ messages)
` [PATCH v3 01/16] perf: Ensure perf_guest_cbs aren't reloaded between !NULL check and deref
` [PATCH v3 08/16] perf: Force architectures to opt-in to guest callbacks
` [PATCH v3 15/16] KVM: arm64: Drop perf.c and fold its tiny bits of code into arm.c / pmu.c

[PATCH 0/4] KVM: selftests: Avoid mmap_sem contention during memory population
 2021-11-11  0:12 UTC  (5+ messages)
` [PATCH 1/4] KVM: selftests: Start at iteration 0 instead of -1
` [PATCH 2/4] KVM: selftests: Move vCPU thread creation and joining to common helpers
` [PATCH 3/4] KVM: selftests: Wait for all vCPU to be created before entering guest mode
` [PATCH 4/4] KVM: selftests: Use perf_test_destroy_vm in memslot_modification_stress_test

[PATCH v2 00/12] KVM: selftests: Hugepage fixes and cleanups
 2021-11-11  0:03 UTC  (13+ messages)
` [PATCH v2 01/12] KVM: selftests: Explicitly state indicies for vm_guest_mode_params array
` [PATCH v2 02/12] KVM: selftests: Expose align() helpers to tests
` [PATCH v2 03/12] KVM: selftests: Assert mmap HVA is aligned when using HugeTLB
` [PATCH v2 04/12] KVM: selftests: Require GPA to be aligned when backed by hugepages
` [PATCH v2 05/12] KVM: selftests: Use shorthand local var to access struct perf_tests_args
` [PATCH v2 06/12] KVM: selftests: Capture per-vCPU GPA in perf_test_vcpu_args
` [PATCH v2 07/12] KVM: selftests: Use perf util's per-vCPU GPA/pages in demand paging test
` [PATCH v2 08/12] KVM: selftests: Move per-VM GPA into perf_test_args
` [PATCH v2 09/12] KVM: selftests: Remove perf_test_args.host_page_size
` [PATCH v2 10/12] KVM: selftests: Create VM with adjusted number of guest pages for perf tests
` [PATCH v2 11/12] KVM: selftests: Fill per-vCPU struct during "perf_test" VM creation
` [PATCH v2 12/12] KVM: selftests: Sync perf_test_args to guest during "

[PATCH v6 1/5] x86/kvm: Add AMD SEV specific Hypercall3
 2021-11-10 22:42 UTC  (14+ messages)

[PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-11-10 22:27 UTC  (47+ messages)
` [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
` [PATCH v7 02/45] x86/sev: "
` [PATCH v7 03/45] x86/mm: Extend cc_attr to include AMD SEV-SNP
` [PATCH v7 04/45] x86/sev: Shorten GHCB terminate macro names
` [PATCH v7 05/45] x86/sev: Get rid of excessive use of defines
` [PATCH v7 06/45] x86/head64: Carve out the guest encryption postprocessing into a helper
` [PATCH v7 07/45] x86/sev: Remove do_early_exception() forward declarations
` [PATCH v7 08/45] x86/sev: Define the Linux specific guest termination reasons
` [PATCH v7 09/45] x86/sev: Save the negotiated GHCB version
` [PATCH v7 10/45] x86/sev: Add support for hypervisor feature VMGEXIT
` [PATCH v7 11/45] x86/sev: Check SEV-SNP features support
` [PATCH v7 12/45] x86/sev: Add a helper for the PVALIDATE instruction
` [PATCH v7 13/45] x86/sev: Check the vmpl level
` [PATCH v7 14/45] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH v7 15/45] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH v7 16/45] x86/sev: "
` [PATCH v7 17/45] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH v7 18/45] x86/kernel: Make the bss.decrypted section shared in RMP table
` [PATCH v7 19/45] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
` [PATCH v7 20/45] x86/mm: Add support to validate memory when changing C-bit
` [PATCH v7 21/45] KVM: SVM: Define sev_features and vmpl field in the VMSA
` [PATCH v7 22/45] KVM: SVM: Create a separate mapping for the SEV-ES save area
` [PATCH v7 23/45] KVM: SVM: Create a separate mapping for the GHCB "
` [PATCH v7 24/45] KVM: SVM: Update the SEV-ES save area mapping
` [PATCH v7 25/45] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
` [PATCH v7 26/45] x86/head: re-enable stack protection for 32/64-bit builds
` [PATCH v7 27/45] x86/sev: move MSR-based VMGEXITs for CPUID to helper
` [PATCH v7 28/45] KVM: x86: move lookup of indexed CPUID leafs "
` [PATCH v7 29/45] x86/compressed/acpi: move EFI system table lookup "
` [PATCH v7 30/45] x86/compressed/acpi: move EFI config "
` [PATCH v7 31/45] x86/compressed/acpi: move EFI vendor "
` [PATCH v7 32/45] x86/boot: Add Confidential Computing type to setup_data
` [PATCH v7 33/45] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
` [PATCH v7 34/45] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
` [PATCH v7 35/45] x86/boot: add a pointer to Confidential Computing blob in bootparams
` [PATCH v7 36/45] x86/compressed: add SEV-SNP feature detection/setup
` [PATCH v7 37/45] x86/compressed: use firmware-validated CPUID for SEV-SNP guests
` [PATCH v7 38/45] x86/compressed/64: add identity mapping for Confidential Computing blob
` [PATCH v7 39/45] x86/sev: add SEV-SNP feature detection/setup
` [PATCH v7 40/45] x86/sev: use firmware-validated CPUID for SEV-SNP guests
` [PATCH v7 41/45] x86/sev: Provide support for SNP guest request NAEs
` [PATCH v7 42/45] x86/sev: Register SNP guest request platform device
` [PATCH v7 43/45] virt: Add SEV-SNP guest driver
` [PATCH v7 44/45] virt: sevguest: Add support to derive key
` [PATCH v7 45/45] virt: sevguest: Add support to get extended report

[kvm-unit-tests PATCH v2 0/3] Regression test for L1 LDTR persistence bug
 2021-11-10 21:44 UTC  (3+ messages)

[kvm-unit-tests PATCH 00/14] Run access test in an L2 guest
 2021-11-10 21:20 UTC  (15+ messages)
` [kvm-unit-tests PATCH 01/14] x86: cleanup handling of 16-byte GDT descriptors
` [kvm-unit-tests PATCH 02/14] x86: fix call to set_gdt_entry
` [kvm-unit-tests PATCH 03/14] unify field names and definitions for GDT descriptors
` [kvm-unit-tests PATCH 04/14] replace tss_descr global with a function
` [kvm-unit-tests PATCH 05/14] x86: Move IDT to desc.c
` [kvm-unit-tests PATCH 06/14] x86: unify name of 32-bit and 64-bit GDT
` [kvm-unit-tests PATCH 07/14] x86: get rid of ring0stacktop
` [kvm-unit-tests PATCH 08/14] x86: Move 64-bit GDT and TSS to desc.c
` [kvm-unit-tests PATCH 09/14] x86: Move 32-bit "
` [kvm-unit-tests PATCH 10/14] x86: Look up the PTEs rather than assuming them
` [kvm-unit-tests PATCH 11/14] x86: Prepare access test for running in L2
` [kvm-unit-tests PATCH 12/14] x86: Fix tabs in access.c
` [kvm-unit-tests PATCH 13/14] x86: Clean up the global, page_table_levels, "
` [kvm-unit-tests PATCH 14/14] x86: Add tests that run ac_test_run() in an L2 guest

[for-6.1 v3 0/3] virtiofsd: Add support for FUSE_SYNCFS request
 2021-11-10 19:48 UTC  (2+ messages)

[PATCH 0/2] svm: avic: Allow AVIC support on system w/ physical APIC ID > 255
 2021-11-10 19:48 UTC  (4+ messages)
` [PATCH 1/2] x86/apic: Add helper function to get maximum physical APIC ID
` [PATCH 2/2] KVM: SVM: Extend host physical APIC ID field to support more than 8-bit

[PATCH v6 00/42] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-11-10 18:43 UTC  (5+ messages)
` [PATCH v6 19/42] x86/mm: Add support to validate memory when changing C-bit

[PATCH 0/3] VMX: nested migration fixes for 32 bit nested guests
 2021-11-10 17:21 UTC  (10+ messages)
` [PATCH 1/3] KVM: nVMX: extract calculation of the L1's EFER
` [PATCH 2/3] KVM: nVMX: restore L1's EFER prior to setting the nested state
` [PATCH 3/3] KVM: x86/mmu: don't skip mmu initialization when mmu root level changes

[PATCH v2 00/12] x86/sev: KEXEC/KDUMP support for SEV-ES guests
 2021-11-10 16:37 UTC  (3+ messages)
` [PATCH v2 07/12] x86/sev: Setup code to park APs in the AP Jump Table

[PATCH v2 0/5] KVM: arm64: Rework FPSIMD/SVE tracking
 2021-11-10 13:19 UTC  (3+ messages)
` [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving

Thoughts of AMX KVM support based on latest kernel
 2021-11-10 13:01 UTC 

[PATCH v1 3/5] KVM: x86: nVMX: VMCS12 field's read/write respects field existence bitmap
 2021-11-10  5:35 UTC  (12+ messages)

[PATCH v5 0/7] KVM: PKS Virtualization support
 2021-11-10  0:56 UTC  (6+ messages)
` [PATCH v5 3/7] KVM: X86: Expose IA32_PKRS MSR

[kvm-unit-tests PATCH v2] x86: Look up the PTEs rather than assuming them
 2021-11-09 22:54 UTC  (2+ messages)

[PATCH 0/6] KVM: SEV: Bug fix, cleanups and enhancements
 2021-11-09 21:51 UTC  (6+ messages)
` [PATCH 2/6] KVM: SEV: Explicitly document that there are no TOCTOU races in copy ASID
` [PATCH 3/6] KVM: SEV: Set sev_info.active after initial checks in sev_guest_init()
` [PATCH 4/6] KVM: SEV: WARN if SEV-ES is marked active but SEV is not
` [PATCH 5/6] KVM: SEV: Drop a redundant setting of sev->asid during initialization
` [PATCH 6/6] KVM: SEV: Fix typo in and tweak name of cmd_allowed_from_miror()


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).