kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-01-27 15:06:46 to 2022-01-29 12:02:29 UTC [more...]

[PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2022-01-29 12:02 UTC  (7+ messages)
` [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs

[PATCH v3 0/9] Parallel CPU bringup for x86_64
 2022-01-29  9:22 UTC  (14+ messages)

[RFC PATCH v4 00/26] KVM: arm64: Make CPU ID registers writable by userspace
 2022-01-29  5:52 UTC  (15+ messages)
` [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
` [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
` [RFC PATCH v4 22/26] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
` [RFC PATCH v4 23/26] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1

[PATCH] kvm: Move KVM_GET_XSAVE2 IOCTL definition at the end of kvm.h
 2022-01-29  1:35 UTC  (2+ messages)

[PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
 2022-01-28 22:58 UTC  (13+ messages)

[PATCH] KVM: x86: Fix rmap allocation for very large memslots
 2022-01-28 21:47 UTC  (2+ messages)

[kvm-unit-tests PATCH v1 0/5] s390x: smp: avoid hardcoded CPU addresses
 2022-01-28 18:54 UTC  (6+ messages)
` [kvm-unit-tests PATCH v1 1/5] lib: s390x: smp: add functions to work with CPU indexes
` [kvm-unit-tests PATCH v1 2/5] lib: s390x: smp: guarantee that boot CPU has index 0
` [kvm-unit-tests PATCH v1 3/5] s390x: smp: avoid hardcoded CPU addresses
` [kvm-unit-tests PATCH v1 4/5] s390x: firq: "
` [kvm-unit-tests PATCH v1 5/5] s390x: skrf: "

[GIT PULL] KVM fixes for Linux 5.17-rc2
 2022-01-28 17:35 UTC  (2+ messages)

[PATCH v9 00/43] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2022-01-28 17:18 UTC  (44+ messages)
` [PATCH v9 01/43] KVM: SVM: Define sev_features and vmpl field in the VMSA
` [PATCH v9 02/43] KVM: SVM: Create a separate mapping for the SEV-ES save area
` [PATCH v9 03/43] KVM: SVM: Create a separate mapping for the GHCB "
` [PATCH v9 04/43] KVM: SVM: Update the SEV-ES save area mapping
` [PATCH v9 05/43] x86/compressed/64: Detect/setup SEV/SME features earlier in boot
` [PATCH v9 06/43] x86/sev: "
` [PATCH v9 07/43] x86/mm: Extend cc_attr to include AMD SEV-SNP
` [PATCH v9 08/43] x86/sev: Define the Linux specific guest termination reasons
` [PATCH v9 09/43] x86/sev: Save the negotiated GHCB version
` [PATCH v9 10/43] x86/sev: Check SEV-SNP features support
` [PATCH v9 11/43] x86/sev: Add a helper for the PVALIDATE instruction
` [PATCH v9 12/43] x86/sev: Check the vmpl level
` [PATCH v9 13/43] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH v9 14/43] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH v9 15/43] x86/sev: "
` [PATCH v9 16/43] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH v9 17/43] x86/kernel: Make the .bss..decrypted section shared in RMP table
` [PATCH v9 18/43] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active
` [PATCH v9 19/43] x86/mm: Add support to validate memory when changing C-bit
` [PATCH v9 20/43] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
` [PATCH v9 21/43] x86/head/64: Re-enable stack protection
` [PATCH v9 22/43] x86/sev: Move MSR-based VMGEXITs for CPUID to helper
` [PATCH v9 23/43] KVM: x86: Move lookup of indexed CPUID leafs "
` [PATCH v9 24/43] x86/compressed/acpi: Move EFI detection "
` [PATCH v9 25/43] x86/compressed/acpi: Move EFI system table lookup "
` [PATCH v9 26/43] x86/compressed/acpi: Move EFI config "
` [PATCH v9 27/43] x86/compressed/acpi: Move EFI vendor "
` [PATCH v9 28/43] x86/compressed/acpi: Move EFI kexec handling into common code
` [PATCH v9 29/43] x86/boot: Add Confidential Computing type to setup_data
` [PATCH v9 30/43] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
` [PATCH v9 31/43] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
` [PATCH v9 32/43] x86/boot: Add a pointer to Confidential Computing blob in bootparams
` [PATCH v9 33/43] x86/compressed: Add SEV-SNP feature detection/setup
` [PATCH v9 34/43] x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests
` [PATCH v9 35/43] x86/compressed: Export and rename add_identity_map()
` [PATCH v9 36/43] x86/compressed/64: Add identity mapping for Confidential Computing blob
` [PATCH v9 37/43] x86/sev: Add SEV-SNP feature detection/setup
` [PATCH v9 38/43] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
` [PATCH v9 39/43] x86/sev: Provide support for SNP guest request NAEs
` [PATCH v9 40/43] x86/sev: Register SEV-SNP guest request platform device
` [PATCH v9 41/43] virt: Add SEV-SNP guest driver
` [PATCH v9 42/43] virt: sevguest: Add support to derive key
` [PATCH v9 43/43] virt: sevguest: Add support to get extended report

[PATCH v4 00/12] KVM: mm: fd-based approach for supporting KVM guest private memory
 2022-01-28 16:47 UTC  (2+ messages)

Call for GSoC and Outreachy project ideas for summer 2022
 2022-01-28 15:47 UTC 

[PATCH 00/22] KVM: x86: Fill *_x86_ops via kvm-x86-ops.h
 2022-01-28 15:42 UTC  (25+ messages)
` [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
` [PATCH 02/22] KVM: x86: Move delivery of non-APICv interrupt into vendor code
` [PATCH 03/22] KVM: x86: Drop export for .tlb_flush_current() static_call key
` [PATCH 04/22] KVM: x86: Rename kvm_x86_ops pointers to align w/ preferred vendor names
` [PATCH 05/22] KVM: x86: Use static_call() for .vcpu_deliver_sipi_vector()
` [PATCH 06/22] KVM: VMX: Call vmx_get_cpl() directly in handle_dr()
` [PATCH 07/22] KVM: xen: Use static_call() for invoking kvm_x86_ops hooks
` [PATCH 08/22] KVM: nVMX: Refactor PMU refresh to avoid referencing kvm_x86_ops.pmu_ops
` [PATCH 09/22] KVM: x86: Uninline and export hv_track_root_tdp()
` [PATCH 10/22] KVM: x86: Unexport kvm_x86_ops
` [PATCH 11/22] KVM: x86: Use static_call() for copy/move encryption context ioctls()
` [PATCH 12/22] KVM: x86: Allow different macros for APICv, CVM, and Hyper-V kvm_x86_ops
` [PATCH 13/22] KVM: VMX: Rename VMX functions to conform to kvm_x86_ops names
` [PATCH 14/22] KVM: VMX: Use kvm-x86-ops.h to fill vmx_x86_ops
` [PATCH 15/22] KVM: x86: Move get_cs_db_l_bits() helper to SVM
` [PATCH 16/22] KVM: SVM: Rename svm_flush_tlb() to svm_flush_tlb_current()
` [PATCH 17/22] KVM: SVM: Remove unused MAX_INST_SIZE #define
` [PATCH 18/22] KVM: SVM: Rename AVIC helpers to use "avic" prefix instead of "svm"
` [PATCH 19/22] KVM: x86: Use more verbose names for mem encrypt kvm_x86_ops hooks
` [PATCH 20/22] KVM: SVM: Rename SEV implemenations to conform to "
` [PATCH 21/22] KVM: SVM: Rename hook implementations to conform to kvm_x86_ops' names
` [PATCH 22/22] KVM: SVM: Use kvm-x86-ops.h to fill svm_x86_ops

[PATCH v3 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
 2022-01-28 15:34 UTC  (6+ messages)

[kvm-unit-tests PATCH 1/3] x86: tsc_adjust: Remove flaky timing test
 2022-01-28 15:17 UTC  (4+ messages)
` [kvm-unit-tests PATCH 2/3] x86: tsc_adjust: Use report_skip when skipping test
` [kvm-unit-tests PATCH 3/3] x86: Define wrtsc(tsc) as wrmsr(MSR_IA32_TSC, tsc)

[PATCH v6 00/64] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
 2022-01-28 12:19 UTC  (65+ messages)
` [PATCH v6 01/64] arm64: Add ARM64_HAS_NESTED_VIRT cpufeature
` [PATCH v6 02/64] KVM: arm64: nv: Introduce nested virtualization VCPU feature
` [PATCH v6 03/64] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
` [PATCH v6 04/64] KVM: arm64: nv: Allow userspace to set PSR_MODE_EL2x
` [PATCH v6 05/64] KVM: arm64: nv: Add EL2 system registers to vcpu context
` [PATCH v6 06/64] KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 VCPU state
` [PATCH v6 07/64] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
` [PATCH v6 08/64] KVM: arm64: nv: Reset VMPIDR_EL2 and VPIDR_EL2 to sane values
` [PATCH v6 09/64] KVM: arm64: nv: Support virtual EL2 exceptions
` [PATCH v6 10/64] KVM: arm64: nv: Inject HVC exceptions to the virtual EL2
` [PATCH v6 11/64] KVM: arm64: nv: Handle trapped ERET from "
` [PATCH v6 12/64] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
` [PATCH v6 13/64] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
` [PATCH v6 14/64] KVM: arm64: nv: Handle SPSR_EL2 specially
` [PATCH v6 15/64] KVM: arm64: nv: Handle HCR_EL2.E2H specially
` [PATCH v6 16/64] KVM: arm64: nv: Save/Restore vEL2 sysregs
` [PATCH v6 17/64] KVM: arm64: nv: Emulate PSTATE.M for a guest hypervisor
` [PATCH v6 18/64] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
` [PATCH v6 19/64] KVM: arm64: nv: Trap SPSR_EL1, ELR_EL1 and VBAR_EL1 from "
` [PATCH v6 20/64] KVM: arm64: nv: Trap CPACR_EL1 access in "
` [PATCH v6 21/64] KVM: arm64: nv: Handle PSCI call via smc from the guest
` [PATCH v6 22/64] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
` [PATCH v6 23/64] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP,FPEN} settings
` [PATCH v6 24/64] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
` [PATCH v6 25/64] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
` [PATCH v6 26/64] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
` [PATCH v6 27/64] KVM: arm64: nv: Allow a sysreg to be hidden from userspace only
` [PATCH v6 28/64] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
` [PATCH v6 29/64] KVM: arm64: nv: Forward debug traps to the nested guest
` [PATCH v6 30/64] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
` [PATCH v6 31/64] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
` [PATCH v6 32/64] KVM: arm64: nv: Filter out unsupported features from ID regs
` [PATCH v6 33/64] KVM: arm64: nv: Hide RAS from nested guests
` [PATCH v6 34/64] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
` [PATCH v6 35/64] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
` [PATCH v6 36/64] KVM: arm64: nv: Handle shadow stage 2 page faults
` [PATCH v6 37/64] KVM: arm64: nv: Restrict S2 RD/WR permissions to match the guest's
` [PATCH v6 38/64] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
` [PATCH v6 39/64] KVM: arm64: nv: Set a handler for the system instruction traps
` [PATCH v6 40/64] KVM: arm64: nv: Trap and emulate AT instructions from virtual EL2
` [PATCH v6 41/64] KVM: arm64: nv: Trap and emulate TLBI "
` [PATCH v6 42/64] KVM: arm64: nv: Fold guest's HCR_EL2 configuration into the host's
` [PATCH v6 43/64] KVM: arm64: nv: arch_timer: Support hyp timer emulation
` [PATCH v6 44/64] KVM: arm64: nv: Add handling of EL2-specific timer registers
` [PATCH v6 45/64] KVM: arm64: nv: Load timer before the GIC
` [PATCH v6 46/64] KVM: arm64: nv: Nested GICv3 Support
` [PATCH v6 47/64] KVM: arm64: nv: Don't load the GICv4 context on entering a nested guest
` [PATCH v6 48/64] KVM: arm64: nv: vgic: Emulate the HW bit in software
` [PATCH v6 49/64] KVM: arm64: nv: vgic: Allow userland to set VGIC maintenance IRQ
` [PATCH v6 50/64] KVM: arm64: nv: Implement maintenance interrupt forwarding
` [PATCH v6 51/64] KVM: arm64: nv: Add nested GICv3 tracepoints
` [PATCH v6 52/64] KVM: arm64: nv: Allow userspace to request KVM_ARM_VCPU_NESTED_VIRT
` [PATCH v6 53/64] KVM: arm64: nv: Add handling of ARMv8.4-TTL TLB invalidation
` [PATCH v6 54/64] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
` [PATCH v6 55/64] KVM: arm64: nv: Tag shadow S2 entries with nested level
` [PATCH v6 56/64] KVM: arm64: nv: Add include containing the VNCR_EL2 offsets
` [PATCH v6 57/64] KVM: arm64: nv: Map VNCR-capable registers to a separate page
` [PATCH v6 58/64] KVM: arm64: nv: Move nested vgic state into the sysreg file
` [PATCH v6 59/64] KVM: arm64: Add ARMv8.4 Enhanced Nested Virt cpufeature
` [PATCH v6 60/64] KVM: arm64: nv: Sync nested timer state with ARMv8.4
` [PATCH v6 61/64] KVM: arm64: nv: Allocate VNCR page when required
` [PATCH v6 62/64] KVM: arm64: nv: Enable ARMv8.4-NV support
` [PATCH v6 63/64] KVM: arm64: nv: Fast-track 'InHost' exception returns
` [PATCH v6 64/64] KVM: arm64: nv: Fast-track EL1 TLBIs for VHE guests

[GIT PULL] KVM/arm64 fixes for 5.17, take #1
 2022-01-28 12:48 UTC  (2+ messages)

[PATCH 0/3] KVM: x86: export supported_xcr0 via UAPI
 2022-01-28 12:33 UTC  (6+ messages)
` [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states

[RFC PATCH 0/6] KVM: SVM: Defer page pinning for SEV guests
 2022-01-28 11:08 UTC  (11+ messages)
` [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning

[kvm-unit-tests PATCH 0/4] s390x: Attestation tests
 2022-01-28  9:58 UTC  (11+ messages)
` [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
` [kvm-unit-tests PATCH 2/4] s390x: lib: Add QUI getter
` [kvm-unit-tests PATCH 3/4] s390x: uv-guest: remove duplicated checks
` [kvm-unit-tests PATCH 4/4] s390x: uv-guest: Add attestation tests

[PATCH v3] vhost: cache avail index in vhost_enable_notify()
 2022-01-28  9:41 UTC 

[RFC PATCH v2 0/5] vfio/pci: Enable runtime power management support
 2022-01-28  0:05 UTC  (3+ messages)
` [RFC PATCH v2 3/5] vfio/pci: fix memory leak during D3hot to D0 tranistion

Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
 2022-01-27 19:39 UTC  (2+ messages)

[RFC PATCH v1 00/10] KVM: s390: Do storage key checking
 2022-01-27 17:34 UTC  (7+ messages)
` [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access

[PATCH v5 00/69] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
 2022-01-27 17:22 UTC  (4+ messages)
` [PATCH v5 17/69] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers

[PATCH v2 00/30] KVM: s390: enable zPCI for interpretive execution
 2022-01-27 15:14 UTC  (6+ messages)
` [PATCH v2 12/30] s390/pci: get SHM information from list pci

[PATCH v2 0/5] kvm: selftests: aarch64: some fixes for vgic_irq
 2022-01-27 15:06 UTC  (4+ messages)
` [PATCH v2 4/5] kvm: selftests: aarch64: fix some vgic related comments


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).