kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-01-04 03:58:47 to 2023-01-06 04:18:19 UTC [more...]

[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
 2023-01-06  4:13 UTC  (12+ messages)
` [PATCH v10 2/9] KVM: Introduce per-page memory attributes
` [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
` [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE

[PATCH][resend] KVM: x86: fire timer when it is migrated and expired, and in oneshot mode
 2023-01-06  4:06 UTC 

[PATCH] kvm: x86/mmu: Remove FNAME(is_self_change_mapping)
 2023-01-06  1:45 UTC  (2+ messages)

[Bug 216891] New: The interface for creating SR-IOV VF doesn't exist
 2023-01-06  1:40 UTC  (2+ messages)
` [Bug 216891] "

[PATCH v5 00/33] KVM: x86: AVIC and local APIC fixes+cleanups
 2023-01-06  1:13 UTC  (34+ messages)
` [PATCH v5 01/33] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
` [PATCH v5 02/33] KVM: x86: Purge "highest ISR" cache when updating APICv state
` [PATCH v5 03/33] KVM: SVM: Flush the "current" TLB when activating AVIC
` [PATCH v5 04/33] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
` [PATCH v5 05/33] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
` [PATCH v5 06/33] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
` [PATCH v5 07/33] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
` [PATCH v5 08/33] KVM: x86: Handle APICv updates for APIC "mode" changes via request
` [PATCH v5 09/33] KVM: x86: Move APIC access page helper to common x86 code
` [PATCH v5 10/33] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
` [PATCH v5 11/33] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean
` [PATCH v5 12/33] KVM: SVM: Compute dest based on sender's x2APIC status for AVIC kick
` [PATCH v5 13/33] KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast
` [PATCH v5 14/33] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
` [PATCH v5 15/33] KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch
` [PATCH v5 16/33] KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU
` [PATCH v5 17/33] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
` [PATCH v5 18/33] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
` [PATCH v5 19/33] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
` [PATCH v5 20/33] KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
` [PATCH v5 21/33] KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
` [PATCH v5 22/33] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
` [PATCH v5 23/33] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
` [PATCH v5 24/33] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
` [PATCH v5 25/33] KVM: SVM: Always update local APIC on writes to logical dest register
` [PATCH v5 26/33] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
` [PATCH v5 27/33] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
` [PATCH v5 28/33] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
` [PATCH v5 29/33] KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps
` [PATCH v5 30/33] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
` [PATCH v5 31/33] KVM: x86: Track required APICv inhibits with variable, not callback
` [PATCH v5 32/33] KVM: x86: Allow APICv APIC ID inhibit to be cleared
` [PATCH v5 33/33] KVM: x86: Add helpers to recalc physical vs. logical optimized APIC maps

[PATCH v3 0/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
 2023-01-06  1:03 UTC  (7+ messages)
` [PATCH v3 1/1] "

[PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-01-05 23:37 UTC  (35+ messages)
` [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
` [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
` [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
` [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
` [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
` [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command

[PATCH v2 0/6] Clean up the supported xfeatures
 2023-01-05 23:10 UTC  (10+ messages)
` [PATCH v2 2/6] KVM: x86: Clear all supported AVX-512 xfeatures if they are not all set
` [PATCH v2 5/6] KVM: selftests: Add XFEATURE masks to common code
` [PATCH v2 6/6] KVM: selftests: Add XCR0 Test

[kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
 2023-01-05 23:09 UTC  (2+ messages)

[RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
 2023-01-05 23:07 UTC  (9+ messages)
` [PATCH 0/2] Fix deadlocks in kvm_vm_ioctl_set_msr_filter() and
  ` [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()

[PATCH] Documentation: kvm: clarify SRCU locking order
 2023-01-05 22:38 UTC  (3+ messages)

[PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP)
 2023-01-05 22:31 UTC  (11+ messages)
` [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table

[PATCH v2] KVM: x86: Replace cpu_dirty_logging_count with nr_memslots_dirty_logging
 2023-01-05 21:43 UTC 

[PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
 2023-01-05 20:28 UTC  (4+ messages)

[PATCH iommufd v3 0/9] Remove IOMMU_CAP_INTR_REMAP
 2023-01-05 19:33 UTC  (10+ messages)
` [PATCH iommufd v3 1/9] irq: Add msi_device_has_isolated_msi()
` [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
` [PATCH iommufd v3 3/9] vfio/type1: Convert to iommu_group_has_isolated_msi()
` [PATCH iommufd v3 4/9] iommufd: Convert to msi_device_has_isolated_msi()
` [PATCH iommufd v3 5/9] irq: Remove unused irq_domain_check_msi_remap() code
` [PATCH iommufd v3 6/9] irq: Rename IRQ_DOMAIN_MSI_REMAP to IRQ_DOMAIN_ISOLATED_MSI
` [PATCH iommufd v3 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
` [PATCH iommufd v3 8/9] irq/s390: Add arch_is_isolated_msi() for s390
` [PATCH iommufd v3 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP

[PATCH] KVM: x86: Replace 0-length arrays with flexible arrays
 2023-01-05 19:05 UTC 

[PATCH v6 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
 2023-01-05 18:09 UTC  (10+ messages)
` [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
` [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present

[PATCH] KVM: x86: Replace cpu_dirty_logging_count with nr_memslots_dirty_logging
 2023-01-05 18:08 UTC  (2+ messages)

[PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
 2023-01-05 17:53 UTC  (18+ messages)
` [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
` [PATCH 09/27] drm/i915/gvt: Protect gfn hash table with dedicated mutex
` [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid

[kvm-unit-tests GIT PULL 0/4] s390x: storage key and CMM concurrent tests
 2023-01-05 16:39 UTC  (7+ messages)
` [kvm-unit-tests GIT PULL 1/4] lib: s390x: add PSW and PSW_WITH_CUR_MASK macros
` [kvm-unit-tests GIT PULL 2/4] s390x: use the new "
` [kvm-unit-tests GIT PULL 3/4] s390x: add parallel skey migration test
` [kvm-unit-tests GIT PULL 4/4] s390x: add CMM test during migration

[PATCH v2 0/1] vfio/type1: Fix vfio-pci pass-through of ISM devices
 2023-01-05 16:06 UTC  (3+ messages)
` [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()

[GIT PULL] KVM/arm64 fixes for 6.2, take #1
 2023-01-05 15:42 UTC 

[PATCH rcu 01/27] arch/x86: Remove "select SRCU"
 2023-01-05 15:30 UTC  (6+ messages)
` [PATCH rcu 03/27] arch/mips/kvm: "
` [PATCH rcu 05/27] arch/riscv/kvm: "
` [PATCH rcu 06/27] arch/s390/kvm: "

[PATCH v14 00/11] s390x: CPU Topology
 2023-01-05 14:53 UTC  (12+ messages)
` [PATCH v14 01/11] s390x/cpu topology: adding s390 specificities to CPU topology
` [PATCH v14 02/11] s390x/cpu topology: add topology entries on CPU hotplug
` [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
` [PATCH v14 04/11] s390x/sclp: reporting the maximum nested topology entries
` [PATCH v14 05/11] s390x/cpu topology: resetting the Topology-Change-Report
` [PATCH v14 06/11] s390x/cpu topology: interception of PTF instruction
` [PATCH v14 07/11] target/s390x/cpu topology: activating CPU topology
` [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
` [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
` [PATCH v14 10/11] qapi/s390/cpu topology: POLARITY_CHANGE qapi event
` [PATCH v14 11/11] docs/s390x/cpu topology: document s390x cpu topology

[PATCH v5] KVM: MMU: Make the definition of 'INVALID_GPA' common
 2023-01-05 13:01 UTC 

[PATCH 0/3] x86/cpu: KVM: Make SGX and VMX depend on FEAT_CTL
 2023-01-05 10:15 UTC  (9+ messages)
` [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info

[PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
 2023-01-05 10:08 UTC  (3+ messages)

[kvm-unit-tests PATCH v1] s390x: Fix integer literal in skey.c
 2023-01-05 10:05 UTC  (3+ messages)

[PATCH] kvm: x86/mmu: Don't clear write flooding for direct SP
 2023-01-05 10:03 UTC 

[PATCH] kvm: x86/mmu: Rename SPTE_TDP_AD_ENABLED_MASK to SPTE_TDP_AD_ENABLED
 2023-01-05 10:02 UTC 

[PATCH 1/7] kvm: x86/mmu: Use KVM_MMU_ROOT_XXX for kvm_mmu_invalidate_gva()
 2023-01-05  9:58 UTC  (7+ messages)
` [PATCH 2/7] kvm: x86/mmu: Use kvm_mmu_invalidate_gva() in kvm_mmu_invpcid_gva()
` [PATCH 3/7] kvm: x86/mmu: Use kvm_mmu_invalidate_gva() in nested_ept_invalidate_addr()
` [PATCH 4/7] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
` [PATCH 5/7] kvm: x86/mmu: Move the code out of FNAME(sync_page)'s loop body into mmu.c
` [PATCH 6/7] kvm: x86/mmu: Remove FNAME(invlpg)
` [PATCH 7/7] kvm: x86/mmu: Remove @no_dirty_log from FNAME(prefetch_gpte)

[PATCH] vhost-test: remove meaningless debug info
 2023-01-05  7:03 UTC 

[syzbot] kernel BUG in vhost_vsock_handle_tx_kick
 2023-01-05  4:51 UTC  (5+ messages)

[PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
 2023-01-05  2:59 UTC  (3+ messages)

[GIT PULL v2] virtio,vhost,vdpa: fixes, cleanups
 2023-01-05  1:22 UTC  (2+ messages)

[PATCH iommufd v2 0/9] Remove IOMMU_CAP_INTR_REMAP
 2023-01-05  0:13 UTC  (4+ messages)
` [PATCH iommufd v2 8/9] irq/s390: Add arch_is_isolated_msi() for s390

[PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
 2023-01-04 21:20 UTC  (2+ messages)

[RFC 00/12] Add vfio_device cdev for iommufd support
 2023-01-04 20:47 UTC  (7+ messages)
` [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
` [RFC 07/12] vfio: Block device access via device fd until device is opened

[PATCH] vhost/vsock: check length in rx header
 2023-01-04 20:06 UTC 

[V4 PATCH 0/4] Execute hypercalls according to host cpu
 2023-01-04 19:32 UTC  (2+ messages)

[PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
 2023-01-04 18:34 UTC  (7+ messages)
` [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry

[PATCH 0/4] Qemu SEV reduced-phys-bits fixes
 2023-01-04 18:13 UTC  (2+ messages)

[PATCH 0/2] Fix "Instructions Retired" from incorrectly counting
 2023-01-04 17:35 UTC  (5+ messages)
` [PATCH 1/2] KVM: x86/pmu: Prevent the PMU from counting disallowed events
` [PATCH 2/2] KVM: selftests: Test the PMU event "Instructions retired"

[PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
 2023-01-04 17:27 UTC  (3+ messages)

[PATCH 0/3] KVM: x86/pmu: Fix accesses to PMU MSRs in two corner cases
 2023-01-04 16:27 UTC  (6+ messages)
` [PATCH 1/3] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
` [PATCH 2/3] KVM: x86: Ignore host accesses to higher version PMU features MSRs

[PATCH 0/1] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd
 2023-01-04 15:00 UTC  (3+ messages)
` [PATCH 1/1] "

[kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
 2023-01-04 14:49 UTC  (10+ messages)

[PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
 2023-01-04 14:42 UTC  (5+ messages)
` [PATCH v2 3/4] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes

[kvm-unit-tests PATCH] ci/cirrus-ci-macos: Update to the latest macOS version
 2023-01-04 14:25 UTC 

[PATCH 0/1] vfio/type1: Fix vfio-pci pass-through of ISM devices
 2023-01-04 13:08 UTC  (6+ messages)
` [PATCH 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()

[PATCH v10 000/108] KVM TDX basic feature support
 2023-01-04  7:59 UTC  (5+ messages)
` [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
` [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters

[Patch v3 0/9] NUMA aware page table's pages allocation
 2023-01-04  6:57 UTC  (6+ messages)
` [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches

[PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
 2023-01-04  4:26 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).