kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-04-03 16:53:19 to 2023-04-04 13:53:59 UTC [more...]

[RFC PATCH v3 0/2] Providing mount in memfd_restricted() syscall
 2023-04-04 13:53 UTC  (4+ messages)
` [RFC PATCH v3 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted

[PATCH v3 0/8] RISC-V KVM virtualize AIA CSRs
 2023-04-04 13:31 UTC  (19+ messages)
` [PATCH v3 4/8] RISC-V: KVM: Initial skeletal support for AIA
` [PATCH v3 5/8] RISC-V: KVM: Implement subtype for CSR ONE_REG interface
` [PATCH v3 6/8] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
` [PATCH v3 7/8] RISC-V: KVM: Virtualize per-HART "
` [PATCH v3 8/8] RISC-V: KVM: Implement guest external interrupt line management

[RFC PATCH V4 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
 2023-04-04 13:22 UTC  (21+ messages)
` [RFC PATCH V4 01/17] x86/hyperv: Add sev-snp enlightened guest static key
` [RFC PATCH V4 02/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer
` [RFC PATCH V4 03/17] x86/hyperv: Set Virtual Trust Level in VMBus init message
` [RFC PATCH V4 04/17] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
` [RFC PATCH V4 05/17] clocksource/drivers/hyper-v: decrypt hyperv tsc page "
` [RFC PATCH V4 06/17] x86/hyperv: decrypt VMBus pages for "
` [RFC PATCH V4 07/17] drivers: hv: Decrypt percpu hvcall input arg page in "
` [RFC PATCH V4 08/17] x86/hyperv: Initialize cpu and memory for "
` [RFC PATCH V4 09/17] x86/hyperv: SEV-SNP enlightened guest don't support legacy rtc
` [RFC PATCH V4 10/17] x86/hyperv: Add smp support for sev-snp guest
` [RFC PATCH V4 11/17] x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES
` [RFC PATCH V4 12/17] x86/sev: Add a #HV exception handler
` [RFC PATCH V4 13/17] x86/sev: Add Check of #HV event in path
` [RFC PATCH V4 14/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
` [RFC PATCH V4 15/17] x86/sev: optimize system vector processing invoked from #HV exception
` [RFC PATCH V4 16/17] x86/sev: Fix interrupt exit code paths "
` [RFC PATCH V4 17/17] x86/sev: Remove restrict interrupt injection from SNP_FEATURES_IMPL_REQ

[PATCH v5 0/9] vdpa_sim: add support for user VA
 2023-04-04 13:17 UTC  (10+ messages)
` [PATCH v5 1/9] vdpa: add bind_mm/unbind_mm callbacks
` [PATCH v5 2/9] vhost-vdpa: use bind_mm/unbind_mm device callbacks
` [PATCH v5 3/9] vringh: replace kmap_atomic() with kmap_local_page()
` [PATCH v5 4/9] vringh: define the stride used for translation
` [PATCH v5 5/9] vringh: support VA with iotlb
` [PATCH v5 6/9] vdpa_sim: make devices agnostic for work management
` [PATCH v5 7/9] vdpa_sim: use kthread worker
` [PATCH v5 8/9] vdpa_sim: replace the spinlock with a mutex to protect the state
` [PATCH v5 9/9] vdpa_sim: add support for user VA

[PATCH v7 0/5] Linear Address Masking (LAM) KVM Enabling
 2023-04-04 13:09 UTC  (6+ messages)
` [PATCH v7 1/5] KVM: x86: Virtualize CR4.LAM_SUP
` [PATCH v7 2/5] KVM: x86: Virtualize CR3.LAM_{U48,U57}
` [PATCH v7 3/5] KVM: x86: Introduce untag_addr() in kvm_x86_ops
` [PATCH v7 4/5] KVM: x86: Untag address when LAM applicable
` [PATCH v7 5/5] KVM: x86: Expose LAM feature to userspace VMM

[PATCH v19 00/21] s390x: CPU Topology
 2023-04-04 12:35 UTC  (23+ messages)
` [PATCH v19 01/21] s390x/cpu topology: add s390 specifics to CPU topology
` [PATCH v19 02/21] s390x/cpu topology: add topology entries on CPU hotplug
` [PATCH v19 06/21] s390x/cpu topology: interception of PTF instruction
` [PATCH v19 13/21] docs/s390x/cpu topology: document s390x cpu topology
` [PATCH v19 14/21] tests/avocado: s390x cpu topology core
` [PATCH v19 15/21] tests/avocado: s390x cpu topology polarisation
` [PATCH v19 17/21] tests/avocado: s390x cpu topology test dedicated CPU

[kvm-unit-tests PATCH 0/6] arm: pmu: Fix random failures of pmu-chain-promotion
 2023-04-04 12:47 UTC  (3+ messages)

[kvm-unit-tests PATCH] MAINTAINERS: Add a catch-all entry for the kvm mailing list
 2023-04-04 12:51 UTC 

[PATCH 0/2] KVM: SVM: small tweaks for sev_hardware_setup
 2023-04-04 12:26 UTC  (3+ messages)
` [PATCH 1/2] KVM: SVM: free sev_*asid_bitmap init if SEV init fails
` [PATCH 2/2] KVM: SVM: add some info prints to SEV init

[PATCH 0/2] KVM: SVM: small tweaks for sev_hardware_setup
 2023-04-04 12:12 UTC 

[PATCH net-next v4 0/3] vsock: return errors other than -ENOMEM to socket
 2023-04-04 11:50 UTC  (2+ messages)

[kvm-unit-tests PATCH] s390x: Use the right constraints in intercept.c
 2023-04-04 11:43 UTC  (3+ messages)

[kvm-unit-tests PATCH] s390x/snippets: Fix compilation with Clang 15
 2023-04-04 11:40 UTC  (4+ messages)

[kvm-unit-tests PATCH 0/5] s390x: Add base AP support
 2023-04-04 11:40 UTC  (4+ messages)
` [kvm-unit-tests PATCH 5/5] s390x: ap: Add reset tests

[kvm-unit-tests GIT PULL v2 00/14] s390x: new maintainer, refactor linker scripts, tests for misalignments, execute-type instructions and vSIE epdx
 2023-04-04 11:36 UTC  (15+ messages)
` [kvm-unit-tests GIT PULL v2 01/14] .gitignore: ignore `s390x/comm.key` file
` [kvm-unit-tests GIT PULL v2 02/14] s390x/Makefile: simplify `%.hdr` target rules
` [kvm-unit-tests GIT PULL v2 03/14] s390x/Makefile: fix `*.gbin` target dependencies
` [kvm-unit-tests GIT PULL v2 04/14] s390x/Makefile: refactor CPPFLAGS
` [kvm-unit-tests GIT PULL v2 05/14] s390x: use preprocessor for linker script generation
` [kvm-unit-tests GIT PULL v2 06/14] s390x: define a macro for the stack frame size
` [kvm-unit-tests GIT PULL v2 07/14] lib/linux/const.h: test for `__ASSEMBLER__` as well
` [kvm-unit-tests GIT PULL v2 08/14] s390x/spec_ex: Use PSW macro
` [kvm-unit-tests GIT PULL v2 09/14] s390x/spec_ex: Add test introducing odd address into PSW
` [kvm-unit-tests GIT PULL v2 10/14] s390x/spec_ex: Add test of EXECUTE with odd target address
` [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
` [kvm-unit-tests GIT PULL v2 12/14] s390x: spec_ex: Add test for misaligned load
` [kvm-unit-tests GIT PULL v2 13/14] MAINTAINERS: Add Nico as s390x Maintainer and make Thomas reviewer
` [kvm-unit-tests GIT PULL v2 14/14] s390x: sie: Test whether the epoch extension field is working as expected

[PATCH v2 00/11] more misc fixes for 8.0 (tests, gdbstub, meta, docs)
 2023-04-04 11:24 UTC  (3+ messages)
` [PATCH v2 09/11] tests/vm: use the default system python for NetBSD

[PATCH v3 00/12] Introduce new methods for verifying ownership in vfio PCI hot reset
 2023-04-04 10:55 UTC 

[PATCH v7 00/33] x86: enable FRED for x86-64
 2023-04-04 10:27 UTC  (34+ messages)
` [PATCH v7 01/33] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
` [PATCH v7 02/33] x86/fred: make unions for the cs and ss fields in struct pt_regs
` [PATCH v7 03/33] x86/traps: add a system interrupt table for system interrupt dispatch
` [PATCH v7 04/33] x86/traps: add install_system_interrupt_handler()
` [PATCH v7 05/33] x86/traps: add external_interrupt() to dispatch external interrupts
` [PATCH v7 06/33] x86/cpufeature: add the cpu feature bit for FRED
` [PATCH v7 07/33] x86/opcode: add ERETU, ERETS instructions to x86-opcode-map
` [PATCH v7 08/33] x86/objtool: teach objtool about ERETU and ERETS
` [PATCH v7 09/33] x86/cpu: add X86_CR4_FRED macro
` [PATCH v7 10/33] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
` [PATCH v7 11/33] x86/fred: if CONFIG_X86_FRED is disabled, disable FRED support
` [PATCH v7 12/33] x86/cpu: add MSR numbers for FRED configuration
` [PATCH v7 13/33] x86/fred: header file for event types
` [PATCH v7 14/33] x86/fred: header file with FRED definitions
` [PATCH v7 15/33] x86/fred: reserve space for the FRED stack frame
` [PATCH v7 16/33] x86/fred: add a page fault entry stub for FRED
` [PATCH v7 17/33] x86/fred: add a debug "
` [PATCH v7 18/33] x86/fred: add a NMI "
` [PATCH v7 19/33] x86/fred: add a machine check "
` [PATCH v7 20/33] x86/fred: FRED entry/exit and dispatch code
` [PATCH v7 21/33] x86/fred: FRED initialization code
` [PATCH v7 22/33] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
` [PATCH v7 23/33] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
` [PATCH v7 24/33] x86/fred: disallow the swapgs instruction "
` [PATCH v7 25/33] x86/fred: no ESPFIX needed "
` [PATCH v7 26/33] x86/fred: allow single-step trap and NMI when starting a new thread
` [PATCH v7 27/33] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
` [PATCH v7 28/33] x86/ia32: do not modify the DPL bits for a null selector
` [PATCH v7 29/33] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
` [PATCH v7 30/33] x86/fred: allow dynamic stack frame size
` [PATCH v7 31/33] x86/fred: BUG() when ERETU with %rsp not equal to that when the ring 3 event was just delivered
` [PATCH v7 32/33] x86/fred: disable FRED by default in its early stage
` [PATCH v7 33/33] KVM: x86/vmx: refactor VMX_DO_EVENT_IRQOFF to generate FRED stack frames

[PATCH REBASED] KVM: x86: SVM: Fix one redefine issue about VMCB_AVIC_APIC_BAR_MASK
 2023-04-04 10:38 UTC  (3+ messages)

[PATCH v1 0/2] KVM: arm64: PMU: Correct the handling of PMUSERENR_EL0
 2023-04-04 10:05 UTC  (2+ messages)

[kvm-unit-tests PATCH v5 0/3] s390x: Add misaligned instruction tests
 2023-04-04 10:00 UTC  (7+ messages)
` [kvm-unit-tests PATCH v5 1/3] s390x/spec_ex: Use PSW macro
` [kvm-unit-tests PATCH v5 2/3] s390x/spec_ex: Add test introducing odd address into PSW
` [kvm-unit-tests PATCH v5 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address

linux-next: build warning after merge of the kvm-fixes tree
 2023-04-04  9:28 UTC  (2+ messages)

[kvm-unit-tests PATCH v4 0/3] s390x: Add misaligned instruction tests
 2023-04-04  8:57 UTC  (4+ messages)
` [kvm-unit-tests PATCH v4 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address

[kvm-unit-tests v3 00/13] powerpc: updates, P10, PNV support
 2023-04-04  7:34 UTC  (11+ messages)
` [kvm-unit-tests v3 07/13] powerpc/sprs: Specify SPRs with data rather than code
` [kvm-unit-tests v3 08/13] powerpc/spapr_vpa: Add basic VPA tests
` [kvm-unit-tests v3 09/13] powerpc: Expand exception handler vector granularity
` [kvm-unit-tests v3 10/13] powerpc: Add support for more interrupts including HV interrupts
` [kvm-unit-tests v3 11/13] powerpc: Discover runtime load address dynamically

[kvm-unit-tests PATCH v3 0/4] Tests for CR0.WP=0/1 r/o write access
 2023-04-04  7:27 UTC  (8+ messages)
` [kvm-unit-tests PATCH v3 3/4] x86/access: Forced emulation support

[PATCH] KVM: x86/pmu: Zero out pmu->all_valid_pmc_idx each time it's refreshed
 2023-04-04  7:17 UTC 

[kvm-unit-tests PATCH v2 0/4] x86: Add test cases for LAM
 2023-04-04  6:18 UTC  (4+ messages)
` [kvm-unit-tests PATCH v2 1/4] x86: Allow setting of CR3 LAM bits if LAM supported

[PATCH v6 0/7] Linear Address Masking (LAM) KVM Enabling
 2023-04-04  6:14 UTC  (22+ messages)
` [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode

[PATCH v6 0/6] Support writable CPU ID registers from userspace
 2023-04-04  3:53 UTC  (7+ messages)
` [PATCH v6 1/6] KVM: arm64: Move CPU ID feature registers emulation into a separate file
` [PATCH v6 2/6] KVM: arm64: Save ID registers' sanitized value per guest
` [PATCH v6 3/6] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
` [PATCH v6 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
` [PATCH v6 5/6] KVM: arm64: Reuse fields of sys_reg_desc for idreg
` [PATCH v6 6/6] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3

[PATCH V2 0/8] vfio/pci: Support dynamic allocation of MSI-X interrupts
 2023-04-04  3:51 UTC  (14+ messages)
` [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x

[PATCH] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode in SGX handler
 2023-04-04  3:25 UTC 

[RESEND PATCH] selftest/vmx_nested_tsc_scaling_test: fix fp leak
 2023-04-04  3:23 UTC 

[RFC PATCH 0/7] x86/entry: Atomic statck switching for IST
 2023-04-04  3:17 UTC  (3+ messages)

linux-next: manual merge of the kvm-arm tree with the kvm-fixes tree
 2023-04-04  2:32 UTC 

[PATCH] KVM: x86: set varaiable mitigate_smt_rsb storage-class-specifier to static
 2023-04-04  1:01 UTC 

[Patch v4 00/18] NUMA aware page table allocation
 2023-04-03 23:02 UTC  (14+ messages)
` [Patch v4 08/18] KVM: x86/mmu: Track unused mmu_shadowed_info_cache pages count via global counter
` [Patch v4 15/18] KVM: mmu: Add NUMA node support in struct kvm_mmu_memory_cache{}
` [Patch v4 16/18] KVM: x86/mmu: Allocate numa aware page tables during page fault

[PATCH] vfio/cdx: add support for CDX bus
 2023-04-03 21:28 UTC  (2+ messages)

[PATCH v2 0/7] KVM: arm64: Add support for FEAT_TLBIRANGE
 2023-04-03 21:25 UTC  (13+ messages)
` [PATCH v2 2/7] KVM: arm64: Add FEAT_TLBIRANGE support
` [PATCH v2 3/7] KVM: arm64: Implement __kvm_tlb_flush_range_vmid_ipa()
` [PATCH v2 4/7] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
` [PATCH v2 6/7] KVM: arm64: Break the table entries using TLBI range instructions

[PATCH v5 0/6] Support writable CPU ID registers from userspace
 2023-04-03 19:50 UTC  (9+ messages)
` [PATCH v5 5/6] KVM: arm64: Introduce ID register specific descriptor
` [PATCH v5 6/6] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3

[PATCH] kvm: initialize all of the kvm_debugregs structure before sending it to userspace
 2023-04-03 19:45 UTC  (3+ messages)

[RFC PATCH V3 00/16] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
 2023-04-03 18:09 UTC  (4+ messages)
` [RFC PATCH V3 12/16] x86/sev: Add a #HV exception handler

[kvm-unit-tests PATCH v2 0/4] Tests for CR0.WP=0/1 r/o write access
 2023-04-03 17:09 UTC  (5+ messages)
` [kvm-unit-tests PATCH v2 2/4] x86/access: CR0.WP toggling write to r/o data test

[PATCH kvm-unit-tests v2] memory: Skip tests for instructions that are absent
 2023-04-03 16:53 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).