kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-08-23 20:35:57 to 2023-08-25 17:48:00 UTC [more...]

[RFC PATCH v11 00/29] KVM: guest_memfd() and per-page attributes
 2023-08-25 17:47 UTC  (2+ messages)

[RFC PATCH 0/3] vfio/ims: Back guest interrupts from Interrupt Message Store (IMS)
 2023-08-25 17:14 UTC  (10+ messages)
` [RFC PATCH 1/3] vfio/pci: Introduce library allocating "
` [RFC PATCH 2/3] vfio/ims: Support emulated interrupts
` [RFC PATCH 3/3] vfio/ims: Add helper that returns IMS index

[GIT PULL 00/22] KVM: s390: Changes for 6.6
 2023-08-25 15:58 UTC  (25+ messages)
` [GIT PULL 01/22] KVM: s390: interrupt: Fix single-stepping into interrupt handlers
` [GIT PULL 02/22] KVM: s390: interrupt: Fix single-stepping into program "
` [GIT PULL 03/22] KVM: s390: interrupt: Fix single-stepping kernel-emulated instructions
` [GIT PULL 04/22] KVM: s390: interrupt: Fix single-stepping userspace-emulated instructions
` [GIT PULL 05/22] KVM: s390: interrupt: Fix single-stepping keyless mode exits
` [GIT PULL 06/22] KVM: s390: selftests: Add selftest for single-stepping
` [GIT PULL 07/22] s390/vfio-ap: no need to check the 'E' and 'I' bits in APQSW after TAPQ
` [GIT PULL 08/22] s390/vfio-ap: clean up irq resources if possible
` [GIT PULL 09/22] s390/vfio-ap: wait for response code 05 to clear on queue reset
` [GIT PULL 10/22] s390/vfio-ap: allow deconfigured queue to be passed through to a guest
` [GIT PULL 11/22] s390/vfio-ap: remove upper limit on wait for queue reset to complete
` [GIT PULL 12/22] s390/vfio-ap: store entire AP queue status word with the queue object
` [GIT PULL 13/22] s390/vfio-ap: use work struct to verify queue reset
` [GIT PULL 14/22] s390/vfio-ap: handle queue state change in progress on reset
` [GIT PULL 15/22] s390/vfio-ap: check for TAPQ response codes 0x35 and 0x36
` [GIT PULL 16/22] s390/uv: export uv_pin_shared for direct usage
` [GIT PULL 17/22] KVM: s390: export kvm_s390_pv*_is_protected functions
` [GIT PULL 18/22] s390/vfio-ap: make sure nib is shared
` [GIT PULL 19/22] KVM: s390: pv: relax WARN_ONCE condition for destroy fast
` [GIT PULL 20/22] s390/uv: UV feature check utility
` [GIT PULL 21/22] KVM: s390: Add UV feature negotiation
` [GIT PULL 22/22] KVM: s390: pv: Allow AP-instructions for pv-guests

[PATCH v2 0/4] KVM: SVM: Fix unexpected #UD on INT3 in SEV guests
 2023-08-25 14:32 UTC  (7+ messages)
` [PATCH v2 1/4] KVM: SVM: Don't inject #UD if KVM attempts to skip SEV guest insn
` [PATCH v2 2/4] KVM: SVM: Require nrips support for SEV guests (and beyond)
` [PATCH v2 3/4] KVM: x86: Refactor can_emulate_instruction() return to be more expressive
` [PATCH v2 4/4] KVM: SVM: Treat all "skip" emulation for SEV guests as outright failures

Question about AMD SVM's virtual NMI support in Linux kernel mainline
 2023-08-25 14:26 UTC  (3+ messages)

[PATCH v10 0/9] Linear Address Masking (LAM) KVM Enabling
 2023-08-25 14:18 UTC  (6+ messages)

[PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration
 2023-08-25 13:56 UTC  (7+ messages)
` [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for "
` [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL

[PATCH v2 00/16] virtio-mem: Expose device memory through multiple memslots
 2023-08-25 13:21 UTC  (17+ messages)
` [PATCH v2 01/16] vhost: Rework memslot filtering and fix "used_memslot" tracking
` [PATCH v2 02/16] vhost: Remove vhost_backend_can_merge() callback
` [PATCH v2 03/16] softmmu/physmem: Fixup qemu_ram_block_from_host() documentation
` [PATCH v2 04/16] kvm: Return number of free memslots
` [PATCH v2 05/16] vhost: "
` [PATCH v2 06/16] memory-device: Support memory devices with multiple memslots
` [PATCH v2 07/16] stubs: Rename qmp_memory_device.c to memory_device.c
` [PATCH v2 08/16] memory-device: Track required and actually used memslots in DeviceMemoryState
` [PATCH v2 09/16] memory-device,vhost: Support memory devices that dynamically consume memslots
` [PATCH v2 10/16] kvm: Add stub for kvm_get_max_memslots()
` [PATCH v2 11/16] vhost: Add vhost_get_max_memslots()
` [PATCH v2 12/16] memory-device,vhost: Support automatic decision on the number of memslots
` [PATCH v2 13/16] memory: Clarify mapping requirements for RamDiscardManager
` [PATCH v2 14/16] virtio-mem: Expose device memory via multiple memslots if enabled
` [PATCH v2 15/16] memory,vhost: Allow for marking memory device memory regions unmergeable
` [PATCH v2 16/16] virtio-mem: Mark memslot alias "

[CfP] Confidential Computing Microconference @ LPC 2023
 2023-08-25 13:16 UTC  (2+ messages)

[PATCH v8 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
 2023-08-25 12:41 UTC 

[PATCH v13 00/22] TDX host kernel support
 2023-08-25 12:14 UTC  (23+ messages)
` [PATCH v13 01/22] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v13 02/22] x86/tdx: Define TDX supported page sizes as macros
` [PATCH v13 03/22] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
` [PATCH v13 04/22] x86/cpu: Detect TDX partial write machine check erratum
` [PATCH v13 05/22] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
` [PATCH v13 06/22] x86/virt/tdx: Add SEAMCALL error printing for module initialization
` [PATCH v13 07/22] x86/virt/tdx: Add skeleton to enable TDX on demand
` [PATCH v13 08/22] x86/virt/tdx: Get information about TDX module and TDX-capable memory
` [PATCH v13 09/22] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
` [PATCH v13 10/22] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v13 11/22] x86/virt/tdx: Fill out "
` [PATCH v13 12/22] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v13 13/22] x86/virt/tdx: Designate reserved areas for all TDMRs
` [PATCH v13 14/22] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID
` [PATCH v13 15/22] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v13 16/22] x86/virt/tdx: Initialize all TDMRs
` [PATCH v13 17/22] x86/kexec: Flush cache of TDX private memory
` [PATCH v13 18/22] x86/virt/tdx: Keep TDMRs when module initialization is successful
` [PATCH v13 19/22] x86/virt/tdx: Improve readibility of module initialization error handling
` [PATCH v13 20/22] x86/kexec(): Reset TDX private memory on platforms with TDX erratum
` [PATCH v13 21/22] x86/mce: Improve error log of kernel space TDX #MC due to erratum
` [PATCH v13 22/22] Documentation/x86: Add documentation for TDX host support

[PATCH] i386/xen: Ignore VCPU_SSHOTTMR_future flag in set_singleshot_timer()
 2023-08-25 10:02 UTC  (2+ messages)

[RFC PATCH v2 0/8] KVM: arm64: Implement SW/HW combined dirty log
 2023-08-25  9:35 UTC  (9+ messages)
` [RFC PATCH v2 1/8] arm64: cpufeature: Add API to report system support of HWDBM
` [RFC PATCH v2 2/8] KVM: arm64: Add KVM_PGTABLE_WALK_HW_DBM for HW DBM support
` [RFC PATCH v2 3/8] KVM: arm64: Add some HW_DBM related pgtable interfaces
` [RFC PATCH v2 4/8] KVM: arm64: Set DBM for previously writeable pages
` [RFC PATCH v2 5/8] KVM: arm64: Add some HW_DBM related mmu interfaces
` [RFC PATCH v2 6/8] KVM: arm64: Only write protect selected PTE
` [RFC PATCH v2 7/8] KVM: arm64: Add KVM_CAP_ARM_HW_DBM
` [RFC PATCH v2 8/8] KVM: arm64: Start up SW/HW combined dirty log

[PATCH v4 00/10] iommu: Prepare to deliver page faults to user space
 2023-08-25  8:17 UTC  (19+ messages)
` [PATCH v4 01/10] iommu: Move iommu fault data to linux/iommu.h
` [PATCH v4 02/10] iommu/arm-smmu-v3: Remove unrecoverable faults reporting
` [PATCH v4 03/10] iommu: Remove unrecoverable fault data
` [PATCH v4 04/10] iommu: Cleanup iopf data structure definitions
` [PATCH v4 05/10] iommu: Merge iopf_device_param into iommu_fault_param
` [PATCH v4 06/10] iommu: Remove iommu_[un]register_device_fault_handler()
` [PATCH v4 07/10] iommu: Merge iommu_fault_event and iopf_fault
` [PATCH v4 08/10] iommu: Prepare for separating SVA and IOPF
` [PATCH v4 09/10] iommu: Make iommu_queue_iopf() more generic
` [PATCH v4 10/10] iommu: Separate SVA and IOPF

[RFC PATCH 0/4] treewide: Use clocksource id for get_device_system_crosststamp()
 2023-08-25  4:18 UTC  (2+ messages)

[RFC PATCH] KVM: x86: inhibit APICv upon detecting direct APIC access from L2
 2023-08-25  3:58 UTC  (5+ messages)

[PATCH] kvm: x86: emulate MSR_PLATFORM_INFO msr bits
 2023-08-25  3:27 UTC  (9+ messages)

[PATCH v2] KVM: s390: fix gisa destroy operation might lead to cpu stalls
 2023-08-25  2:56 UTC  (4+ messages)

[PATCH 0/2] KVM: Pre-check mmu_notifier retry on x86
 2023-08-25  2:07 UTC  (3+ messages)
` [PATCH 1/2] KVM: Allow calling mmu_invalidate_retry_hva() without holding mmu_lock
` [PATCH 2/2] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing

[RFC v2] KVM: arm/arm64: optimize vSGI injection performance
 2023-08-25  1:58 UTC 

[PATCH] KVM: VMX: Refresh available regs and IDT vectoring info before NMI handling
 2023-08-25  1:45 UTC 

[PATCH v7 0/8] KVM: allow mapping non-refcounted pages
 2023-08-25  1:38 UTC  (9+ messages)
` [PATCH v7 4/8] KVM: x86/mmu: Migrate to __kvm_follow_pfn
` [PATCH v7 5/8] KVM: x86/mmu: Don't pass FOLL_GET "

[PATCH v2] KVM: selftests: Add tests - invalid inputs for KVM_CREATE_GUEST_MEMFD
 2023-08-25  0:17 UTC 

[PATCH v4 00/16] Improve scalability of KVM + userfaultfd live migration via annotated memory faults
 2023-08-25  0:15 UTC  (9+ messages)
` [PATCH v4 09/16] KVM: Introduce KVM_CAP_NOWAIT_ON_FAULT without implementation

Deadlock due to EPT_VIOLATION
 2023-08-24 23:51 UTC  (17+ messages)

[PATCH v3] x86/sev: Make enc_dec_hypercall() accept a size instead of npages
 2023-08-24 22:48 UTC  (2+ messages)

[PATCH v2] x86/sev: Make enc_dec_hypercall() accept a size instead of npages
 2023-08-24 22:37 UTC  (3+ messages)

[PATCH v3] KVM: x86: Add CONFIG_KVM_MAX_NR_VCPUS
 2023-08-24 21:52 UTC 

[kvm-unit-tests PATCH] x86:VMX: Fixup for VMX test failures
 2023-08-24 20:47 UTC  (7+ messages)

[PATCH] KVM: selftests: Add tests - invalid inputs for KVM_CREATE_GUEST_MEMFD
 2023-08-24 19:02 UTC  (2+ messages)

[kvm-unit-tests PATCH] arm64: microbench: Benchmark with virtual instead of physical timer
 2023-08-24 18:46 UTC  (4+ messages)

[PATCH v4 03/16] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
 2023-08-24 17:24 UTC  (13+ messages)

[PATCH 0/2] KVM: SVM: Fix unexpected #UD on INT3 in SEV guests
 2023-08-24 16:08 UTC  (8+ messages)

[RFC 0/5] crypto: qat - enable SRIOV VF live migration
 2023-08-24 15:25 UTC  (15+ messages)
` [RFC 2/5] crypto: qat - add interface for "
` [RFC 4/5] crypto: qat - implement "
` [RFC 5/5] vfio/qat: Add vfio_pci driver for Intel QAT VF devices

[PATCH 0/7] KVM: VMX: Handle NMI VM-Exits in noinstr section
 2023-08-24 14:26 UTC  (5+ messages)
` [PATCH 7/7] KVM: VMX: Handle NMI VM-Exits in noinstr region

[PATCH] KVM: s390: fix gisa destroy operation might lead to cpu stalls
 2023-08-24 10:09 UTC  (6+ messages)

[PATCH v2] vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE
 2023-08-24  9:37 UTC 

[PATCH v8 0/8] KVM: allow mapping non-refcounted pages
 2023-08-24  9:13 UTC  (10+ messages)
` [PATCH v8 1/8] KVM: Assert that a page's refcount is elevated when marking accessed/dirty
` [PATCH v8 2/8] KVM: mmu: Introduce __kvm_follow_pfn function
` [PATCH v8 3/8] KVM: mmu: Make __kvm_follow_pfn not imply FOLL_GET
` [PATCH v8 4/8] KVM: x86/mmu: Migrate to __kvm_follow_pfn
` [PATCH v8 5/8] KVM: x86/mmu: Don't pass FOLL_GET "
` [PATCH v8 6/8] KVM: arm64: Migrate "
` [PATCH v8 7/8] KVM: PPC: "
` [PATCH v8 8/8] KVM: mmu: remove __gfn_to_pfn_memslot

[RFC PATCH 0/3] x86/paravirt: Get rid of paravirt patching
 2023-08-24  9:01 UTC  (3+ messages)

[PATCH v5 00/12] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
 2023-08-24  8:50 UTC  (5+ messages)
` [PATCH v5 08/12] KVM: arm64: PMU: Allow userspace to limit PMCR_EL0.N for the guest

[PATCH v2 00/58] TDX QEMU support
 2023-08-24  8:34 UTC  (10+ messages)
` [PATCH v2 33/58] headers: Add definitions from UEFI spec for volumes, resources, etc
` [PATCH v2 42/58] i386/tdx: register the fd read callback with the main loop to read the quote data
` [PATCH v2 43/58] i386/tdx: setup a timer for the qio channel

[PATCH v5 02/45] kvm: mmu: dynamically allocate the x86-mmu shrinker
 2023-08-24  3:42 UTC 

[PATCH] vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE
 2023-08-24  3:23 UTC  (2+ messages)

[Patch v3] KVM: x86/pmu: Manipulate FIXED_CTR_CTRL MSR with macros
 2023-08-24  2:05 UTC 

[PATCH v2] KVM: x86: Add CONFIG_KVM_MAX_NR_VCPUS
 2023-08-23 21:56 UTC  (2+ messages)

[PATCH] KVM: x86: Allow exposure of VMware backdoor Pseudo-PMCs when !enable_pmu
 2023-08-23 20:35 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).