messages from 2023-08-23 20:35:57 to 2023-08-25 17:48:00 UTC [more...]
[RFC PATCH v11 00/29] KVM: guest_memfd() and per-page attributes
2023-08-25 17:47 UTC (2+ messages)
[RFC PATCH 0/3] vfio/ims: Back guest interrupts from Interrupt Message Store (IMS)
2023-08-25 17:14 UTC (10+ messages)
` [RFC PATCH 1/3] vfio/pci: Introduce library allocating "
` [RFC PATCH 2/3] vfio/ims: Support emulated interrupts
` [RFC PATCH 3/3] vfio/ims: Add helper that returns IMS index
[GIT PULL 00/22] KVM: s390: Changes for 6.6
2023-08-25 15:58 UTC (25+ messages)
` [GIT PULL 01/22] KVM: s390: interrupt: Fix single-stepping into interrupt handlers
` [GIT PULL 02/22] KVM: s390: interrupt: Fix single-stepping into program "
` [GIT PULL 03/22] KVM: s390: interrupt: Fix single-stepping kernel-emulated instructions
` [GIT PULL 04/22] KVM: s390: interrupt: Fix single-stepping userspace-emulated instructions
` [GIT PULL 05/22] KVM: s390: interrupt: Fix single-stepping keyless mode exits
` [GIT PULL 06/22] KVM: s390: selftests: Add selftest for single-stepping
` [GIT PULL 07/22] s390/vfio-ap: no need to check the 'E' and 'I' bits in APQSW after TAPQ
` [GIT PULL 08/22] s390/vfio-ap: clean up irq resources if possible
` [GIT PULL 09/22] s390/vfio-ap: wait for response code 05 to clear on queue reset
` [GIT PULL 10/22] s390/vfio-ap: allow deconfigured queue to be passed through to a guest
` [GIT PULL 11/22] s390/vfio-ap: remove upper limit on wait for queue reset to complete
` [GIT PULL 12/22] s390/vfio-ap: store entire AP queue status word with the queue object
` [GIT PULL 13/22] s390/vfio-ap: use work struct to verify queue reset
` [GIT PULL 14/22] s390/vfio-ap: handle queue state change in progress on reset
` [GIT PULL 15/22] s390/vfio-ap: check for TAPQ response codes 0x35 and 0x36
` [GIT PULL 16/22] s390/uv: export uv_pin_shared for direct usage
` [GIT PULL 17/22] KVM: s390: export kvm_s390_pv*_is_protected functions
` [GIT PULL 18/22] s390/vfio-ap: make sure nib is shared
` [GIT PULL 19/22] KVM: s390: pv: relax WARN_ONCE condition for destroy fast
` [GIT PULL 20/22] s390/uv: UV feature check utility
` [GIT PULL 21/22] KVM: s390: Add UV feature negotiation
` [GIT PULL 22/22] KVM: s390: pv: Allow AP-instructions for pv-guests
[PATCH v2 0/4] KVM: SVM: Fix unexpected #UD on INT3 in SEV guests
2023-08-25 14:32 UTC (7+ messages)
` [PATCH v2 1/4] KVM: SVM: Don't inject #UD if KVM attempts to skip SEV guest insn
` [PATCH v2 2/4] KVM: SVM: Require nrips support for SEV guests (and beyond)
` [PATCH v2 3/4] KVM: x86: Refactor can_emulate_instruction() return to be more expressive
` [PATCH v2 4/4] KVM: SVM: Treat all "skip" emulation for SEV guests as outright failures
Question about AMD SVM's virtual NMI support in Linux kernel mainline
2023-08-25 14:26 UTC (3+ messages)
[PATCH v10 0/9] Linear Address Masking (LAM) KVM Enabling
2023-08-25 14:18 UTC (6+ messages)
[PATCH 0/2] KVM: SVM: Fix SEV-ES intrahost migration
2023-08-25 13:56 UTC (7+ messages)
` [PATCH 1/2] KVM: SVM: Get source vCPUs from source VM for "
` [PATCH 2/2] KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL
[PATCH v2 00/16] virtio-mem: Expose device memory through multiple memslots
2023-08-25 13:21 UTC (17+ messages)
` [PATCH v2 01/16] vhost: Rework memslot filtering and fix "used_memslot" tracking
` [PATCH v2 02/16] vhost: Remove vhost_backend_can_merge() callback
` [PATCH v2 03/16] softmmu/physmem: Fixup qemu_ram_block_from_host() documentation
` [PATCH v2 04/16] kvm: Return number of free memslots
` [PATCH v2 05/16] vhost: "
` [PATCH v2 06/16] memory-device: Support memory devices with multiple memslots
` [PATCH v2 07/16] stubs: Rename qmp_memory_device.c to memory_device.c
` [PATCH v2 08/16] memory-device: Track required and actually used memslots in DeviceMemoryState
` [PATCH v2 09/16] memory-device,vhost: Support memory devices that dynamically consume memslots
` [PATCH v2 10/16] kvm: Add stub for kvm_get_max_memslots()
` [PATCH v2 11/16] vhost: Add vhost_get_max_memslots()
` [PATCH v2 12/16] memory-device,vhost: Support automatic decision on the number of memslots
` [PATCH v2 13/16] memory: Clarify mapping requirements for RamDiscardManager
` [PATCH v2 14/16] virtio-mem: Expose device memory via multiple memslots if enabled
` [PATCH v2 15/16] memory,vhost: Allow for marking memory device memory regions unmergeable
` [PATCH v2 16/16] virtio-mem: Mark memslot alias "
[CfP] Confidential Computing Microconference @ LPC 2023
2023-08-25 13:16 UTC (2+ messages)
[PATCH v8 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
2023-08-25 12:41 UTC
[PATCH v13 00/22] TDX host kernel support
2023-08-25 12:14 UTC (23+ messages)
` [PATCH v13 01/22] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v13 02/22] x86/tdx: Define TDX supported page sizes as macros
` [PATCH v13 03/22] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
` [PATCH v13 04/22] x86/cpu: Detect TDX partial write machine check erratum
` [PATCH v13 05/22] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
` [PATCH v13 06/22] x86/virt/tdx: Add SEAMCALL error printing for module initialization
` [PATCH v13 07/22] x86/virt/tdx: Add skeleton to enable TDX on demand
` [PATCH v13 08/22] x86/virt/tdx: Get information about TDX module and TDX-capable memory
` [PATCH v13 09/22] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
` [PATCH v13 10/22] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v13 11/22] x86/virt/tdx: Fill out "
` [PATCH v13 12/22] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v13 13/22] x86/virt/tdx: Designate reserved areas for all TDMRs
` [PATCH v13 14/22] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID
` [PATCH v13 15/22] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v13 16/22] x86/virt/tdx: Initialize all TDMRs
` [PATCH v13 17/22] x86/kexec: Flush cache of TDX private memory
` [PATCH v13 18/22] x86/virt/tdx: Keep TDMRs when module initialization is successful
` [PATCH v13 19/22] x86/virt/tdx: Improve readibility of module initialization error handling
` [PATCH v13 20/22] x86/kexec(): Reset TDX private memory on platforms with TDX erratum
` [PATCH v13 21/22] x86/mce: Improve error log of kernel space TDX #MC due to erratum
` [PATCH v13 22/22] Documentation/x86: Add documentation for TDX host support
[PATCH] i386/xen: Ignore VCPU_SSHOTTMR_future flag in set_singleshot_timer()
2023-08-25 10:02 UTC (2+ messages)
[RFC PATCH v2 0/8] KVM: arm64: Implement SW/HW combined dirty log
2023-08-25 9:35 UTC (9+ messages)
` [RFC PATCH v2 1/8] arm64: cpufeature: Add API to report system support of HWDBM
` [RFC PATCH v2 2/8] KVM: arm64: Add KVM_PGTABLE_WALK_HW_DBM for HW DBM support
` [RFC PATCH v2 3/8] KVM: arm64: Add some HW_DBM related pgtable interfaces
` [RFC PATCH v2 4/8] KVM: arm64: Set DBM for previously writeable pages
` [RFC PATCH v2 5/8] KVM: arm64: Add some HW_DBM related mmu interfaces
` [RFC PATCH v2 6/8] KVM: arm64: Only write protect selected PTE
` [RFC PATCH v2 7/8] KVM: arm64: Add KVM_CAP_ARM_HW_DBM
` [RFC PATCH v2 8/8] KVM: arm64: Start up SW/HW combined dirty log
[PATCH v4 00/10] iommu: Prepare to deliver page faults to user space
2023-08-25 8:17 UTC (19+ messages)
` [PATCH v4 01/10] iommu: Move iommu fault data to linux/iommu.h
` [PATCH v4 02/10] iommu/arm-smmu-v3: Remove unrecoverable faults reporting
` [PATCH v4 03/10] iommu: Remove unrecoverable fault data
` [PATCH v4 04/10] iommu: Cleanup iopf data structure definitions
` [PATCH v4 05/10] iommu: Merge iopf_device_param into iommu_fault_param
` [PATCH v4 06/10] iommu: Remove iommu_[un]register_device_fault_handler()
` [PATCH v4 07/10] iommu: Merge iommu_fault_event and iopf_fault
` [PATCH v4 08/10] iommu: Prepare for separating SVA and IOPF
` [PATCH v4 09/10] iommu: Make iommu_queue_iopf() more generic
` [PATCH v4 10/10] iommu: Separate SVA and IOPF
[RFC PATCH 0/4] treewide: Use clocksource id for get_device_system_crosststamp()
2023-08-25 4:18 UTC (2+ messages)
[RFC PATCH] KVM: x86: inhibit APICv upon detecting direct APIC access from L2
2023-08-25 3:58 UTC (5+ messages)
[PATCH] kvm: x86: emulate MSR_PLATFORM_INFO msr bits
2023-08-25 3:27 UTC (9+ messages)
[PATCH v2] KVM: s390: fix gisa destroy operation might lead to cpu stalls
2023-08-25 2:56 UTC (4+ messages)
[PATCH 0/2] KVM: Pre-check mmu_notifier retry on x86
2023-08-25 2:07 UTC (3+ messages)
` [PATCH 1/2] KVM: Allow calling mmu_invalidate_retry_hva() without holding mmu_lock
` [PATCH 2/2] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
[RFC v2] KVM: arm/arm64: optimize vSGI injection performance
2023-08-25 1:58 UTC
[PATCH] KVM: VMX: Refresh available regs and IDT vectoring info before NMI handling
2023-08-25 1:45 UTC
[PATCH v7 0/8] KVM: allow mapping non-refcounted pages
2023-08-25 1:38 UTC (9+ messages)
` [PATCH v7 4/8] KVM: x86/mmu: Migrate to __kvm_follow_pfn
` [PATCH v7 5/8] KVM: x86/mmu: Don't pass FOLL_GET "
[PATCH v2] KVM: selftests: Add tests - invalid inputs for KVM_CREATE_GUEST_MEMFD
2023-08-25 0:17 UTC
[PATCH v4 00/16] Improve scalability of KVM + userfaultfd live migration via annotated memory faults
2023-08-25 0:15 UTC (9+ messages)
` [PATCH v4 09/16] KVM: Introduce KVM_CAP_NOWAIT_ON_FAULT without implementation
Deadlock due to EPT_VIOLATION
2023-08-24 23:51 UTC (17+ messages)
[PATCH v3] x86/sev: Make enc_dec_hypercall() accept a size instead of npages
2023-08-24 22:48 UTC (2+ messages)
[PATCH v2] x86/sev: Make enc_dec_hypercall() accept a size instead of npages
2023-08-24 22:37 UTC (3+ messages)
[PATCH v3] KVM: x86: Add CONFIG_KVM_MAX_NR_VCPUS
2023-08-24 21:52 UTC
[kvm-unit-tests PATCH] x86:VMX: Fixup for VMX test failures
2023-08-24 20:47 UTC (7+ messages)
[PATCH] KVM: selftests: Add tests - invalid inputs for KVM_CREATE_GUEST_MEMFD
2023-08-24 19:02 UTC (2+ messages)
[kvm-unit-tests PATCH] arm64: microbench: Benchmark with virtual instead of physical timer
2023-08-24 18:46 UTC (4+ messages)
[PATCH v4 03/16] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
2023-08-24 17:24 UTC (13+ messages)
[PATCH 0/2] KVM: SVM: Fix unexpected #UD on INT3 in SEV guests
2023-08-24 16:08 UTC (8+ messages)
[RFC 0/5] crypto: qat - enable SRIOV VF live migration
2023-08-24 15:25 UTC (15+ messages)
` [RFC 2/5] crypto: qat - add interface for "
` [RFC 4/5] crypto: qat - implement "
` [RFC 5/5] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
[PATCH 0/7] KVM: VMX: Handle NMI VM-Exits in noinstr section
2023-08-24 14:26 UTC (5+ messages)
` [PATCH 7/7] KVM: VMX: Handle NMI VM-Exits in noinstr region
[PATCH] KVM: s390: fix gisa destroy operation might lead to cpu stalls
2023-08-24 10:09 UTC (6+ messages)
[PATCH v2] vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE
2023-08-24 9:37 UTC
[PATCH v8 0/8] KVM: allow mapping non-refcounted pages
2023-08-24 9:13 UTC (10+ messages)
` [PATCH v8 1/8] KVM: Assert that a page's refcount is elevated when marking accessed/dirty
` [PATCH v8 2/8] KVM: mmu: Introduce __kvm_follow_pfn function
` [PATCH v8 3/8] KVM: mmu: Make __kvm_follow_pfn not imply FOLL_GET
` [PATCH v8 4/8] KVM: x86/mmu: Migrate to __kvm_follow_pfn
` [PATCH v8 5/8] KVM: x86/mmu: Don't pass FOLL_GET "
` [PATCH v8 6/8] KVM: arm64: Migrate "
` [PATCH v8 7/8] KVM: PPC: "
` [PATCH v8 8/8] KVM: mmu: remove __gfn_to_pfn_memslot
[RFC PATCH 0/3] x86/paravirt: Get rid of paravirt patching
2023-08-24 9:01 UTC (3+ messages)
[PATCH v5 00/12] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
2023-08-24 8:50 UTC (5+ messages)
` [PATCH v5 08/12] KVM: arm64: PMU: Allow userspace to limit PMCR_EL0.N for the guest
[PATCH v2 00/58] TDX QEMU support
2023-08-24 8:34 UTC (10+ messages)
` [PATCH v2 33/58] headers: Add definitions from UEFI spec for volumes, resources, etc
` [PATCH v2 42/58] i386/tdx: register the fd read callback with the main loop to read the quote data
` [PATCH v2 43/58] i386/tdx: setup a timer for the qio channel
[PATCH v5 02/45] kvm: mmu: dynamically allocate the x86-mmu shrinker
2023-08-24 3:42 UTC
[PATCH] vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE
2023-08-24 3:23 UTC (2+ messages)
[Patch v3] KVM: x86/pmu: Manipulate FIXED_CTR_CTRL MSR with macros
2023-08-24 2:05 UTC
[PATCH v2] KVM: x86: Add CONFIG_KVM_MAX_NR_VCPUS
2023-08-23 21:56 UTC (2+ messages)
[PATCH] KVM: x86: Allow exposure of VMware backdoor Pseudo-PMCs when !enable_pmu
2023-08-23 20:35 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).