kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-01-25 13:43:39 to 2024-01-26 21:16:22 UTC [more...]

[PATCH v7 00/16] Add Secure TSC support for SNP guests
 2024-01-26 21:16 UTC  (5+ messages)
` [PATCH v7 03/16] virt: sev-guest: Add SNP guest request structure

[PATCH 2/2] bulk: Prefer fast cpu_env() over slower CPU QOM cast macro
 2024-01-26 21:11 UTC  (3+ messages)

[PATCH] KVM: VMX: Correct *intr_info content and *info2 for EPT_VIOLATION in get_exit_info()
 2024-01-26 20:45 UTC  (2+ messages)

[PATCH v2] KVM: selftests: Fix dirty_log_page_splitting_test as page migration
 2024-01-26 20:39 UTC  (2+ messages)

[PATCH v6 0/4] VM: selftests: Add LoongArch support
 2024-01-26 20:32 UTC  (4+ messages)
` [PATCH v6 4/4] KVM: selftests: Add test cases for LoongArch

[PATCH v2] KVM: selftests: Fix the dirty_log_test semaphore imbalance
 2024-01-26 20:25 UTC  (2+ messages)

[PATCH 32/82] vringh: Refactor intentional wrap-around calculation
 2024-01-26 19:42 UTC  (3+ messages)

[PATCH 0/2] minor fix on perf_capabilities in KVM/x86
 2024-01-26 19:34 UTC  (11+ messages)
` [PATCH 1/2] KVM: x86/pmu: Reset perf_capabilities in vcpu to 0 if PDCM is disabled

[PATCH v2 0/7] Use TAP in some more x86 KVM selftests
 2024-01-26 19:32 UTC  (3+ messages)
` [PATCH v2 7/7] KVM: selftests: x86: Use TAP interface in the userspace_msr_exit test

[PATCH v2] KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum
 2024-01-26 19:27 UTC  (2+ messages)

[PATCH] KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum
 2024-01-26 18:48 UTC  (3+ messages)

[PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-26 18:43 UTC  (30+ messages)
` [PATCH v2 01/25] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v2 02/25] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH v2 03/25] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
` [PATCH v2 04/25] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v2 05/25] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
` [PATCH v2 06/25] x86/sev: Add RMP entry lookup helpers
` [PATCH v2 07/25] x86/fault: Add helper for dumping RMP entries
` [PATCH v2 08/25] x86/traps: Define RMP violation #PF error code
` [PATCH v2 09/25] x86/fault: Dump RMP table information when RMP page faults occur
` [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
` [PATCH v2 12/25] crypto: ccp: Define the SEV-SNP commands
` [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v2 14/25] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
` [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data "
` [PATCH v2 18/25] crypto: ccp: Handle legacy SEV commands "
` [PATCH v2 19/25] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
` [PATCH v2 20/25] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v2 22/25] x86/cpufeatures: Enable/unmask SEV-SNP CPU feature
` [PATCH v2 23/25] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v2 24/25] crypto: ccp: Add the SNP_COMMIT command
` [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command

[PATCH, RESEND] x86/sev: Fix SEV check in sev_map_percpu_data()
 2024-01-26 18:43 UTC  (2+ messages)

[PATCH vfio] vfio/pds: Rework and simplify reset flows
 2024-01-26 18:32 UTC 

[PATCH 0/2] accel/kvm: Sanitize KVM_HAVE_MCE_INJECTION definition
 2024-01-26 18:16 UTC  (2+ messages)

Re: [PATCH] KVM: x86: Check irqchip mode before create PIT
 2024-01-26 18:12 UTC  (6+ messages)
`  "
    ` [PATCH v2] "

[PATCH] LoongArch: KVM: Fix build due to API changes
 2024-01-26 18:01 UTC  (2+ messages)

[GIT PULL] KVM/riscv changes for 6.8 part #2
 2024-01-26 17:59 UTC  (2+ messages)

[GIT PULL 0/2] KVM: s390: Fixes for 6.8
 2024-01-26 17:57 UTC  (2+ messages)

[PATCH 0/4] KVM: Async #PF fixes and cleanups
 2024-01-26 17:19 UTC  (17+ messages)
` [PATCH 1/4] KVM: Always flush async #PF workqueue when vCPU is being destroyed
` [PATCH 2/4] KVM: Put mm immediately after async #PF worker completes remote gup()
` [PATCH 3/4] KVM: Get reference to VM's address space in the async #PF worker
` [PATCH 4/4] KVM: Nullify async #PF worker's "apf" pointer as soon as it might be freed

[PATCH] KVM: Fix LDR inconsistency warning caused by APIC_ID format error
 2024-01-26 16:55 UTC  (2+ messages)

[PATCH v4 00/66] QEMU Guest memfd + QEMU TDX support
 2024-01-26 14:58 UTC  (11+ messages)
` [PATCH v4 02/66] RAMBlock: Add support of KVM private guest memfd
` [PATCH v4 03/66] HostMem: Add mechanism to opt in kvm guest memfd via MachineState
` [PATCH v4 07/66] physmem: Introduce ram_block_discard_guest_memfd_range()
` [PATCH v4 33/66] i386/tdx: Make memory type private by default
` [PATCH v4 45/66] memory: Introduce memory_region_init_ram_guest_memfd()

[PATCH v10 00/16] iommu: Prepare to deliver page faults to user space
 2024-01-26 14:26 UTC  (17+ messages)
` [PATCH v10 01/16] iommu: Move iommu fault data to linux/iommu.h
` [PATCH v10 04/16] iommu: Cleanup iopf data structure definitions
` [PATCH v10 15/16] iommu: Make iopf_group_response() return void
` [PATCH v10 16/16] iommu: Make iommu_report_device_fault() reutrn void

[kvm-unit-tests PATCH v2 00/24] Introduce RISC-V
 2024-01-26 14:23 UTC  (25+ messages)
` [kvm-unit-tests PATCH v2 01/24] configure: Add ARCH_LIBDIR
` [kvm-unit-tests PATCH v2 02/24] riscv: Initial port, hello world
` [kvm-unit-tests PATCH v2 03/24] arm/arm64: Move cpumask.h to common lib
` [kvm-unit-tests PATCH v2 04/24] arm/arm64: Share cpu online, present and idle masks
` [kvm-unit-tests PATCH v2 05/24] riscv: Add DT parsing
` [kvm-unit-tests PATCH v2 06/24] riscv: Add initial SBI support
` [kvm-unit-tests PATCH v2 07/24] riscv: Add run script and unittests.cfg
` [kvm-unit-tests PATCH v2 08/24] riscv: Add riscv32 support
` [kvm-unit-tests PATCH v2 09/24] riscv: Add exception handling
` [kvm-unit-tests PATCH v2 10/24] riscv: Add backtrace support
` [kvm-unit-tests PATCH v2 11/24] arm/arm64: Generalize wfe/sev names in smp.c
` [kvm-unit-tests PATCH v2 12/24] arm/arm64: Remove spinlocks from on_cpu_async
` [kvm-unit-tests PATCH v2 13/24] arm/arm64: Share on_cpus
` [kvm-unit-tests PATCH v2 14/24] riscv: Compile with march
` [kvm-unit-tests PATCH v2 15/24] riscv: Add SMP support
` [kvm-unit-tests PATCH v2 16/24] arm/arm64: Share memregions
` [kvm-unit-tests PATCH v2 17/24] riscv: Populate memregions and switch to page allocator
` [kvm-unit-tests PATCH v2 18/24] riscv: Add MMU support
` [kvm-unit-tests PATCH v2 19/24] riscv: Enable the MMU in secondaries
` [kvm-unit-tests PATCH v2 20/24] riscv: Enable vmalloc
` [kvm-unit-tests PATCH v2 21/24] lib: Add strcasecmp and strncasecmp
` [kvm-unit-tests PATCH v2 22/24] riscv: Add isa string parsing
` [kvm-unit-tests PATCH v2 23/24] gitlab-ci: Add riscv64 tests
` [kvm-unit-tests PATCH v2 24/24] MAINTAINERS: Add riscv

[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-26 13:38 UTC  (34+ messages)
` [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
` [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
` [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command

[PATCH v9 00/27] Enable CET Virtualization
 2024-01-26 12:56 UTC  (26+ messages)
` [PATCH v9 10/27] KVM: x86: Refine xsave-managed guest register/MSR reset handling
` [PATCH v9 13/27] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
` [PATCH v9 14/27] KVM: x86: Initialize kvm_caps.supported_xss
` [PATCH v9 21/27] KVM: x86: Save and reload SSP to/from SMRAM
` [PATCH v9 22/27] KVM: VMX: Set up interception for CET MSRs
` [PATCH v9 23/27] KVM: VMX: Set host constant supervisor states to VMCS fields
` [PATCH v9 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
` [PATCH v9 25/27] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
` [PATCH v9 27/27] KVM: x86: Stop emulating for CET protected branch instructions

[PATCH v3 0/5] KVM: selftests: aarch64: Introduce pmu_event_filter_test
 2024-01-26 10:25 UTC  (2+ messages)

[PATCH v13 26/35] x86/fred: FRED entry/exit and dispatch code
 2024-01-26 10:05 UTC  (3+ messages)
` [PATCH v13A "

[PATCH 0/2] kvm: fix kmalloc bug in kvm_arch_prepare_memory_region on 5.10 stable kernel
 2024-01-26  9:40 UTC  (3+ messages)
` [PATCH 1/2] mm: vmalloc: introduce array allocation functions
` [PATCH 2/2] KVM: use __vcalloc for very large allocations

[RFC PATCH 00/41] KVM: x86/pmu: Introduce passthrough vPM
 2024-01-26  8:54 UTC  (42+ messages)
` [RFC PATCH 01/41] perf: x86/intel: Support PERF_PMU_CAP_VPMU_PASSTHROUGH
` [RFC PATCH 02/41] perf: Support guest enter/exit interfaces
` [RFC PATCH 03/41] perf: Set exclude_guest onto nmi_watchdog
` [RFC PATCH 04/41] perf: core/x86: Add support to register a new vector for PMI handling
` [RFC PATCH 05/41] KVM: x86/pmu: Register PMI handler for passthrough PMU
` [RFC PATCH 06/41] perf: x86: Add function to switch PMI handler
` [RFC PATCH 07/41] perf/x86: Add interface to reflect virtual LVTPC_MASK bit onto HW
` [RFC PATCH 08/41] KVM: x86/pmu: Add get virtual LVTPC_MASK bit function
` [RFC PATCH 09/41] perf: core/x86: Forbid PMI handler when guest own PMU
` [RFC PATCH 10/41] perf: core/x86: Plumb passthrough PMU capability from x86_pmu to x86_pmu_cap
` [RFC PATCH 11/41] KVM: x86/pmu: Introduce enable_passthrough_pmu module parameter and propage to KVM instance
` [RFC PATCH 12/41] KVM: x86/pmu: Plumb through passthrough PMU to vcpu for Intel CPUs
` [RFC PATCH 13/41] KVM: x86/pmu: Add a helper to check if passthrough PMU is enabled
` [RFC PATCH 14/41] KVM: x86/pmu: Allow RDPMC pass through
` [RFC PATCH 15/41] KVM: x86/pmu: Manage MSR interception for IA32_PERF_GLOBAL_CTRL
` [RFC PATCH 16/41] KVM: x86/pmu: Create a function prototype to disable MSR interception
` [RFC PATCH 17/41] KVM: x86/pmu: Implement pmu function for Intel CPU "
` [RFC PATCH 18/41] KVM: x86/pmu: Intercept full-width GP counter MSRs by checking with perf capabilities
` [RFC PATCH 19/41] KVM: x86/pmu: Whitelist PMU MSRs for passthrough PMU
` [RFC PATCH 20/41] KVM: x86/pmu: Introduce PMU operation prototypes for save/restore PMU context
` [RFC PATCH 21/41] KVM: x86/pmu: Introduce function prototype for Intel CPU to "
` [RFC PATCH 22/41] x86: Introduce MSR_CORE_PERF_GLOBAL_STATUS_SET for passthrough PMU
` [RFC PATCH 23/41] KVM: x86/pmu: Implement the save/restore of PMU state for Intel CPU
` [RFC PATCH 24/41] KVM: x86/pmu: Zero out unexposed Counters/Selectors to avoid information leakage
` [RFC PATCH 25/41] KVM: x86/pmu: Introduce macro PMU_CAP_PERF_METRICS
` [RFC PATCH 26/41] KVM: x86/pmu: Add host_perf_cap field in kvm_caps to record host PMU capability
` [RFC PATCH 27/41] KVM: x86/pmu: Clear PERF_METRICS MSR for guest
` [RFC PATCH 28/41] KVM: x86/pmu: Switch IA32_PERF_GLOBAL_CTRL at VM boundary
` [RFC PATCH 29/41] KVM: x86/pmu: Exclude existing vLBR logic from the passthrough PMU
` [RFC PATCH 30/41] KVM: x86/pmu: Switch PMI handler at KVM context switch boundary
` [RFC PATCH 31/41] KVM: x86/pmu: Call perf_guest_enter() at PMU context switch
` [RFC PATCH 32/41] KVM: x86/pmu: Add support for PMU context switch at VM-exit/enter
` [RFC PATCH 33/41] KVM: x86/pmu: Make check_pmu_event_filter() an exported function
` [RFC PATCH 34/41] KVM: x86/pmu: Intercept EVENT_SELECT MSR
` [RFC PATCH 35/41] KVM: x86/pmu: Allow writing to event selector for GP counters if event is allowed
` [RFC PATCH 36/41] KVM: x86/pmu: Intercept FIXED_CTR_CTRL MSR
` [RFC PATCH 37/41] KVM: x86/pmu: Allow writing to fixed counter selector if counter is exposed
` [RFC PATCH 38/41] KVM: x86/pmu: Introduce PMU helper to increment counter
` [RFC PATCH 39/41] KVM: x86/pmu: Implement emulated counter increment for passthrough PMU
` [RFC PATCH 40/41] KVM: x86/pmu: Separate passthrough PMU logic in set/get_msr() from non-passthrough vPMU
` [RFC PATCH 41/41] KVM: nVMX: Add nested virtualization support for passthrough PMU

[PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
 2024-01-26  7:58 UTC  (3+ messages)

[PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
 2024-01-26  3:37 UTC  (6+ messages)

[PATCH v12 00/20] KVM: xen: update shared_info and vcpu_info handling
 2024-01-26  1:19 UTC  (4+ messages)

[PATCH net-next v1] vsock/test: print type for SOCK_SEQPACKET
 2024-01-26  0:50 UTC  (3+ messages)

[PATCH] virtio: uapi: Drop __packed attribute in linux/virtio_pci.h:
 2024-01-25 23:20 UTC  (5+ messages)
      ` [PATCH v2] virtio: uapi: Drop __packed attribute in linux/virtio_pci.h

[PATCH 0/3] add debugfs to hisilicon migration driver
 2024-01-25 22:38 UTC  (5+ messages)
` [PATCH 1/3] hisi_acc_vfio_pci: extract public functions for container_of
` [PATCH 2/3] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver

[RFC PATCH v2 0/7] treewide: Use clocksource id for get_device_system_crosststamp()
 2024-01-25 20:13 UTC  (4+ messages)
` [RFC PATCH v2 2/7] x86/tsc: Add clocksource ID, set system_counterval_t.cs_id

[PATCH 00/15] KVM: arm64: Improvements to GICv3 LPI injection
 2024-01-25 18:07 UTC  (10+ messages)
` [PATCH 11/15] KVM: arm64: vgic-its: Lazily allocate LPI translation cache
` [PATCH 12/15] KVM: arm64: vgic-its: Pick cache victim based on usage count

[PATCH] vmbus: Print a warning when enabled without the recommended set of features
 2024-01-25 16:19 UTC 

[kvm-unit-tests PATCH] (arm|powerpc|s390x): Makefile: add `%.aux.o` target
 2024-01-25 15:30 UTC  (2+ messages)

[PATCH v2] Enable haltpoll for arm64
 2024-01-25 15:16 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).