kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-01-26 04:46:49 to 2024-01-27 04:05:20 UTC [more...]

[PATCH v7 00/16] Add Secure TSC support for SNP guests
 2024-01-27  4:05 UTC  (11+ messages)
` [PATCH v7 01/16] virt: sev-guest: Use AES GCM crypto library
` [PATCH v7 03/16] virt: sev-guest: Add SNP guest request structure
` [PATCH v7 06/16] virt: sev-guest: Move SNP Guest command mutex

Stable bugfix backport request of "KVM: x86: smm: preserve interrupt shadow in SMRAM"?
 2024-01-27  2:08 UTC  (6+ messages)

[PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-26 23:54 UTC  (16+ messages)
` [PATCH v2 02/25] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH v2 03/25] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
` [PATCH v2 04/25] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v2 05/25] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
` [PATCH v2 06/25] x86/sev: Add RMP entry lookup helpers
` [PATCH v2 07/25] x86/fault: Add helper for dumping RMP entries
` [PATCH v2 08/25] x86/traps: Define RMP violation #PF error code
` [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
` [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command

[PATCH 00/15] Coalesced Interrupt Delivery with posted MSI
 2024-01-26 23:42 UTC  (16+ messages)
` [PATCH 01/15] x86/irq: Move posted interrupt descriptor out of vmx code
` [PATCH 02/15] x86/irq: Unionize PID.PIR for 64bit access w/o casting
` [PATCH 03/15] x86/irq: Use bitfields exclusively in posted interrupt descriptor
` [PATCH 04/15] x86/irq: Add a Kconfig option for posted MSI
` [PATCH 05/15] x86/irq: Reserve a per CPU IDT vector for posted MSIs
` [PATCH 06/15] x86/irq: Set up per host CPU posted interrupt descriptors
` [PATCH 07/15] x86/irq: Add accessors for "
` [PATCH 08/15] x86/irq: Factor out calling ISR from common_interrupt
` [PATCH 09/15] x86/irq: Install posted MSI notification handler
` [PATCH 10/15] x86/irq: Factor out common code for checking pending interrupts
` [PATCH 11/15] x86/irq: Extend checks for pending vectors to posted interrupts
` [PATCH 12/15] iommu/vt-d: Make posted MSI an opt-in cmdline option
` [PATCH 13/15] iommu/vt-d: Add an irq_chip for posted MSIs
` [PATCH 14/15] iommu/vt-d: Add a helper to retrieve PID address
` [PATCH 15/15] iommu/vt-d: Enable posted mode for device MSIs

[PATCH RFC 00/13] Coalesced Interrupt Delivery with posted MSI
 2024-01-26 23:32 UTC  (16+ messages)
` [PATCH RFC 07/13] x86/irq: Add helpers for checking Intel PID
` [PATCH RFC 09/13] x86/irq: Install posted MSI notification handler
` [PATCH RFC 11/13] iommu/vt-d: Add an irq_chip for posted MSIs
` [PATCH RFC 12/13] iommu/vt-d: Add a helper to retrieve PID address

[PATCH v2 00/23] hw,target: Prefer fast cpu_env() over slower CPU QOM cast macro
 2024-01-26 22:04 UTC  (24+ messages)
` [PATCH v2 01/23] hw/acpi/cpu: Use CPUState typedef
` [PATCH v2 02/23] scripts/coccinelle: Add cpu_env.cocci_template script
` [PATCH v2 03/23] bulk: Call in place single use cpu_env()
` [PATCH v2 04/23] target/alpha: Prefer fast cpu_env() over slower CPU QOM cast macro
` [PATCH v2 05/23] target/arm: "
` [PATCH v2 06/23] target/avr: "
` [PATCH v2 07/23] target/cris: "
` [PATCH v2 08/23] target/hppa: "
` [PATCH v2 09/23] target/i386/hvf: Use CPUState typedef
` [PATCH v2 10/23] target/i386: Prefer fast cpu_env() over slower CPU QOM cast macro
` [PATCH v2 11/23] target/m68k: "
` [PATCH v2 12/23] target/microblaze: "
` [PATCH v2 13/23] target/mips: "
` [PATCH v2 14/23] target/nios2: "
` [PATCH v2 15/23] target/openrisc: "
` [PATCH v2 16/23] target/ppc: "
` [PATCH v2 17/23] target/riscv: "
` [PATCH v2 18/23] target/rx: "
` [PATCH v2 19/23] target/s390x: "
` [PATCH v2 20/23] target/sh4: "
` [PATCH v2 21/23] target/tricore: "
` [PATCH v2 22/23] target/xtensa: "
` [PATCH v2 23/23] target/sparc: "

[PATCH v6 0/6] Delay VERW
 2024-01-26 21:31 UTC  (3+ messages)
` [PATCH v6 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation

[RFC PATCH 0/8] Dynamic vcpu priority management in kvm
 2024-01-26 21:19 UTC  (9+ messages)

[PATCH 2/2] bulk: Prefer fast cpu_env() over slower CPU QOM cast macro
 2024-01-26 21:11 UTC  (3+ messages)

[PATCH] KVM: VMX: Correct *intr_info content and *info2 for EPT_VIOLATION in get_exit_info()
 2024-01-26 20:45 UTC  (2+ messages)

[PATCH v2] KVM: selftests: Fix dirty_log_page_splitting_test as page migration
 2024-01-26 20:39 UTC  (2+ messages)

[PATCH v6 0/4] VM: selftests: Add LoongArch support
 2024-01-26 20:32 UTC  (4+ messages)
` [PATCH v6 4/4] KVM: selftests: Add test cases for LoongArch

[PATCH v2] KVM: selftests: Fix the dirty_log_test semaphore imbalance
 2024-01-26 20:25 UTC  (2+ messages)

[PATCH 32/82] vringh: Refactor intentional wrap-around calculation
 2024-01-26 19:42 UTC  (3+ messages)

[PATCH 0/2] minor fix on perf_capabilities in KVM/x86
 2024-01-26 19:34 UTC  (11+ messages)
` [PATCH 1/2] KVM: x86/pmu: Reset perf_capabilities in vcpu to 0 if PDCM is disabled

[PATCH v2 0/7] Use TAP in some more x86 KVM selftests
 2024-01-26 19:32 UTC  (3+ messages)
` [PATCH v2 7/7] KVM: selftests: x86: Use TAP interface in the userspace_msr_exit test

[PATCH v2] KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum
 2024-01-26 19:27 UTC  (2+ messages)

[PATCH] KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum
 2024-01-26 18:48 UTC  (3+ messages)

[PATCH, RESEND] x86/sev: Fix SEV check in sev_map_percpu_data()
 2024-01-26 18:43 UTC  (2+ messages)

[PATCH vfio] vfio/pds: Rework and simplify reset flows
 2024-01-26 18:32 UTC 

[PATCH 0/2] accel/kvm: Sanitize KVM_HAVE_MCE_INJECTION definition
 2024-01-26 18:16 UTC  (2+ messages)

Re: [PATCH] KVM: x86: Check irqchip mode before create PIT
 2024-01-26 18:12 UTC  (6+ messages)
`  "
    ` [PATCH v2] "

[PATCH] LoongArch: KVM: Fix build due to API changes
 2024-01-26 18:01 UTC  (2+ messages)

[GIT PULL] KVM/riscv changes for 6.8 part #2
 2024-01-26 17:59 UTC  (2+ messages)

[GIT PULL 0/2] KVM: s390: Fixes for 6.8
 2024-01-26 17:57 UTC  (2+ messages)

[PATCH 0/4] KVM: Async #PF fixes and cleanups
 2024-01-26 17:19 UTC  (17+ messages)
` [PATCH 1/4] KVM: Always flush async #PF workqueue when vCPU is being destroyed
` [PATCH 2/4] KVM: Put mm immediately after async #PF worker completes remote gup()
` [PATCH 3/4] KVM: Get reference to VM's address space in the async #PF worker
` [PATCH 4/4] KVM: Nullify async #PF worker's "apf" pointer as soon as it might be freed

[PATCH] KVM: Fix LDR inconsistency warning caused by APIC_ID format error
 2024-01-26 16:55 UTC  (2+ messages)

[PATCH v4 00/66] QEMU Guest memfd + QEMU TDX support
 2024-01-26 14:58 UTC  (9+ messages)
` [PATCH v4 02/66] RAMBlock: Add support of KVM private guest memfd
` [PATCH v4 03/66] HostMem: Add mechanism to opt in kvm guest memfd via MachineState
` [PATCH v4 33/66] i386/tdx: Make memory type private by default
` [PATCH v4 45/66] memory: Introduce memory_region_init_ram_guest_memfd()

[PATCH v10 00/16] iommu: Prepare to deliver page faults to user space
 2024-01-26 14:26 UTC  (13+ messages)
` [PATCH v10 01/16] iommu: Move iommu fault data to linux/iommu.h
` [PATCH v10 15/16] iommu: Make iopf_group_response() return void
` [PATCH v10 16/16] iommu: Make iommu_report_device_fault() reutrn void

[kvm-unit-tests PATCH v2 00/24] Introduce RISC-V
 2024-01-26 14:23 UTC  (25+ messages)
` [kvm-unit-tests PATCH v2 01/24] configure: Add ARCH_LIBDIR
` [kvm-unit-tests PATCH v2 02/24] riscv: Initial port, hello world
` [kvm-unit-tests PATCH v2 03/24] arm/arm64: Move cpumask.h to common lib
` [kvm-unit-tests PATCH v2 04/24] arm/arm64: Share cpu online, present and idle masks
` [kvm-unit-tests PATCH v2 05/24] riscv: Add DT parsing
` [kvm-unit-tests PATCH v2 06/24] riscv: Add initial SBI support
` [kvm-unit-tests PATCH v2 07/24] riscv: Add run script and unittests.cfg
` [kvm-unit-tests PATCH v2 08/24] riscv: Add riscv32 support
` [kvm-unit-tests PATCH v2 09/24] riscv: Add exception handling
` [kvm-unit-tests PATCH v2 10/24] riscv: Add backtrace support
` [kvm-unit-tests PATCH v2 11/24] arm/arm64: Generalize wfe/sev names in smp.c
` [kvm-unit-tests PATCH v2 12/24] arm/arm64: Remove spinlocks from on_cpu_async
` [kvm-unit-tests PATCH v2 13/24] arm/arm64: Share on_cpus
` [kvm-unit-tests PATCH v2 14/24] riscv: Compile with march
` [kvm-unit-tests PATCH v2 15/24] riscv: Add SMP support
` [kvm-unit-tests PATCH v2 16/24] arm/arm64: Share memregions
` [kvm-unit-tests PATCH v2 17/24] riscv: Populate memregions and switch to page allocator
` [kvm-unit-tests PATCH v2 18/24] riscv: Add MMU support
` [kvm-unit-tests PATCH v2 19/24] riscv: Enable the MMU in secondaries
` [kvm-unit-tests PATCH v2 20/24] riscv: Enable vmalloc
` [kvm-unit-tests PATCH v2 21/24] lib: Add strcasecmp and strncasecmp
` [kvm-unit-tests PATCH v2 22/24] riscv: Add isa string parsing
` [kvm-unit-tests PATCH v2 23/24] gitlab-ci: Add riscv64 tests
` [kvm-unit-tests PATCH v2 24/24] MAINTAINERS: Add riscv

[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-26 13:38 UTC  (10+ messages)
` [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
` [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command

[PATCH v9 00/27] Enable CET Virtualization
 2024-01-26 12:56 UTC  (24+ messages)
` [PATCH v9 10/27] KVM: x86: Refine xsave-managed guest register/MSR reset handling
` [PATCH v9 13/27] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
` [PATCH v9 21/27] KVM: x86: Save and reload SSP to/from SMRAM
` [PATCH v9 22/27] KVM: VMX: Set up interception for CET MSRs
` [PATCH v9 23/27] KVM: VMX: Set host constant supervisor states to VMCS fields
` [PATCH v9 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
` [PATCH v9 25/27] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
` [PATCH v9 27/27] KVM: x86: Stop emulating for CET protected branch instructions

[PATCH v3 0/5] KVM: selftests: aarch64: Introduce pmu_event_filter_test
 2024-01-26 10:25 UTC  (2+ messages)

[PATCH v13 26/35] x86/fred: FRED entry/exit and dispatch code
 2024-01-26 10:05 UTC  (3+ messages)
` [PATCH v13A "

[PATCH 0/2] kvm: fix kmalloc bug in kvm_arch_prepare_memory_region on 5.10 stable kernel
 2024-01-26  9:40 UTC  (3+ messages)
` [PATCH 1/2] mm: vmalloc: introduce array allocation functions
` [PATCH 2/2] KVM: use __vcalloc for very large allocations

[RFC PATCH 00/41] KVM: x86/pmu: Introduce passthrough vPM
 2024-01-26  8:54 UTC  (42+ messages)
` [RFC PATCH 01/41] perf: x86/intel: Support PERF_PMU_CAP_VPMU_PASSTHROUGH
` [RFC PATCH 02/41] perf: Support guest enter/exit interfaces
` [RFC PATCH 03/41] perf: Set exclude_guest onto nmi_watchdog
` [RFC PATCH 04/41] perf: core/x86: Add support to register a new vector for PMI handling
` [RFC PATCH 05/41] KVM: x86/pmu: Register PMI handler for passthrough PMU
` [RFC PATCH 06/41] perf: x86: Add function to switch PMI handler
` [RFC PATCH 07/41] perf/x86: Add interface to reflect virtual LVTPC_MASK bit onto HW
` [RFC PATCH 08/41] KVM: x86/pmu: Add get virtual LVTPC_MASK bit function
` [RFC PATCH 09/41] perf: core/x86: Forbid PMI handler when guest own PMU
` [RFC PATCH 10/41] perf: core/x86: Plumb passthrough PMU capability from x86_pmu to x86_pmu_cap
` [RFC PATCH 11/41] KVM: x86/pmu: Introduce enable_passthrough_pmu module parameter and propage to KVM instance
` [RFC PATCH 12/41] KVM: x86/pmu: Plumb through passthrough PMU to vcpu for Intel CPUs
` [RFC PATCH 13/41] KVM: x86/pmu: Add a helper to check if passthrough PMU is enabled
` [RFC PATCH 14/41] KVM: x86/pmu: Allow RDPMC pass through
` [RFC PATCH 15/41] KVM: x86/pmu: Manage MSR interception for IA32_PERF_GLOBAL_CTRL
` [RFC PATCH 16/41] KVM: x86/pmu: Create a function prototype to disable MSR interception
` [RFC PATCH 17/41] KVM: x86/pmu: Implement pmu function for Intel CPU "
` [RFC PATCH 18/41] KVM: x86/pmu: Intercept full-width GP counter MSRs by checking with perf capabilities
` [RFC PATCH 19/41] KVM: x86/pmu: Whitelist PMU MSRs for passthrough PMU
` [RFC PATCH 20/41] KVM: x86/pmu: Introduce PMU operation prototypes for save/restore PMU context
` [RFC PATCH 21/41] KVM: x86/pmu: Introduce function prototype for Intel CPU to "
` [RFC PATCH 22/41] x86: Introduce MSR_CORE_PERF_GLOBAL_STATUS_SET for passthrough PMU
` [RFC PATCH 23/41] KVM: x86/pmu: Implement the save/restore of PMU state for Intel CPU
` [RFC PATCH 24/41] KVM: x86/pmu: Zero out unexposed Counters/Selectors to avoid information leakage
` [RFC PATCH 25/41] KVM: x86/pmu: Introduce macro PMU_CAP_PERF_METRICS
` [RFC PATCH 26/41] KVM: x86/pmu: Add host_perf_cap field in kvm_caps to record host PMU capability
` [RFC PATCH 27/41] KVM: x86/pmu: Clear PERF_METRICS MSR for guest
` [RFC PATCH 28/41] KVM: x86/pmu: Switch IA32_PERF_GLOBAL_CTRL at VM boundary
` [RFC PATCH 29/41] KVM: x86/pmu: Exclude existing vLBR logic from the passthrough PMU
` [RFC PATCH 30/41] KVM: x86/pmu: Switch PMI handler at KVM context switch boundary
` [RFC PATCH 31/41] KVM: x86/pmu: Call perf_guest_enter() at PMU context switch
` [RFC PATCH 32/41] KVM: x86/pmu: Add support for PMU context switch at VM-exit/enter
` [RFC PATCH 33/41] KVM: x86/pmu: Make check_pmu_event_filter() an exported function
` [RFC PATCH 34/41] KVM: x86/pmu: Intercept EVENT_SELECT MSR
` [RFC PATCH 35/41] KVM: x86/pmu: Allow writing to event selector for GP counters if event is allowed
` [RFC PATCH 36/41] KVM: x86/pmu: Intercept FIXED_CTR_CTRL MSR
` [RFC PATCH 37/41] KVM: x86/pmu: Allow writing to fixed counter selector if counter is exposed
` [RFC PATCH 38/41] KVM: x86/pmu: Introduce PMU helper to increment counter
` [RFC PATCH 39/41] KVM: x86/pmu: Implement emulated counter increment for passthrough PMU
` [RFC PATCH 40/41] KVM: x86/pmu: Separate passthrough PMU logic in set/get_msr() from non-passthrough vPMU
` [RFC PATCH 41/41] KVM: nVMX: Add nested virtualization support for passthrough PMU

[PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
 2024-01-26  7:58 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).