KVM Archive mirror
 help / color / mirror / Atom feed
 messages from 2022-10-26 23:17:05 to 2022-10-27 21:03:50 UTC [more...]

[PATCH 4.14 00/34] Retbleed & PBRSB Mitigations
 2022-10-27 20:55 UTC  (27+ messages)
` [PATCH 4.14 01/34] Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
  ` [PATCH 4.14 02/34] x86/cpufeature: Add facility to check for min microcode revisions
  ` [PATCH 4.14 03/34] x86/cpufeature: Fix various quality problems in the <asm/cpu_device_hd.h> header
  ` [PATCH 4.14 04/34] x86/devicetable: Move x86 specific macro out of generic code
` [PATCH 4.14 05/34] x86/cpu: Add consistent CPU match macros
  ` [PATCH 4.14 06/34] x86/cpu: Add a steppings field to struct x86_cpu_id
  ` [PATCH 4.14 07/34] x86/entry: Remove skip_r11rcx
  ` [PATCH 4.14 08/34] x86/cpufeatures: Move RETPOLINE flags to word 11
` [PATCH 4.14 09/34] x86/bugs: Report AMD retbleed vulnerability
  ` [PATCH 4.14 10/34] x86/bugs: Add AMD retbleed= boot parameter
  ` [PATCH 4.14 11/34] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
  ` [PATCH 4.14 12/34] x86/entry: Add kernel IBRS implementation
` [PATCH 4.14 13/34] x86/bugs: Optimize SPEC_CTRL MSR writes
  ` [PATCH 4.14 14/34] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
  ` [PATCH 4.14 15/34] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
  ` [PATCH 4.14 16/34] x86/bugs: Report Intel retbleed vulnerability
` [PATCH 4.14 17/34] entel_idle: Disable IBRS during long idle
  ` [PATCH 4.14 18/34] x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
  ` [PATCH 4.14 19/34] x86/speculation: Add LFENCE to RSB fill sequence
  ` [PATCH 4.14 20/34] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
` [PATCH 4.14 21/34] x86/speculation: Fix firmware entry SPEC_CTRL handling
  ` [PATCH 4.14 22/34] x86/speculation: Fix SPEC_CTRL write on SMT state change
  ` [PATCH 4.14 23/34] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
  ` [PATCH 4.14 24/34] x86/speculation: Remove x86_spec_ctrl_mask
` [PATCH 4.14 25/34] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
  ` [PATCH 4.14 26/34] KVM: VMX: Fix IBRS handling after vmexit

[PATCH v10 0/9] s390x: CPU Topology
 2022-10-27 20:42 UTC  (20+ messages)
` [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
` [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
` [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
` [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute

[PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
 2022-10-27 20:34 UTC  (4+ messages)
` [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
` [PATCH 2/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled

[PATCH v1 0/7] vfio-ccw parent rework
 2022-10-27 20:32 UTC  (3+ messages)
` [PATCH v1 1/7] vfio/ccw: create a parent struct

[PATCH V3 0/2] Fix security issue in SNP guest AES-GCM usage
 2022-10-27 20:30 UTC  (7+ messages)
` [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
` [PATCH V3 2/2] virt: sev: Allow for retrying SNP extended requests

[PATCH v6 0/5] dirty_log_perf_test vCPU pinning
 2022-10-27 20:23 UTC  (8+ messages)
` [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs

[PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
 2022-10-27 20:17 UTC  (3+ messages)

[PATCH v7 3/3] KVM: selftests: randomize page access order
 2022-10-27 19:44 UTC  (2+ messages)

[kvm-unit-tests PATCH 00/16] kvm-unit-tests: set of fixes and new tests
 2022-10-27 19:39 UTC  (27+ messages)
` [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
` [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
` [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
` [kvm-unit-tests PATCH 16/16] add IPI loss stress test

[PATCH v6 0/8] KVM: arm64: Enable ring-based dirty memory tracking
 2022-10-27 19:09 UTC  (14+ messages)
` [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap

[V4 0/8] KVM: selftests: Add simple SEV test
 2022-10-27 18:34 UTC  (12+ messages)
` [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests

[PATCH v1 00/18] KVM selftests code consolidation and cleanup
 2022-10-27 18:27 UTC  (24+ messages)
` [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
` [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
` [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
` [PATCH v1 09/18] KVM: selftests/steal_time: vcpu related "
` [PATCH v1 12/18] KVM: selftests/rseq_test: name the migration thread and some cleanup
` [PATCH v1 18/18] KVM: selftests/kvm_create_max_vcpus: check KVM_MAX_VCPUS

[PATCH 0/9] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
 2022-10-27 17:24 UTC  (12+ messages)
` [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
` [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation

[PATCH v3 00/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
 2022-10-27 17:22 UTC  (18+ messages)
` [PATCH 01/16] KVM: Initialize gfn_to_pfn_cache locks in dedicated helper
` [PATCH 02/16] KVM: Reject attempts to consume or refresh inactive gfn_to_pfn_cache
` [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
` [PATCH 04/16] KVM: Shorten gfn_to_pfn_cache function names
` [PATCH 05/16] KVM: x86: Remove unused argument in gpc_unmap_khva()
` [PATCH 06/16] KVM: Store immutable gfn_to_pfn_cache properties
` [PATCH 07/16] KVM: Store gfn_to_pfn_cache length at activation time
` [PATCH 08/16] KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_check()
` [PATCH 09/16] KVM: Clean up hva_to_pfn_retry()
` [PATCH 10/16] KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_refresh()
` [PATCH 11/16] KVM: Drop KVM's API to allow temprorarily unmapping gfn=>pfn cache
` [PATCH 12/16] KVM: Do not partially reinitialize gfn=>pfn cache during activation
` [PATCH 13/16] KVM: Drop @gpa from exported gfn=>pfn cache check() and refresh() helpers
` [PATCH 14/16] KVM: Skip unnecessary "unmap" if gpc is already valid during refresh
` [PATCH 15/16] KVM: selftests: Add tests in xen_shinfo_test to detect lock races
` [PATCH 16/16] KVM: selftests: Mark "guest_saw_irq" as volatile in xen_shinfo_test

[PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
 2022-10-27 17:06 UTC  (3+ messages)

[PATCH v2 00/16] KVM: x86: gfn_to_pfn_cache fixes and cleanups
 2022-10-27 16:56 UTC  (7+ messages)
` [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache

[PATCH v3 0/10] KVM: x86: allow compiling out SMM support
 2022-10-27 16:49 UTC  (11+ messages)
` [PATCH 01/10] KVM: x86: start moving SMM-related functions to new files
` [PATCH 02/10] KVM: x86: move SMM entry to a new file
` [PATCH 03/10] KVM: x86: move SMM exit "
` [PATCH 04/10] KVM: x86: do not go through ctxt->ops when emulating rsm
` [PATCH 05/10] KVM: allow compiling out SMM support
` [PATCH 06/10] KVM: x86: compile out vendor-specific code if SMM is disabled
` [PATCH 07/10] KVM: x86: remove SMRAM address space if SMM is not supported
` [PATCH 08/10] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
` [PATCH 09/10] KVM: zero output of KVM_GET_VCPU_EVENTS before filling in the struct
` [PATCH 10/10] KVM: x86: do not define SMM-related constants if SMM disabled

[PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
 2022-10-27 16:46 UTC  (2+ messages)

[PATCH v6 00/21] TDX host kernel support
 2022-10-27 15:31 UTC  (33+ messages)
` [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
` [PATCH v6 02/21] x86/virt/tdx: Detect TDX during kernel boot
` [PATCH v6 03/21] x86/virt/tdx: Disable TDX if X2APIC is not enabled
` [PATCH v6 04/21] x86/virt/tdx: Use all boot-time system memory as TDX memory
` [PATCH v6 05/21] x86/virt/tdx: Add skeleton to initialize TDX on demand
` [PATCH v6 06/21] x86/virt/tdx: Implement functions to make SEAMCALL
` [PATCH v6 07/21] x86/virt/tdx: Shut down TDX module in case of error
` [PATCH v6 08/21] x86/virt/tdx: Do TDX module global initialization
` [PATCH v6 09/21] x86/virt/tdx: Do logical-cpu scope TDX module initialization
` [PATCH v6 10/21] x86/virt/tdx: Get information about TDX module and TDX-capable memory
` [PATCH v6 11/21] x86/virt/tdx: Sanity check all TDX memory ranges are convertible memory
` [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v6 13/21] x86/virt/tdx: Create "
` [PATCH v6 14/21] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
` [PATCH v6 15/21] x86/virt/tdx: Set up reserved areas for all TDMRs
` [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID
` [PATCH v6 17/21] x86/virt/tdx: Configure TDX module with TDMRs and "
` [PATCH v6 18/21] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v6 19/21] x86/virt/tdx: Initialize all TDMRs
` [PATCH v6 20/21] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
` [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support

[PATCH V2] virt: Prevent IV reuse in SNP guest driver
 2022-10-27 15:06 UTC  (5+ messages)

[PATCH v3 00/15] IOMMUFD Generic interface
 2022-10-27 14:12 UTC  (8+ messages)
` [PATCH v3 09/15] iommufd: Data structure to provide IOVA to PFN mapping
  ` [PATCH v3 9/15] "
` [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
` [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility

[PATCH v5 00/25] KVM: arm64: Introduce pKVM hyp VM and vCPU state at EL2
 2022-10-27 13:13 UTC  (3+ messages)
` [PATCH v5 20/25] KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache

[PATCH 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
 2022-10-27 11:26 UTC  (7+ messages)
` [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
` [PATCH 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V

[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-10-27 10:31 UTC  (13+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
` [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE

[PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
 2022-10-27 10:29 UTC  (3+ messages)

[PATCH v3 0/2] arm: enable MTE for QEMU + kvm
 2022-10-27 10:26 UTC  (4+ messages)
` [PATCH v3 2/2] qtests/arm: add some mte tests

[PATCH] KVM: SVM: Name and check reserved fields with structs offset
 2022-10-27  9:47 UTC  (2+ messages)

[PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
 2022-10-27  9:22 UTC  (2+ messages)

[PATCH v2] KVM: x86: Do not return host topology information from KVM_GET_SUPPORTED_CPUID
 2022-10-27  9:20 UTC 

[PATCHv5 0/8] Virtual NMI feature
 2022-10-27  8:38 UTC  (9+ messages)
` [PATCHv5 1/8] x86/cpu: Add CPUID feature bit for VNMI
` [PATCHv5 2/8] KVM: SVM: Add VNMI bit definition
` [PATCHv5 3/8] KVM: SVM: Add VNMI support in get/set_nmi_mask
` [PATCHv5 4/8] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
` [PATCHv5 5/8] KVM: SVM: Add VNMI support in inject_nmi
` [PATCHv5 6/8] KVM: nSVM: implement nested VNMI
` [PATCHv5 7/8] KVM: nSVM: emulate VMEXIT_INVALID case for "
` [PATCHv5 8/8] KVM: SVM: Enable VNMI feature

[PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
 2022-10-27  8:18 UTC  (4+ messages)
` [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs

[PATCH kernel v2 0/3] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
 2022-10-27  7:39 UTC  (2+ messages)

[PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
 2022-10-27  7:38 UTC  (2+ messages)

[PATCH 0/6] x86: KVM: Expose CPUID to guest for new Intel platform instructions
 2022-10-27  2:27 UTC  (6+ messages)
` [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).