messages from 2022-10-28 11:16:35 to 2022-10-31 10:38:34 UTC [more...]
[PATCH 00/10] Connect VFIO to IOMMUFD
2022-10-31 10:38 UTC (10+ messages)
` [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
` [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
[PATCH v10 000/108] KVM TDX basic feature support
2022-10-31 9:22 UTC (111+ messages)
` [PATCH v10 001/108] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
` [PATCH v10 002/108] KVM: x86: Refactor KVM VMX module init/exit functions
` [PATCH v10 003/108] KVM: TDX: Add placeholders for TDX VM/vcpu structure
` [PATCH v10 004/108] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
` [PATCH v10 006/108] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
` [PATCH v10 007/108] KVM: TDX: Make TDX VM type supported
` [PATCH v10 008/108] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [PATCH v10 009/108] KVM: TDX: Define "
` [PATCH v10 010/108] KVM: TDX: Add TDX "architectural" error codes
` [PATCH v10 011/108] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v10 012/108] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v10 013/108] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
` [PATCH v10 014/108] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
` [PATCH v10 015/108] x86/cpu: Add helper functions to allocate/free TDX private host key id
` [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
` [PATCH v10 017/108] KVM: TDX: Refuse to unplug the last cpu on the package
` [PATCH v10 018/108] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v10 019/108] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [PATCH v10 020/108] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP
` [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v10 022/108] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v10 023/108] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [PATCH v10 024/108] KVM: TDX: allocate/free TDX vcpu structure
` [PATCH v10 025/108] KVM: TDX: Do TDX specific vcpu initialization
` [PATCH v10 026/108] KVM: TDX: Use private memory for TDX
` [PATCH v10 027/108] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [PATCH v10 028/108] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [PATCH v10 029/108] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
` [PATCH v10 030/108] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [PATCH v10 031/108] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
` [PATCH v10 032/108] KVM: x86/mmu: Make sync_page not use hard-coded 0 as the initial SPTE value
` [PATCH v10 033/108] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
` [PATCH v10 034/108] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
` [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
` [PATCH v10 036/108] KVM: TDX: Enable mmio spte caching always for TDX
` [PATCH v10 037/108] KVM: x86/mmu: Disallow fast page fault on private GPA
` [PATCH v10 038/108] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [PATCH v10 039/108] KVM: VMX: Introduce test mode related to EPT violation VE
` [PATCH v10 040/108] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [PATCH v10 041/108] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
` [PATCH v10 042/108] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v10 043/108] KVM: x86/mmu: Require TDP MMU for TDX
` [PATCH v10 044/108] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v10 045/108] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
` [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v10 048/108] KVM: x86/tdp_mmu: Make handle_changed_spte() return value
` [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v10 050/108] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v10 051/108] KVM: x86/mmu: Disallow dirty logging for x86 TDX
` [PATCH v10 052/108] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
` [PATCH v10 053/108] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v10 054/108] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v10 055/108] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
` [PATCH v10 057/108] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range
` [PATCH v10 058/108] KVM: TDX: TDP MMU TDX support
` [PATCH v10 059/108] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
` [PATCH v10 060/108] KVM: Add functions to set GFN to private or shared
` [PATCH v10 061/108] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
` [PATCH v10 063/108] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v10 064/108] KVM: TDX: Create initial guest memory
` [PATCH v10 065/108] KVM: TDX: Finalize VM initialization
` [PATCH v10 066/108] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v10 067/108] KVM: TDX: Add helper assembly function to TDX vcpu
` [PATCH v10 068/108] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v10 069/108] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v10 070/108] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v10 071/108] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v10 072/108] KVM: TDX: restore user ret MSRs
` [PATCH v10 073/108] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v10 074/108] KVM: TDX: complete interrupts after tdexit
` [PATCH v10 075/108] KVM: TDX: restore debug store when TD exit
` [PATCH v10 076/108] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v10 077/108] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v10 078/108] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v10 079/108] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v10 080/108] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v10 081/108] KVM: TDX: Implement interrupt injection
` [PATCH v10 082/108] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v10 083/108] KVM: TDX: Implement methods to inject NMI
` [PATCH v10 084/108] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v10 085/108] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v10 086/108] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v10 087/108] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v10 088/108] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v10 089/108] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v10 090/108] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v10 091/108] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v10 092/108] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v10 093/108] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v10 094/108] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v10 095/108] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v10 096/108] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v10 097/108] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v10 099/108] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v10 100/108] KVM: TDX: Handle TDX PV report fatal error hypercall
` [PATCH v10 101/108] KVM: TDX: Handle TDX PV map_gpa hypercall
` [PATCH v10 102/108] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v10 103/108] KVM: TDX: Silently discard SMI request
` [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v10 106/108] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v10 107/108] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v10 108/108] [MARKER] the end of (the first phase of) TDX KVM patch series
[PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
2022-10-31 9:18 UTC (4+ messages)
[PATCH v7 0/9] KVM: arm64: Enable ring-based dirty memory tracking
2022-10-31 9:18 UTC (12+ messages)
` [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
` [PATCH v7 2/9] KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
` [PATCH v7 3/9] KVM: Check KVM_CAP_DIRTY_LOG_{RING, RING_ACQ_REL} prior to enabling them
` [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
` [PATCH v7 5/9] KVM: arm64: Improve no-running-vcpu report for dirty ring
` [PATCH v7 6/9] KVM: arm64: Enable ring-based dirty memory tracking
` [PATCH v7 7/9] KVM: selftests: Use host page size to map ring buffer in dirty_log_test
` [PATCH v7 8/9] KVM: selftests: Clear dirty ring states between two modes "
` [PATCH v7 9/9] KVM: selftests: Automate choosing dirty ring size "
[PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
2022-10-31 9:08 UTC (13+ messages)
[PATCH v5 0/6] ASID support in vhost-vdpa net
2022-10-31 8:25 UTC (5+ messages)
` [PATCH v5 2/6] vdpa: Allocate SVQ unconditionally
` [PATCH v5 6/6] vdpa: Always start CVQ in SVQ mode
[PATCH kernel v2] swiotlb: Half the size if allocation failed
2022-10-31 8:13 UTC
[RESEND PATCH v2] kvm: x86: Keep the lock order consistent
2022-10-31 7:20 UTC
[PATCH 4.14 00/34] Retbleed & PBRSB Mitigations
2022-10-31 7:00 UTC (2+ messages)
[PATCH 0/9] Linear Address Masking (LAM) KVM Enabling
2022-10-31 2:59 UTC (3+ messages)
` [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
[PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
2022-10-30 8:23 UTC (10+ messages)
` [PATCH RESEND v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
` [PATCH RESEND v4 23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM
[PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
2022-10-30 8:05 UTC (3+ messages)
[PATCH 00/15] Introduce Architectural LBR for vPMU
2022-10-30 6:06 UTC (5+ messages)
[PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
2022-10-29 7:25 UTC (2+ messages)
[PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
2022-10-29 7:19 UTC (2+ messages)
[PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
2022-10-29 3:43 UTC (4+ messages)
[PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
2022-10-29 0:34 UTC (7+ messages)
[PATCH v2 0/8] KVM: selftests: Fix and clean up emulator_error_test
2022-10-28 23:59 UTC (7+ messages)
` [PATCH v2 3/8] KVM: selftests: Delete dead ucall code
` [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
[PATCH v3 00/15] IOMMUFD Generic interface
2022-10-28 23:57 UTC (7+ messages)
` [PATCH v3 04/15] iommufd: Overview documentation
` [PATCH v3 09/15] iommufd: Data structure to provide IOVA to PFN mapping
` [PATCH v3 9/15] "
[RFC PATCH 0/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
2022-10-28 23:07 UTC (8+ messages)
` [PATCH 1/7] KVM: VMX: remove regs argument of __vmx_vcpu_run
` [PATCH 2/7] KVM: VMX: more cleanups to __vmx_vcpu_run
` [PATCH 3/7] KVM: SVM: extract VMCB accessors to a new file
` [PATCH 4/7] KVM: SVM: replace argument of __svm_vcpu_run with vcpu_svm
` [PATCH 5/7] KVM: SVM: adjust register allocation for __svm_vcpu_run
` [PATCH 6/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
` [PATCH 7/7] x86, KVM: remove unnecessary argument to x86_virt_spec_ctrl and callers
[PATCH 04/10] KVM: x86: do not go through ctxt->ops when emulating rsm
2022-10-28 21:46 UTC (2+ messages)
[PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
2022-10-28 21:42 UTC (6+ messages)
[PATCH v8 0/4] KVM: selftests: randomize memory access of dirty_log_perf_test
2022-10-28 20:49 UTC (3+ messages)
` [PATCH v8 2/4] KVM: selftests: create -r argument to specify random seed
[PATCH v1 0/7] vfio-ccw parent rework
2022-10-28 19:18 UTC (9+ messages)
` [PATCH v1 1/7] vfio/ccw: create a parent struct
` [PATCH v1 2/7] vfio/ccw: remove private->sch
` [PATCH v1 3/7] vfio/ccw: move private initialization to callback
[PATCH v2 00/15] KVM: arm64: Parallel stage-2 fault handling
2022-10-28 18:53 UTC (5+ messages)
` [PATCH v2 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
[PATCH v6 0/5] dirty_log_perf_test vCPU pinning
2022-10-28 17:37 UTC (9+ messages)
` [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
[PATCH v3 00/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
2022-10-28 16:31 UTC (5+ messages)
` [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
KVM call for agenda for 2022-11-01
2022-10-28 16:21 UTC
[PATCH v1 00/18] KVM selftests code consolidation and cleanup
2022-10-28 15:49 UTC (8+ messages)
[kvm-unit-tests PATCH v4 0/4] arm: pmu: Fixes for bare metal
2022-10-28 15:31 UTC (4+ messages)
[PATCH v6 00/21] TDX host kernel support
2022-10-28 14:16 UTC (4+ messages)
` [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
[kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
2022-10-28 12:54 UTC (5+ messages)
[PATCH v2 00/14] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
2022-10-28 10:54 UTC (5+ messages)
` [PATCH v2 10/14] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
` [PATCH v2 12/14] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
` [PATCH v2 13/14] KVM: arm64: PMU: Implement PMUv3p5 long counter support
` [PATCH v2 14/14] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).