KVM Archive mirror
 help / color / mirror / Atom feed
 messages from 2022-09-30 10:19:28 to 2022-10-01 08:31:00 UTC [more...]

[PATCH v9 000/105] KVM TDX basic feature support
 2022-10-01  8:30 UTC  (97+ messages)
` [PATCH v9 004/105] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [PATCH v9 005/105] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
` [PATCH v9 006/105] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
` [PATCH v9 007/105] KVM: TDX: Make TDX VM type supported
` [PATCH v9 008/105] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [PATCH v9 011/105] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v9 012/105] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v9 018/105] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v9 019/105] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [PATCH v9 020/105] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v9 021/105] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v9 022/105] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [PATCH v9 023/105] KVM: TDX: allocate/free TDX vcpu structure
` [PATCH v9 024/105] KVM: TDX: Do TDX specific vcpu initialization
` [PATCH v9 025/105] KVM: TDX: Use private memory for TDX
` [PATCH v9 026/105] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [PATCH v9 027/105] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [PATCH v9 028/105] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
` [PATCH v9 029/105] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [PATCH v9 030/105] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
` [PATCH v9 031/105] KVM: x86/mmu: Make sync_page not use hard-coded 0 as the initial SPTE value
` [PATCH v9 032/105] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
` [PATCH v9 033/105] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
` [PATCH v9 034/105] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
` [PATCH v9 035/105] KVM: TDX: Enable mmio spte caching always for TDX
` [PATCH v9 036/105] KVM: x86/mmu: Disallow fast page fault on private GPA
` [PATCH v9 037/105] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [PATCH v9 038/105] KVM: VMX: Introduce test mode related to EPT violation VE
` [PATCH v9 039/105] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [PATCH v9 040/105] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
` [PATCH v9 041/105] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v9 042/105] KVM: x86/mmu: Require TDP MMU for TDX
` [PATCH v9 043/105] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v9 044/105] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v9 045/105] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v9 046/105] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v9 047/105] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v9 048/105] KVM: x86/mmu: Disallow dirty logging for x86 TDX
` [PATCH v9 049/105] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
` [PATCH v9 050/105] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v9 051/105] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v9 052/105] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v9 053/105] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
` [PATCH v9 054/105] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range
` [PATCH v9 055/105] KVM: TDX: TDP MMU TDX support
` [PATCH v9 056/105] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
` [PATCH v9 057/105] KVM: Add functions to set GFN to private or shared
` [PATCH v9 058/105] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v9 059/105] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
` [PATCH v9 060/105] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v9 061/105] KVM: TDX: Create initial guest memory
` [PATCH v9 062/105] KVM: TDX: Finalize VM initialization
` [PATCH v9 063/105] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v9 064/105] KVM: TDX: Add helper assembly function to TDX vcpu
` [PATCH v9 065/105] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v9 066/105] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v9 067/105] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v9 068/105] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v9 069/105] KVM: TDX: restore user ret MSRs
` [PATCH v9 070/105] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v9 071/105] KVM: TDX: complete interrupts after tdexit
` [PATCH v9 072/105] KVM: TDX: restore debug store when TD exit
` [PATCH v9 073/105] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v9 074/105] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v9 075/105] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v9 076/105] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v9 077/105] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v9 078/105] KVM: TDX: Implement interrupt injection
` [PATCH v9 079/105] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v9 080/105] KVM: TDX: Implement methods to inject NMI
` [PATCH v9 081/105] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v9 082/105] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v9 083/105] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v9 084/105] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v9 085/105] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v9 086/105] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v9 087/105] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v9 088/105] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v9 089/105] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v9 090/105] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v9 091/105] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v9 092/105] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v9 093/105] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v9 094/105] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v9 095/105] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v9 096/105] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v9 097/105] KVM: TDX: Handle TDX PV report fatal error hypercall
` [PATCH v9 098/105] KVM: TDX: Handle TDX PV map_gpa hypercall
` [PATCH v9 099/105] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v9 100/105] KVM: TDX: Silently discard SMI request
` [PATCH v9 101/105] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v9 102/105] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v9 103/105] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v9 104/105] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v9 105/105] [MARKER] the end of (the first phase of) TDX KVM patch series

[PATCH v1 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
 2022-10-01  5:03 UTC  (12+ messages)
` [PATCH v1 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
` [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
` [PATCH v1 3/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
` [PATCH v1 4/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
` [PATCH v1 5/9] KVM: s390: selftest: memop: Replace macros by functions
` [PATCH v1 6/9] KVM: s390: selftest: memop: Add bad address test
` [PATCH v1 7/9] KVM: s390: selftest: memop: Add cmpxchg tests
` [PATCH v1 8/9] KVM: s390: selftest: memop: Fix typo
` [PATCH v1 9/9] KVM: s390: selftest: memop: Fix wrong address being used in test

[kvm-unit-tests PATCH 0/9] x86/apic: Cleanups and new tests
 2022-10-01  1:13 UTC  (10+ messages)
` [kvm-unit-tests PATCH 1/9] x86/apic: Add test config to allow running apic tests against SVM's AVIC
` [kvm-unit-tests PATCH 2/9] x86/apic: Replaces spaces with tabs to fix indentation in apic.c
` [kvm-unit-tests PATCH 3/9] x86/apic: Add helpers to query current APIC state, e.g. xAPIC vs. x2APIC
` [kvm-unit-tests PATCH 4/9] x86/apic: Assert that vCPU0's APIC is enabled at the start of the test
` [kvm-unit-tests PATCH 5/9] x86/apic: Restore APIC to original state after every sub-test
` [kvm-unit-tests PATCH 6/9] x86/apic: Enable IRQs on vCPU0 for all tests
` [kvm-unit-tests PATCH 7/9] x86/apic: Run tests that modify APIC ID and/or APIC_BASE after other tests
` [kvm-unit-tests PATCH 8/9] x86/apic: Add test for logical mode IPI delivery (cluster and flat)
` [kvm-unit-tests PATCH 9/9] x86/apic: Add test to verify aliased xAPIC IDs both receive IPI

[PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
 2022-10-01  0:59 UTC  (33+ messages)
` [PATCH v4 01/32] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
` [PATCH v4 02/32] KVM: x86: Purge "highest ISR" cache when updating APICv state
` [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
` [PATCH v4 04/32] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
` [PATCH v4 05/32] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
` [PATCH v4 06/32] KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated
` [PATCH v4 07/32] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
` [PATCH v4 08/32] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
` [PATCH v4 09/32] KVM: x86: Handle APICv updates for APIC "mode" changes via request
` [PATCH v4 10/32] KVM: x86: Move APIC access page helper to common x86 code
` [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
` [PATCH v4 12/32] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean
` [PATCH v4 13/32] KVM: SVM: Compute dest based on sender's x2APIC status for AVIC kick
` [PATCH v4 14/32] KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast
` [PATCH v4 15/32] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
` [PATCH v4 16/32] KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch
` [PATCH v4 17/32] KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU
` [PATCH v4 18/32] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
` [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
` [PATCH v4 20/32] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
` [PATCH v4 21/32] KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
` [PATCH v4 22/32] KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
` [PATCH v4 23/32] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
` [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
` [PATCH v4 25/32] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
` [PATCH v4 26/32] KVM: SVM: Always update local APIC on writes to logical dest register
` [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
` [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
` [PATCH v4 29/32] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
` [PATCH v4 30/32] KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps
` [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
` [PATCH v4 32/32] KVM: x86: Track required APICv inhibits with variable, not callback

[PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
 2022-10-01  0:35 UTC  (8+ messages)
` [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H

[PATCH v5 0/7] KVM: x86: Apply NX mitigation more precisely
 2022-09-30 23:48 UTC  (8+ messages)
` [PATCH v5 1/7] KVM: x86/mmu: Tag disallowed NX huge pages even if they're not tracked
` [PATCH v5 2/7] KVM: x86/mmu: Rename NX huge pages fields/functions for consistency
` [PATCH v5 3/7] KVM: x86/mmu: Properly account NX huge page workaround for nonpaging MMUs
` [PATCH v5 4/7] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
` [PATCH v5 5/7] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
` [PATCH v5 6/7] KVM: x86/mmu: Add helper to convert SPTE value to its shadow page
` [PATCH v5 7/7] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()

[PATCH] KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid
 2022-09-30 23:40 UTC 

[PATCH] KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception
 2022-09-30 23:36 UTC 

[PATCH] KVM: VMX: Resume guest immediately when injecting #GP on ECREATE
 2022-09-30 23:31 UTC 

[kvm-unit-tests PATCH 0/3] nVMX: Fix VMREAD/VMWRITE #PF tests
 2022-09-30 23:24 UTC  (4+ messages)
` [kvm-unit-tests PATCH 1/3] x86: Handle all known exceptions with ASM_TRY()
` [kvm-unit-tests PATCH 2/3] nVMX: Use ASM_TRY() for VMREAD and VMWRITE page fault tests
` [kvm-unit-tests PATCH 3/3] nVMX: Dedup the bulk of the VMREAD/VMWRITE #PF tests

[PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
 2022-09-30 23:00 UTC 

[PATCH 0/2] Simplify some of the locking in vfio_group
 2022-09-30 21:31 UTC  (2+ messages)

simplify the mdev interface v8
 2022-09-30 21:31 UTC  (5+ messages)

[PATCH 0/4] Simplify the module and kconfig structure in vfio
 2022-09-30 19:55 UTC  (4+ messages)
` [PATCH 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko

Guest IA32_SPEC_CTRL on AMD hosts without X86_FEATURE_V_SPEC_CTRL
 2022-09-30 19:10 UTC  (8+ messages)

[GIT PULL] First batch of KVM changes for Linux 6.1
 2022-09-30 19:08 UTC 

[GIT PULL] Final set of (mostly selftests) KVM patches for Linux 6.0
 2022-09-30 19:08 UTC 

[GIT PULL] virtio: fixes
 2022-09-30 16:48 UTC  (2+ messages)

[PATCH v8 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-09-30 16:23 UTC  (11+ messages)
` [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd

[PATCH v3] hyperv: fix SynIC SINT assertion failure on guest reset
 2022-09-30 15:52 UTC 

[PATCH 0/4] Qemu SEV reduced-phys-bits fixes
 2022-09-30 15:14 UTC  (5+ messages)
` [PATCH 1/4] qapi, i386/sev: Change the reduced-phys-bits value from 5 to 1
` [PATCH 2/4] qemu-options.hx: Update the reduced-phys-bits documentation
` [PATCH 3/4] i386/sev: Update checks and information related to reduced-phys-bits
` [PATCH 4/4] i386/cpu: Update how the EBX register of CPUID 0x8000001F is set

[PATCH v14 0/6] KVM: s390: pv: implement lazy destroy for reboot
 2022-09-30 14:01 UTC  (7+ messages)
` [PATCH v14 1/6] KVM: s390: pv: asynchronous "
` [PATCH v14 2/6] KVM: s390: pv: api documentation for asynchronous destroy
` [PATCH v14 3/6] KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
` [PATCH v14 4/6] KVM: s390: pv: avoid export before import if possible
` [PATCH v14 5/6] KVM: s390: pv: support for Destroy fast UVC
` [PATCH v14 6/6] KVM: s390: pv: module parameter to fence asynchronous destroy

[KVM] 7055fb1131: WARNING:at_arch/x86/kvm/x86.c:#inject_pending_event[kvm]
 2022-09-30 13:35 UTC 

Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
 2022-09-30 11:52 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).