KVM Archive mirror
 help / color / mirror / Atom feed
 messages from 2024-01-25 03:28:35 to 2024-01-26 08:58:55 UTC [more...]

[RFC PATCH 00/41] KVM: x86/pmu: Introduce passthrough vPM
 2024-01-26  8:54 UTC  (40+ messages)
` [RFC PATCH 01/41] perf: x86/intel: Support PERF_PMU_CAP_VPMU_PASSTHROUGH
` [RFC PATCH 02/41] perf: Support guest enter/exit interfaces
` [RFC PATCH 03/41] perf: Set exclude_guest onto nmi_watchdog
` [RFC PATCH 04/41] perf: core/x86: Add support to register a new vector for PMI handling
` [RFC PATCH 05/41] KVM: x86/pmu: Register PMI handler for passthrough PMU
` [RFC PATCH 06/41] perf: x86: Add function to switch PMI handler
` [RFC PATCH 07/41] perf/x86: Add interface to reflect virtual LVTPC_MASK bit onto HW
` [RFC PATCH 08/41] KVM: x86/pmu: Add get virtual LVTPC_MASK bit function
` [RFC PATCH 09/41] perf: core/x86: Forbid PMI handler when guest own PMU
` [RFC PATCH 10/41] perf: core/x86: Plumb passthrough PMU capability from x86_pmu to x86_pmu_cap
` [RFC PATCH 11/41] KVM: x86/pmu: Introduce enable_passthrough_pmu module parameter and propage to KVM instance
` [RFC PATCH 12/41] KVM: x86/pmu: Plumb through passthrough PMU to vcpu for Intel CPUs
` [RFC PATCH 13/41] KVM: x86/pmu: Add a helper to check if passthrough PMU is enabled
` [RFC PATCH 14/41] KVM: x86/pmu: Allow RDPMC pass through
` [RFC PATCH 15/41] KVM: x86/pmu: Manage MSR interception for IA32_PERF_GLOBAL_CTRL
` [RFC PATCH 16/41] KVM: x86/pmu: Create a function prototype to disable MSR interception
` [RFC PATCH 17/41] KVM: x86/pmu: Implement pmu function for Intel CPU "
` [RFC PATCH 18/41] KVM: x86/pmu: Intercept full-width GP counter MSRs by checking with perf capabilities
` [RFC PATCH 19/41] KVM: x86/pmu: Whitelist PMU MSRs for passthrough PMU
` [RFC PATCH 20/41] KVM: x86/pmu: Introduce PMU operation prototypes for save/restore PMU context
` [RFC PATCH 21/41] KVM: x86/pmu: Introduce function prototype for Intel CPU to "
` [RFC PATCH 22/41] x86: Introduce MSR_CORE_PERF_GLOBAL_STATUS_SET for passthrough PMU
` [RFC PATCH 23/41] KVM: x86/pmu: Implement the save/restore of PMU state for Intel CPU
` [RFC PATCH 24/41] KVM: x86/pmu: Zero out unexposed Counters/Selectors to avoid information leakage
` [RFC PATCH 25/41] KVM: x86/pmu: Introduce macro PMU_CAP_PERF_METRICS
` [RFC PATCH 26/41] KVM: x86/pmu: Add host_perf_cap field in kvm_caps to record host PMU capability
` [RFC PATCH 27/41] KVM: x86/pmu: Clear PERF_METRICS MSR for guest
` [RFC PATCH 28/41] KVM: x86/pmu: Switch IA32_PERF_GLOBAL_CTRL at VM boundary
` [RFC PATCH 29/41] KVM: x86/pmu: Exclude existing vLBR logic from the passthrough PMU
` [RFC PATCH 30/41] KVM: x86/pmu: Switch PMI handler at KVM context switch boundary
` [RFC PATCH 31/41] KVM: x86/pmu: Call perf_guest_enter() at PMU context switch
` [RFC PATCH 32/41] KVM: x86/pmu: Add support for PMU context switch at VM-exit/enter
` [RFC PATCH 33/41] KVM: x86/pmu: Make check_pmu_event_filter() an exported function
` [RFC PATCH 34/41] KVM: x86/pmu: Intercept EVENT_SELECT MSR
` [RFC PATCH 35/41] KVM: x86/pmu: Allow writing to event selector for GP counters if event is allowed
` [RFC PATCH 36/41] KVM: x86/pmu: Intercept FIXED_CTR_CTRL MSR
` [RFC PATCH 37/41] KVM: x86/pmu: Allow writing to fixed counter selector if counter is exposed
` [RFC PATCH 38/41] KVM: x86/pmu: Introduce PMU helper to increment counter
` [RFC PATCH 39/41] KVM: x86/pmu: Implement emulated counter increment for passthrough PMU

[PATCH v9 00/27] Enable CET Virtualization
 2024-01-26  8:53 UTC  (24+ messages)
` [PATCH v9 09/27] KVM: x86: Rename kvm_{g,s}et_msr() to menifest emulation operations
` [PATCH v9 10/27] KVM: x86: Refine xsave-managed guest register/MSR reset handling
` [PATCH v9 12/27] KVM: x86: Report XSS as to-be-saved if there are supported features
` [PATCH v9 13/27] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
` [PATCH v9 14/27] KVM: x86: Initialize kvm_caps.supported_xss
` [PATCH v9 21/27] KVM: x86: Save and reload SSP to/from SMRAM
` [PATCH v9 22/27] KVM: VMX: Set up interception for CET MSRs
` [PATCH v9 23/27] KVM: VMX: Set host constant supervisor states to VMCS fields
` [PATCH v9 24/27] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
` [PATCH v9 25/27] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
` [PATCH v9 27/27] KVM: x86: Stop emulating for CET protected branch instructions

[PATCH 0/4] KVM: Async #PF fixes and cleanups
 2024-01-26  8:06 UTC  (9+ messages)
` [PATCH 1/4] KVM: Always flush async #PF workqueue when vCPU is being destroyed
` [PATCH 3/4] KVM: Get reference to VM's address space in the async #PF worker

[PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
 2024-01-26  7:58 UTC  (3+ messages)

[PATCH v10 00/16] iommu: Prepare to deliver page faults to user space
 2024-01-26  6:43 UTC  (15+ messages)
` [PATCH v10 01/16] iommu: Move iommu fault data to linux/iommu.h
` [PATCH v10 04/16] iommu: Cleanup iopf data structure definitions
` [PATCH v10 15/16] iommu: Make iopf_group_response() return void
` [PATCH v10 16/16] iommu: Make iommu_report_device_fault() reutrn void

[PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-26  4:11 UTC  (26+ messages)
` [PATCH v2 01/25] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v2 02/25] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH v2 03/25] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
` [PATCH v2 04/25] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v2 05/25] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
` [PATCH v2 06/25] x86/sev: Add RMP entry lookup helpers
` [PATCH v2 07/25] x86/fault: Add helper for dumping RMP entries
` [PATCH v2 08/25] x86/traps: Define RMP violation #PF error code
` [PATCH v2 09/25] x86/fault: Dump RMP table information when RMP page faults occur
` [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
` [PATCH v2 12/25] crypto: ccp: Define the SEV-SNP commands
` [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v2 14/25] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
` [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data "
` [PATCH v2 18/25] crypto: ccp: Handle legacy SEV commands "
` [PATCH v2 19/25] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
` [PATCH v2 20/25] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v2 22/25] x86/cpufeatures: Enable/unmask SEV-SNP CPU feature
` [PATCH v2 23/25] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v2 24/25] crypto: ccp: Add the SNP_COMMIT command
` [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command

[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-26  3:44 UTC  (27+ messages)
` [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
` [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command

[PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
 2024-01-26  3:37 UTC  (6+ messages)

[PATCH v12 00/20] KVM: xen: update shared_info and vcpu_info handling
 2024-01-26  1:19 UTC  (4+ messages)

[PATCH v7 00/16] Add Secure TSC support for SNP guests
 2024-01-26  1:00 UTC  (7+ messages)
` [PATCH v7 01/16] virt: sev-guest: Use AES GCM crypto library
` [PATCH v7 03/16] virt: sev-guest: Add SNP guest request structure

[PATCH net-next v1] vsock/test: print type for SOCK_SEQPACKET
 2024-01-26  0:50 UTC  (4+ messages)

[PATCH] virtio: uapi: Drop __packed attribute in linux/virtio_pci.h:
 2024-01-25 23:20 UTC  (5+ messages)
      ` [PATCH v2] virtio: uapi: Drop __packed attribute in linux/virtio_pci.h

[PATCH 0/3] add debugfs to hisilicon migration driver
 2024-01-25 22:38 UTC  (6+ messages)
` [PATCH 1/3] hisi_acc_vfio_pci: extract public functions for container_of
` [PATCH 2/3] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver
` [PATCH 3/3] Documentation: add debugfs description for hisi migration

[RFC PATCH v2 0/7] treewide: Use clocksource id for get_device_system_crosststamp()
 2024-01-25 20:13 UTC  (4+ messages)
` [RFC PATCH v2 2/7] x86/tsc: Add clocksource ID, set system_counterval_t.cs_id

[PATCH v4 00/66] QEMU Guest memfd + QEMU TDX support
 2024-01-25 18:45 UTC  (45+ messages)
` [PATCH v4 07/66] physmem: Introduce ram_block_discard_guest_memfd_range()
` [PATCH v4 25/66] i386/tdx: Add property sept-ve-disable for tdx-guest object
` [PATCH v4 26/66] i386/tdx: Make sept_ve_disable set by default
` [PATCH v4 27/66] i386/tdx: Wire CPU features up with attributes of TD guest
` [PATCH v4 28/66] i386/tdx: Validate TD attributes
` [PATCH v4 29/66] i386/tdx: Support user configurable mrconfigid/mrowner/mrownerconfig
` [PATCH v4 30/66] i386/tdx: Implement user specified tsc frequency
` [PATCH v4 31/66] i386/tdx: Set kvm_readonly_mem_enabled to false for TDX VM
` [PATCH v4 32/66] kvm/memory: Introduce the infrastructure to set the default shared/private value
` [PATCH v4 33/66] i386/tdx: Make memory type private by default
` [PATCH v4 34/66] kvm/tdx: Don't complain when converting vMMIO region to shared
` [PATCH v4 35/66] kvm/tdx: Ignore memory conversion to shared of unassigned region
` [PATCH v4 36/66] i386/tdvf: Introduce function to parse TDVF metadata
` [PATCH v4 37/66] i386/tdx: Parse TDVF metadata for TDX VM
` [PATCH v4 38/66] i386/tdx: Skip BIOS shadowing setup
` [PATCH v4 39/66] i386/tdx: Don't initialize pc.rom for TDX VMs
` [PATCH v4 40/66] i386/tdx: Track mem_ptr for each firmware entry of TDVF
` [PATCH v4 41/66] i386/tdx: Track RAM entries for TDX VM
` [PATCH v4 42/66] headers: Add definitions from UEFI spec for volumes, resources, etc
` [PATCH v4 43/66] i386/tdx: Setup the TD HOB list
` [PATCH v4 44/66] i386/tdx: Add TDVF memory via KVM_TDX_INIT_MEM_REGION
` [PATCH v4 45/66] memory: Introduce memory_region_init_ram_guest_memfd()
` [PATCH v4 46/66] i386/tdx: register TDVF as private memory
` [PATCH v4 47/66] i386/tdx: Call KVM_TDX_INIT_VCPU to initialize TDX vcpu
` [PATCH v4 48/66] i386/tdx: Finalize TDX VM
` [PATCH v4 49/66] i386/tdx: handle TDG.VP.VMCALL<SetupEventNotifyInterrupt>
` [PATCH v4 50/66] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
` [PATCH v4 51/66] i386/tdx: handle TDG.VP.VMCALL<MapGPA> hypercall
` [PATCH v4 52/66] i386/tdx: Handle TDG.VP.VMCALL<REPORT_FATAL_ERROR>
` [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
` [PATCH v4 54/66] pci-host/q35: Move PAM initialization above SMRAM initialization
` [PATCH v4 55/66] q35: Introduce smm_ranges property for q35-pci-host
` [PATCH v4 56/66] i386/tdx: Disable SMM for TDX VMs
` [PATCH v4 57/66] i386/tdx: Disable PIC "
` [PATCH v4 58/66] i386/tdx: Don't allow system reset "
` [PATCH v4 59/66] i386/tdx: LMCE is not supported for TDX
` [PATCH v4 60/66] hw/i386: add eoi_intercept_unsupported member to X86MachineState
` [PATCH v4 61/66] hw/i386: add option to forcibly report edge trigger in acpi tables
` [PATCH v4 62/66] i386/tdx: Don't synchronize guest tsc for TDs
` [PATCH v4 63/66] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() "
` [PATCH v4 64/66] i386/tdx: Skip kvm_put_apicbase() "
` [PATCH v4 65/66] i386/tdx: Don't get/put guest state for TDX VMs
` [PATCH v4 66/66] docs: Add TDX documentation

[PATCH 00/15] KVM: arm64: Improvements to GICv3 LPI injection
 2024-01-25 18:07 UTC  (18+ messages)
` [PATCH 04/15] KVM: arm64: vgic-its: Walk the LPI xarray in vgic_copy_lpi_list()
` [PATCH 05/15] KVM: arm64: vgic: Get rid of the LPI linked-list
` [PATCH 09/15] KVM: arm64: vgic: Ensure the irq refcount is nonzero when taking a ref
` [PATCH 11/15] KVM: arm64: vgic-its: Lazily allocate LPI translation cache
` [PATCH 12/15] KVM: arm64: vgic-its: Pick cache victim based on usage count

[PATCH 2/2] bulk: Prefer fast cpu_env() over slower CPU QOM cast macro
 2024-01-25 16:56 UTC 

[PATCH] vmbus: Print a warning when enabled without the recommended set of features
 2024-01-25 16:19 UTC 

[kvm-unit-tests PATCH] (arm|powerpc|s390x): Makefile: add `%.aux.o` target
 2024-01-25 15:30 UTC  (2+ messages)

[PATCH v2] Enable haltpoll for arm64
 2024-01-25 15:16 UTC  (3+ messages)

[PATCH net-next 2/2] tun: AF_XDP Rx zero-copy support
 2024-01-25 12:54 UTC  (6+ messages)

[PATCH v3 00/21] plugin updates (register access) for 9.0 (pre-PR?)
 2024-01-25 11:41 UTC  (7+ messages)
` [PATCH v3 01/21] hw/riscv: Use misa_mxl instead of misa_mxl_max
      `  "

[PATCH v11 00/43] KVM: arm64: Nested Virtualization support (FEAT_NV2 only)
 2024-01-25  8:58 UTC  (6+ messages)
` [PATCH v11 17/43] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures

[PATCH] KVM: PPC: code cleanup for kvmppc_book3s_irqprio_deliver
 2024-01-25  8:36 UTC  (3+ messages)

[PATCH v2] KVM: PPC: code cleanup for kvmppc_book3s_irqprio_deliver
 2024-01-25  8:33 UTC 

[PATCH 0/3] add debugfs to hisilicon migration driver
 2024-01-25  8:12 UTC  (5+ messages)
` [PATCH 1/3] hisi_acc_vfio_pci: extract public functions for container_of
` [PATCH 2/3] hisi_acc_vfio_pci: register debugfs for hisilicon migration driver
` [PATCH 3/3] Documentation: add debugfs description for hisi migration

[PATCH v18 000/121] KVM TDX basic feature support
 2024-01-25  7:56 UTC  (3+ messages)
` [PATCH v18 030/121] KVM: TDX: Do TDX specific vcpu initialization

[Bug 218419] New: kvm-unit-tests asyncpf is skipped with no reason
 2024-01-25  5:31 UTC  (2+ messages)
` [Bug 218419] "

Re: Re: [PATCH] KVM: x86: Check irqchip mode before create PIT
 2024-01-25  5:08 UTC  (2+ messages)
` [PATCH v2] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).