Linux KVM
[Prev Page][Next Page]
- [PATCH RFC v1 10/10] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR, (continued)
- [PATCH v4] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present,
Paul Durrant
- [PATCH] vhost-vdpa: call vhost_vdpa_cleanup during the release,
Stefano Garzarella
- [PATCH v3] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present,
Paul Durrant
- [PATCH] KVM: s390: drop unexpected word 'and' in the comments,
Jiang Jian
- [PATCH v3 0/3] Improve vfio-pci primary GPU assignment behavior,
Thomas Zimmermann
- [Bug 213781] KVM: x86/svm: The guest (#vcpu>1) can't boot up with QEMU "-overcommit cpu-pm=on",
bugzilla-daemon
- [PATCH v2 1/2] vfio/type1: Simplify bus_type determination,
Robin Murphy
- [PATCH v5 00/22] TDX host kernel support,
Kai Huang
- [PATCH v5 09/22] x86/virt/tdx: Detect TDX module by doing module global initialization,
Kai Huang
- [PATCH v5 05/22] x86/virt/tdx: Prevent hot-add driver managed memory,
Kai Huang
- [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug,
Kai Huang
- [PATCH v5 01/22] x86/virt/tdx: Detect TDX during kernel boot,
Kai Huang
- [PATCH v5 08/22] x86/virt/tdx: Shut down TDX module in case of error,
Kai Huang
- [PATCH v5 03/22] cc_platform: Add new attribute to prevent ACPI memory hotplug,
Kai Huang
- [PATCH v5 04/22] x86/virt/tdx: Prevent ACPI CPU hotplug and ACPI memory hotplug,
Kai Huang
- [PATCH v5 07/22] x86/virt/tdx: Implement SEAMCALL function,
Kai Huang
- [PATCH v5 06/22] x86/virt/tdx: Add skeleton to initialize TDX on demand,
Kai Huang
- [PATCH v5 19/22] x86/virt/tdx: Configure global KeyID on all packages,
Kai Huang
- [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory,
Kai Huang
- [PATCH v5 15/22] x86/virt/tdx: Allocate and set up PAMTs for TDMRs,
Kai Huang
- [PATCH v5 14/22] x86/virt/tdx: Create TDMRs to cover all memblock memory regions,
Kai Huang
- [PATCH v5 20/22] x86/virt/tdx: Initialize all TDMRs,
Kai Huang
- [PATCH v5 11/22] x86/virt/tdx: Get information about TDX module and TDX-capable memory,
Kai Huang
- [PATCH v5 16/22] x86/virt/tdx: Set up reserved areas for all TDMRs,
Kai Huang
- [PATCH v5 22/22] Documentation/x86: Add documentation for TDX host support,
Kai Huang
- [PATCH v5 21/22] x86/virt/tdx: Support kexec(),
Kai Huang
- [PATCH v5 13/22] x86/virt/tdx: Add placeholder to construct TDMRs based on memblock,
Kai Huang
- [PATCH v5 17/22] x86/virt/tdx: Reserve TDX module global KeyID,
Kai Huang
- [PATCH v5 10/22] x86/virt/tdx: Do logical-cpu scope TDX module initialization,
Kai Huang
- [PATCH v5 18/22] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID,
Kai Huang
- Re: [PATCH v5 00/22] TDX host kernel support,
Dave Hansen
- [PATCH v2] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present,
Paul Durrant
- [PATCH] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present,
Paul Durrant
- [PATCH v2 1/1] vfio: check vfio_register_iommu_driver() return value,
Bo Liu
- Re: WARNING in kvm_arch_vcpu_ioctl_run (3),
Tetsuo Handa
- [PATCH V3] virtio: disable notification hardening by default,
Jason Wang
- [RFC PATCH v4 0/7] KVM: x86: add per-vCPU exits disable capability,
Kechen Lu
- [linux-next:master] BUILD REGRESSION 34d1d36073ea4d4c532e8c8345627a9702be799e,
kernel test robot
- [PATCH MANUALSEL 5.17 1/3] KVM: x86: disable preemption while updating apicv inhibition,
Sasha Levin
- [PATCH MANUALSEL 5.18 1/3] KVM: x86: disable preemption while updating apicv inhibition,
Sasha Levin
- [PATCH 00/11] KVM: VMX: Support TscScaling and EnclsExitingBitmap whith eVMCS,
Vitaly Kuznetsov
- [PATCH 07/11] KVM: selftests: Switch to KVM_CAP_HYPERV_ENLIGHTENED_VMCS2,
Vitaly Kuznetsov
- [PATCH 06/11] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2,
Vitaly Kuznetsov
- [PATCH 10/11] KVM: selftests: Switch to updated eVMCSv1 definition,
Vitaly Kuznetsov
- [PATCH 02/11] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition,
Vitaly Kuznetsov
- [PATCH 11/11] KVM: selftests: Enable TSC scaling in evmcs selftest,
Vitaly Kuznetsov
- [PATCH 05/11] KVM: nVMX: Support several new fields in eVMCSv1,
Vitaly Kuznetsov
- [PATCH QEMU EXAMPLE] i386: Support Enlightened VMCS revisions,
Vitaly Kuznetsov
- [PATCH 03/11] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition,
Vitaly Kuznetsov
- [PATCH 08/11] KVM: VMX: Support TSC scaling with enlightened VMCS,
Vitaly Kuznetsov
- [PATCH 01/11] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags,
Vitaly Kuznetsov
- [PATCH 09/11] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields,
Vitaly Kuznetsov
- [PATCH 04/11] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields,
Vitaly Kuznetsov
- [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support,
Tony Krowiak
- [PATCH v20 01/20] s390/vfio-ap: use new AP bus interface to search for queue devices,
Tony Krowiak
- [PATCH v20 03/20] s390/vfio-ap: manage link between queue struct and matrix mdev,
Tony Krowiak
- [PATCH v20 05/20] s390/vfio-ap: refresh guest's APCB by filtering AP resources assigned to mdev,
Tony Krowiak
- [PATCH v20 07/20] s390/vfio-ap: rename matrix_dev->lock mutex to matrix_dev->mdevs_lock,
Tony Krowiak
- [PATCH v20 02/20] s390/vfio-ap: move probe and remove callbacks to vfio_ap_ops.c,
Tony Krowiak
- [PATCH v20 04/20] s390/vfio-ap: introduce shadow APCB,
Tony Krowiak
- [PATCH v20 09/20] s390/vfio-ap: use proper locking order when setting/clearing KVM pointer,
Tony Krowiak
- [PATCH v20 08/20] s390/vfio-ap: introduce new mutex to control access to the KVM pointer,
Tony Krowiak
- [PATCH v20 06/20] s390/vfio-ap: allow assignment of unavailable AP queues to mdev device,
Tony Krowiak
- [PATCH v20 11/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on queue probe/remove,
Tony Krowiak
- [PATCH v20 10/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on assign/unassign,
Tony Krowiak
- [PATCH v20 17/20] s390/vfio-ap: handle config changed and scan complete notification,
Tony Krowiak
- [PATCH v20 13/20] s390/vfio-ap: hot plug/unplug of AP devices when probed/removed,
Tony Krowiak
- [PATCH v20 12/20] s390/vfio-ap: allow hot plug/unplug of AP devices when assigned/unassigned,
Tony Krowiak
- [PATCH v20 16/20] s390/vfio-ap: sysfs attribute to display the guest's matrix,
Tony Krowiak
- [PATCH v20 14/20] s390/vfio-ap: reset queues after adapter/domain unassignment,
Tony Krowiak
- [PATCH v20 18/20] s390/vfio-ap: update docs to include dynamic config support,
Tony Krowiak
- [PATCH v20 20/20] MAINTAINERS: pick up all vfio_ap docs for VFIO AP maintainers,
Tony Krowiak
- [PATCH v20 15/20] s390/vfio-ap: implement in-use callback for vfio_ap driver,
Tony Krowiak
- [PATCH v20 19/20] s390/Docs: new doc describing lock usage by the vfio_ap device driver,
Tony Krowiak
- Re: [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support,
Christian Borntraeger
- [kvm-unit-tests PATCH] Add test for #SMI during interrupt window,
Maxim Levitsky
- [PATCH v2 00/11] SMM emulation and interrupt shadow fixes,
Maxim Levitsky
- [PATCH v2 04/11] KVM: x86: emulator: update the emulation mode after rsm,
Maxim Levitsky
- [PATCH v2 09/11] KVM: x86: emulator/smm: use smram struct for 64 bit smram load/restore,
Maxim Levitsky
- [PATCH v2 03/11] KVM: x86: emulator: remove assign_eip_near/far,
Maxim Levitsky
- [PATCH v2 02/11] KVM: x86: emulator: introduce update_emulation_mode,
Maxim Levitsky
- [PATCH v2 05/11] KVM: x86: emulator: update the emulation mode after CR0 write,
Maxim Levitsky
- [PATCH v2 06/11] KVM: x86: emulator/smm: number of GPRs in the SMRAM image depends on the image format,
Maxim Levitsky
- [PATCH v2 11/11] KVM: x86: emulator/smm: preserve interrupt shadow in SMRAM,
Maxim Levitsky
- [PATCH v2 10/11] KVM: x86: SVM: use smram structs,
Maxim Levitsky
- [PATCH v2 08/11] KVM: x86: emulator/smm: use smram struct for 32 bit smram load/restore,
Maxim Levitsky
- [PATCH v2 07/11] KVM: x86: emulator/smm: add structs for KVM's smram layout,
Maxim Levitsky
- [PATCH v2 01/11] KVM: x86: emulator: em_sysexit should update ctxt->mode,
Maxim Levitsky
- Re: [PATCH v2 00/11] SMM emulation and interrupt shadow fixes,
Maxim Levitsky
- Re: [PATCH v2 00/11] SMM emulation and interrupt shadow fixes,
Maxim Levitsky
- [kvm-unit-tests PATCH v5 0/3] More skey instr. emulation test,
Janis Schoetterl-Glausch
- [kvm-unit-tests PATCH v3 0/3] s390x: Rework TEID decoding and usage,
Janis Schoetterl-Glausch
- [PATCH] KVM: Fix a typo,
Zhang Jiaming
- [PATCH] vfio: check vfio_register_iommu_driver() return value,
Bo Liu
- [PATCH] RISC-V: KVM: Improve ISA extension by using a bitmap,
Atish Patra
- [PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP),
Ashish Kalra
- [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support,
Ashish Kalra
- [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support,
Ashish Kalra
- [PATCH Part2 v6 04/49] x86/sev: set SYSCFG.MFMD,
Ashish Kalra
- [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table,
Ashish Kalra
- [PATCH Part2 v6 01/49] x86/cpufeatures: Add SEV-SNP CPU feature,
Ashish Kalra
- [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers,
Ashish Kalra
- [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction,
Ashish Kalra
- [PATCH Part2 v6 10/49] x86/fault: Add support to dump RMP entry on fault,
Ashish Kalra
- [PATCH Part2 v6 11/49] crypto:ccp: Define the SEV-SNP commands,
Ashish Kalra
- [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address,
Ashish Kalra
- [PATCH Part2 v6 08/49] x86/traps: Define RMP violation #PF error code,
Ashish Kalra
- [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP,
Ashish Kalra
- [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands,
Ashish Kalra
- [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled,
Ashish Kalra
- [PATCH Part2 v6 16/49] crypto: ccp: Add the SNP_PLATFORM_STATUS command,
Ashish Kalra
- [PATCH Part2 v6 15/49] crypto: ccp: Handle the legacy SEV command when SNP is enabled,
Ashish Kalra
- [PATCH Part2 v6 17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command,
Ashish Kalra
- [PATCH Part2 v6 18/49] crypto: ccp: Provide APIs to query extended attestation report,
Ashish Kalra
- [PATCH Part2 v6 19/49] KVM: SVM: Add support to handle AP reset MSR protocol,
Ashish Kalra
- [PATCH Part2 v6 25/49] KVM: SVM: Disallow registering memory range from HugeTLB for SNP guest,
Ashish Kalra
- [PATCH Part2 v6 21/49] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe,
Ashish Kalra
- [PATCH Part2 v6 23/49] KVM: SVM: Add KVM_SNP_INIT command,
Ashish Kalra
- [PATCH Part2 v6 26/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command,
Ashish Kalra
- [PATCH Part2 v6 20/49] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT,
Ashish Kalra
- [PATCH Part2 v6 24/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command,
Ashish Kalra
- [PATCH Part2 v6 22/49] KVM: SVM: Add initial SEV-SNP support,
Ashish Kalra
- [PATCH Part2 v6 27/49] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests,
Ashish Kalra
- [PATCH Part2 v6 31/49] KVM: x86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use,
Ashish Kalra
- [PATCH Part2 v6 29/49] KVM: X86: Keep the NPT and RMP page level in sync,
Ashish Kalra
- [PATCH Part2 v6 30/49] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX and SNP,
Ashish Kalra
- [PATCH Part2 v6 34/49] KVM: SVM: Do not use long-lived GHCB map while setting scratch area,
Ashish Kalra
- [PATCH Part2 v6 32/49] KVM: x86: Define RMP page fault error bits for #NPF,
Ashish Kalra
- [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command,
Ashish Kalra
- [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map,
Ashish Kalra
- [PATCH Part2 v6 36/49] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT,
Ashish Kalra
- [PATCH Part2 v6 38/49] KVM: SVM: Add support to handle Page State Change VMGEXIT,
Ashish Kalra
- [PATCH Part2 v6 37/49] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT,
Ashish Kalra
- [PATCH Part2 v6 39/49] KVM: SVM: Introduce ops for the post gfn map and unmap,
Ashish Kalra
- [PATCH Part2 v6 33/49] KVM: x86: Update page-fault trace to log full 64-bit error code,
Ashish Kalra
- [PATCH Part2 v6 40/49] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use,
Ashish Kalra
- [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault,
Ashish Kalra
- [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event,
Ashish Kalra
- [PATCH Part2 v6 43/49] KVM: SVM: Use a VMSA physical address variable for populating VMCB,
Ashish Kalra
- [PATCH Part2 v6 44/49] KVM: SVM: Support SEV-SNP AP Creation NAE event,
Ashish Kalra
- [PATCH Part2 v6 46/49] ccp: add support to decrypt the page,
Ashish Kalra
- [PATCH Part2 v6 45/49] KVM: SVM: Add module parameter to enable the SEV-SNP,
Ashish Kalra
- [PATCH Part2 v6 47/49] *fix for stale per-cpu pointer due to cond_resched during ghcb mapping,
Ashish Kalra
- [PATCH Part2 v6 49/49] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb,
Ashish Kalra
- [PATCH Part2 v6 48/49] *debug: warn and retry failed rmpupdates,
Ashish Kalra
- [PATCH v8 00/12] s390x: CPU Topology,
Pierre Morel
[Index of Archives]
[CentOS Virtualization]
[Linux USB Devel]
[Video for Linux]
[Big List of Linux Books]
[Linux SCSI]
[Linux Modules]
[Yosemite Forum]