Linux KVM
[Prev Page][Next Page]
- [PATCH 09/11] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields, (continued)
- [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support,
Tony Krowiak
- [PATCH v20 01/20] s390/vfio-ap: use new AP bus interface to search for queue devices,
Tony Krowiak
- [PATCH v20 03/20] s390/vfio-ap: manage link between queue struct and matrix mdev,
Tony Krowiak
- [PATCH v20 05/20] s390/vfio-ap: refresh guest's APCB by filtering AP resources assigned to mdev,
Tony Krowiak
- [PATCH v20 07/20] s390/vfio-ap: rename matrix_dev->lock mutex to matrix_dev->mdevs_lock,
Tony Krowiak
- [PATCH v20 02/20] s390/vfio-ap: move probe and remove callbacks to vfio_ap_ops.c,
Tony Krowiak
- [PATCH v20 04/20] s390/vfio-ap: introduce shadow APCB,
Tony Krowiak
- [PATCH v20 09/20] s390/vfio-ap: use proper locking order when setting/clearing KVM pointer,
Tony Krowiak
- [PATCH v20 08/20] s390/vfio-ap: introduce new mutex to control access to the KVM pointer,
Tony Krowiak
- [PATCH v20 06/20] s390/vfio-ap: allow assignment of unavailable AP queues to mdev device,
Tony Krowiak
- [PATCH v20 11/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on queue probe/remove,
Tony Krowiak
- [PATCH v20 10/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on assign/unassign,
Tony Krowiak
- [PATCH v20 17/20] s390/vfio-ap: handle config changed and scan complete notification,
Tony Krowiak
- [PATCH v20 13/20] s390/vfio-ap: hot plug/unplug of AP devices when probed/removed,
Tony Krowiak
- [PATCH v20 12/20] s390/vfio-ap: allow hot plug/unplug of AP devices when assigned/unassigned,
Tony Krowiak
- [PATCH v20 16/20] s390/vfio-ap: sysfs attribute to display the guest's matrix,
Tony Krowiak
- [PATCH v20 14/20] s390/vfio-ap: reset queues after adapter/domain unassignment,
Tony Krowiak
- [PATCH v20 18/20] s390/vfio-ap: update docs to include dynamic config support,
Tony Krowiak
- [PATCH v20 20/20] MAINTAINERS: pick up all vfio_ap docs for VFIO AP maintainers,
Tony Krowiak
- [PATCH v20 15/20] s390/vfio-ap: implement in-use callback for vfio_ap driver,
Tony Krowiak
- [PATCH v20 19/20] s390/Docs: new doc describing lock usage by the vfio_ap device driver,
Tony Krowiak
- Re: [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support,
Christian Borntraeger
- Re: [PATCH v2 19/19] vdpasim: control virtqueue support,
Stefano Garzarella
- [kvm-unit-tests PATCH] Add test for #SMI during interrupt window,
Maxim Levitsky
- [PATCH v2 00/11] SMM emulation and interrupt shadow fixes,
Maxim Levitsky
- [PATCH v2 04/11] KVM: x86: emulator: update the emulation mode after rsm,
Maxim Levitsky
- [PATCH v2 09/11] KVM: x86: emulator/smm: use smram struct for 64 bit smram load/restore,
Maxim Levitsky
- [PATCH v2 03/11] KVM: x86: emulator: remove assign_eip_near/far,
Maxim Levitsky
- [PATCH v2 02/11] KVM: x86: emulator: introduce update_emulation_mode,
Maxim Levitsky
- [PATCH v2 05/11] KVM: x86: emulator: update the emulation mode after CR0 write,
Maxim Levitsky
- [PATCH v2 06/11] KVM: x86: emulator/smm: number of GPRs in the SMRAM image depends on the image format,
Maxim Levitsky
- [PATCH v2 11/11] KVM: x86: emulator/smm: preserve interrupt shadow in SMRAM,
Maxim Levitsky
- [PATCH v2 10/11] KVM: x86: SVM: use smram structs,
Maxim Levitsky
- [PATCH v2 08/11] KVM: x86: emulator/smm: use smram struct for 32 bit smram load/restore,
Maxim Levitsky
- [PATCH v2 07/11] KVM: x86: emulator/smm: add structs for KVM's smram layout,
Maxim Levitsky
- [PATCH v2 01/11] KVM: x86: emulator: em_sysexit should update ctxt->mode,
Maxim Levitsky
- Re: [PATCH v2 00/11] SMM emulation and interrupt shadow fixes,
Maxim Levitsky
- Re: [PATCH v2 00/11] SMM emulation and interrupt shadow fixes,
Maxim Levitsky
- [kvm-unit-tests PATCH v5 0/3] More skey instr. emulation test,
Janis Schoetterl-Glausch
- [kvm-unit-tests PATCH v3 0/3] s390x: Rework TEID decoding and usage,
Janis Schoetterl-Glausch
- [PATCH] KVM: Fix a typo,
Zhang Jiaming
- [PATCH] vfio: check vfio_register_iommu_driver() return value,
Bo Liu
- [PATCH] RISC-V: KVM: Improve ISA extension by using a bitmap,
Atish Patra
- [PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP),
Ashish Kalra
- [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support,
Ashish Kalra
- [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support,
Ashish Kalra
- [PATCH Part2 v6 04/49] x86/sev: set SYSCFG.MFMD,
Ashish Kalra
- [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table,
Ashish Kalra
- [PATCH Part2 v6 01/49] x86/cpufeatures: Add SEV-SNP CPU feature,
Ashish Kalra
- [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers,
Ashish Kalra
- [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction,
Ashish Kalra
- [PATCH Part2 v6 10/49] x86/fault: Add support to dump RMP entry on fault,
Ashish Kalra
- [PATCH Part2 v6 11/49] crypto:ccp: Define the SEV-SNP commands,
Ashish Kalra
- [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address,
Ashish Kalra
- [PATCH Part2 v6 08/49] x86/traps: Define RMP violation #PF error code,
Ashish Kalra
- [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP,
Ashish Kalra
- [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands,
Ashish Kalra
- [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled,
Ashish Kalra
- [PATCH Part2 v6 16/49] crypto: ccp: Add the SNP_PLATFORM_STATUS command,
Ashish Kalra
- [PATCH Part2 v6 15/49] crypto: ccp: Handle the legacy SEV command when SNP is enabled,
Ashish Kalra
- [PATCH Part2 v6 17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command,
Ashish Kalra
- [PATCH Part2 v6 18/49] crypto: ccp: Provide APIs to query extended attestation report,
Ashish Kalra
- [PATCH Part2 v6 19/49] KVM: SVM: Add support to handle AP reset MSR protocol,
Ashish Kalra
- [PATCH Part2 v6 25/49] KVM: SVM: Disallow registering memory range from HugeTLB for SNP guest,
Ashish Kalra
- [PATCH Part2 v6 21/49] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe,
Ashish Kalra
- [PATCH Part2 v6 23/49] KVM: SVM: Add KVM_SNP_INIT command,
Ashish Kalra
- [PATCH Part2 v6 26/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command,
Ashish Kalra
- [PATCH Part2 v6 20/49] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT,
Ashish Kalra
- [PATCH Part2 v6 24/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command,
Ashish Kalra
- [PATCH Part2 v6 22/49] KVM: SVM: Add initial SEV-SNP support,
Ashish Kalra
- [PATCH Part2 v6 27/49] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests,
Ashish Kalra
- [PATCH Part2 v6 31/49] KVM: x86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use,
Ashish Kalra
- [PATCH Part2 v6 29/49] KVM: X86: Keep the NPT and RMP page level in sync,
Ashish Kalra
- [PATCH Part2 v6 30/49] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX and SNP,
Ashish Kalra
- [PATCH Part2 v6 34/49] KVM: SVM: Do not use long-lived GHCB map while setting scratch area,
Ashish Kalra
- [PATCH Part2 v6 32/49] KVM: x86: Define RMP page fault error bits for #NPF,
Ashish Kalra
- [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command,
Ashish Kalra
- [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map,
Ashish Kalra
- [PATCH Part2 v6 36/49] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT,
Ashish Kalra
- [PATCH Part2 v6 38/49] KVM: SVM: Add support to handle Page State Change VMGEXIT,
Ashish Kalra
- [PATCH Part2 v6 37/49] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT,
Ashish Kalra
- [PATCH Part2 v6 39/49] KVM: SVM: Introduce ops for the post gfn map and unmap,
Ashish Kalra
- [PATCH Part2 v6 33/49] KVM: x86: Update page-fault trace to log full 64-bit error code,
Ashish Kalra
- [PATCH Part2 v6 40/49] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use,
Ashish Kalra
- [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault,
Ashish Kalra
- [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event,
Ashish Kalra
- [PATCH Part2 v6 43/49] KVM: SVM: Use a VMSA physical address variable for populating VMCB,
Ashish Kalra
- [PATCH Part2 v6 44/49] KVM: SVM: Support SEV-SNP AP Creation NAE event,
Ashish Kalra
- [PATCH Part2 v6 46/49] ccp: add support to decrypt the page,
Ashish Kalra
- [PATCH Part2 v6 45/49] KVM: SVM: Add module parameter to enable the SEV-SNP,
Ashish Kalra
- [PATCH Part2 v6 47/49] *fix for stale per-cpu pointer due to cond_resched during ghcb mapping,
Ashish Kalra
- [PATCH Part2 v6 49/49] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb,
Ashish Kalra
- [PATCH Part2 v6 48/49] *debug: warn and retry failed rmpupdates,
Ashish Kalra
- [PATCH v8 00/12] s390x: CPU Topology,
Pierre Morel
- [PATCH v8 03/12] s390x/cpu_topology: implementating Store Topology System Information,
Pierre Morel
- [PATCH v8 04/12] s390x/cpu_topology: Adding books to CPU topology,
Pierre Morel
- [PATCH v8 01/12] Update Linux Headers,
Pierre Morel
- [PATCH v8 05/12] s390x/cpu_topology: Adding books to STSI,
Pierre Morel
- [PATCH v8 02/12] s390x/cpu_topology: CPU topology objects and structures,
Pierre Morel
- [PATCH v8 07/12] s390x/cpu_topology: Adding drawers to STSI,
Pierre Morel
- [PATCH v8 11/12] s390x/cpu_topology: CPU topology migration,
Pierre Morel
- [PATCH v8 08/12] s390x/cpu_topology: implementing numa for the s390x topology,
Pierre Morel
- [PATCH v8 06/12] s390x/cpu_topology: Adding drawers to CPU topology,
Pierre Morel
- [PATCH v8 09/12] target/s390x: interception of PTF instruction,
Pierre Morel
- [PATCH v8 10/12] s390x/cpu_topology: resetting the Topology-Change-Report,
Pierre Morel
- [PATCH v8 12/12] s390x/cpu_topology: activating CPU topology,
Pierre Morel
- Re: [PATCH v8 00/12] s390x: CPU Topology,
Janis Schoetterl-Glausch
- [PATCH 5.10 75/84] KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak,
Greg Kroah-Hartman
- [PATCH v10 0/3] s390x: KVM: CPU Topology,
Pierre Morel
- Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959,
Dmitry Vyukov
- Re: [External] [PATCH v9 9/9] KVM: VMX: enable IPI virtualization,
Shenming Lu
- [Patch 0/1] A bug fix to the error handling path in vfio_device_open(),
Yi Liu
- [PATCH V2] virtio: disable notification hardening by default,
Jason Wang
- [PATCH 0/3] KVM: selftests: Consolidate ucall code,
Sean Christopherson
- [linux-next:master] BUILD REGRESSION 07dc787be2316e243a16a33d0a9b734cd9365bd3,
kernel test robot
- [PATCH] KVM: SEV: Init target VMCBs in sev_migrate_from,
Peter Gonda
- [PATCH] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host,
Chao Gao
- Re: 'WARNING in vcpu_enter_guest' bug in arch/x86/kvm/x86.c:9877,
Sean Christopherson
- [CFP LPC 2022] VFIO/IOMMU/PCI Microconference,
Jörg Rödel
- [PATCH RFC 0/4] kvm/mm: Allow GUP to respond to non fatal signals,
Peter Xu
- [RFT][PATCH v1 0/6] Update vfio_pin/unpin_pages API,
Nicolin Chen
- [PATCH 0/2] Documentation/x86: Update the dynamic XSTATE doc,
Chang S. Bae
- [PATCH v2 0/2] Improve vfio-pci primary GPU assignment behavior,
Alex Williamson
- [linux-next:master] BUILD REGRESSION c6d7e3b385f19869ab96e9404c92ff1abc34f2c8,
kernel test robot
- [PATCH kvmtool] arm: gic: fdt: fix PPI CPU mask calculation,
Andre Przywara
- Re: [PATCH 1/2] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd,
Andrew Jones
- [PATCH] KVM: arm64: Add Oliver as a reviewer,
Marc Zyngier
- [PATCH 00/19] Refresh queued CET virtualization series,
Yang Weijiang
- [PATCH 02/19] x86/cpufeatures: Add CPU feature flags for shadow stacks,
Yang Weijiang
- [PATCH 08/19] KVM: x86: Load guest fpu state when accessing MSRs managed by XSAVES,
Yang Weijiang
- [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest,
Yang Weijiang
- [PATCH 06/19] KVM: x86: Report XSS as an MSR to be saved if there are supported features,
Yang Weijiang
- [PATCH 07/19] KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS,
Yang Weijiang
- [PATCH 05/19] x86/fpu: Add helper for modifying xstate,
Yang Weijiang
- [PATCH 18/19] KVM: nVMX: Enable CET support for nested VMX,
Yang Weijiang
- [PATCH 15/19] KVM: x86: Save/Restore GUEST_SSP to/from SMM state save area,
Yang Weijiang
- [PATCH 01/19] x86/cet/shstk: Add Kconfig option for Shadow Stack,
Yang Weijiang
- [PATCH 14/19] KVM: x86: Report CET MSRs as to-be-saved if CET is supported,
Yang Weijiang
- [PATCH 17/19] KVM: VMX: Pass through CET MSRs to the guest when supported,
Yang Weijiang
- [PATCH 13/19] KVM: VMX: Add a synthetic MSR to allow userspace VMM to access GUEST_SSP,
Yang Weijiang
- [PATCH 09/19] KVM: x86: Add #CP support in guest exception classification.,
Yang Weijiang
- [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack,
Yang Weijiang
- [PATCH 10/19] KVM: VMX: Introduce CET VMCS fields and flags,
Yang Weijiang
- [PATCH 11/19] KVM: x86: Add fault checks for CR4.CET,
Yang Weijiang
- [PATCH 04/19] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states,
Yang Weijiang
- [PATCH 12/19] KVM: VMX: Emulate reads and writes to CET MSRs,
Yang Weijiang
- [PATCH 16/19] KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace,
Yang Weijiang
- Re: [PATCH 00/19] Refresh queued CET virtualization series,
Christoph Hellwig
- Re: [PATCH 00/19] Refresh queued CET virtualization series,
Peter Zijlstra
- [PATCH v2 0/5] Simplify vfio_iommu_type1 attach/detach routine,
Nicolin Chen
- [kvm-unit-tests PATCH v4 00/13] x86: SMP Support for x86 UEFI Tests,
Sean Christopherson
[Index of Archives]
[CentOS Virtualization]
[Linux USB Devel]
[Video for Linux]
[Big List of Linux Books]
[Linux SCSI]
[Linux Modules]
[Yosemite Forum]