Linux KVM
[Prev Page][Next Page]
- [PATCH v6 11/43] arm64: RME: RTT tear down, (continued)
- [PATCH v6 11/43] arm64: RME: RTT tear down,
Steven Price
- [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms,
Steven Price
- [PATCH v6 10/43] arm64: kvm: Allow passing machine type in KVM creation,
Steven Price
- [PATCH v6 13/43] KVM: arm64: vgic: Provide helper for number of list registers,
Steven Price
- [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms,
Steven Price
- [PATCH v6 15/43] KVM: arm64: Support timers in realm RECs,
Steven Price
- [PATCH v6 16/43] arm64: RME: Allow VMM to set RIPAS,
Steven Price
- [PATCH v6 18/43] KVM: arm64: Handle realm MMIO emulation,
Steven Price
- [PATCH v6 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG,
Steven Price
- [PATCH v6 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM,
Steven Price
- [PATCH v6 20/43] arm64: RME: Runtime faulting of memory,
Steven Price
- [PATCH v6 38/43] arm64: RME: Configure max SVE vector length for a Realm,
Steven Price
- [PATCH v6 39/43] arm64: RME: Provide register list for unfinalized RME RECs,
Steven Price
- [PATCH v6 17/43] arm64: RME: Handle realm enter/exit,
Steven Price
- [PATCH v6 40/43] arm64: RME: Provide accurate register list,
Steven Price
- [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL,
Steven Price
- [PATCH v6 19/43] arm64: RME: Allow populating initial contents,
Steven Price
- [PATCH v6 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space,
Steven Price
- [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance,
Steven Price
- [PATCH v6 23/43] KVM: arm64: Handle Realm PSCI requests,
Steven Price
- [PATCH v6 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ,
Steven Price
- [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests,
Steven Price
- [PATCH v6 33/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests,
Steven Price
- [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest,
Steven Price
- [PATCH v6 41/43] arm64: kvm: Expose support for private memory,
Steven Price
- [PATCH v6 37/43] arm64: RME: Propagate max SVE vector length from RMM,
Steven Price
- [PATCH v6 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace,
Steven Price
- [PATCH v6 43/43] KVM: arm64: Allow activating realms,
Steven Price
- [PATCH] target/i386: Reset TSCs of parked vCPUs too on VM reset,
Maciej S. Szmigiero
- [RFC 0/5] KVM: drop 32-bit host support on all architectures,
Arnd Bergmann
- [PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes,
Michael Roth
- [PATCH] i386/kvm: Set return value after handling KVM_EXIT_HYPERCALL,
Binbin Wu
- Re: [PATCH v13] PCI/ASPM: Make pci_save_aspm_l1ss_state save both child and parent's L1SS configuration,
Bjorn Helgaas
- [GIT PULL] VFIO fixes for v6.13-rc3,
Alex Williamson
- [PATCH 0/4] KVM: selftests: dirty_log_test: fixes for running the test nested,
Maxim Levitsky
- [PATCH] KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits,
Sean Christopherson
- [syzbot] [kvm?] WARNING in __srcu_check_read_flavor,
syzbot
- [syzbot] [kvm?] WARNING in vmx_handle_exit (2),
syzbot
- [syzbot] Monthly kvm report (Dec 2024),
syzbot
- [kvmtool] Reset all VCPUs before any entering run loops,
Keir Fraser
- [Bug 219588] New: [6.13.0-rc2+]WARNING: CPU: 52 PID: 12253 at arch/x86/kvm/mmu/tdp_mmu.c:1001 tdp_mmu_map_handle_target_level+0x1f0/0x310 [kvm],
bugzilla-daemon
- [PATCH 0/5] KVM: x86: Address xstate_required_size() perf regression,
Sean Christopherson
- [PATCH] selftests/rseq: Fix rseq for cases without glibc support,
Raghavendra Rao Ananta
- [PATCH v3 0/2] Extend 8-byte PCI load/store support to x86 arch,
Ramesh Thomas
- [REGRESSION] from 74a0e79df68a8042fb84fd7207e57b70722cf825: VFIO PCI passthrough no longer works,
Simon Pilkington
- [PATCH v1 1/1] KVM: s390: VSIE: fix virtual/physical address in unpin_scb(),
Claudio Imbrenda
- [kvm-unit-tests PATCH 0/3] riscv: Improved bare metal support,
Samuel Holland
- [PATCH 00/18] KVM: TDX: TDX "the rest" part,
Binbin Wu
- [PATCH 01/18] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior,
Binbin Wu
- [PATCH 02/18] KVM: TDX: Handle EPT violation/misconfig exit,
Binbin Wu
- [PATCH 03/18] KVM: TDX: Detect unexpected SEPT violations due to pending SPTEs,
Binbin Wu
- [PATCH 04/18] KVM: TDX: Handle TDX PV CPUID hypercall,
Binbin Wu
- [PATCH 05/18] KVM: TDX: Handle TDX PV HLT hypercall,
Binbin Wu
- [PATCH 06/18] KVM: x86: Move KVM_MAX_MCE_BANKS to header file,
Binbin Wu
- [PATCH 07/18] KVM: TDX: Implement callbacks for MSR operations,
Binbin Wu
- [PATCH 08/18] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall,
Binbin Wu
- [PATCH 09/18] KVM: TDX: Enable guest access to LMCE related MSRs,
Binbin Wu
- [PATCH 10/18] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall,
Binbin Wu
- [PATCH 11/18] KVM: TDX: Add methods to ignore accesses to CPU state,
Binbin Wu
- [PATCH 12/18] KVM: TDX: Add method to ignore guest instruction emulation,
Binbin Wu
- [PATCH 13/18] KVM: TDX: Add methods to ignore VMX preemption timer,
Binbin Wu
- [PATCH 14/18] KVM: TDX: Add methods to ignore accesses to TSC,
Binbin Wu
- [PATCH 15/18] KVM: TDX: Ignore setting up mce,
Binbin Wu
- [PATCH 16/18] KVM: TDX: Add a method to ignore hypercall patching,
Binbin Wu
- [PATCH 17/18] KVM: TDX: Make TDX VM type supported,
Binbin Wu
- [PATCH 18/18] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX),
Binbin Wu
- Re: [PATCH 00/18] KVM: TDX: TDX "the rest" part,
Paolo Bonzini
- [PATCH 0/7] Move initializing SEV/SNP functionality to KVM,
Ashish Kalra
- [PATCH v2 0/2] MANA: Fix few memory leaks in mana_gd_setup_irqs,
Maxim Levitsky
- [linus:master] [KVM] d96c77bd4e: stress-ng.kvm.ops_per_sec 11.1% improvement,
kernel test robot
- [PATCH v3 00/11] Remove implicit devres from pci_intx(),
Philipp Stanner
- [PATCH v3 01/11] PCI: Prepare removing devres from pci_intx(),
Philipp Stanner
- [PATCH v3 02/11] drivers/xen: Use never-managed version of pci_intx(),
Philipp Stanner
- [PATCH v3 05/11] misc: Use never-managed version of pci_intx(),
Philipp Stanner
- [PATCH v3 03/11] net/ethernet: Use never-managed version of pci_intx(),
Philipp Stanner
- [PATCH v3 04/11] net/ntb: Use never-managed version of pci_intx(),
Philipp Stanner
- [PATCH v3 06/11] vfio/pci: Use never-managed version of pci_intx(),
Philipp Stanner
- [PATCH v3 08/11] ata: Use always-managed version of pci_intx(),
Philipp Stanner
- [PATCH v3 07/11] PCI: MSI: Use never-managed version of pci_intx(),
Philipp Stanner
- [PATCH v3 09/11] wifi: qtnfmac: use always-managed version of pcim_intx(),
Philipp Stanner
- [PATCH v3 10/11] HID: amd_sfh: Use always-managed version of pcim_intx(),
Philipp Stanner
- [PATCH v3 11/11] Remove devres from pci_intx(),
Philipp Stanner
- Re: [PATCH v3 00/11] Remove implicit devres from pci_intx(),
Bjorn Helgaas
- [PATCH v1 0/6] selftests: kvm: s390: Reject invalid ioctls on ucontrol VMs,
Christoph Schlameuss
- [PATCH 00/16] KVM: TDX: TDX interrupts,
Binbin Wu
- [PATCH 01/16] KVM: TDX: Add support for find pending IRQ in a protected local APIC,
Binbin Wu
- [PATCH 02/16] KVM: VMX: Remove use of struct vcpu_vmx from posted_intr.c,
Binbin Wu
- [PATCH 03/16] KVM: TDX: Disable PI wakeup for IPIv,
Binbin Wu
- [PATCH 04/16] KVM: VMX: Move posted interrupt delivery code to common header,
Binbin Wu
- [PATCH 05/16] KVM: TDX: Implement non-NMI interrupt injection,
Binbin Wu
- [PATCH 06/16] KVM: x86: Assume timer IRQ was injected if APIC state is protected,
Binbin Wu
- [PATCH 10/16] KVM: TDX: Handle SMI request as !CONFIG_KVM_SMM,
Binbin Wu
- [PATCH 07/16] KVM: TDX: Wait lapic expire when timer IRQ was injected,
Binbin Wu
- [PATCH 13/16] KVM: TDX: Add methods to ignore virtual apic related operation,
Binbin Wu
- [PATCH 14/16] KVM: VMX: Move NMI/exception handler to common helper,
Binbin Wu
- [PATCH 08/16] KVM: TDX: Implement methods to inject NMI,
Binbin Wu
- [PATCH 16/16] KVM: TDX: Handle EXIT_REASON_OTHER_SMI,
Binbin Wu
- [PATCH 09/16] KVM: TDX: Complete interrupts after TD exit,
Binbin Wu
- [PATCH 11/16] KVM: TDX: Always block INIT/SIPI,
Binbin Wu
- [PATCH 12/16] KVM: TDX: Inhibit APICv for TDX guest,
Binbin Wu
- [PATCH 15/16] KVM: TDX: Handle EXCEPTION_NMI and EXTERNAL_INTERRUPT,
Binbin Wu
- Re: [PATCH 00/16] KVM: TDX: TDX interrupts,
Paolo Bonzini
- Re: [PATCH 00/16] KVM: TDX: TDX interrupts,
Xiaoyao Li
- i want to learn some recent development process about kvm, not robot,
李硕
- [PATCH v2 6.1] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn(),
Nikolay Kuratov
- [PATCH v2 6.6 6.12] KVM: x86/mmu: Ensure that kvm_release_pfn_clean() takes exact pfn from kvm_faultin_pfn(),
Nikolay Kuratov
- [PATCH v6 00/16] Prepare GHES driver to support error injection,
Mauro Carvalho Chehab
- [PATCH 0/2] KVM: SVM: Make VMGEXIT GHCB exit codes more readable,
Melody Wang
- [PATCH 00/31] Prepare GHES driver to support error injection,
Mauro Carvalho Chehab
- [PATCH 0/5] bugfix some driver issues,
Longfang Liu
- (Proposal) New TDX Global Metadata To Report FIXED0 and FIXED1 CPUID Bits,
Xiaoyao Li
- [RFC PATCH v2 1/3] KVM: arm64: SIGBUS VMM for SEA guest abort,
Jiaqi Yan
- Hitting AUTOIBRS WARN_ON_ONCE() in init_amd() booting 32-bit kernel under KVM,
Nathan Chancellor
- [kvm-unit-tests PATCH] s390x: Support newer version of genprotimg,
Marc Hartmayer
- [PATCH v4 00/18] Provide a new two step DMA mapping API,
Leon Romanovsky
- [PATCH v4 02/18] dma-mapping: move the PCI P2PDMA mapping helpers to pci-p2pdma.h,
Leon Romanovsky
- [PATCH v4 01/18] PCI/P2PDMA: Refactor the p2pdma mapping helpers,
Leon Romanovsky
- [PATCH v4 04/18] iommu: add kernel-doc for iommu_unmap and iommu_unmap_fast,
Leon Romanovsky
- [PATCH v4 03/18] iommu: generalize the batched sync after map interface,
Leon Romanovsky
- [PATCH v4 07/18] iommu/dma: Factor out a iommu_dma_map_swiotlb helper,
Leon Romanovsky
- [PATCH v4 06/18] dma: Provide an interface to allow allocate IOVA,
Leon Romanovsky
- [PATCH v4 08/18] dma-mapping: Implement link/unlink ranges API,
Leon Romanovsky
- [PATCH v4 09/18] dma-mapping: add a dma_need_unmap helper,
Leon Romanovsky
- [PATCH v4 05/18] dma-mapping: Add check if IOVA can be used,
Leon Romanovsky
- [PATCH v4 13/18] RDMA/umem: Store ODP access mask information in PFN,
Leon Romanovsky
- [PATCH v4 10/18] docs: core-api: document the IOVA-based API,
Leon Romanovsky
- [PATCH v4 11/18] mm/hmm: let users to tag specific PFN with DMA mapped bit,
Leon Romanovsky
- [PATCH v4 15/18] RDMA/umem: Separate implicit ODP initialization from explicit ODP,
Leon Romanovsky
- [PATCH v4 17/18] vfio/mlx5: Rewrite create mkey flow to allow better code reuse,
Leon Romanovsky
- [PATCH v4 14/18] RDMA/core: Convert UMEM ODP DMA mapping to caching IOVA and page linkage,
Leon Romanovsky
- [PATCH v4 12/18] mm/hmm: provide generic DMA managing logic,
Leon Romanovsky
- [PATCH v4 16/18] vfio/mlx5: Explicitly use number of pages instead of allocated length,
Leon Romanovsky
- [PATCH v4 18/18] vfio/mlx5: Enable the DMA link API,
Leon Romanovsky
- [PATCH v3] KVM: make uevents configurable,
Bernhard Kauer
- [PATCH V1] vfio/mlx5: Align the page tracking max message size with the device capability,
Yishai Hadas
- [no subject],
Unknown
- [PATCH v1 00/13] KVM: Introduce KVM Userfault,
James Houghton
- [PATCH v1 01/13] KVM: Add KVM_MEM_USERFAULT memslot flag and bitmap,
James Houghton
- [PATCH v1 03/13] KVM: Allow late setting of KVM_MEM_USERFAULT on guest_memfd memslot,
James Houghton
- [PATCH v1 02/13] KVM: Add KVM_MEMORY_EXIT_FLAG_USERFAULT,
James Houghton
- [PATCH v1 04/13] KVM: Advertise KVM_CAP_USERFAULT in KVM_CHECK_EXTENSION,
James Houghton
- [PATCH v1 05/13] KVM: x86/mmu: Add support for KVM_MEM_USERFAULT,
James Houghton
- [PATCH v1 07/13] KVM: selftests: Fix vm_mem_region_set_flags docstring,
James Houghton
- [PATCH v1 06/13] KVM: arm64: Add support for KVM_MEM_USERFAULT,
James Houghton
- [PATCH v1 09/13] KVM: selftests: Add va_start/end into uffd_desc,
James Houghton
- [PATCH v1 08/13] KVM: selftests: Fix prefault_mem logic,
James Houghton
- [PATCH v1 10/13] KVM: selftests: Add KVM Userfault mode to demand_paging_test,
James Houghton
- [PATCH v1 11/13] KVM: selftests: Inform set_memory_region_test of KVM_MEM_USERFAULT,
James Houghton
- [PATCH v1 12/13] KVM: selftests: Add KVM_MEM_USERFAULT + guest_memfd toggle tests,
James Houghton
- [PATCH v1 13/13] KVM: Documentation: Add KVM_CAP_USERFAULT and KVM_MEM_USERFAULT details,
James Houghton
- Re: [PATCH v1 00/13] KVM: Introduce KVM Userfault,
Peter Xu
- [no subject],
Unknown
- [PATCH v3 0/2] x86: KVM: Add missing AMD features,
Maksim Davydov
- [PATCH v3 2/2] x86: KVM: Advertise AMD's speculation control features,
Maksim Davydov
[PATCH v2 00/12] fs/proc/vmcore: kdump support for virtio-mem on s390,
David Hildenbrand
- [PATCH v2 01/12] fs/proc/vmcore: convert vmcore_cb_lock into vmcore_mutex,
David Hildenbrand
- [PATCH v2 02/12] fs/proc/vmcore: replace vmcoredd_mutex by vmcore_mutex,
David Hildenbrand
- [PATCH v2 03/12] fs/proc/vmcore: disallow vmcore modifications while the vmcore is open,
David Hildenbrand
- [PATCH v2 04/12] fs/proc/vmcore: prefix all pr_* with "vmcore:",
David Hildenbrand
- [PATCH v2 05/12] fs/proc/vmcore: move vmcore definitions out of kcore.h,
David Hildenbrand
- [PATCH v2 06/12] fs/proc/vmcore: factor out allocating a vmcore range and adding it to a list,
David Hildenbrand
- [PATCH v2 09/12] virtio-mem: mark device ready before registering callbacks in kdump mode,
David Hildenbrand
- [PATCH v2 10/12] virtio-mem: remember usable region size,
David Hildenbrand
- [PATCH v2 08/12] fs/proc/vmcore: introduce PROC_VMCORE_DEVICE_RAM to detect device RAM ranges in 2nd kernel,
David Hildenbrand
- [PATCH v2 11/12] virtio-mem: support CONFIG_PROC_VMCORE_DEVICE_RAM,
David Hildenbrand
- [PATCH v2 12/12] s390/kdump: virtio-mem kdump support (CONFIG_PROC_VMCORE_DEVICE_RAM),
David Hildenbrand
- [PATCH v2 07/12] fs/proc/vmcore: factor out freeing a list of vmcore ranges,
David Hildenbrand
- Re: [PATCH v2 00/12] fs/proc/vmcore: kdump support for virtio-mem on s390,
Michael S. Tsirkin
[PATCH v6 0/7] Support attaching PASID to the blocked_domain,
Yi Liu
[PATCH 00/11] x86: 32-bit cleanups,
Arnd Bergmann
- [PATCH 03/11] x86: Kconfig.cpu: split out 64-bit atom,
Arnd Bergmann
- [PATCH 04/11] x86: split CPU selection into 32-bit and 64-bit,
Arnd Bergmann
- [PATCH 06/11] x86: drop SWIOTLB and PHYS_ADDR_T_64BIT for PAE,
Arnd Bergmann
- [PATCH 07/11] x86: drop support for CONFIG_HIGHPTE,
Arnd Bergmann
- [PATCH 08/11] x86: document X86_INTEL_MID as 64-bit-only,
Arnd Bergmann
- [PATCH 10/11] x86: remove old STA2x11 support,
Arnd Bergmann
- [PATCH 11/11] x86: drop 32-bit KVM host support,
Arnd Bergmann
- [PATCH 02/11] x86: drop 32-bit "bigsmp" machine support,
Arnd Bergmann
- [PATCH 01/11] x86/Kconfig: Geode CPU has cmpxchg8b,
Arnd Bergmann
- [PATCH 05/11] x86: remove HIGHMEM64G support,
Arnd Bergmann
- [PATCH 09/11] x86: rework CONFIG_GENERIC_CPU compiler flags,
Arnd Bergmann
[PATCH v5 00/16] Prepare GHES driver to support error injection,
Mauro Carvalho Chehab
[GIT PULL] KVM/arm64 fixes for 6.13, part #2,
Oliver Upton
[ANNOUNCE] PUCK Agenda - 2024.12.04 - CANCELED,
Sean Christopherson
[PATCH 0/3] driver core: class: remove class_compat code,
Heiner Kallweit
[PATCH] riscv: Remove duplicate CLINT_TIMER selections,
Geert Uytterhoeven
[PATCH v2 0/2] Extend 8-byte PCI load/store support to x86 arch,
Ramesh Thomas
[PATCH] virt: sev-guest: Remove is_vmpck_empty() helper,
Nikunj A Dadhania
[PATCH V2 1/2] LoongArch: KVM: Protect kvm_check_requests() with SRCU,
Huacai Chen
[PATCH v15 00/13] Add Secure TSC support for SNP guests,
Nikunj A Dadhania
- [PATCH v15 03/13] x86/sev: Add Secure TSC support for SNP guests,
Nikunj A Dadhania
- [PATCH v15 05/13] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests,
Nikunj A Dadhania
- [PATCH v15 01/13] x86/sev: Carve out and export SNP guest messaging init routines,
Nikunj A Dadhania
- [PATCH v15 08/13] x86/cpu/amd: Do not print FW_BUG for Secure TSC,
Nikunj A Dadhania
- [PATCH v15 10/13] tsc: Upgrade TSC clocksource rating,
Nikunj A Dadhania
- [PATCH v15 11/13] tsc: Switch to native sched clock,
Nikunj A Dadhania
- [PATCH v15 13/13] x86/sev: Allow Secure TSC feature for SNP guests,
Nikunj A Dadhania
- [PATCH v15 06/13] x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests,
Nikunj A Dadhania
- [PATCH v15 12/13] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected,
Nikunj A Dadhania
- [PATCH v15 02/13] x86/sev: Relocate SNP guest messaging routines to common code,
Nikunj A Dadhania
- [PATCH v15 09/13] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency,
Nikunj A Dadhania
- [PATCH v15 07/13] x86/sev: Mark Secure TSC as reliable clocksource,
Nikunj A Dadhania
- [PATCH v15 04/13] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests,
Nikunj A Dadhania
[PATCH 1/2] LoongArch: KVM: Protect kvm_check_requests() with SRCU,
Huacai Chen
[Index of Archives]
[CentOS Virtualization]
[Linux USB Devel]
[Video for Linux]
[Big List of Linux Books]
[Linux SCSI]
[Linux Modules]
[Yosemite Forum]