messages from 2022-04-01 14:06:42 to 2022-04-04 21:23:18 UTC [more...]
[PATCH 0/8] KVM: SVM: Fix soft int/ex re-injection
2022-04-04 20:44 UTC (26+ messages)
` [PATCH 1/8] KVM: nSVM: Sync next_rip field from vmcb12 to vmcb02
` [PATCH 2/8] KVM: SVM: Downgrade BUG_ON() to WARN_ON() in svm_inject_irq()
` [PATCH 3/8] KVM: SVM: Unwind "speculative" RIP advancement if INTn injection "fails"
` [PATCH 4/8] KVM: SVM: Stuff next_rip on emualted INT3 injection if NRIPS is supported
` [PATCH 5/8] KVM: SVM: Re-inject INT3/INTO instead of retrying the instruction
` [PATCH 6/8] KVM: SVM: Re-inject INTn instead of retrying the insn on "failure"
` [PATCH 7/8] KVM: x86: Trace re-injected exceptions
` [PATCH 8/8] KVM: selftests: nSVM: Add svm_nested_soft_inject_test
[PATCH 0/4] KVM: arm64: Fix use-after-free in debugfs
2022-04-04 17:57 UTC (9+ messages)
` [PATCH 1/4] KVM: arm64: vgic: Don't assume the VM debugfs directory exists
` [PATCH 2/4] KVM: Only log about debugfs directory collision once
` [PATCH 3/4] selftests: KVM: Don't leak GIC FD across dirty log test iterations
` [PATCH 4/4] selftests: KVM: Free the GIC FD when cleaning up in arch_timer
[PATCH v3 0/6] Verify dirty logging works properly with page stats
2022-04-04 18:19 UTC (8+ messages)
` [PATCH v3 1/6] KVM: x86/mmu: Set lpage_disallowed in TDP MMU before setting SPTE
` [PATCH v3 2/6] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
` [PATCH v3 3/6] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
[PATCH v5 00/21] KVM: s390: enable zPCI for interpretive execution
2022-04-04 17:43 UTC (16+ messages)
` [PATCH v5 01/21] s390/sclp: detect the zPCI load/store interpretation facility
` [PATCH v5 02/21] s390/sclp: detect the AISII facility
` [PATCH v5 03/21] s390/sclp: detect the AENI facility
` [PATCH v5 04/21] s390/sclp: detect the AISI facility
` [PATCH v5 05/21] s390/airq: pass more TPI info to airq handlers
` [PATCH v5 06/21] s390/airq: allow for airq structure that uses an input vector
` [PATCH v5 08/21] s390/pci: stash associated GISA designation
` [PATCH v5 09/21] s390/pci: stash dtsm and maxstbl
` [PATCH v5 10/21] KVM: s390: pci: add basic kvm_zdev structure
` [PATCH v5 13/21] KVM: s390: mechanism to enable guest zPCI Interpretation
` [PATCH v5 15/21] KVM: s390: pci: add routines to start/stop interpretive execution
` [PATCH v5 16/21] KVM: vfio: add s390x hook to register KVM guest designation
` [PATCH v5 17/21] vfio-pci/zdev: add function handle to clp base capability
` [PATCH v5 19/21] KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices
` [PATCH v5 21/21] MAINTAINERS: additional files related kvm s390 pci passthrough
[PATCH v5 0/9] s390x/pci: zPCI interpretation support
2022-04-04 18:17 UTC (7+ messages)
` [PATCH v5 2/9] vfio: tolerate migration protocol v1 uapi renames
` [PATCH v5 3/9] target/s390x: add zpci-interp to cpu models
` [PATCH v5 4/9] s390x/pci: add routine to get host function handle from CLP info
` [PATCH v5 5/9] s390x/pci: enable for load/store intepretation
` [PATCH v5 6/9] s390x/pci: don't fence interpreted devices without MSI-X
` [PATCH v5 7/9] s390x/pci: enable adapter event notification for interpreted devices
[PATCH] KVM: SEV: Mark nested locking of vcpu->lock
2022-04-04 20:35 UTC (2+ messages)
[PATCH v7 0/8] IPI virtualization support for VM
2022-04-04 17:57 UTC (22+ messages)
` [PATCH v7 2/8] KVM: VMX: Extend BUILD_CONTROLS_SHADOW macro to support 64-bit variation
` [PATCH v7 3/8] KVM: VMX: Detect Tertiary VM-Execution control when setup VMCS config
` [PATCH v7 4/8] KVM: VMX: dump_vmcs() reports tertiary_exec_control field as well
` [PATCH v7 5/8] KVM: x86: Add support for vICR APIC-write VM-Exits in x2APIC mode
` [PATCH v7 7/8] KVM: x86: Allow userspace set maximum VCPU id for VM
` [PATCH v7 8/8] KVM: VMX: enable IPI virtualization
[PATCH v2 0/3] KVM: Fix use-after-free in debugfs
2022-04-04 18:21 UTC (3+ messages)
` [PATCH v2 2/3] selftests: KVM: Don't leak GIC FD across dirty log test iterations
` [PATCH v2 3/3] selftests: KVM: Free the GIC FD when cleaning up in arch_timer
[PATCH 0/3] KVM: Split huge pages mapped by the TDP MMU on fault
2022-04-04 18:48 UTC (7+ messages)
` [PATCH 1/3] KVM: selftests: Introduce a selftest to measure execution performance
` [PATCH 2/3] KVM: x86/mmu: Pass account_nx to tdp_mmu_split_huge_page()
` [PATCH 3/3] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
[PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
2022-04-04 17:06 UTC (17+ messages)
[PATCH 5.4 v2] KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
2022-04-04 15:49 UTC
[PATCH 4.9] KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated
2022-04-04 15:43 UTC
[PATCH 5.4] KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated
2022-04-04 15:43 UTC
[PATCH 4.19] KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated
2022-04-04 15:43 UTC
[PATCH 4.14] KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated
2022-04-04 15:43 UTC
[PATCH] KVM: VMX: optimize pi_wakeup_handler
2022-04-04 15:15 UTC (4+ messages)
` 答复: "
[PATCH 5.16] KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
2022-04-04 14:03 UTC (2+ messages)
[PATCH 5.4] KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
2022-04-04 14:02 UTC (2+ messages)
[PATCH 5.10] KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
2022-04-04 13:41 UTC
[PATCH 5.15] KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
2022-04-04 13:41 UTC
General KVM/QEMU VM debugging techniques
2022-04-04 13:01 UTC (3+ messages)
[kvmtool PATCH v3 0/2] arm64: Add MTE support
2022-04-04 12:05 UTC (3+ messages)
[PATCH kvmtool v1] Make --no-pvtime command argument arm specific
2022-04-04 10:34 UTC (2+ messages)
[GIT PULL] virtio: fixes, cleanups
2022-04-04 10:31 UTC
[PATCH 0/5] nSVM: L1 -> L2 event injection fixes and a self-test
2022-04-04 9:53 UTC (17+ messages)
` [PATCH 1/5] KVM: nSVM: Sync next_rip field from vmcb12 to vmcb02
` [PATCH 2/5] KVM: SVM: Downgrade BUG_ON() to WARN_ON() in svm_inject_irq()
` [PATCH 3/5] KVM: nSVM: Don't forget about L1-injected events
[PATCH v2 0/3] KVM: arm64: Limit feature register reads from AArch32
2022-04-04 5:46 UTC (9+ messages)
` [PATCH v2 1/3] KVM: arm64: Wire up CP15 feature registers to their AArch64 equivalents
` [PATCH v2 2/3] KVM: arm64: Plumb cp10 ID traps through the AArch64 sysreg handler
` [PATCH v2 3/3] KVM: arm64: Start trapping ID registers for 32 bit guests
[PATCH 0/3] Unexpected guest trap handling for KVM RISC-V selftests
2022-04-04 4:11 UTC (2+ messages)
[PATCH] RISC-V: KVM: Don't clear hgatp CSR in kvm_arch_vcpu_put()
2022-04-04 3:50 UTC (2+ messages)
[PATCH RESEND] Documentation: kvm: Add missing line break in api.rst
2022-04-04 3:44 UTC (2+ messages)
[RFC PATCH v5 000/104] KVM TDX basic feature support
2022-04-04 0:41 UTC (15+ messages)
` [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
` [RFC PATCH v5 038/104] KVM: x86/mmu: Allow per-VM override of the TDP max page level
[PATCH v11 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
2022-04-03 22:36 UTC (5+ messages)
[GIT PULL] KVM fixes and docs for Linux 5.18 merge window
2022-04-02 20:00 UTC (2+ messages)
[PATCH AUTOSEL 5.15 13/16] vdpa: clean up get_config_size ret value handling
2022-04-02 3:57 UTC (2+ messages)
[PATCH v2] KVM: arm64: Don't split hugepages outside of MMU write lock
2022-04-02 1:06 UTC (2+ messages)
[GIT PULL] Second batch of KVM changes for Linux 5.18
2022-04-01 21:59 UTC (3+ messages)
[PATCH] KVM: x86/pmu: Update AMD PMC smaple period to fix guest NMI-watchdog
2022-04-01 18:26 UTC (2+ messages)
[PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
2022-04-01 18:19 UTC (13+ messages)
[PATCH v3 00/23] KVM: Extend Eager Page Splitting to the shadow MMU
2022-04-01 17:55 UTC (24+ messages)
` [PATCH v3 01/23] KVM: x86/mmu: Optimize MMU page cache lookup for all direct SPs
` [PATCH v3 02/23] KVM: x86/mmu: Use a bool for direct
` [PATCH v3 03/23] KVM: x86/mmu: Derive shadow MMU page role from parent
` [PATCH v3 04/23] KVM: x86/mmu: Decompose kvm_mmu_get_page() into separate functions
` [PATCH v3 05/23] KVM: x86/mmu: Rename shadow MMU functions that deal with shadow pages
` [PATCH v3 06/23] KVM: x86/mmu: Pass memslot to kvm_mmu_new_shadow_page()
` [PATCH v3 07/23] KVM: x86/mmu: Separate shadow MMU sp allocation from initialization
` [PATCH v3 08/23] KVM: x86/mmu: Link spt to sp during allocation
` [PATCH v3 09/23] KVM: x86/mmu: Move huge page split sp allocation code to mmu.c
` [PATCH v3 10/23] KVM: x86/mmu: Use common code to free kvm_mmu_page structs
` [PATCH v3 11/23] KVM: x86/mmu: Use common code to allocate shadow pages from vCPU caches
` [PATCH v3 12/23] KVM: x86/mmu: Pass const memslot to rmap_add()
` [PATCH v3 13/23] KVM: x86/mmu: Pass const memslot to init_shadow_page() and descendants
` [PATCH v3 14/23] KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu
` [PATCH v3 15/23] KVM: x86/mmu: Update page stats in __rmap_add()
` [PATCH v3 16/23] KVM: x86/mmu: Cache the access bits of shadowed translations
` [PATCH v3 17/23] KVM: x86/mmu: Extend make_huge_page_split_spte() for the shadow MMU
` [PATCH v3 18/23] KVM: x86/mmu: Zap collapsible SPTEs at all levels in "
` [PATCH v3 19/23] KVM: x86/mmu: Refactor drop_large_spte()
` [PATCH v3 20/23] KVM: Allow for different capacities in kvm_mmu_memory_cache structs
` [PATCH v3 21/23] KVM: Allow GFP flags to be passed when topping up MMU caches
` [PATCH v3 22/23] KVM: x86/mmu: Support Eager Page Splitting in the shadow MMU
` [PATCH v3 23/23] KVM: selftests: Map x86_64 guest virtual memory with huge pages
[PATCH v6 60/64] KVM: arm64: nv: Sync nested timer state with ARMv8.4
2022-04-01 17:51 UTC (2+ messages)
[PATCH 0/2] Dirtying, failing memop: don't indicate suppression
2022-04-01 17:40 UTC (5+ messages)
` [PATCH 1/2] KVM: s390: Don't indicate suppression on dirtying, failing memop
` [PATCH 2/2] KVM: s390: selftest: Test suppression indication on key prot exception
[PATCH v2 0/5] x86: uaccess CMPXCHG + KVM bug fixes
2022-04-01 17:07 UTC (2+ messages)
[PATCH v9 00/18] KVM: s390: pv: implement lazy destroy for reboot
2022-04-01 15:13 UTC (13+ messages)
` [PATCH v9 01/18] KVM: s390: pv: leak the topmost page table when destroy fails
` [PATCH v9 04/18] KVM: s390: pv: refactor s390_reset_acc
` [PATCH v9 11/18] s390/mm: KVM: pv: when tearing down, try to destroy protected pages
` [PATCH v9 13/18] KVM: s390: pv: cleanup leftover protected VMs if needed
[PATCH AUTOSEL 5.10 44/65] tuntap: add sanity checks about msg_controllen in sendmsg
2022-04-01 14:41 UTC
[PATCH AUTOSEL 5.16 042/109] KVM: arm64: Do not change the PMU event filter after a VCPU has run
2022-04-01 14:32 UTC (3+ messages)
` [PATCH AUTOSEL 5.16 063/109] vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
` [PATCH AUTOSEL 5.16 079/109] tuntap: add sanity checks about msg_controllen in sendmsg
[PATCH AUTOSEL 5.4 26/37] tuntap: add sanity checks about msg_controllen in sendmsg
2022-04-01 14:44 UTC
[PATCH AUTOSEL 5.15 52/98] vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
2022-04-01 14:37 UTC (2+ messages)
` [PATCH AUTOSEL 5.15 68/98] tuntap: add sanity checks about msg_controllen in sendmsg
[PATCH AUTOSEL 5.17 052/149] kvm: selftests: aarch64: fix assert in gicv3_access_reg
2022-04-01 14:25 UTC (8+ messages)
` [PATCH AUTOSEL 5.17 053/149] kvm: selftests: aarch64: pass vgic_irq guest args as a pointer
` [PATCH AUTOSEL 5.17 054/149] kvm: selftests: aarch64: fix the failure check in kvm_set_gsi_routing_irqchip_check
` [PATCH AUTOSEL 5.17 055/149] kvm: selftests: aarch64: fix some vgic related comments
` [PATCH AUTOSEL 5.17 056/149] kvm: selftests: aarch64: use a tighter assert in vgic_poke_irq()
` [PATCH AUTOSEL 5.17 059/149] KVM: arm64: Do not change the PMU event filter after a VCPU has run
` [PATCH AUTOSEL 5.17 092/149] vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
` [PATCH AUTOSEL 5.17 114/149] tuntap: add sanity checks about msg_controllen in sendmsg
[PATCH] KVM: MMU: fix an IS_ERR() vs NULL bug
2022-04-01 14:06 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).