public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2022-04-07 16:53:12 to 2022-04-09 05:01:48 UTC [more...]

[kvm:queue 19/54] arch/x86/kvm/mmu/paging_tmpl.h:532:8: error: use of undeclared identifier 'EPT_VIOLATION_RWX_SHIFT'
 2022-04-09  4:51 UTC 

[GIT PULL] KVM/riscv fixes for 5.18, take #1
 2022-04-09  4:30 UTC 

[PATCH] RISC-V: KVM: include missing hwcap.h into vcpu_fp
 2022-04-09  3:51 UTC  (2+ messages)

[PATCH 0/4] kvm: minor fixes and cleanups
 2022-04-09  2:12 UTC  (3+ messages)

[PATCH RESEND] KVM: x86/pmu: Update AMD PMC sample period to fix guest NMI-watchdog
 2022-04-09  1:52 UTC 

[PATCH v3 00/23] KVM: Extend Eager Page Splitting to the shadow MMU
 2022-04-09  0:39 UTC  (7+ messages)
` [PATCH v3 02/23] KVM: x86/mmu: Use a bool for direct
` [PATCH v3 16/23] KVM: x86/mmu: Cache the access bits of shadowed translations
` [PATCH v3 22/23] KVM: x86/mmu: Support Eager Page Splitting in the shadow MMU

[PATCH 0/6] KVM: x86: Apply NX mitigation more precisely
 2022-04-09  0:38 UTC  (7+ messages)
` [PATCH 1/6] KVM: x86/mmu: Tag disallowed NX huge pages even if they're not tracked
` [PATCH 2/6] KVM: x86/mmu: Properly account NX huge page workaround for nonpaging MMUs
` [PATCH 3/6] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
` [PATCH 4/6] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
` [PATCH 5/6] KVM: x86/mmu: Add helper to convert SPTE value to its shadow page
` [PATCH 6/6] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()

[RFC PATCH v5 000/104] KVM TDX basic feature support
 2022-04-08 23:34 UTC  (76+ messages)
` [RFC PATCH v5 003/104] KVM: TDX: Detect CPU feature on kernel module initialization
` [RFC PATCH v5 020/104] KVM: TDX: allocate per-package mutex
` [RFC PATCH v5 024/104] KVM: TDX: create/destroy VM structure
` [RFC PATCH v5 025/104] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [RFC PATCH v5 026/104] KVM: TDX: x86: Add vm ioctl to get TDX systemwide parameters
` [RFC PATCH v5 027/104] KVM: TDX: initialize VM with TDX specific parameters
` [RFC PATCH v5 037/104] KVM: x86/mmu: Allow non-zero init value for shadow PTE
` [RFC PATCH v5 042/104] KVM: x86/mmu: Track shadow MMIO value/mask on a per-VM basis
` [RFC PATCH v5 047/104] KVM: x86/mmu: add a private pointer to struct kvm_mmu_page
` [RFC PATCH v5 075/104] KVM: x86: Check for pending APICv interrupt in kvm_vcpu_has_events()
` [RFC PATCH v5 076/104] KVM: x86: Add option to force LAPIC expiration wait
` [RFC PATCH v5 083/104] KVM: x86: Split core of hypercall emulation to helper function
` [RFC PATCH v5 089/104] KVM: TDX: Add a placeholder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [RFC PATCH v5 091/104] KVM: TDX: Handle TDX PV CPUID hypercall
` [RFC PATCH v5 092/104] KVM: TDX: Handle TDX PV HLT hypercall
` [RFC PATCH v5 101/104] KVM: TDX: Silently ignore INIT/SIPI
` [RFC PATCH v5 102/104] KVM: TDX: Add methods to ignore accesses to CPU state

[PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
 2022-04-08 21:35 UTC  (30+ messages)
` [PATCH v5 02/13] mm: Introduce memfile_notifier
` [PATCH v5 04/13] mm/shmem: Restrict MFD_INACCESSIBLE memory against RLIMIT_MEMLOCK
` [PATCH v5 05/13] KVM: Extend the memslot to support fd-based private memory
` [PATCH v5 06/13] KVM: Use kvm_userspace_memory_region_ext
` [PATCH v5 07/13] KVM: Add KVM_EXIT_MEMORY_ERROR exit
` [PATCH v5 08/13] KVM: Use memfile_pfn_ops to obtain pfn for private pages
` [PATCH v5 11/13] KVM: Zap existing KVM mappings when pages changed in the private fd

[PATCH v2 0/2] KVM: x86: Replace magic number with readable macro
 2022-04-08 21:32 UTC  (5+ messages)
` [PATCH v2 2/2] KVM: x86/mmu: Derive EPT violation RWX bits from EPTE RWX bits

[PATCH] KVM: x86/tdp_mmu: extract tdp_mmu_populate_nonleaf()
 2022-04-08 21:20 UTC 

[PATCH] KVM: VMX: Fix header file dependency of asm/vmx.h
 2022-04-08 21:07 UTC  (4+ messages)

[RFC V1 PATCH 0/5] selftests: KVM: selftests for fd-based approach of supporting private memory
 2022-04-08 21:05 UTC  (6+ messages)
` [RFC V1 PATCH 1/5] x86: kvm: HACK: Allow testing of priv memfd approach
` [RFC V1 PATCH 2/5] selftests: kvm: Fix inline assembly for hypercall
` [RFC V1 PATCH 3/5] selftests: kvm: Add a basic selftest to test private memory
` [RFC V1 PATCH 4/5] selftests: kvm: priv_memfd_test: Add support for memory conversion
` [RFC V1 PATCH 5/5] selftests: kvm: priv_memfd_test: Add shared access test

[PATCH] KVM: VMX: More brown paper bags! NOM NOM NOM
 2022-04-08 20:28 UTC 

[PATCH v8 00/11] Fix BUG_ON in vfio_iommu_group_notifier()
 2022-04-08 20:24 UTC  (11+ messages)

[PATCH v3 00/11] KVM: x86: Add a cap to disable NX hugepages on a VM
 2022-04-08 19:51 UTC  (10+ messages)
` [PATCH v3 02/11] KVM: selftests: Dump VM stats in binary stats test
` [PATCH v3 06/11] KVM: selftests: Add NX huge pages test
` [PATCH v3 11/11] selftests: KVM: Test disabling NX hugepages on a VM

[PATCH] KVM: x86/mmu: Speed up slot_rmap_walk_next for sparsely populated rmaps
 2022-04-08 19:31 UTC  (5+ messages)

[PATCH v2] KVM: x86/mmu: Update number of zapped pages even if page list is stable
 2022-04-08 19:31 UTC  (2+ messages)

Unexport of kvm_x86_ops vs tracer modules
 2022-04-08 18:06 UTC  (3+ messages)

[PATCH v2 0/4] Make the iommu driver no-snoop block feature consistent
 2022-04-08 17:44 UTC  (27+ messages)
` [PATCH v2 1/4] iommu: Introduce the domain op enforce_cache_coherency()
` [PATCH v2 2/4] vfio: Move the Intel no-snoop control off of IOMMU_CACHE
` [PATCH v2 3/4] iommu: Redefine IOMMU_CAP_CACHE_COHERENCY as the cap flag for IOMMU_CACHE
` [PATCH v2 4/4] vfio: Require that devices support DMA cache coherence

[PATCH v5 00/10] KVM: arm64: Add support for hypercall services selection
 2022-04-08 17:34 UTC  (6+ messages)
` [PATCH v5 02/10] KVM: arm64: Setup a framework for hypercall bitmap firmware registers

[PATCH] vfio/pci: Fix vf_token mechanism when device-specific VF drivers are used
 2022-04-08 17:17 UTC  (4+ messages)

[PATCH v2] KVM: SVM: Do not activate AVIC for SEV-enabled guest
 2022-04-08 17:02 UTC  (3+ messages)

[PATCH v4.1] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
 2022-04-08 17:01 UTC  (7+ messages)

[PATCH 0/3] KVM: x86: Nested fixes (mostly #DF/#TF)
 2022-04-08 16:50 UTC  (2+ messages)

[PATCH v3.1 0/4] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
 2022-04-08 16:49 UTC  (2+ messages)

[PATCH] x86/kvm: Don't waste kvmclock memory if there is nopv parameter
 2022-04-08 16:47 UTC  (3+ messages)

[PATCH] kvm: vmx: remove redundant parentheses
 2022-04-08 16:46 UTC  (2+ messages)

[PATCH] kvm: x86: Adjust the location of pkru_mask of kvm_mmu to reduce memory
 2022-04-08 16:46 UTC  (2+ messages)

[PATCH v7 0/8] IPI virtualization support for VM
 2022-04-08 16:41 UTC  (6+ messages)
` [PATCH v7 8/8] KVM: VMX: enable IPI virtualization

[PATCH v2] KVM: x86: hyper-v: Avoid writing to TSC page without an active vCPU
 2022-04-08 16:35 UTC  (2+ messages)

[GIT PULL] KVM/arm64 fixes for 5.18, take #1
 2022-04-08 16:31 UTC  (2+ messages)

[PATCH v3] KVM: SEV: Mark nested locking of vcpu->lock
 2022-04-08 15:08 UTC  (3+ messages)

[PATCH 1/2] x86/cpufeatures: Add virtual TSC_AUX feature bit
 2022-04-08 14:49 UTC  (4+ messages)
` [PATCH 2/2] KVM: SVM: Disable RDTSCP and TSC_AUX MSR intercepts when V_TSC_AUX is present

[kvm-unit-tests PATCH 0/9] SMP Support for x86 UEFI Tests
 2022-04-08 14:35 UTC  (11+ messages)
` [kvm-unit-tests PATCH 1/9] x86: Move ap_init() to smp.c
` [kvm-unit-tests PATCH 2/9] x86: Move load_idt() to desc.c
` [kvm-unit-tests PATCH 3/9] x86: desc: Split IDT entry setup into a generic helper
` [kvm-unit-tests PATCH 4/9] x86: efi, smp: Transition APs from 16-bit to 32-bit mode
` [kvm-unit-tests PATCH 5/9] x86: Move 32-bit bringup routines to start32.S
` [kvm-unit-tests PATCH 6/9] x86: efi, smp: Transition APs from 32-bit to 64-bit mode
` [kvm-unit-tests PATCH 7/9] x86: Move load_gdt_tss() to desc.c
` [kvm-unit-tests PATCH 8/9] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
` [kvm-unit-tests PATCH 9/9] x86: setup: Serialize ap_start64 with a spinlock

[PATCH v6 0/4] x86/tests: Add tests for AMD SEV-ES #VC handling
 2022-04-08 13:44 UTC  (3+ messages)
` [PATCH v6 1/4] "

[PATCH v5 00/21] KVM: s390: enable zPCI for interpretive execution
 2022-04-08 12:48 UTC  (8+ messages)
` [PATCH v5 14/21] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
` [PATCH v5 15/21] KVM: s390: pci: add routines to start/stop interpretive execution
` [PATCH v5 16/21] KVM: vfio: add s390x hook to register KVM guest designation

[PATCH] KVM: SVM: Do not activate AVIC for SEV-enabled guest
 2022-04-08 12:04 UTC  (2+ messages)

[PATCH] KVM: x86/mmu: remove unnecessary kvm_shadow_root_allocated() check
 2022-04-08 10:10 UTC  (2+ messages)

[RFC PATCH 00/47] Address Space Isolation for KVM
 2022-04-08  8:52 UTC  (6+ messages)

[kvm-unit-tests PATCH v3 00/11] Add #VC exception handling for AMD SEV-ES
 2022-04-08  7:43 UTC  (7+ messages)
` [kvm-unit-tests PATCH v3 04/11] lib: x86: Import insn decoder from Linux
` [kvm-unit-tests PATCH v3 11/11] x86: AMD SEV-ES: Handle string IO for IOIO #VC

[PATCH][v2] KVM: VMX: optimize pi_wakeup_handler
 2022-04-08  2:50 UTC  (2+ messages)

[PATCH v5 0/3] Introduce Notify VM exit
 2022-04-08  2:48 UTC  (7+ messages)
` [PATCH v5 1/3] KVM: X86: Save&restore the triple fault request

[PATCH v3 00/13] KVM: selftests: Add aarch64/page_fault_test
 2022-04-08  0:41 UTC  (14+ messages)
` [PATCH v3 01/13] KVM: selftests: Add a userfaultfd library
` [PATCH v3 02/13] KVM: selftests: aarch64: Add vm_get_pte_gpa library function
` [PATCH v3 03/13] KVM: selftests: Add vm_alloc_page_table_in_memslot "
` [PATCH v3 04/13] KVM: selftests: aarch64: Export _virt_pg_map with a pt_memslot arg
` [PATCH v3 05/13] KVM: selftests: Add missing close and munmap in __vm_mem_region_delete
` [PATCH v3 06/13] KVM: selftests: Add vm_mem_region_get_src_fd library function
` [PATCH v3 07/13] KVM: selftests: aarch64: Construct DEFAULT_MAIR_EL1 using sysreg.h macros
` [PATCH v3 08/13] tools: Copy bitfield.h from the kernel sources
` [PATCH v3 09/13] KVM: selftests: aarch64: Add aarch64/page_fault_test
` [PATCH v3 10/13] KVM: selftests: aarch64: Add userfaultfd tests into page_fault_test
` [PATCH v3 11/13] KVM: selftests: aarch64: Add dirty logging "
` [PATCH v3 12/13] KVM: selftests: aarch64: Add readonly memslot "
` [PATCH v3 13/13] KVM: selftests: aarch64: Add mix of "

[PATCH v2 0/5] KVM: X86: Scaling Guest OS Critical Sections with boosting
 2022-04-07 23:58 UTC  (2+ messages)

[PATCH v2 0/4] KVM: arm64: vgic-v3: MMIO-based LPI invalidation and co
 2022-04-07 23:13 UTC  (5+ messages)
` [PATCH v2 1/4] irqchip/gic-v3: Exposes bit values for GICR_CTLR.{IR,CES}
` [PATCH v2 3/4] KVM: arm64: vgic-v3: Implement MMIO-based LPI invalidation

[PATCH 1/5] iommu: Replace uses of IOMMU_CAP_CACHE_COHERENCY with dev_is_dma_coherent()
 2022-04-07 22:37 UTC  (12+ messages)

[PATCH 0/3] KVM: Split huge pages mapped by the TDP MMU on fault
 2022-04-07 20:52 UTC  (4+ messages)
` [PATCH 3/3] KVM: x86/mmu: "

[PATCH v2] KVM: SEV: Mark nested locking of vcpu->mutex
 2022-04-07 19:59 UTC  (3+ messages)

[PATCH v4] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
 2022-04-07 20:18 UTC 

[PATCH v2 0/3] KVM: arm64: Limit feature register reads from AArch32
 2022-04-07 20:12 UTC  (4+ messages)
` [PATCH v2 1/3] KVM: arm64: Wire up CP15 feature registers to their AArch64 equivalents

[PATCH] KVM: x86: hyper-v: Avoid writing to TSC page without an active vCPU
 2022-04-07 19:10 UTC  (3+ messages)

[PATCH v2 00/31] KVM: x86: hyper-v: Fine-grained TLB flush + Direct TLB flush feature
 2022-04-07 18:50 UTC  (19+ messages)
` [PATCH v2 01/31] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
` [PATCH v2 03/31] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
` [PATCH v2 06/31] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
` [PATCH v2 07/31] KVM: x86: hyper-v: Create a separate ring for Direct TLB flush
` [PATCH v2 12/31] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
` [PATCH v2 13/31] KVM: x86: hyper-v: Direct TLB flush
` [PATCH v2 16/31] KVM: nVMX: "
` [PATCH v2 18/31] KVM: nSVM: "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox