kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-07-20 08:58:09 to 2023-07-21 20:21:02 UTC [more...]

[PATCH v4 00/19] x86/reboot: KVM: Clean up "emergency" virt code
 2023-07-21 20:18 UTC  (18+ messages)
` [PATCH v4 01/19] x86/reboot: VMCLEAR active VMCSes before emergency reboot
` [PATCH v4 02/19] x86/reboot: Harden virtualization hooks for "
` [PATCH v4 03/19] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
` [PATCH v4 04/19] x86/reboot: KVM: Disable SVM during reboot via virt/KVM "
` [PATCH v4 05/19] x86/reboot: Assert that IRQs are disabled when turning off virtualization
` [PATCH v4 06/19] x86/reboot: Hoist "disable virt" helpers above "emergency reboot" path
` [PATCH v4 07/19] x86/reboot: Disable virtualization during reboot iff callback is registered
` [PATCH v4 08/19] x86/reboot: Expose VMCS crash hooks if and only if KVM_{INTEL,AMD} is enabled
` [PATCH v4 09/19] x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
` [PATCH v4 10/19] x86/virt: KVM: Move VMXOFF helpers into "
` [PATCH v4 11/19] KVM: SVM: Make KVM_AMD depend on CPU_SUP_AMD or CPU_SUP_HYGON
` [PATCH v4 12/19] x86/virt: Drop unnecessary check on extended CPUID level in cpu_has_svm()
` [PATCH v4 13/19] x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()
` [PATCH v4 14/19] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
` [PATCH v4 15/19] KVM: VMX: Ensure CPU is stable when probing basic VMX support
` [PATCH v4 16/19] x86/virt: KVM: Move "disable SVM" helper into KVM SVM
` [PATCH v4 17/19] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash

[PATCH v2 0/2] Prevent RESV_DIRECT devices from user assignment
 2023-07-21 19:35 UTC  (7+ messages)
` [PATCH v2 1/2] iommu: Prevent RESV_DIRECT devices from blocking domains
` [PATCH v2 2/2] iommu/vt-d: Remove rmrr check in domain attaching device path

[PATCH v3 0/5] Invalidate secondary IOMMU TLB on permission upgrade
 2023-07-21 19:31 UTC  (13+ messages)
` [PATCH v3 1/5] arm64/smmu: Use TLBI ASID when invalidating entire range
` [PATCH v3 2/5] mmu_notifiers: Fixup comment in mmu_interval_read_begin()
` [PATCH v3 3/5] mmu_notifiers: Call invalidate_range() when invalidating TLBs
` [PATCH v3 4/5] mmu_notifiers: Don't invalidate secondary TLBs as part of mmu_notifier_invalidate_range_end()
` [PATCH v3 5/5] mmu_notifiers: Rename invalidate_range notifier

KVM's sloppiness wrt IA32_SPEC_CTRL and IA32_PRED_CMD
 2023-07-21 19:18 UTC  (11+ messages)

[PATCH] KVM: SVM: Update destination when updating pi irte
 2023-07-21 18:44 UTC  (8+ messages)

[RFC PATCH v4 00/10] KVM: guest_memfd(), X86: Common base for SNP and TDX (was KVM: guest memory: Misc enhancement)
 2023-07-21 18:43 UTC  (15+ messages)
` [RFC PATCH v4 01/10] KVM: x86: Add is_vm_type_supported callback
` [RFC PATCH v4 02/10] KVM: x86/mmu: Guard against collision with KVM-defined PFERR_IMPLICIT_ACCESS
` [RFC PATCH v4 03/10] KVM: x86/mmu: Pass around full 64-bit error code for the KVM page fault
` [RFC PATCH v4 04/10] KVM: x86: Introduce PFERR_GUEST_ENC_MASK to indicate fault is private
` [RFC PATCH v4 05/10] KVM: Add new members to struct kvm_gfn_range to operate on
` [RFC PATCH v4 06/10] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
` [RFC PATCH v4 07/10] KVM: x86: Add gmem hook for initializing private memory
` [RFC PATCH v4 08/10] KVM: x86: Add gmem hook for invalidating "
` [RFC PATCH v4 09/10] KVM: x86: Make struct sev_cmd common for KVM_MEM_ENC_OP
` [RFC PATCH v4 10/10] KVM: X86: KVM_MEM_ENC_OP check if unused field (flags, error) is zero

[PATCH v6 0/6] Enable writable for idregs DFR0,PFR0, MMFR{0,1,2, 3}
 2023-07-21 18:22 UTC  (8+ messages)
` [PATCH v6 3/6] KVM: arm64: Enable writable for ID_AA64DFR0_EL1 and ID_DFR0_EL1

[RFC PATCH v2 00/20] context_tracking,x86: Defer some IPIs until a user->kernel transition
 2023-07-21 18:15 UTC  (31+ messages)
` [RFC PATCH v2 01/20] tracing/filters: Dynamically allocate filter_pred.regex
` [RFC PATCH v2 02/20] tracing/filters: Enable filtering a cpumask field by another cpumask
` [RFC PATCH v2 03/20] tracing/filters: Enable filtering a scalar field by a cpumask
` [RFC PATCH v2 04/20] tracing/filters: Enable filtering the CPU common "
` [RFC PATCH v2 05/20] tracing/filters: Optimise cpumask vs cpumask filtering when user mask is a single CPU
` [RFC PATCH v2 06/20] tracing/filters: Optimise scalar vs cpumask filtering when the "
` [RFC PATCH v2 07/20] tracing/filters: Optimise CPU "
` [RFC PATCH v2 08/20] tracing/filters: Further optimise scalar vs cpumask comparison
` [RFC PATCH v2 09/20] tracing/filters: Document cpumask filtering
` [RFC PATCH v2 10/20] jump_label,module: Don't alloc static_key_mod for __ro_after_init keys
` [RFC PATCH v2 11/20] objtool: Flesh out warning related to pv_ops[] calls
` [RFC PATCH v2 12/20] objtool: Warn about non __ro_after_init static key usage in .noinstr
` [RFC PATCH v2 13/20] context_tracking: Make context_tracking_key __ro_after_init
` [RFC PATCH v2 14/20] x86/kvm: Make kvm_async_pf_enabled __ro_after_init
` [RFC PATCH v2 15/20] context-tracking: Introduce work deferral infrastructure
` [RFC PATCH v2 16/20] rcu: Make RCU dynticks counter size configurable
` [RFC PATCH v2 17/20] rcutorture: Add a test config to torture test low RCU_DYNTICKS width
` [RFC PATCH v2 18/20] context_tracking,x86: Defer kernel text patching IPIs
` [RFC PATCH v2 19/20] context_tracking,x86: Add infrastructure to defer kernel TLBI
` [RFC PATCH v2 20/20] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs

[RFC PATCH v11 00/29] KVM: guest_memfd() and per-page attributes
 2023-07-21 17:50 UTC  (36+ messages)
` [RFC PATCH v11 01/29] KVM: Wrap kvm_gfn_range.pte in a per-action union
` [RFC PATCH v11 06/29] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
` [RFC PATCH v11 08/29] KVM: Introduce per-page memory attributes
` [RFC PATCH v11 09/29] KVM: x86: Disallow hugepages when memory attributes are mixed
` [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
` [RFC PATCH v11 13/29] KVM: Add transparent hugepage support for dedicated guest memory
` [RFC PATCH v11 14/29] KVM: x86/mmu: Handle page fault for private memory
` [RFC PATCH v11 15/29] KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro
` [RFC PATCH v11 16/29] KVM: Allow arch code to track number of memslot address spaces per VM
` [RFC PATCH v11 18/29] KVM: selftests: Drop unused kvm_userspace_memory_region_find() helper

[PATCH v6 3/5] target/riscv: Create an KVM AIA irqchip
 2023-07-21 17:41 UTC  (2+ messages)

Deadlock due to EPT_VIOLATION
 2023-07-21 17:37 UTC  (3+ messages)

[PATCH RFC v9 00/51] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-07-21 16:56 UTC  (8+ messages)
` [PATCH RFC v9 08/51] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled

[PATCH v10 0/9] Linear Address Masking (LAM) KVM Enabling
 2023-07-21 15:03 UTC  (5+ messages)
` [PATCH v10 2/9] KVM: x86: Add & use kvm_vcpu_is_legal_cr3() to check CR3's legality

[PATCH v2 0/6] KVM: s390: interrupt: Fix stepping into interrupt handlers
 2023-07-21 14:23 UTC  (8+ messages)
` [PATCH v2 1/6] KVM: s390: interrupt: Fix single-stepping "
` [PATCH v2 2/6] KVM: s390: interrupt: Fix single-stepping into program "
` [PATCH v2 3/6] KVM: s390: interrupt: Fix single-stepping kernel-emulated instructions
` [PATCH v2 4/6] KVM: s390: interrupt: Fix single-stepping userspace-emulated instructions
` [PATCH v2 5/6] KVM: s390: interrupt: Fix single-stepping ISKE
` [PATCH v2 6/6] KVM: s390: selftests: Add selftest for single-stepping

[PATCH v2] accel/kvm: Specify default IPA size for arm64
 2023-07-21 12:28 UTC  (3+ messages)

[PATCH v21 00/20] s390x: CPU Topology
 2023-07-21 11:24 UTC  (4+ messages)
` [PATCH v21 01/20] s390x/cpu topology: add s390 specifics to CPU topology

[PATCH v12 vfio 0/7] pds-vfio-pci driver
 2023-07-21  9:15 UTC  (9+ messages)
` [PATCH v12 vfio 1/7] vfio: Commonize combine_ranges for use in other VFIO drivers
` [PATCH v12 vfio 2/7] vfio/pds: Initial support for pds VFIO driver
` [PATCH v12 vfio 3/7] vfio/pds: register with the pds_core PF
` [PATCH v12 vfio 4/7] vfio/pds: Add VFIO live migration support

[PATCH v4 00/20] Enable CET Virtualization
 2023-07-21  3:03 UTC  (21+ messages)
` [PATCH v4 01/20] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v4 02/20] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v4 03/20] KVM:x86: Report XSS as to-be-saved if there are supported features
` [PATCH v4 04/20] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
` [PATCH v4 05/20] KVM:x86: Initialize kvm_caps.supported_xss
` [PATCH v4 06/20] KVM:x86: Load guest FPU state when access XSAVE-managed MSRs
` [PATCH v4 07/20] KVM:x86: Add fault checks for guest CR4.CET setting
` [PATCH v4 08/20] KVM:x86: Report KVM supported CET MSRs as to-be-saved
` [PATCH v4 09/20] KVM:x86: Add common code of CET MSR access
` [PATCH v4 10/20] KVM:x86: Make guest supervisor states as non-XSAVE managed
` [PATCH v4 11/20] KVM:x86: Save and reload GUEST_SSP to/from SMRAM
` [PATCH v4 12/20] KVM:VMX: Introduce CET VMCS fields and control bits
` [PATCH v4 13/20] KVM:VMX: Emulate read and write to CET MSRs
` [PATCH v4 14/20] KVM:VMX: Set up interception for "
` [PATCH v4 15/20] KVM:VMX: Save host MSR_IA32_S_CET to VMCS field
` [PATCH v4 16/20] KVM:x86: Optimize CET supervisor SSP save/reload
` [PATCH v4 17/20] KVM:x86: Enable CET virtualization for VMX and advertise to userspace
` [PATCH v4 18/20] KVM:x86: Enable guest CET supervisor xstate bit support
` [PATCH v4 19/20] KVM:nVMX: Refine error code injection to nested VM
` [PATCH v4 20/20] KVM:nVMX: Enable CET support for "

[PATCH net-next v3 0/4] vsock/virtio/vhost: MSG_ZEROCOPY preparations
 2023-07-21  5:09 UTC  (6+ messages)
` [PATCH net-next v3 1/4] vsock/virtio/vhost: read data from non-linear skb
` [PATCH net-next v3 2/4] vsock/virtio: support to send "
` [PATCH net-next v3 3/4] vsock/virtio: non-linear skb handling for tap
` [PATCH net-next v3 4/4] vsock/virtio: MSG_ZEROCOPY flag support

[PATCH] x86/cpu: Enable STIBP if Automatic IBRS is enabled
 2023-07-20 21:53 UTC  (3+ messages)

[PATCH kernel 0/9] KVM: SEV: Enable AMD SEV-ES DebugSwap
 2023-07-20 19:01 UTC  (7+ messages)
` [PATCH kernel 0/9 v6] "

[PATCH v2] KVM: arm64: Fix hardware enable/disable flows for pKVM
 2023-07-20 17:19 UTC  (3+ messages)

[PATCH v3 1/2] kvm/vfio: ensure kvg instance stays around in kvm_vfio_group_add()
 2023-07-20 17:10 UTC  (6+ messages)
` [PATCH v3 2/2] kvm/vfio: avoid bouncing the mutex when adding and deleting groups

[PATCH kvmtool v2 0/3] Align value generated by get_ram_size() to the host's page size
 2023-07-20 16:04 UTC  (2+ messages)

[kvmtool PATCH v4 0/9] RISC-V SBI enable/disable, Zbb, Zicboz, and Ssaia support
 2023-07-20 16:04 UTC  (2+ messages)

[PATCH kvmtool] virtio-net: Don't print the compat warning for the default device
 2023-07-20 16:04 UTC  (2+ messages)

[RFC PATCH] KVM:selftests: Add selftests for CET MSRs
 2023-07-20 12:04 UTC 

[kvm-unit-tests PATCH] x86:VMX: Fixup for VMX test failures
 2023-07-20 11:58 UTC 

[Bug 217688] New: Guest call trace during boot
 2023-07-20 14:48 UTC  (2+ messages)
` [Bug 217688] "

[PATCH v2 0/4] Enable CET userspace support
 2023-07-20 11:14 UTC  (5+ messages)
` [PATCH v2 1/4] target/i386: Enable XSAVES support for CET states
` [PATCH v2 2/4] target/i386: Add CET MSRs access interface
` [PATCH v2 3/4] target/i386: Add CET states to vmstate
` [PATCH v2 4/4] target/i386: Advertise CET related flags in feature words

[kvm-unit-tests PATCH v1 0/2] arm64: Define name for the original RES1 bit but now functinal bit
 2023-07-20 11:58 UTC  (7+ messages)
` [kvm-unit-tests PATCH v1 1/2] arm64: Replace the SCTLR_EL1 filed definition by _BITUL()
` [kvm-unit-tests PATCH v1 2/2] arm64: Define name for the bits used in SCTLR_EL1_RES1

[PATCH v5 0/6] KVM: selftests: Improve PMU event filter settings and add test cases
 2023-07-20 11:47 UTC  (7+ messages)
` [PATCH v5 1/6] KVM: selftests: Add x86 properties for Intel PMU in processor.h
` [PATCH v5 2/6] KVM: selftests: Drop the return of remove_event()
` [PATCH v5 3/6] KVM: selftests: Introduce __kvm_pmu_event_filter to improved event filter settings
` [PATCH v5 4/6] KVM: selftests: Add test cases for unsupported PMU event filter input values
` [PATCH v5 5/6] KVM: selftests: Test if event filter meets expectations on fixed counters
` [PATCH v5 6/6] KVM: selftests: Test gp event filters don't affect fixed event filters

[PATCH v3 00/21] Enable CET Virtualization
 2023-07-20 10:46 UTC  (14+ messages)

[PATCH v3 0/9] PCI/VGA: Improve the default VGA device selection
 2023-07-20  9:17 UTC  (2+ messages)

[PATCH RESEND] accel/kvm: Specify default IPA size for arm64
 2023-07-20  8:45 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).