kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-07-20 16:33:28 to 2023-07-22 01:24:14 UTC [more...]

[PATCH 0/5] KVM: x86/mmu: Don't synthesize triple fault on bad root
 2023-07-22  1:23 UTC  (5+ messages)
` [PATCH 1/5] KVM: x86/mmu: Add helper to convert root hpa to shadow page
` [PATCH 2/5] KVM: x86/mmu: Harden new PGD against roots without shadow pages
` [PATCH 3/5] KVM: x86/mmu: Harden TDP MMU iteration against root w/o shadow page
` [PATCH 4/5] KVM: x86/mmu: Disallow guest from using !visible slots for page tables

[RFC PATCH v4 00/10] KVM: guest_memfd(), X86: Common base for SNP and TDX (was KVM: guest memory: Misc enhancement)
 2023-07-22  0:52 UTC  (17+ messages)
` [RFC PATCH v4 01/10] KVM: x86: Add is_vm_type_supported callback
` [RFC PATCH v4 02/10] KVM: x86/mmu: Guard against collision with KVM-defined PFERR_IMPLICIT_ACCESS
` [RFC PATCH v4 03/10] KVM: x86/mmu: Pass around full 64-bit error code for the KVM page fault
` [RFC PATCH v4 04/10] KVM: x86: Introduce PFERR_GUEST_ENC_MASK to indicate fault is private
` [RFC PATCH v4 05/10] KVM: Add new members to struct kvm_gfn_range to operate on
` [RFC PATCH v4 06/10] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
` [RFC PATCH v4 07/10] KVM: x86: Add gmem hook for initializing private memory
` [RFC PATCH v4 08/10] KVM: x86: Add gmem hook for invalidating "
` [RFC PATCH v4 09/10] KVM: x86: Make struct sev_cmd common for KVM_MEM_ENC_OP
` [RFC PATCH v4 10/10] KVM: X86: KVM_MEM_ENC_OP check if unused field (flags, error) is zero

[PATCH 0/2] KVM: VMX: Make VMREAD error trampoline noinstr friendly
 2023-07-21 23:56 UTC  (3+ messages)
` [PATCH 1/2] KVM: VMX: Make VMREAD error path play nice with noinstr
` [PATCH 2/2] KVM: VMX: Use vmread_error() to report VM-Fail in "goto" path

[PATCH] KVM: VMX: Drop manual TLB flush when migrating vmcs.APIC_ACCESS_ADDR
 2023-07-21 23:38 UTC 

[PATCH v2 0/9] KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
 2023-07-21 23:00 UTC  (10+ messages)
` [PATCH v2 1/9] KVM: x86/mmu: Delete rmap_printk() and all its usage
` [PATCH v2 2/9] KVM: x86/mmu: Delete the "dbg" module param
` [PATCH v2 3/9] KVM: x86/mmu: Rename MMU_WARN_ON() to KVM_MMU_WARN_ON()
` [PATCH v2 4/9] KVM: x86/mmu: Convert "runtime" WARN_ON() assertions to WARN_ON_ONCE()
` [PATCH v2 5/9] KVM: x86/mmu: Bug the VM if a vCPU ends up in long mode without PAE enabled
` [PATCH v2 6/9] KVM: x86/mmu: Replace MMU_DEBUG with proper KVM_PROVE_MMU Kconfig
` [PATCH v2 7/9] KVM: x86/mmu: Use BUILD_BUG_ON_INVALID() for KVM_MMU_WARN_ON() stub
` [PATCH v2 8/9] KVM: x86/mmu: Plumb "struct kvm" all the way to pte_list_remove()
` [PATCH v2 9/9] KVM: x86/mmu: BUG() in rmap helpers iff CONFIG_BUG_ON_DATA_CORRUPTION=y

[PATCH 0/2] KVM: x86: Acquire SRCU in fastpath handler
 2023-07-21 22:43 UTC  (3+ messages)
` [PATCH 1/2] KVM: x86: Acquire SRCU read lock when handling fastpath MSR writes
` [PATCH 2/2] Revert "KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid"

[PATCH] KVM: x86/mmu: Guard against collision with KVM-defined PFERR_IMPLICIT_ACCESS
 2023-07-21 22:37 UTC 

[PATCH] selftests/rseq: Play nice with binaries statically linked against glibc 2.35+
 2023-07-21 22:33 UTC 

[RFC PATCH v11 00/29] KVM: guest_memfd() and per-page attributes
 2023-07-21 22:33 UTC  (36+ messages)
` [RFC PATCH v11 01/29] KVM: Wrap kvm_gfn_range.pte in a per-action union
` [RFC PATCH v11 06/29] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
` [RFC PATCH v11 08/29] KVM: Introduce per-page memory attributes
` [RFC PATCH v11 09/29] KVM: x86: Disallow hugepages when memory attributes are mixed
` [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
` [RFC PATCH v11 13/29] KVM: Add transparent hugepage support for dedicated guest memory
` [RFC PATCH v11 14/29] KVM: x86/mmu: Handle page fault for private memory
` [RFC PATCH v11 15/29] KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro
` [RFC PATCH v11 16/29] KVM: Allow arch code to track number of memslot address spaces per VM
` [RFC PATCH v11 18/29] KVM: selftests: Drop unused kvm_userspace_memory_region_find() helper

KVM's sloppiness wrt IA32_SPEC_CTRL and IA32_PRED_CMD
 2023-07-21 22:29 UTC  (12+ messages)

[PATCH v6 0/6] Enable writable for idregs DFR0,PFR0, MMFR{0,1,2, 3}
 2023-07-21 22:26 UTC  (12+ messages)
` [PATCH v6 2/6] KVM: arm64: Reject attempts to set invalid debug arch version
` [PATCH v6 3/6] KVM: arm64: Enable writable for ID_AA64DFR0_EL1 and ID_DFR0_EL1

[PATCH v4 00/19] x86/reboot: KVM: Clean up "emergency" virt code
 2023-07-21 20:18 UTC  (20+ messages)
` [PATCH v4 01/19] x86/reboot: VMCLEAR active VMCSes before emergency reboot
` [PATCH v4 02/19] x86/reboot: Harden virtualization hooks for "
` [PATCH v4 03/19] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
` [PATCH v4 04/19] x86/reboot: KVM: Disable SVM during reboot via virt/KVM "
` [PATCH v4 05/19] x86/reboot: Assert that IRQs are disabled when turning off virtualization
` [PATCH v4 06/19] x86/reboot: Hoist "disable virt" helpers above "emergency reboot" path
` [PATCH v4 07/19] x86/reboot: Disable virtualization during reboot iff callback is registered
` [PATCH v4 08/19] x86/reboot: Expose VMCS crash hooks if and only if KVM_{INTEL,AMD} is enabled
` [PATCH v4 09/19] x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
` [PATCH v4 10/19] x86/virt: KVM: Move VMXOFF helpers into "
` [PATCH v4 11/19] KVM: SVM: Make KVM_AMD depend on CPU_SUP_AMD or CPU_SUP_HYGON
` [PATCH v4 12/19] x86/virt: Drop unnecessary check on extended CPUID level in cpu_has_svm()
` [PATCH v4 13/19] x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()
` [PATCH v4 14/19] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
` [PATCH v4 15/19] KVM: VMX: Ensure CPU is stable when probing basic VMX support
` [PATCH v4 16/19] x86/virt: KVM: Move "disable SVM" helper into KVM SVM
` [PATCH v4 17/19] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
` [PATCH v4 18/19] KVM: SVM: Use "standard" stgi() helper when disabling SVM
` [PATCH v4 19/19] KVM: VMX: Skip VMCLEAR logic during emergency reboots if CR4.VMXE=0

[PATCH v2 0/2] Prevent RESV_DIRECT devices from user assignment
 2023-07-21 19:35 UTC  (7+ messages)
` [PATCH v2 1/2] iommu: Prevent RESV_DIRECT devices from blocking domains
` [PATCH v2 2/2] iommu/vt-d: Remove rmrr check in domain attaching device path

[PATCH v3 0/5] Invalidate secondary IOMMU TLB on permission upgrade
 2023-07-21 19:31 UTC  (13+ messages)
` [PATCH v3 1/5] arm64/smmu: Use TLBI ASID when invalidating entire range
` [PATCH v3 2/5] mmu_notifiers: Fixup comment in mmu_interval_read_begin()
` [PATCH v3 3/5] mmu_notifiers: Call invalidate_range() when invalidating TLBs
` [PATCH v3 4/5] mmu_notifiers: Don't invalidate secondary TLBs as part of mmu_notifier_invalidate_range_end()
` [PATCH v3 5/5] mmu_notifiers: Rename invalidate_range notifier

[PATCH] KVM: SVM: Update destination when updating pi irte
 2023-07-21 18:44 UTC  (8+ messages)

[RFC PATCH v2 00/20] context_tracking,x86: Defer some IPIs until a user->kernel transition
 2023-07-21 18:15 UTC  (30+ messages)
` [RFC PATCH v2 02/20] tracing/filters: Enable filtering a cpumask field by another cpumask
` [RFC PATCH v2 03/20] tracing/filters: Enable filtering a scalar field by a cpumask
` [RFC PATCH v2 04/20] tracing/filters: Enable filtering the CPU common "
` [RFC PATCH v2 05/20] tracing/filters: Optimise cpumask vs cpumask filtering when user mask is a single CPU
` [RFC PATCH v2 06/20] tracing/filters: Optimise scalar vs cpumask filtering when the "
` [RFC PATCH v2 07/20] tracing/filters: Optimise CPU "
` [RFC PATCH v2 08/20] tracing/filters: Further optimise scalar vs cpumask comparison
` [RFC PATCH v2 09/20] tracing/filters: Document cpumask filtering
` [RFC PATCH v2 10/20] jump_label,module: Don't alloc static_key_mod for __ro_after_init keys
` [RFC PATCH v2 11/20] objtool: Flesh out warning related to pv_ops[] calls
` [RFC PATCH v2 12/20] objtool: Warn about non __ro_after_init static key usage in .noinstr
` [RFC PATCH v2 13/20] context_tracking: Make context_tracking_key __ro_after_init
` [RFC PATCH v2 14/20] x86/kvm: Make kvm_async_pf_enabled __ro_after_init
` [RFC PATCH v2 15/20] context-tracking: Introduce work deferral infrastructure
` [RFC PATCH v2 16/20] rcu: Make RCU dynticks counter size configurable
` [RFC PATCH v2 17/20] rcutorture: Add a test config to torture test low RCU_DYNTICKS width
` [RFC PATCH v2 18/20] context_tracking,x86: Defer kernel text patching IPIs
` [RFC PATCH v2 19/20] context_tracking,x86: Add infrastructure to defer kernel TLBI
` [RFC PATCH v2 20/20] x86/mm, mm/vmalloc: Defer flush_tlb_kernel_range() targeting NOHZ_FULL CPUs

[PATCH v6 3/5] target/riscv: Create an KVM AIA irqchip
 2023-07-21 17:41 UTC  (2+ messages)

Deadlock due to EPT_VIOLATION
 2023-07-21 17:37 UTC  (3+ messages)

[PATCH RFC v9 00/51] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-07-21 16:56 UTC  (8+ messages)
` [PATCH RFC v9 08/51] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled

[PATCH v10 0/9] Linear Address Masking (LAM) KVM Enabling
 2023-07-21 15:03 UTC  (5+ messages)
` [PATCH v10 2/9] KVM: x86: Add & use kvm_vcpu_is_legal_cr3() to check CR3's legality

[PATCH v2 0/6] KVM: s390: interrupt: Fix stepping into interrupt handlers
 2023-07-21 14:23 UTC  (8+ messages)
` [PATCH v2 1/6] KVM: s390: interrupt: Fix single-stepping "
` [PATCH v2 2/6] KVM: s390: interrupt: Fix single-stepping into program "
` [PATCH v2 3/6] KVM: s390: interrupt: Fix single-stepping kernel-emulated instructions
` [PATCH v2 4/6] KVM: s390: interrupt: Fix single-stepping userspace-emulated instructions
` [PATCH v2 5/6] KVM: s390: interrupt: Fix single-stepping ISKE
` [PATCH v2 6/6] KVM: s390: selftests: Add selftest for single-stepping

[PATCH v2] accel/kvm: Specify default IPA size for arm64
 2023-07-21 12:28 UTC  (3+ messages)

[PATCH v21 00/20] s390x: CPU Topology
 2023-07-21 11:24 UTC  (4+ messages)
` [PATCH v21 01/20] s390x/cpu topology: add s390 specifics to CPU topology

[PATCH v12 vfio 0/7] pds-vfio-pci driver
 2023-07-21  9:15 UTC  (9+ messages)
` [PATCH v12 vfio 1/7] vfio: Commonize combine_ranges for use in other VFIO drivers
` [PATCH v12 vfio 2/7] vfio/pds: Initial support for pds VFIO driver
` [PATCH v12 vfio 3/7] vfio/pds: register with the pds_core PF
` [PATCH v12 vfio 4/7] vfio/pds: Add VFIO live migration support

[PATCH v4 00/20] Enable CET Virtualization
 2023-07-21  3:03 UTC  (21+ messages)
` [PATCH v4 01/20] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v4 02/20] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v4 03/20] KVM:x86: Report XSS as to-be-saved if there are supported features
` [PATCH v4 04/20] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
` [PATCH v4 05/20] KVM:x86: Initialize kvm_caps.supported_xss
` [PATCH v4 06/20] KVM:x86: Load guest FPU state when access XSAVE-managed MSRs
` [PATCH v4 07/20] KVM:x86: Add fault checks for guest CR4.CET setting
` [PATCH v4 08/20] KVM:x86: Report KVM supported CET MSRs as to-be-saved
` [PATCH v4 09/20] KVM:x86: Add common code of CET MSR access
` [PATCH v4 10/20] KVM:x86: Make guest supervisor states as non-XSAVE managed
` [PATCH v4 11/20] KVM:x86: Save and reload GUEST_SSP to/from SMRAM
` [PATCH v4 12/20] KVM:VMX: Introduce CET VMCS fields and control bits
` [PATCH v4 13/20] KVM:VMX: Emulate read and write to CET MSRs
` [PATCH v4 14/20] KVM:VMX: Set up interception for "
` [PATCH v4 15/20] KVM:VMX: Save host MSR_IA32_S_CET to VMCS field
` [PATCH v4 16/20] KVM:x86: Optimize CET supervisor SSP save/reload
` [PATCH v4 17/20] KVM:x86: Enable CET virtualization for VMX and advertise to userspace
` [PATCH v4 18/20] KVM:x86: Enable guest CET supervisor xstate bit support
` [PATCH v4 19/20] KVM:nVMX: Refine error code injection to nested VM
` [PATCH v4 20/20] KVM:nVMX: Enable CET support for "

[PATCH net-next v3 0/4] vsock/virtio/vhost: MSG_ZEROCOPY preparations
 2023-07-21  5:09 UTC  (6+ messages)
` [PATCH net-next v3 1/4] vsock/virtio/vhost: read data from non-linear skb
` [PATCH net-next v3 2/4] vsock/virtio: support to send "
` [PATCH net-next v3 3/4] vsock/virtio: non-linear skb handling for tap
` [PATCH net-next v3 4/4] vsock/virtio: MSG_ZEROCOPY flag support

[PATCH] x86/cpu: Enable STIBP if Automatic IBRS is enabled
 2023-07-20 21:53 UTC  (3+ messages)

[PATCH kernel 0/9] KVM: SEV: Enable AMD SEV-ES DebugSwap
 2023-07-20 19:01 UTC  (7+ messages)
` [PATCH kernel 0/9 v6] "

[PATCH v2] KVM: arm64: Fix hardware enable/disable flows for pKVM
 2023-07-20 17:19 UTC  (3+ messages)

[PATCH v3 1/2] kvm/vfio: ensure kvg instance stays around in kvm_vfio_group_add()
 2023-07-20 17:10 UTC  (6+ messages)
` [PATCH v3 2/2] kvm/vfio: avoid bouncing the mutex when adding and deleting groups


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).