kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-07-30 22:21:06 to 2019-08-01 14:38:39 UTC [more...]

[patch 0/5] posix-cpu-timers: Move expiry into task work context
 2019-08-01 14:32 UTC  (5+ messages)
` [patch 2/5] x86/kvm: Handle task_work on VMENTER/EXIT
` [patch 3/5] posix-cpu-timers: Split run_posix_cpu_timers()
` [patch 4/5] posix-cpu-timers: Defer timer handling to task_work
` [patch 5/5] x86: Select POSIX_CPU_TIMERS_TASK_WORK

[PATCH 0/5] x86: KVM: svm: get rid of hardcoded instructions lengths
 2019-08-01 14:18 UTC  (7+ messages)
` [PATCH 1/5] x86: KVM: svm: don't pretend to advance RIP in case wrmsr_interception() results in #GP
` [PATCH 2/5] x86: KVM: svm: avoid flooding logs when skip_emulated_instruction() fails
` [PATCH 3/5] x86: KVM: svm: clear interrupt shadow on all paths in skip_emulated_instruction()
` [PATCH 4/5] x86: KVM: add xsetbv to the emulator
` [PATCH 5/5] x86: KVM: svm: remove hardcoded instruction length from intercepts

[PATCH V2 0/9] Fixes for metadata accelreation
 2019-08-01 14:15 UTC  (25+ messages)
` [PATCH V2 1/9] vhost: don't set uaddr for invalid address
` [PATCH V2 2/9] vhost: validate MMU notifier registration
` [PATCH V2 3/9] vhost: fix vhost map leak
` [PATCH V2 4/9] vhost: reset invalidate_count in vhost_set_vring_num_addr()
` [PATCH V2 5/9] vhost: mark dirty pages during map uninit
` [PATCH V2 6/9] vhost: don't do synchronize_rcu() in vhost_uninit_vq_maps()
` [PATCH V2 7/9] vhost: do not use RCU to synchronize MMU notifier with worker
` [PATCH V2 8/9] vhost: correctly set dirty pages in MMU notifiers callback
` [PATCH V2 9/9] vhost: do not return -EAGIAN for non blocking invalidation too early

[PATCH] KVM: selftests: Update gitignore file for latest changes
 2019-08-01 13:58 UTC  (2+ messages)

[PATCH v4 0/5] vsock/virtio: optimizations to increase the throughput
 2019-08-01 13:36 UTC  (13+ messages)
` [PATCH v4 1/5] vsock/virtio: limit the memory used per-socket

[PATCH] KVM: Disable wake-affine vCPU process to mitigate lock holder preemption
 2019-08-01 12:57 UTC  (4+ messages)

[PATCH v19 00/15] arm64: untag user pointers passed to the kernel
 2019-08-01 12:48 UTC  (7+ messages)
` [PATCH v19 02/15] arm64: Introduce prctl() options to control the tagged user addresses ABI

[Bug 204401] New: After a VMexit, the guest is re-entring with a wrong vcpu PC address which is causing the guest to crash
 2019-08-01 12:04 UTC 

[PATCH 00/12] block/bio, fs: convert put_page() to put_user_page*()
 2019-08-01  8:20 UTC  (7+ messages)
` [PATCH 03/12] block: bio_release_pages: use flags arg instead of bool

[PATCH] cpuidle-haltpoll: Enable kvm guest polling when dedicated physical CPUs are available
 2019-08-01  7:06 UTC 

[PATCH 0/3] KVM: X86: Some tracepoint enhancements
 2019-08-01  3:39 UTC  (6+ messages)
` [PATCH 1/3] KVM: X86: Trace vcpu_id for vmexit
` [PATCH 2/3] KVM: X86: Remove tailing newline for tracepoints

[PATCH 1/3] KVM: Don't need to wakeup vCPU twice afer timer fire
 2019-08-01  3:35 UTC  (9+ messages)
` [PATCH 2/3] KVM: Check preempted_in_kernel for involuntary preemption
` [PATCH 3/3] KVM: Fix leak vCPU's VMCS value into other pCPU
  ` [PATCH v2 "

[PATCH v3 1/3] KVM: Fix leak vCPU's VMCS value into other pCPU
 2019-08-01  3:30 UTC  (3+ messages)
` [PATCH v3 2/3] KVM: LAPIC: Don't need to wakeup vCPU twice afer timer fire
` [PATCH v3 3/3] KVM: Check preempted_in_kernel for involuntary preemption

[PATCH RFC 0/5] x86/KVM/svm: get rid of hardcoded instructions lengths
 2019-08-01  0:17 UTC  (15+ messages)
` [PATCH RFC 3/5] x86: KVM: svm: clear interrupt shadow on all paths in skip_emulated_instruction()
` [PATCH RFC 4/5] x86: KVM: add xsetbv to the emulator

[PATCH v5 0/7] s390: vfio-ap: dynamic configuration support
 2019-07-31 22:41 UTC  (8+ messages)
` [PATCH v5 1/7] s390: vfio-ap: Refactor vfio_ap driver probe and remove callbacks
` [PATCH v5 2/7] s390: zcrypt: driver callback to indicate resource in use
` [PATCH v5 3/7] s390: vfio-ap: implement in-use callback for vfio_ap driver
` [PATCH v5 4/7] s390: vfio-ap: allow assignment of unavailable AP resources to mdev device
` [PATCH v5 5/7] s390: vfio-ap: allow hot plug/unplug of AP resources using "
` [PATCH v5 6/7] s390: vfio-ap: add logging to vfio_ap driver
` [PATCH v5 7/7] s390: vfio-ap: update documentation

[PATCH] vfio: re-arrange vfio region definitions
 2019-07-31 21:33 UTC  (4+ messages)

[PATCH v2 1/2] KVM: remove kvm_arch_has_vcpu_debugfs()
 2019-07-31 18:56 UTC  (2+ messages)
` [PATCH v2 2/2] KVM: no need to check return value of debugfs_create functions

[GIT PULL] KVM/arm updates for 5.3-rc3
 2019-07-31 17:36 UTC  (6+ messages)
` [PATCH 1/5] KVM: arm/arm64: Introduce kvm_pmu_vcpu_init() to setup PMU counter index
` [PATCH 2/5] arm64: KVM: regmap: Fix unexpected switch fall-through
` [PATCH 3/5] KVM: arm: vgic-v3: Mark expected "
` [PATCH 4/5] KVM: arm64: Update kvm_arm_exception_class and esr_class_str for new EC
` [PATCH 5/5] arm64: KVM: hyp: debug-sr: Mark expected switch fall-through

[RFC v2 00/27] Kernel Address Space Isolation
 2019-07-31 16:31 UTC  (8+ messages)

[Bug 203477] New: [AMD][KVM] Windows L1 guest becomes extremely slow and unusable after enabling Hyper-V
 2019-07-31 16:01 UTC  (2+ messages)
` [Bug 203477] "

[PATCH v3 0/3] KVM: selftests: Enable ucall and dirty_log_test on s390x
 2019-07-31 15:15 UTC  (4+ messages)
` [PATCH v3 1/3] KVM: selftests: Split ucall.c into architecture specific files
` [PATCH v3 2/3] KVM: selftests: Implement ucall() for s390x
` [PATCH v3 3/3] KVM: selftests: Enable dirty_log_test on s390x

[PATCHv2 00/59] Intel MKTME enabling
 2019-07-31 15:08 UTC  (60+ messages)
` [PATCHv2 01/59] mm: Do no merge VMAs with different encryption KeyIDs
` [PATCHv2 02/59] mm: Add helpers to setup zero page mappings
` [PATCHv2 03/59] mm/ksm: Do not merge pages with different KeyIDs
` [PATCHv2 04/59] mm/page_alloc: Unify alloc_hugepage_vma()
` [PATCHv2 05/59] mm/page_alloc: Handle allocation for encrypted memory
` [PATCHv2 06/59] mm/khugepaged: Handle encrypted pages
` [PATCHv2 07/59] x86/mm: Mask out KeyID bits from page table entry pfn
` [PATCHv2 08/59] x86/mm: Introduce helpers to read number, shift and mask of KeyIDs
` [PATCHv2 09/59] x86/mm: Store bitmask of the encryption algorithms supported by MKTME
` [PATCHv2 10/59] x86/mm: Preserve KeyID on pte_modify() and pgprot_modify()
` [PATCHv2 11/59] x86/mm: Detect MKTME early
` [PATCHv2 12/59] x86/mm: Add a helper to retrieve KeyID for a page
` [PATCHv2 13/59] x86/mm: Add a helper to retrieve KeyID for a VMA
` [PATCHv2 14/59] x86/mm: Add hooks to allocate and free encrypted pages
` [PATCHv2 15/59] x86/mm: Map zero pages into encrypted mappings correctly
` [PATCHv2 16/59] x86/mm: Rename CONFIG_RANDOMIZE_MEMORY_PHYSICAL_PADDING
` [PATCHv2 17/59] x86/mm: Allow to disable MKTME after enumeration
` [PATCHv2 18/59] x86/mm: Calculate direct mapping size
` [PATCHv2 19/59] x86/mm: Implement syncing per-KeyID direct mappings
` [PATCHv2 20/59] x86/mm: Handle encrypted memory in page_to_virt() and __pa()
` [PATCHv2 21/59] mm/page_ext: Export lookup_page_ext() symbol
` [PATCHv2 22/59] mm/rmap: Clear vma->anon_vma on unlink_anon_vmas()
` [PATCHv2 23/59] x86/pconfig: Set an activated algorithm in all MKTME commands
` [PATCHv2 24/59] keys/mktme: Introduce a Kernel Key Service for MKTME
` [PATCHv2 25/59] keys/mktme: Preparse the MKTME key payload
` [PATCHv2 26/59] keys/mktme: Instantiate MKTME keys
` [PATCHv2 27/59] keys/mktme: Destroy "
` [PATCHv2 28/59] keys/mktme: Move the MKTME payload into a cache aligned structure
` [PATCHv2 29/59] keys/mktme: Set up PCONFIG programming targets for MKTME keys
` [PATCHv2 30/59] keys/mktme: Program MKTME keys into the platform hardware
` [PATCHv2 31/59] keys/mktme: Set up a percpu_ref_count for MKTME keys
` [PATCHv2 32/59] keys/mktme: Clear the key programming from the MKTME hardware
` [PATCHv2 33/59] keys/mktme: Require CAP_SYS_RESOURCE capability for MKTME keys
` [PATCHv2 34/59] acpi: Remove __init from acpi table parsing functions
` [PATCHv2 35/59] acpi/hmat: Determine existence of an ACPI HMAT
` [PATCHv2 36/59] keys/mktme: Require ACPI HMAT to register the MKTME Key Service
` [PATCHv2 37/59] acpi/hmat: Evaluate topology presented in ACPI HMAT for MKTME
` [PATCHv2 38/59] keys/mktme: Do not allow key creation in unsafe topologies
` [PATCHv2 39/59] keys/mktme: Support CPU hotplug for MKTME key service
` [PATCHv2 40/59] keys/mktme: Block memory hotplug additions when MKTME is enabled
` [PATCHv2 41/59] mm: Generalize the mprotect implementation to support extensions
` [PATCHv2 42/59] syscall/x86: Wire up a system call for MKTME encryption keys
` [PATCHv2 43/59] x86/mm: Set KeyIDs in encrypted VMAs for MKTME
` [PATCHv2 44/59] mm: Add the encrypt_mprotect() system call "
` [PATCHv2 45/59] x86/mm: Keep reference counts on hardware key usage "
` [PATCHv2 46/59] mm: Restrict MKTME memory encryption to anonymous VMAs
` [PATCHv2 47/59] kvm, x86, mmu: setup MKTME keyID to spte for given PFN
` [PATCHv2 48/59] iommu/vt-d: Support MKTME in DMA remapping
` [PATCHv2 49/59] x86/mm: introduce common code for mem encryption
` [PATCHv2 50/59] x86/mm: Use common code for DMA memory encryption
` [PATCHv2 51/59] x86/mm: Disable MKTME on incompatible platform configurations
` [PATCHv2 52/59] x86/mm: Disable MKTME if not all system memory supports encryption
` [PATCHv2 53/59] x86: Introduce CONFIG_X86_INTEL_MKTME
` [PATCHv2 54/59] x86/mktme: Overview of Multi-Key Total Memory Encryption
` [PATCHv2 55/59] x86/mktme: Document the MKTME provided security mitigations
` [PATCHv2 56/59] x86/mktme: Document the MKTME kernel configuration requirements
` [PATCHv2 57/59] x86/mktme: Document the MKTME Key Service API
` [PATCHv2 58/59] x86/mktme: Document the MKTME API for anonymous memory encryption
` [PATCHv2 59/59] x86/mktme: Demonstration program using the MKTME APIs

[PATCH v2 0/3] KVM: selftests: Enable ucall and dirty_log_test on s390x
 2019-07-31 14:51 UTC  (7+ messages)
` [PATCH v2 1/3] KVM: selftests: Split ucall.c into architecture specific files
` [PATCH v2 2/3] KVM: selftests: Implement ucall() for s390x
` [PATCH v2 3/3] KVM: selftests: Enable dirty_log_test on s390x

[PATCH] selftests: kvm: Adding config fragments
 2019-07-31 14:38 UTC  (3+ messages)

[PATCH 0/3] Reduce the number of Valgrind reports in unit tests
 2019-07-31 14:11 UTC  (14+ messages)
` [PATCH 3/3] i386/kvm: initialize struct at full before ioctl call
  ` [Qemu-devel] "

[PATCH 0/2] KVM: selftests: Enable ucall and dirty_log_test on s390x
 2019-07-31 13:05 UTC  (19+ messages)
` [PATCH 1/2] KVM: selftests: Implement ucall() for s390x
` [PATCH 2/2] KVM: selftests: Enable dirty_log_test on s390x

[Bug 204209] New: kernel 5.2.1: "floating point exception" in qemu with kvm enabled
 2019-07-31 11:15 UTC  (2+ messages)
` [Bug 204209] "

[PATCH v5 12/29] compat_ioctl: move drivers to compat_ptr_ioctl
 2019-07-31  8:37 UTC  (2+ messages)

[PATCH] kvm: arm: Promote KVM_ARM_TARGET_CORTEX_A7 to generic V7 core
 2019-07-31  8:17 UTC  (2+ messages)

[RFC PATCH 00/16] KVM RISC-V Support
 2019-07-31  7:23 UTC  (9+ messages)
` [RFC PATCH 08/16] RISC-V: KVM: Handle MMIO exits for VCPU
` [RFC PATCH 13/16] RISC-V: KVM: Add timer functionality

[PATCH v3 0/9] x86: Concurrent TLB flushes
 2019-07-31  0:13 UTC  (3+ messages)
` [PATCH v3 4/9] x86/mm/tlb: Flush remote and local TLBs concurrently

[PATCH 0/2] kvm-unit-test: x86: Implement a generic wrapper for cpuid/cpuid_indexed calls
 2019-07-30 21:52 UTC  (2+ messages)
` [PATCH 2/2] kvm-unit-test: x86: Replace cpuid/cpuid_indexed calls with this_cpu_has()


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).