kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-02-07 11:40:42 to 2020-02-08 00:53:44 UTC [more...]

[PATCH v5 00/19] KVM: Dynamically size memslot arrays
 2020-02-08  0:53 UTC  (31+ messages)
` [PATCH v5 12/19] KVM: Move memslot deletion to helper function
` [PATCH v5 15/19] KVM: Provide common implementation for generic dirty log functions
` [PATCH v5 17/19] KVM: Terminate memslot walks via used_slots
` [PATCH v5 18/19] KVM: Dynamically size memslot array based on number of used slots

[PATCH][next] KVM: x86: remove redundant WARN_ON check of an unsigned less than zero
 2020-02-08  0:47 UTC  (2+ messages)

[PATCH RFC 0/4] KVM: MIPS: Provide arch-specific kvm_flush_remote_tlbs()
 2020-02-07 23:00 UTC  (6+ messages)
` [PATCH RFC 1/4] KVM: Provide kvm_flush_remote_tlbs_common()
` [PATCH RFC 2/4] KVM: MIPS: Drop flush_shadow_memslot() callback
` [PATCH RFC 3/4] KVM: MIPS: Replace all the kvm_flush_remote_tlbs() references
` [PATCH RFC 4/4] KVM: MIPS: Define arch-specific kvm_flush_remote_tlbs()

[PATCH] KVM: x86: Fix perfctr WRMSR for running counters
 2020-02-07 22:15 UTC  (5+ messages)

[PATCH RFC 00/10] device-dax: Support devices without PFN metadata
 2020-02-07 21:08 UTC  (3+ messages)
` [PATCH RFC 09/10] vfio/type1: Use follow_pfn for VM_FPNMAP VMAs

[PATCH v12 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-02-07 19:42 UTC  (8+ messages)
` [PATCH v12 Kernel 1/7] vfio: KABI for migration interface for device state
` [PATCH v12 Kernel 2/7] vfio iommu: Remove atomicity of ref_count of pinned pages
` [PATCH v12 Kernel 3/7] vfio iommu: Add ioctl definition for dirty pages tracking
` [PATCH v12 Kernel 4/7] vfio iommu: Implementation of ioctl to "
` [PATCH v12 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
` [PATCH v12 Kernel 6/7] vfio iommu: Adds flag to indicate dirty pages tracking capability support
` [PATCH v12 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages

[PATCH 00/61] KVM: x86: Introduce KVM cpu caps
 2020-02-07 19:53 UTC  (16+ messages)
` [PATCH 02/61] KVM: x86: Refactor loop around do_cpuid_func() to separate helper
` [PATCH 03/61] KVM: x86: Simplify handling of Centaur CPUID leafs
` [PATCH 06/61] KVM: x86: Move CPUID 0xD.1 handling out of the index>0 loop
` [PATCH 07/61] KVM: x86: Check for CPUID 0xD.N support before validating array size
` [PATCH 08/61] KVM: x86: Warn on zero-size save state for valid CPUID 0xD.N sub-leaf
` [PATCH 09/61] KVM: x86: Refactor CPUID 0xD.N sub-leaf entry creation

[RFC PATCH v2 0/9] Introduce vendor ops in vfio-pci
 2020-02-07 19:48 UTC  (3+ messages)
` [RFC PATCH v2 1/9] vfio/pci: split vfio_pci_device into public and private parts

[RFC v3 0/8] vfio: expose virtual Shared Virtual Addressing to VMs
 2020-02-07 19:43 UTC  (3+ messages)
` [RFC v3 2/8] vfio/type1: Make per-application (VM) PASID quota tunable

[PATCH v4 00/19] KVM: Dynamically size memslot arrays
 2020-02-07 18:52 UTC  (6+ messages)
` [PATCH v4 16/19] KVM: Ensure validity of memslot with respect to kvm_get_dirty_log()

[PATCH v3 0/8] kvm/split_lock: Add feature split lock detection support in kvm
 2020-02-07 18:27 UTC  (3+ messages)
` [PATCH v3 8/8] x86: vmx: virtualize split lock detection

[RFC PATCH v7 00/78] VM introspection
 2020-02-07 18:16 UTC  (79+ messages)
` [RFC PATCH v7 01/78] sched/swait: add swait_event_killable_exclusive()
` [RFC PATCH v7 02/78] export kill_pid_info()
` [RFC PATCH v7 03/78] KVM: add new error codes for VM introspection
` [RFC PATCH v7 04/78] KVM: add kvm_vcpu_kick_and_wait()
` [RFC PATCH v7 05/78] KVM: add kvm_get_max_gfn()
` [RFC PATCH v7 06/78] KVM: doc: fix the hypercall numbering
` [RFC PATCH v7 07/78] KVM: x86: add kvm_arch_vcpu_get_regs() and kvm_arch_vcpu_get_sregs()
` [RFC PATCH v7 08/78] KVM: x86: add kvm_arch_vcpu_set_regs()
` [RFC PATCH v7 09/78] KVM: x86: avoid injecting #PF when emulate the VMCALL instruction
` [RFC PATCH v7 10/78] KVM: x86: add .bp_intercepted() to struct kvm_x86_ops
` [RFC PATCH v7 11/78] KVM: x86: add .control_cr3_intercept() "
` [RFC PATCH v7 12/78] KVM: x86: add .cr3_write_intercepted()
` [RFC PATCH v7 13/78] KVM: x86: add .control_desc_intercept()
` [RFC PATCH v7 14/78] KVM: x86: add .desc_intercepted()
` [RFC PATCH v7 15/78] KVM: x86: export .msr_write_intercepted()
` [RFC PATCH v7 16/78] KVM: x86: use MSR_TYPE_R, MSR_TYPE_W and MSR_TYPE_RW with AMD code too
` [RFC PATCH v7 17/78] KVM: svm: pass struct kvm_vcpu to set_msr_interception()
` [RFC PATCH v7 18/78] KVM: vmx: pass struct kvm_vcpu to the intercept msr related functions
` [RFC PATCH v7 19/78] KVM: x86: add .control_msr_intercept()
` [RFC PATCH v7 20/78] KVM: x86: vmx: use a symbolic constant when checking the exit qualifications
` [RFC PATCH v7 21/78] KVM: x86: save the error code during EPT/NPF exits handling
` [RFC PATCH v7 22/78] KVM: x86: add .fault_gla()
` [RFC PATCH v7 23/78] KVM: x86: add .spt_fault()
` [RFC PATCH v7 24/78] KVM: x86: add .gpt_translation_fault()
` [RFC PATCH v7 25/78] KVM: x86: add .control_singlestep()
` [RFC PATCH v7 26/78] KVM: x86: export kvm_arch_vcpu_set_guest_debug()
` [RFC PATCH v7 27/78] KVM: x86: extend kvm_mmu_gva_to_gpa_system() with the 'access' parameter
` [RFC PATCH v7 28/78] KVM: x86: export kvm_inject_pending_exception()
` [RFC PATCH v7 29/78] KVM: x86: export kvm_vcpu_ioctl_x86_get_xsave()
` [RFC PATCH v7 30/78] KVM: x86: page track: provide all page tracking hooks with the guest virtual address
` [RFC PATCH v7 31/78] KVM: x86: page track: add track_create_slot() callback
` [RFC PATCH v7 32/78] KVM: x86: page_track: add support for preread, prewrite and preexec
` [RFC PATCH v7 33/78] KVM: x86: wire in the preread/prewrite/preexec page trackers
` [RFC PATCH v7 34/78] KVM: x86: intercept the write access on sidt and other emulated instructions
` [RFC PATCH v7 35/78] KVM: x86: disable gpa_available optimization for fetch and page-walk NPF/EPT violations
` [RFC PATCH v7 36/78] KVM: introduce VM introspection
` [RFC PATCH v7 37/78] KVM: introspection: add hook/unhook ioctls
` [RFC PATCH v7 38/78] KVM: introspection: add permission access ioctls
` [RFC PATCH v7 39/78] KVM: introspection: add the read/dispatch message function
` [RFC PATCH v7 40/78] KVM: introspection: add KVMI_GET_VERSION
` [RFC PATCH v7 41/78] KVM: introspection: add KVMI_VM_CHECK_COMMAND and KVMI_VM_CHECK_EVENT
` [RFC PATCH v7 42/78] KVM: introspection: add KVMI_VM_GET_INFO
` [RFC PATCH v7 43/78] KVM: introspection: add KVMI_EVENT_UNHOOK
` [RFC PATCH v7 44/78] KVM: introspection: add KVMI_VM_CONTROL_EVENTS
` [RFC PATCH v7 45/78] KVM: introspection: add KVMI_VM_READ_PHYSICAL/KVMI_VM_WRITE_PHYSICAL
` [RFC PATCH v7 46/78] KVM: introspection: add vCPU related data
` [RFC PATCH v7 47/78] KVM: introspection: add a jobs list to every introspected vCPU
` [RFC PATCH v7 48/78] KVM: introspection: handle vCPU introspection requests
` [RFC PATCH v7 49/78] KVM: introspection: handle vCPU commands
` [RFC PATCH v7 50/78] KVM: introspection: add KVMI_VCPU_GET_INFO
` [RFC PATCH v7 51/78] KVM: introspection: add KVMI_VCPU_PAUSE
` [RFC PATCH v7 52/78] KVM: introspection: add KVMI_EVENT_PAUSE_VCPU
` [RFC PATCH v7 53/78] KVM: introspection: add KVMI_VCPU_CONTROL_EVENTS
` [RFC PATCH v7 54/78] KVM: introspection: add KVMI_VCPU_GET_REGISTERS
` [RFC PATCH v7 55/78] KVM: introspection: add KVMI_VCPU_SET_REGISTERS
` [RFC PATCH v7 56/78] KVM: introspection: add KVMI_VCPU_GET_CPUID
` [RFC PATCH v7 57/78] KVM: introspection: add KVMI_EVENT_HYPERCALL
` [RFC PATCH v7 58/78] KVM: introspection: add KVMI_EVENT_BREAKPOINT
` [RFC PATCH v7 59/78] KVM: introspection: restore the state of #BP interception on unhook
` [RFC PATCH v7 60/78] KVM: introspection: add KVMI_VCPU_CONTROL_CR and KVMI_EVENT_CR
` [RFC PATCH v7 61/78] KVM: introspection: restore the state of CR3 interception on unhook
` [RFC PATCH v7 62/78] KVM: introspection: add KVMI_VCPU_INJECT_EXCEPTION + KVMI_EVENT_TRAP
` [RFC PATCH v7 63/78] KVM: introspection: add KVMI_VM_GET_MAX_GFN
` [RFC PATCH v7 64/78] KVM: introspection: add KVMI_EVENT_XSETBV
` [RFC PATCH v7 65/78] KVM: introspection: add KVMI_VCPU_GET_XSAVE
` [RFC PATCH v7 66/78] KVM: introspection: add KVMI_VCPU_GET_MTRR_TYPE
` [RFC PATCH v7 67/78] KVM: introspection: add KVMI_EVENT_DESCRIPTOR
` [RFC PATCH v7 68/78] KVM: introspection: restore the state of descriptor interception on unhook
` [RFC PATCH v7 69/78] KVM: introspection: add KVMI_VCPU_CONTROL_MSR and KVMI_EVENT_MSR
` [RFC PATCH v7 70/78] KVM: introspection: restore the state of MSR interception on unhook
` [RFC PATCH v7 71/78] KVM: introspection: add KVMI_VM_SET_PAGE_ACCESS
` [RFC PATCH v7 72/78] KVM: introspection: add KVMI_EVENT_PF
` [RFC PATCH v7 73/78] KVM: introspection: extend KVMI_GET_VERSION with struct kvmi_features
` [RFC PATCH v7 74/78] KVM: introspection: add KVMI_VCPU_CONTROL_SINGLESTEP
` [RFC PATCH v7 75/78] KVM: introspection: add KVMI_EVENT_SINGLESTEP
` [RFC PATCH v7 76/78] KVM: introspection: add KVMI_VCPU_TRANSLATE_GVA
` [RFC PATCH v7 77/78] KVM: introspection: emulate a guest page table walk on SPT violations due to A/D bit updates
` [RFC PATCH v7 78/78] KVM: x86: call the page tracking code on emulation failure

[PATCH 4/5] vfio/type1: optimize dma_list tree iterations
 2020-02-07 18:03 UTC 

[kvm-unit-tests PATCH 0/4] nVMX: 5-level nested EPT support
 2020-02-07 17:42 UTC  (5+ messages)
` [kvm-unit-tests PATCH 1/4] nVMX: Extend EPTP test to allow 5-level EPT
` [kvm-unit-tests PATCH 2/4] nVMX: Refactor the EPT/VPID MSR cap check to make it readable
` [kvm-unit-tests PATCH 3/4] nVMX: Mark bit 39 of MSR_IA32_VMX_EPT_VPID_CAP as reserved
` [kvm-unit-tests PATCH 4/4] nVMX: Extend EPT cap MSR test to allow 5-level EPT

[PATCH v2 kvmtool 00/30] Add reassignable BARs and PCIE 1.1 support
 2020-02-07 17:38 UTC  (22+ messages)
` [PATCH v2 kvmtool 07/30] ioport: pci: Move port allocations to PCI devices
` [PATCH v2 kvmtool 25/30] pci: Implement callbacks for toggling BAR emulation
` [PATCH v2 kvmtool 26/30] pci: Toggle BAR I/O and memory space emulation
` [PATCH v2 kvmtool 27/30] pci: Implement reassignable BARs
` [PATCH v2 kvmtool 28/30] arm/fdt: Remove 'linux,pci-probe-only' property
` [PATCH v2 kvmtool 29/30] vfio: Trap MMIO access to BAR addresses which aren't page aligned
` [PATCH v2 kvmtool 30/30] arm/arm64: Add PCI Express 1.1 support

[PATCH v2 0/7] KVM: x86/mmu: nVMX: 5-level paging fixes and enabling
 2020-02-07 17:37 UTC  (8+ messages)
` [PATCH v2 1/7] KVM: nVMX: Use correct root level for nested EPT shadow page tables
` [PATCH v2 2/7] KVM: x86/mmu: Fix struct guest_walker arrays for 5-level paging
` [PATCH v2 3/7] KVM: nVMX: Allow L1 to use 5-level page walks for nested EPT
` [PATCH v2 4/7] KVM: nVMX: Rename nested_ept_get_cr3() to nested_ept_get_eptp()
` [PATCH v2 5/7] KVM: nVMX: Rename EPTP validity helper and associated variables
` [PATCH v2 6/7] KVM: x86/mmu: Rename kvm_mmu->get_cr3() to ->get_guest_cr3_or_eptp()
` [PATCH v2 7/7] KVM: nVMX: Drop unnecessary check on ept caps for execute-only

[PATCH] KVM: Disable preemption in kvm_get_running_vcpu()
 2020-02-07 17:04 UTC  (2+ messages)

[PATCH] docs/virt/kvm: Document running nested guests
 2020-02-07 16:40 UTC  (5+ messages)

[PATCH 00/35] KVM: s390: Add support for protected VMs
 2020-02-07 16:32 UTC  (17+ messages)
` [PATCH 01/35] mm:gup/writeback: add callbacks for inaccessible pages
` [PATCH 03/35] s390/protvirt: introduce host side setup
` [PATCH 06/35] s390/mm: add (non)secure page access exceptions handlers
` [PATCH 07/35] KVM: s390: add new variants of UV CALL
` [PATCH 08/35] KVM: s390: protvirt: Add initial lifecycle handling
` [PATCH 09/35] KVM: s390: protvirt: Add KVM api documentation
` [PATCH 12/35] KVM: s390: protvirt: Handle SE notification interceptions
` [PATCH 13/35] KVM: s390: protvirt: Instruction emulation
` [PATCH 17/35] KVM: s390: protvirt: Handle spec exception loops
` [PATCH 20/35] KVM: s390: protvirt: handle secure guest prefix pages
` [PATCH 23/35] KVM: s390: protvirt: STSI handling
` [PATCH 30/35] KVM: s390: protvirt: Support cmd 5 operation state
` [PATCH 34/35] KVM: s390: protvirt: Add UV cpu reset calls

[PATCH v2] KVM: nVMX: Fix some comment typos and coding style
 2020-02-07 16:25 UTC  (2+ messages)

BUG: using __this_cpu_read() in preemptible [00000000] code
 2020-02-07 16:25 UTC  (6+ messages)

[PATCH] KVM: x86/mmu: Avoid retpoline on ->page_fault() with TDP
 2020-02-07 16:15 UTC  (4+ messages)

[PATCH v3 0/3] selftests: KVM: AMD Nested SVM test infrastructure
 2020-02-07 15:49 UTC  (5+ messages)
` [PATCH v3 2/3] selftests: KVM: AMD Nested "

[PATCH v2] KVM: apic: reuse smp_wmb() in kvm_make_request()
 2020-02-07 15:40 UTC  (2+ messages)

[PATCH v5 2/4] selftests: KVM: Remove unused x86_register enum
 2020-02-07 15:37 UTC 

[PATCH v2] KVM: x86: remove duplicated KVM_REQ_EVENT request
 2020-02-07 15:27 UTC 

[PATCH v5 0/4] selftests: KVM: AMD Nested SVM test infrastructure
 2020-02-07 15:09 UTC  (7+ messages)
` [PATCH v5 1/4] selftests: KVM: Replace get_[gdt | idt]_base() by get_[gdt | idt]()
` [PATCH v5 2/4] selftests: KVM: Remove unused x86_register enum
` [PATCH v5 3/4] selftests: KVM: AMD Nested test infrastructure
` [PATCH v5 4/4] selftests: KVM: SVM: Add vmcall test

[PATCH v4 0/3] selftests: KVM: AMD Nested SVM test infrastructure
 2020-02-07 14:16 UTC  (7+ messages)
` [PATCH v4 2/3] selftests: KVM: AMD Nested "
` [PATCH v4 3/3] selftests: KVM: SVM: Add vmcall test

[kvm-unit-tests PATCH v3 00/14] arm/arm64: Add ITS tests
 2020-02-07 14:06 UTC  (18+ messages)
` [kvm-unit-tests PATCH v3 06/14] arm/arm64: gicv3: Set the LPI config and pending tables
` [kvm-unit-tests PATCH v3 07/14] arm/arm64: gicv3: Enable/Disable LPIs at re-distributor level
` [kvm-unit-tests PATCH v3 08/14] arm/arm64: ITS: its_enable_defaults
` [kvm-unit-tests PATCH v3 09/14] arm/arm64: ITS: Device and collection Initialization
` [kvm-unit-tests PATCH v3 10/14] arm/arm64: ITS: commands
` [kvm-unit-tests PATCH v3 11/14] arm/arm64: ITS: INT functional tests
` [kvm-unit-tests PATCH v3 13/14] arm/arm64: ITS: migration tests
` [kvm-unit-tests PATCH v3 14/14] arm/arm64: ITS: pending table migration test

[RFC PATCH v2 0/9] s390x/vfio-ccw: Channel Path Handling
 2020-02-07 13:26 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).