kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-03-19 20:50:37 to 2020-03-20 21:29:55 UTC [more...]

[PATCH v3 00/37] KVM: x86: TLB flushing fixes and enhancements
 2020-03-20 21:28 UTC  (12+ messages)
` [PATCH v3 08/37] KVM: VMX: Skip global INVVPID fallback if vpid==0 in vpid_sync_context()
` [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
` [PATCH v3 24/37] KVM: x86: Introduce KVM_REQ_TLB_FLUSH_CURRENT to flush current ASID
` [PATCH v3 27/37] KVM: nVMX: Reload APIC access page on nested VM-Exit only if necessary
` [PATCH v3 28/37] KVM: VMX: Retrieve APIC access page HPA only when necessary
` [PATCH v3 30/37] KVM: x86/mmu: Move fast_cr3_switch() side effects to __kvm_mmu_new_cr3()
` [PATCH v3 31/37] KVM: x86/mmu: Add separate override for MMU sync during fast CR3 switch
` [PATCH v3 33/37] KVM: nVMX: Skip MMU sync on nested VMX transition when possible
` [PATCH v3 35/37] KVM: nVMX: Free only the affected contexts when emulating INVEPT
` [PATCH v3 36/37] KVM: x86: Replace "cr3" with "pgd" in "new cr3/pgd" related code
` [PATCH v3 37/37] KVM: VMX: Clean cr3/pgd handling in vmx_load_mmu_pgd()

[RFC PATCH 00/70 v2] x86: SEV-ES Guest Support
 2020-03-20 21:23 UTC  (20+ messages)
` [PATCH 18/70] x86/boot/compressed/64: Add stage1 #VC handler
` [PATCH 21/70] x86/boot/compressed/64: Add function to map a page unencrypted
` [PATCH 23/70] x86/sev-es: Add support for handling IOIO exceptions
` [PATCH 62/70] x86/kvm: Add KVM specific VMMCALL handling under SEV-ES
` [PATCH 70/70] x86/sev-es: Add NMI state tracking
    ` [RFC PATCH v2.1] x86/sev-es: Handle NMI State

[PATCH] vfio-mdev: support mediated device creation in kernel
 2020-03-20 20:59 UTC  (4+ messages)

[PATCH 0/7] KVM: Fix memslot use-after-free bug
 2020-03-20 20:55 UTC  (8+ messages)
` [PATCH 1/7] KVM: Fix out of range accesses to memslots
` [PATCH 2/7] KVM: selftests: Fix cosmetic copy-paste error in vm_mem_region_move()
` [PATCH 3/7] KVM: selftests: Take vcpu pointer instead of id in vm_vcpu_rm()
` [PATCH 4/7] KVM: selftests: Add helpers to consolidate open coded list operations
` [PATCH 5/7] KVM: selftests: Add util to delete memory region
` [PATCH 6/7] KVM: selftests: Expose the primary memslot number to tests
` [PATCH 7/7] KVM: selftests: Add "delete" testcase to set_memory_region_test

[PATCH] KVM: SVM: Issue WBINVD after deactivating an SEV guest
 2020-03-20 20:37 UTC  (4+ messages)

[PATCH v14 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-03-20 19:41 UTC  (34+ messages)
` [PATCH v14 Kernel 1/7] vfio: KABI for migration interface for device state
` [PATCH v14 Kernel 4/7] vfio iommu: Implementation of ioctl for dirty pages tracking
` [PATCH v14 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
` [PATCH v14 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages

[PATCH] KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available
 2020-03-20 19:14 UTC  (2+ messages)

[PATCH v15 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-03-20 18:59 UTC  (12+ messages)
` [PATCH v15 Kernel 1/7] vfio: KABI for migration interface for device state
` [PATCH v15 Kernel 3/7] vfio iommu: Add ioctl definition for dirty pages tracking
` [PATCH v15 Kernel 4/7] vfio iommu: Implementation of ioctl "
` [PATCH v15 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
` [PATCH v15 Kernel 6/7] vfio iommu: Adds flag to indicate dirty pages tracking capability support
` [PATCH v15 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages

[PATCH v6 00/23] irqchip/gic-v4: GICv4.1 architecture support
 2020-03-20 18:24 UTC  (24+ messages)
` [PATCH v6 01/23] irqchip/gic-v3: Use SGIs without active state if offered
` [PATCH v6 02/23] irqchip/gic-v4.1: Skip absent CPUs while iterating over redistributors
` [PATCH v6 03/23] irqchip/gic-v4.1: Ensure mutual exclusion between vPE affinity change and RD access
` [PATCH v6 04/23] irqchip/gic-v4.1: Wait for completion of redistributor's INVALL operation
` [PATCH v6 05/23] irqchip/gic-v4.1: Ensure mutual exclusion betwen invalidations on the same RD
` [PATCH v6 06/23] irqchip/gic-v4.1: Advertise support v4.1 to KVM
` [PATCH v6 07/23] irqchip/gic-v4.1: Map the ITS SGIR register page
` [PATCH v6 08/23] irqchip/gic-v4.1: Plumb skeletal VSGI irqchip
` [PATCH v6 09/23] irqchip/gic-v4.1: Add initial SGI configuration
` [PATCH v6 10/23] irqchip/gic-v4.1: Plumb mask/unmask SGI callbacks
` [PATCH v6 11/23] irqchip/gic-v4.1: Plumb get/set_irqchip_state "
` [PATCH v6 12/23] irqchip/gic-v4.1: Plumb set_vcpu_affinity "
` [PATCH v6 13/23] irqchip/gic-v4.1: Move doorbell management to the GICv4 abstraction layer
` [PATCH v6 14/23] irqchip/gic-v4.1: Add VSGI allocation/teardown
` [PATCH v6 15/23] irqchip/gic-v4.1: Add VSGI property setup
` [PATCH v6 16/23] irqchip/gic-v4.1: Eagerly vmap vPEs
` [PATCH v6 17/23] KVM: arm64: GICv4.1: Let doorbells be auto-enabled
` [PATCH v6 18/23] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
` [PATCH v6 19/23] KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts
` [PATCH v6 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
` [PATCH v6 21/23] KVM: arm64: GICv4.1: Reload VLPI configuration on distributor enable/disable
` [PATCH v6 22/23] KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs
` [PATCH v6 23/23] KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs

[PATCH] KVM: x86: remove bogus user-triggerable WARN_ON
 2020-03-20 18:18 UTC  (5+ messages)

[PATCH] KVM: let declaration of kvm_get_running_vcpus match implementation
 2020-03-20 17:54 UTC  (4+ messages)

[PATCH] KVM: LAPIC: Mark hrtimer for period or oneshot mode to expire in hard interrupt context
 2020-03-20 17:49 UTC  (3+ messages)

[PATCH v9 0/6] x86/kvm/hyper-v: add support for synthetic debugger
 2020-03-20 17:28 UTC  (7+ messages)
` [PATCH v9 1/6] x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit
` [PATCH v9 2/6] x86/kvm/hyper-v: Simplify addition for custom cpuid leafs
` [PATCH v9 3/6] x86/hyper-v: Add synthetic debugger definitions
` [PATCH v9 4/6] x86/kvm/hyper-v: Add support for synthetic debugger capability
` [PATCH v9 5/6] x86/kvm/hyper-v: enable hypercalls without hypercall page with syndbg
` [PATCH v9 6/6] x86/kvm/hyper-v: Add support for synthetic debugger via hypercalls

[PATCH v10 0/8] Introduce support for guest CET feature
 2020-03-20 17:18 UTC  (13+ messages)
` [PATCH v10 1/8] KVM: VMX: Introduce CET VMX fields and flags
` [PATCH v10 2/8] KVM: VMX: Set up guest CET MSRs per KVM and host configuration
` [PATCH v10 3/8] KVM: VMX: Load CET states on vmentry/vmexit
` [PATCH v10 4/8] KVM: X86: Refresh CPUID on guest XSS change
` [PATCH v10 5/8] KVM: X86: Load guest fpu state when accessing MSRs managed by XSAVES
` [PATCH v10 6/8] KVM: X86: Add userspace access interface for CET MSRs
` [PATCH v10 7/8] KVM: VMX: Enable CET support for nested VM
` [PATCH v10 8/8] KVM: X86: Set CET feature bits for CPUID enumeration
` [kvm-unit-tests PATCH] x86: Add tests for user-mode CET

[PATCH v10 00/11] SMMUv3 Nested Stage Setup (VFIO part)
 2020-03-20 16:19 UTC  (12+ messages)
` [PATCH v10 01/11] vfio: VFIO_IOMMU_SET_PASID_TABLE
` [PATCH v10 02/11] vfio: VFIO_IOMMU_CACHE_INVALIDATE
` [PATCH v10 03/11] vfio: VFIO_IOMMU_SET_MSI_BINDING
` [PATCH v10 04/11] vfio/pci: Add VFIO_REGION_TYPE_NESTED region type
` [PATCH v10 05/11] vfio/pci: Register an iommu fault handler
` [PATCH v10 06/11] vfio/pci: Allow to mmap the fault queue
` [PATCH v10 07/11] vfio: Use capability chains to handle device specific irq
` [PATCH v10 08/11] vfio: Add new IRQ for DMA fault reporting
` [PATCH v10 09/11] vfio/pci: Add framework for custom interrupt indices
` [PATCH v10 10/11] vfio/pci: Register and allow DMA FAULT IRQ signaling
` [PATCH v10 11/11] vfio: Document nested stage control

[PATCH v10 00/13] SMMUv3 Nested Stage Setup (IOMMU part)
 2020-03-20 16:09 UTC  (14+ messages)
` [PATCH v10 01/13] iommu: Introduce attach/detach_pasid_table API
` [PATCH v10 02/13] iommu: Introduce bind/unbind_guest_msi
` [PATCH v10 03/13] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH v10 04/13] iommu/smmuv3: Dynamically allocate s1_cfg and s2_cfg
` [PATCH v10 05/13] iommu/smmuv3: Get prepared for nested stage support
` [PATCH v10 06/13] iommu/smmuv3: Implement attach/detach_pasid_table
` [PATCH v10 07/13] iommu/smmuv3: Allow stage 1 invalidation with unmanaged ASIDs
` [PATCH v10 08/13] iommu/smmuv3: Implement cache_invalidate
` [PATCH v10 09/13] dma-iommu: Implement NESTED_MSI cookie
` [PATCH v10 10/13] iommu/smmuv3: Nested mode single MSI doorbell per domain enforcement
` [PATCH v10 11/13] iommu/smmuv3: Enforce incompatibility between nested mode and HW MSI regions
` [PATCH v10 12/13] iommu/smmuv3: Implement bind/unbind_guest_msi
` [PATCH v10 13/13] iommu/smmuv3: Report non recoverable faults

slab-out-of-bounds due to "KVM: Dynamically size memslot array based on number of used slots"
 2020-03-20 16:08 UTC  (5+ messages)

[kvm-unit-tests PATCH 0/2] Add support of hvf accel
 2020-03-20 15:37 UTC  (4+ messages)
` [kvm-unit-tests PATCH 1/2] scripts/arch-run: Support testing "
` [kvm-unit-tests PATCH 2/2] README: Document steps to run the tests on macOS

[PATCH v5 00/23] irqchip/gic-v4: GICv4.1 architecture support
 2020-03-20 14:23 UTC  (41+ messages)
` [PATCH v5 04/23] irqchip/gic-v4.1: Wait for completion of redistributor's INVALL operation
` [PATCH v5 05/23] irqchip/gic-v4.1: Ensure mutual exclusion betwen invalidations on the same RD
` [PATCH v5 16/23] irqchip/gic-v4.1: Eagerly vmap vPEs
` [PATCH v5 18/23] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
` [PATCH v5 19/23] KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts
` [PATCH v5 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
` [PATCH v5 22/23] KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs
` [PATCH v5 23/23] KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs

WARNING in vcpu_enter_guest
 2020-03-20 13:33 UTC  (10+ messages)

[kvm-unit-tests PATCH v7 00/13] arm/arm64: Add ITS tests
 2020-03-20  9:24 UTC  (14+ messages)
` [kvm-unit-tests PATCH v7 01/13] libcflat: Add other size defines
` [kvm-unit-tests PATCH v7 02/13] page_alloc: Introduce get_order()
` [kvm-unit-tests PATCH v7 03/13] arm/arm64: gic: Introduce setup_irq() helper
` [kvm-unit-tests PATCH v7 04/13] arm/arm64: gicv3: Add some re-distributor defines
` [kvm-unit-tests PATCH v7 05/13] arm/arm64: gicv3: Set the LPI config and pending tables
` [kvm-unit-tests PATCH v7 06/13] arm/arm64: ITS: Introspection tests
` [kvm-unit-tests PATCH v7 07/13] arm/arm64: ITS: its_enable_defaults
` [kvm-unit-tests PATCH v7 08/13] arm/arm64: ITS: Device and collection Initialization
` [kvm-unit-tests PATCH v7 09/13] arm/arm64: ITS: Commands
` [kvm-unit-tests PATCH v7 10/13] arm/arm64: ITS: INT functional tests
` [kvm-unit-tests PATCH v7 11/13] arm/run: Allow Migration tests
` [kvm-unit-tests PATCH v7 12/13] arm/arm64: ITS: migration tests
` [kvm-unit-tests PATCH v7 13/13] arm/arm64: ITS: pending table migration test

[PATCH V6 0/8] vDPA support
 2020-03-20  9:17 UTC  (6+ messages)
` [PATCH V6 8/8] virtio: Intel IFC VF driver for VDPA

[PATCH kvmtool v3] Add emulation for CFI compatible flash memory
 2020-03-20  9:15 UTC  (3+ messages)

[PATCH v9 00/10] Guest Last Branch Recording Enabling
 2020-03-20  8:45 UTC  (2+ messages)

[PATCH 0/8] Convert the intel iommu driver to the dma-iommu api
 2020-03-20  7:06 UTC  (8+ messages)
` [PATCH 3/8] iommu/vt-d: Remove IOVA handling code from non-dma_ops path

INFO: rcu detected stall in kvm_vcpu_ioctl
 2020-03-20  6:33 UTC  (2+ messages)

[PATCH v2 00/32] KVM: x86: TLB flushing fixes and enhancements
 2020-03-20  4:11 UTC  (3+ messages)
` [PATCH v2 04/32] KVM: nVMX: Invalidate all L2 roots when emulating INVVPID without EPT

[PATCH] KVM: PPC: Book3S HV: Add a capability for enabling secure guests
 2020-03-20  1:20 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).