messages from 2020-03-20 03:40:49 to 2020-03-20 21:31:25 UTC [more...]
[PATCH v3 00/37] KVM: x86: TLB flushing fixes and enhancements
2020-03-20 21:28 UTC (31+ messages)
` [PATCH v3 06/37] KVM: x86: Consolidate logic for injecting page faults to L1
` [PATCH v3 07/37] KVM: x86: Sync SPTEs when injecting page/EPT fault into L1
` [PATCH v3 08/37] KVM: VMX: Skip global INVVPID fallback if vpid==0 in vpid_sync_context()
` [PATCH v3 10/37] KVM: VMX: Move vpid_sync_vcpu_addr() down a few lines
` [PATCH v3 12/37] KVM: VMX: Drop redundant capability checks in low level INVVPID helpers
` [PATCH v3 13/37] KVM: nVMX: Use vpid_sync_vcpu_addr() to emulate INVVPID with address
` [PATCH v3 14/37] KVM: x86: Move "flush guest's TLB" logic to separate kvm_x86_ops hook
` [PATCH v3 15/37] KVM: VMX: Clean up vmx_flush_tlb_gva()
` [PATCH v3 16/37] KVM: x86: Drop @invalidate_gpa param from kvm_x86_ops' tlb_flush()
` [PATCH v3 17/37] KVM: SVM: Wire up ->tlb_flush_guest() directly to svm_flush_tlb()
` [PATCH v3 18/37] KVM: VMX: Move vmx_flush_tlb() to vmx.c
` [PATCH v3 19/37] KVM: nVMX: Move nested_get_vpid02() to vmx/nested.h
` [PATCH v3 20/37] KVM: VMX: Introduce vmx_flush_tlb_current()
` [PATCH v3 21/37] KVM: SVM: Document the ASID logic in svm_flush_tlb()
` [PATCH v3 22/37] KVM: x86: Rename ->tlb_flush() to ->tlb_flush_all()
` [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
` [PATCH v3 24/37] KVM: x86: Introduce KVM_REQ_TLB_FLUSH_CURRENT to flush current ASID
` [PATCH v3 25/37] KVM: x86/mmu: Use KVM_REQ_TLB_FLUSH_CURRENT for MMU specific flushes
` [PATCH v3 26/37] KVM: nVMX: Selectively use TLB_FLUSH_CURRENT for nested VM-Enter/VM-Exit
` [PATCH v3 27/37] KVM: nVMX: Reload APIC access page on nested VM-Exit only if necessary
` [PATCH v3 28/37] KVM: VMX: Retrieve APIC access page HPA only when necessary
` [PATCH v3 29/37] KVM: VMX: Don't reload APIC access page if its control is disabled
` [PATCH v3 30/37] KVM: x86/mmu: Move fast_cr3_switch() side effects to __kvm_mmu_new_cr3()
` [PATCH v3 31/37] KVM: x86/mmu: Add separate override for MMU sync during fast CR3 switch
` [PATCH v3 32/37] KVM: x86/mmu: Add module param to force TLB flush on root reuse
` [PATCH v3 33/37] KVM: nVMX: Skip MMU sync on nested VMX transition when possible
` [PATCH v3 34/37] KVM: nVMX: Don't flush TLB on nested VMX transition
` [PATCH v3 35/37] KVM: nVMX: Free only the affected contexts when emulating INVEPT
` [PATCH v3 36/37] KVM: x86: Replace "cr3" with "pgd" in "new cr3/pgd" related code
` [PATCH v3 37/37] KVM: VMX: Clean cr3/pgd handling in vmx_load_mmu_pgd()
[RFC PATCH 00/70 v2] x86: SEV-ES Guest Support
2020-03-20 21:23 UTC (20+ messages)
` [PATCH 18/70] x86/boot/compressed/64: Add stage1 #VC handler
` [PATCH 21/70] x86/boot/compressed/64: Add function to map a page unencrypted
` [PATCH 23/70] x86/sev-es: Add support for handling IOIO exceptions
` [PATCH 62/70] x86/kvm: Add KVM specific VMMCALL handling under SEV-ES
` [PATCH 70/70] x86/sev-es: Add NMI state tracking
` [RFC PATCH v2.1] x86/sev-es: Handle NMI State
[PATCH] vfio-mdev: support mediated device creation in kernel
2020-03-20 20:59 UTC (4+ messages)
[PATCH 0/7] KVM: Fix memslot use-after-free bug
2020-03-20 20:55 UTC (8+ messages)
` [PATCH 1/7] KVM: Fix out of range accesses to memslots
` [PATCH 2/7] KVM: selftests: Fix cosmetic copy-paste error in vm_mem_region_move()
` [PATCH 3/7] KVM: selftests: Take vcpu pointer instead of id in vm_vcpu_rm()
` [PATCH 4/7] KVM: selftests: Add helpers to consolidate open coded list operations
` [PATCH 5/7] KVM: selftests: Add util to delete memory region
` [PATCH 6/7] KVM: selftests: Expose the primary memslot number to tests
` [PATCH 7/7] KVM: selftests: Add "delete" testcase to set_memory_region_test
[PATCH] KVM: SVM: Issue WBINVD after deactivating an SEV guest
2020-03-20 20:37 UTC (4+ messages)
[PATCH v14 Kernel 0/7] KABIs to support migration for VFIO devices
2020-03-20 19:41 UTC (20+ messages)
` [PATCH v14 Kernel 1/7] vfio: KABI for migration interface for device state
` [PATCH v14 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
` [PATCH v14 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages
[PATCH] KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available
2020-03-20 19:14 UTC (2+ messages)
[PATCH v15 Kernel 0/7] KABIs to support migration for VFIO devices
2020-03-20 18:59 UTC (7+ messages)
` [PATCH v15 Kernel 4/7] vfio iommu: Implementation of ioctl for dirty pages tracking
[PATCH v6 00/23] irqchip/gic-v4: GICv4.1 architecture support
2020-03-20 18:24 UTC (24+ messages)
` [PATCH v6 01/23] irqchip/gic-v3: Use SGIs without active state if offered
` [PATCH v6 02/23] irqchip/gic-v4.1: Skip absent CPUs while iterating over redistributors
` [PATCH v6 03/23] irqchip/gic-v4.1: Ensure mutual exclusion between vPE affinity change and RD access
` [PATCH v6 04/23] irqchip/gic-v4.1: Wait for completion of redistributor's INVALL operation
` [PATCH v6 05/23] irqchip/gic-v4.1: Ensure mutual exclusion betwen invalidations on the same RD
` [PATCH v6 06/23] irqchip/gic-v4.1: Advertise support v4.1 to KVM
` [PATCH v6 07/23] irqchip/gic-v4.1: Map the ITS SGIR register page
` [PATCH v6 08/23] irqchip/gic-v4.1: Plumb skeletal VSGI irqchip
` [PATCH v6 09/23] irqchip/gic-v4.1: Add initial SGI configuration
` [PATCH v6 10/23] irqchip/gic-v4.1: Plumb mask/unmask SGI callbacks
` [PATCH v6 11/23] irqchip/gic-v4.1: Plumb get/set_irqchip_state "
` [PATCH v6 12/23] irqchip/gic-v4.1: Plumb set_vcpu_affinity "
` [PATCH v6 13/23] irqchip/gic-v4.1: Move doorbell management to the GICv4 abstraction layer
` [PATCH v6 14/23] irqchip/gic-v4.1: Add VSGI allocation/teardown
` [PATCH v6 15/23] irqchip/gic-v4.1: Add VSGI property setup
` [PATCH v6 16/23] irqchip/gic-v4.1: Eagerly vmap vPEs
` [PATCH v6 17/23] KVM: arm64: GICv4.1: Let doorbells be auto-enabled
` [PATCH v6 18/23] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
` [PATCH v6 19/23] KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts
` [PATCH v6 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
` [PATCH v6 21/23] KVM: arm64: GICv4.1: Reload VLPI configuration on distributor enable/disable
` [PATCH v6 22/23] KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs
` [PATCH v6 23/23] KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs
[PATCH] KVM: x86: remove bogus user-triggerable WARN_ON
2020-03-20 18:18 UTC (5+ messages)
[PATCH] KVM: let declaration of kvm_get_running_vcpus match implementation
2020-03-20 17:54 UTC (4+ messages)
[PATCH] KVM: LAPIC: Mark hrtimer for period or oneshot mode to expire in hard interrupt context
2020-03-20 17:49 UTC (3+ messages)
[PATCH v9 0/6] x86/kvm/hyper-v: add support for synthetic debugger
2020-03-20 17:28 UTC (7+ messages)
` [PATCH v9 1/6] x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit
` [PATCH v9 2/6] x86/kvm/hyper-v: Simplify addition for custom cpuid leafs
` [PATCH v9 3/6] x86/hyper-v: Add synthetic debugger definitions
` [PATCH v9 4/6] x86/kvm/hyper-v: Add support for synthetic debugger capability
` [PATCH v9 5/6] x86/kvm/hyper-v: enable hypercalls without hypercall page with syndbg
` [PATCH v9 6/6] x86/kvm/hyper-v: Add support for synthetic debugger via hypercalls
[PATCH v10 0/8] Introduce support for guest CET feature
2020-03-20 17:18 UTC (12+ messages)
` [PATCH v10 2/8] KVM: VMX: Set up guest CET MSRs per KVM and host configuration
` [PATCH v10 3/8] KVM: VMX: Load CET states on vmentry/vmexit
` [PATCH v10 4/8] KVM: X86: Refresh CPUID on guest XSS change
` [PATCH v10 5/8] KVM: X86: Load guest fpu state when accessing MSRs managed by XSAVES
` [PATCH v10 6/8] KVM: X86: Add userspace access interface for CET MSRs
` [PATCH v10 7/8] KVM: VMX: Enable CET support for nested VM
` [PATCH v10 8/8] KVM: X86: Set CET feature bits for CPUID enumeration
` [kvm-unit-tests PATCH] x86: Add tests for user-mode CET
[PATCH v10 00/11] SMMUv3 Nested Stage Setup (VFIO part)
2020-03-20 16:19 UTC (12+ messages)
` [PATCH v10 01/11] vfio: VFIO_IOMMU_SET_PASID_TABLE
` [PATCH v10 02/11] vfio: VFIO_IOMMU_CACHE_INVALIDATE
` [PATCH v10 03/11] vfio: VFIO_IOMMU_SET_MSI_BINDING
` [PATCH v10 04/11] vfio/pci: Add VFIO_REGION_TYPE_NESTED region type
` [PATCH v10 05/11] vfio/pci: Register an iommu fault handler
` [PATCH v10 06/11] vfio/pci: Allow to mmap the fault queue
` [PATCH v10 07/11] vfio: Use capability chains to handle device specific irq
` [PATCH v10 08/11] vfio: Add new IRQ for DMA fault reporting
` [PATCH v10 09/11] vfio/pci: Add framework for custom interrupt indices
` [PATCH v10 10/11] vfio/pci: Register and allow DMA FAULT IRQ signaling
` [PATCH v10 11/11] vfio: Document nested stage control
[PATCH v10 00/13] SMMUv3 Nested Stage Setup (IOMMU part)
2020-03-20 16:09 UTC (14+ messages)
` [PATCH v10 01/13] iommu: Introduce attach/detach_pasid_table API
` [PATCH v10 02/13] iommu: Introduce bind/unbind_guest_msi
` [PATCH v10 03/13] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH v10 04/13] iommu/smmuv3: Dynamically allocate s1_cfg and s2_cfg
` [PATCH v10 05/13] iommu/smmuv3: Get prepared for nested stage support
` [PATCH v10 06/13] iommu/smmuv3: Implement attach/detach_pasid_table
` [PATCH v10 07/13] iommu/smmuv3: Allow stage 1 invalidation with unmanaged ASIDs
` [PATCH v10 08/13] iommu/smmuv3: Implement cache_invalidate
` [PATCH v10 09/13] dma-iommu: Implement NESTED_MSI cookie
` [PATCH v10 10/13] iommu/smmuv3: Nested mode single MSI doorbell per domain enforcement
` [PATCH v10 11/13] iommu/smmuv3: Enforce incompatibility between nested mode and HW MSI regions
` [PATCH v10 12/13] iommu/smmuv3: Implement bind/unbind_guest_msi
` [PATCH v10 13/13] iommu/smmuv3: Report non recoverable faults
slab-out-of-bounds due to "KVM: Dynamically size memslot array based on number of used slots"
2020-03-20 16:08 UTC (5+ messages)
[kvm-unit-tests PATCH 0/2] Add support of hvf accel
2020-03-20 15:37 UTC (4+ messages)
` [kvm-unit-tests PATCH 1/2] scripts/arch-run: Support testing "
` [kvm-unit-tests PATCH 2/2] README: Document steps to run the tests on macOS
[PATCH v5 00/23] irqchip/gic-v4: GICv4.1 architecture support
2020-03-20 14:23 UTC (37+ messages)
` [PATCH v5 04/23] irqchip/gic-v4.1: Wait for completion of redistributor's INVALL operation
` [PATCH v5 05/23] irqchip/gic-v4.1: Ensure mutual exclusion betwen invalidations on the same RD
` [PATCH v5 18/23] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
` [PATCH v5 19/23] KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts
` [PATCH v5 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
` [PATCH v5 22/23] KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs
` [PATCH v5 23/23] KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs
WARNING in vcpu_enter_guest
2020-03-20 13:33 UTC (10+ messages)
[kvm-unit-tests PATCH v7 00/13] arm/arm64: Add ITS tests
2020-03-20 9:24 UTC (14+ messages)
` [kvm-unit-tests PATCH v7 01/13] libcflat: Add other size defines
` [kvm-unit-tests PATCH v7 02/13] page_alloc: Introduce get_order()
` [kvm-unit-tests PATCH v7 03/13] arm/arm64: gic: Introduce setup_irq() helper
` [kvm-unit-tests PATCH v7 04/13] arm/arm64: gicv3: Add some re-distributor defines
` [kvm-unit-tests PATCH v7 05/13] arm/arm64: gicv3: Set the LPI config and pending tables
` [kvm-unit-tests PATCH v7 06/13] arm/arm64: ITS: Introspection tests
` [kvm-unit-tests PATCH v7 07/13] arm/arm64: ITS: its_enable_defaults
` [kvm-unit-tests PATCH v7 08/13] arm/arm64: ITS: Device and collection Initialization
` [kvm-unit-tests PATCH v7 09/13] arm/arm64: ITS: Commands
` [kvm-unit-tests PATCH v7 10/13] arm/arm64: ITS: INT functional tests
` [kvm-unit-tests PATCH v7 11/13] arm/run: Allow Migration tests
` [kvm-unit-tests PATCH v7 12/13] arm/arm64: ITS: migration tests
` [kvm-unit-tests PATCH v7 13/13] arm/arm64: ITS: pending table migration test
[PATCH V6 0/8] vDPA support
2020-03-20 9:17 UTC (6+ messages)
` [PATCH V6 8/8] virtio: Intel IFC VF driver for VDPA
[PATCH kvmtool v3] Add emulation for CFI compatible flash memory
2020-03-20 9:15 UTC (3+ messages)
[PATCH v9 00/10] Guest Last Branch Recording Enabling
2020-03-20 8:45 UTC (2+ messages)
[PATCH 0/8] Convert the intel iommu driver to the dma-iommu api
2020-03-20 7:06 UTC (8+ messages)
` [PATCH 3/8] iommu/vt-d: Remove IOVA handling code from non-dma_ops path
INFO: rcu detected stall in kvm_vcpu_ioctl
2020-03-20 6:33 UTC (2+ messages)
[PATCH v2 00/32] KVM: x86: TLB flushing fixes and enhancements
2020-03-20 4:11 UTC (3+ messages)
` [PATCH v2 04/32] KVM: nVMX: Invalidate all L2 roots when emulating INVVPID without EPT
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).