kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-03-20 09:24:49 to 2020-03-20 22:12:19 UTC [more...]

[RFC PATCH 00/70 v2] x86: SEV-ES Guest Support
 2020-03-20 22:12 UTC  (21+ messages)
` [PATCH 18/70] x86/boot/compressed/64: Add stage1 #VC handler
` [PATCH 21/70] x86/boot/compressed/64: Add function to map a page unencrypted
` [PATCH 23/70] x86/sev-es: Add support for handling IOIO exceptions
` [PATCH 62/70] x86/kvm: Add KVM specific VMMCALL handling under SEV-ES
` [PATCH 70/70] x86/sev-es: Add NMI state tracking
    ` [RFC PATCH v2.1] x86/sev-es: Handle NMI State

[PATCH] vfio-mdev: support mediated device creation in kernel
 2020-03-20 22:07 UTC  (5+ messages)

[RESEND][patch V3 00/23] x86/entry: Consolidation part II (syscalls)
 2020-03-20 18:00 UTC  (24+ messages)
` [RESEND][patch V3 01/23] rcu: Dont acquire lock in NMI handler in rcu_nmi_enter_common()
` [RESEND][patch V3 02/23] rcu: Add comments marking transitions between RCU watching and not
` [RESEND][patch V3 03/23] vmlinux.lds.h: Create section for protection against instrumentation
` [RESEND][patch V3 04/23] kprobes: Prevent probes in .noinstr.text section
` [RESEND][patch V3 05/23] tracing: Provide lockdep less trace_hardirqs_on/off() variants
` [RESEND][patch V3 06/23] bug: Annotate WARN/BUG/stackfail as noinstr safe
` [RESEND][patch V3 07/23] lockdep: Prepare for noinstr sections
` [RESEND][patch V3 08/23] x86/entry: Mark enter_from_user_mode() noinstr
` [RESEND][patch V3 09/23] x86/entry/common: Protect against instrumentation
` [RESEND][patch V3 10/23] x86/entry: Move irq tracing on syscall entry to C-code
` [RESEND][patch V3 11/23] x86/entry: Move irq flags tracing to prepare_exit_to_usermode()
` [RESEND][patch V3 12/23] context_tracking: Ensure that the critical path cannot be instrumented
` [RESEND][patch V3 13/23] lib/smp_processor_id: Move it into noinstr section
` [RESEND][patch V3 14/23] x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline
` [RESEND][patch V3 15/23] x86/entry/64: Check IF in __preempt_enable_notrace() thunk
` [RESEND][patch V3 16/23] x86/entry/64: Mark ___preempt_schedule_notrace() thunk noinstr
` [RESEND][patch V3 17/23] rcu/tree: Mark the idle relevant functions noinstr
` [RESEND][patch V3 18/23] x86/kvm: Move context tracking where it belongs
` [RESEND][patch V3 19/23] x86/kvm/vmx: Add hardirq tracing to guest enter/exit
` [RESEND][patch V3 20/23] x86/kvm/svm: Handle hardirqs proper on "
` [RESEND][patch V3 21/23] context_tracking: Make guest_enter/exit_irqoff() .noinstr ready
` [RESEND][patch V3 22/23] x86/kvm/vmx: Move guest enter/exit into .noinstr.text
` [RESEND][patch V3 23/23] x86/kvm/svm: "

[PATCH v3 00/37] KVM: x86: TLB flushing fixes and enhancements
 2020-03-20 21:28 UTC  (38+ messages)
` [PATCH v3 01/37] KVM: VMX: Flush all EPTP/VPID contexts on remote TLB flush
` [PATCH v3 02/37] KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT)
` [PATCH v3 03/37] KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1
` [PATCH v3 04/37] KVM: nVMX: Invalidate all roots when emulating INVVPID without EPT
` [PATCH v3 05/37] KVM: x86: Export kvm_propagate_fault() (as kvm_inject_emulated_page_fault)
` [PATCH v3 06/37] KVM: x86: Consolidate logic for injecting page faults to L1
` [PATCH v3 07/37] KVM: x86: Sync SPTEs when injecting page/EPT fault into L1
` [PATCH v3 08/37] KVM: VMX: Skip global INVVPID fallback if vpid==0 in vpid_sync_context()
` [PATCH v3 09/37] KVM: VMX: Use vpid_sync_context() directly when possible
` [PATCH v3 10/37] KVM: VMX: Move vpid_sync_vcpu_addr() down a few lines
` [PATCH v3 11/37] KVM: VMX: Handle INVVPID fallback logic in vpid_sync_vcpu_addr()
` [PATCH v3 12/37] KVM: VMX: Drop redundant capability checks in low level INVVPID helpers
` [PATCH v3 13/37] KVM: nVMX: Use vpid_sync_vcpu_addr() to emulate INVVPID with address
` [PATCH v3 14/37] KVM: x86: Move "flush guest's TLB" logic to separate kvm_x86_ops hook
` [PATCH v3 15/37] KVM: VMX: Clean up vmx_flush_tlb_gva()
` [PATCH v3 16/37] KVM: x86: Drop @invalidate_gpa param from kvm_x86_ops' tlb_flush()
` [PATCH v3 17/37] KVM: SVM: Wire up ->tlb_flush_guest() directly to svm_flush_tlb()
` [PATCH v3 18/37] KVM: VMX: Move vmx_flush_tlb() to vmx.c
` [PATCH v3 19/37] KVM: nVMX: Move nested_get_vpid02() to vmx/nested.h
` [PATCH v3 20/37] KVM: VMX: Introduce vmx_flush_tlb_current()
` [PATCH v3 21/37] KVM: SVM: Document the ASID logic in svm_flush_tlb()
` [PATCH v3 22/37] KVM: x86: Rename ->tlb_flush() to ->tlb_flush_all()
` [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
` [PATCH v3 24/37] KVM: x86: Introduce KVM_REQ_TLB_FLUSH_CURRENT to flush current ASID
` [PATCH v3 25/37] KVM: x86/mmu: Use KVM_REQ_TLB_FLUSH_CURRENT for MMU specific flushes
` [PATCH v3 26/37] KVM: nVMX: Selectively use TLB_FLUSH_CURRENT for nested VM-Enter/VM-Exit
` [PATCH v3 27/37] KVM: nVMX: Reload APIC access page on nested VM-Exit only if necessary
` [PATCH v3 28/37] KVM: VMX: Retrieve APIC access page HPA only when necessary
` [PATCH v3 29/37] KVM: VMX: Don't reload APIC access page if its control is disabled
` [PATCH v3 30/37] KVM: x86/mmu: Move fast_cr3_switch() side effects to __kvm_mmu_new_cr3()
` [PATCH v3 31/37] KVM: x86/mmu: Add separate override for MMU sync during fast CR3 switch
` [PATCH v3 32/37] KVM: x86/mmu: Add module param to force TLB flush on root reuse
` [PATCH v3 33/37] KVM: nVMX: Skip MMU sync on nested VMX transition when possible
` [PATCH v3 34/37] KVM: nVMX: Don't flush TLB on nested VMX transition
` [PATCH v3 35/37] KVM: nVMX: Free only the affected contexts when emulating INVEPT
` [PATCH v3 36/37] KVM: x86: Replace "cr3" with "pgd" in "new cr3/pgd" related code
` [PATCH v3 37/37] KVM: VMX: Clean cr3/pgd handling in vmx_load_mmu_pgd()

[PATCH 0/7] KVM: Fix memslot use-after-free bug
 2020-03-20 20:55 UTC  (8+ messages)
` [PATCH 1/7] KVM: Fix out of range accesses to memslots
` [PATCH 2/7] KVM: selftests: Fix cosmetic copy-paste error in vm_mem_region_move()
` [PATCH 3/7] KVM: selftests: Take vcpu pointer instead of id in vm_vcpu_rm()
` [PATCH 4/7] KVM: selftests: Add helpers to consolidate open coded list operations
` [PATCH 5/7] KVM: selftests: Add util to delete memory region
` [PATCH 6/7] KVM: selftests: Expose the primary memslot number to tests
` [PATCH 7/7] KVM: selftests: Add "delete" testcase to set_memory_region_test

[PATCH] KVM: SVM: Issue WBINVD after deactivating an SEV guest
 2020-03-20 20:37 UTC  (4+ messages)

[PATCH v14 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-03-20 19:41 UTC  (10+ messages)
` [PATCH v14 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
` [PATCH v14 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages

[PATCH] KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available
 2020-03-20 19:14 UTC  (2+ messages)

[PATCH v15 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-03-20 18:59 UTC  (7+ messages)
` [PATCH v15 Kernel 4/7] vfio iommu: Implementation of ioctl for dirty pages tracking

[PATCH v6 00/23] irqchip/gic-v4: GICv4.1 architecture support
 2020-03-20 18:24 UTC  (24+ messages)
` [PATCH v6 01/23] irqchip/gic-v3: Use SGIs without active state if offered
` [PATCH v6 02/23] irqchip/gic-v4.1: Skip absent CPUs while iterating over redistributors
` [PATCH v6 03/23] irqchip/gic-v4.1: Ensure mutual exclusion between vPE affinity change and RD access
` [PATCH v6 04/23] irqchip/gic-v4.1: Wait for completion of redistributor's INVALL operation
` [PATCH v6 05/23] irqchip/gic-v4.1: Ensure mutual exclusion betwen invalidations on the same RD
` [PATCH v6 06/23] irqchip/gic-v4.1: Advertise support v4.1 to KVM
` [PATCH v6 07/23] irqchip/gic-v4.1: Map the ITS SGIR register page
` [PATCH v6 08/23] irqchip/gic-v4.1: Plumb skeletal VSGI irqchip
` [PATCH v6 09/23] irqchip/gic-v4.1: Add initial SGI configuration
` [PATCH v6 10/23] irqchip/gic-v4.1: Plumb mask/unmask SGI callbacks
` [PATCH v6 11/23] irqchip/gic-v4.1: Plumb get/set_irqchip_state "
` [PATCH v6 12/23] irqchip/gic-v4.1: Plumb set_vcpu_affinity "
` [PATCH v6 13/23] irqchip/gic-v4.1: Move doorbell management to the GICv4 abstraction layer
` [PATCH v6 14/23] irqchip/gic-v4.1: Add VSGI allocation/teardown
` [PATCH v6 15/23] irqchip/gic-v4.1: Add VSGI property setup
` [PATCH v6 16/23] irqchip/gic-v4.1: Eagerly vmap vPEs
` [PATCH v6 17/23] KVM: arm64: GICv4.1: Let doorbells be auto-enabled
` [PATCH v6 18/23] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
` [PATCH v6 19/23] KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts
` [PATCH v6 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
` [PATCH v6 21/23] KVM: arm64: GICv4.1: Reload VLPI configuration on distributor enable/disable
` [PATCH v6 22/23] KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs
` [PATCH v6 23/23] KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs

[PATCH] KVM: x86: remove bogus user-triggerable WARN_ON
 2020-03-20 18:18 UTC  (5+ messages)

[PATCH] KVM: let declaration of kvm_get_running_vcpus match implementation
 2020-03-20 17:54 UTC  (4+ messages)

[PATCH] KVM: LAPIC: Mark hrtimer for period or oneshot mode to expire in hard interrupt context
 2020-03-20 17:49 UTC  (2+ messages)

[PATCH v9 0/6] x86/kvm/hyper-v: add support for synthetic debugger
 2020-03-20 17:28 UTC  (7+ messages)
` [PATCH v9 1/6] x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit
` [PATCH v9 2/6] x86/kvm/hyper-v: Simplify addition for custom cpuid leafs
` [PATCH v9 3/6] x86/hyper-v: Add synthetic debugger definitions
` [PATCH v9 4/6] x86/kvm/hyper-v: Add support for synthetic debugger capability
` [PATCH v9 5/6] x86/kvm/hyper-v: enable hypercalls without hypercall page with syndbg
` [PATCH v9 6/6] x86/kvm/hyper-v: Add support for synthetic debugger via hypercalls

[PATCH v10 8/8] KVM: X86: Set CET feature bits for CPUID enumeration
 2020-03-20 17:18 UTC  (2+ messages)

[PATCH v10 00/11] SMMUv3 Nested Stage Setup (VFIO part)
 2020-03-20 16:19 UTC  (12+ messages)
` [PATCH v10 01/11] vfio: VFIO_IOMMU_SET_PASID_TABLE
` [PATCH v10 02/11] vfio: VFIO_IOMMU_CACHE_INVALIDATE
` [PATCH v10 03/11] vfio: VFIO_IOMMU_SET_MSI_BINDING
` [PATCH v10 04/11] vfio/pci: Add VFIO_REGION_TYPE_NESTED region type
` [PATCH v10 05/11] vfio/pci: Register an iommu fault handler
` [PATCH v10 06/11] vfio/pci: Allow to mmap the fault queue
` [PATCH v10 07/11] vfio: Use capability chains to handle device specific irq
` [PATCH v10 08/11] vfio: Add new IRQ for DMA fault reporting
` [PATCH v10 09/11] vfio/pci: Add framework for custom interrupt indices
` [PATCH v10 10/11] vfio/pci: Register and allow DMA FAULT IRQ signaling
` [PATCH v10 11/11] vfio: Document nested stage control

[PATCH v10 00/13] SMMUv3 Nested Stage Setup (IOMMU part)
 2020-03-20 16:09 UTC  (14+ messages)
` [PATCH v10 01/13] iommu: Introduce attach/detach_pasid_table API
` [PATCH v10 02/13] iommu: Introduce bind/unbind_guest_msi
` [PATCH v10 03/13] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH v10 04/13] iommu/smmuv3: Dynamically allocate s1_cfg and s2_cfg
` [PATCH v10 05/13] iommu/smmuv3: Get prepared for nested stage support
` [PATCH v10 06/13] iommu/smmuv3: Implement attach/detach_pasid_table
` [PATCH v10 07/13] iommu/smmuv3: Allow stage 1 invalidation with unmanaged ASIDs
` [PATCH v10 08/13] iommu/smmuv3: Implement cache_invalidate
` [PATCH v10 09/13] dma-iommu: Implement NESTED_MSI cookie
` [PATCH v10 10/13] iommu/smmuv3: Nested mode single MSI doorbell per domain enforcement
` [PATCH v10 11/13] iommu/smmuv3: Enforce incompatibility between nested mode and HW MSI regions
` [PATCH v10 12/13] iommu/smmuv3: Implement bind/unbind_guest_msi
` [PATCH v10 13/13] iommu/smmuv3: Report non recoverable faults

slab-out-of-bounds due to "KVM: Dynamically size memslot array based on number of used slots"
 2020-03-20 16:08 UTC  (5+ messages)

[PATCH v10 6/8] KVM: X86: Add userspace access interface for CET MSRs
 2020-03-20 15:48 UTC  (2+ messages)

[kvm-unit-tests PATCH 0/2] Add support of hvf accel
 2020-03-20 15:37 UTC  (4+ messages)
` [kvm-unit-tests PATCH 1/2] scripts/arch-run: Support testing "
` [kvm-unit-tests PATCH 2/2] README: Document steps to run the tests on macOS

[PATCH v5 00/23] irqchip/gic-v4: GICv4.1 architecture support
 2020-03-20 14:23 UTC  (26+ messages)
` [PATCH v5 04/23] irqchip/gic-v4.1: Wait for completion of redistributor's INVALL operation
` [PATCH v5 05/23] irqchip/gic-v4.1: Ensure mutual exclusion betwen invalidations on the same RD
` [PATCH v5 18/23] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
` [PATCH v5 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
` [PATCH v5 23/23] KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs

WARNING in vcpu_enter_guest
 2020-03-20 13:33 UTC  (10+ messages)

[PATCH v10 3/8] KVM: VMX: Load CET states on vmentry/vmexit
 2020-03-20 11:22 UTC  (2+ messages)

[kvm-unit-tests PATCH v7 00/13] arm/arm64: Add ITS tests
 2020-03-20  9:24 UTC  (14+ messages)
` [kvm-unit-tests PATCH v7 01/13] libcflat: Add other size defines
` [kvm-unit-tests PATCH v7 02/13] page_alloc: Introduce get_order()
` [kvm-unit-tests PATCH v7 03/13] arm/arm64: gic: Introduce setup_irq() helper
` [kvm-unit-tests PATCH v7 04/13] arm/arm64: gicv3: Add some re-distributor defines
` [kvm-unit-tests PATCH v7 05/13] arm/arm64: gicv3: Set the LPI config and pending tables
` [kvm-unit-tests PATCH v7 06/13] arm/arm64: ITS: Introspection tests
` [kvm-unit-tests PATCH v7 07/13] arm/arm64: ITS: its_enable_defaults
` [kvm-unit-tests PATCH v7 08/13] arm/arm64: ITS: Device and collection Initialization
` [kvm-unit-tests PATCH v7 09/13] arm/arm64: ITS: Commands
` [kvm-unit-tests PATCH v7 10/13] arm/arm64: ITS: INT functional tests
` [kvm-unit-tests PATCH v7 11/13] arm/run: Allow Migration tests
` [kvm-unit-tests PATCH v7 12/13] arm/arm64: ITS: migration tests
` [kvm-unit-tests PATCH v7 13/13] arm/arm64: ITS: pending table migration test


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).