kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-03-20 17:28:52 to 2020-03-22 12:30:54 UTC [more...]

[PATCH v1 00/22] intel_iommu: expose Shared Virtual Addressing to VMs
 2020-03-22 12:36 UTC  (13+ messages)
` [PATCH v1 01/22] scripts/update-linux-headers: Import iommu.h
` [PATCH v1 05/22] hw/pci: modify pci_setup_iommu() to set PCIIOMMUOps
` [PATCH v1 06/22] hw/pci: introduce pci_device_set/unset_iommu_context()
` [PATCH v1 07/22] intel_iommu: add set/unset_iommu_context callback
` [PATCH v1 11/22] intel_iommu: process PASID cache invalidation
` [PATCH v1 12/22] intel_iommu: add PASID cache management infrastructure
` [PATCH v1 14/22] intel_iommu: bind/unbind guest page table to host
` [PATCH v1 15/22] intel_iommu: replay guest pasid bindings "
` [PATCH v1 16/22] intel_iommu: replay pasid binds after context cache invalidation
` [PATCH v1 17/22] intel_iommu: do not pass down pasid bind for PASID #0
` [PATCH v1 19/22] intel_iommu: process PASID-based iotlb invalidation
` [PATCH v1 21/22] intel_iommu: process PASID-based Device-TLB invalidation

[PATCH v1 0/2] vfio/pci: expose device's PASID capability to VMs
 2020-03-22 12:33 UTC  (3+ messages)
` [PATCH v1 1/2] vfio/pci: Expose PCIe PASID capability to guest
` [PATCH v1 2/2] vfio/pci: Emulate PASID/PRI capability for VFs

[PATCH v1 0/8] vfio: expose virtual Shared Virtual Addressing to VMs
 2020-03-22 12:32 UTC  (9+ messages)
` [PATCH v1 1/8] vfio: Add VFIO_IOMMU_PASID_REQUEST(alloc/free)
` [PATCH v1 2/8] vfio/type1: Add vfio_iommu_type1 parameter for quota tuning
` [PATCH v1 3/8] vfio/type1: Report PASID alloc/free support to userspace
` [PATCH v1 4/8] vfio: Check nesting iommu uAPI version
` [PATCH v1 5/8] vfio/type1: Report 1st-level/stage-1 format to userspace
` [PATCH v1 6/8] vfio/type1: Bind guest page tables to host
` [PATCH v1 7/8] vfio/type1: Add VFIO_IOMMU_CACHE_INVALIDATE
` [PATCH v1 8/8] vfio/type1: Add vSVA support for IOMMU-backed mdevs

BUG: unable to handle kernel NULL pointer dereference in handle_external_interrupt_irqoff
 2020-03-22  8:53 UTC  (4+ messages)

WARNING in vcpu_enter_guest
 2020-03-22  3:31 UTC  (2+ messages)

[PATCH v2] mm/hugetlb: fix a addressing exception caused by huge_pte_offset()
 2020-03-21 23:38 UTC  (2+ messages)

[PATCH v2] mm/hugetlb: fix a addressing exception caused by huge_pte_offset()
 2020-03-21 22:46 UTC  (6+ messages)

Is it possible to run KVM and guests on Beagleboard-x15
 2020-03-21 22:07 UTC 

[PATCH v3 0/9] KVM: Move x86 init ops to separate struct
 2020-03-21 20:26 UTC  (10+ messages)
` [PATCH v3 1/9] KVM: Pass kvm_init()'s opaque param to additional arch funcs
` [PATCH v3 2/9] KVM: x86: Move init-only kvm_x86_ops to separate struct
` [PATCH v3 3/9] KVM: VMX: Move hardware_setup() definition below vmx_x86_ops
` [PATCH v3 4/9] KVM: VMX: Configure runtime hooks using vmx_x86_ops
` [PATCH v3 5/9] KVM: x86: Set kvm_x86_ops only after ->hardware_setup() completes
` [PATCH v3 6/9] KVM: x86: Copy kvm_x86_ops by value to eliminate layer of indirection
` [PATCH v3 7/9] KVM: x86: Drop __exit from kvm_x86_ops' hardware_unsetup()
` [PATCH v3 8/9] KVM: VMX: Annotate vmx_x86_ops as __initdata
` [PATCH v3 9/9] KVM: SVM: Annotate svm_x86_ops "

[PATCH v2 0/3] KVM: VMX: Fix for kexec VMCLEAR and VMXON cleanup
 2020-03-21 19:37 UTC  (4+ messages)
` [PATCH v2 1/3] KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support
` [PATCH v2 2/3] KVM: VMX: Fold loaded_vmcs_init() into alloc_loaded_vmcs()
` [PATCH v2 3/3] KVM: VMX: Gracefully handle faults on VMXON

[PATCH v7 00/14] KVM: Dirty ring interface
 2020-03-21 19:22 UTC  (5+ messages)
` [PATCH v7 03/14] KVM: X86: Don't track dirty for KVM_SET_[TSS_ADDR|IDENTITY_MAP_ADDR]
` [PATCH v7 06/14] KVM: Make dirty ring exclusive to dirty bitmap log

[PATCH] KVM: SVM: Issue WBINVD after deactivating an SEV guest
 2020-03-21 17:06 UTC  (7+ messages)

[RFC PATCH 00/70 v2] x86: SEV-ES Guest Support
 2020-03-21 15:40 UTC  (26+ messages)
` [PATCH 18/70] x86/boot/compressed/64: Add stage1 #VC handler
` [PATCH 21/70] x86/boot/compressed/64: Add function to map a page unencrypted
` [PATCH 23/70] x86/sev-es: Add support for handling IOIO exceptions
` [PATCH 62/70] x86/kvm: Add KVM specific VMMCALL handling under SEV-ES
` [PATCH 70/70] x86/sev-es: Add NMI state tracking
    ` [RFC PATCH v2.1] x86/sev-es: Handle NMI State

[PATCH 0/3] KVM: VMX: Fix for kexec VMCLEAR and VMXON cleanup
 2020-03-21 14:55 UTC  (5+ messages)
` [PATCH 1/3] KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support

[PATCH v10 01/11] vfio: VFIO_IOMMU_SET_PASID_TABLE
 2020-03-21  5:18 UTC  (2+ messages)

[PATCH] x86: vmx: skip atomic_switch_overflow_msrs_test on bare metal
 2020-03-21  5:06 UTC 

[PATCH] x86: vmx: Fix "EPT violation - paging structure" test
 2020-03-21  5:05 UTC 

[PATCH v5 0/9] x86/split_lock: Add feature split lock detection
 2020-03-21  0:48 UTC  (9+ messages)
` [PATCH v5 1/9] x86/split_lock: Rework the initialization flow of "
` [PATCH v5 2/9] x86/split_lock: Avoid runtime reads of the TEST_CTRL MSR
` [PATCH v5 3/9] x86/split_lock: Re-define the kernel param option for split_lock_detect
` [PATCH v5 4/9] x86/split_lock: Export handle_user_split_lock()

[PATCH 0/7] KVM: Fix memslot use-after-free bug
 2020-03-20 23:07 UTC  (13+ messages)
` [PATCH 1/7] KVM: Fix out of range accesses to memslots
` [PATCH 2/7] KVM: selftests: Fix cosmetic copy-paste error in vm_mem_region_move()
` [PATCH 3/7] KVM: selftests: Take vcpu pointer instead of id in vm_vcpu_rm()
` [PATCH 4/7] KVM: selftests: Add helpers to consolidate open coded list operations
` [PATCH 5/7] KVM: selftests: Add util to delete memory region
` [PATCH 6/7] KVM: selftests: Expose the primary memslot number to tests
` [PATCH 7/7] KVM: selftests: Add "delete" testcase to set_memory_region_test

[PATCH v10 09/13] dma-iommu: Implement NESTED_MSI cookie
 2020-03-20 22:20 UTC  (2+ messages)

[PATCH] vfio-mdev: support mediated device creation in kernel
 2020-03-20 22:07 UTC  (5+ messages)

[RESEND][patch V3 00/23] x86/entry: Consolidation part II (syscalls)
 2020-03-20 18:00 UTC  (24+ messages)
` [RESEND][patch V3 01/23] rcu: Dont acquire lock in NMI handler in rcu_nmi_enter_common()
` [RESEND][patch V3 02/23] rcu: Add comments marking transitions between RCU watching and not
` [RESEND][patch V3 03/23] vmlinux.lds.h: Create section for protection against instrumentation
` [RESEND][patch V3 04/23] kprobes: Prevent probes in .noinstr.text section
` [RESEND][patch V3 05/23] tracing: Provide lockdep less trace_hardirqs_on/off() variants
` [RESEND][patch V3 06/23] bug: Annotate WARN/BUG/stackfail as noinstr safe
` [RESEND][patch V3 07/23] lockdep: Prepare for noinstr sections
` [RESEND][patch V3 08/23] x86/entry: Mark enter_from_user_mode() noinstr
` [RESEND][patch V3 09/23] x86/entry/common: Protect against instrumentation
` [RESEND][patch V3 10/23] x86/entry: Move irq tracing on syscall entry to C-code
` [RESEND][patch V3 11/23] x86/entry: Move irq flags tracing to prepare_exit_to_usermode()
` [RESEND][patch V3 12/23] context_tracking: Ensure that the critical path cannot be instrumented
` [RESEND][patch V3 13/23] lib/smp_processor_id: Move it into noinstr section
` [RESEND][patch V3 14/23] x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline
` [RESEND][patch V3 15/23] x86/entry/64: Check IF in __preempt_enable_notrace() thunk
` [RESEND][patch V3 16/23] x86/entry/64: Mark ___preempt_schedule_notrace() thunk noinstr
` [RESEND][patch V3 17/23] rcu/tree: Mark the idle relevant functions noinstr
` [RESEND][patch V3 18/23] x86/kvm: Move context tracking where it belongs
` [RESEND][patch V3 19/23] x86/kvm/vmx: Add hardirq tracing to guest enter/exit
` [RESEND][patch V3 20/23] x86/kvm/svm: Handle hardirqs proper on "
` [RESEND][patch V3 21/23] context_tracking: Make guest_enter/exit_irqoff() .noinstr ready
` [RESEND][patch V3 22/23] x86/kvm/vmx: Move guest enter/exit into .noinstr.text
` [RESEND][patch V3 23/23] x86/kvm/svm: "

[PATCH v3 00/37] KVM: x86: TLB flushing fixes and enhancements
 2020-03-20 21:28 UTC  (38+ messages)
` [PATCH v3 01/37] KVM: VMX: Flush all EPTP/VPID contexts on remote TLB flush
` [PATCH v3 02/37] KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT)
` [PATCH v3 03/37] KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1
` [PATCH v3 04/37] KVM: nVMX: Invalidate all roots when emulating INVVPID without EPT
` [PATCH v3 05/37] KVM: x86: Export kvm_propagate_fault() (as kvm_inject_emulated_page_fault)
` [PATCH v3 06/37] KVM: x86: Consolidate logic for injecting page faults to L1
` [PATCH v3 07/37] KVM: x86: Sync SPTEs when injecting page/EPT fault into L1
` [PATCH v3 08/37] KVM: VMX: Skip global INVVPID fallback if vpid==0 in vpid_sync_context()
` [PATCH v3 09/37] KVM: VMX: Use vpid_sync_context() directly when possible
` [PATCH v3 10/37] KVM: VMX: Move vpid_sync_vcpu_addr() down a few lines
` [PATCH v3 11/37] KVM: VMX: Handle INVVPID fallback logic in vpid_sync_vcpu_addr()
` [PATCH v3 12/37] KVM: VMX: Drop redundant capability checks in low level INVVPID helpers
` [PATCH v3 13/37] KVM: nVMX: Use vpid_sync_vcpu_addr() to emulate INVVPID with address
` [PATCH v3 14/37] KVM: x86: Move "flush guest's TLB" logic to separate kvm_x86_ops hook
` [PATCH v3 15/37] KVM: VMX: Clean up vmx_flush_tlb_gva()
` [PATCH v3 16/37] KVM: x86: Drop @invalidate_gpa param from kvm_x86_ops' tlb_flush()
` [PATCH v3 17/37] KVM: SVM: Wire up ->tlb_flush_guest() directly to svm_flush_tlb()
` [PATCH v3 18/37] KVM: VMX: Move vmx_flush_tlb() to vmx.c
` [PATCH v3 19/37] KVM: nVMX: Move nested_get_vpid02() to vmx/nested.h
` [PATCH v3 20/37] KVM: VMX: Introduce vmx_flush_tlb_current()
` [PATCH v3 21/37] KVM: SVM: Document the ASID logic in svm_flush_tlb()
` [PATCH v3 22/37] KVM: x86: Rename ->tlb_flush() to ->tlb_flush_all()
` [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
` [PATCH v3 24/37] KVM: x86: Introduce KVM_REQ_TLB_FLUSH_CURRENT to flush current ASID
` [PATCH v3 25/37] KVM: x86/mmu: Use KVM_REQ_TLB_FLUSH_CURRENT for MMU specific flushes
` [PATCH v3 26/37] KVM: nVMX: Selectively use TLB_FLUSH_CURRENT for nested VM-Enter/VM-Exit
` [PATCH v3 27/37] KVM: nVMX: Reload APIC access page on nested VM-Exit only if necessary
` [PATCH v3 28/37] KVM: VMX: Retrieve APIC access page HPA only when necessary
` [PATCH v3 29/37] KVM: VMX: Don't reload APIC access page if its control is disabled
` [PATCH v3 30/37] KVM: x86/mmu: Move fast_cr3_switch() side effects to __kvm_mmu_new_cr3()
` [PATCH v3 31/37] KVM: x86/mmu: Add separate override for MMU sync during fast CR3 switch
` [PATCH v3 32/37] KVM: x86/mmu: Add module param to force TLB flush on root reuse
` [PATCH v3 33/37] KVM: nVMX: Skip MMU sync on nested VMX transition when possible
` [PATCH v3 34/37] KVM: nVMX: Don't flush TLB on nested VMX transition
` [PATCH v3 35/37] KVM: nVMX: Free only the affected contexts when emulating INVEPT
` [PATCH v3 36/37] KVM: x86: Replace "cr3" with "pgd" in "new cr3/pgd" related code
` [PATCH v3 37/37] KVM: VMX: Clean cr3/pgd handling in vmx_load_mmu_pgd()

[PATCH v14 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-03-20 19:41 UTC  (10+ messages)
` [PATCH v14 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
` [PATCH v14 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages

[PATCH] KVM: SVM: document KVM_MEM_ENCRYPT_OP, let userspace detect if SEV is available
 2020-03-20 19:14 UTC  (2+ messages)

[PATCH v15 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-03-20 18:59 UTC  (7+ messages)
` [PATCH v15 Kernel 4/7] vfio iommu: Implementation of ioctl for dirty pages tracking

[PATCH v6 00/23] irqchip/gic-v4: GICv4.1 architecture support
 2020-03-20 18:24 UTC  (24+ messages)
` [PATCH v6 01/23] irqchip/gic-v3: Use SGIs without active state if offered
` [PATCH v6 02/23] irqchip/gic-v4.1: Skip absent CPUs while iterating over redistributors
` [PATCH v6 03/23] irqchip/gic-v4.1: Ensure mutual exclusion between vPE affinity change and RD access
` [PATCH v6 04/23] irqchip/gic-v4.1: Wait for completion of redistributor's INVALL operation
` [PATCH v6 05/23] irqchip/gic-v4.1: Ensure mutual exclusion betwen invalidations on the same RD
` [PATCH v6 06/23] irqchip/gic-v4.1: Advertise support v4.1 to KVM
` [PATCH v6 07/23] irqchip/gic-v4.1: Map the ITS SGIR register page
` [PATCH v6 08/23] irqchip/gic-v4.1: Plumb skeletal VSGI irqchip
` [PATCH v6 09/23] irqchip/gic-v4.1: Add initial SGI configuration
` [PATCH v6 10/23] irqchip/gic-v4.1: Plumb mask/unmask SGI callbacks
` [PATCH v6 11/23] irqchip/gic-v4.1: Plumb get/set_irqchip_state "
` [PATCH v6 12/23] irqchip/gic-v4.1: Plumb set_vcpu_affinity "
` [PATCH v6 13/23] irqchip/gic-v4.1: Move doorbell management to the GICv4 abstraction layer
` [PATCH v6 14/23] irqchip/gic-v4.1: Add VSGI allocation/teardown
` [PATCH v6 15/23] irqchip/gic-v4.1: Add VSGI property setup
` [PATCH v6 16/23] irqchip/gic-v4.1: Eagerly vmap vPEs
` [PATCH v6 17/23] KVM: arm64: GICv4.1: Let doorbells be auto-enabled
` [PATCH v6 18/23] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
` [PATCH v6 19/23] KVM: arm64: GICv4.1: Allow SGIs to switch between HW and SW interrupts
` [PATCH v6 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor
` [PATCH v6 21/23] KVM: arm64: GICv4.1: Reload VLPI configuration on distributor enable/disable
` [PATCH v6 22/23] KVM: arm64: GICv4.1: Allow non-trapping WFI when using HW SGIs
` [PATCH v6 23/23] KVM: arm64: GICv4.1: Expose HW-based SGIs in debugfs

[PATCH] KVM: x86: remove bogus user-triggerable WARN_ON
 2020-03-20 18:18 UTC  (5+ messages)

[PATCH] KVM: let declaration of kvm_get_running_vcpus match implementation
 2020-03-20 17:54 UTC  (4+ messages)

[PATCH] KVM: LAPIC: Mark hrtimer for period or oneshot mode to expire in hard interrupt context
 2020-03-20 17:49 UTC  (2+ messages)

[PATCH v9 0/6] x86/kvm/hyper-v: add support for synthetic debugger
 2020-03-20 17:28 UTC  (7+ messages)
` [PATCH v9 1/6] x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit
` [PATCH v9 2/6] x86/kvm/hyper-v: Simplify addition for custom cpuid leafs
` [PATCH v9 3/6] x86/hyper-v: Add synthetic debugger definitions
` [PATCH v9 4/6] x86/kvm/hyper-v: Add support for synthetic debugger capability
` [PATCH v9 5/6] x86/kvm/hyper-v: enable hypercalls without hypercall page with syndbg
` [PATCH v9 6/6] x86/kvm/hyper-v: Add support for synthetic debugger via hypercalls


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).