kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-03-20 20:59:46 to 2020-03-23 12:40:59 UTC [more...]

[PATCH v5 00/23] irqchip/gic-v4: GICv4.1 architecture support
 2020-03-23 12:40 UTC  (9+ messages)
` [PATCH v5 20/23] KVM: arm64: GICv4.1: Plumb SGI implementation selection in the distributor

[PATCH v3 0/9] KVM: Move x86 init ops to separate struct
 2020-03-23 12:27 UTC  (13+ messages)
` [PATCH v3 1/9] KVM: Pass kvm_init()'s opaque param to additional arch funcs
` [PATCH v3 2/9] KVM: x86: Move init-only kvm_x86_ops to separate struct
` [PATCH v3 3/9] KVM: VMX: Move hardware_setup() definition below vmx_x86_ops
` [PATCH v3 4/9] KVM: VMX: Configure runtime hooks using vmx_x86_ops
` [PATCH v3 5/9] KVM: x86: Set kvm_x86_ops only after ->hardware_setup() completes
` [PATCH v3 6/9] KVM: x86: Copy kvm_x86_ops by value to eliminate layer of indirection
` [PATCH v3 7/9] KVM: x86: Drop __exit from kvm_x86_ops' hardware_unsetup()
` [PATCH v3 8/9] KVM: VMX: Annotate vmx_x86_ops as __initdata
` [PATCH v3 9/9] KVM: SVM: Annotate svm_x86_ops "

[PATCH v14 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-03-23 11:59 UTC  (16+ messages)
` [PATCH v14 Kernel 1/7] vfio: KABI for migration interface for device state
` [PATCH v14 Kernel 2/7] vfio iommu: Remove atomicity of ref_count of pinned pages
` [PATCH v14 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
` [PATCH v14 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages

[PATCH] vfio-mdev: support mediated device creation in kernel
 2020-03-23 11:14 UTC  (6+ messages)

[PATCH v9 0/6] x86/kvm/hyper-v: add support for synthetic debugger
 2020-03-23 10:36 UTC  (10+ messages)
` [PATCH v9 1/6] x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit
` [PATCH v9 2/6] x86/kvm/hyper-v: Simplify addition for custom cpuid leafs
` [PATCH v9 3/6] x86/hyper-v: Add synthetic debugger definitions
` [PATCH v9 4/6] x86/kvm/hyper-v: Add support for synthetic debugger capability
` [PATCH v9 7/6] KVM: selftests: update hyperv_cpuid with SynDBG tests

[PATCH 0/7] tools/kvm_stat: add logfile support
 2020-03-23 10:12 UTC  (4+ messages)

[PATCH] KVM: x86: Expose fast short REP MOV for supported cpuid
 2020-03-23  9:22 UTC 

[PATCH] KVM: VMX: Disable Intel PT before VM-entry
 2020-03-23  9:20 UTC  (3+ messages)

BUG: unable to handle kernel NULL pointer dereference in handle_external_interrupt_irqoff
 2020-03-23  8:18 UTC  (7+ messages)

[PATCH kernel v2 0/7] powerpc/powenv/ioda: Allow huge DMA window at 4GB
 2020-03-23  7:53 UTC  (8+ messages)
` [PATCH kernel v2 1/7] powerpc/powernv/ioda: Move TCE bypass base to PE
` [PATCH kernel v2 2/7] powerpc/powernv/ioda: Rework for huge DMA window at 4GB
` [PATCH kernel v2 3/7] powerpc/powernv/ioda: Allow smaller TCE table levels
` [PATCH kernel v2 4/7] powerpc/powernv/phb4: Use IOMMU instead of bypassing
` [PATCH kernel v2 5/7] powerpc/iommu: Add a window number to iommu_table_group_ops::get_table_size
` [PATCH kernel v2 6/7] powerpc/powernv/phb4: Add 4GB IOMMU bypass mode
` [PATCH kernel v2 7/7] vfio/spapr_tce: Advertise and allow a huge DMA windows at 4GB

[PATCH v2] mm/hugetlb: fix a addressing exception caused by huge_pte_offset()
 2020-03-23  3:43 UTC  (5+ messages)

[PATCH] KVM: PPC: Book3S HV: Add a capability for enabling secure guests
 2020-03-23  3:18 UTC  (2+ messages)

[PATCH 0/3] Misc patches for core_capabilites and split lock detection
 2020-03-23  2:56 UTC  (4+ messages)
` [PATCH 1/3] target/i386: Rename CORE_CAPABILITY to CORE_CAPABILITIES
` [PATCH 2/3] target/i386: Add support for TEST_CTRL MSR
` [PATCH 3/3] target/i386: Tell why guest exits to user space due to #AC

[PATCH v5 0/9] x86/split_lock: Add feature split lock detection
 2020-03-23  2:18 UTC  (10+ messages)
` [PATCH v5 1/9] x86/split_lock: Rework the initialization flow of "
` [PATCH v5 2/9] x86/split_lock: Avoid runtime reads of the TEST_CTRL MSR
` [PATCH v5 3/9] x86/split_lock: Re-define the kernel param option for split_lock_detect
` [PATCH v5 4/9] x86/split_lock: Export handle_user_split_lock()

[Bug 206579] New: KVM with passthrough generates "BUG: kernel NULL pointer dereference" and crashes
 2020-03-22 18:58 UTC  (3+ messages)
` [Bug 206579] "

[PATCH v1 0/8] vfio: expose virtual Shared Virtual Addressing to VMs
 2020-03-22 18:30 UTC  (14+ messages)
` [PATCH v1 1/8] vfio: Add VFIO_IOMMU_PASID_REQUEST(alloc/free)
` [PATCH v1 2/8] vfio/type1: Add vfio_iommu_type1 parameter for quota tuning
` [PATCH v1 3/8] vfio/type1: Report PASID alloc/free support to userspace
` [PATCH v1 4/8] vfio: Check nesting iommu uAPI version
` [PATCH v1 5/8] vfio/type1: Report 1st-level/stage-1 format to userspace
` [PATCH v1 6/8] vfio/type1: Bind guest page tables to host
` [PATCH v1 7/8] vfio/type1: Add VFIO_IOMMU_CACHE_INVALIDATE
` [PATCH v1 8/8] vfio/type1: Add vSVA support for IOMMU-backed mdevs

[PATCH v2 0/3] KVM: VMX: Fix for kexec VMCLEAR and VMXON cleanup
 2020-03-22 13:37 UTC  (6+ messages)
` [PATCH v2 1/3] KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support
` [PATCH v2 2/3] KVM: VMX: Fold loaded_vmcs_init() into alloc_loaded_vmcs()
` [PATCH v2 3/3] KVM: VMX: Gracefully handle faults on VMXON

[PATCH v1 00/22] intel_iommu: expose Shared Virtual Addressing to VMs
 2020-03-22 13:25 UTC  (24+ messages)
` [PATCH v1 01/22] scripts/update-linux-headers: Import iommu.h
` [PATCH v1 02/22] header file update VFIO/IOMMU vSVA APIs
` [PATCH v1 03/22] vfio: check VFIO_TYPE1_NESTING_IOMMU support
` [PATCH v1 04/22] hw/iommu: introduce HostIOMMUContext
` [PATCH v1 05/22] hw/pci: modify pci_setup_iommu() to set PCIIOMMUOps
` [PATCH v1 06/22] hw/pci: introduce pci_device_set/unset_iommu_context()
` [PATCH v1 07/22] intel_iommu: add set/unset_iommu_context callback
` [PATCH v1 08/22] vfio: init HostIOMMUContext per-container
` [PATCH v1 09/22] vfio/common: check PASID alloc/free availability
` [PATCH v1 10/22] intel_iommu: add virtual command capability support
` [PATCH v1 11/22] intel_iommu: process PASID cache invalidation
` [PATCH v1 12/22] intel_iommu: add PASID cache management infrastructure
` [PATCH v1 13/22] vfio: add bind stage-1 page table support
` [PATCH v1 14/22] intel_iommu: bind/unbind guest page table to host
` [PATCH v1 15/22] intel_iommu: replay guest pasid bindings "
` [PATCH v1 16/22] intel_iommu: replay pasid binds after context cache invalidation
` [PATCH v1 17/22] intel_iommu: do not pass down pasid bind for PASID #0
` [PATCH v1 18/22] vfio: add support for flush iommu stage-1 cache
` [PATCH v1 19/22] intel_iommu: process PASID-based iotlb invalidation
` [PATCH v1 20/22] intel_iommu: propagate PASID-based iotlb invalidation to host
` [PATCH v1 21/22] intel_iommu: process PASID-based Device-TLB invalidation
` [PATCH v1 22/22] intel_iommu: modify x-scalable-mode to be string option

[PATCH v1 0/2] vfio/pci: expose device's PASID capability to VMs
 2020-03-22 12:33 UTC  (3+ messages)
` [PATCH v1 1/2] vfio/pci: Expose PCIe PASID capability to guest
` [PATCH v1 2/2] vfio/pci: Emulate PASID/PRI capability for VFs

WARNING in vcpu_enter_guest
 2020-03-22  3:31 UTC  (2+ messages)

[PATCH v2] mm/hugetlb: fix a addressing exception caused by huge_pte_offset()
 2020-03-21 22:46 UTC  (6+ messages)

Is it possible to run KVM and guests on Beagleboard-x15
 2020-03-21 22:07 UTC 

[PATCH v7 00/14] KVM: Dirty ring interface
 2020-03-21 19:22 UTC  (5+ messages)
` [PATCH v7 03/14] KVM: X86: Don't track dirty for KVM_SET_[TSS_ADDR|IDENTITY_MAP_ADDR]
` [PATCH v7 06/14] KVM: Make dirty ring exclusive to dirty bitmap log

[PATCH] KVM: SVM: Issue WBINVD after deactivating an SEV guest
 2020-03-21 17:06 UTC  (6+ messages)

[RFC PATCH 00/70 v2] x86: SEV-ES Guest Support
 2020-03-21 15:40 UTC  (16+ messages)
` [PATCH 18/70] x86/boot/compressed/64: Add stage1 #VC handler
` [PATCH 21/70] x86/boot/compressed/64: Add function to map a page unencrypted
` [PATCH 23/70] x86/sev-es: Add support for handling IOIO exceptions
` [PATCH 62/70] x86/kvm: Add KVM specific VMMCALL handling under SEV-ES

[PATCH 0/3] KVM: VMX: Fix for kexec VMCLEAR and VMXON cleanup
 2020-03-21 14:55 UTC  (5+ messages)
` [PATCH 1/3] KVM: VMX: Always VMCLEAR in-use VMCSes during crash with kexec support

[PATCH v10 01/11] vfio: VFIO_IOMMU_SET_PASID_TABLE
 2020-03-21  5:18 UTC  (2+ messages)

[PATCH] x86: vmx: skip atomic_switch_overflow_msrs_test on bare metal
 2020-03-21  5:06 UTC 

[PATCH] x86: vmx: Fix "EPT violation - paging structure" test
 2020-03-21  5:05 UTC 

[PATCH 0/7] KVM: Fix memslot use-after-free bug
 2020-03-20 23:07 UTC  (8+ messages)
` [PATCH 1/7] KVM: Fix out of range accesses to memslots
` [PATCH 4/7] KVM: selftests: Add helpers to consolidate open coded list operations

[PATCH v10 09/13] dma-iommu: Implement NESTED_MSI cookie
 2020-03-20 22:20 UTC  (2+ messages)

[RESEND][patch V3 00/23] x86/entry: Consolidation part II (syscalls)
 2020-03-20 18:00 UTC  (24+ messages)
` [RESEND][patch V3 01/23] rcu: Dont acquire lock in NMI handler in rcu_nmi_enter_common()
` [RESEND][patch V3 02/23] rcu: Add comments marking transitions between RCU watching and not
` [RESEND][patch V3 03/23] vmlinux.lds.h: Create section for protection against instrumentation
` [RESEND][patch V3 04/23] kprobes: Prevent probes in .noinstr.text section
` [RESEND][patch V3 05/23] tracing: Provide lockdep less trace_hardirqs_on/off() variants
` [RESEND][patch V3 06/23] bug: Annotate WARN/BUG/stackfail as noinstr safe
` [RESEND][patch V3 07/23] lockdep: Prepare for noinstr sections
` [RESEND][patch V3 08/23] x86/entry: Mark enter_from_user_mode() noinstr
` [RESEND][patch V3 09/23] x86/entry/common: Protect against instrumentation
` [RESEND][patch V3 10/23] x86/entry: Move irq tracing on syscall entry to C-code
` [RESEND][patch V3 11/23] x86/entry: Move irq flags tracing to prepare_exit_to_usermode()
` [RESEND][patch V3 12/23] context_tracking: Ensure that the critical path cannot be instrumented
` [RESEND][patch V3 13/23] lib/smp_processor_id: Move it into noinstr section
` [RESEND][patch V3 14/23] x86/speculation/mds: Mark mds_user_clear_cpu_buffers() __always_inline
` [RESEND][patch V3 15/23] x86/entry/64: Check IF in __preempt_enable_notrace() thunk
` [RESEND][patch V3 16/23] x86/entry/64: Mark ___preempt_schedule_notrace() thunk noinstr
` [RESEND][patch V3 17/23] rcu/tree: Mark the idle relevant functions noinstr
` [RESEND][patch V3 18/23] x86/kvm: Move context tracking where it belongs
` [RESEND][patch V3 19/23] x86/kvm/vmx: Add hardirq tracing to guest enter/exit
` [RESEND][patch V3 20/23] x86/kvm/svm: Handle hardirqs proper on "
` [RESEND][patch V3 21/23] context_tracking: Make guest_enter/exit_irqoff() .noinstr ready
` [RESEND][patch V3 22/23] x86/kvm/vmx: Move guest enter/exit into .noinstr.text
` [RESEND][patch V3 23/23] x86/kvm/svm: "

[PATCH v3 00/37] KVM: x86: TLB flushing fixes and enhancements
 2020-03-20 21:28 UTC  (38+ messages)
` [PATCH v3 01/37] KVM: VMX: Flush all EPTP/VPID contexts on remote TLB flush
` [PATCH v3 02/37] KVM: nVMX: Validate the EPTP when emulating INVEPT(EXTENT_CONTEXT)
` [PATCH v3 03/37] KVM: nVMX: Invalidate all EPTP contexts when emulating INVEPT for L1
` [PATCH v3 04/37] KVM: nVMX: Invalidate all roots when emulating INVVPID without EPT
` [PATCH v3 05/37] KVM: x86: Export kvm_propagate_fault() (as kvm_inject_emulated_page_fault)
` [PATCH v3 06/37] KVM: x86: Consolidate logic for injecting page faults to L1
` [PATCH v3 07/37] KVM: x86: Sync SPTEs when injecting page/EPT fault into L1
` [PATCH v3 08/37] KVM: VMX: Skip global INVVPID fallback if vpid==0 in vpid_sync_context()
` [PATCH v3 09/37] KVM: VMX: Use vpid_sync_context() directly when possible
` [PATCH v3 10/37] KVM: VMX: Move vpid_sync_vcpu_addr() down a few lines
` [PATCH v3 11/37] KVM: VMX: Handle INVVPID fallback logic in vpid_sync_vcpu_addr()
` [PATCH v3 12/37] KVM: VMX: Drop redundant capability checks in low level INVVPID helpers
` [PATCH v3 13/37] KVM: nVMX: Use vpid_sync_vcpu_addr() to emulate INVVPID with address
` [PATCH v3 14/37] KVM: x86: Move "flush guest's TLB" logic to separate kvm_x86_ops hook
` [PATCH v3 15/37] KVM: VMX: Clean up vmx_flush_tlb_gva()
` [PATCH v3 16/37] KVM: x86: Drop @invalidate_gpa param from kvm_x86_ops' tlb_flush()
` [PATCH v3 17/37] KVM: SVM: Wire up ->tlb_flush_guest() directly to svm_flush_tlb()
` [PATCH v3 18/37] KVM: VMX: Move vmx_flush_tlb() to vmx.c
` [PATCH v3 19/37] KVM: nVMX: Move nested_get_vpid02() to vmx/nested.h
` [PATCH v3 20/37] KVM: VMX: Introduce vmx_flush_tlb_current()
` [PATCH v3 21/37] KVM: SVM: Document the ASID logic in svm_flush_tlb()
` [PATCH v3 22/37] KVM: x86: Rename ->tlb_flush() to ->tlb_flush_all()
` [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
` [PATCH v3 24/37] KVM: x86: Introduce KVM_REQ_TLB_FLUSH_CURRENT to flush current ASID
` [PATCH v3 25/37] KVM: x86/mmu: Use KVM_REQ_TLB_FLUSH_CURRENT for MMU specific flushes
` [PATCH v3 26/37] KVM: nVMX: Selectively use TLB_FLUSH_CURRENT for nested VM-Enter/VM-Exit
` [PATCH v3 27/37] KVM: nVMX: Reload APIC access page on nested VM-Exit only if necessary
` [PATCH v3 28/37] KVM: VMX: Retrieve APIC access page HPA only when necessary
` [PATCH v3 29/37] KVM: VMX: Don't reload APIC access page if its control is disabled
` [PATCH v3 30/37] KVM: x86/mmu: Move fast_cr3_switch() side effects to __kvm_mmu_new_cr3()
` [PATCH v3 31/37] KVM: x86/mmu: Add separate override for MMU sync during fast CR3 switch
` [PATCH v3 32/37] KVM: x86/mmu: Add module param to force TLB flush on root reuse
` [PATCH v3 33/37] KVM: nVMX: Skip MMU sync on nested VMX transition when possible
` [PATCH v3 34/37] KVM: nVMX: Don't flush TLB on nested VMX transition
` [PATCH v3 35/37] KVM: nVMX: Free only the affected contexts when emulating INVEPT
` [PATCH v3 36/37] KVM: x86: Replace "cr3" with "pgd" in "new cr3/pgd" related code
` [PATCH v3 37/37] KVM: VMX: Clean cr3/pgd handling in vmx_load_mmu_pgd()


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).