kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-04-19 16:01:55 to 2021-04-21 08:39:39 UTC [more...]

[PATCH 1/2] kvm: x86: Allow userspace to handle emulation errors
 2021-04-21  8:39 UTC  (10+ messages)

[RFC PATCH v8 00/19] virtio/vsock: introduce SOCK_SEQPACKET support
 2021-04-21  8:37 UTC  (3+ messages)
` [RFC PATCH v8 04/19] af_vsock: implement SEQPACKET receive loop

[PATCH v3 0/9] KVM: Fix tick-based accounting for x86 guests
 2021-04-21  8:09 UTC  (15+ messages)
` [PATCH v3 1/9] context_tracking: Move guest exit context tracking to separate helpers
` [PATCH v3 2/9] context_tracking: Move guest exit vtime accounting "
` [PATCH v3 3/9] KVM: x86: Defer tick-based accounting 'til after IRQ handling
` [PATCH v3 4/9] sched/vtime: Move vtime accounting external declarations above inlines
` [PATCH v3 7/9] context_tracking: KVM: Move guest enter/exit wrappers to KVM's domain
` [PATCH v3 9/9] KVM: Move instrumentation-safe annotations for enter/exit to x86 code

[PATCH v5 0/3] ppc: Enable 2nd DAWR support on Power10
 2021-04-21  6:54 UTC  (6+ messages)
` [PATCH v5 3/3] ppc: Enable 2nd DAWR support on p10

[PATCH kvm-unit-tests v2 0/8] arm/arm64: Prepare for target-efi
 2021-04-21  7:02 UTC  (11+ messages)
` [PATCH kvm-unit-tests v2 1/8] arm/arm64: Reorganize cstart assembler
` [PATCH kvm-unit-tests v2 2/8] arm/arm64: Move setup_vm into setup
` [PATCH kvm-unit-tests v2 3/8] pci-testdev: ioremap regions
` [PATCH kvm-unit-tests v2 4/8] arm/arm64: mmu: Stop mapping an assumed IO region
` [PATCH kvm-unit-tests v2 5/8] arm/arm64: mmu: Remove memory layout assumptions
` [PATCH kvm-unit-tests v2 6/8] arm/arm64: setup: Consolidate "
` [PATCH kvm-unit-tests v2 7/8] chr-testdev: Silently fail init
` [PATCH kvm-unit-tests v2 8/8] arm/arm64: psci: don't assume method is hvc

[PATCH v4 0/2] kvm/arm64: Try stage2 block mapping for host device MMIO
 2021-04-21  7:52 UTC  (7+ messages)
` [PATCH v4 1/2] kvm/arm64: Remove the creation time's mapping of MMIO regions
` [PATCH v4 2/2] kvm/arm64: Try stage2 block mapping for host device MMIO

[PATCH] KVM: arm64: Correctly handle the mmio faulting
 2021-04-21  6:20 UTC  (4+ messages)

[PATCH v16 00/17] KVM RISC-V Support
 2021-04-21  4:08 UTC  (3+ messages)

[PATCH] KVM: x86: Take advantage of kvm_arch_dy_has_pending_interrupt()
 2021-04-21  3:25 UTC 

[RFC PATCH 0/7] Untrusted device support for virtio
 2021-04-21  3:21 UTC  (8+ messages)
` [RFC PATCH 1/7] virtio-ring: maintain next in extra state for packed virtqueue
` [RFC PATCH 2/7] virtio_ring: rename vring_desc_extra_packed
` [RFC PATCH 3/7] virtio-ring: factor out desc_extra allocation
` [RFC PATCH 4/7] virtio_ring: secure handling of mapping errors
` [RFC PATCH 5/7] virtio_ring: introduce virtqueue_desc_add_split()
` [RFC PATCH 6/7] virtio: use err label in __vring_new_virtqueue()
` [RFC PATCH 7/7] virtio-ring: store DMA metadata in desc_extra for split virtqueue

[PATCH v4 00/11] KVM: x86/pmu: Guest Architectural LBR Enabling
 2021-04-21  2:25 UTC  (3+ messages)

[PATCH] KVM: x86: Fix implicit enum conversion goof in scattered reverse CPUID code
 2021-04-21  1:08 UTC 

[PATCH net] vsock/virtio: free queued packets when closing socket
 2021-04-21  0:10 UTC  (2+ messages)

[PATCH 0/3] KVM: x86: guest interface for SEV live migration
 2021-04-20 23:20 UTC  (13+ messages)

[RFC Part2 PATCH 00/30] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2021-04-20 21:37 UTC  (15+ messages)
` [RFC Part2 PATCH 04/30] x86/mm: split the physmap when adding the page in RMP table
` [RFC Part2 PATCH 05/30] x86: define RMP violation #PF error code

[PATCH v13 00/12] Add AMD SEV guest live migration support
 2021-04-20 20:28 UTC  (24+ messages)
` [PATCH v13 01/12] KVM: SVM: Add KVM_SEV SEND_START command
` [PATCH v13 04/12] KVM: SVM: Add support for KVM_SEV_RECEIVE_START command
` [PATCH v13 05/12] KVM: SVM: Add KVM_SEV_RECEIVE_UPDATE_DATA command
` [PATCH v13 08/12] KVM: X86: Introduce KVM_HC_PAGE_ENC_STATUS hypercall
` [PATCH v13 09/12] mm: x86: Invoke hypercall when page encryption status is changed
` [PATCH v13 10/12] KVM: x86: Introduce new KVM_FEATURE_SEV_LIVE_MIGRATION feature & Custom MSR
` [PATCH v13 12/12] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature

[PATCH 0/7 v7] KVM: nSVM: Check addresses of MSR bitmap and IO bitmap tables on vmrun of nested guests
 2021-04-20 20:00 UTC  (8+ messages)
` [PATCH 2/7 v7] KVM: nSVM: Define an exit code to reflect consistency check failure
` [PATCH 3/7 v7] KVM: nSVM: No need to set bits 11:0 in MSRPM and IOPM bitmaps

[PATCH] KVM: x86: document behavior of measurement ioctls with len==0
 2021-04-20 19:09 UTC  (2+ messages)

[PATCH v5 0/3] CET fix patches for nested guest
 2021-04-20 17:35 UTC  (3+ messages)
` [PATCH v5 1/3] KVM: nVMX: Sync L2 guest CET states between L1/L2

[RFCv2 00/13] TDX and guest memory unmapping
 2021-04-20 17:13 UTC  (14+ messages)
` [RFCv2 06/13] x86/realmode: Share trampoline area if KVM memory protection enabled
` [RFCv2 13/13] KVM: unmap guest memory using poisoned pages

[PATCH] KVM: selftests: Always run vCPU thread with blocked SIG_IPI
 2021-04-20 16:58 UTC  (5+ messages)

[kvm-unit-tests RFC PATCH 0/1] configure: arm: Replace --vmm with --target
 2021-04-20 16:51 UTC  (3+ messages)
` [kvm-unit-tests RFC PATCH 1/1] "

[RFC PATCH v2 0/2] KVM: x86: Enable dirty logging lazily for huge pages
 2021-04-20 16:30 UTC  (5+ messages)
` [RFC PATCH v2 2/2] KVM: x86: Not wr-protect huge page with init_all_set dirty log

[PATCH v2 0/7] Hyper-V nested virt enlightenments for SVM
 2021-04-20 15:57 UTC  (5+ messages)
` [PATCH v2 3/7] KVM: x86: hyper-v: Move the remote TLB flush logic out of vmx

[kvm-unit-tests PATCH 0/6] s390x: uv: Extend guest test and add host test
 2021-04-20 15:47 UTC  (16+ messages)
` [kvm-unit-tests PATCH 1/6] s390x: uv-guest: Add invalid share location test
` [kvm-unit-tests PATCH 2/6] s390x: Add more Ultravisor command structure definitions
` [kvm-unit-tests PATCH 3/6] s390x: uv: Add UV lib
` [kvm-unit-tests PATCH 4/6] s390x: Test for share/unshare call support before using them
` [kvm-unit-tests PATCH 5/6] s390x: uv-guest: Test invalid commands
` [kvm-unit-tests PATCH 6/6] s390x: Add UV host test

[PATCH v4 0/2] KVM: selftests: fix races in dirty log test
 2021-04-20 15:39 UTC  (3+ messages)
` [PATCH v4 1/2] KVM: selftests: Sync data verify of dirty logging with guest sync
` [PATCH v4 2/2] KVM: selftests: Wait for vcpu thread before signal setup

[PATCH v3 0/2] KVM: selftests: fix races in dirty log test
 2021-04-20 14:07 UTC  (8+ messages)
` [PATCH v3 1/2] KVM: selftests: Sync data verify of dirty logging with guest sync
` [PATCH v3 2/2] KVM: selftests: Wait for vcpu thread before signal setup

[PATCH] KVM: x86: add MSR_KVM_MIGRATION_CONTROL
 2021-04-20 10:59 UTC 

[RFC PATCH 00/10] KVM: x86/mmu: simplify argument to kvm page fault handler
 2021-04-20 10:39 UTC  (11+ messages)
` [RFC PATCH 01/10] KVM: x86/mmu: make kvm_mmu_do_page_fault() receive single argument
` [RFC PATCH 02/10] KVM: x86/mmu: make kvm_mmu:page_fault "
` [RFC PATCH 03/10] KVM: x86/mmu: make direct_page_fault() "
` [RFC PATCH 04/10] KVM: x86/mmu: make try_async_pf() "
` [RFC PATCH 05/10] KVM: x86/mmu: make page_fault_handle_page_track() "
` [RFC PATCH 06/10] KVM: x86/mmu: make handle_abnormal_pfn() "
` [RFC PATCH 07/10] KVM: x86/mmu: make fast_page_fault() "
` [RFC PATCH 08/10] KVM: x86/mmu: make __direct_map() "
` [RFC PATCH 09/10] KVM: x86/mmu: make kvm_tdp_mmu_map() "
` [RFC PATCH 10/10] KVM: x86/mmu: make FNAME(fetch) "

[PATCH] KVM: Boost vCPU candidiate in user mode which is delivering interrupt
 2021-04-20 10:27 UTC  (11+ messages)

[PATCH v5 00/16] KVM: x86/pmu: Add basic support to enable guest PEBS via DS
 2021-04-20  8:41 UTC  (4+ messages)
` [PATCH v5 10/16] KVM: x86: Set PEBS_UNAVAIL in IA32_MISC_ENABLE when PEBS is enabled

Doubt regarding memory allocation in KVM
 2021-04-20  6:52 UTC  (2+ messages)

[PATCH V4 0/3] vDPA/ifcvf: enables Intel C5000X-PL virtio-blk
 2021-04-20  2:56 UTC  (3+ messages)
` [PATCH V4 1/3] vDPA/ifcvf: deduce VIRTIO device ID when probe

Intercepting RDTSC instruction by causing a VMEXIT
 2021-04-20  2:33 UTC  (3+ messages)

[PATCH v2 00/10] KVM: Consolidate and optimize MMU notifiers
 2021-04-20  1:17 UTC  (7+ messages)
` [PATCH v2 09/10] KVM: Don't take mmu_lock for range invalidation unless necessary

[PATCH fixed] KVM: x86/mmu: Fast invalidation for TDP MMU
 2021-04-19 22:04 UTC 

[kvm:queue 153/154] arch/x86/kvm/mmu/mmu.c:5443:39: error: 'struct kvm_arch' has no member named 'tdp_mmu_roots'
 2021-04-19 18:39 UTC  (3+ messages)

[PATCH 1/2] KVM: x86/mmu: Wrap kvm_mmu_zap_all_fast TDP MMU code in ifdefs
 2021-04-19 18:37 UTC  (2+ messages)
` [PATCH 2/2] KVM: x86/mmu: Fix typo in for_each_tdp_mmu_root

[PATCH kvm-unit-tests 0/8] arm/arm64: Prepare for target-efi
 2021-04-19 18:13 UTC  (9+ messages)
` [PATCH kvm-unit-tests 6/8] arm/arm64: setup: Consolidate memory layout assumptions
` [PATCH kvm-unit-tests 8/8] arm/arm64: psci: don't assume method is hvc

[PATCH v5 00/11] KVM SGX virtualization support (KVM part)
 2021-04-19 17:14 UTC  (6+ messages)
` [PATCH v5 10/11] KVM: VMX: Enable SGX virtualization for SGX1, SGX2 and LC

[PATCH 0/2] gdbstub: implement support for blocking interrupts on single stepping
 2021-04-19 16:29 UTC  (5+ messages)
` [PATCH 1/2] kvm: update kernel headers for KVM_GUESTDBG_BLOCKEVENTS
` [PATCH 2/2] gdbstub: implement NOIRQ support for single step on KVM, when kvm's KVM_GUESTDBG_BLOCKIRQ debug flag is supported

[kvm:queue 149/154] arch/x86/kvm/mmu/tdp_mmu.c:141:5: error: implicit declaration of function 'lockdep_is_help'; did you mean 'lockdep_is_held'?
 2021-04-19 16:30 UTC  (2+ messages)

[PATCH 00/30] KVM: x86: hyper-v: Fine-grained access check to Hyper-V hypercalls and MSRs
 2021-04-19 16:01 UTC  (27+ messages)
` [PATCH 05/30] KVM: x86: hyper-v: Honor HV_MSR_HYPERCALL_AVAILABLE privilege bit
` [PATCH 06/30] KVM: x86: hyper-v: Honor HV_MSR_VP_RUNTIME_AVAILABLE "
` [PATCH 07/30] KVM: x86: hyper-v: Honor HV_MSR_TIME_REF_COUNT_AVAILABLE "
` [PATCH 08/30] KVM: x86: hyper-v: Honor HV_MSR_VP_INDEX_AVAILABLE "
` [PATCH 09/30] KVM: x86: hyper-v: Honor HV_MSR_RESET_AVAILABLE "
` [PATCH 10/30] KVM: x86: hyper-v: Honor HV_MSR_REFERENCE_TSC_AVAILABLE "
` [PATCH 11/30] KVM: x86: hyper-v: Honor HV_MSR_SYNIC_AVAILABLE "
` [PATCH 12/30] KVM: x86: hyper-v: Honor HV_MSR_SYNTIMER_AVAILABLE "
` [PATCH 13/30] KVM: x86: hyper-v: Honor HV_MSR_APIC_ACCESS_AVAILABLE "
` [PATCH 14/30] KVM: x86: hyper-v: Honor HV_ACCESS_FREQUENCY_MSRS "
` [PATCH 15/30] KVM: x86: hyper-v: Honor HV_ACCESS_REENLIGHTENMENT "
` [PATCH 16/30] KVM: x86: hyper-v: Honor HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE "
` [PATCH 17/30] KVM: x86: hyper-v: Honor HV_FEATURE_DEBUG_MSRS_AVAILABLE "
` [PATCH 18/30] KVM: x86: hyper-v: Inverse the default in hv_check_msr_access()
` [PATCH 19/30] KVM: x86: hyper-v: Honor HV_STIMER_DIRECT_MODE_AVAILABLE privilege bit
` [PATCH 20/30] KVM: x86: hyper-v: Prepare to check access to Hyper-V hypercalls
` [PATCH 21/30] KVM: x86: hyper-v: Check access to HVCALL_NOTIFY_LONG_SPIN_WAIT hypercall
` [PATCH 22/30] KVM: x86: hyper-v: Honor HV_POST_MESSAGES privilege bit
` [PATCH 23/30] KVM: x86: hyper-v: Honor HV_SIGNAL_EVENTS "
` [PATCH 24/30] KVM: x86: hyper-v: Honor HV_DEBUGGING "
` [PATCH 25/30] KVM: x86: hyper-v: Honor HV_X64_REMOTE_TLB_FLUSH_RECOMMENDED bit
` [PATCH 26/30] KVM: x86: hyper-v: Honor HV_X64_CLUSTER_IPI_RECOMMENDED bit
` [PATCH 27/30] KVM: x86: hyper-v: Honor HV_X64_EX_PROCESSOR_MASKS_RECOMMENDED bit
` [PATCH 28/30] KVM: selftests: move Hyper-V MSR definitions to hyperv.h
` [PATCH 29/30] KVM: selftests: Move evmcs.h to x86_64/
` [PATCH 30/30] KVM: selftests: Introduce hyperv_features test


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).