kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-06-23 13:02:00 to 2021-06-24 18:14:12 UTC [more...]

[PATCH 0/9] KVM: X86: Some light optimizations on rmap logic
 2021-06-24 18:13 UTC  (6+ messages)
` [PATCH 1/9] KVM: X86: Add per-vm stat for max rmap list size
` [PATCH 2/9] KVM: Introduce kvm_get_kvm_safe()
` [PATCH 3/9] KVM: Allow to have arch-specific per-vm debugfs files
` [PATCH 4/9] KVM: X86: Introduce pte_list_count() helper
` [PATCH 5/9] KVM: X86: Introduce kvm_mmu_slot_lpages() helpers

guest/host mem out of sync on core2duo?
 2021-06-24 18:07 UTC  (13+ messages)
          ` exception vs SIGALRM race (was: Re: guest/host mem out of sync on core2duo?)
              ` exception vs SIGALRM race (with test-case now!)
                    ` exception vs SIGALRM race on core2 CPUs (with qemu-based test-case this time!)

[PATCH] KVM: x86: Fix uninitialized return value bug in EXIT_HYPERCALL enabling
 2021-06-24 18:06 UTC 

Virtualizing MSI-X on IMS via VFIO
 2021-06-24 17:52 UTC  (19+ messages)
          ` [PATCH] vfio/pci: Document the MSI[X] resize side effects properly

[kvm-unit-tests PATCH 00/12] nSVM: NPT improvements and cleanups
 2021-06-24 17:47 UTC  (5+ messages)
` [kvm-unit-tests PATCH 05/12] nSVM: Remove NPT reserved bits tests (new one on the way)

[PATCH 0/7] KVM: x86: guest MAXPHYADDR and C-bit fixes
 2021-06-24 17:39 UTC  (13+ messages)
` [PATCH 1/7] KVM: x86: Use guest MAXPHYADDR from CPUID.0x8000_0008 iff TDP is enabled
` [PATCH 2/7] KVM: x86: Use kernel's x86_phys_bits to handle reduced MAXPHYADDR
` [PATCH 3/7] KVM: x86: Truncate reported guest MAXPHYADDR to C-bit if SEV is supported
` [PATCH 4/7] KVM: x86/mmu: Do not apply HPA (memory encryption) mask to GPAs
` [PATCH 5/7] KVM: VMX: Refactor 32-bit PSE PT creation to avoid using MMU macro
` [PATCH 6/7] KVM: x86/mmu: Bury 32-bit PSE paging helpers in paging_tmpl.h
` [PATCH 7/7] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs

[BUG] vhost-net: Enabling experimental_zcopytx always crashes the host on 5.10, worked fine on 5.4
 2021-06-24 16:28 UTC 

[PATCH 0/3] s390x: Add snippet support
 2021-06-24 16:27 UTC  (7+ messages)
` [PATCH 1/3] s390x: snippets: Add gitignore as well as linker script and start assembly
` [PATCH 2/3] s390x: snippets: Add snippet compilation
` [PATCH 3/3] s390x: mvpg: Add SIE mvpg test

[PATCH 0/6] KVM: Remove uses of struct page from x86 and arm64 MMU
 2021-06-24 15:36 UTC  (32+ messages)
` [PATCH 1/6] KVM: x86/mmu: release audited pfns
` [PATCH 2/6] KVM: mmu: also return page from gfn_to_pfn
` [PATCH 3/6] KVM: x86/mmu: avoid struct page in MMU
` [PATCH 4/6] KVM: arm64/mmu: "
` [PATCH 5/6] KVM: mmu: remove over-aggressive warnings
` [PATCH 6/6] drm/i915/gvt: use gfn_to_pfn's page instead of pfn

[PATCH RFC] KVM: nSVM: Fix L1 state corruption upon return from SMM
 2021-06-24 15:36 UTC  (16+ messages)

[PATCH Part1 RFC v3 00/22] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-06-24 14:11 UTC  (13+ messages)
` [PATCH Part1 RFC v3 20/22] x86/boot: Add Confidential Computing address to setup_header

Plan for /dev/ioasid RFC v2
 2021-06-24 13:42 UTC  (28+ messages)

Plan for /dev/ioasid RFC v2
 2021-06-24 12:22 UTC  (20+ messages)

[PATCH] x86: Add a test for AMD SEV-ES #VC handling
 2021-06-24 10:36 UTC  (3+ messages)
` [PATCH v4] "

[PATCH v8 00/10] Introduce VDUSE - vDPA Device in Userspace
 2021-06-24  9:16 UTC  (14+ messages)
` [PATCH v8 09/10] vduse: "
    `  "

[PATCH 00/10] My AVIC patch queue
 2021-06-24  8:16 UTC  (14+ messages)
` [PATCH 02/10] KVM: x86: APICv: fix race in kvm_request_apicv_update on SVM
` [PATCH 03/10] KVM: x86: rename apic_access_page_done to apic_access_memslot_enabled
` [PATCH 04/10] KVM: SVM: add warning for mistmatch between AVIC state and AVIC access page state
` [PATCH 06/10] KVM: SVM: tweak warning about enabled AVIC on nested entry
` [PATCH 07/10] KVM: SVM: use vmcb01 in svm_refresh_apicv_exec_ctrl

[kvm:queue 329/331] arch/x86/kvm/x86.c:5646:7: warning: variable 'r' is used uninitialized whenever 'if' condition is false
 2021-06-24  7:36 UTC  (2+ messages)

[PATCH] KVM: selftests: Fix mapping length truncation in m{,un}map()
 2021-06-24  7:19 UTC  (2+ messages)

[PATCH] KVM: selftests: Speed up set_memory_region_test
 2021-06-24  7:18 UTC  (4+ messages)

[PATCH v2] KVM: VMX: Enable Notify VM exit
 2021-06-24  4:52 UTC  (2+ messages)

[RFC] /dev/ioasid uAPI proposal
 2021-06-24  3:55 UTC  (24+ messages)

[PATCH v2] virtio_net/vringh: add "else { }" according coding style
 2021-06-24  4:02 UTC  (2+ messages)

[RESEND PATCH v4 00/10] KVM: x86/pmu: Guest Architectural LBR Enabling
 2021-06-24  1:35 UTC  (9+ messages)
` [RESEND PATCH v4 03/10] KVM: vmx/pmu: Add MSR_ARCH_LBR_DEPTH emulation for Arch LBR
` [RESEND PATCH v4 04/10] KVM: vmx/pmu: Add MSR_ARCH_LBR_CTL "

[PATCH 00/54] KVM: x86/mmu: Bug fixes and summer cleaning
 2021-06-23 22:12 UTC  (52+ messages)
` [PATCH 03/54] KVM: x86: Properly reset MMU context at vCPU RESET/INIT
` [PATCH 07/54] KVM: x86: Alert userspace that KVM_SET_CPUID{,2} after KVM_RUN is broken
` [PATCH 09/54] KVM: x86/mmu: Unconditionally zap unsync SPs when creating >4k SP at GFN
` [PATCH 10/54] KVM: x86/mmu: Replace EPT shadow page shenanigans with simpler check
` [PATCH 12/54] KVM: x86/mmu: Drop the intermediate "transient" __kvm_sync_page()
` [PATCH 15/54] KVM: nSVM: Add a comment to document why nNPT uses vmcb01, not vCPU state
` [PATCH 16/54] KVM: x86/mmu: Drop smep_andnot_wp check from "uses NX" for shadow MMUs
` [PATCH 18/54] KVM: x86/mmu: Move nested NPT reserved bit calculation into MMU proper
` [PATCH 20/54] KVM: x86/mmu: Add struct and helpers to retrieve MMU role bits from regs
` [PATCH 25/54] KVM: x86/mmu: Add helpers to query mmu_role bits
` [PATCH 41/54] KVM: x86/mmu: Consolidate reset_rsvds_bits_mask() calls
` [PATCH 47/54] KVM: x86/mmu: Add helpers to do full reserved SPTE checks w/ generic MMU
` [PATCH 50/54] KVM: x86/mmu: Optimize and clean up so called "last nonleaf level" logic

[PATCH v6 0/2] fallback for emulation errors
 2021-06-23 21:44 UTC  (6+ messages)
` [PATCH v6 1/2] kvm: x86: Allow userspace to handle "

[PATCH] kvm: x86: disable the narrow guest module parameter on unload
 2021-06-23 21:37 UTC  (4+ messages)

[PATCH v2 0/2] vfio: export and make use of pci_dev_trylock()
 2021-06-23 18:20 UTC  (4+ messages)
` [PATCH v2 2/2] vfio: use the new pci_dev_trylock() helper to simplify try lock

[PATCH RFC 0/7] Introduce support for guest AMX feature
 2021-06-23 17:50 UTC  (4+ messages)
` [PATCH RFC 2/7] kvm: x86: Introduce XFD MSRs as passthrough to guest

[PATCH v4 0/9] KVM: arm64: Initial host support for the Apple M1
 2021-06-23 16:18 UTC  (10+ messages)
` [PATCH v4 6/9] KVM: arm64: vgic: Implement SW-driven deactivation

[PATCH] KVM: x86/mmu: Don't WARN on a NULL shadow page in TDP MMU check
 2021-06-23 13:26 UTC  (2+ messages)

[PATCH 0/3] x86/sev: Minor updates for SEV guest support
 2021-06-23 13:12 UTC  (5+ messages)
` [PATCH 2/3] x86/sev: Add defines for GHCB version 2 MSR protocol requests

[PATCH 00/19] KVM: selftests: Add x86 mmu_role test and cleanups
 2021-06-23 13:07 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).