kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-07-12 14:43:59 to 2021-07-13 18:00:14 UTC [more...]

[RFC PATCH v2 00/69] KVM: X86: TDX support
 2021-07-13 18:00 UTC  (7+ messages)
` [RFC PATCH v2 01/69] KVM: TDX: introduce config for KVM "
` [RFC PATCH v2 02/69] KVM: X86: move kvm_cpu_vmxon() from vmx.c to virtext.h
` [RFC PATCH v2 03/69] KVM: X86: move out the definition vmcs_hdr/vmcs from kvm to x86

[PATCH 0/2] KVM: Don't take mmu_lock for range invalidation unless necessary
 2021-07-13 17:34 UTC  (3+ messages)
` [PATCH 1/2] KVM: Block memslot updates across range_start() and range_end()

[PATCH v5 00/13] Introduce Architectural LBR for vPMU
 2021-07-13 17:12 UTC  (21+ messages)
` [PATCH v5 05/13] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
` [PATCH v5 06/13] KVM: x86/vmx: Save/Restore host MSR_ARCH_LBR_CTL state

[PATCH v3 kvmtool 0/4] arm/arm64: PCI Express 1.1 support
 2021-07-13 17:06 UTC  (5+ messages)
` [PATCH v3 kvmtool 1/4] Move fdt_irq_fn typedef to fdt.h
` [PATCH v3 kvmtool 2/4] arm/fdt.c: Don't generate the node if generator function is NULL
` [PATCH v3 kvmtool 3/4] arm/arm64: Add PCI Express 1.1 support
` [PATCH v3 kvmtool 4/4] arm/arm64: vfio: Add PCI Express Capability Structure

[PATCH v2 00/46] KVM: x86: vCPU RESET/INIT fixes and consolidation
 2021-07-13 16:33 UTC  (47+ messages)
` [PATCH v2 01/46] KVM: x86: Flush the guest's TLB on INIT
` [PATCH v2 02/46] KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-Exit
` [PATCH v2 03/46] KVM: SVM: Zero out GDTR.base and IDTR.base on INIT
` [PATCH v2 04/46] KVM: VMX: Set EDX at INIT with CPUID.0x1, Family-Model-Stepping
` [PATCH v2 05/46] KVM: SVM: Require exact CPUID.0x1 match when stuffing EDX at INIT
` [PATCH v2 06/46] KVM: SVM: Fall back to KVM's hardcoded value for EDX at RESET/INIT
` [PATCH v2 07/46] KVM: VMX: Remove explicit MMU reset in enter_rmode()
` [PATCH v2 08/46] KVM: SVM: Drop explicit MMU reset at RESET/INIT
` [PATCH v2 09/46] KVM: SVM: Drop a redundant init_vmcb() from svm_create_vcpu()
` [PATCH v2 10/46] KVM: VMX: Move init_vmcs() invocation to vmx_vcpu_reset()
` [PATCH v2 11/46] KVM: x86: WARN if the APIC map is dirty without an in-kernel local APIC
` [PATCH v2 12/46] KVM: x86: Remove defunct BSP "update" in local APIC reset
` [PATCH v2 13/46] KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP
` [PATCH v2 14/46] KVM: x86: Don't force set BSP bit when local APIC is managed by userspace
` [PATCH v2 15/46] KVM: x86: Set BSP bit in reset BSP vCPU's APIC base by default
` [PATCH v2 16/46] KVM: VMX: Stuff vcpu->arch.apic_base directly at vCPU RESET
` [PATCH v2 17/46] KVM: x86: Open code necessary bits of kvm_lapic_set_base() "
` [PATCH v2 18/46] KVM: x86: Consolidate APIC base RESET initialization code
` [PATCH v2 19/46] KVM: x86: Move EDX initialization at vCPU RESET to common code
` [PATCH v2 20/46] KVM: SVM: Don't bother writing vmcb->save.rip at vCPU RESET/INIT
` [PATCH v2 21/46] KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest
` [PATCH v2 22/46] KVM: VMX: Remove direct write to vcpu->arch.cr0 during vCPU RESET/INIT
` [PATCH v2 23/46] KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0()
` [PATCH v2 24/46] KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants 'em
` [PATCH v2 25/46] KVM: VMX: Pull GUEST_CR3 from the VMCS iff CR3 load exiting is disabled
` [PATCH v2 26/46] KVM: x86/mmu: Skip the permission_fault() check on MMIO if CR0.PG=0
` [PATCH v2 27/46] KVM: VMX: Process CR0.PG side effects after setting CR0 assets
` [PATCH v2 28/46] KVM: VMX: Skip emulation required checks during pmode/rmode transitions
` [PATCH v2 29/46] KVM: nVMX: Don't evaluate "emulation required" on nested VM-Exit
` [PATCH v2 30/46] KVM: SVM: Tweak order of cr0/cr4/efer writes at RESET/INIT
` [PATCH v2 31/46] KVM: SVM: Drop redundant writes to vmcb->save.cr4 "
` [PATCH v2 32/46] KVM: SVM: Stuff save->dr6 at during VMSA sync, not "
` [PATCH v2 33/46] KVM: VMX: Skip pointless MSR bitmap update when setting EFER
` [PATCH v2 34/46] KVM: VMX: Refresh list of user return MSRs after setting guest CPUID
` [PATCH v2 35/46] KVM: VMX: Don't _explicitly_ reconfigure user return MSRs on vCPU INIT
` [PATCH v2 36/46] KVM: x86: Move setting of sregs during vCPU RESET/INIT to common x86
` [PATCH v2 37/46] KVM: VMX: Remove obsolete MSR bitmap refresh at vCPU RESET/INIT
` [PATCH v2 38/46] KVM: nVMX: Remove obsolete MSR bitmap refresh at nested transitions
` [PATCH v2 39/46] KVM: VMX: Don't redo x2APIC MSR bitmaps when userspace filter is changed
` [PATCH v2 40/46] KVM: VMX: Remove unnecessary initialization of msr_bitmap_mode
` [PATCH v2 41/46] KVM: VMX: Smush x2APIC MSR bitmap adjustments into single function
` [PATCH v2 42/46] KVM: VMX: Remove redundant write to set vCPU as active at RESET/INIT
` [PATCH v2 43/46] KVM: VMX: Move RESET-only VMWRITE sequences to init_vmcs()
` [PATCH v2 44/46] KVM: SVM: Emulate #INIT in response to triple fault shutdown
` [PATCH v2 45/46] KVM: SVM: Drop redundant clearing of vcpu->arch.hflags at INIT/RESET
` [PATCH v2 46/46] KVM: x86: Preserve guest's CR0.CD/NW on INIT

[RFC v2] /dev/iommu uAPI proposal
 2021-07-13 16:32 UTC  (9+ messages)

[PULL 00/11] x86 queue, 2021-07-13
 2021-07-13 16:09 UTC  (12+ messages)
` [PULL 01/11] i386: clarify 'hv-passthrough' behavior
` [PULL 02/11] i386: hardcode supported eVMCS version to '1'
` [PULL 03/11] i386: make hyperv_expand_features() return bool
` [PULL 04/11] i386: expand Hyper-V features during CPU feature expansion time
` [PULL 05/11] i386: kill off hv_cpuid_check_and_set()
` [PULL 06/11] i386: HV_HYPERCALL_AVAILABLE privilege bit is always needed
` [PULL 07/11] i386: Hyper-V SynIC requires POST_MESSAGES/SIGNAL_EVENTS privileges
` [PULL 08/11] target/i386: suppress CPUID leaves not defined by the CPU vendor
` [PULL 09/11] target/i386: Fix cpuid level for AMD
` [PULL 10/11] numa: Report expected initiator
` [PULL 11/11] numa: Parse initiator= attribute before cpus= attribute

[PATCH] KVM: arm64: Fix detection of shared VMAs on guest fault
 2021-07-13 16:18 UTC  (2+ messages)

[PATCH 0/3] kvm-arm64: Fix PMU reset values (and more)
 2021-07-13 16:15 UTC  (7+ messages)
` [PATCH 1/3] KVM: arm64: Narrow PMU sysreg reset values to architectural requirements
` [PATCH 2/3] KVM: arm64: Drop unnecessary masking of PMU registers
` [PATCH 3/3] KVM: arm64: Disabling disabled PMU counters wastes a lot of time

[PATCH] KVM: s390: generate kvm hypercall functions
 2021-07-13 16:15 UTC  (5+ messages)

[PATCH 0/3] kvm: svm: Add initial GHCB protocol version 2 support
 2021-07-13 14:59 UTC  (6+ messages)
` [PATCH 1/3] KVM: SVM: Add support to handle AP reset MSR protocol
` [PATCH 2/3] KVM: SVM: Add support for Hypervisor Feature support "
` [PATCH 3/3] KVM: SVM: Increase supported GHCB protocol version

[PATCH v2 0/8] My AVIC patch queue
 2021-07-13 14:20 UTC  (9+ messages)
` [PATCH v2 1/8] KVM: SVM: svm_set_vintr don't warn if AVIC is active but is about to be deactivated
` [PATCH v2 2/8] KVM: SVM: tweak warning about enabled AVIC on nested entry
` [PATCH v2 3/8] KVM: SVM: use vmcb01 in svm_refresh_apicv_exec_ctrl
` [PATCH v2 4/8] KVM: x86: APICv: drop immediate APICv disablement on current vCPU
` [PATCH v2 5/8] KVM: x86: APICv: fix race in kvm_request_apicv_update on SVM
` [PATCH v2 6/8] KVM: SVM: add warning for mistmatch between AVIC state and AVIC access page state
` [PATCH v2 7/8] KVM: SVM: call avic_vcpu_load/avic_vcpu_put when enabling/disabling AVIC
` [PATCH v2 8/8] KVM: x86: hyper-v: Deactivate APICv only when AutoEOI feature is in use

[RFC PATCH 0/6] Add AMD Secure Nested Paging (SEV-SNP) support
 2021-07-13 14:01 UTC  (17+ messages)
` [RFC PATCH 1/6] linux-header: add the SNP specific command
` [RFC PATCH 2/6] i386/sev: extend sev-guest property to include SEV-SNP

[PATCH v9 00/17] Introduce VDUSE - vDPA Device in Userspace
 2021-07-13 13:27 UTC  (22+ messages)
` [PATCH v9 01/17] iova: Export alloc_iova_fast() and free_iova_fast()
` [PATCH v9 02/17] file: Export receive_fd() to modules
` [PATCH v9 03/17] vdpa: Fix code indentation
` [PATCH v9 04/17] vdpa: Fail the vdpa_reset() if fail to set device status to zero
` [PATCH v9 05/17] vhost-vdpa: Fail the vhost_vdpa_set_status() on reset failure
` [PATCH v9 06/17] vhost-vdpa: Handle the failure of vdpa_reset()
` [PATCH v9 07/17] virtio: Don't set FAILED status bit on device index allocation failure
` [PATCH v9 08/17] virtio_config: Add a return value to reset function
` [PATCH v9 09/17] virtio-vdpa: Handle the failure of vdpa_reset()
` [PATCH v9 10/17] virtio: Handle device reset failure in register_virtio_device()
` [PATCH v9 11/17] vhost-iotlb: Add an opaque pointer for vhost IOTLB
` [PATCH v9 12/17] vdpa: Add an opaque pointer for vdpa_config_ops.dma_map()
` [PATCH v9 13/17] vdpa: factor out vhost_vdpa_pa_map() and vhost_vdpa_pa_unmap()
` [PATCH v9 14/17] vdpa: Support transferring virtual addressing during DMA mapping
` [PATCH v9 15/17] vduse: Implement an MMU-based IOMMU driver
` [PATCH v9 16/17] vduse: Introduce VDUSE - vDPA Device in Userspace
` [PATCH v9 17/17] Documentation: Add documentation for VDUSE

[PATCH v2 1/1] tools: Rename bitmap_alloc() to bitmap_zalloc()
 2021-07-13  9:37 UTC  (2+ messages)

[kvm-unit-tests RFC PATCH 0/5] arm: Add kvmtool to the runner script
 2021-07-13  7:45 UTC  (11+ messages)
` [kvm-unit-tests RFC PATCH 1/5] lib: arm: Print test exit status on exit if chr-testdev is not available
` [kvm-unit-tests RFC PATCH 2/5] scripts: Rename run_qemu_status -> run_test_status
` [kvm-unit-tests RFC PATCH 3/5] run_tests.sh: Add kvmtool support

[PATCH v3 0/5] bus: Make remove callback return void
 2021-07-13  7:40 UTC  (3+ messages)
` [PATCH v3 2/5] s390/cio: Make struct css_driver::remove "
` [PATCH v3 5/5] bus: Make remove callback "

[PATCH] Revert "KVM: x86: WARN and reject loading KVM if NX is supported but not enabled"
 2021-07-13  3:59 UTC  (6+ messages)

[PATCH] KVM: const-ify all relevant uses of struct kvm_memory_slot
 2021-07-13  2:33 UTC 

[PATCH] KVM: kvm_vcpu_kick: Do not read potentially-stale vcpu->cpu
 2021-07-13  1:45 UTC  (4+ messages)

[syzbot] general protection fault in try_grab_compound_head
 2021-07-13  1:08 UTC  (4+ messages)

[PATCH v2 0/6] KVM: x86/mmu: Fast page fault support for the TDP MMU
 2021-07-12 21:24 UTC  (18+ messages)
` [PATCH v2 1/6] KVM: x86/mmu: Rename cr2_or_gpa to gpa in fast_page_fault
` [PATCH v2 2/6] KVM: x86/mmu: Fix use of enums in trace_fast_page_fault
` [PATCH v2 3/6] KVM: x86/mmu: Make walk_shadow_page_lockless_{begin,end} interoperate with the TDP MMU
` [PATCH v2 4/6] KVM: x86/mmu: fast_page_fault support for "

[PATCH 0/3] Add AMD SEV and SEV-ES local migration support
 2021-07-12 21:09 UTC  (5+ messages)
` [PATCH 1/3] KVM, SEV: Refactor out function for unregistering encrypted regions
` [PATCH 2/3] KVM, SEV: Add support for SEV local migration

[Kvmtool] Some thoughts on using kvmtool Virtio for Xen
 2021-07-12 20:52 UTC  (3+ messages)

[PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2021-07-12 19:00 UTC  (15+ messages)
` [PATCH Part2 RFC v4 06/40] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH Part2 RFC v4 10/40] x86/fault: Add support to handle the RMP fault for user address
` [PATCH Part2 RFC v4 23/40] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command

[PATCH v1 1/4] KVM: stats: Support linear and logarithmic histogram statistics
 2021-07-12 18:53 UTC  (4+ messages)

[PATCH v3] KVM: arm64: Disabling disabled PMU counters wastes a lot of time
 2021-07-12 17:03 UTC 

[kvm-unit-tests PATCH 0/6] Initial x86_64 UEFI support
 2021-07-12 16:29 UTC  (2+ messages)

[PATCH v2] KVM: arm64: Disabling disabled PMU counters wastes a lot of time
 2021-07-12 16:02 UTC  (5+ messages)

[PATCH v2 0/2] kvm: x86: Convey the exit reason to user-space on emulation failure
 2021-07-12 15:34 UTC  (4+ messages)
` [PATCH v2 2/2] KVM: x86: On emulation failure, convey the exit reason to userspace

About two-dimensional page translation (e.g., Intel EPT) and shadow page table in Linux QEMU/KVM
 2021-07-12 14:56 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).