kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-10-06 17:40:44 to 2021-10-08 08:23:06 UTC [more...]

[PATCH v1 3/5] KVM: x86: nVMX: VMCS12 field's read/write respects field existence bitmap
 2021-10-08  8:23 UTC  (11+ messages)

[kvm-unit-tests PATCH v3 0/9] s390x: Cleanup and maintenance 2
 2021-10-08  8:13 UTC  (21+ messages)
` [kvm-unit-tests PATCH v3 1/9] s390x: uv: Tolerate 0x100 query return code
` [kvm-unit-tests PATCH v3 2/9] s390x: uv-host: Fence a destroy cpu test on z15
` [kvm-unit-tests PATCH v3 3/9] lib: s390x: uv: Fix share return value and print
` [kvm-unit-tests PATCH v3 4/9] lib: s390x: uv: Add UVC_ERR_DEBUG switch
` [kvm-unit-tests PATCH v3 5/9] lib: s390x: Add access key argument to tprot
` [kvm-unit-tests PATCH v3 6/9] lib: s390x: Print PGM code as hex
` [kvm-unit-tests PATCH v3 7/9] s390x: Add sthyi cc==0 r2+1 verification
` [kvm-unit-tests PATCH v3 8/9] s390x: snippets: Set stackptr and stacktop in cstart.S
` [kvm-unit-tests PATCH v3 9/9] s390x: snippets: Define all things that are needed to link the lib

[PATCH v3 0/5] Add SBI v0.2 support for KVM
 2021-10-08  7:24 UTC  (7+ messages)
` [PATCH v3 1/5] RISC-V: Mark the existing SBI v0.1 implementation as legacy
` [PATCH v3 2/5] RISC-V: Reorganize SBI code by moving legacy SBI to its own file
` [PATCH v3 3/5] RISC-V: Add SBI v0.2 base extension
` [PATCH v3 4/5] RISC-V: Add v0.1 replacement SBI extensions defined in v02
` [PATCH v3 5/5] RISC-V: Add SBI HSM extension in KVM

[PATCH kvm-unit-tests] parse_keyval: Allow hex vals
 2021-10-08  7:06 UTC  (2+ messages)

[kvm-unit-tests PATCH] arm64: Add mmio_addr arg to arm/micro-bench
 2021-10-08  6:28 UTC  (2+ messages)

linux-next: manual merge of the kvm tree with the asm-generic tree
 2021-10-08  2:16 UTC 

[PATCH v8 00/15] KVM: arm64: selftests: Introduce arch_timer selftest
 2021-10-07 23:34 UTC  (16+ messages)
` [PATCH v8 01/15] KVM: arm64: selftests: Add MMIO readl/writel support
` [PATCH v8 02/15] tools: arm64: Import sysreg.h
` [PATCH v8 03/15] KVM: arm64: selftests: Use read/write definitions from sysreg.h
` [PATCH v8 04/15] KVM: arm64: selftests: Introduce ARM64_SYS_KVM_REG
` [PATCH v8 05/15] KVM: arm64: selftests: Add support for cpu_relax
` [PATCH v8 06/15] KVM: arm64: selftests: Add basic support for arch_timers
` [PATCH v8 07/15] KVM: arm64: selftests: Add basic support to generate delays
` [PATCH v8 08/15] KVM: arm64: selftests: Add support to disable and enable local IRQs
` [PATCH v8 09/15] KVM: arm64: selftests: Maintain consistency for vcpuid type
` [PATCH v8 10/15] KVM: arm64: selftests: Add guest support to get the vcpuid
` [PATCH v8 11/15] KVM: arm64: selftests: Add light-weight spinlock support
` [PATCH v8 12/15] KVM: arm64: selftests: Add basic GICv3 support
` [PATCH v8 13/15] KVM: arm64: selftests: Add host support for vGIC
` [PATCH v8 14/15] KVM: arm64: selftests: Add arch_timer test
` [PATCH v8 15/15] KVM: arm64: selftests: arch_timer: Support vCPU migration

[PATCH] KVM: x86: Account for 32-bit kernels when handling address in TSC attrs
 2021-10-07 23:16 UTC 

[PATCH v4 00/23] target/i386/sev: Housekeeping SEV + measured Linux SEV guest
 2021-10-07 19:51 UTC  (33+ messages)
` [PATCH v4 01/23] qapi/misc-target: Wrap long 'SEV Attestation Report' long lines
` [PATCH v4 02/23] qapi/misc-target: Group SEV QAPI definitions
` [PATCH v4 03/23] target/i386/kvm: Introduce i386_softmmu_kvm Meson source set
` [PATCH v4 04/23] target/i386/kvm: Restrict SEV stubs to x86 architecture
` [PATCH v4 05/23] target/i386/sev: Prefix QMP errors with 'SEV'
` [PATCH v4 06/23] target/i386/monitor: Return QMP error when SEV is not enabled for guest
` [PATCH v4 07/23] target/i386/cpu: Add missing 'qapi/error.h' header
` [PATCH v4 08/23] target/i386/sev_i386.h: Remove unused headers
` [PATCH v4 09/23] target/i386/sev: Remove sev_get_me_mask()
` [PATCH v4 10/23] target/i386/sev: Mark unreachable code with g_assert_not_reached()
` [PATCH v4 11/23] target/i386/sev: sev_get_attestation_report use g_autofree
` [PATCH v4 12/23] target/i386/sev: Use g_autofree in sev_launch_get_measure()
` [PATCH v4 13/23] target/i386/sev: Restrict SEV to system emulation
` [PATCH v4 14/23] target/i386/sev: Rename sev_i386.h -> sev.h
` [PATCH v4 15/23] target/i386/sev: Declare system-specific functions in 'sev.h'
` [PATCH v4 16/23] target/i386/sev: Remove stubs by using code elision
` [PATCH v4 17/23] target/i386/sev: Move qmp_query_sev_attestation_report() to sev.c
` [PATCH v4 18/23] target/i386/sev: Move qmp_sev_inject_launch_secret() "
` [PATCH v4 19/23] target/i386/sev: Move qmp_query_sev_capabilities() "
` [PATCH v4 20/23] target/i386/sev: Move qmp_query_sev_launch_measure() "
` [PATCH v4 21/23] target/i386/sev: Move qmp_query_sev() & hmp_info_sev() "
` [PATCH v4 22/23] monitor: Reduce hmp_info_sev() declaration
` [PATCH v4 23/23] MAINTAINERS: Cover SEV-related files with X86/KVM section

[PATCH MANUALSEL 5.14 1/9] selftests: KVM: Align SMCCC call with the spec in steal_time
 2021-10-07 17:47 UTC  (5+ messages)
` [PATCH MANUALSEL 5.14 4/9] KVM: x86: reset pdptrs_from_userspace when exiting smm

[PATCH v2] KVM: arm64: Allow KVM to be disabled from the command line
 2021-10-07 16:59 UTC  (2+ messages)

[PATCH v2 00/16] KVM: arm64: MMIO guard PV services
 2021-10-07 15:52 UTC  (13+ messages)
` [PATCH v2 06/16] KVM: arm64: Force a full unmap on vpcu reinit
` [PATCH v2 07/16] KVM: arm64: Wire MMIO guard hypercalls
` [PATCH v2 09/16] KVM: arm64: Advertise a capability for MMIO guard
` [PATCH v2 10/16] KVM: arm64: Add some documentation for the MMIO guard feature
` [PATCH v2 13/16] arm64: Implement ioremap/iounmap hooks calling into KVM's MMIO guard

[PATCH v3 00/22] target/i386/sev: Housekeeping SEV + measured Linux SEV guest
 2021-10-07 15:18 UTC  (19+ messages)
` [PATCH v3 05/22] target/i386/monitor: Return QMP error when SEV is disabled in build
` [PATCH v3 13/22] target/i386/sev: Remove stubs by using code elision
` [PATCH v3 14/22] target/i386/sev: Move qmp_query_sev_attestation_report() to sev.c
` [PATCH v3 19/22] monitor: Restrict 'info sev' to x86 targets
` [PATCH v3 22/22] MAINTAINERS: Cover AMD SEV files

[PATCH v20 00/17] KVM RISC-V Support
 2021-10-07 14:31 UTC  (4+ messages)

[PATCH 0/2] s390: downsize my responsibilities
 2021-10-07 11:55 UTC  (8+ messages)
` [PATCH 1/2] KVM: s390: remove myself as reviewer
` [PATCH 2/2] vfio-ccw: step down as maintainer

[RFC 00/20] Introduce /dev/iommu for userspace I/O address space management
 2021-10-07 11:35 UTC  (8+ messages)
` [RFC 07/20] iommu/iommufd: Add iommufd_[un]bind_device()

[PATCH] iommu: intel: remove flooding of non-error logs, when new-DMA-PTE is the same as old-DMA-PTE
 2021-10-07  9:03 UTC  (5+ messages)

[kvm-unit-tests PATCH] s390x/mvpg-sie: Remove unused variable
 2021-10-07  8:14 UTC  (3+ messages)

[GIT PULL] KVM/riscv for 5.16
 2021-10-07  6:59 UTC  (2+ messages)

[kvm-unit-tests PATCH v2 5/5] Use report_pass(...) instead of report(1/true, ...)
 2021-10-07  6:50 UTC  (2+ messages)

[PATCH v2 00/10] KVM: x86: Clean up RESET "emulation"
 2021-10-06 23:04 UTC  (4+ messages)
` [PATCH v2 06/10] KVM: x86: Fold fx_init() into kvm_arch_vcpu_create()

[syzbot] general protection fault in rcu_segcblist_enqueue
 2021-10-06 22:52 UTC  (3+ messages)

[RFC 00/16] KVM: selftests: Add tests for SEV, SEV-ES, and SEV-SNP guests
 2021-10-06 20:59 UTC  (8+ messages)
` [RFC 04/16] KVM: selftests: add library for creating/interacting with SEV guests
` [RFC 04/16] KVM: selftests: set CPUID before setting sregs in vcpu creation
` [RFC 05/16] KVM: selftests: add support for encrypted vm_vaddr_* allocations
` [RFC 06/16] KVM: selftests: add library for creating/interacting with SEV guests
` [RFC 07/16] KVM: selftests: add SEV boot tests
` [RFC 08/16] KVM: SVM: include CR3 in initial VMSA state for SEV-ES guests

[PATCH v12 00/77] VM introspection
 2021-10-06 17:31 UTC  (75+ messages)
` [PATCH v12 01/77] KVM: UAPI: add error codes used by the VM introspection code
` [PATCH v12 02/77] KVM: add kvm_vcpu_kick_and_wait()
` [PATCH v12 03/77] KVM: x86: add kvm_arch_vcpu_get_regs() and kvm_arch_vcpu_get_sregs()
` [PATCH v12 04/77] KVM: x86: add kvm_arch_vcpu_set_regs()
` [PATCH v12 05/77] KVM: x86: avoid injecting #PF when emulate the VMCALL instruction
` [PATCH v12 06/77] KVM: x86: add kvm_x86_ops.bp_intercepted()
` [PATCH v12 07/77] KVM: x86: add kvm_x86_ops.control_cr3_intercept()
` [PATCH v12 08/77] KVM: x86: add kvm_x86_ops.cr3_write_intercepted()
` [PATCH v12 09/77] KVM: x86: add kvm_x86_ops.desc_ctrl_supported()
` [PATCH v12 11/77] KVM: x86: add kvm_x86_ops.control_desc_intercept()
` [PATCH v12 12/77] KVM: x86: add kvm_x86_ops.desc_intercepted()
` [PATCH v12 13/77] KVM: x86: add kvm_x86_ops.msr_write_intercepted()
` [PATCH v12 14/77] KVM: x86: svm: use the vmx convention to control the MSR interception
` [PATCH v12 15/77] KVM: x86: add kvm_x86_ops.control_msr_intercept()
` [PATCH v12 16/77] KVM: x86: save the error code during EPT/NPF exits handling
` [PATCH v12 17/77] KVM: x86: add kvm_x86_ops.fault_gla()
` [PATCH v12 18/77] KVM: x86: add kvm_x86_ops.control_singlestep()
` [PATCH v12 20/77] KVM: x86: extend kvm_mmu_gva_to_gpa_system() with the 'access' parameter
` [PATCH v12 21/77] KVM: x86: export kvm_inject_pending_exception()
` [PATCH v12 22/77] KVM: x86: export kvm_vcpu_ioctl_x86_get_xsave()
` [PATCH v12 23/77] KVM: x86: export kvm_vcpu_ioctl_x86_set_xsave()
` [PATCH v12 24/77] KVM: x86: page track: provide all callbacks with the guest virtual address
` [PATCH v12 25/77] KVM: x86: page track: add track_create_slot() callback
` [PATCH v12 26/77] KVM: x86: page_track: add support for preread, prewrite and preexec
` [PATCH v12 27/77] KVM: x86: wire in the preread/prewrite/preexec page trackers
` [PATCH v12 29/77] KVM: introduce VM introspection
` [PATCH v12 30/77] KVM: introspection: add hook/unhook ioctls
` [PATCH v12 31/77] KVM: introspection: add permission access ioctls
` [PATCH v12 32/77] KVM: introspection: add the read/dispatch message function
` [PATCH v12 33/77] KVM: introspection: add KVMI_GET_VERSION
` [PATCH v12 34/77] KVM: introspection: add KVMI_VM_CHECK_COMMAND and KVMI_VM_CHECK_EVENT
` [PATCH v12 35/77] KVM: introspection: add KVMI_VM_GET_INFO
` [PATCH v12 36/77] KVM: introspection: add KVM_INTROSPECTION_PREUNHOOK
` [PATCH v12 37/77] KVM: introspection: add KVMI_VM_EVENT_UNHOOK
` [PATCH v12 38/77] KVM: introspection: add KVMI_VM_CONTROL_EVENTS
` [PATCH v12 39/77] KVM: introspection: add KVMI_VM_READ_PHYSICAL/KVMI_VM_WRITE_PHYSICAL
` [PATCH v12 40/77] KVM: introspection: add vCPU related data
` [PATCH v12 41/77] KVM: introspection: add a jobs list to every introspected vCPU
` [PATCH v12 42/77] KVM: introspection: handle vCPU introspection requests
` [PATCH v12 43/77] KVM: introspection: handle vCPU commands
` [PATCH v12 44/77] KVM: introspection: add KVMI_VCPU_GET_INFO
` [PATCH v12 45/77] KVM: introspection: add KVMI_VM_PAUSE_VCPU
` [PATCH v12 46/77] KVM: introspection: add support for vCPU events
` [PATCH v12 47/77] KVM: introspection: add KVMI_VCPU_EVENT_PAUSE
` [PATCH v12 48/77] KVM: introspection: add the crash action handling on the event reply
` [PATCH v12 49/77] KVM: introspection: add KVMI_VCPU_CONTROL_EVENTS
` [PATCH v12 50/77] KVM: introspection: add KVMI_VCPU_GET_REGISTERS
` [PATCH v12 51/77] KVM: introspection: add KVMI_VCPU_SET_REGISTERS
` [PATCH v12 52/77] KVM: introspection: add KVMI_VCPU_GET_CPUID
` [PATCH v12 53/77] KVM: introspection: add KVMI_VCPU_EVENT_HYPERCALL
` [PATCH v12 54/77] KVM: introspection: add KVMI_VCPU_EVENT_BREAKPOINT
` [PATCH v12 55/77] KVM: introspection: add cleanup support for vCPUs
` [PATCH v12 56/77] KVM: introspection: restore the state of #BP interception on unhook
` [PATCH v12 57/77] KVM: introspection: add KVMI_VM_CONTROL_CLEANUP
` [PATCH v12 58/77] KVM: introspection: add KVMI_VCPU_CONTROL_CR and KVMI_VCPU_EVENT_CR
` [PATCH v12 59/77] KVM: introspection: restore the state of CR3 interception on unhook
` [PATCH v12 60/77] KVM: introspection: add KVMI_VCPU_INJECT_EXCEPTION + KVMI_VCPU_EVENT_TRAP
` [PATCH v12 61/77] KVM: introspection: add KVMI_VCPU_EVENT_XSETBV
` [PATCH v12 62/77] KVM: introspection: add KVMI_VCPU_GET_XCR
` [PATCH v12 63/77] KVM: introspection: add KVMI_VCPU_GET_XSAVE
` [PATCH v12 64/77] KVM: introspection: add KVMI_VCPU_SET_XSAVE
` [PATCH v12 65/77] KVM: introspection: add KVMI_VCPU_GET_MTRR_TYPE
` [PATCH v12 66/77] KVM: introspection: add KVMI_VCPU_EVENT_DESCRIPTOR
` [PATCH v12 67/77] KVM: introspection: restore the state of descriptor-table register interception on unhook
` [PATCH v12 68/77] KVM: introspection: add KVMI_VCPU_CONTROL_MSR and KVMI_VCPU_EVENT_MSR
` [PATCH v12 69/77] KVM: introspection: restore the state of MSR interception on unhook
` [PATCH v12 70/77] KVM: introspection: add KVMI_VM_SET_PAGE_ACCESS
` [PATCH v12 71/77] KVM: introspection: add KVMI_VCPU_EVENT_PF
` [PATCH v12 72/77] KVM: introspection: extend KVMI_GET_VERSION with struct kvmi_features
` [PATCH v12 73/77] KVM: introspection: add KVMI_VCPU_CONTROL_SINGLESTEP
` [PATCH v12 74/77] KVM: introspection: add KVMI_VCPU_EVENT_SINGLESTEP
` [PATCH v12 75/77] KVM: introspection: add KVMI_VCPU_TRANSLATE_GVA
` [PATCH v12 76/77] KVM: introspection: emulate a guest page table walk on SPT violations due to A/D bit updates
` [PATCH v12 77/77] KVM: x86: call the page tracking code on emulation failure


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).