kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-02-09 17:01:02 to 2022-02-10 15:23:35 UTC [more...]

[PATCH RFC 00/39] x86/KVM: Xen HVM guest support
 2022-02-10 15:23 UTC  (8+ messages)
` [PATCH RFC 12/39] KVM: x86/xen: store virq when assigning evtchn
      ` [EXTERNAL] "
` [PATCH RFC 15/39] KVM: x86/xen: handle PV spinlocks slowpath

[PATCH v3 00/30] KVM: s390: enable zPCI for interpretive execution
 2022-02-10 15:23 UTC  (17+ messages)
` [PATCH v3 14/30] vfio/pci: re-introduce CONFIG_VFIO_PCI_ZDEV
` [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier

[RFC v4 0/8] vfio/hisilicon: add ACC live migration driver
 2022-02-10 15:19 UTC  (8+ messages)
` [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
` [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration

[kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
 2022-02-10 15:09 UTC  (5+ messages)
` [kvm-unit-tests PATCH 1/4] configure: Fix whitespaces for the --gen-se-header help text
` [kvm-unit-tests PATCH 2/4] configure: Restrict --target-efi to x86_64
` [kvm-unit-tests PATCH 3/4] configure: Make the --target option available to all architectures
` [kvm-unit-tests PATCH RFC 4/4] Rename --target-efi to --efi-payload

[PATCH v3 00/10] KVM: s390: Do storage key checking
 2022-02-10 14:41 UTC  (17+ messages)
` [PATCH v3 01/10] s390/uaccess: Add copy_from/to_user_key functions
` [PATCH v3 02/10] KVM: s390: Honor storage keys when accessing guest memory
` [PATCH v3 03/10] KVM: s390: handle_tprot: Honor storage keys
` [PATCH v3 04/10] KVM: s390: selftests: Test TEST PROTECTION emulation
` [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
` [PATCH v3 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
` [PATCH v3 07/10] KVM: s390: Rename existing vcpu memop functions
` [PATCH v3 08/10] KVM: s390: Add capability for storage key extension of MEM_OP IOCTL
` [PATCH v3 09/10] KVM: s390: Update api documentation for memop ioctl
` [PATCH v3 10/10] KVM: s390: selftests: Test memops with storage keys

[PATCH] KVM: x86/pmu: Distinguish EVENTSEL bitmasks for uniform event creation and filtering
 2022-02-10 14:09 UTC  (2+ messages)

[PATCH v3 0/5] Improve KVM's interaction with CPU hotplug
 2022-02-10 14:07 UTC  (10+ messages)
` [PATCH v3 1/5] KVM: x86: Move check_processor_compatibility from init ops to runtime ops
` [PATCH v3 2/5] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
` [PATCH v3 4/5] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
` [PATCH v3 5/5] KVM: Do compatibility checks on hotplugged CPUs

[PATCH] perf/amd: Implement errata #1292 workaround for F19h M00-0Fh
 2022-02-10 13:56 UTC  (11+ messages)
` [PATCH v2] perf/amd: Implement erratum "

warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
 2022-02-10 13:44 UTC  (9+ messages)

[PATCH kvm/queue v2 0/3] KVM: x86/pmu: Fix out-of-date AMD amd_event_mapping[]
 2022-02-10 13:29 UTC  (15+ messages)
` [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
      ` KVM: x86: Reconsider the current approach of vPMU

[Bug 199727] CPU freezes in KVM guests during high IO load on host
 2022-02-10 13:22 UTC 

[PATCH 00/23] KVM: MMU: MMU role refactoring
 2022-02-10 11:58 UTC  (22+ messages)
` [PATCH 01/23] KVM: MMU: pass uses_nx directly to reset_shadow_zero_bits_mask
` [PATCH 02/23] KVM: MMU: nested EPT cannot be used in SMM
` [PATCH 03/23] KVM: MMU: remove valid from extended role
` [PATCH 04/23] KVM: MMU: constify uses of struct kvm_mmu_role_regs
` [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role

[kvm-unit-tests BUG] x86: debug.c compilation error with --target-efi
 2022-02-10 11:57 UTC 

[PATCH v2 0/6] KVM: x86/pmu: Count two basic events for emulated instructions
 2022-02-10 11:28 UTC  (6+ messages)
` [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()

Confidential Computing microconference 2022 planning kick-off
 2022-02-10 11:18 UTC 

[PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
 2022-02-10 11:13 UTC  (4+ messages)

[PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
 2022-02-10 10:31 UTC  (6+ messages)

[PATCH v2] KVM: x86: Fix emulation in writing cr8
 2022-02-10  9:45 UTC 

[PATCH] x86 UEFI: Fix broken build for UEFI
 2022-02-10  9:20 UTC 

[kvm-unit-tests PATCH v3 0/2] x86/emulator: Add some tests for loading segment descriptor in emulator
 2022-02-10  8:46 UTC  (4+ messages)
` [kvm-unit-tests PATCH v3 1/3] x86/emulator: Add some tests for far ret instruction emulation
` [kvm-unit-tests PATCH v3 2/3] x86/emulator: Rename test_ljmp() as test_far_jmp()
` [kvm-unit-tests PATCH v3 3/3] x86/emulator: Add some tests for far jmp instruction emulation

[PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
 2022-02-10  8:46 UTC  (5+ messages)
` [PATCH v3] "

[PATCH] KVM: x86/mmu: make apf token non-zero to fix bug
 2022-02-10  8:41 UTC 

[kvm-unit-tests PATCH v2 0/2] x86/emulator: Add some tests for loading segment descriptor in emulator
 2022-02-10  6:34 UTC  (6+ messages)
` [kvm-unit-tests PATCH v2 1/2] x86/emulator: Add some tests for lret instruction emulation
` [kvm-unit-tests PATCH v2 2/2] x86/emulator: Add some tests for ljmp "

[RFC PATCH v4 00/26] KVM: arm64: Make CPU ID registers writable by userspace
 2022-02-10  5:33 UTC  (11+ messages)
` [RFC PATCH v4 04/26] KVM: arm64: Make ID_AA64PFR0_EL1 writable
` [RFC PATCH v4 20/26] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1

[PATCH v0 00/15] KVM: Add Xen event channel acceleration
 2022-02-10  0:27 UTC  (16+ messages)
` [PATCH v0 01/15] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
` [PATCH v0 02/15] KVM: x86/xen: Use gfn_to_pfn_cache for runstate area
` [PATCH v0 03/15] KVM: x86: Use gfn_to_pfn_cache for pv_time
` [PATCH v0 04/15] KVM: x86/xen: Use gfn_to_pfn_cache for vcpu_info
` [PATCH v0 05/15] KVM: x86/xen: Use gfn_to_pfn_cache for vcpu_time_info
` [PATCH v0 06/15] KVM: x86/xen: Make kvm_xen_set_evtchn() reusable from other places
` [PATCH v0 07/15] KVM: x86/xen: Support direct injection of event channel events
` [PATCH v0 08/15] KVM: x86/xen: intercept EVTCHNOP_send from guests
` [PATCH v0 09/15] KVM: x86/xen: handle PV IPI vcpu yield
` [PATCH v0 10/15] KVM: x86/xen: Add KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID
` [PATCH v0 11/15] KVM: x86/xen: handle PV timers oneshot mode
` [PATCH v0 12/15] KVM: x86/xen: Kernel acceleration for XENVER_version
` [PATCH v0 13/15] KVM: x86/xen: Support per-vCPU event channel upcall via local APIC
` [PATCH v0 14/15] KVM: x86/xen: Advertise and document KVM_XEN_HVM_CONFIG_EVTCHN_SEND
` [PATCH v0 15/15] KVM: x86/xen: handle PV spinlocks slowpath

[PATCH v5 0/2] Enable legacy LBR support for guest
 2022-02-10  0:37 UTC  (3+ messages)

[PATCH v2 0/7] VMX: nVMX: VMX control MSR fixes
 2022-02-09 20:23 UTC  (5+ messages)
` [PATCH v2 4/7] KVM: nVMX: Add a quirk for KVM tweaks to VMX control MSRs

[PATCH MANUALSEL 5.4 1/2] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
 2022-02-09 18:57 UTC  (2+ messages)
` [PATCH MANUALSEL 5.4 2/2] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02

[PATCH MANUALSEL 5.10 1/6] KVM: eventfd: Fix false positive RCU usage warning
 2022-02-09 18:57 UTC  (6+ messages)
` [PATCH MANUALSEL 5.10 2/6] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
` [PATCH MANUALSEL 5.10 3/6] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
` [PATCH MANUALSEL 5.10 4/6] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
` [PATCH MANUALSEL 5.10 5/6] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
` [PATCH MANUALSEL 5.10 6/6] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow

[PATCH MANUALSEL 5.15 1/8] KVM: eventfd: Fix false positive RCU usage warning
 2022-02-09 18:56 UTC  (8+ messages)
` [PATCH MANUALSEL 5.15 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
` [PATCH MANUALSEL 5.15 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
` [PATCH MANUALSEL 5.15 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
` [PATCH MANUALSEL 5.15 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
` [PATCH MANUALSEL 5.15 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
` [PATCH MANUALSEL 5.15 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
` [PATCH MANUALSEL 5.15 8/8] KVM: x86: Report deprecated x87 features in supported CPUID

[PATCH MANUALSEL 5.16 1/8] KVM: eventfd: Fix false positive RCU usage warning
 2022-02-09 18:56 UTC  (8+ messages)
` [PATCH MANUALSEL 5.16 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
` [PATCH MANUALSEL 5.16 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
` [PATCH MANUALSEL 5.16 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
` [PATCH MANUALSEL 5.16 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
` [PATCH MANUALSEL 5.16 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
` [PATCH MANUALSEL 5.16 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
` [PATCH MANUALSEL 5.16 8/8] KVM: x86: Report deprecated x87 features in supported CPUID

[PATCH] KVM: x86: Fix emulation in writing cr8
 2022-02-09 18:50 UTC  (2+ messages)

[PATCH v10 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2022-02-09 18:10 UTC  (46+ messages)
` [PATCH v10 01/45] KVM: SVM: Define sev_features and vmpl field in the VMSA
` [PATCH v10 02/45] KVM: SVM: Create a separate mapping for the SEV-ES save area
` [PATCH v10 03/45] KVM: SVM: Create a separate mapping for the GHCB "
` [PATCH v10 04/45] KVM: SVM: Update the SEV-ES save area mapping
` [PATCH v10 05/45] x86/boot: Introduce helpers for MSR reads/writes
` [PATCH v10 06/45] x86/boot: Use MSR read/write helpers instead of inline assembly
` [PATCH v10 07/45] x86/compressed/64: Detect/setup SEV/SME features earlier in boot
` [PATCH v10 08/45] x86/sev: "
` [PATCH v10 09/45] x86/mm: Extend cc_attr to include AMD SEV-SNP
` [PATCH v10 10/45] x86/sev: Define the Linux specific guest termination reasons
` [PATCH v10 11/45] x86/sev: Save the negotiated GHCB version
` [PATCH v10 12/45] x86/sev: Check SEV-SNP features support
` [PATCH v10 13/45] x86/sev: Add a helper for the PVALIDATE instruction
` [PATCH v10 14/45] x86/sev: Check the vmpl level
` [PATCH v10 15/45] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH v10 16/45] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH v10 17/45] x86/sev: "
` [PATCH v10 18/45] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH v10 19/45] x86/kernel: Make the .bss..decrypted section shared in RMP table
` [PATCH v10 20/45] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active
` [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
` [PATCH v10 22/45] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
` [PATCH v10 23/45] x86/head/64: Re-enable stack protection
` [PATCH v10 24/45] x86/compressed/acpi: Move EFI detection to helper
` [PATCH v10 25/45] x86/compressed/acpi: Move EFI system table lookup "
` [PATCH v10 26/45] x86/compressed/acpi: Move EFI config "
` [PATCH v10 27/45] x86/compressed/acpi: Move EFI vendor "
` [PATCH v10 28/45] x86/compressed/acpi: Move EFI kexec handling into common code
` [PATCH v10 29/45] x86/boot: Add Confidential Computing type to setup_data
` [PATCH v10 30/45] KVM: x86: Move lookup of indexed CPUID leafs to helper
` [PATCH v10 31/45] x86/sev: Move MSR-based VMGEXITs for CPUID "
` [PATCH v10 32/45] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
` [PATCH v10 33/45] x86/boot: Add a pointer to Confidential Computing blob in bootparams
` [PATCH v10 34/45] x86/compressed: Add SEV-SNP feature detection/setup
` [PATCH v10 35/45] x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests
` [PATCH v10 36/45] x86/compressed: Export and rename add_identity_map()
` [PATCH v10 37/45] x86/compressed/64: Add identity mapping for Confidential Computing blob
` [PATCH v10 38/45] x86/sev: Add SEV-SNP feature detection/setup
` [PATCH v10 39/45] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
` [PATCH v10 40/45] x86/sev: Provide support for SNP guest request NAEs
` [PATCH v10 41/45] x86/sev: Register SEV-SNP guest request platform device
` [PATCH v10 42/45] virt: Add SEV-SNP guest driver
` [PATCH v10 43/45] virt: sevguest: Add support to derive key
` [PATCH v10 44/45] virt: sevguest: Add support to get extended report
` [PATCH v10 45/45] virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement

[PATCH v5] KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255
 2022-02-09 17:54 UTC  (2+ messages)

[PATCH v6 00/64] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
 2022-02-09 17:33 UTC  (3+ messages)
` [PATCH v6 32/64] KVM: arm64: nv: Filter out unsupported features from ID regs

[PATCH v5 0/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
 2022-02-09 17:30 UTC  (5+ messages)
` [PATCH v5 1/3] "

[PATCH v6 0/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
 2022-02-09 17:29 UTC  (4+ messages)
` [PATCH v6 1/3] "
` [PATCH v6 2/3] KVM: selftests: Allow creation of selftest VM without vcpus
` [PATCH v6 3/3] KVM: selftests: Verify disabling PMU virtualization via KVM_CAP_CONFIG_PMU

[PATCH kvm-unit-tests] vmexit: add test toggling CR0.WP and CR4.PGE
 2022-02-09 17:18 UTC 

[PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
 2022-02-09 17:16 UTC  (13+ messages)
` [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
` [PATCH 05/12] KVM: MMU: avoid NULL-pointer dereference on page freeing bugs
` [PATCH 06/12] KVM: MMU: rename kvm_mmu_reload
` [PATCH 07/12] KVM: x86: use struct kvm_mmu_root_info for mmu->root
` [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
` [PATCH 09/12] KVM: MMU: look for a cached PGD when going from 32-bit to 64-bit
` [PATCH 10/12] KVM: MMU: load new PGD after the shadow MMU is initialized
` [PATCH 11/12] KVM: MMU: remove kvm_mmu_calc_root_page_role
` [PATCH 12/12] KVM: x86: do not unload MMU roots on all role changes


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).