kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-09-30 10:25:46 to 2022-10-03 19:07:24 UTC [more...]

Guest IA32_SPEC_CTRL on AMD hosts without X86_FEATURE_V_SPEC_CTRL
 2022-10-03 19:07 UTC  (10+ messages)

[PATCH v3 00/10] KVM: x86/mmu: Make tdp_mmu read-only and clean up TPD MMU fault handler
 2022-10-03 19:05 UTC  (10+ messages)
` [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
` [PATCH v3 02/10] KVM: x86/mmu: Move TDP MMU VM init/uninit behind tdp_mmu_enabled
` [PATCH v3 03/10] KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()

[PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP)
 2022-10-03 18:53 UTC  (13+ messages)
` [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands

[PATCH v9 000/105] KVM TDX basic feature support
 2022-10-03 18:29 UTC  (15+ messages)
` [PATCH v9 093/105] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v9 095/105] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v9 096/105] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v9 097/105] KVM: TDX: Handle TDX PV report fatal error hypercall
` [PATCH v9 098/105] KVM: TDX: Handle TDX PV map_gpa hypercall
` [PATCH v9 099/105] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v9 100/105] KVM: TDX: Silently discard SMI request
` [PATCH v9 101/105] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v9 102/105] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v9 103/105] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v9 104/105] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v9 105/105] [MARKER] the end of (the first phase of) TDX KVM patch series

[PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
 2022-10-03 17:34 UTC  (5+ messages)

[PATCH v4 0/5] KVM: x86: Intel LBR related perf cleanups
 2022-10-03 17:22 UTC  (4+ messages)

[PATCH v10 00/39] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
 2022-10-03 16:00 UTC  (6+ messages)
` [PATCH v10 30/39] KVM: selftests: Hyper-V PV TLB flush selftest

[V2 PATCH 0/8] Execute hypercalls from guests according to cpu type
 2022-10-03 15:42 UTC  (5+ messages)
` [V2 PATCH 3/8] KVM: selftests: Add arch specific post vm load setup

[PATCH v2 0/4] Simplify the module and kconfig structure in vfio
 2022-10-03 15:39 UTC  (5+ messages)
` [PATCH v2 1/4] vfio/pci: Move all the SPAPR PCI specific logic to vfio_pci_core.ko
` [PATCH v2 2/4] vfio: Move vfio_spapr_iommu_eeh_ioctl into vfio_iommu_spapr_tce.c
` [PATCH v2 3/4] vfio: Remove CONFIG_VFIO_SPAPR_EEH
` [PATCH v2 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko

[PATCH 5.4 00/37] IBRS support // Retbleed mitigations
 2022-10-03 13:10 UTC  (38+ messages)
` [PATCH 5.4 01/37] Revert "x86/speculation: Add RSB VM Exit protections"
` [PATCH 5.4 02/37] Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
` [PATCH 5.4 03/37] x86/devicetable: Move x86 specific macro out of generic code
` [PATCH 5.4 04/37] x86/cpu: Add consistent CPU match macros
` [PATCH 5.4 05/37] x86/cpu: Add a steppings field to struct x86_cpu_id
` [PATCH 5.4 06/37] x86/kvm/vmx: Make noinstr clean
` [PATCH 5.4 07/37] x86/cpufeatures: Move RETPOLINE flags to word 11
` [PATCH 5.4 08/37] x86/bugs: Report AMD retbleed vulnerability
` [PATCH 5.4 09/37] x86/bugs: Add AMD retbleed= boot parameter
` [PATCH 5.4 10/37] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
` [PATCH 5.4 11/37] x86/entry: Remove skip_r11rcx
` [PATCH 5.4 12/37] x86/entry: Add kernel IBRS implementation
` [PATCH 5.4 13/37] x86/bugs: Optimize SPEC_CTRL MSR writes
` [PATCH 5.4 14/37] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
` [PATCH 5.4 15/37] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
` [PATCH 5.4 16/37] x86/bugs: Report Intel retbleed vulnerability
` [PATCH 5.4 17/37] intel_idle: Disable IBRS during long idle
` [PATCH 5.4 18/37] x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
` [PATCH 5.4 19/37] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
` [PATCH 5.4 20/37] x86/speculation: Fix firmware entry SPEC_CTRL handling
` [PATCH 5.4 21/37] x86/speculation: Fix SPEC_CTRL write on SMT state change
` [PATCH 5.4 22/37] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
` [PATCH 5.4 23/37] x86/speculation: Remove x86_spec_ctrl_mask
` [PATCH 5.4 24/37] KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
` [PATCH 5.4 25/37] KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw
` [PATCH 5.4 26/37] KVM: VMX: Flatten __vmx_vcpu_run()
` [PATCH 5.4 27/37] KVM: VMX: Convert launched argument to flags
` [PATCH 5.4 28/37] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
` [PATCH 5.4 29/37] KVM: VMX: Fix IBRS handling after vmexit
` [PATCH 5.4 30/37] x86/speculation: Fill RSB on vmexit for IBRS
` [PATCH 5.4 31/37] x86/common: Stamp out the stepping madness
` [PATCH 5.4 32/37] x86/cpu/amd: Enumerate BTC_NO
` [PATCH 5.4 33/37] x86/bugs: Add Cannon lake to RETBleed affected CPU list
` [PATCH 5.4 34/37] x86/speculation: Disable RRSBA behavior
` [PATCH 5.4 35/37] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
` [PATCH 5.4 36/37] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
` [PATCH 5.4 37/37] x86/speculation: Add RSB VM Exit protections

[RFC v3 0/7] In order support for virtio_ring, vhost and vsock
 2022-10-03 11:32 UTC  (4+ messages)
` [RFC v3 6/7] virtio: in order support for virtio_ring

[PATCH v8 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-10-03 11:01 UTC  (13+ messages)
` [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd

[RFC PATCH v3 00/19] RFC: nested AVIC
 2022-10-03  7:27 UTC  (11+ messages)
` [RFC PATCH v3 04/19] KVM: x86: mmu: allow to enable write tracking externally
              ` Nested AVIC design (was:Re: [RFC PATCH v3 04/19] KVM: x86: mmu: allow to enable write tracking externally)

[kvm-unit-tests PATCH v2 0/4] x86: nSVM: Add testing for routing L2 exceptions
 2022-10-03  7:07 UTC  (6+ messages)

Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
 2022-10-03  7:06 UTC  (10+ messages)

[PATCH] KVM: VMX: Resume guest immediately when injecting #GP on ECREATE
 2022-10-03  1:01 UTC  (2+ messages)

[PATCH AUTOSEL 5.19 22/29] KVM: s390: Pass initialized arg even if unused
 2022-10-02 22:49 UTC 

[GIT PULL] KVM/arm64 updates for 6.1
 2022-10-02 12:42 UTC 

[GIT PULL] KVM/riscv changes for 6.1
 2022-10-02  5:46 UTC 

[PATCH v3 0/3] riscv: kvm: use generic entry for TIF_NOTIFY_RESUME and misc
 2022-10-01 12:37 UTC  (2+ messages)

[PATCH] selftests/kvm: Avoid for loop initialization using vcpu->id in xapic_state_test
 2022-10-01  9:24 UTC 

[PATCH] KVM: arm64: Advertise new kvmarm mailing list
 2022-10-01  9:18 UTC  (2+ messages)

[PATCH v1 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
 2022-10-01  5:03 UTC  (12+ messages)
` [PATCH v1 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
` [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
` [PATCH v1 3/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
` [PATCH v1 4/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
` [PATCH v1 5/9] KVM: s390: selftest: memop: Replace macros by functions
` [PATCH v1 6/9] KVM: s390: selftest: memop: Add bad address test
` [PATCH v1 7/9] KVM: s390: selftest: memop: Add cmpxchg tests
` [PATCH v1 8/9] KVM: s390: selftest: memop: Fix typo
` [PATCH v1 9/9] KVM: s390: selftest: memop: Fix wrong address being used in test

[kvm-unit-tests PATCH 0/9] x86/apic: Cleanups and new tests
 2022-10-01  1:13 UTC  (10+ messages)
` [kvm-unit-tests PATCH 1/9] x86/apic: Add test config to allow running apic tests against SVM's AVIC
` [kvm-unit-tests PATCH 2/9] x86/apic: Replaces spaces with tabs to fix indentation in apic.c
` [kvm-unit-tests PATCH 3/9] x86/apic: Add helpers to query current APIC state, e.g. xAPIC vs. x2APIC
` [kvm-unit-tests PATCH 4/9] x86/apic: Assert that vCPU0's APIC is enabled at the start of the test
` [kvm-unit-tests PATCH 5/9] x86/apic: Restore APIC to original state after every sub-test
` [kvm-unit-tests PATCH 6/9] x86/apic: Enable IRQs on vCPU0 for all tests
` [kvm-unit-tests PATCH 7/9] x86/apic: Run tests that modify APIC ID and/or APIC_BASE after other tests
` [kvm-unit-tests PATCH 8/9] x86/apic: Add test for logical mode IPI delivery (cluster and flat)
` [kvm-unit-tests PATCH 9/9] x86/apic: Add test to verify aliased xAPIC IDs both receive IPI

[PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
 2022-10-01  0:59 UTC  (33+ messages)
` [PATCH v4 01/32] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
` [PATCH v4 02/32] KVM: x86: Purge "highest ISR" cache when updating APICv state
` [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
` [PATCH v4 04/32] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
` [PATCH v4 05/32] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
` [PATCH v4 06/32] KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated
` [PATCH v4 07/32] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
` [PATCH v4 08/32] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
` [PATCH v4 09/32] KVM: x86: Handle APICv updates for APIC "mode" changes via request
` [PATCH v4 10/32] KVM: x86: Move APIC access page helper to common x86 code
` [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
` [PATCH v4 12/32] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean
` [PATCH v4 13/32] KVM: SVM: Compute dest based on sender's x2APIC status for AVIC kick
` [PATCH v4 14/32] KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast
` [PATCH v4 15/32] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
` [PATCH v4 16/32] KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch
` [PATCH v4 17/32] KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU
` [PATCH v4 18/32] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
` [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
` [PATCH v4 20/32] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
` [PATCH v4 21/32] KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
` [PATCH v4 22/32] KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
` [PATCH v4 23/32] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
` [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
` [PATCH v4 25/32] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
` [PATCH v4 26/32] KVM: SVM: Always update local APIC on writes to logical dest register
` [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
` [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
` [PATCH v4 29/32] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
` [PATCH v4 30/32] KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps
` [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
` [PATCH v4 32/32] KVM: x86: Track required APICv inhibits with variable, not callback

[PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
 2022-10-01  0:35 UTC  (8+ messages)
` [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H

[PATCH v5 0/7] KVM: x86: Apply NX mitigation more precisely
 2022-09-30 23:48 UTC  (8+ messages)
` [PATCH v5 1/7] KVM: x86/mmu: Tag disallowed NX huge pages even if they're not tracked
` [PATCH v5 2/7] KVM: x86/mmu: Rename NX huge pages fields/functions for consistency
` [PATCH v5 3/7] KVM: x86/mmu: Properly account NX huge page workaround for nonpaging MMUs
` [PATCH v5 4/7] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
` [PATCH v5 5/7] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
` [PATCH v5 6/7] KVM: x86/mmu: Add helper to convert SPTE value to its shadow page
` [PATCH v5 7/7] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()

[PATCH] KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid
 2022-09-30 23:40 UTC 

[PATCH] KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception
 2022-09-30 23:36 UTC 

[kvm-unit-tests PATCH 0/3] nVMX: Fix VMREAD/VMWRITE #PF tests
 2022-09-30 23:24 UTC  (4+ messages)
` [kvm-unit-tests PATCH 1/3] x86: Handle all known exceptions with ASM_TRY()
` [kvm-unit-tests PATCH 2/3] nVMX: Use ASM_TRY() for VMREAD and VMWRITE page fault tests
` [kvm-unit-tests PATCH 3/3] nVMX: Dedup the bulk of the VMREAD/VMWRITE #PF tests

[PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
 2022-09-30 23:00 UTC 

[PATCH 0/2] Simplify some of the locking in vfio_group
 2022-09-30 21:31 UTC  (2+ messages)

simplify the mdev interface v8
 2022-09-30 21:31 UTC  (5+ messages)

[PATCH 0/4] Simplify the module and kconfig structure in vfio
 2022-09-30 19:55 UTC  (4+ messages)
` [PATCH 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko

[GIT PULL] First batch of KVM changes for Linux 6.1
 2022-09-30 19:08 UTC 

[GIT PULL] Final set of (mostly selftests) KVM patches for Linux 6.0
 2022-09-30 19:08 UTC 

[GIT PULL] virtio: fixes
 2022-09-30 16:48 UTC  (2+ messages)

[PATCH v3] hyperv: fix SynIC SINT assertion failure on guest reset
 2022-09-30 15:52 UTC 

[PATCH 0/4] Qemu SEV reduced-phys-bits fixes
 2022-09-30 15:14 UTC  (5+ messages)
` [PATCH 1/4] qapi, i386/sev: Change the reduced-phys-bits value from 5 to 1
` [PATCH 2/4] qemu-options.hx: Update the reduced-phys-bits documentation
` [PATCH 3/4] i386/sev: Update checks and information related to reduced-phys-bits
` [PATCH 4/4] i386/cpu: Update how the EBX register of CPUID 0x8000001F is set

[PATCH v14 0/6] KVM: s390: pv: implement lazy destroy for reboot
 2022-09-30 14:01 UTC  (7+ messages)
` [PATCH v14 1/6] KVM: s390: pv: asynchronous "
` [PATCH v14 2/6] KVM: s390: pv: api documentation for asynchronous destroy
` [PATCH v14 3/6] KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
` [PATCH v14 4/6] KVM: s390: pv: avoid export before import if possible
` [PATCH v14 5/6] KVM: s390: pv: support for Destroy fast UVC
` [PATCH v14 6/6] KVM: s390: pv: module parameter to fence asynchronous destroy

[KVM] 7055fb1131: WARNING:at_arch/x86/kvm/x86.c:#inject_pending_event[kvm]
 2022-09-30 13:35 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).