KVM Archive mirror
 help / color / mirror / Atom feed
 messages from 2022-10-27 09:22:42 to 2022-10-28 00:32:33 UTC [more...]

[PATCH v5 00/25] KVM: arm64: Introduce pKVM hyp VM and vCPU state at EL2
 2022-10-28  0:32 UTC  (9+ messages)
` [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
` [PATCH v5 04/25] KVM: arm64: Fix-up hyp stage-1 refcounts for all pages mapped at EL2
` [PATCH v5 05/25] KVM: arm64: Unify identifiers used to distinguish host and hypervisor
` [PATCH v5 20/25] KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache

[PATCH v2 0/8] KVM: selftests: Fix and clean up emulator_error_test
 2022-10-28  0:31 UTC  (11+ messages)
` [PATCH v2 1/8] KVM: selftests: Rename emulator_error_test to smaller_maxphyaddr_emulation_test
` [PATCH v2 2/8] KVM: selftests: Explicitly require instructions bytes
` [PATCH v2 3/8] KVM: selftests: Delete dead ucall code
` [PATCH v2 5/8] KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks
` [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled

[PATCH v6 00/21] TDX host kernel support
 2022-10-28  0:10 UTC  (18+ messages)
` [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
` [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
` [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID
` [PATCH v6 18/21] x86/virt/tdx: Configure global KeyID on all packages
` [PATCH v6 19/21] x86/virt/tdx: Initialize all TDMRs
` [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support

[PATCH] kvm: vmenter: Use tabs instead of spaces for indentation
 2022-10-28  0:03 UTC  (3+ messages)
  ` [PATCH] KVM: VMX: "

[PATCH] kvm: vmx: Fix indentation coding style issue
 2022-10-27 23:57 UTC  (3+ messages)
  ` [PATCH] KVM: VMX: "

[Bug 216349] New: Kernel panic in a Ubuntu VM running on Proxmox
 2022-10-27 23:55 UTC  (2+ messages)
` [Bug 216349] Kernel panics in VMs running on an Intel N5105 "

[PATCH v3 00/15] KVM: arm64: Parallel stage-2 fault handling
 2022-10-27 23:39 UTC  (17+ messages)
` [PATCH v3 01/15] KVM: arm64: Combine visitor arguments into a context structure
` [PATCH v3 02/15] KVM: arm64: Stash observed pte value in visitor context
` [PATCH v3 03/15] KVM: arm64: Pass mm_ops through the "
` [PATCH v3 04/15] KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
` [PATCH v3 05/15] KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees
` [PATCH v3 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
` [PATCH v3 07/15] KVM: arm64: Use an opaque type for pteps
` [PATCH v3 08/15] KVM: arm64: Protect stage-2 traversal with RCU
` [PATCH v3 09/15] KVM: arm64: Free removed stage-2 tables in RCU callback
` [PATCH v3 10/15] KVM: arm64: Atomically update stage 2 leaf attributes in parallel walks
` [PATCH v3 11/15] KVM: arm64: Split init and set for table PTE
` [PATCH v3 12/15] KVM: arm64: Make block->table PTE changes parallel-aware
` [PATCH v3 13/15] KVM: arm64: Make leaf->leaf "
` [PATCH v3 14/15] KVM: arm64: Make table->block "
` [PATCH v3 15/15] KVM: arm64: Handle stage-2 faults in parallel

[PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
 2022-10-27 23:04 UTC  (6+ messages)
` [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
` [PATCH 2/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled

[PATCH v2 0/3] KVM: x86: Add AMD Guest PerfMonV2 PMU support
 2022-10-27 22:47 UTC  (11+ messages)
` [PATCH v2 1/3] KVM: x86/pmu: Make part of the Intel v2 PMU MSRs handling x86 generic
` [PATCH v2 2/3] KVM: x86/svm/pmu: Add AMD PerfMonV2 support
` [PATCH v2 3/3] KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022

[PATCH v2 00/15] KVM: arm64: Parallel stage-2 fault handling
 2022-10-27 22:31 UTC  (5+ messages)
` [PATCH v2 07/15] KVM: arm64: Use an opaque type for pteps

[PATCH v6 0/7] Introduce and test masked events
 2022-10-27 22:02 UTC  (4+ messages)
` [PATCH v6 7/7] selftests: kvm/x86: Test "

[PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
 2022-10-27 21:39 UTC  (5+ messages)
` [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs

[PATCH 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
 2022-10-27 21:35 UTC  (8+ messages)
` [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
` [PATCH 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V

[PATCH v8 0/4] KVM: selftests: randomize memory access of dirty_log_perf_test
 2022-10-27 20:56 UTC  (5+ messages)
` [PATCH v8 1/4] KVM: selftests: implement random number generator for guest code
` [PATCH v8 2/4] KVM: selftests: create -r argument to specify random seed
` [PATCH v8 3/4] KVM: selftests: randomize which pages are written vs read
` [PATCH v8 4/4] KVM: selftests: randomize page access order

[PATCH 4.14 00/34] Retbleed & PBRSB Mitigations
 2022-10-27 20:56 UTC  (35+ messages)
` [PATCH 4.14 01/34] Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
  ` [PATCH 4.14 02/34] x86/cpufeature: Add facility to check for min microcode revisions
  ` [PATCH 4.14 03/34] x86/cpufeature: Fix various quality problems in the <asm/cpu_device_hd.h> header
  ` [PATCH 4.14 04/34] x86/devicetable: Move x86 specific macro out of generic code
` [PATCH 4.14 05/34] x86/cpu: Add consistent CPU match macros
  ` [PATCH 4.14 06/34] x86/cpu: Add a steppings field to struct x86_cpu_id
  ` [PATCH 4.14 07/34] x86/entry: Remove skip_r11rcx
  ` [PATCH 4.14 08/34] x86/cpufeatures: Move RETPOLINE flags to word 11
` [PATCH 4.14 09/34] x86/bugs: Report AMD retbleed vulnerability
  ` [PATCH 4.14 10/34] x86/bugs: Add AMD retbleed= boot parameter
  ` [PATCH 4.14 11/34] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
  ` [PATCH 4.14 12/34] x86/entry: Add kernel IBRS implementation
` [PATCH 4.14 13/34] x86/bugs: Optimize SPEC_CTRL MSR writes
  ` [PATCH 4.14 14/34] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
  ` [PATCH 4.14 15/34] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
  ` [PATCH 4.14 16/34] x86/bugs: Report Intel retbleed vulnerability
` [PATCH 4.14 17/34] entel_idle: Disable IBRS during long idle
  ` [PATCH 4.14 18/34] x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
  ` [PATCH 4.14 19/34] x86/speculation: Add LFENCE to RSB fill sequence
  ` [PATCH 4.14 20/34] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
` [PATCH 4.14 21/34] x86/speculation: Fix firmware entry SPEC_CTRL handling
  ` [PATCH 4.14 22/34] x86/speculation: Fix SPEC_CTRL write on SMT state change
  ` [PATCH 4.14 23/34] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
  ` [PATCH 4.14 24/34] x86/speculation: Remove x86_spec_ctrl_mask
` [PATCH 4.14 25/34] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
  ` [PATCH 4.14 26/34] KVM: VMX: Fix IBRS handling after vmexit
  ` [PATCH 4.14 27/34] x86/speculation: Fill RSB on vmexit for IBRS
  ` [PATCH 4.14 28/34] x86/common: Stamp out the stepping madness
` [PATCH 4.14 29/34] x86/cpu/amd: Enumerate BTC_NO
  ` [PATCH 4.14 30/34] x86/bugs: Add Cannon lake to RETBleed affected CPU list
  ` [PATCH 4.14 31/34] x86/speculation: Disable RRSBA behavior
  ` [PATCH 4.14 32/34] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
` [PATCH 4.14 33/34] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
  ` [PATCH 4.14 34/34] x86/speculation: Add RSB VM Exit protections

[PATCH v10 0/9] s390x: CPU Topology
 2022-10-27 20:42 UTC  (17+ messages)
` [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
` [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
` [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
` [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute

[PATCH v1 0/7] vfio-ccw parent rework
 2022-10-27 20:32 UTC  (3+ messages)
` [PATCH v1 1/7] vfio/ccw: create a parent struct

[PATCH V3 0/2] Fix security issue in SNP guest AES-GCM usage
 2022-10-27 20:30 UTC  (7+ messages)
` [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
` [PATCH V3 2/2] virt: sev: Allow for retrying SNP extended requests

[PATCH v6 0/5] dirty_log_perf_test vCPU pinning
 2022-10-27 20:23 UTC  (8+ messages)
` [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs

[PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
 2022-10-27 20:17 UTC  (3+ messages)

[PATCH v7 3/3] KVM: selftests: randomize page access order
 2022-10-27 19:44 UTC  (2+ messages)

[kvm-unit-tests PATCH 00/16] kvm-unit-tests: set of fixes and new tests
 2022-10-27 19:39 UTC  (27+ messages)
` [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
` [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
` [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
` [kvm-unit-tests PATCH 16/16] add IPI loss stress test

[PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
 2022-10-27 19:09 UTC  (13+ messages)

[V4 0/8] KVM: selftests: Add simple SEV test
 2022-10-27 18:34 UTC  (12+ messages)
` [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests

[PATCH v1 00/18] KVM selftests code consolidation and cleanup
 2022-10-27 18:27 UTC  (18+ messages)
` [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
` [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
` [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup

[PATCH 0/9] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
 2022-10-27 17:24 UTC  (12+ messages)
` [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
` [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation

[PATCH v3 00/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
 2022-10-27 17:22 UTC  (18+ messages)
` [PATCH 01/16] KVM: Initialize gfn_to_pfn_cache locks in dedicated helper
` [PATCH 02/16] KVM: Reject attempts to consume or refresh inactive gfn_to_pfn_cache
` [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
` [PATCH 04/16] KVM: Shorten gfn_to_pfn_cache function names
` [PATCH 05/16] KVM: x86: Remove unused argument in gpc_unmap_khva()
` [PATCH 06/16] KVM: Store immutable gfn_to_pfn_cache properties
` [PATCH 07/16] KVM: Store gfn_to_pfn_cache length at activation time
` [PATCH 08/16] KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_check()
` [PATCH 09/16] KVM: Clean up hva_to_pfn_retry()
` [PATCH 10/16] KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_refresh()
` [PATCH 11/16] KVM: Drop KVM's API to allow temprorarily unmapping gfn=>pfn cache
` [PATCH 12/16] KVM: Do not partially reinitialize gfn=>pfn cache during activation
` [PATCH 13/16] KVM: Drop @gpa from exported gfn=>pfn cache check() and refresh() helpers
` [PATCH 14/16] KVM: Skip unnecessary "unmap" if gpc is already valid during refresh
` [PATCH 15/16] KVM: selftests: Add tests in xen_shinfo_test to detect lock races
` [PATCH 16/16] KVM: selftests: Mark "guest_saw_irq" as volatile in xen_shinfo_test

[PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
 2022-10-27 17:06 UTC  (3+ messages)

[PATCH v2 00/16] KVM: x86: gfn_to_pfn_cache fixes and cleanups
 2022-10-27 16:56 UTC  (7+ messages)
` [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache

[PATCH v3 0/10] KVM: x86: allow compiling out SMM support
 2022-10-27 16:49 UTC  (11+ messages)
` [PATCH 01/10] KVM: x86: start moving SMM-related functions to new files
` [PATCH 02/10] KVM: x86: move SMM entry to a new file
` [PATCH 03/10] KVM: x86: move SMM exit "
` [PATCH 04/10] KVM: x86: do not go through ctxt->ops when emulating rsm
` [PATCH 05/10] KVM: allow compiling out SMM support
` [PATCH 06/10] KVM: x86: compile out vendor-specific code if SMM is disabled
` [PATCH 07/10] KVM: x86: remove SMRAM address space if SMM is not supported
` [PATCH 08/10] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
` [PATCH 09/10] KVM: zero output of KVM_GET_VCPU_EVENTS before filling in the struct
` [PATCH 10/10] KVM: x86: do not define SMM-related constants if SMM disabled

[PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
 2022-10-27 16:46 UTC  (2+ messages)

[PATCH V2] virt: Prevent IV reuse in SNP guest driver
 2022-10-27 15:06 UTC  (5+ messages)

[PATCH v3 00/15] IOMMUFD Generic interface
 2022-10-27 14:12 UTC  (6+ messages)
` [PATCH v3 09/15] iommufd: Data structure to provide IOVA to PFN mapping
  ` [PATCH v3 9/15] "
` [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility

[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-10-27 10:31 UTC  (13+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
` [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE

[PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
 2022-10-27 10:29 UTC  (3+ messages)

[PATCH v3 0/2] arm: enable MTE for QEMU + kvm
 2022-10-27 10:26 UTC  (4+ messages)
` [PATCH v3 2/2] qtests/arm: add some mte tests

[PATCH] KVM: SVM: Name and check reserved fields with structs offset
 2022-10-27  9:47 UTC  (2+ messages)

[PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
 2022-10-27  9:22 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).