kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-12-09 16:49:18 to 2020-12-10 18:56:46 UTC [more...]

[PATCH kvmtool 00/21] Unify I/O port and MMIO trap handling
 2020-12-10 14:29 UTC  (3+ messages)
` [PATCH kvmtool 04/21] mmio: Extend handling to include ioport emulation
` [PATCH kvmtool 15/21] vfio: Refactor ioport trap handler

[PATCH kvmtool] arm64: Determine kernel offset even on non-seekable file descriptors
 2020-12-10 18:42 UTC  (4+ messages)

[PATCH v2] KVM: mmu: Fix SPTE encoding of MMIO generation upper half
 2020-12-10 18:25 UTC 

[PATCH v2 0/3] RFC: Precise TSC migration
 2020-12-10 18:13 UTC  (32+ messages)
` [PATCH v2 1/3] KVM: x86: implement KVM_{GET|SET}_TSC_STATE

[PATCH v5 00/34] SEV-ES hypervisor support
 2020-12-10 17:10 UTC  (35+ messages)
` [PATCH v5 01/34] x86/cpu: Add VM page flush MSR availablility as a CPUID feature
` [PATCH v5 02/34] KVM: SVM: Remove the call to sev_platform_status() during setup
` [PATCH v5 03/34] KVM: SVM: Add support for SEV-ES capability in KVM
` [PATCH v5 04/34] KVM: SVM: Add GHCB accessor functions for retrieving fields
` [PATCH v5 05/34] KVM: SVM: Add support for the SEV-ES VMSA
` [PATCH v5 06/34] KVM: x86: Mark GPRs dirty when written
` [PATCH v5 07/34] KVM: SVM: Add required changes to support intercepts under SEV-ES
` [PATCH v5 08/34] KVM: SVM: Prevent debugging "
` [PATCH v5 09/34] KVM: SVM: Do not allow instruction emulation "
` [PATCH v5 10/34] KVM: SVM: Cannot re-initialize the VMCB after shutdown with SEV-ES
` [PATCH v5 11/34] KVM: SVM: Prepare for SEV-ES exit handling in the sev.c file
` [PATCH v5 12/34] KVM: SVM: Add initial support for a VMGEXIT VMEXIT
` [PATCH v5 13/34] KVM: SVM: Create trace events for VMGEXIT processing
` [PATCH v5 14/34] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x002
` [PATCH v5 15/34] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x004
` [PATCH v5 16/34] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x100
` [PATCH v5 17/34] KVM: SVM: Create trace events for VMGEXIT MSR protocol processing
` [PATCH v5 18/34] KVM: SVM: Support MMIO for an SEV-ES guest
` [PATCH v5 19/34] KVM: SVM: Support string IO operations "
` [PATCH v5 20/34] KVM: SVM: Add support for EFER write traps "
` [PATCH v5 21/34] KVM: SVM: Add support for CR0 "
` [PATCH v5 22/34] KVM: SVM: Add support for CR4 "
` [PATCH v5 23/34] KVM: SVM: Add support for CR8 "
` [PATCH v5 24/34] KVM: x86: Update __get_sregs() / __set_sregs() to support SEV-ES
` [PATCH v5 25/34] KVM: SVM: Do not report support for SMM for an SEV-ES guest
` [PATCH v5 26/34] KVM: SVM: Guest FPU state save/restore not needed for "
` [PATCH v5 27/34] KVM: SVM: Add support for booting APs for an "
` [PATCH v5 28/34] KVM: SVM: Add NMI support "
` [PATCH v5 29/34] KVM: SVM: Set the encryption mask for the SVM host save area
` [PATCH v5 30/34] KVM: SVM: Update ASID allocation to support SEV-ES guests
` [PATCH v5 31/34] KVM: SVM: Provide support for SEV-ES vCPU creation/loading
` [PATCH v5 32/34] KVM: SVM: Provide support for SEV-ES vCPU loading
` [PATCH v5 33/34] KVM: SVM: Provide an updated VMRUN invocation for SEV-ES guests
` [PATCH v5 34/34] KVM: SVM: Provide support to launch and run an SEV-ES guest

[PATCH] KVM: SVM: use vmsave/vmload for saving/restoring additional host state
 2020-12-10 17:48 UTC 

[PATCH v5 00/34] SEV-ES hypervisor support
 2020-12-10 17:21 UTC  (9+ messages)
` [PATCH v5 01/34] x86/cpu: Add VM page flush MSR availablility as a CPUID feature
` [PATCH v5 02/34] KVM: SVM: Remove the call to sev_platform_status() during setup
` [PATCH v5 03/34] KVM: SVM: Add support for SEV-ES capability in KVM
` [PATCH v5 04/34] KVM: SVM: Add GHCB accessor functions for retrieving fields
` [PATCH v5 05/34] KVM: SVM: Add support for the SEV-ES VMSA
` [PATCH v5 06/34] KVM: x86: Mark GPRs dirty when written
` [PATCH v5 07/34] KVM: SVM: Add required changes to support intercepts under SEV-ES

[PATCH v3 00/66] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
 2020-12-10 16:00 UTC  (67+ messages)
` [PATCH v3 01/66] arm64: Add ARM64_HAS_NESTED_VIRT cpufeature
` [PATCH v3 02/66] KVM: arm64: nv: Introduce nested virtualization VCPU feature
` [PATCH v3 03/66] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
` [PATCH v3 04/66] KVM: arm64: nv: Allow userspace to set PSR_MODE_EL2x
` [PATCH v3 05/66] KVM: arm64: nv: Add EL2 system registers to vcpu context
` [PATCH v3 06/66] KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 VCPU state
` [PATCH v3 07/66] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
` [PATCH v3 08/66] KVM: arm64: nv: Reset VMPIDR_EL2 and VPIDR_EL2 to sane values
` [PATCH v3 09/66] KVM: arm64: nv: Support virtual EL2 exceptions
` [PATCH v3 10/66] KVM: arm64: nv: Inject HVC exceptions to the virtual EL2
` [PATCH v3 11/66] KVM: arm64: nv: Handle trapped ERET from "
` [PATCH v3 12/66] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
` [PATCH v3 13/66] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
` [PATCH v3 14/66] KVM: arm64: nv: Handle SPSR_EL2 specially
` [PATCH v3 15/66] KVM: arm64: nv: Handle HCR_EL2.E2H specially
` [PATCH v3 16/66] KVM: arm64: nv: Save/Restore vEL2 sysregs
` [PATCH v3 17/66] KVM: arm64: nv: Emulate PSTATE.M for a guest hypervisor
` [PATCH v3 18/66] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
` [PATCH v3 19/66] KVM: arm64: nv: Trap SPSR_EL1, ELR_EL1 and VBAR_EL1 from "
` [PATCH v3 20/66] KVM: arm64: nv: Trap CPACR_EL1 access in "
` [PATCH v3 21/66] KVM: arm64: nv: Handle PSCI call via smc from the guest
` [PATCH v3 22/66] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
` [PATCH v3 23/66] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP,FPEN} settings
` [PATCH v3 24/66] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
` [PATCH v3 25/66] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
` [PATCH v3 26/66] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
` [PATCH v3 27/66] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
` [PATCH v3 28/66] KVM: arm64: nv: Forward debug traps to the nested guest
` [PATCH v3 29/66] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
` [PATCH v3 30/66] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
` [PATCH v3 31/66] KVM: arm64: nv: Filter out unsupported features from ID regs
` [PATCH v3 32/66] KVM: arm64: nv: Hide RAS from nested guests
` [PATCH v3 33/66] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
` [PATCH v3 34/66] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
` [PATCH v3 35/66] KVM: arm64: nv: Handle shadow stage 2 page faults
` [PATCH v3 36/66] KVM: arm64: nv: Restrict S2 RD/WR permissions to match the guest's
` [PATCH v3 37/66] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
` [PATCH v3 38/66] KVM: arm64: nv: Introduce sys_reg_desc.forward_trap
` [PATCH v3 39/66] KVM: arm64: nv: Set a handler for the system instruction traps
` [PATCH v3 40/66] KVM: arm64: nv: Trap and emulate AT instructions from virtual EL2
` [PATCH v3 41/66] KVM: arm64: nv: Trap and emulate TLBI "
` [PATCH v3 42/66] KVM: arm64: nv: Fold guest's HCR_EL2 configuration into the host's
` [PATCH v3 43/66] KVM: arm64: nv: arch_timer: Support hyp timer emulation
` [PATCH v3 44/66] KVM: arm64: nv: Add handling of EL2-specific timer registers
` [PATCH v3 45/66] KVM: arm64: nv: Load timer before the GIC
` [PATCH v3 46/66] KVM: arm64: nv: Nested GICv3 Support
` [PATCH v3 47/66] KVM: arm64: nv: Don't load the GICv4 context on entering a nested guest
` [PATCH v3 48/66] KVM: arm64: nv: vgic: Emulate the HW bit in software
` [PATCH v3 49/66] KVM: arm64: nv: vgic: Allow userland to set VGIC maintenance IRQ
` [PATCH v3 50/66] KVM: arm64: nv: Implement maintenance interrupt forwarding
` [PATCH v3 51/66] KVM: arm64: nv: Add nested GICv3 tracepoints
` [PATCH v3 52/66] KVM: arm64: nv: Allow userspace to request KVM_ARM_VCPU_NESTED_VIRT
` [PATCH v3 53/66] KVM: arm64: nv: Add handling of ARMv8.4-TTL TLB invalidation
` [PATCH v3 54/66] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
` [PATCH v3 55/66] KVM: arm64: Allow populating S2 SW bits
` [PATCH v3 56/66] KVM: arm64: nv: Tag shadow S2 entries with nested level
` [PATCH v3 57/66] KVM: arm64: nv: Add include containing the VNCR_EL2 offsets
` [PATCH v3 58/66] KVM: arm64: Map VNCR-capable registers to a separate page
` [PATCH v3 59/66] KVM: arm64: nv: Move nested vgic state into the sysreg file
` [PATCH v3 60/66] KVM: arm64: Add ARMv8.4 Enhanced Nested Virt cpufeature
` [PATCH v3 61/66] KVM: arm64: nv: Synchronize PSTATE early on exit
` [PATCH v3 62/66] KVM: arm64: nv: Sync nested timer state with ARMv8.4
` [PATCH v3 63/66] KVM: arm64: nv: Allocate VNCR page when required
` [PATCH v3 64/66] KVM: arm64: nv: Enable ARMv8.4-NV support
` [PATCH v3 65/66] KVM: arm64: nv: Fast-track 'InHost' exception returns
` [PATCH v3 66/66] KVM: arm64: nv: Fast-track EL1 TLBIs for VHE guests

[PATCH v2 03/16] KVM: x86/xen: intercept xen hypercalls if enabled
 2020-12-10 16:01 UTC  (2+ messages)

[kvm-unit-tests PATCH 0/2] s390x: Move from LGPL 2 to GPL 2
 2020-12-10 16:20 UTC  (6+ messages)
` [kvm-unit-tests PATCH 2/2] s390x: lib: Move to GPL 2 and SPDX license identifiers

[PATCH] target/i386/sev: add the support to query the attestation report
 2020-12-10 16:13 UTC  (2+ messages)

[RFC 0/4] vfio-pci/zdev: Fixing s390 vfio-pci ISM support
 2020-12-10 16:14 UTC  (11+ messages)
` [RFC 1/4] s390/pci: track alignment/length strictness for zpci_dev
` [RFC 2/4] vfio-pci/zdev: Pass the relaxed alignment flag
` [RFC 3/4] s390/pci: Get hardware-reported max store block length
` [RFC 4/4] vfio-pci/zdev: Introduce the zPCI I/O vfio region

[kvm-unit-tests PATCH 00/10] GIC fixes and improvements
 2020-12-10 14:45 UTC  (4+ messages)
` [kvm-unit-tests PATCH 08/10] arm/arm64: gic: Split check_acked() into two functions

[Patch v3 0/2] cgroup: KVM: New Encryption IDs cgroup controller
 2020-12-10 14:54 UTC  (5+ messages)
` [Patch v3 1/2] cgroup: svm: Add Encryption ID controller
` [Patch v3 2/2] cgroup: svm: Encryption IDs cgroup documentation

[GIT PULL 0/4] KVM: s390: features and test for 5.11
 2020-12-10 14:25 UTC  (5+ messages)
` [GIT PULL 1/4] KVM: s390: Add memcg accounting to KVM allocations
` [GIT PULL 2/4] s390/gmap: make gmap memcg aware
` [GIT PULL 3/4] KVM: selftests: sync_regs test for diag318
` [GIT PULL 4/4] KVM: s390: track synchronous pfault events in kvm_stat

[PATCH v2] vfio iommu type1: Improve vfio_iommu_type1_pin_pages performance
 2020-12-10 13:56 UTC  (6+ messages)

[PATCH v2 0/2] KVM: arm64: Expose CSV3 to guests on running on Meltdown-safe HW
 2020-12-10 13:53 UTC  (2+ messages)

[PATCH] tools/kvm_stat: Exempt time-based counters
 2020-12-10 12:22 UTC  (2+ messages)

[RFC PATCH 00/27] vDPA software assisted live migration
 2020-12-10 11:57 UTC  (30+ messages)
` [RFC PATCH 05/27] vhost: Add hdev->dev.sw_lm_vq_handler
` [RFC PATCH 07/27] vhost: Route guest->host notification through qemu
` [RFC PATCH 08/27] vhost: Add a flag for software assisted Live Migration
` [RFC PATCH 10/27] vhost: Allocate shadow vring
` [RFC PATCH 13/27] vhost: Send buffers to device
` [RFC PATCH 16/27] virtio: Expose virtqueue_alloc_element
` [RFC PATCH 18/27] vhost: add vhost_vring_poll_rcu

[PATCH] kvm:vmx:code changes in handle_io() to save some CPU cycles
 2020-12-10  9:56 UTC  (2+ messages)

[RFC PATCH 1/1] platform-msi: Add platform check for subdevice irq domain
 2020-12-10  8:22 UTC  (2+ messages)

[PATCH 0/7] vfio: iommu_type1: Some fixes and optimization
 2020-12-10  7:34 UTC  (8+ messages)
` [PATCH 1/7] vfio: iommu_type1: Clear added dirty bit when unwind pin
` [PATCH 2/7] vfio: iommu_type1: Initially set the pinned_page_dirty_scope
` [PATCH 3/7] vfio: iommu_type1: Make an explicit "promote" semantic
` [PATCH 4/7] vfio: iommu_type1: Fix missing dirty page when promote pinned_scope
` [PATCH 5/7] vfio: iommu_type1: Drop parameter "pgsize" of vfio_dma_bitmap_alloc_all
` [PATCH 6/7] vfio: iommu_type1: Drop parameter "pgsize" of vfio_iova_dirty_bitmap
` [PATCH 7/7] vfio: iommu_type1: Drop parameter "pgsize" of update_user_bitmap

[RFC, v1 0/3] msi support for platform devices
 2020-12-10  7:34 UTC  (7+ messages)
` [RFC, v2 0/1] "
  ` [RFC v2 1/1] vfio/platform: add support for msi

[PATCH] selftests: kvm: remove reassignment of non-absolute variables
 2020-12-10  4:36 UTC 

[PATCH] KVM/SVM: add support for SEV attestation command
 2020-12-10  3:25 UTC  (3+ messages)

[PATCH 0/2] x86: Add the feature Virtual SPEC_CTRL
 2020-12-09 23:11 UTC  (5+ messages)
` [PATCH 1/2] x86/cpufeatures: Add the Virtual SPEC_CTRL feature

[PATCH v2 1/5] driver core: platform: Introduce platform_get_mem_or_io()
 2020-12-09 20:36 UTC  (2+ messages)
` [PATCH v2 2/5] vfio: platform: Switch to use platform_get_mem_or_io()

[Patch v2 0/2] cgroup: KVM: New Encryption IDs cgroup controller
 2020-12-09 20:33 UTC  (2+ messages)

[PATCH v1] vfio: platform: enable compile test
 2020-12-09 20:29 UTC 

[PATCH v2 00/16] KVM: Add Xen hypercall and shared info pages
 2020-12-09 19:17 UTC  (3+ messages)
` [PATCH v2 14/16] KVM: x86/xen: register runstate info

[PATCH v1 1/5] driver core: platform: Introduce platform_get_mem_or_io_resource()
 2020-12-09 18:22 UTC  (8+ messages)
` [PATCH v1 2/5] vfio: platform: Switch to use platform_get_mem_or_io_resource()

[RFC PATCH] vfio/pci: Allow force needs_pm_restore as specified by device:vendor
 2020-12-09 17:09 UTC  (6+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).