kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-05-10 08:44:29 to 2021-05-10 19:59:24 UTC [more...]

[PATCH Part2 RFC v2 00/37] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2021-05-10 19:59 UTC  (9+ messages)
` [PATCH Part2 RFC v2 16/37] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH Part2 RFC v2 32/37] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH Part2 RFC v2 36/37] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event

[PATCH 00/53] Get rid of UTF-8 chars that can be mapped as ASCII
 2021-05-10 19:22 UTC  (15+ messages)
` [PATCH 52/53] docs: virt: kvm: avoid using UTF-8 chars

[for-6.1 v3 0/3] virtiofsd: Add support for FUSE_SYNCFS request
 2021-05-10 19:18 UTC  (6+ messages)
` [for-6.1 v3 2/3] virtiofsd: Track mounts
` [for-6.1 v3 3/3] virtiofsd: Add support for FUSE_SYNCFS request

[GIT PULL] KVM updates for Linux 5.13-rc2
 2021-05-10 19:09 UTC  (2+ messages)

[PATCH v4 0/4] KVM statistics data fd-based binary interface
 2021-05-10 18:57 UTC  (2+ messages)

[PATCH v3 0/8] Lazily allocate memslot rmaps
 2021-05-10 18:28 UTC  (15+ messages)
` [PATCH v3 2/8] KVM: x86/mmu: Factor out allocating memslot rmap
` [PATCH v3 5/8] KVM: x86/mmu: Add a field to control memslot rmap allocation
` [PATCH v3 7/8] KVM: x86/mmu: Protect rmaps independently with SRCU

[PATCH 0/2] KVM: x86: Fixes for SEV-ES state tracking
 2021-05-10 18:07 UTC  (5+ messages)
` [PATCH 2/2] KVM: x86: Allow userspace to update tracked sregs for protected guests

[PATCH 00/15] KVM: x86: RDPID/RDTSCP fixes and uret MSR cleanups
 2021-05-10 17:55 UTC  (22+ messages)
` [PATCH 02/15] KVM: x86: Emulate RDPID only if RDTSCP is supported
` [PATCH 03/15] KVM: SVM: Inject #UD on RDTSCP when it should be disabled in the guest
` [PATCH 08/15] KVM: VMX: Configure list of user return MSRs at module init
` [PATCH 09/15] KVM: VMX: Use flag to indicate "active" uret MSRs instead of sorting list
` [PATCH 14/15] KVM: x86: Tie Intel and AMD behavior for MSR_TSC_AUX to guest CPU model

[patch 0/4] VMX: configure posted interrupt descriptor when assigning device (v3)
 2021-05-10 17:26 UTC  (5+ messages)
` [patch 1/4] KVM: x86: add start_assignment hook to kvm_x86_ops
` [patch 2/4] KVM: add arch specific vcpu_check_block callback
` [patch 3/4] KVM: x86: implement kvm_arch_vcpu_check_block callback
` [patch 4/4] KVM: VMX: update vcpu posted-interrupt descriptor when assigning device

[patch 0/4] VMX: configure posted interrupt descriptor when assigning device
 2021-05-10 17:53 UTC  (8+ messages)
` [patch 1/4] KVM: x86: add start_assignment hook to kvm_x86_ops
` [patch 4/4] KVM: VMX: update vcpu posted-interrupt descriptor when assigning device

[PATCH v3] KVM: selftests: Print a message if /dev/kvm is missing
 2021-05-10 17:46 UTC 

[PATCH v3 0/9] KVM: arm64: Initial host support for the Apple M1
 2021-05-10 17:44 UTC  (12+ messages)
` [PATCH v3 1/9] irqchip/gic: Split vGIC probing information from the GIC code
` [PATCH v3 2/9] KVM: arm64: Handle physical FIQ as an IRQ while running a guest
` [PATCH v3 3/9] KVM: arm64: vgic: Be tolerant to the lack of maintenance interrupt
` [PATCH v3 4/9] KVM: arm64: vgic: Let an interrupt controller advertise lack of HW deactivation
` [PATCH v3 5/9] KVM: arm64: vgic: move irq->get_input_level into an ops structure
` [PATCH v3 6/9] KVM: arm64: vgic: Implement SW-driven deactivation
` [PATCH v3 7/9] KVM: arm64: timer: Refactor IRQ configuration
` [PATCH v3 8/9] KVM: arm64: timer: Add support for SW-based deactivation
` [PATCH v3 9/9] irqchip/apple-aic: Advertise some level of vGICv3 compatibility

[PATCH v4 00/66] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
 2021-05-10 16:59 UTC  (67+ messages)
` [PATCH v4 01/66] arm64: Add ARM64_HAS_NESTED_VIRT cpufeature
` [PATCH v4 02/66] KVM: arm64: nv: Introduce nested virtualization VCPU feature
` [PATCH v4 03/66] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
` [PATCH v4 04/66] KVM: arm64: nv: Allow userspace to set PSR_MODE_EL2x
` [PATCH v4 05/66] KVM: arm64: nv: Add EL2 system registers to vcpu context
` [PATCH v4 06/66] KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 VCPU state
` [PATCH v4 07/66] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
` [PATCH v4 08/66] KVM: arm64: nv: Reset VMPIDR_EL2 and VPIDR_EL2 to sane values
` [PATCH v4 09/66] KVM: arm64: nv: Support virtual EL2 exceptions
` [PATCH v4 10/66] KVM: arm64: nv: Inject HVC exceptions to the virtual EL2
` [PATCH v4 11/66] KVM: arm64: nv: Handle trapped ERET from "
` [PATCH v4 12/66] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
` [PATCH v4 13/66] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
` [PATCH v4 14/66] KVM: arm64: nv: Handle SPSR_EL2 specially
` [PATCH v4 15/66] KVM: arm64: nv: Handle HCR_EL2.E2H specially
` [PATCH v4 16/66] KVM: arm64: nv: Save/Restore vEL2 sysregs
` [PATCH v4 17/66] KVM: arm64: nv: Emulate PSTATE.M for a guest hypervisor
` [PATCH v4 18/66] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
` [PATCH v4 19/66] KVM: arm64: nv: Trap SPSR_EL1, ELR_EL1 and VBAR_EL1 from "
` [PATCH v4 20/66] KVM: arm64: nv: Trap CPACR_EL1 access in "
` [PATCH v4 21/66] KVM: arm64: nv: Handle PSCI call via smc from the guest
` [PATCH v4 22/66] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
` [PATCH v4 23/66] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP,FPEN} settings
` [PATCH v4 24/66] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
` [PATCH v4 25/66] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
` [PATCH v4 26/66] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
` [PATCH v4 27/66] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
` [PATCH v4 28/66] KVM: arm64: nv: Forward debug traps to the nested guest
` [PATCH v4 29/66] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
` [PATCH v4 30/66] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
` [PATCH v4 31/66] KVM: arm64: nv: Filter out unsupported features from ID regs
` [PATCH v4 32/66] KVM: arm64: nv: Hide RAS from nested guests
` [PATCH v4 33/66] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
` [PATCH v4 34/66] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
` [PATCH v4 35/66] KVM: arm64: nv: Handle shadow stage 2 page faults
` [PATCH v4 36/66] KVM: arm64: nv: Restrict S2 RD/WR permissions to match the guest's
` [PATCH v4 37/66] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
` [PATCH v4 38/66] KVM: arm64: nv: Introduce sys_reg_desc.forward_trap
` [PATCH v4 39/66] KVM: arm64: nv: Set a handler for the system instruction traps
` [PATCH v4 40/66] KVM: arm64: nv: Trap and emulate AT instructions from virtual EL2
` [PATCH v4 41/66] KVM: arm64: nv: Trap and emulate TLBI "
` [PATCH v4 42/66] KVM: arm64: nv: Fold guest's HCR_EL2 configuration into the host's
` [PATCH v4 43/66] KVM: arm64: nv: arch_timer: Support hyp timer emulation
` [PATCH v4 44/66] KVM: arm64: nv: Add handling of EL2-specific timer registers
` [PATCH v4 45/66] KVM: arm64: nv: Load timer before the GIC
` [PATCH v4 46/66] KVM: arm64: nv: Nested GICv3 Support
` [PATCH v4 47/66] KVM: arm64: nv: Don't load the GICv4 context on entering a nested guest
` [PATCH v4 48/66] KVM: arm64: nv: vgic: Emulate the HW bit in software
` [PATCH v4 49/66] KVM: arm64: nv: vgic: Allow userland to set VGIC maintenance IRQ
` [PATCH v4 50/66] KVM: arm64: nv: Implement maintenance interrupt forwarding
` [PATCH v4 51/66] KVM: arm64: nv: Add nested GICv3 tracepoints
` [PATCH v4 52/66] KVM: arm64: nv: Allow userspace to request KVM_ARM_VCPU_NESTED_VIRT
` [PATCH v4 53/66] KVM: arm64: nv: Add handling of ARMv8.4-TTL TLB invalidation
` [PATCH v4 54/66] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
` [PATCH v4 55/66] KVM: arm64: Allow populating S2 SW bits
` [PATCH v4 56/66] KVM: arm64: nv: Tag shadow S2 entries with nested level
` [PATCH v4 57/66] KVM: arm64: nv: Add include containing the VNCR_EL2 offsets
` [PATCH v4 58/66] KVM: arm64: Map VNCR-capable registers to a separate page
` [PATCH v4 59/66] KVM: arm64: nv: Move nested vgic state into the sysreg file
` [PATCH v4 60/66] KVM: arm64: Add ARMv8.4 Enhanced Nested Virt cpufeature
` [PATCH v4 61/66] KVM: arm64: nv: Synchronize PSTATE early on exit
` [PATCH v4 62/66] KVM: arm64: nv: Sync nested timer state with ARMv8.4
` [PATCH v4 63/66] KVM: arm64: nv: Allocate VNCR page when required
` [PATCH v4 64/66] KVM: arm64: nv: Enable ARMv8.4-NV support
` [PATCH v4 65/66] KVM: arm64: nv: Fast-track 'InHost' exception returns
` [PATCH v4 66/66] KVM: arm64: nv: Fast-track EL1 TLBIs for VHE guests

[PATCH] KVM: selftests: Print a message if /dev/kvm is missing
 2021-05-10 17:23 UTC  (5+ messages)

[PATCH v16 00/14] s390/vfio-ap: dynamic configuration support
 2021-05-10 16:44 UTC  (15+ messages)
` [PATCH v16 01/14] s390/vfio-ap: fix memory leak in mdev remove callback
` [PATCH v16 02/14] s390/vfio-ap: use new AP bus interface to search for queue devices
` [PATCH v16 03/14] s390/vfio-ap: move probe and remove callbacks to vfio_ap_ops.c
` [PATCH v16 04/14] s390/vfio-ap: manage link between queue struct and matrix mdev
` [PATCH v16 05/14] s390/vfio-ap: introduce shadow APCB
` [PATCH v16 06/14] s390/vfio-ap: refresh guest's APCB by filtering APQNs assigned to mdev
` [PATCH v16 07/14] s390/vfio-ap: allow assignment of unavailable AP queues to mdev device
` [PATCH v16 08/14] s390/vfio-ap: allow hot plug/unplug of AP resources using "
` [PATCH v16 09/14] s390/vfio-ap: reset queues after adapter/domain unassignment
` [PATCH v16 10/14] s390/zcrypt: driver callback to indicate resource in use
` [PATCH v16 11/14] s390/vfio-ap: implement in-use callback for vfio_ap driver
` [PATCH v16 12/14] s390/vfio-ap: sysfs attribute to display the guest's matrix
` [PATCH v16 13/14] s390/zcrypt: notify drivers on config changed and scan complete callbacks
` [PATCH v16 14/14] s390/vfio-ap: update docs to include dynamic config support

[PATCH 0/8] KVM: VMX: Implement nested TSC scaling
 2021-05-10 16:08 UTC  (27+ messages)
` [PATCH 1/8] KVM: VMX: Add a TSC multiplier field in VMCS12
` [PATCH 2/8] KVM: X86: Store L1's TSC scaling ratio in 'struct kvm_vcpu_arch'
` [PATCH 3/8] KVM: X86: Pass an additional 'L1' argument to kvm_scale_tsc()
` [PATCH 4/8] KVM: VMX: Adjust the TSC-related VMCS fields on L2 entry and exit
` [PATCH 5/8] KVM: X86: Move tracing outside write_l1_tsc_offset()
` [PATCH 6/8] KVM: VMX: Make vmx_write_l1_tsc_offset() work with nested TSC scaling
` [PATCH 7/8] KVM: VMX: Expose TSC scaling to L2
` [PATCH 8/8] KVM: selftests: x86: Add vmx_nested_tsc_scaling_test

more iommu dead code removal
 2021-05-10 15:54 UTC  (4+ messages)
` [PATCH 3/6] vfio: remove the unused mdev iommu hook

[PATCH kvm-unit-tests v3 0/8] arm/arm64: Prepare for target-efi
 2021-05-10 15:45 UTC  (3+ messages)
` [PATCH kvm-unit-tests v3 4/8] arm/arm64: mmu: Stop mapping an assumed IO region

[PATCH v6 0/2] fallback for emulation errors
 2021-05-10 14:48 UTC  (3+ messages)
` [PATCH v6 1/2] kvm: x86: Allow userspace to handle "
` [PATCH v6 2/2] selftests: kvm: Allows "

[PATCH 0/2] KVM: arm64: Fixup PC updates on exit to userspace
 2021-05-10 15:14 UTC  (8+ messages)
` [PATCH 1/2] KVM: arm64: Move __adjust_pc out of line
` [PATCH 2/2] KVM: arm64: Commit pending PC adjustemnts before returning to userspace

[kvm-unit-tests PATCH 0/4] s390x: cpumodel: Add sclp checks
 2021-05-10 15:00 UTC  (5+ messages)
` [kvm-unit-tests PATCH 1/4] s390x: sclp: Only fetch read info byte 134 if cpu entries are above it
` [kvm-unit-tests PATCH 2/4] lib: s390x: sclp: Extend feature probing
` [kvm-unit-tests PATCH 3/4] s390x: cpumodel: FMT4 SCLP test
` [kvm-unit-tests PATCH 4/4] s390x: cpumodel: FMT2 SCLP implies test

[kvm-unit-tests PATCH v2 0/6] s390x: uv: Extend guest test and add host test
 2021-05-10 13:51 UTC  (7+ messages)
` [kvm-unit-tests PATCH v2 1/6] s390x: uv-guest: Add invalid share location test
` [kvm-unit-tests PATCH v2 2/6] s390x: Add more Ultravisor command structure definitions
` [kvm-unit-tests PATCH v2 3/6] s390x: uv: Add UV lib
` [kvm-unit-tests PATCH v2 4/6] s390x: Test for share/unshare call support before using them
` [kvm-unit-tests PATCH v2 5/6] s390x: uv-guest: Test invalid commands
` [kvm-unit-tests PATCH v2 6/6] s390x: Add UV host test

[PATCH 0/6] sched,delayacct: Some cleanups
 2021-05-10 12:06 UTC  (5+ messages)
` [PATCH 2/6] sched: Rename sched_info_{queued,dequeued}
` [PATCH 7/6] delayacct: Add sysctl to enable at runtime

[PATCH] KVM: x86: hyper-v: Task srcu lock when accessing kvm_memslots()
 2021-05-10 11:15 UTC  (4+ messages)

[PATCH] Revert "irqbypass: do not start cons/prod when failed connect"
 2021-05-10 11:01 UTC  (9+ messages)

Question on guest enable msi fail when using GICv4/4.1
 2021-05-10  9:59 UTC  (8+ messages)

[PATCH v5 0/2] fallback for emulation errors
 2021-05-10  9:37 UTC  (5+ messages)
` [PATCH v5 1/2] kvm: x86: Allow userspace to handle "

[GIT PULL] KVM/arm64 updates for 5.9
 2021-05-10  8:43 UTC  (5+ messages)
` [PATCH 15/56] KVM: arm64: Add build rules for separate VHE/nVHE object files

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).