kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-06-03 18:07:46 to 2022-06-06 20:40:34 UTC [more...]

[PATCH v7 0/8] s390x/pci: zPCI interpretation support
 2022-06-06 20:36 UTC  (5+ messages)
` [PATCH v7 1/8] Update linux headers
` [PATCH v7 3/8] s390x/pci: enable for load/store intepretation
` [PATCH v7 5/8] s390x/pci: enable adapter event notification for interpreted devices
` [PATCH v7 6/8] s390x/pci: let intercept devices have separate PCI groups

[PATCH v9 00/21] KVM: s390: enable zPCI for interpretive execution
 2022-06-06 20:33 UTC  (22+ messages)
` [PATCH v9 01/21] s390/sclp: detect the zPCI load/store interpretation facility
` [PATCH v9 02/21] s390/sclp: detect the AISII facility
` [PATCH v9 03/21] s390/sclp: detect the AENI facility
` [PATCH v9 04/21] s390/sclp: detect the AISI facility
` [PATCH v9 05/21] s390/airq: pass more TPI info to airq handlers
` [PATCH v9 06/21] s390/airq: allow for airq structure that uses an input vector
` [PATCH v9 07/21] s390/pci: externalize the SIC operation controls and routine
` [PATCH v9 08/21] s390/pci: stash associated GISA designation
` [PATCH v9 09/21] s390/pci: stash dtsm and maxstbl
` [PATCH v9 10/21] vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM
` [PATCH v9 11/21] KVM: s390: pci: add basic kvm_zdev structure
` [PATCH v9 12/21] KVM: s390: pci: do initial setup for AEN interpretation
` [PATCH v9 13/21] KVM: s390: pci: enable host forwarding of Adapter Event Notifications
` [PATCH v9 14/21] KVM: s390: mechanism to enable guest zPCI Interpretation
` [PATCH v9 15/21] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
` [PATCH v9 16/21] KVM: s390: pci: add routines to start/stop interpretive execution
` [PATCH v9 17/21] vfio-pci/zdev: add open/close device hooks
` [PATCH v9 18/21] vfio-pci/zdev: add function handle to clp base capability
` [PATCH v9 19/21] vfio-pci/zdev: different maxstbl for interpreted devices
` [PATCH v9 20/21] KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices
` [PATCH v9 21/21] MAINTAINERS: additional files related kvm s390 pci passthrough

[PATCH v1 00/18] VFIO ccw/mdev rework
 2022-06-06 20:23 UTC  (15+ messages)
` [PATCH v1 01/18] vfio/ccw: Remove UUID from s390 debug log
` [PATCH v1 02/18] vfio/ccw: Fix FSM state if mdev probe fails
` [PATCH v1 07/18] vfio/ccw: Flatten MDEV device (un)register
` [PATCH v1 13/18] vfio/mdev: Consolidate all the device_api sysfs into the core code
` [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core

[PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
 2022-06-06 20:09 UTC  (2+ messages)

simplify the mdev interface
 2022-06-06 19:22 UTC  (5+ messages)
` [PATCH 2/8] vfio/mdev: embedd struct mdev_parent in the parent data structure
` [PATCH 3/8] vfio/mdev: simplify mdev_type handling

[PATCH 0/5] Simplify vfio_iommu_type1 attach/detach routine
 2022-06-06 18:52 UTC  (11+ messages)
` [PATCH 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
` [PATCH 2/5] iommu: Ensure device has the same iommu_ops as the domain
` [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
` [PATCH 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
` [PATCH 5/5] vfio/iommu_type1: Simplify group attachment

[PATCH] KVM: SVM: fix tsc scaling cache logic
 2022-06-06 18:11 UTC 

[PATCH 0/7] KVM: x86: AVIC/APICv patch queue
 2022-06-06 18:08 UTC  (8+ messages)
` [PATCH 1/7] KVM: x86: document AVIC/APICv inhibit reasons
` [PATCH 2/7] KVM: x86: inhibit APICv/AVIC when the guest and/or host changes either apic id or the apic base from their default values
` [PATCH 3/7] KVM: x86: SVM: remove avic's broken code that updated APIC ID
` [PATCH 4/7] KVM: x86: SVM: fix avic_kick_target_vcpus_fast
` [PATCH 5/7] KVM: x86: disable preemption while updating apicv inhibition
` [PATCH 6/7] KVM: x86: disable preemption around the call to kvm_arch_vcpu_{un|}blocking
` [PATCH 7/7] KVM: x86: SVM: there is no need for preempt safe wrappers for avic_vcpu_load/put

[PATCH v2 0/4] kvm: x86/pmu: Introduce and test masked events
 2022-06-06 17:52 UTC  (5+ messages)
` [PATCH v2 1/4] kvm: x86/pmu: Introduce masked events to the pmu event filter
` [PATCH v2 2/4] selftests: kvm/x86: Add flags when creating a "
` [PATCH v2 3/4] selftests: kvm/x86: Add testing for masked events
` [PATCH v2 4/4] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER

[PATCH 0/2] Improve vfio-pci primary GPU assignment behavior
 2022-06-06 17:53 UTC  (3+ messages)
` [PATCH 1/2] drm/aperture: Split conflicting platform driver removal
` [PATCH 2/2] vfio/pci: Remove console drivers

[PATCH v19 00/20] s390/vfio-ap: dynamic configuration support
 2022-06-06 17:50 UTC  (3+ messages)
` [PATCH v19 17/20] s390/vfio-ap: handle config changed and scan complete notification

[PATCH 00/23] Update Documentation/ cross-references
 2022-06-06 17:17 UTC  (6+ messages)
` [PATCH 10/23] Documentation: KVM: update s390-pv.rst reference
` [PATCH 11/23] Documentation: KVM: update amd-memory-encryption.rst references
` [PATCH 12/23] Documentation: KVM: update msr.rst reference
` [PATCH 13/23] Documentation: KVM: update s390-diag.rst reference

[PATCH v2] KVM: x86/mmu: Check every prev_roots in __kvm_mmu_free_obsolete_roots()
 2022-06-07  0:59 UTC  (2+ messages)

[PATCH] entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set
 2022-06-06 16:20 UTC  (3+ messages)

[PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
 2022-06-06 16:18 UTC  (4+ messages)

ioregionfd with io_uring IORING_OP_URING_CMD
 2022-06-06 14:57 UTC 

[PATCH 00/18] KVM/arm64: Refactoring the vcpu flags
 2022-06-06 12:16 UTC  (13+ messages)
` [PATCH 01/18] KVM: arm64: Always start with clearing SVE flag on load
` [PATCH 03/18] KVM: arm64: Drop FP_FOREIGN_STATE from the hypervisor code
` [PATCH 04/18] KVM: arm64: Move FP state ownership from flag to a tristate

[PATCH Part2 RFC v4 00/40] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2022-06-06 11:42 UTC  (4+ messages)
` [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support

[PATCH vfio 0/2] Migration few enhancements
 2022-06-06  8:56 UTC  (3+ messages)
` [PATCH vfio 1/2] vfio/mlx5: Protect mlx5vf_disable_fds() upon close device
` [PATCH vfio 2/2] vfio: Split migration ops from main device ops

[PATCH v6 00/38] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
 2022-06-06  8:36 UTC  (39+ messages)
` [PATCH v6 01/38] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
` [PATCH v6 02/38] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
` [PATCH v6 03/38] KVM: x86: hyper-v: Introduce TLB flush fifo
` [PATCH v6 04/38] KVM: x86: hyper-v: Add helper to read hypercall data for array
` [PATCH v6 05/38] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
` [PATCH v6 06/38] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
` [PATCH v6 07/38] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
` [PATCH v6 08/38] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
` [PATCH v6 09/38] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
` [PATCH v6 10/38] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
` [PATCH v6 11/38] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
` [PATCH v6 12/38] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
` [PATCH v6 13/38] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
` [PATCH v6 14/38] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
` [PATCH v6 15/38] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
` [PATCH v6 16/38] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
` [PATCH v6 17/38] KVM: x86: hyper-v: L2 TLB flush
` [PATCH v6 18/38] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
` [PATCH v6 19/38] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
` [PATCH v6 20/38] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
` [PATCH v6 21/38] KVM: nVMX: hyper-v: Enable L2 TLB flush
` [PATCH v6 22/38] KVM: nSVM: "
` [PATCH v6 23/38] KVM: x86: Expose Hyper-V L2 TLB flush feature
` [PATCH v6 24/38] KVM: selftests: Better XMM read/write helpers
` [PATCH v6 25/38] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
` [PATCH v6 26/38] KVM: selftests: Move the function doing Hyper-V hypercall "
` [PATCH v6 27/38] KVM: selftests: Hyper-V PV IPI selftest
` [PATCH v6 28/38] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
` [PATCH v6 29/38] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
` [PATCH v6 30/38] KVM: selftests: Export _vm_get_page_table_entry()
` [PATCH v6 31/38] KVM: selftests: Hyper-V PV TLB flush selftest
` [PATCH v6 32/38] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
` [PATCH v6 33/38] KVM: selftests: nVMX: Allocate Hyper-V partition assist page
` [PATCH v6 34/38] KVM: selftests: nSVM: Allocate Hyper-V partition assist and VP assist pages
` [PATCH v6 35/38] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
` [PATCH v6 36/38] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
` [PATCH v6 37/38] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
` [PATCH v6 38/38] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test

[PATCH 00/12] KVM: X86/MMU: Simpliy mmu_unsync_walk()
 2022-06-05  6:43 UTC  (13+ messages)
` [PATCH 01/12] KVM: X86/MMU: Warn if sp->unsync_children > 0 in link_shadow_page()
` [PATCH 02/12] KVM: X86/MMU: Rename kvm_unlink_unsync_page() to kvm_mmu_page_clear_unsync()
` [PATCH 03/12] KVM: X86/MMU: Split a part of kvm_unsync_page() as kvm_mmu_page_mark_unsync()
` [PATCH 04/12] KVM: X86/MMU: Remove mmu_pages_clear_parents()
` [PATCH 05/12] KVM: X86/MMU: Clear unsync bit directly in __mmu_unsync_walk()
` [PATCH 06/12] KVM: X86/MMU: Rename mmu_unsync_walk() to mmu_unsync_walk_and_clear()
` [PATCH 07/12] KVM: X86/MMU: Remove the useless struct mmu_page_path
` [PATCH 08/12] KVM: X86/MMU: Remove the useless idx from struct kvm_mmu_pages
` [PATCH 09/12] KVM: X86/MMU: Unfold struct mmu_page_and_offset in "
` [PATCH 10/12] KVM: X86/MMU: Don't add parents to "
` [PATCH 11/12] KVM: X86/MMU: Remove mmu_pages_first() and mmu_pages_next()
` [PATCH 12/12] KVM: X86/MMU: Rename struct kvm_mmu_pages to struct kvm_mmu_page_vec

[PATCH 0/6] KVM: Trivial cleanups
 2022-06-05  6:34 UTC  (7+ messages)
` [PATCH 1/6] KVM: X86/MMU: Remove unused macros from paging_tmpl.h
` [PATCH 2/6] KVM: X86/MMU: Remove unused PT32_DIR_BASE_ADDR_MASK from mmu.c
` [PATCH 3/6] KVM: X86/MMU: Update comments in paging_tmpl.h for the kinds of guest PTEs
` [PATCH 4/6] KVM: Rename ack_flush() to ack_kick()
` [PATCH 5/6] KVM: X86/MMU: Remove useless mmu_topup_memory_caches() in kvm_mmu_pte_write()
` [PATCH 6/6] KVM: X86/SVM: Use root_level in svm_load_mmu_pgd()

[PATCH 00/89] KVM: arm64: Base support for the pKVM hypervisor at EL2
 2022-06-04  8:26 UTC  (6+ messages)
` [PATCH 59/89] KVM: arm64: Do not support MTE for protected VMs

[PATCH v4 0/2] x86: Add the feature Virtual SPEC_CTRL
 2022-06-04  3:11 UTC  (3+ messages)
` [PATCH v4 2/2] KVM: SVM: Add support for "

[PATCH 00/42] KVM: selftests: Overhaul Part II - CPUID
 2022-06-04  1:20 UTC  (43+ messages)
` [PATCH 01/42] KVM: selftests: Set KVM's supported CPUID as vCPU's CPUID during recreate
` [PATCH 02/42] KVM: sefltests: Use CPUID_XSAVE and CPUID_OSXAVE instead of X86_FEATURE_*
` [PATCH 03/42] KVM: selftests: Add framework to query KVM CPUID bits
` [PATCH 04/42] KVM: selftests: Use kvm_cpu_has() in the SEV migration test
` [PATCH 05/42] KVM: selftests: Use kvm_cpu_has() for nested SVM checks
` [PATCH 06/42] KVM: selftests: Use kvm_cpu_has() for nested VMX checks
` [PATCH 07/42] KVM: selftests: Use kvm_cpu_has() to query PDCM in PMU selftest
` [PATCH 08/42] KVM: selftests: Drop redundant vcpu_set_cpuid() from "
` [PATCH 09/42] KVM: selftests: Use kvm_cpu_has() for XSAVES in XSS MSR test
` [PATCH 10/42] KVM: selftests: Check for _both_ XTILE data and cfg in AMX test
` [PATCH 11/42] KVM: selftests: Use kvm_cpu_has() "
` [PATCH 12/42] KVM: selftests: Use kvm_cpu_has() for XSAVE in cr4_cpuid_sync_test
` [PATCH 13/42] KVM: selftests: Remove the obsolete/dead MMU role test
` [PATCH 14/42] KVM: selftests: Use kvm_cpu_has() for KVM's PV steal time
` [PATCH 15/42] KVM: selftests: Use kvm_cpu_has() for nSVM soft INT injection test
` [PATCH 16/42] KVM: selftests: Verify that kvm_cpuid2.entries layout is unchanged by KVM
` [PATCH 17/42] KVM: selftests: Split out kvm_cpuid2_size() from allocate_kvm_cpuid2()
` [PATCH 18/42] KVM: selftests: Cache CPUID in struct kvm_vcpu
` [PATCH 19/42] KVM: selftests: Don't use a static local in vcpu_get_supported_hv_cpuid()
` [PATCH 20/42] KVM: selftests: Rename and tweak get_cpuid() to get_cpuid_entry()
` [PATCH 21/42] KVM: selftests: Use get_cpuid_entry() in kvm_get_supported_cpuid_index()
` [PATCH 22/42] KVM: selftests: Add helpers to get and modify a vCPU's CPUID entries
` [PATCH 23/42] KVM: selftests: Use vm->pa_bits to generate reserved PA bits
` [PATCH 24/42] KVM: selftests: Add and use helper to set vCPU's CPUID maxphyaddr
` [PATCH 25/42] KVM: selftests: Use vcpu_get_cpuid_entry() in PV features test (sort of)
` [PATCH 26/42] KVM: selftests: Use vCPU's CPUID directly in Hyper-V test
` [PATCH 27/42] KVM: selftests: Use vcpu_get_cpuid_entry() in CPUID test
` [PATCH 28/42] KVM: selftests: Use vcpu_{set,clear}_cpuid_feature() in nVMX state test
` [PATCH 29/42] KVM: selftests: Use vcpu_clear_cpuid_feature() to clear x2APIC
` [PATCH 30/42] KVM: selftests: Make get_supported_cpuid() returns "const"
` [PATCH 31/42] KVM: selftests: Set input function/index in raw CPUID helper(s)
` [PATCH 32/42] KVM: selftests: Add this_cpu_has() to query X86_FEATURE_* via cpuid()
` [PATCH 33/42] KVM: selftests: Use this_cpu_has() in CR4/CPUID sync test
` [PATCH 34/42] KVM: selftests: Use this_cpu_has() to detect SVM support in L1
` [PATCH 35/42] KVM: selftests: Drop unnecessary use of kvm_get_supported_cpuid_index()
` [PATCH 36/42] KVM: selftests: Rename kvm_get_supported_cpuid_index() to __..._entry()
` [PATCH 37/42] KVM: selftests: Inline "get max CPUID leaf" helpers
` [PATCH 38/42] KVM: selftests: Check KVM's supported CPUID, not host CPUID, for XFD
` [PATCH 39/42] KVM: selftests: Skip AMX test if ARCH_REQ_XCOMP_GUEST_PERM isn't supported
` [PATCH 40/42] KVM: selftests: Clean up requirements for XFD-aware XSAVE features
` [PATCH 41/42] KVM: selftests: Use the common cpuid() helper in cpu_vendor_string_is()
` [PATCH 42/42] KVM: selftests: Drop unused SVM_CPUID_FUNC macro

(RISC-V KVM) Re: [PATCH] RISC-V: fix typos in comments
 2022-06-03 21:20 UTC  (2+ messages)

[PATCH v4 0/8] KVM: x86: Add CMCI and UCNA emulation
 2022-06-03 20:54 UTC  (10+ messages)
` [PATCH v4 1/8] KVM: x86: Make APIC_VERSION capture only the magic 0x14UL
` [PATCH v4 4/8] KVM: x86: Add Corrected Machine Check Interrupt (CMCI) emulation to lapic
` [PATCH v4 6/8] KVM: x86: Add emulation for MSR_IA32_MCx_CTL2 MSRs
` [PATCH v4 7/8] KVM: x86: Enable CMCI capability by default and handle injected UCNA errors

[GIT PULL] vhost,virtio,vdpa: features, fixes, cleanups
 2022-06-03 18:50 UTC  (2+ messages)

[PATCH 5.18 28/67] KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak
 2022-06-03 17:43 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).