kvmarm.lists.cs.columbia.edu archive mirror
 help / color / mirror / Atom feed
 messages from 2021-10-16 19:54:39 to 2021-11-02 00:22:45 UTC [more...]

[RFC PATCH 0/8] KVM: arm64: Add support for hypercall services selection
 2021-11-02  0:22 UTC  (8+ messages)
` [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
` [RFC PATCH 2/8] KVM: arm64: Setup base for hypercall firmware registers
` [RFC PATCH 3/8] KVM: arm64: Add standard secure service calls firmware register
` [RFC PATCH 4/8] KVM: arm64: Add standard hypervisor "
` [RFC PATCH 5/8] KVM: arm64: Add vendor "
` [RFC PATCH 6/8] tools: Import the firmware registers
` [RFC PATCH 7/8] tools: Import ARM SMCCC definitions

[PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
 2021-11-01 17:41 UTC  (118+ messages)
` [PATCH v2 02/43] KVM: SVM: Ensure target pCPU is read once when signalling AVIC doorbell
` [PATCH v2 05/43] KVM: Update halt-polling stats if and only if halt-polling was attempted
` [PATCH v2 06/43] KVM: Refactor and document halt-polling stats update helper
` [PATCH v2 07/43] KVM: Reconcile discrepancies in halt-polling stats
` [PATCH v2 09/43] KVM: Drop obsolete kvm_arch_vcpu_block_finish()
` [PATCH v2 10/43] KVM: arm64: Move vGIC v4 handling for WFI out arch callback hook
` [PATCH v2 11/43] KVM: Don't block+unblock when halt-polling is successful
` [PATCH v2 12/43] KVM: x86: Tweak halt emulation helper names to free up kvm_vcpu_halt()
` [PATCH v2 13/43] KVM: Rename kvm_vcpu_block() => kvm_vcpu_halt()
` [PATCH v2 16/43] KVM: Don't redo ktime_get() when calculating halt-polling stop/deadline
` [PATCH v2 17/43] KVM: x86: Directly block (instead of "halting") UNINITIALIZED vCPUs
` [PATCH v2 18/43] KVM: x86: Invoke kvm_vcpu_block() directly for non-HALTED wait states
` [PATCH v2 19/43] KVM: Add helpers to wake/query blocking vCPU
` [PATCH v2 20/43] KVM: VMX: Skip Posted Interrupt updates if APICv is hard disabled
` [PATCH v2 21/43] KVM: VMX: Clean up PI pre/post-block WARNs
` [PATCH v2 22/43] KVM: VMX: Drop unnecessary PI logic to handle impossible conditions
` [PATCH v2 23/43] KVM: VMX: Use boolean returns for Posted Interrupt "test" helpers
` [PATCH v2 24/43] KVM: VMX: Drop pointless PI.NDST update when blocking
` [PATCH v2 25/43] KVM: VMX: Save/restore IRQs (instead of CLI/STI) during PI pre/post block
` [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
` [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
` [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
` [PATCH v2 29/43] KVM: VMX: Handle PI wakeup shenanigans during vcpu_put/load
` [PATCH v2 30/43] KVM: Drop unused kvm_vcpu.pre_pcpu field
` [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
` [PATCH v2 32/43] KVM: VMX: Move preemption timer <=> hrtimer dance to common x86
` [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv, sw}_timer() helpers
  ` [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv,sw}_timer() helpers
` [PATCH v2 34/43] KVM: x86: Remove defunct pre_block/post_block kvm_x86_ops hooks
` [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
` [PATCH v2 36/43] KVM: SVM: Don't bother checking for "running" AVIC when kicking for IPIs
` [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv)
` [PATCH v2 38/43] KVM: Drop defunct kvm_arch_vcpu_(un)blocking() hooks
` [PATCH v2 39/43] KVM: VMX: Don't do full kick when triggering posted interrupt "fails"
` [PATCH v2 40/43] KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU
` [PATCH v2 41/43] KVM: VMX: Pass desired vector instead of bool for triggering posted IRQ
` [PATCH v2 42/43] KVM: VMX: Fold fallback path into triggering posted IRQ helper
` [PATCH v2 43/43] KVM: VMX: Don't do full kick when handling posted interrupt wakeup

[PATCH 0/3] KVM: arm64: Fixes for the exposed debug architecture
 2021-11-01 10:21 UTC  (9+ messages)
` [PATCH 1/3] KVM: arm64: Stash OSLSR_EL1 in the cpu context
` [PATCH 2/3] KVM: arm64: Allow the guest to change the OS Lock status
` [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2

[GIT PULL] KVM/arm64 updates for 5.16
 2021-10-31  6:30 UTC  (2+ messages)

[PATCH v2 0/5] KVM: arm64: Rework FPSIMD/SVE tracking
 2021-10-28 13:14 UTC  (8+ messages)
` [PATCH v2 1/5] KVM: arm64: Reorder vcpu flag definitions
` [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving
` [PATCH v2 3/5] KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE
` [PATCH v2 4/5] KVM: arm64: Stop mapping current thread_info at EL2
` [PATCH v2 5/5] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM

[PATCH] KVM: arm64: Remove unused TRNG_NO_ENTROPY
 2021-10-27 15:17 UTC  (4+ messages)

[PATCH] KVM: arm64: Avoid shadowing a previous local
 2021-10-27 15:13 UTC  (3+ messages)

[PATCH 0/4] KVM: arm64: Stop mapping current thread_info at EL2
 2021-10-27 11:26 UTC  (8+ messages)
` [PATCH 1/4] KVM: arm64: Reorder vcpu flag definitions
` [PATCH 2/4] KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE
` [PATCH 3/4] KVM: arm64: Stop mapping current thread_info at EL2
` [PATCH 4/4] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM

[RFC v16 0/9] SMMUv3 Nested Stage Setup (IOMMU part)
 2021-10-27 10:44 UTC  (10+ messages)
` [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
` [RFC v16 2/9] iommu: Introduce iommu_get_nesting
` [RFC v16 3/9] iommu/smmuv3: Allow s1 and s2 configs to coexist
` [RFC v16 4/9] iommu/smmuv3: Get prepared for nested stage support
` [RFC v16 5/9] iommu/smmuv3: Implement attach/detach_pasid_table
` [RFC v16 6/9] iommu/smmuv3: Allow stage 1 invalidation with unmanaged ASIDs
` [RFC v16 7/9] iommu/smmuv3: Implement cache_invalidate
` [RFC v16 8/9] iommu/smmuv3: report additional recoverable faults
` [RFC v16 9/9] iommu/smmuv3: Disallow nested mode in presence of HW MSI regions

[PATCH AUTOSEL 5.14 01/18] KVM: arm64: Report corrupted refcount at EL2
 2021-10-25 16:59 UTC 

[PATCH] arm64/kvm: Fix bitrotted comment for SVE handling in handle_exit.c
 2021-10-25 16:32 UTC 

[PATCH v2 0/2] KVM: selftests: enable the memslot tests in ARM64
 2021-10-21 12:47 UTC  (4+ messages)

[PATCH v2 00/15] KVM: arm64: pkvm: Implement unshare hypercall
 2021-10-21 10:07 UTC  (17+ messages)
` [PATCH v2 01/15] KVM: arm64: Check if running in VHE from kvm_host_owns_hyp_mappings()
` [PATCH v2 02/15] KVM: arm64: Provide {get, put}_page() stubs for early hyp allocator
` [PATCH v2 03/15] KVM: arm64: Refcount hyp stage-1 pgtable pages
` [PATCH v2 04/15] KVM: arm64: Fixup hyp stage-1 refcount
` [PATCH v2 05/15] KVM: arm64: Hook up ->page_count() for hypervisor stage-1 page-table
` [PATCH v2 06/15] KVM: arm64: Implement kvm_pgtable_hyp_unmap() at EL2
` [PATCH v2 07/15] KVM: arm64: Introduce kvm_share_hyp()
` [PATCH v2 08/15] KVM: arm64: pkvm: Refcount the pages shared with EL2
` [PATCH v2 09/15] KVM: arm64: Extend pkvm_page_state enumeration to handle absent pages
` [PATCH v2 10/15] KVM: arm64: Introduce wrappers for host and hyp spin lock accessors
` [PATCH v2 11/15] KVM: arm64: Implement do_share() helper for sharing memory
` [PATCH v2 12/15] KVM: arm64: Implement __pkvm_host_share_hyp() using do_share()
` [PATCH v2 13/15] KVM: arm64: Implement do_unshare() helper for unsharing memory
` [PATCH v2 14/15] KVM: arm64: Expose unshare hypercall to the host
` [PATCH v2 15/15] KVM: arm64: pkvm: Unshare guest structs during teardown

[RFC PATCH v3 0/5] x86/kvm: Virtual suspend time injection support
 2021-10-20 13:52 UTC  (7+ messages)
` [RFC PATCH v3 1/5] timekeeping: Expose tk->offs_boot via ktime_get_offs_boot_ns
` [RFC PATCH v3 2/5] kvm/x86: Include asm/pvclock.h in asm/kvmclock.h
` [RFC PATCH v3 3/5] kvm/x86: virtual suspend time injection: Add common definitions
` [RFC PATCH v3 4/5] kvm/x86: virtual suspend time injection: Implement host side
` [RFC PATCH v3 5/5] kvm/x86: virtual suspend time injection: Implement guest side

[PATCH 00/16] KVM: arm64: Implement unshare hypercall for pkvm
 2021-10-19 10:37 UTC  (16+ messages)
` [PATCH 01/16] KVM: arm64: Introduce do_share() helper for memory sharing between components
` [PATCH 03/16] KVM: arm64: Avoid remapping the SVE state in the hyp stage-1
` [PATCH 04/16] KVM: arm64: Introduce kvm_share_hyp()
` [PATCH 16/16] KVM: arm64: pkvm: Unshare guest structs during teardown

[RFC PATCH 00/25] KVM: arm64: Make CPU ID registers writable by userspace
 2021-10-19  7:26 UTC  (15+ messages)
` [RFC PATCH 01/25] KVM: arm64: Add has_reset_once flag for vcpu
` [RFC PATCH 02/25] KVM: arm64: Save ID registers' sanitized value per vCPU
` [RFC PATCH 03/25] KVM: arm64: Introduce a validation function for an ID register
` [RFC PATCH 04/25] KVM: arm64: Introduce struct id_reg_info

[PATCH v2 0/5] KVM: arm64: Reorganise vcpu first run
 2021-10-18 21:11 UTC  (6+ messages)
` [PATCH v2 1/5] KVM: arm64: Move SVE state mapping at HYP to finalize-time
` [PATCH v2 2/5] KVM: arm64: Move kvm_arch_vcpu_run_pid_change() out of line
` [PATCH v2 3/5] KVM: arm64: Restructure the point where has_run_once is advertised
` [PATCH v2 4/5] KVM: arm64: Merge kvm_arch_vcpu_run_pid_change() and kvm_vcpu_first_run_init()
` [PATCH v2 5/5] KVM: arm64: Drop vcpu->arch.has_run_once for vcpu->pid

Problems about Stage-2 translation
 2021-10-18 19:31 UTC  (6+ messages)

[RFC PATCH 0/7] arm64: mm: Prototype to allow drivers to request PBHA values
 2021-10-18 17:26 UTC  (7+ messages)
` [RFC PATCH 1/7] KVM: arm64: Detect and enable PBHA for stage2
` [RFC PATCH 4/7] arm64: cpufeature: Enable PBHA bits for stage1

[PATCH v8 00/11] KVM: arm64: Fixed features for protected VMs
 2021-10-18 16:39 UTC  (2+ messages)

[PATCH v8 11/11] KVM: arm64: Handle protected guests at 32 bits
 2021-10-18 16:37 UTC  (6+ messages)
` [PATCH v9 00/22] KVM: arm64: Fixed features for protected VMs

[RFC PATCH v4 00/39] KVM: arm64: Add Statistical Profiling Extension (SPE) support
 2021-10-18 14:09 UTC  (7+ messages)
` [RFC PATCH v4 02/39] KVM: arm64: Add lock/unlock memslot user API
` [RFC PATCH v4 04/39] KVM: arm64: Defer CMOs for locked memslots until a VCPU is run

[PATCH v2 0/2] Add memcg accounting to Arm KVM
 2021-10-17 10:30 UTC  (2+ messages)

[PATCH v8 00/15] KVM: arm64: selftests: Introduce arch_timer selftest
 2021-10-17 10:20 UTC  (2+ messages)

[PATCH] KVM: arm64: Fix reporting of endianess when the access originates at EL0
 2021-10-17 10:20 UTC  (2+ messages)

[PATCH v2 0/5] KVM: arm64: Assorted vgic-v3 fixes
 2021-10-17 10:11 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).