kvmarm.lists.cs.columbia.edu archive mirror
 help / color / mirror / Atom feed
 messages from 2021-10-27 16:50:01 to 2021-11-08 21:33:44 UTC [more...]

[RFC PATCH 0/8] KVM: arm64: Add support for hypercall services selection
 2021-11-08 21:33 UTC  (18+ messages)
` [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
` [RFC PATCH 2/8] KVM: arm64: Setup base for hypercall firmware registers
` [RFC PATCH 3/8] KVM: arm64: Add standard secure service calls firmware register
` [RFC PATCH 4/8] KVM: arm64: Add standard hypervisor "
` [RFC PATCH 5/8] KVM: arm64: Add vendor "
` [RFC PATCH 6/8] tools: Import the firmware registers
` [RFC PATCH 7/8] tools: Import ARM SMCCC definitions
` [RFC PATCH 8/8] selftests: KVM: aarch64: Introduce hypercall ABI test

How to translate a VA in Guest to PA in Host?
 2021-11-08 19:45 UTC  (3+ messages)

[PATCH] KVM: arm64: Fix host stage-2 finalization
 2021-11-08 18:10 UTC  (2+ messages)

[PATCH 0/5] KVM: Turn the vcpu array into an xarray
 2021-11-08 12:13 UTC  (15+ messages)
` [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
` [PATCH 2/5] KVM: mips: Use kvm_get_vcpu() instead of open-coded access
` [PATCH 3/5] KVM: s390: "
` [PATCH 4/5] KVM: x86: "
` [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray

[PATCH -next] KVM: arm64: change the return type of kvm_vcpu_preferred_target()
 2021-11-08 10:50 UTC  (3+ messages)

[PATCH] arm64: kvm/hyp/nvhe: fix a non-kernel-doc comment
 2021-11-08 10:45 UTC  (2+ messages)

[RFC PATCH v2 00/28] KVM: arm64: Make CPU ID registers writable by userspace
 2021-11-08  7:45 UTC  (38+ messages)
` [RFC PATCH v2 01/28] KVM: arm64: Add has_reset_once flag for vcpu
` [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
` [RFC PATCH v2 03/28] KVM: arm64: Introduce struct id_reg_info
` [RFC PATCH v2 04/28] KVM: arm64: Keep consistency of ID registers between vCPUs
` [RFC PATCH v2 05/28] KVM: arm64: Make ID_AA64PFR0_EL1 writable
` [RFC PATCH v2 06/28] KVM: arm64: Make ID_AA64PFR1_EL1 writable
` [RFC PATCH v2 07/28] KVM: arm64: Make ID_AA64ISAR0_EL1 writable
` [RFC PATCH v2 08/28] KVM: arm64: Make ID_AA64ISAR1_EL1 writable
` [RFC PATCH v2 09/28] KVM: arm64: Make ID_AA64MMFR0_EL1 writable
` [RFC PATCH v2 10/28] KVM: arm64: Hide IMPLEMENTATION DEFINED PMU support for the guest
` [RFC PATCH v2 11/28] KVM: arm64: Make ID_AA64DFR0_EL1 writable
` [RFC PATCH v2 12/28] KVM: arm64: Make ID_DFR0_EL1 writable
` [RFC PATCH v2 13/28] KVM: arm64: Make ID_DFR1_EL1 writable
` [RFC PATCH v2 14/28] KVM: arm64: Make ID_MMFR0_EL1 writable
` [RFC PATCH v2 15/28] KVM: arm64: Make MVFR1_EL1 writable
` [RFC PATCH v2 16/28] KVM: arm64: Make ID registers without id_reg_info writable
` [RFC PATCH v2 17/28] KVM: arm64: Add consistency checking for frac fields of ID registers
` [RFC PATCH v2 18/28] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
` [RFC PATCH v2 19/28] KVM: arm64: Use vcpu->arch cptr_el2 to track value of cptr_el2 for VHE
` [RFC PATCH v2 20/28] KVM: arm64: Use vcpu->arch.mdcr_el2 to track value of mdcr_el2
` [RFC PATCH v2 21/28] KVM: arm64: Introduce framework to trap disabled features
` [RFC PATCH v2 22/28] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
` [RFC PATCH v2 23/28] KVM: arm64: Trap disabled features of ID_AA64PFR1_EL1
` [RFC PATCH v2 24/28] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
` [RFC PATCH v2 25/28] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
` [RFC PATCH v2 26/28] KVM: arm64: Trap disabled features of ID_AA64ISAR1_EL1
` [RFC PATCH v2 27/28] KVM: arm64: Activate trapping of disabled CPU features for the guest
` [RFC PATCH v2 28/28] KVM: arm64: selftests: Introduce id_reg_test

[PATCH v5.5 00/30] KVM: Scalable memslots implementation
 2021-11-04 22:41 UTC  (33+ messages)
` [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
` [PATCH v5.5 02/30] KVM: Disallow user memslot with size that exceeds "unsigned long"
` [PATCH v5.5 03/30] KVM: Require total number of memslot pages to fit in an unsigned long
` [PATCH v5.5 04/30] KVM: Open code kvm_delete_memslot() into its only caller
` [PATCH v5.5 05/30] KVM: Resync only arch fields when slots_arch_lock gets reacquired
` [PATCH v5.5 06/30] KVM: Use "new" memslot's address space ID instead of dedicated param
` [PATCH v5.5 07/30] KVM: Let/force architectures to deal with arch specific memslot data
` [PATCH v5.5 08/30] KVM: arm64: Use "new" memslot instead of userspace memory region
` [PATCH v5.5 09/30] KVM: MIPS: Drop pr_debug from memslot commit to avoid using "mem"
` [PATCH v5.5 10/30] KVM: PPC: Avoid referencing userspace memory region in memslot updates
` [PATCH v5.5 11/30] KVM: s390: Use "new" memslot instead of userspace memory region
` [PATCH v5.5 12/30] KVM: x86: "
` [PATCH v5.5 13/30] KVM: RISC-V: "
` [PATCH v5.5 14/30] KVM: Stop passing kvm_userspace_memory_region to arch memslot hooks
` [PATCH v5.5 15/30] KVM: Use prepare/commit hooks to handle generic memslot metadata updates
` [PATCH v5.5 16/30] KVM: x86: Don't assume old/new memslots are non-NULL at memslot commit
` [PATCH v5.5 17/30] KVM: s390: Skip gfn/size sanity checks on memslot DELETE or FLAGS_ONLY
` [PATCH v5.5 18/30] KVM: Don't make a full copy of the old memslot in __kvm_set_memory_region()
` [PATCH v5.5 19/30] KVM: x86: Don't call kvm_mmu_change_mmu_pages() if the count hasn't changed
` [PATCH v5.5 20/30] KVM: x86: Use nr_memslot_pages to avoid traversing the memslots array
` [PATCH v5.5 21/30] KVM: Integrate gfn_to_memslot_approx() into search_memslots()
` [PATCH v5.5 22/30] KVM: Move WARN on invalid memslot index to update_memslots()
` [PATCH v5.5 23/30] KVM: Resolve memslot ID via a hash table instead of via a static array
` [PATCH v5.5 24/30] KVM: Use interval tree to do fast hva lookup in memslots
` [PATCH v5.5 25/30] KVM: s390: Introduce kvm_s390_get_gfn_end()
` [PATCH v5.5 26/30] KVM: Keep memslots in tree-based structures instead of array-based ones
` [PATCH v5.5 27/30] KVM: Optimize gfn lookup in kvm_zap_gfn_range()
` [PATCH v5.5 28/30] KVM: Optimize overlapping memslots check
` [PATCH v5.5 29/30] KVM: Wait 'til the bitter end to initialize the "new" memslot
` [PATCH v5.5 30/30] KVM: Dynamically allocate "new" memslots from the get-go

[PATCH v2 0/6] KVM: arm64: Emulate the OS lock
 2021-11-05  5:36 UTC  (22+ messages)
` [PATCH v2 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
` [PATCH v2 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
` [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
` [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
` [PATCH v2 5/6] selftests: KVM: Add OSLSR_EL1 to the list of blessed regs
` [PATCH v2 6/6] selftests: KVM: Test OS lock behavior

[PATCH v3 00/16] perf: KVM: Fix, optimize, and clean up callbacks
 2021-11-04 14:18 UTC  (4+ messages)
` [PATCH v3 01/16] perf: Ensure perf_guest_cbs aren't reloaded between !NULL check and deref

[RFC PATCH v3 0/5] x86/kvm: Virtual suspend time injection support
 2021-11-04  9:10 UTC  (3+ messages)

[PATCH v2 00/43] KVM: Halt-polling and x86 APICv overhaul
 2021-11-01 17:41 UTC  (77+ messages)
` [PATCH v2 12/43] KVM: x86: Tweak halt emulation helper names to free up kvm_vcpu_halt()
` [PATCH v2 16/43] KVM: Don't redo ktime_get() when calculating halt-polling stop/deadline
` [PATCH v2 17/43] KVM: x86: Directly block (instead of "halting") UNINITIALIZED vCPUs
` [PATCH v2 18/43] KVM: x86: Invoke kvm_vcpu_block() directly for non-HALTED wait states
` [PATCH v2 19/43] KVM: Add helpers to wake/query blocking vCPU
` [PATCH v2 20/43] KVM: VMX: Skip Posted Interrupt updates if APICv is hard disabled
` [PATCH v2 21/43] KVM: VMX: Clean up PI pre/post-block WARNs
` [PATCH v2 22/43] KVM: VMX: Drop unnecessary PI logic to handle impossible conditions
` [PATCH v2 23/43] KVM: VMX: Use boolean returns for Posted Interrupt "test" helpers
` [PATCH v2 24/43] KVM: VMX: Drop pointless PI.NDST update when blocking
` [PATCH v2 25/43] KVM: VMX: Save/restore IRQs (instead of CLI/STI) during PI pre/post block
` [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
` [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
` [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
` [PATCH v2 29/43] KVM: VMX: Handle PI wakeup shenanigans during vcpu_put/load
` [PATCH v2 30/43] KVM: Drop unused kvm_vcpu.pre_pcpu field
` [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
` [PATCH v2 32/43] KVM: VMX: Move preemption timer <=> hrtimer dance to common x86
` [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv, sw}_timer() helpers
  ` [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv,sw}_timer() helpers
` [PATCH v2 34/43] KVM: x86: Remove defunct pre_block/post_block kvm_x86_ops hooks
` [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
` [PATCH v2 36/43] KVM: SVM: Don't bother checking for "running" AVIC when kicking for IPIs
` [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv)
` [PATCH v2 38/43] KVM: Drop defunct kvm_arch_vcpu_(un)blocking() hooks
` [PATCH v2 39/43] KVM: VMX: Don't do full kick when triggering posted interrupt "fails"
` [PATCH v2 40/43] KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU
` [PATCH v2 41/43] KVM: VMX: Pass desired vector instead of bool for triggering posted IRQ
` [PATCH v2 42/43] KVM: VMX: Fold fallback path into triggering posted IRQ helper
` [PATCH v2 43/43] KVM: VMX: Don't do full kick when handling posted interrupt wakeup

[PATCH 0/3] KVM: arm64: Fixes for the exposed debug architecture
 2021-11-01 10:21 UTC  (9+ messages)
` [PATCH 1/3] KVM: arm64: Stash OSLSR_EL1 in the cpu context
` [PATCH 2/3] KVM: arm64: Allow the guest to change the OS Lock status
` [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2

[GIT PULL] KVM/arm64 updates for 5.16
 2021-10-31  6:30 UTC  (2+ messages)

[PATCH v2 0/5] KVM: arm64: Rework FPSIMD/SVE tracking
 2021-10-28 13:14 UTC  (8+ messages)
` [PATCH v2 1/5] KVM: arm64: Reorder vcpu flag definitions
` [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving
` [PATCH v2 3/5] KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE
` [PATCH v2 4/5] KVM: arm64: Stop mapping current thread_info at EL2
` [PATCH v2 5/5] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM

[PATCH] KVM: arm64: Remove unused TRNG_NO_ENTROPY
 2021-10-27 15:17 UTC  (3+ messages)

[PATCH] KVM: arm64: Avoid shadowing a previous local
 2021-10-27 15:13 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).