kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-10-12 00:21:53 to 2021-10-13 11:01:22 UTC [more...]

[PATCH RFC] virtio: wrap config->reset calls
 2021-10-13 11:00 UTC  (2+ messages)

[PATCH RFC 00/15] virtio-mem: Expose device memory via separate memslots
 2021-10-13 10:33 UTC  (16+ messages)
` [PATCH RFC 01/15] memory: Drop mapping check from memory_region_get_ram_discard_manager()
` [PATCH RFC 02/15] kvm: Return number of free memslots
` [PATCH RFC 03/15] vhost: "
` [PATCH RFC 04/15] memory: Allow for marking memory region aliases unmergeable
` [PATCH RFC 05/15] vhost: Don't merge unmergeable memory sections
` [PATCH RFC 06/15] memory-device: Move memory_device_check_addable() directly into memory_device_pre_plug()
` [PATCH RFC 07/15] memory-device: Generalize memory_device_used_region_size()
` [PATCH RFC 08/15] memory-device: Support memory devices that consume a variable number of memslots
` [PATCH RFC 09/15] vhost: Respect reserved memslots for memory devices when realizing a vhost device
` [PATCH RFC 10/15] virtio-mem: Set the RamDiscardManager for the RAM memory region earlier
` [PATCH RFC 11/15] virtio-mem: Fix typo in virito_mem_intersect_memory_section() function name
` [PATCH RFC 12/15] virtio-mem: Expose device memory via separate memslots
` [PATCH RFC 13/15] vhost-user: Increase VHOST_USER_MAX_RAM_SLOTS to 496 with CONFIG_VIRTIO_MEM
` [PATCH RFC 14/15] libvhost-user: Increase VHOST_USER_MAX_RAM_SLOTS to 4096
` [PATCH RFC 15/15] virtio-mem: Set "max-memslots" to 0 (auto) for the 6.2 machine

[kvm-unit-tests PATCH 0/2] s390x: Cleanup and maintenance 3
 2021-10-13 10:38 UTC  (6+ messages)
` [kvm-unit-tests PATCH 1/2] lib: s390x: Fix PSW constant
` [kvm-unit-tests PATCH 2/2] lib: s390x: snippet.h: Add a few constants that will make our life easier

[patch 00/31] x86/fpu: Preparatory cleanups for AMX support (part 1)
 2021-10-13 10:25 UTC  (38+ messages)
` [patch 04/31] x86/fpu: Restrict xsaves()/xrstors() to independent states
` [patch 09/31] x86/fpu: Do not inherit FPU context for CLONE_THREAD
` [patch 11/31] x86/fpu/xstate: Provide and use for_each_xfeature()
` [patch 13/31] x86/fpu: Move KVMs FPU swapping to FPU core
` [patch 14/31] x86/fpu: Replace KVMs homebrewn FPU copy from user
` [patch 15/31] x86/fpu: Rework copy_xstate_to_uabi_buf()
` [patch 16/31] x86/fpu: Replace KVMs homebrewn FPU copy to user
      ` [patch V2 16/31] x86/fpu: Replace KVMs home brewed "
` [patch 24/31] x86/fpu: Move fpregs_restore_userregs() to core
` [patch 26/31] x86/fpu: Move fpstate functions to api.h
` [patch 28/31] x86/sev: Include fpu/xcr.h

[PATCH][v2] KVM: x86: directly call wbinvd for local cpu when emulate wbinvd
 2021-10-13  9:42 UTC 

[kvm-unit-tests PATCH] s390x/snippets: Define all things that are needed to link the libc
 2021-10-13  9:51 UTC  (2+ messages)

[PATCH V1 mlx5-next 00/13] Add mlx5 live migration driver
 2021-10-13  9:47 UTC  (14+ messages)
` [PATCH V1 mlx5-next 01/13] PCI/IOV: Provide internal VF index
` [PATCH V1 mlx5-next 02/13] net/mlx5: Reuse exported virtfn index function call
` [PATCH V1 mlx5-next 03/13] net/mlx5: Disable SRIOV before PF removal
` [PATCH V1 mlx5-next 04/13] PCI/IOV: Allow SRIOV VF drivers to reach the drvdata of a PF
` [PATCH V1 mlx5-next 05/13] net/mlx5: Expose APIs to get/put the mlx5 core device
` [PATCH V1 mlx5-next 06/13] vdpa/mlx5: Use mlx5_vf_get_core_dev() to get PF device
` [PATCH V1 mlx5-next 07/13] vfio: Add 'invalid' state definitions
` [PATCH V1 mlx5-next 08/13] vfio/pci_core: Make the region->release() function optional
` [PATCH V1 mlx5-next 09/13] net/mlx5: Introduce migration bits and structures
` [PATCH V1 mlx5-next 10/13] vfio/mlx5: Expose migration commands over mlx5 device
` [PATCH V1 mlx5-next 11/13] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
` [PATCH V1 mlx5-next 12/13] vfio/pci: Add infrastructure to let vfio_pci_core drivers trap device RESET
` [PATCH V1 mlx5-next 13/13] vfio/mlx5: Trap device RESET and update state accordingly

[PATCH 0/3] KVM: qemu patches for few KVM features I developed
 2021-10-13  9:32 UTC  (2+ messages)

[PATCH v6 0/4] KVM: x86: Convey the exit reason, etc. to user-space on emulation failure
 2021-10-13  9:29 UTC  (4+ messages)
` [PATCH v6 1/4] KVM: x86: Clarify the kvm_run.emulation_failure structure layout

[PATCH v2 0/2] x86: sgx_vepc: implement ioctl to EREMOVE all pages
 2021-10-13  7:38 UTC  (10+ messages)
` [PATCH v2 1/2] x86: sgx_vepc: extract sgx_vepc_remove_page
` [PATCH v2 2/2] x86: sgx_vepc: implement SGX_IOC_VEPC_REMOVE ioctl

[RFC 00/20] Introduce /dev/iommu for userspace I/O address space management
 2021-10-13  7:14 UTC  (13+ messages)
` [RFC 11/20] iommu/iommufd: Add IOMMU_IOASID_ALLOC/FREE

[RFC PATCH v1 0/6] Improvements to SIGP handling [KVM]
 2021-10-13  5:54 UTC  (12+ messages)
` [RFC PATCH v1 1/6] KVM: s390: Simplify SIGP Set Arch handling
` [RFC PATCH v1 3/6] KVM: s390: Simplify SIGP Restart
` [RFC PATCH v1 6/6] KVM: s390: Add a routine for setting userspace CPU state

[PATCH] KVM: MMU: make PTE_PREFETCH_NUM tunable
 2021-10-13  5:52 UTC  (3+ messages)

[PATCH v8 0/8] KVM: arm64: Add idempotent controls to migrate guest counter
 2021-10-13  5:10 UTC  (3+ messages)
` [PATCH v8 5/8] arm64: cpufeature: Enumerate support for FEAT_ECV >= 0x2

[PATCH v2 00/11] KVM: arm64: Implement PSCI SYSTEM_SUSPEND support
 2021-10-13  4:48 UTC  (8+ messages)
` [PATCH v2 03/11] KVM: arm64: Encapsulate reset request logic in a helper function

[PATCH v4 0/4] KVM: allow mapping non-refcounted pages
 2021-10-13  3:29 UTC  (4+ messages)
` [PATCH v4 4/4] KVM: mmu: remove over-aggressive warnings

[RFC 00/16] KVM: selftests: Add tests for SEV, SEV-ES, and SEV-SNP guests
 2021-10-13  2:20 UTC  (9+ messages)
` [RFC 02/16] KVM: selftests: add hooks for managing encrypted guest memory
` [RFC 04/16] KVM: selftests: set CPUID before setting sregs in vcpu creation
` [RFC 06/16] KVM: selftests: add library for creating/interacting with SEV guests

[PATCH 0/5] Update vfio_group to use the modern cdev lifecycle
 2021-10-13  1:07 UTC  (15+ messages)
` [PATCH 1/5] vfio: Delete vfio_get/put_group from vfio_iommu_group_notifier()
` [PATCH 2/5] vfio: Do not open code the group list search in vfio_create_group()
` [PATCH 4/5] vfio: Use a refcount_t instead of a kref in the vfio_group
` [PATCH 5/5] vfio: Use cdev_device_add() instead of device_create()

[PATCH 0/2] KVM: x86: Revert to fix apic_hw_disabled underflow
 2021-10-13  0:35 UTC  (3+ messages)
` [PATCH 1/2] Revert "KVM: x86: Open code necessary bits of kvm_lapic_set_base() at vCPU RESET"
` [PATCH 2/2] KVM: x86: WARN if APIC HW/SW disable static keys are non-zero on unload

[PATCH Part2 v5 00/45] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2021-10-13  0:23 UTC  (11+ messages)
` [PATCH Part2 v5 20/45] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
` [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH Part2 v5 26/45] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
` [PATCH Part2 v5 37/45] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH Part2 v5 39/45] KVM: SVM: Introduce ops for the post gfn map and unmap

[PATCH] KVM: selftests: Rename vm_open() to __vm_create()
 2021-10-13  0:08 UTC  (4+ messages)

[PATCH v7] vfio/pci: Add OpRegion 2.0+ Extended VBT support
 2021-10-12 23:10 UTC  (4+ messages)
` [PATCH v8] "

[PROBLEM] Frequently get "irq 31: nobody cared" when passing through 2x GPUs that share same pci switch via vfio
 2021-10-12 22:35 UTC  (8+ messages)

[PATCH V3] KVM: SEV: Acquire vcpu mutex when updating VMSA
 2021-10-12 21:24 UTC 

[PATCH 0/5 V10] Add AMD SEV and SEV-ES intra host migration support
 2021-10-12 20:48 UTC  (6+ messages)
` [PATCH 1/5 V10] KVM: SEV: Refactor out sev_es_state struct
` [PATCH 2/5 V10] KVM: SEV: Add support for SEV intra host migration
` [PATCH 3/5 V10] KVM: SEV: Add support for SEV-ES "
` [PATCH 4/5 V10] selftest: KVM: Add open sev dev helper
` [PATCH 5/5 V10] selftest: KVM: Add intra host migration tests

[PATCH v3 0/5] Add SBI v0.2 support for KVM
 2021-10-12 16:46 UTC  (7+ messages)
` [PATCH v3 5/5] RISC-V: Add SBI HSM extension in KVM

[PATCH v2 0/5] KVM: arm64: Assorted vgic-v3 fixes
 2021-10-12 16:05 UTC  (3+ messages)
` [PATCH v2 3/5] KVM: arm64: vgic-v3: Reduce common group trapping to ICV_DIR_EL1 when possible

[PATCH] x86/hyperv: Protect set_hv_tscchange_cb() against getting preempted
 2021-10-12 15:50 UTC 

[PATCH kvmtool 00/10] Run kvm-unit-tests with --kernel
 2021-10-12 14:24 UTC  (5+ messages)
` [PATCH kvmtool 08/10] Add --nocompat option to disable compat warnings

[PATCH] KVM: arm64: Fix reporting of endianess when the access originates at EL0
 2021-10-12 14:20 UTC  (3+ messages)

[PATCH] iommu: intel: remove flooding of non-error logs, when new-DMA-PTE is the same as old-DMA-PTE
 2021-10-12 14:02 UTC  (10+ messages)

[PATCH v2 kvmtool 0/7] vfio/pci: Fix MSIX table and PBA size allocation
 2021-10-12 13:52 UTC  (10+ messages)
` [PATCH v2 kvmtool 1/7] arm/gicv2m: Set errno when gicv2_update_routing() fails
` [PATCH v2 kvmtool 2/7] vfio/pci.c: Remove double include for assert.h
` [PATCH v2 kvmtool 3/7] pci: Fix pci_dev_* print macros
` [PATCH v2 kvmtool 4/7] vfio/pci: Rename PBA offset in device descriptor to fd_offset
` [PATCH v2 kvmtool 5/7] vfio/pci: Rework MSIX table and PBA physical size allocation
` [PATCH v2 kvmtool 6/7] vfio/pci: Print an error when offset is outside of the MSIX table or PBA
` [PATCH v2 kvmtool 7/7] vfio/pci: Align MSIX Table and PBA size to guest maximum page size

[PATCH v5 00/14] KVM: s390: pv: implement lazy destroy for reboot
 2021-10-12 12:31 UTC  (13+ messages)
` [PATCH v5 04/14] KVM: s390: pv: avoid stalls when making pages secure
` [PATCH v5 05/14] KVM: s390: pv: leak the topmost page table when destroy fails
` [PATCH v5 06/14] KVM: s390: pv: properly handle page flags for protected guests
` [PATCH v5 08/14] KVM: s390: pv: handle secure storage exceptions for normal guests

[PATCH v1 kvmtool 0/7] vfio/pci: Fix MSIX table and PBA size allocation
 2021-10-12 10:50 UTC  (3+ messages)

[PATCH 0/2] KVM: x86: Fix and cleanup for recent AVIC changes
 2021-10-12  9:53 UTC  (5+ messages)

[PATCH] KVM: x86: directly call wbinvd for local cpu when emulate wbinvd
 2021-10-12  8:48 UTC  (3+ messages)
  ` 答复: "

[PATCH 00/14] nSVM fixes and optional features
 2021-10-12  7:51 UTC  (6+ messages)
` [PATCH 07/14] KVM: x86: SVM: add warning for CVE-2021-3656

[PATCH kvm-unit-tests] arm64: gic-v3: Avoid NULL dereferences
 2021-10-12  6:53 UTC  (2+ messages)

[PATCH v4 00/23] target/i386/sev: Housekeeping SEV + measured Linux SEV guest
 2021-10-12  6:15 UTC  (4+ messages)
` [PATCH v4 12/23] target/i386/sev: Use g_autofree in sev_launch_get_measure()

MMIO/PIO dispatch file descriptors (ioregionfd) design discussion
 2021-10-12  5:34 UTC  (2+ messages)

[RFC PATCH 00/25] KVM: arm64: Make CPU ID registers writable by userspace
 2021-10-12  4:35 UTC  (26+ messages)
` [RFC PATCH 01/25] KVM: arm64: Add has_reset_once flag for vcpu
` [RFC PATCH 02/25] KVM: arm64: Save ID registers' sanitized value per vCPU
` [RFC PATCH 03/25] KVM: arm64: Introduce a validation function for an ID register
` [RFC PATCH 04/25] KVM: arm64: Introduce struct id_reg_info
` [RFC PATCH 05/25] KVM: arm64: Keep consistency of ID registers between vCPUs
` [RFC PATCH 06/25] KVM: arm64: Make ID_AA64PFR0_EL1 writable
` [RFC PATCH 07/25] KVM: arm64: Make ID_AA64PFR1_EL1 writable
` [RFC PATCH 08/25] KVM: arm64: Make ID_AA64ISAR0_EL1 writable
` [RFC PATCH 09/25] KVM: arm64: Make ID_AA64ISAR1_EL1 writable
` [RFC PATCH 10/25] KVM: arm64: Make ID_AA64DFR0_EL1 writable
` [RFC PATCH 11/25] KVM: arm64: Make ID_DFR0_EL1 writable
` [RFC PATCH 12/25] KVM: arm64: Make MVFR1_EL1 writable
` [RFC PATCH 13/25] KVM: arm64: Make ID registers without id_reg_info writable
` [RFC PATCH 14/25] KVM: arm64: Add consistency checking for frac fields of ID registers
` [RFC PATCH 15/25] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
` [RFC PATCH 16/25] KVM: arm64: Use vcpu->arch cptr_el2 to track value of cptr_el2 for VHE
` [RFC PATCH 17/25] KVM: arm64: Use vcpu->arch.mdcr_el2 to track value of mdcr_el2
` [RFC PATCH 18/25] KVM: arm64: Introduce framework to trap disabled features
` [RFC PATCH 19/25] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
` [RFC PATCH 20/25] KVM: arm64: Trap disabled features of ID_AA64PFR1_EL1
` [RFC PATCH 21/25] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
` [RFC PATCH 22/25] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
` [RFC PATCH 23/25] KVM: arm64: Trap disabled features of ID_AA64ISAR1_EL1
` [RFC PATCH 24/25] KVM: arm64: Activate trapping of disabled CPU features for the guest
` [RFC PATCH 25/25] KVM: arm64: selftests: Introduce id_reg_test


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).