kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-04-05 08:34:21 to 2023-04-05 22:06:31 UTC [more...]

[PATCH 0/2] target/arm: KVM Aarch32 spring cleaning
 2023-04-05 22:06 UTC  (4+ messages)
` [PATCH 1/2] target/arm: Remove KVM AArch32 CPU definitions
` [PATCH 2/2] hw/arm/virt: Restrict Cortex-A7 check to TCG

[RFC PATCH v3 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted
 2023-04-05 21:58 UTC  (2+ messages)

[PATCH v3 0/6] Expose GPU memory as coherently CPU accessible
 2023-04-05 21:50 UTC  (11+ messages)
` [PATCH v3 1/6] kvm: determine memory type from VMA
` [PATCH v3 2/6] vfio/nvgpu: expose GPU device memory as BAR1
` [PATCH v3 3/6] mm: handle poisoning of pfn without struct pages
` [PATCH v3 4/6] mm: Add poison error check in fixup_user_fault() for mapped PFN
` [PATCH v3 5/6] mm: Change ghes code to allow poison of non-struct PFN
` [PATCH v3 6/6] vfio/nvgpu: register device memory for poison handling

[RFC PATCH 0/6] Improve VM DVFS and task placement behavior
 2023-04-05 21:08 UTC  (9+ messages)

[kvm-unit-tests PATCH v4 0/2] nSVM: vNMI testcase
 2023-04-05 20:51 UTC  (3+ messages)
` [kvm-unit-tests PATCH v4 1/2] nSVM: Add helper to report fatal errors in guest
` [kvm-unit-tests PATCH v4 2/2] x86: nSVM: Add support for VNMI test

[kvm-unit-tests PATCHv2] x86: nSVM: Add support for VNMI test
 2023-04-05 20:45 UTC  (2+ messages)

[PATCH 00/10] accel/kvm: Spring cleaning
 2023-04-05 20:44 UTC  (14+ messages)
` [PATCH 01/10] sysemu/kvm: Remove unused headers
` [PATCH 02/10] accel/kvm: Declare kvm_direct_msi_allowed in stubs
` [PATCH 03/10] hw/intc/arm_gic: Un-inline GIC*/ITS class_name() helpers
` [PATCH 04/10] hw/intc/arm_gic: Rename 'first_cpu' argument
` [PATCH 05/10] hw/arm/sbsa-ref: Include missing 'sysemu/kvm.h' header
` [PATCH 06/10] target/arm: Reduce QMP header pressure by not including 'kvm_arm.h'
` [PATCH 07/10] target/arm: Restrict KVM-specific fields from ArchCPU
` [PATCH 08/10] target/ppc: Restrict KVM-specific field "
` [RFC PATCH 09/10] target/riscv: Restrict KVM-specific fields "
` [PATCH 10/10] hw/s390x: Rename pv.c -> pv-kvm.c

[WIP Patch v2 04/14] KVM: x86: Add KVM_CAP_X86_MEMORY_FAULT_EXIT and associated kvm_run field
 2023-04-05 20:21 UTC  (12+ messages)

[PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
 2023-04-05 20:07 UTC  (11+ messages)

[kvm-unit-tests PATCH v1 0/4] s390x: Add support for running guests without MSO/MSL
 2023-04-05 19:55 UTC  (3+ messages)
` [kvm-unit-tests PATCH v1 4/4] s390x: add a test for SIE "

[PATCH v3 00/12] Introduce new methods for verifying ownership in vfio PCI hot reset
 2023-04-05 19:49 UTC  (42+ messages)
` [PATCH v3 02/12] vfio/pci: Only check ownership of opened devices in "
` [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
` [PATCH v3 06/12] vfio: Refine vfio file kAPIs for vfio PCI hot reset
` [PATCH v3 08/12] vfio/pci: Renaming for accepting device fd in hot reset path
` [PATCH v3 09/12] vfio/pci: Accept device fd in VFIO_DEVICE_PCI_HOT_RESET ioctl
` [PATCH v3 10/12] vfio: Mark cdev usage in vfio_device
` [PATCH v3 11/12] iommufd: Define IOMMUFD_INVALID_ID in uapi
` [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO

[kvm-unit-tests PATCH v4 0/9] x86/access: CR0.WP=0/1 r/o tests
 2023-04-05 19:41 UTC  (8+ messages)
` [kvm-unit-tests PATCH v4 5/9] x86/access: Add forced emulation support
` [kvm-unit-tests PATCH v4 6/9] x86/access: Try forced emulation for CR0.WP test as well

[PATCH v13 000/113] KVM TDX basic feature support
 2023-04-05 19:06 UTC  (20+ messages)
` [PATCH v13 016/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
` [PATCH v13 020/113] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v13 024/113] KVM: TDX: allocate/free TDX vcpu structure

[PATCH v3 00/13] KVM: arm64: Userspace SMCCC call filtering
 2023-04-05 18:45 UTC  (6+ messages)
` [PATCH v3 08/13] KVM: arm64: Add support for KVM_EXIT_HYPERCALL

[PATCH] KVM: x86/mmu: Refresh CR0.WP prior to checking for emulated permission faults
 2023-04-05 18:31 UTC  (4+ messages)

The necessity of injecting a hardware exception reported in VMX IDT vectoring information
 2023-04-05 18:03 UTC  (3+ messages)

[PATCH v9 00/25] Add vfio_device cdev for iommufd support
 2023-04-05 17:58 UTC  (15+ messages)
` [PATCH v9 03/25] vfio: Remove vfio_file_is_group()
` [PATCH v9 04/25] vfio: Accept vfio device file in the KVM facing kAPI
` [PATCH v9 16/25] iommufd/device: Add iommufd_access_detach() API
` [PATCH v9 25/25] docs: vfio: Add vfio device cdev description

[PATCH v3 0/4] Enable writable for idregs DFR0,PFR0, MMFR{0,1,2}
 2023-04-05 17:21 UTC  (5+ messages)
` [PATCH v3 1/4] KVM: arm64: Enable writable for ID_AA64DFR0_EL1
` [PATCH v3 2/4] KVM: arm64: Enable writable for ID_DFR0_EL1
` [PATCH v3 3/4] KVM: arm64: Enable writable for ID_AA64PFR0_EL1
` [PATCH v3 4/4] KVM: arm64: Enable writable for ID_AA64MMFR{0, 1, 2}_EL1

[PATCH 3/3] Update linux headers to v6.3rc5
 2023-04-05 17:21 UTC 

[PATCH] KVM: SVM: Disable TDP MMU when running on Hyper-V
 2023-04-05 16:43 UTC  (3+ messages)

[RFC PATCH 0/2] accel/kvm: Extract 'sysemu/kvm_irq.h' from 'sysemu/kvm.h'
 2023-04-05 16:30 UTC  (3+ messages)
` [RFC PATCH 1/2] "
` [RFC PATCH 2/2] accel/kvm: Declare kvm_arch_irqchip_create() in 'sysemu/kvm_int.h'

[PATCH 0/2] accel/stubs: Build HAX/KVM/XEN stubs once
 2023-04-05 16:13 UTC  (3+ messages)
` [PATCH 1/2] accel/stubs: Remove kvm_flush_coalesced_mmio_buffer() stub
` [PATCH 2/2] accel/stubs: Build HAX/KVM/XEN stubs once

[GIT PULL] KVM/arm64 fixes for 6.3, part #3
 2023-04-05 16:12 UTC 

[PATCH v9 00/50] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
 2023-04-05 15:40 UTC  (51+ messages)
` [PATCH v9 01/50] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
` [PATCH v9 02/50] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
` [PATCH v9 03/50] KVM: arm64: nv: Handle SPSR_EL2 specially
` [PATCH v9 04/50] KVM: arm64: nv: Handle HCR_EL2.E2H specially
` [PATCH v9 05/50] KVM: arm64: nv: Save/Restore vEL2 sysregs
` [PATCH v9 06/50] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
` [PATCH v9 07/50] KVM: arm64: nv: Trap CPACR_EL1 access "
` [PATCH v9 08/50] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
` [PATCH v9 09/50] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP,FPEN} settings
` [PATCH v9 10/50] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
` [PATCH v9 11/50] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
` [PATCH v9 12/50] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
` [PATCH v9 13/50] KVM: arm64: nv: Forward debug traps to the nested guest
` [PATCH v9 14/50] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
` [PATCH v9 15/50] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
` [PATCH v9 16/50] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
` [PATCH v9 17/50] KVM: arm64: nv: Handle shadow stage 2 page faults
` [PATCH v9 18/50] KVM: arm64: nv: Restrict S2 RD/WR permissions to match the guest's
` [PATCH v9 19/50] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
` [PATCH v9 20/50] KVM: arm64: nv: Set a handler for the system instruction traps
` [PATCH v9 21/50] KVM: arm64: nv: Trap and emulate AT instructions from virtual EL2
` [PATCH v9 22/50] KVM: arm64: nv: Trap and emulate TLBI "
` [PATCH v9 23/50] KVM: arm64: nv: Fold guest's HCR_EL2 configuration into the host's
` [PATCH v9 24/50] KVM: arm64: nv: Hide RAS from nested guests
` [PATCH v9 25/50] KVM: arm64: nv: Add handling of EL2-specific timer registers
` [PATCH v9 26/50] KVM: arm64: nv: Forward timer traps to nested EL2
` [PATCH v9 27/50] KVM: arm64: nv: Load timer before the GIC
` [PATCH v9 28/50] KVM: arm64: nv: Nested GICv3 Support
` [PATCH v9 29/50] KVM: arm64: nv: Don't load the GICv4 context on entering a nested guest
` [PATCH v9 30/50] KVM: arm64: nv: vgic: Emulate the HW bit in software
` [PATCH v9 31/50] KVM: arm64: nv: vgic: Allow userland to set VGIC maintenance IRQ
` [PATCH v9 32/50] KVM: arm64: nv: Implement maintenance interrupt forwarding
` [PATCH v9 33/50] KVM: arm64: nv: Deal with broken VGIC on maintenance interrupt delivery
` [PATCH v9 34/50] KVM: arm64: nv: Allow userspace to request KVM_ARM_VCPU_NESTED_VIRT
` [PATCH v9 35/50] KVM: arm64: nv: Add handling of FEAT_TTL TLB invalidation
` [PATCH v9 36/50] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
` [PATCH v9 37/50] KVM: arm64: nv: Tag shadow S2 entries with nested level
` [PATCH v9 38/50] KVM: arm64: nv: Add include containing the VNCR_EL2 offsets
` [PATCH v9 39/50] KVM: arm64: nv: Map VNCR-capable registers to a separate page
` [PATCH v9 40/50] KVM: arm64: nv: Move nested vgic state into the sysreg file
` [PATCH v9 41/50] KVM: arm64: Add FEAT_NV2 cpu feature
` [PATCH v9 42/50] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
` [PATCH v9 43/50] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
` [PATCH v9 44/50] KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state
` [PATCH v9 45/50] KVM: arm64: nv: Allocate VNCR page when required
` [PATCH v9 46/50] KVM: arm64: nv: Enable ARMv8.4-NV support
` [PATCH v9 47/50] KVM: arm64: nv: Fast-track 'InHost' exception returns
` [PATCH v9 48/50] KVM: arm64: nv: Fast-track EL1 TLBIs for VHE guests
` [PATCH v9 49/50] KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers
` [PATCH v9 50/50] KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV is on

[PATCH] target/arm: Initialize debug capabilities only once
 2023-04-05 15:36 UTC 

[PATCH] vfio/cdx: add support for CDX bus
 2023-04-05 15:33 UTC  (2+ messages)

[PATCH RFC v8 00/56] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-04-05 15:20 UTC  (5+ messages)
` [PATCH RFC v8 47/56] KVM: SVM: Support SEV-SNP AP Creation NAE event

[PATCH 00/14] accel: Share CPUState accel context (HAX/NVMM/WHPX/HVF)
 2023-04-05 15:18 UTC  (17+ messages)
` [PATCH 01/14] accel: Document generic accelerator headers
` [PATCH 02/14] accel: Remove unused hThread variable on TCG/WHPX
` [PATCH 03/14] accel: Fix a leak on Windows HAX
` [PATCH 04/14] accel: Destroy HAX vCPU threads once done
` [PATCH 05/14] accel: Rename 'hax_vcpu' as 'accel' in CPUState
` [PATCH 06/14] accel: Use a typedef for struct hax_vcpu_state
` [PATCH 07/14] accel: Rename struct hax_vcpu_state -> struct AccelvCPUState
` [PATCH 08/14] accel: Move HAX hThread to accelerator context
` [PATCH 09/14] accel: Allocate NVMM vCPU using g_try_FOO()
` [PATCH 10/14] accel: Rename NVMM struct qemu_vcpu -> struct AccelvCPUState
` [PATCH 11/14] accel: Inline NVMM get_qemu_vcpu()
` [PATCH 12/14] accel: Rename WHPX struct whpx_vcpu -> struct AccelvCPUState
` [PATCH 13/14] accel: Inline WHPX get_whpx_vcpu()
` [PATCH 14/14] accel: Rename HVF struct hvf_vcpu_state -> struct AccelvCPUState

[PATCH 0/2] KVM: x86: More cleanups for Hyper-V range flushing
 2023-04-05 14:48 UTC  (2+ messages)

[RESEND PATCH] kvm/selftests: Close opened file descriptor in stable_tsc_check_supported()
 2023-04-05 14:46 UTC  (2+ messages)

[kvm-unit-tests PATCH v1] s390x: Improve stack traces that contain an interrupt frame
 2023-04-05 12:35 UTC 

[PATCH 0/3] KVM: x86: SGX vs. XCR0 cleanups
 2023-04-05 10:52 UTC  (4+ messages)
` [PATCH 1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE

[PATCH] target/arm: Check if debug is already initialized
 2023-04-05 10:03 UTC  (2+ messages)

[PATCH v3 0/8] RISC-V KVM virtualize AIA CSRs
 2023-04-05  9:28 UTC  (8+ messages)
` [PATCH v3 6/8] RISC-V: KVM: Add ONE_REG interface for "

[kvm-unit-tests GIT PULL v3 00/14] s390x: new maintainer, refactor linker scripts, tests for misalignments, execute-type instructions and vSIE epdx
 2023-04-05  9:06 UTC  (16+ messages)
` [kvm-unit-tests GIT PULL v3 01/14] .gitignore: ignore `s390x/comm.key` file
` [kvm-unit-tests GIT PULL v3 02/14] s390x/Makefile: simplify `%.hdr` target rules
` [kvm-unit-tests GIT PULL v3 03/14] s390x/Makefile: fix `*.gbin` target dependencies
` [kvm-unit-tests GIT PULL v3 04/14] s390x/Makefile: refactor CPPFLAGS
` [kvm-unit-tests GIT PULL v3 05/14] s390x: use preprocessor for linker script generation
` [kvm-unit-tests GIT PULL v3 06/14] s390x: define a macro for the stack frame size
` [kvm-unit-tests GIT PULL v3 07/14] lib/linux/const.h: test for `__ASSEMBLER__` as well
` [kvm-unit-tests GIT PULL v3 08/14] s390x/spec_ex: Use PSW macro
` [kvm-unit-tests GIT PULL v3 09/14] s390x/spec_ex: Add test introducing odd address into PSW
` [kvm-unit-tests GIT PULL v3 10/14] s390x/spec_ex: Add test of EXECUTE with odd target address
` [kvm-unit-tests GIT PULL v3 11/14] s390x: Add tests for execute-type instructions
` [kvm-unit-tests GIT PULL v3 12/14] s390x: spec_ex: Add test for misaligned load
` [kvm-unit-tests GIT PULL v3 13/14] MAINTAINERS: Add Nico as s390x Maintainer and make Thomas reviewer
` [kvm-unit-tests GIT PULL v3 14/14] s390x: sie: Test whether the epoch extension field is working as expected


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).