kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-07-30 21:12:27 to 2024-08-01 09:01:44 UTC [more...]

[RFC PATCH v2 00/10] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
 2024-08-01  9:01 UTC  (10+ messages)
` [RFC PATCH v2 01/10] KVM: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
` [RFC PATCH v2 02/10] KVM: Add restricted support for mapping guestmem by the host
` [RFC PATCH v2 03/10] KVM: Implement kvm_(read|/write)_guest_page for private memory slots
` [RFC PATCH v2 04/10] KVM: Add KVM capability to check if guest_memfd can be mapped by the host
` [RFC PATCH v2 05/10] KVM: selftests: guest_memfd mmap() test when mapping is allowed
` [RFC PATCH v2 06/10] KVM: arm64: Skip VMA checks for slots without userspace address
` [RFC PATCH v2 07/10] KVM: arm64: Do not allow changes to private memory slots
` [RFC PATCH v2 08/10] KVM: arm64: Handle guest_memfd()-backed guest page faults
` [RFC PATCH v2 09/10] KVM: arm64: arm64 has private memory support when config is enabled

[PATCH] clockevents/drivers/i8253: Do not zero timer counter in shutdown
 2024-08-01  9:00 UTC 

[PATCH v12 00/84] KVM: Stop grabbing references to PFNMAP'd pages
 2024-08-01  8:57 UTC  (32+ messages)
` [PATCH v12 01/84] KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
` [PATCH v12 02/84] KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging
` [PATCH v12 03/84] KVM: Drop KVM_ERR_PTR_BAD_PAGE and instead return NULL to indicate an error
` [PATCH v12 34/84] KVM: Add a helper to lookup a pfn without grabbing a reference
` [PATCH v12 45/84] KVM: guest_memfd: Provide "struct page" as output from kvm_gmem_get_pfn()
` [PATCH v12 48/84] KVM: Move x86's API to release a faultin page to common KVM
` [PATCH v12 56/84] KVM: RISC-V: Mark "struct page" pfns dirty iff a stage-2 PTE is installed
` [PATCH v12 57/84] KVM: RISC-V: Mark "struct page" pfns accessed before dropping mmu_lock
` [PATCH v12 58/84] KVM: RISC-V: Use kvm_faultin_pfn() when mapping pfns into the guest
` [PATCH v12 84/84] KVM: Don't grab reference on VM_MIXEDMAP pfns that have a "struct page"

[PATCH v3 00/10] selftests: kvm: s390: Add s390x ucontrol selftests
 2024-08-01  8:44 UTC  (6+ messages)
` [PATCH v3 05/10] selftests: kvm: s390: Add debug print functions
` [PATCH v3 06/10] selftests: kvm: s390: Add VM run test case

[PATCH v2 0/4] vfio-pci support pasid attach/detach
 2024-08-01  7:45 UTC  (16+ messages)

[RFC PATCH 0/6] Enable shared device assignment
 2024-08-01  7:32 UTC  (11+ messages)

[RFC PATCH v3 00/58] Mediated Passthrough vPMU 3.0 for x86
 2024-08-01  4:59 UTC  (59+ messages)
` [RFC PATCH v3 01/58] sched/core: Move preempt_model_*() helpers from sched.h to preempt.h
` [RFC PATCH v3 02/58] sched/core: Drop spinlocks on contention iff kernel is preemptible
` [RFC PATCH v3 03/58] perf/x86: Do not set bit width for unavailable counters
` [RFC PATCH v3 04/58] x86/msr: Define PerfCntrGlobalStatusSet register
` [RFC PATCH v3 05/58] x86/msr: Introduce MSR_CORE_PERF_GLOBAL_STATUS_SET
` [RFC PATCH v3 06/58] perf: Support get/put passthrough PMU interfaces
` [RFC PATCH v3 07/58] perf: Skip pmu_ctx based on event_type
` [RFC PATCH v3 08/58] perf: Clean up perf ctx time
` [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
` [RFC PATCH v3 10/58] perf: Add generic exclude_guest support
` [RFC PATCH v3 11/58] x86/irq: Factor out common code for installing kvm irq handler
` [RFC PATCH v3 12/58] perf: core/x86: Register a new vector for KVM GUEST PMI
` [RFC PATCH v3 13/58] KVM: x86/pmu: Register KVM_GUEST_PMI_VECTOR handler
` [RFC PATCH v3 14/58] perf: Add switch_interrupt() interface
` [RFC PATCH v3 15/58] perf/x86: Support switch_interrupt interface
` [RFC PATCH v3 16/58] perf/x86: Forbid PMI handler when guest own PMU
` [RFC PATCH v3 17/58] perf: core/x86: Plumb passthrough PMU capability from x86_pmu to x86_pmu_cap
` [RFC PATCH v3 18/58] KVM: x86/pmu: Introduce enable_passthrough_pmu module parameter
` [RFC PATCH v3 19/58] KVM: x86/pmu: Plumb through pass-through PMU to vcpu for Intel CPUs
` [RFC PATCH v3 20/58] KVM: x86/pmu: Always set global enable bits in passthrough mode
` [RFC PATCH v3 21/58] KVM: x86/pmu: Add a helper to check if passthrough PMU is enabled
` [RFC PATCH v3 22/58] KVM: x86/pmu: Add host_perf_cap and initialize it in kvm_x86_vendor_init()
` [RFC PATCH v3 23/58] KVM: x86/pmu: Allow RDPMC pass through when all counters exposed to guest
` [RFC PATCH v3 24/58] KVM: x86/pmu: Introduce macro PMU_CAP_PERF_METRICS
` [RFC PATCH v3 25/58] KVM: x86/pmu: Introduce PMU operator to check if rdpmc passthrough allowed
` [RFC PATCH v3 26/58] KVM: x86/pmu: Manage MSR interception for IA32_PERF_GLOBAL_CTRL
` [RFC PATCH v3 27/58] KVM: x86/pmu: Create a function prototype to disable MSR interception
` [RFC PATCH v3 28/58] KVM: x86/pmu: Add intel_passthrough_pmu_msrs() to pass-through PMU MSRs
` [RFC PATCH v3 29/58] KVM: x86/pmu: Avoid legacy vPMU code when accessing global_ctrl in passthrough vPMU
` [RFC PATCH v3 30/58] KVM: x86/pmu: Exclude PMU MSRs in vmx_get_passthrough_msr_slot()
` [RFC PATCH v3 31/58] KVM: x86/pmu: Add counter MSR and selector MSR index into struct kvm_pmc
` [RFC PATCH v3 32/58] KVM: x86/pmu: Introduce PMU operation prototypes for save/restore PMU context
` [RFC PATCH v3 33/58] KVM: x86/pmu: Implement the save/restore of PMU state for Intel CPU
` [RFC PATCH v3 34/58] KVM: x86/pmu: Make check_pmu_event_filter() an exported function
` [RFC PATCH v3 35/58] KVM: x86/pmu: Allow writing to event selector for GP counters if event is allowed
` [RFC PATCH v3 36/58] KVM: x86/pmu: Allow writing to fixed counter selector if counter is exposed
` [RFC PATCH v3 37/58] KVM: x86/pmu: Switch IA32_PERF_GLOBAL_CTRL at VM boundary
` [RFC PATCH v3 38/58] KVM: x86/pmu: Exclude existing vLBR logic from the passthrough PMU
` [RFC PATCH v3 39/58] KVM: x86/pmu: Notify perf core at KVM context switch boundary
` [RFC PATCH v3 40/58] KVM: x86/pmu: Grab x86 core PMU for passthrough PMU VM
` [RFC PATCH v3 41/58] KVM: x86/pmu: Add support for PMU context switch at VM-exit/enter
` [RFC PATCH v3 42/58] KVM: x86/pmu: Introduce PMU operator to increment counter
` [RFC PATCH v3 43/58] KVM: x86/pmu: Introduce PMU operator for setting counter overflow
` [RFC PATCH v3 44/58] KVM: x86/pmu: Implement emulated counter increment for passthrough PMU
` [RFC PATCH v3 45/58] KVM: x86/pmu: Update pmc_{read,write}_counter() to disconnect perf API
` [RFC PATCH v3 46/58] KVM: x86/pmu: Disconnect counter reprogram logic from passthrough PMU
` [RFC PATCH v3 47/58] KVM: nVMX: Add nested virtualization support for "
` [RFC PATCH v3 48/58] perf/x86/intel: Support PERF_PMU_CAP_PASSTHROUGH_VPMU
` [RFC PATCH v3 49/58] KVM: x86/pmu/svm: Set passthrough capability for vcpus
` [RFC PATCH v3 50/58] KVM: x86/pmu/svm: Set enable_passthrough_pmu module parameter
` [RFC PATCH v3 51/58] KVM: x86/pmu/svm: Allow RDPMC pass through when all counters exposed to guest
` [RFC PATCH v3 52/58] KVM: x86/pmu/svm: Implement callback to disable MSR interception
` [RFC PATCH v3 53/58] KVM: x86/pmu/svm: Set GuestOnly bit and clear HostOnly bit when guest write to event selectors
` [RFC PATCH v3 54/58] KVM: x86/pmu/svm: Add registers to direct access list
` [RFC PATCH v3 55/58] KVM: x86/pmu/svm: Implement handlers to save and restore context
` [RFC PATCH v3 56/58] KVM: x86/pmu/svm: Wire up PMU filtering functionality for passthrough PMU
` [RFC PATCH v3 57/58] KVM: x86/pmu/svm: Implement callback to increment counters
` [RFC PATCH v3 58/58] perf/x86/amd: Support PERF_PMU_CAP_PASSTHROUGH_VPMU for AMD host

[PATCH] KVM: x86/mmu: Conditionally call kvm_zap_obsolete_pages
 2024-08-01  4:33 UTC  (10+ messages)

[PATCH 00/13] Bump Avocado to 103.0 LTS and update tests for compatibility and new features
 2024-08-01  3:39 UTC  (18+ messages)
` [PATCH 03/13] tests/avocado/intel_iommu.py: increase timeout
` [PATCH 06/13] tests/avocado: use more distinct names for assets
` [PATCH 09/13] tests/avocado/boot_xen.py: fetch kernel during test setUp()
` [PATCH 10/13] tests/avocado/tuxrun_baselines.py: use Avocado's zstd support
` [PATCH 12/13] Bump avocado to 103.0

[PATCH 00/10] for-8.3 tests/avocado: prep for Avocado 103.0 LTS
 2024-08-01  3:30 UTC  (4+ messages)
` [PATCH 06/10] tests/avocado/kvm_xen_guest.py: cope with asset RW requirements

[PATCHSET][RFC] struct fd and memory safety
 2024-07-31 21:11 UTC  (7+ messages)
` [PATCH 01/39] memcg_write_event_control(): fix a user-triggerable oops
  ` [PATCH 08/39] experimental: convert fs/overlayfs/file.c to CLASS(...)

[PATCH v2 00/17] KVM: arm64: nv: Add support for address translation instructions
 2024-07-31 19:40 UTC  (18+ messages)
` [PATCH v2 01/17] arm64: Add missing APTable and TCR_ELx.HPD masks
` [PATCH v2 02/17] arm64: Add PAR_EL1 field description
` [PATCH v2 03/17] arm64: Add system register encoding for PSTATE.PAN
` [PATCH v2 04/17] arm64: Add ESR_ELx_FSC_ADDRSZ_L() helper
` [PATCH v2 05/17] KVM: arm64: Make kvm_at() take an OP_AT_*
` [PATCH v2 06/17] KVM: arm64: nv: Turn upper_attr for S2 walk into the full descriptor
` [PATCH v2 07/17] KVM: arm64: nv: Honor absence of FEAT_PAN2
` [PATCH v2 08/17] KVM: arm64: nv: Add basic emulation of AT S1E{0,1}{R,W}
` [PATCH v2 09/17] KVM: arm64: nv: Add basic emulation of AT S1E1{R,W}P
` [PATCH v2 10/17] KVM: arm64: nv: Add basic emulation of AT S1E2{R,W}
` [PATCH v2 11/17] KVM: arm64: nv: Add emulation of AT S12E{0,1}{R,W}
` [PATCH v2 12/17] KVM: arm64: nv: Make ps_to_output_size() generally available
` [PATCH v2 13/17] KVM: arm64: nv: Add SW walker for AT S1 emulation
` [PATCH v2 14/17] KVM: arm64: nv: Sanitise SCTLR_EL1.EPAN according to VM configuration
` [PATCH v2 15/17] KVM: arm64: nv: Make AT+PAN instructions aware of FEAT_PAN3
` [PATCH v2 16/17] KVM: arm64: nv: Plumb handling of AT S1* traps from EL2
` [PATCH v2 17/17] KVM: arm64: nv: Add support for FEAT_ATS1A

[PATCH] KVM: Fix error path in kvm_vm_ioctl_create_vcpu() on xa_store() failure
 2024-07-31 19:27 UTC  (7+ messages)

[PATCH net-next v12 04/14] mm: page_frag: add '_va' suffix to page_frag API
 2024-07-31 18:13 UTC  (5+ messages)
` [PATCH net-next v12 05/14] mm: page_frag: avoid caller accessing 'page_frag_cache' directly

[PATCH] KVM: selftests: arm64: Correct feature test for S1PIE in get-reg-list
 2024-07-31 16:21 UTC 

[PATCH 00/12] KVM: arm64: nv: Add support for address translation instructions
 2024-07-31 16:05 UTC  (13+ messages)
` [PATCH 10/12] KVM: arm64: nv: Add SW walker for AT S1 emulation

[PATCH rfc] vfio-pci: Allow write combining
 2024-07-31 15:53 UTC 

[PATCH v11 00/20] Add Secure TSC support for SNP guests
 2024-07-31 15:08 UTC  (21+ messages)
` [PATCH v11 01/20] virt: sev-guest: Replace dev_dbg with pr_debug
` [PATCH v11 02/20] virt: sev-guest: Rename local guest message variables
` [PATCH v11 03/20] virt: sev-guest: Fix user-visible strings
` [PATCH v11 04/20] virt: sev-guest: Ensure the SNP guest messages do not exceed a page
` [PATCH v11 05/20] virt: sev-guest: Use AES GCM crypto library
` [PATCH v11 06/20] x86/sev: Handle failures from snp_init()
` [PATCH v11 07/20] x86/sev: Cache the secrets page address
` [PATCH v11 08/20] virt: sev-guest: Consolidate SNP guest messaging parameters to a struct
` [PATCH v11 09/20] virt: sev-guest: Reduce the scope of SNP command mutex
` [PATCH v11 10/20] virt: sev-guest: Carve out SNP message context structure
` [PATCH v11 11/20] x86/sev: Carve out and export SNP guest messaging init routines
` [PATCH v11 12/20] x86/sev: Relocate SNP guest messaging routines to common code
` [PATCH v11 13/20] x86/cc: Add CC_ATTR_GUEST_SECURE_TSC
` [PATCH v11 14/20] x86/sev: Add Secure TSC support for SNP guests
` [PATCH v11 15/20] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v11 16/20] x86/sev: Prevent RDTSC/RDTSCP interception "
` [PATCH v11 17/20] x86/sev: Allow Secure TSC feature for SNP guests
` [PATCH v11 18/20] x86/sev: Mark Secure TSC as reliable clocksource
` [PATCH v11 19/20] x86/kvmclock: Skip kvmclock when Secure TSC is available
` [PATCH v11 20/20] x86/cpu/amd: Do not print FW_BUG for Secure TSC

[PATCH v11 0/8] KVM: allow mapping non-refcounted pages
 2024-07-31 15:01 UTC  (4+ messages)

[PATCH v2] KVM: x86: Advertise SUCCOR and OVERFLOW_RECOV cpuid bits
 2024-07-31 14:36 UTC 

[PATCH RESEND] KVM: X86: conditionally call the release operation of memslot rmap
 2024-07-31  9:53 UTC  (2+ messages)

[PATCH 00/18] qapi: Reduce use of 'prefix'
 2024-07-31  9:46 UTC  (13+ messages)
` [PATCH 01/18] qapi: Smarter camel_to_upper() to reduce need for 'prefix'
` [PATCH 11/18] qapi/crypto: Rename QCryptoHashAlgorithm to *Algo, and drop prefix

[PATCH v2] KVM: x86/mmu: Optimize kvm_zap_obsolete_pages execution time
 2024-07-31  9:27 UTC 

[PATCH] Loongarch: KVM: Add KVM hypercalls documentation for LoongArch
 2024-07-31  9:14 UTC  (2+ messages)

[PATCH v4 00/15] arm64: Support for running as a guest in Arm CCA
 2024-07-31  9:05 UTC  (11+ messages)
` [PATCH v4 03/15] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v4 05/15] arm64: Mark all I/O as non-secure shared

[PATCH net-next v4 0/2] vsock: avoid queuing on intermediate queue if possible
 2024-07-31  7:39 UTC  (3+ messages)
` [PATCH net-next v4 2/2] vsock/virtio: avoid queuing packets when intermediate queue is empty

[PATCH net-next v4 0/3] ioctl support for AF_VSOCK and virtio-based transports
 2024-07-31  7:34 UTC  (7+ messages)
` [PATCH net-next v4 1/3] vsock: add support for SIOCOUTQ ioctl
` [PATCH net-next v4 2/3] vsock/virtio: add SIOCOUTQ support for all virtio based transports
` [PATCH net-next v4 3/3] test/vsock: add ioctl unsent bytes test

[PATCH] KVM: Loongarch: Remove undefined a6 argument comment for kvm_hypercall
 2024-07-31  6:05 UTC  (2+ messages)

[PATCH] vfio/pci: Remove unused struct 'vfio_pci_mmap_vma'
 2024-07-31  5:55 UTC  (2+ messages)

[PATCH v1] MAINTAINERS: add me as reviewer of AF_VSOCK and virtio-vsock
 2024-07-31  5:05 UTC  (4+ messages)

[Bug 219112] New: Machine will not wake from suspend if KVM VM is running
 2024-07-31  1:47 UTC  (3+ messages)
` [Bug 219112] "

[PATCH] KVM: x86: Include host suspended time in steal time
 2024-07-31  1:03 UTC  (4+ messages)

[PATCH v4 1/3] LoongArch: KVM: Enable paravirt feature control from VMM
 2024-07-31  0:41 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).