public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-07-31 15:09:13 to 2024-08-01 18:34:59 UTC [more...]

[RFC PATCH 0/9] KVM: x86/mmu: Preserve Accessed bits on PROT changes
 2024-08-01 18:34 UTC  (2+ messages)
` [RFC PATCH 1/9] KVM: x86/mmu: Add a dedicated flag to track if A/D bits are globally enabled

[PATCH rfc] vfio-pci: Allow write combining
 2024-08-01 18:16 UTC  (9+ messages)

[PATCH v15 02/20] KVM: x86: Add hook for determining max NPT mapping level
 2024-08-01 18:15 UTC  (5+ messages)
` [PATCH] Fixes: f32fb32820b1 ("KVM: x86: Add hook for determining max NPT mapping level")

[PATCH v12 00/84] KVM: Stop grabbing references to PFNMAP'd pages
 2024-08-01 18:01 UTC  (21+ messages)
` [PATCH v12 01/84] KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE
` [PATCH v12 02/84] KVM: arm64: Disallow copying MTE to guest memory while KVM is dirty logging
` [PATCH v12 03/84] KVM: Drop KVM_ERR_PTR_BAD_PAGE and instead return NULL to indicate an error
` [PATCH v12 04/84] KVM: Allow calling kvm_release_page_{clean,dirty}() on a NULL page pointer
` [PATCH v12 05/84] KVM: Add kvm_release_page_unused() API to put pages that KVM never consumes
` [PATCH v12 12/84] KVM: Drop @atomic param from gfn=>pfn and hva=>pfn APIs
` [PATCH v12 24/84] KVM: Use plain "struct page" pointer instead of single-entry array
` [PATCH v12 26/84] KVM: Move kvm_{set,release}_page_{clean,dirty}() helpers up in kvm_main.c

[syzbot] [mm?] WARNING in hpage_collapse_scan_pmd (2)
 2024-08-01 17:57 UTC 

[PATCH 1/1] virtio_blk: implement init_hctx MQ operation
 2024-08-01 17:56 UTC  (8+ messages)

[PATCH] KVM: selftests: arm64: Correct feature test for S1PIE in get-reg-list
 2024-08-01 16:45 UTC  (3+ messages)

[PATCH net-next v4 0/3] ioctl support for AF_VSOCK and virtio-based transports
 2024-08-01 16:35 UTC  (2+ messages)

[PATCH] i8253: Disable PIT timer 0 when not in use
 2024-08-01 16:32 UTC 

[PATCH 00/13] Bump Avocado to 103.0 LTS and update tests for compatibility and new features
 2024-08-01 16:05 UTC  (26+ messages)
` [PATCH 03/13] tests/avocado/intel_iommu.py: increase timeout
` [PATCH 06/13] tests/avocado: use more distinct names for assets
` [PATCH 07/13] tests/avocado/kvm_xen_guest.py: cope with asset RW requirements
` [PATCH 09/13] tests/avocado/boot_xen.py: fetch kernel during test setUp()
` [PATCH 10/13] tests/avocado/tuxrun_baselines.py: use Avocado's zstd support
` [PATCH 12/13] Bump avocado to 103.0

[RFC PATCH vhost] vhost-vdpa: Fix invalid irq bypass unregister
 2024-08-01 15:37 UTC 

[PATCH] clockevents/drivers/i8253: Do not zero timer counter in shutdown
 2024-08-01 15:22 UTC  (2+ messages)

[PATCH net-next v12 04/14] mm: page_frag: add '_va' suffix to page_frag API
 2024-08-01 15:21 UTC  (4+ messages)

[PATCH 00/10] for-8.3 tests/avocado: prep for Avocado 103.0 LTS
 2024-08-01 15:17 UTC  (6+ messages)
` [PATCH 06/10] tests/avocado/kvm_xen_guest.py: cope with asset RW requirements

[PATCH v3 00/10] selftests: kvm: s390: Add s390x ucontrol selftests
 2024-08-01 15:06 UTC  (13+ messages)
` [PATCH v3 05/10] selftests: kvm: s390: Add debug print functions
` [PATCH v3 06/10] selftests: kvm: s390: Add VM run test case
` [PATCH v3 07/10] selftests: kvm: s390: Add uc_map_unmap VM "
` [PATCH v3 09/10] selftests: kvm: s390: Verify reject memory region operations for ucontrol VMs
` [PATCH v3 10/10] s390: Enable KVM_S390_UCONTROL config in debug_defconfig

[PATCH v1 1/1] s390/uv: Panic if the security of the system cannot be guaranteed
 2024-08-01 13:20 UTC  (2+ messages)

[PATCH v2] KVM: s390: fix validity interception issue when gisa is switched off
 2024-08-01 12:54 UTC  (2+ messages)

[PATCH] KVM: Fix error path in kvm_vm_ioctl_create_vcpu() on xa_store() failure
 2024-08-01 12:41 UTC  (8+ messages)

[RFC PATCH net-next v6 12/14] vsock/loopback: implement datagram support
 2024-08-01 12:18 UTC  (2+ messages)

[PATCH 0/8] Introduce SMP Cache Topology
 2024-08-01 11:28 UTC  (9+ messages)
` [PATCH 8/8] qemu-options: Add the description of smp-cache object

[PATCH kvmtool] remove wordsize.h inclusion (for musl compatibility)
 2024-08-01 11:10 UTC 

[RFC PATCH 0/8] Unmapping guest_memfd from Direct Map
 2024-08-01 10:30 UTC  (9+ messages)
` [RFC PATCH 8/8] kvm: gmem: Allow restricted userspace mappings

[PULL 02/22] tests/avocado: use snapshot=on in kvm_xen_guest
 2024-08-01  9:48 UTC  (2+ messages)

[PATCH v6 00/11] mm: multi-gen LRU: Walk secondary MMU page tables while aging
 2024-08-01  9:36 UTC  (5+ messages)
` [PATCH v6 04/11] mm: Add missing mmu_notifier_clear_young for !MMU_NOTIFIER
` [PATCH v6 05/11] mm: Add fast_only bool to test_young and clear_young MMU notifiers

[PATCH v2 0/8] KVM: arm64: Add support for FP8
 2024-08-01  9:19 UTC  (9+ messages)
` [PATCH v2 1/8] KVM: arm64: Move SVCR into the sysreg array
` [PATCH v2 2/8] KVM: arm64: Add predicate for FPMR support in a VM
` [PATCH v2 3/8] KVM: arm64: Move FPMR into the sysreg array
` [PATCH v2 4/8] KVM: arm64: Add save/restore support for FPMR
` [PATCH v2 5/8] KVM: arm64: Honor trap routing "
` [PATCH v2 6/8] KVM: arm64: Expose ID_AA64FPFR0_EL1 as a writable ID reg
` [PATCH v2 7/8] KVM: arm64: Enable FP8 support when available and configured
` [PATCH v2 8/8] KVM: arm64: Expose ID_AA64PFR2_EL1 to userspace and guests

[RFC PATCH v2 00/10] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
 2024-08-01  9:01 UTC  (11+ messages)
` [RFC PATCH v2 01/10] KVM: Introduce kvm_gmem_get_pfn_locked(), which retains the folio lock
` [RFC PATCH v2 02/10] KVM: Add restricted support for mapping guestmem by the host
` [RFC PATCH v2 03/10] KVM: Implement kvm_(read|/write)_guest_page for private memory slots
` [RFC PATCH v2 04/10] KVM: Add KVM capability to check if guest_memfd can be mapped by the host
` [RFC PATCH v2 05/10] KVM: selftests: guest_memfd mmap() test when mapping is allowed
` [RFC PATCH v2 06/10] KVM: arm64: Skip VMA checks for slots without userspace address
` [RFC PATCH v2 07/10] KVM: arm64: Do not allow changes to private memory slots
` [RFC PATCH v2 08/10] KVM: arm64: Handle guest_memfd()-backed guest page faults
` [RFC PATCH v2 09/10] KVM: arm64: arm64 has private memory support when config is enabled
` [RFC PATCH v2 10/10] KVM: arm64: Enable private memory kconfig for arm64

[PATCH v2 0/4] vfio-pci support pasid attach/detach
 2024-08-01  7:45 UTC  (16+ messages)

[RFC PATCH 0/6] Enable shared device assignment
 2024-08-01  7:32 UTC  (5+ messages)

[RFC PATCH v3 00/58] Mediated Passthrough vPMU 3.0 for x86
 2024-08-01  4:59 UTC  (59+ messages)
` [RFC PATCH v3 01/58] sched/core: Move preempt_model_*() helpers from sched.h to preempt.h
` [RFC PATCH v3 02/58] sched/core: Drop spinlocks on contention iff kernel is preemptible
` [RFC PATCH v3 03/58] perf/x86: Do not set bit width for unavailable counters
` [RFC PATCH v3 04/58] x86/msr: Define PerfCntrGlobalStatusSet register
` [RFC PATCH v3 05/58] x86/msr: Introduce MSR_CORE_PERF_GLOBAL_STATUS_SET
` [RFC PATCH v3 06/58] perf: Support get/put passthrough PMU interfaces
` [RFC PATCH v3 07/58] perf: Skip pmu_ctx based on event_type
` [RFC PATCH v3 08/58] perf: Clean up perf ctx time
` [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag
` [RFC PATCH v3 10/58] perf: Add generic exclude_guest support
` [RFC PATCH v3 11/58] x86/irq: Factor out common code for installing kvm irq handler
` [RFC PATCH v3 12/58] perf: core/x86: Register a new vector for KVM GUEST PMI
` [RFC PATCH v3 13/58] KVM: x86/pmu: Register KVM_GUEST_PMI_VECTOR handler
` [RFC PATCH v3 14/58] perf: Add switch_interrupt() interface
` [RFC PATCH v3 15/58] perf/x86: Support switch_interrupt interface
` [RFC PATCH v3 16/58] perf/x86: Forbid PMI handler when guest own PMU
` [RFC PATCH v3 17/58] perf: core/x86: Plumb passthrough PMU capability from x86_pmu to x86_pmu_cap
` [RFC PATCH v3 18/58] KVM: x86/pmu: Introduce enable_passthrough_pmu module parameter
` [RFC PATCH v3 19/58] KVM: x86/pmu: Plumb through pass-through PMU to vcpu for Intel CPUs
` [RFC PATCH v3 20/58] KVM: x86/pmu: Always set global enable bits in passthrough mode
` [RFC PATCH v3 21/58] KVM: x86/pmu: Add a helper to check if passthrough PMU is enabled
` [RFC PATCH v3 22/58] KVM: x86/pmu: Add host_perf_cap and initialize it in kvm_x86_vendor_init()
` [RFC PATCH v3 23/58] KVM: x86/pmu: Allow RDPMC pass through when all counters exposed to guest
` [RFC PATCH v3 24/58] KVM: x86/pmu: Introduce macro PMU_CAP_PERF_METRICS
` [RFC PATCH v3 25/58] KVM: x86/pmu: Introduce PMU operator to check if rdpmc passthrough allowed
` [RFC PATCH v3 26/58] KVM: x86/pmu: Manage MSR interception for IA32_PERF_GLOBAL_CTRL
` [RFC PATCH v3 27/58] KVM: x86/pmu: Create a function prototype to disable MSR interception
` [RFC PATCH v3 28/58] KVM: x86/pmu: Add intel_passthrough_pmu_msrs() to pass-through PMU MSRs
` [RFC PATCH v3 29/58] KVM: x86/pmu: Avoid legacy vPMU code when accessing global_ctrl in passthrough vPMU
` [RFC PATCH v3 30/58] KVM: x86/pmu: Exclude PMU MSRs in vmx_get_passthrough_msr_slot()
` [RFC PATCH v3 31/58] KVM: x86/pmu: Add counter MSR and selector MSR index into struct kvm_pmc
` [RFC PATCH v3 32/58] KVM: x86/pmu: Introduce PMU operation prototypes for save/restore PMU context
` [RFC PATCH v3 33/58] KVM: x86/pmu: Implement the save/restore of PMU state for Intel CPU
` [RFC PATCH v3 34/58] KVM: x86/pmu: Make check_pmu_event_filter() an exported function
` [RFC PATCH v3 35/58] KVM: x86/pmu: Allow writing to event selector for GP counters if event is allowed
` [RFC PATCH v3 36/58] KVM: x86/pmu: Allow writing to fixed counter selector if counter is exposed
` [RFC PATCH v3 37/58] KVM: x86/pmu: Switch IA32_PERF_GLOBAL_CTRL at VM boundary
` [RFC PATCH v3 38/58] KVM: x86/pmu: Exclude existing vLBR logic from the passthrough PMU
` [RFC PATCH v3 39/58] KVM: x86/pmu: Notify perf core at KVM context switch boundary
` [RFC PATCH v3 40/58] KVM: x86/pmu: Grab x86 core PMU for passthrough PMU VM
` [RFC PATCH v3 41/58] KVM: x86/pmu: Add support for PMU context switch at VM-exit/enter
` [RFC PATCH v3 42/58] KVM: x86/pmu: Introduce PMU operator to increment counter
` [RFC PATCH v3 43/58] KVM: x86/pmu: Introduce PMU operator for setting counter overflow
` [RFC PATCH v3 44/58] KVM: x86/pmu: Implement emulated counter increment for passthrough PMU
` [RFC PATCH v3 45/58] KVM: x86/pmu: Update pmc_{read,write}_counter() to disconnect perf API
` [RFC PATCH v3 46/58] KVM: x86/pmu: Disconnect counter reprogram logic from passthrough PMU
` [RFC PATCH v3 47/58] KVM: nVMX: Add nested virtualization support for "
` [RFC PATCH v3 48/58] perf/x86/intel: Support PERF_PMU_CAP_PASSTHROUGH_VPMU
` [RFC PATCH v3 49/58] KVM: x86/pmu/svm: Set passthrough capability for vcpus
` [RFC PATCH v3 50/58] KVM: x86/pmu/svm: Set enable_passthrough_pmu module parameter
` [RFC PATCH v3 51/58] KVM: x86/pmu/svm: Allow RDPMC pass through when all counters exposed to guest
` [RFC PATCH v3 52/58] KVM: x86/pmu/svm: Implement callback to disable MSR interception
` [RFC PATCH v3 53/58] KVM: x86/pmu/svm: Set GuestOnly bit and clear HostOnly bit when guest write to event selectors
` [RFC PATCH v3 54/58] KVM: x86/pmu/svm: Add registers to direct access list
` [RFC PATCH v3 55/58] KVM: x86/pmu/svm: Implement handlers to save and restore context
` [RFC PATCH v3 56/58] KVM: x86/pmu/svm: Wire up PMU filtering functionality for passthrough PMU
` [RFC PATCH v3 57/58] KVM: x86/pmu/svm: Implement callback to increment counters
` [RFC PATCH v3 58/58] perf/x86/amd: Support PERF_PMU_CAP_PASSTHROUGH_VPMU for AMD host

[PATCH] KVM: x86/mmu: Conditionally call kvm_zap_obsolete_pages
 2024-08-01  4:33 UTC  (10+ messages)

[PATCHSET][RFC] struct fd and memory safety
 2024-07-31 21:11 UTC  (6+ messages)
` [PATCH 01/39] memcg_write_event_control(): fix a user-triggerable oops
  ` [PATCH 08/39] experimental: convert fs/overlayfs/file.c to CLASS(...)

[PATCH v2 00/17] KVM: arm64: nv: Add support for address translation instructions
 2024-07-31 19:40 UTC  (18+ messages)
` [PATCH v2 01/17] arm64: Add missing APTable and TCR_ELx.HPD masks
` [PATCH v2 02/17] arm64: Add PAR_EL1 field description
` [PATCH v2 03/17] arm64: Add system register encoding for PSTATE.PAN
` [PATCH v2 04/17] arm64: Add ESR_ELx_FSC_ADDRSZ_L() helper
` [PATCH v2 05/17] KVM: arm64: Make kvm_at() take an OP_AT_*
` [PATCH v2 06/17] KVM: arm64: nv: Turn upper_attr for S2 walk into the full descriptor
` [PATCH v2 07/17] KVM: arm64: nv: Honor absence of FEAT_PAN2
` [PATCH v2 08/17] KVM: arm64: nv: Add basic emulation of AT S1E{0,1}{R,W}
` [PATCH v2 09/17] KVM: arm64: nv: Add basic emulation of AT S1E1{R,W}P
` [PATCH v2 10/17] KVM: arm64: nv: Add basic emulation of AT S1E2{R,W}
` [PATCH v2 11/17] KVM: arm64: nv: Add emulation of AT S12E{0,1}{R,W}
` [PATCH v2 12/17] KVM: arm64: nv: Make ps_to_output_size() generally available
` [PATCH v2 13/17] KVM: arm64: nv: Add SW walker for AT S1 emulation
` [PATCH v2 14/17] KVM: arm64: nv: Sanitise SCTLR_EL1.EPAN according to VM configuration
` [PATCH v2 15/17] KVM: arm64: nv: Make AT+PAN instructions aware of FEAT_PAN3
` [PATCH v2 16/17] KVM: arm64: nv: Plumb handling of AT S1* traps from EL2
` [PATCH v2 17/17] KVM: arm64: nv: Add support for FEAT_ATS1A

[PATCH 00/12] KVM: arm64: nv: Add support for address translation instructions
 2024-07-31 16:05 UTC  (5+ messages)
` [PATCH 10/12] KVM: arm64: nv: Add SW walker for AT S1 emulation

[PATCH v11 00/20] Add Secure TSC support for SNP guests
 2024-07-31 15:08 UTC  (12+ messages)
` [PATCH v11 10/20] virt: sev-guest: Carve out SNP message context structure
` [PATCH v11 11/20] x86/sev: Carve out and export SNP guest messaging init routines
` [PATCH v11 12/20] x86/sev: Relocate SNP guest messaging routines to common code
` [PATCH v11 13/20] x86/cc: Add CC_ATTR_GUEST_SECURE_TSC
` [PATCH v11 14/20] x86/sev: Add Secure TSC support for SNP guests
` [PATCH v11 15/20] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v11 16/20] x86/sev: Prevent RDTSC/RDTSCP interception "
` [PATCH v11 17/20] x86/sev: Allow Secure TSC feature for SNP guests
` [PATCH v11 18/20] x86/sev: Mark Secure TSC as reliable clocksource
` [PATCH v11 19/20] x86/kvmclock: Skip kvmclock when Secure TSC is available
` [PATCH v11 20/20] x86/cpu/amd: Do not print FW_BUG for Secure TSC


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox