public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2024-10-10 18:25:45 to 2024-10-13 18:54:41 UTC [more...]

[RFC 00/29] Introduce NVIDIA GPU Virtualization (vGPU) Support
 2024-10-13 18:54 UTC  (4+ messages)
` [RFC 04/29] nvkm/vgpu: set the VF partition count when NVIDIA vGPU is enabled

[PATCH V12 00/14] perf/core: Add ability for an event to "pause" or "resume" AUX area tracing
 2024-10-13 14:48 UTC  (3+ messages)
` [PATCH V12 11/14] perf tools: Add missing_features for aux_start_paused, aux_pause, aux_resume

[PATCH v4 00/36] KVM: arm64: Add EL2 support to FEAT_S1PIE/S1POE
 2024-10-13 14:27 UTC  (4+ messages)
` [PATCH v4 33/36] KVM: arm64: Disable hierarchical permissions when POE is enabled

[PATCH] LoongArch: KVM: Mark hrtimer to expire in hard interrupt context
 2024-10-13  9:01 UTC 

[PATCH v1 1/1] vfio/nvgrace-gpu: Add a new GH200 SKU to the devid table
 2024-10-13  7:52 UTC 

hola
 2024-10-13  1:18 UTC 

Yamaha Piano 10/12
 2024-10-12 22:08 UTC 

[PATCH RFC v5 00/10] tun: Introduce virtio-net hashing feature
 2024-10-12 17:43 UTC  (15+ messages)
` [PATCH RFC v5 01/10] virtio_net: Add functions for hashing
` [PATCH RFC v5 04/10] tun: Unify vnet implementation
` [PATCH RFC v5 06/10] tun: Introduce virtio-net hash reporting feature
` [PATCH RFC v5 07/10] tun: Introduce virtio-net RSS

[PATCH v3 0/4] vfio-pci support pasid attach/detach
 2024-10-12 13:49 UTC  (5+ messages)
` [PATCH v3 3/4] vfio: Add VFIO_DEVICE_PASID_[AT|DE]TACH_IOMMUFD_PT

[PATCH net-next v21 04/14] mm: page_frag: avoid caller accessing 'page_frag_cache' directly
 2024-10-12 11:23 UTC 

[PATCH v3 0/7] Introduce SMP Cache Topology
 2024-10-12 10:44 UTC  (8+ messages)
` [PATCH v3 1/7] hw/core: Make CPU topology enumeration arch-agnostic
` [PATCH v3 2/7] qapi/qom: Define cache enumeration and properties for machine
` [PATCH v3 3/7] hw/core: Check smp cache topology support "
` [PATCH v3 4/7] i386/cpu: Support thread and module level cache topology
` [PATCH v3 5/7] i386/cpu: Update cache topology with machine's configuration
` [PATCH v3 6/7] i386/pc: Support cache topology in -machine for PC machine
` [PATCH v3 7/7] i386/cpu: add has_caches flag to check smp_cache configuration

[PATCH v5 0/5] Add PSCI v1.3 SYSTEM_OFF2 support for hibernation
 2024-10-12  9:28 UTC  (4+ messages)
` [PATCH v5 4/5] KVM: selftests: Add test for PSCI SYSTEM_OFF2

[PATCH v9 0/4] debugfs to hisilicon migration driver
 2024-10-12  9:03 UTC  (4+ messages)
` [PATCH v9 3/4] hisi_acc_vfio_pci: register debugfs for "

[kvm:kvm-coco-queue 62/109] arch/x86/kvm/mmu/tdp_mmu.c:474:14: sparse: sparse: incorrect type in argument 1 (different address spaces)
 2024-10-12  8:09 UTC 

[PATCH 0/2] KVM: kvm-coco-queue: Support protected TSC
 2024-10-12  7:55 UTC  (3+ messages)
` [PATCH 1/2] KVM: x86: Push down setting vcpu.arch.user_set_tsc
` [PATCH 2/2] KVM: x86: Don't allow tsc_offset, tsc_scaling_ratio to change

[PATCH v2 0/2] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change
 2024-10-12  7:39 UTC  (3+ messages)
` [PATCH v2 1/2] KVM: x86/tdp_mmu: Add WARN_ON_ONCE() in tdp_mmu_map_handle_target_level()
` [PATCH v2 2/2] KVM: x86/tdp_mmu: Trigger the callback only when an interesting change

[PATCH v3 01/11] KVM: guest_memfd: Make guest mem use guest mem inodes instead of anonymous inodes
 2024-10-12  6:12 UTC  (2+ messages)

[PATCH v6 00/11] arm64: Support for running as a guest in Arm CCA
 2024-10-12  6:06 UTC  (27+ messages)
` [PATCH v6 01/11] arm64: rsi: Add RSI definitions
` [PATCH v6 02/11] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v6 04/11] arm64: rsi: Add support for checking whether an MMIO is protected
` [PATCH v6 05/11] arm64: rsi: Map unprotected MMIO as decrypted
` [PATCH v6 06/11] efi: arm64: Map Device with Prot Shared
` [PATCH v6 10/11] virt: arm-cca-guest: TSM_REPORT support for realms
` [PATCH v6 11/11] arm64: Document Arm Confidential Compute

Proposal: bi-weekly guest_memfd upstream call
 2024-10-12  3:58 UTC  (5+ messages)

[PATCH 0/3] Handle MMIO during event delivery error on SVM
 2024-10-12  0:21 UTC  (8+ messages)
` [PATCH 1/3] KVM: x86, vmx: Add function for event delivery error generation
` [PATCH 2/3] KVM: vmx, svm, mmu: Process MMIO during event delivery
` [PATCH 3/3] selftests: KVM: Add test case for "

[kvm:kvm-coco-queue 60/109] arch/x86/kvm/mmu/tdp_mmu.c:1176:25: sparse: sparse: incorrect type in argument 1 (different address spaces)
 2024-10-12  0:10 UTC 

[RFC PATCH 00/39] 1G page support for guest_memfd
 2024-10-11 23:32 UTC  (4+ messages)
` [RFC PATCH 26/39] KVM: guest_memfd: Track faultability within a struct kvm_gmem_private

[RFC 0/1] Introduce vfio-cxl to support CXL type-2 device passthrough
 2024-10-11 21:47 UTC  (3+ messages)
` [RFC 1/1] vfio: support CXL device in VFIO stub

[PATCH v5 0/4] Distinguish between variants of IBPB
 2024-10-11 21:43 UTC  (5+ messages)
` [PATCH v5 1/4] x86/cpufeatures: Clarify semantics of X86_FEATURE_IBPB
` [PATCH v5 2/4] x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET
` [PATCH v5 3/4] KVM: x86: Advertise AMD_IBPB_RET to userspace
` [PATCH v5 4/4] KVM: x86: AMD's IBPB is not equivalent to Intel's IBPB

[PATCH 0/3] KVM: x86/mmu: Don't zap "direct" non-leaf SPTEs on memslot removal
 2024-10-11 21:22 UTC  (6+ messages)
` [PATCH 2/3] KVM: x86/mmu: Add lockdep assert to enforce safe usage of kvm_unmap_gfn_range()

[RFC 00/13] vfio: introduce vfio-cxl to support CXL type-2 accelerator passthrough
 2024-10-11 21:14 UTC  (11+ messages)
` [RFC 04/13] vfio: introduce vfio-cxl core preludes
` [RFC 05/13] vfio/cxl: expose CXL region to the usersapce via a new VFIO device region
` [RFC 09/13] vfio/pci: introduce CXL device awareness
` [RFC 10/13] vfio/pci: emulate CXL DVSEC registers in the configuration space
` [RFC 11/13] vfio/cxl: introduce VFIO CXL device cap

[RFC PATCH v3 00/58] Mediated Passthrough vPMU 3.0 for x86
 2024-10-11 19:49 UTC  (11+ messages)
` [RFC PATCH v3 07/58] perf: Skip pmu_ctx based on event_type
` [RFC PATCH v3 08/58] perf: Clean up perf ctx time
` [RFC PATCH v3 09/58] perf: Add a EVENT_GUEST flag

Proposal: bi-weekly guest_memfd upstream call
 2024-10-11 17:48 UTC  (4+ messages)

[PATCH v2 0/3] Add SEV-SNP CipherTextHiding feature support
 2024-10-11 16:10 UTC  (6+ messages)
` [PATCH v2 3/3] x86/sev: Add SEV-SNP CipherTextHiding support

[PATCH v3 0/9] Initial support for SMMUv3 nested translation
 2024-10-11 14:00 UTC  (7+ messages)
` [PATCH v3 8/9] iommu/arm-smmu-v3: Support IOMMU_DOMAIN_NESTED
` [PATCH v3 9/9] iommu/arm-smmu-v3: Use S2FWB for NESTED domains

[RFC PATCH 00/13] Remove implicit devres from pci_intx()
 2024-10-11 13:50 UTC  (16+ messages)
` [RFC PATCH 01/13] PCI: Prepare removing "
` [RFC PATCH 02/13] ALSA: hda: hda_intel: Use always-managed version of pcim_intx()
` [RFC PATCH 13/13] Remove devres from pci_intx()

[GIT PULL] KVM/arm64 fixes for 6.12, take #2
 2024-10-11 13:27 UTC 

[PATCH v1 0/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma
 2024-10-11 11:43 UTC  (10+ messages)
` [PATCH v1 1/2] mm: huge_memory: add vma_thp_disabled() and thp_disabled_by_hw()
` [PATCH v1 2/2] mm: don't install PMD mappings when THPs are disabled by the hw/process/vma

[RFC] powerpc/kvm: Fix spinlock member access for PREEMPT_RT
 2024-10-11 10:08 UTC  (5+ messages)

[PATCH] accel/kvm: check for KVM_CAP_READONLY_MEM on VM
 2024-10-11  8:51 UTC  (3+ messages)
` Ping: "

[RFC 00/14] AMD: Add Secure AVIC Guest Support
 2024-10-11  7:29 UTC  (9+ messages)
` [RFC 01/14] x86/apic: Add new driver for Secure AVIC

[PATCH v2 1/1] x86: Add support save/load HWCR MSR
 2024-10-11  4:26 UTC  (2+ messages)

[PATCH] target/i386: Add more features enumerated by CPUID.7.2.EDX
 2024-10-11  4:22 UTC  (3+ messages)

[PATCH 09/21] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
 2024-10-11  2:30 UTC  (14+ messages)

[PATCH 00/18] KVM: x86/mmu: A/D cleanups (on top of kvm_follow_pfn)
 2024-10-11  2:10 UTC  (19+ messages)
` [PATCH 01/18] KVM: x86/mmu: Flush remote TLBs iff MMU-writable flag is cleared from RO SPTE
` [PATCH 02/18] KVM: x86/mmu: Always set SPTE's dirty bit if it's created as writable
` [PATCH 03/18] KVM: x86/mmu: Fold all of make_spte()'s writable handling into one if-else
` [PATCH 04/18] KVM: x86/mmu: Don't force flush if SPTE update clears Accessed bit
` [PATCH 05/18] KVM: x86/mmu: Don't flush TLBs when clearing Dirty bit in shadow MMU
` [PATCH 06/18] KVM: x86/mmu: Drop ignored return value from kvm_tdp_mmu_clear_dirty_slot()
` [PATCH 07/18] KVM: x86/mmu: Fold mmu_spte_update_no_track() into mmu_spte_update()
` [PATCH 08/18] KVM: x86/mmu: WARN and flush if resolving a TDP MMU fault clears MMU-writable
` [PATCH 09/18] KVM: x86/mmu: Add a dedicated flag to track if A/D bits are globally enabled
` [PATCH 10/18] KVM: x86/mmu: Set shadow_accessed_mask for EPT even if A/D bits disabled
` [PATCH 11/18] KVM: x86/mmu: Set shadow_dirty_mask "
` [PATCH 12/18] KVM: x86/mmu: Use Accessed bit even when _hardware_ A/D bits are disabled
` [PATCH 13/18] KVM: x86/mmu: Process only valid TDP MMU roots when aging a gfn range
` [PATCH 14/18] KVM: x86/mmu: Stop processing TDP MMU roots for test_age if young SPTE found
` [PATCH 15/18] KVM: x86/mmu: Dedup logic for detecting TLB flushes on leaf SPTE changes
` [PATCH 16/18] KVM: x86/mmu: Set Dirty bit for new SPTEs, even if _hardware_ A/D bits are disabled
` [PATCH 17/18] KVM: Allow arch code to elide TLB flushes when aging a young page
` [PATCH 18/18] KVM: x86: Don't emit TLB flushes when aging SPTEs for mmu_notifiers

[PATCH 0/5] Add new headers for Hyper-V Dom0
 2024-10-11  1:34 UTC  (6+ messages)
` [PATCH 3/5] hyperv: Add new Hyper-V headers
    ` [EXTERNAL] "
  ` [EXTERNAL] RE: [PATCH 0/5] Add new headers for Hyper-V Dom0

[PATCH kvmtool] riscv: Use the count parameter of term_putc in SBI_EXT_DBCN_CONSOLE_WRITE
 2024-10-10 23:29 UTC 

[PATCH RFC v2 0/5] mm: Introduce guest_memfd library
 2024-10-10 21:20 UTC  (3+ messages)

[RFC RESEND 0/6] hugetlbfs largepage RAS project
 2024-10-10 20:35 UTC  (8+ messages)

[PATCH v12 00/19] Add Secure TSC support for SNP guests
 2024-10-10 19:49 UTC  (9+ messages)
` [PATCH v12 05/19] virt: sev-guest: Reduce the scope of SNP command mutex
` [PATCH v12 09/19] x86/cc: Add CC_ATTR_GUEST_SNP_SECURE_TSC
` [PATCH v12 14/19] tsc: Use the GUEST_TSC_FREQ MSR for discovering TSC frequency
` [PATCH v12 17/19] x86/kvmclock: Abort SecureTSC enabled guest when kvmclock is selected

[RFC PATCH 30/39] KVM: guest_memfd: Handle folio preparation for guest_memfd mmap
 2024-10-10 19:27 UTC  (2+ messages)

[PATCH v13 00/85] KVM: Stop grabbing references to PFNMAP'd pages
 2024-10-10 18:24 UTC  (62+ messages)
` [PATCH v13 25/85] KVM: nVMX: Add helper to put (unmap) vmcs12 pages
` [PATCH v13 26/85] KVM: Use plain "struct page" pointer instead of single-entry array
` [PATCH v13 27/85] KVM: Provide refcounted page as output field in struct kvm_follow_pfn
` [PATCH v13 28/85] KVM: Move kvm_{set,release}_page_{clean,dirty}() helpers up in kvm_main.c
` [PATCH v13 29/85] KVM: pfncache: Precisely track refcounted pages
` [PATCH v13 30/85] KVM: Migrate kvm_vcpu_map() to kvm_follow_pfn()
` [PATCH v13 31/85] KVM: Pin (as in FOLL_PIN) pages during kvm_vcpu_map()
` [PATCH v13 32/85] KVM: nVMX: Mark vmcs12's APIC access page dirty when unmapping
` [PATCH v13 33/85] KVM: Pass in write/dirty to kvm_vcpu_map(), not kvm_vcpu_unmap()
` [PATCH v13 34/85] KVM: Get writable mapping for __kvm_vcpu_map() only when necessary
` [PATCH v13 35/85] KVM: Disallow direct access (w/o mmu_notifier) to unpinned pfn by default
` [PATCH v13 36/85] KVM: x86: Don't fault-in APIC access page during initial allocation
` [PATCH v13 37/85] KVM: x86/mmu: Add "mmu" prefix fault-in helpers to free up generic names
` [PATCH v13 38/85] KVM: x86/mmu: Put direct prefetched pages via kvm_release_page_clean()
` [PATCH v13 39/85] KVM: x86/mmu: Add common helper to handle prefetching SPTEs
` [PATCH v13 40/85] KVM: x86/mmu: Add helper to "finish" handling a guest page fault
` [PATCH v13 41/85] KVM: x86/mmu: Mark pages/folios dirty at the origin of make_spte()
` [PATCH v13 42/85] KVM: Move declarations of memslot accessors up in kvm_host.h
` [PATCH v13 43/85] KVM: Add kvm_faultin_pfn() to specifically service guest page faults
` [PATCH v13 44/85] KVM: x86/mmu: Convert page fault paths to kvm_faultin_pfn()
` [PATCH v13 45/85] KVM: guest_memfd: Pass index, not gfn, to __kvm_gmem_get_pfn()
` [PATCH v13 46/85] KVM: guest_memfd: Provide "struct page" as output from kvm_gmem_get_pfn()
` [PATCH v13 47/85] KVM: x86/mmu: Put refcounted pages instead of blindly releasing pfns
` [PATCH v13 48/85] KVM: x86/mmu: Don't mark unused faultin pages as accessed
` [PATCH v13 49/85] KVM: Move x86's API to release a faultin page to common KVM
` [PATCH v13 50/85] KVM: VMX: Hold mmu_lock until page is released when updating APIC access page
` [PATCH v13 51/85] KVM: VMX: Use __kvm_faultin_page() to get APIC access page/pfn
` [PATCH v13 52/85] KVM: PPC: e500: Mark "struct page" dirty in kvmppc_e500_shadow_map()
` [PATCH v13 53/85] KVM: PPC: e500: Mark "struct page" pfn accessed before dropping mmu_lock
` [PATCH v13 54/85] KVM: PPC: e500: Use __kvm_faultin_pfn() to handle page faults
` [PATCH v13 55/85] KVM: arm64: Mark "struct page" pfns accessed/dirty before dropping mmu_lock
` [PATCH v13 56/85] KVM: arm64: Use __kvm_faultin_pfn() to handle memory aborts
` [PATCH v13 57/85] KVM: RISC-V: Mark "struct page" pfns dirty iff a stage-2 PTE is installed
` [PATCH v13 58/85] KVM: RISC-V: Mark "struct page" pfns accessed before dropping mmu_lock
` [PATCH v13 59/85] KVM: RISC-V: Use kvm_faultin_pfn() when mapping pfns into the guest
` [PATCH v13 60/85] KVM: PPC: Use __kvm_faultin_pfn() to handle page faults on Book3s HV
` [PATCH v13 61/85] KVM: PPC: Use __kvm_faultin_pfn() to handle page faults on Book3s Radix
` [PATCH v13 62/85] KVM: PPC: Drop unused @kvm_ro param from kvmppc_book3s_instantiate_page()
` [PATCH v13 63/85] KVM: PPC: Book3S: Mark "struct page" pfns dirty/accessed after installing PTE
` [PATCH v13 64/85] KVM: PPC: Use kvm_faultin_pfn() to handle page faults on Book3s PR
` [PATCH v13 65/85] KVM: LoongArch: Mark "struct page" pfns dirty only in "slow" page fault path
` [PATCH v13 66/85] KVM: LoongArch: Mark "struct page" pfns accessed "
` [PATCH v13 67/85] KVM: LoongArch: Mark "struct page" pfn accessed before dropping mmu_lock
` [PATCH v13 68/85] KVM: LoongArch: Use kvm_faultin_pfn() to map pfns into the guest
` [PATCH v13 69/85] KVM: MIPS: Mark "struct page" pfns dirty only in "slow" page fault path
` [PATCH v13 70/85] KVM: MIPS: Mark "struct page" pfns accessed "
` [PATCH v13 71/85] KVM: MIPS: Mark "struct page" pfns accessed prior to dropping mmu_lock
` [PATCH v13 72/85] KVM: MIPS: Use kvm_faultin_pfn() to map pfns into the guest
` [PATCH v13 73/85] KVM: PPC: Remove extra get_page() to fix page refcount leak
` [PATCH v13 74/85] KVM: PPC: Use kvm_vcpu_map() to map guest memory to patch dcbz instructions
` [PATCH v13 75/85] KVM: Convert gfn_to_page() to use kvm_follow_pfn()
` [PATCH v13 76/85] KVM: Add support for read-only usage of gfn_to_page()
` [PATCH v13 77/85] KVM: arm64: Use __gfn_to_page() when copying MTE tags to/from userspace
` [PATCH v13 78/85] KVM: PPC: Explicitly require struct page memory for Ultravisor sharing
` [PATCH v13 79/85] KVM: Drop gfn_to_pfn() APIs now that all users are gone
` [PATCH v13 80/85] KVM: s390: Use kvm_release_page_dirty() to unpin "struct page" memory
` [PATCH v13 81/85] KVM: Make kvm_follow_pfn.refcounted_page a required field
` [PATCH v13 82/85] KVM: x86/mmu: Don't mark "struct page" accessed when zapping SPTEs
` [PATCH v13 83/85] KVM: arm64: Don't mark "struct page" accessed when making SPTE young
` [PATCH v13 84/85] KVM: Drop APIs that manipulate "struct page" via pfns
` [PATCH v13 85/85] KVM: Don't grab reference on VM_MIXEDMAP pfns that have a "struct page"


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox