KVM Archive mirror
 help / color / mirror / Atom feed
 messages from 2023-05-12 12:49:18 to 2023-05-15 15:59:05 UTC [more...]

[PATCH v2 00/17] Add Nested Translation Support for SMMUv3
 2023-05-15 15:57 UTC  (3+ messages)

[PATCH v3 00/22] Improve scalability of KVM + userfaultfd live migration via annotated memory faults
 2023-05-15 15:16 UTC  (14+ messages)

[PATCH v7 00/19] Add iommufd physical device operations for replace and alloc hwpt
 2023-05-15 14:00 UTC  (20+ messages)
` [PATCH v7 01/19] iommufd: Move isolated msi enforcement to iommufd_device_bind()
` [PATCH v7 02/19] iommufd: Add iommufd_group
` [PATCH v7 03/19] iommufd: Replace the hwpt->devices list with iommufd_group
` [PATCH v7 04/19] iommu: Export iommu_get_resv_regions()
` [PATCH v7 05/19] iommufd: Keep track of each device's reserved regions instead of groups
` [PATCH v7 06/19] iommufd: Use the iommufd_group to avoid duplicate MSI setup
` [PATCH v7 07/19] iommufd: Make sw_msi_start a group global
` [PATCH v7 08/19] iommufd: Move putting a hwpt to a helper function
` [PATCH v7 09/19] iommufd: Add enforced_cache_coherency to iommufd_hw_pagetable_alloc()
` [PATCH v7 10/19] iommufd: Allow a hwpt to be aborted after allocation
` [PATCH v7 11/19] iommufd: Fix locking around hwpt allocation
` [PATCH v7 12/19] iommufd: Reorganize iommufd_device_attach into iommufd_device_change_pt
` [PATCH v7 13/19] iommu: Introduce a new iommu_group_replace_domain() API
` [PATCH v7 14/19] iommufd: Add iommufd_device_replace()
` [PATCH v7 15/19] iommufd: Make destroy_rwsem use a lock class per object type
` [PATCH v7 16/19] iommufd/selftest: Test iommufd_device_replace()
` [PATCH v7 17/19] iommufd: Add IOMMU_HWPT_ALLOC
` [PATCH v7 18/19] iommufd/selftest: Return the real idev id from selftest mock_domain
` [PATCH v7 19/19] iommufd/selftest: Add a selftest for IOMMU_HWPT_ALLOC

[kvm-unit-tests PATCH v4 5/7] s390x: pv: Add sie entry intercept and validity test
 2023-05-15 14:00 UTC  (3+ messages)
` [kvm-unit-tests PATCH v5] "

[PATCH 0/9] KVM backports to 5.10
 2023-05-15 12:47 UTC  (2+ messages)

[PATCH -next v19 23/24] riscv: Enable Vector code to be built
 2023-05-15 12:04 UTC  (4+ messages)

[PATCH v5 1/6] mm/gup: remove unused vmas parameter from get_user_pages()
 2023-05-15 11:50 UTC  (8+ messages)
` [PATCH v5 2/6] mm/gup: remove unused vmas parameter from pin_user_pages_remote()
` [PATCH v5 3/6] mm/gup: remove vmas parameter from get_user_pages_remote()
` [PATCH v5 5/6] mm/gup: remove vmas parameter from pin_user_pages()

[PATCH -next v19 00/24] riscv: Add vector ISA support
 2023-05-15 11:42 UTC  (7+ messages)
` [PATCH -next v19 20/24] riscv: Add prctl controls for userspace vector management
` [PATCH -next v19 21/24] riscv: Add sysctl to set the default vector rule for new processes
` [PATCH -next v19 24/24] riscv: Add documentation for Vector

[PATCH v3 00/28] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
 2023-05-15 11:28 UTC  (32+ messages)
` [PATCH v3 01/28] drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"
` [PATCH v3 02/28] drm/i915/gvt: remove interface intel_gvt_is_valid_gfn
` [PATCH v3 03/28] drm/i915/gvt: Verify hugepages are contiguous in physical address space
` [PATCH v3 04/28] drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn()
` [PATCH v3 05/28] drm/i915/gvt: Explicitly check that vGPU is attached before shadowing
` [PATCH v3 06/28] drm/i915/gvt: Error out on an attempt to shadowing an unknown GTT entry type
` [PATCH v3 07/28] drm/i915/gvt: Don't rely on KVM's gfn_to_pfn() to query possible 2M GTT
` [PATCH v3 08/28] drm/i915/gvt: Use an "unsigned long" to iterate over memslot gfns
` [PATCH v3 09/28] drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt()
` [PATCH v3 10/28] drm/i915/gvt: Protect gfn hash table with vgpu_lock
` [PATCH v3 11/28] KVM: x86/mmu: Move kvm_arch_flush_shadow_{all,memslot}() to mmu.c
` [PATCH v3 12/28] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
` [PATCH v3 13/28] KVM: x86/mmu: Don't bounce through page-track mechanism for guest PTEs
` [PATCH v3 14/28] KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hook
` [PATCH v3 15/28] KVM: x86: Reject memslot MOVE operations if KVMGT is attached
` [PATCH v3 16/28] drm/i915/gvt: Don't bother removing write-protection on to-be-deleted slot
` [PATCH v3 17/28] KVM: x86: Add a new page-track hook to handle memslot deletion
` [PATCH v3 18/28] drm/i915/gvt: switch from ->track_flush_slot() to ->track_remove_region()
` [PATCH v3 19/28] KVM: x86: Remove the unused page-track hook track_flush_slot()
` [PATCH v3 20/28] KVM: x86/mmu: Move KVM-only page-track declarations to internal header
` [PATCH v3 21/28] KVM: x86/mmu: Use page-track notifiers iff there are external users
` [PATCH v3 22/28] KVM: x86/mmu: Drop infrastructure for multiple page-track modes
` [PATCH v3 23/28] KVM: x86/mmu: Rename page-track APIs to reflect the new reality
` [PATCH v3 24/28] KVM: x86/mmu: Assert that correct locks are held for page write-tracking
` [PATCH v3 25/28] KVM: x86/mmu: Bug the VM if write-tracking is used but not enabled
` [PATCH v3 26/28] KVM: x86/mmu: Drop @slot param from exported/external page-track APIs
` [PATCH v3 27/28] KVM: x86/mmu: Handle KVM bookkeeping in page-track APIs, not callers
` [PATCH v3 28/28] drm/i915/gvt: Drop final dependencies on KVM internal details

[PATCH v3 0/6] Expose GPU memory as coherently CPU accessible
 2023-05-15 11:18 UTC  (4+ messages)
` [PATCH v3 3/6] mm: handle poisoning of pfn without struct pages

[PATCH v5 00/10] Enhance vfio PCI hot reset for vfio cdev device
 2023-05-15  7:47 UTC  (14+ messages)
` [PATCH v5 01/10] vfio-iommufd: Create iommufd_access for noiommu devices
` [PATCH v5 02/10] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
` [PATCH v5 03/10] vfio/pci: Move the existing hot reset logic to be a helper
` [PATCH v5 04/10] vfio: Mark cdev usage in vfio_device
` [PATCH v5 05/10] iommufd: Reserve all negative IDs in the iommufd xarray
` [PATCH v5 06/10] vfio-iommufd: Add helper to retrieve iommufd_ctx and devid for vfio_device
` [PATCH v5 07/10] vfio: Add helper to search vfio_device in a dev_set
` [PATCH v5 08/10] iommufd: Add iommufd_ctx_has_group()
` [PATCH v5 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
` [PATCH v5 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET

[RFC PATCH v2 00/11] Intel IA32_SPEC_CTRL Virtualization
 2023-05-15  7:14 UTC  (5+ messages)
` [RFC PATCH v2 02/11] KVM: x86: Advertise CPUID.7.2.EDX and RRSBA_CTRL support
` [RFC PATCH v2 03/11] KVM: x86: Advertise BHI_CTRL support

[PATCH 0/2] RISCV: Add KVM_GET_REG_LIST API
 2023-05-15  6:24 UTC  (9+ messages)
` [PATCH 1/2] riscv: kvm: Add KVM_GET_REG_LIST API support

[PATCH v3 0/4] iommufd: Add iommu hardware info reporting
 2023-05-15  6:14 UTC  (4+ messages)
` [PATCH v3 3/4] iommufd: Add IOMMU_DEVICE_GET_HW_INFO

[PATCH v10 00/30] Add KVM LoongArch support
 2023-05-15  2:15 UTC  (31+ messages)
` [PATCH v10 01/30] LoongArch: KVM: Add kvm related header files
` [PATCH v10 02/30] LoongArch: KVM: Implement kvm module related interface
` [PATCH v10 03/30] LoongArch: KVM: Implement kvm hardware enable, disable interface
` [PATCH v10 04/30] LoongArch: KVM: Implement VM related functions
` [PATCH v10 05/30] LoongArch: KVM: Add vcpu related header files
` [PATCH v10 06/30] LoongArch: KVM: Implement vcpu create and destroy interface
` [PATCH v10 07/30] LoongArch: KVM: Implement vcpu run interface
` [PATCH v10 08/30] LoongArch: KVM: Implement vcpu handle exit interface
` [PATCH v10 09/30] LoongArch: KVM: Implement vcpu get, vcpu set registers
` [PATCH v10 10/30] LoongArch: KVM: Implement vcpu ENABLE_CAP ioctl interface
` [PATCH v10 11/30] LoongArch: KVM: Implement fpu related operations for vcpu
` [PATCH v10 12/30] LoongArch: KVM: Implement vcpu interrupt operations
` [PATCH v10 13/30] LoongArch: KVM: Implement misc vcpu related interfaces
` [PATCH v10 14/30] LoongArch: KVM: Implement vcpu load and vcpu put operations
` [PATCH v10 15/30] LoongArch: KVM: Implement vcpu status description
` [PATCH v10 16/30] LoongArch: KVM: Implement update VM id function
` [PATCH v10 17/30] LoongArch: KVM: Implement virtual machine tlb operations
` [PATCH v10 18/30] LoongArch: KVM: Implement vcpu timer operations
` [PATCH v10 19/30] LoongArch: KVM: Implement kvm mmu operations
` [PATCH v10 20/30] LoongArch: KVM: Implement handle csr excption
` [PATCH v10 21/30] LoongArch: KVM: Implement handle iocsr exception
` [PATCH v10 22/30] LoongArch: KVM: Implement handle idle exception
` [PATCH v10 23/30] LoongArch: KVM: Implement handle gspr exception
` [PATCH v10 24/30] LoongArch: KVM: Implement handle mmio exception
` [PATCH v10 25/30] LoongArch: KVM: Implement handle fpu exception
` [PATCH v10 26/30] LoongArch: KVM: Implement kvm exception vector
` [PATCH v10 27/30] LoongArch: KVM: Implement vcpu world switch
` [PATCH v10 28/30] LoongArch: KVM: Implement probe virtualization when LoongArch cpu init
` [PATCH v10 29/30] LoongArch: KVM: Enable kvm config and add the makefile
` [PATCH v10 30/30] LoongArch: KVM: Supplement kvm document about LoongArch-specific part

[PATCH v2 0/8] KVM: x86: Clean up MSR PAT handling
 2023-05-15  0:37 UTC  (5+ messages)
` [PATCH v2 5/8] KVM: x86: Use MTRR macros to define possible MTRR MSR ranges

QEMU developers fortnightly call for agenda for 2023-05-16
 2023-05-13 15:30 UTC  (4+ messages)

[PATCH v11 00/23] Add vfio_device cdev for iommufd support
 2023-05-13 13:28 UTC  (24+ messages)
` [PATCH v11 01/23] vfio: Allocate per device file structure
` [PATCH v11 02/23] vfio: Refine vfio file kAPIs for KVM
` [PATCH v11 03/23] vfio: Accept vfio device file in the KVM facing kAPI
` [PATCH v11 04/23] kvm/vfio: Rename kvm_vfio_group to prepare for accepting vfio device fd
` [PATCH v11 05/23] kvm/vfio: Accept vfio device file from userspace
` [PATCH v11 06/23] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
` [PATCH v11 07/23] vfio: Block device access via device fd until device is opened
` [PATCH v11 08/23] vfio: Add cdev_device_open_cnt to vfio_group
` [PATCH v11 09/23] vfio: Make vfio_device_open() single open for device cdev path
` [PATCH v11 10/23] vfio-iommufd: Move noiommu compat probe out of vfio_iommufd_bind()
` [PATCH v11 11/23] vfio-iommufd: Split bind/attach into two steps
` [PATCH v11 12/23] vfio: Record devid in vfio_device_file
` [PATCH v11 13/23] vfio-iommufd: Add detach_ioas support for physical VFIO devices
` [PATCH v11 14/23] iommufd/device: Add iommufd_access_detach() API
` [PATCH v11 15/23] vfio-iommufd: Add detach_ioas support for emulated VFIO devices
` [PATCH v11 16/23] vfio: Name noiommu vfio_device with "noiommu-" prefix
` [PATCH v11 17/23] vfio: Move vfio_device_group_unregister() to be the first operation in unregister
` [PATCH v11 18/23] vfio: Add cdev for vfio_device
` [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
` [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
` [PATCH v11 21/23] vfio: Determine noiommu device in __vfio_register_dev()
` [PATCH v11 22/23] vfio: Compile vfio_group infrastructure optionally
` [PATCH v11 23/23] docs: vfio: Add vfio device cdev description

[PATCH 0/5] s390/uvdevice: Expose secret UVCs
 2023-05-13  6:10 UTC  (8+ messages)
` [PATCH 1/5] s390/uvdevice: Add info IOCTL
` [PATCH 5/5] s390/uv: Update query for secret-UVCs

[PATCH v3 00/18] x86/reboot: KVM: Clean up "emergency" virt code
 2023-05-12 23:50 UTC  (19+ messages)
` [PATCH v3 01/18] x86/reboot: VMCLEAR active VMCSes before emergency reboot
` [PATCH v3 02/18] x86/reboot: Harden virtualization hooks for "
` [PATCH v3 03/18] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
` [PATCH v3 04/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM "
` [PATCH v3 05/18] x86/reboot: Disable virtualization during reboot iff callback is registered
` [PATCH v3 06/18] x86/reboot: Assert that IRQs are disabled when turning off virtualization
` [PATCH v3 07/18] x86/reboot: Hoist "disable virt" helpers above "emergency reboot" path
` [PATCH v3 08/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_{INTEL,AMD} is enabled
` [PATCH v3 09/18] x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
` [PATCH v3 10/18] x86/virt: KVM: Move VMXOFF helpers into "
` [PATCH v3 11/18] KVM: SVM: Make KVM_AMD depend on CPU_SUP_AMD or CPU_SUP_HYGON
` [PATCH v3 12/18] x86/virt: Drop unnecessary check on extended CPUID level in cpu_has_svm()
` [PATCH v3 13/18] x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()
` [PATCH v3 14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
` [PATCH v3 15/18] KVM: VMX: Ensure CPU is stable when probing basic VMX support
` [PATCH v3 16/18] x86/virt: KVM: Move "disable SVM" helper into KVM SVM
` [PATCH v3 17/18] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
` [PATCH v3 18/18] KVM: SVM: Use "standard" stgi() helper when disabling SVM

[PATCH 0/9] KVM: x86/mmu: Clean up MMU_DEBUG and BUG/WARN usage
 2023-05-12 23:40 UTC  (12+ messages)
` [PATCH 4/9] KVM: x86/mmu: Rename MMU_WARN_ON() to KVM_MMU_WARN_ON()
` [PATCH 5/9] KVM: x86/mmu: Convert "runtime" WARN_ON() assertions to WARN_ON_ONCE()
` [PATCH 6/9] KVM: x86/mmu: Bug the VM if a vCPU ends up in long mode without PAE enabled

[PATCH v2 0/2] KVM: Fix race between reboot and hardware enabling
 2023-05-12 23:31 UTC  (3+ messages)
` [PATCH v2 1/2] KVM: Use syscore_ops instead of reboot_notifier to hook restart/shutdown
` [PATCH v2 2/2] KVM: Don't enable hardware after a restart/shutdown is initiated

[ANNOUNCE / RFC] Periodic Upstream Call for KVM
 2023-05-12 23:10 UTC 

[PATCH v2 0/3] Allow the group FD to remain open when unplugging a device
 2023-05-12 21:29 UTC  (4+ messages)
` [PATCH v2 3/3] vfio: Make the group FD disassociate from the iommu_group

vPASID capability for VF
 2023-05-12 21:01 UTC  (6+ messages)

[PATCH 6.3 0/5] KVM CR0.WP series backport
 2023-05-12 18:24 UTC  (7+ messages)
` [PATCH 6.3 1/5] KVM: x86/mmu: Avoid indirect call for get_cr3
` [PATCH 6.3 2/5] KVM: x86: Do not unload MMU roots when only toggling CR0.WP with TDP enabled
` [PATCH 6.3 3/5] KVM: x86: Make use of kvm_read_cr*_bits() when testing bits
` [PATCH 6.3 4/5] KVM: VMX: Make CR0.WP a guest owned bit
` [PATCH 6.3 5/5] KVM: x86/mmu: Refresh CR0.WP prior to checking for emulated permission faults

Rename restrictedmem => guardedmem? (was: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM)
 2023-05-12 18:01 UTC  (11+ messages)

[PATCH v3 0/7] KVM: arm64: Add support for FEAT_TLBIRANGE
 2023-05-12 17:21 UTC  (7+ messages)
` [PATCH v3 2/7] KVM: arm64: Implement __kvm_tlb_flush_vmid_range()
` [PATCH v3 6/7] KVM: arm64: Add 'skip_flush' arg to stage2_put_pte()
` [PATCH v3 7/7] KVM: arm64: Use TLBI range-based intructions for unmap

[PATCH v8 0/6] Linear Address Masking (LAM) KVM Enabling
 2023-05-12 12:49 UTC  (3+ messages)
` [PATCH v8 6/6] KVM: x86: Expose LAM feature to userspace VMM


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).