KVM Archive mirror
 help / color / mirror / Atom feed
 messages from 2024-03-19 08:00:01 to 2024-03-20 10:19:45 UTC [more...]

[PATCH v3] vhost/vdpa: Add MSI translation tables to iommu for software-managed MSI
 2024-03-20 10:19 UTC 

[PATCH vhost v3 0/4] refactor the params of find_vqs()
 2024-03-20  9:54 UTC  (13+ messages)
` [PATCH vhost v3 1/4] virtio: find_vqs: pass struct instead of multi parameters

[PATCH RFC v3 00/49] Add AMD Secure Nested Paging (SEV-SNP) support
 2024-03-20  9:59 UTC  (57+ messages)
` [PATCH v3 01/49] Revert "linux-headers hack" from sevinit2 base tree
` [PATCH v3 02/49] scripts/update-linux-headers: Add setup_data.h to import list
` [PATCH v3 03/49] scripts/update-linux-headers: Add bits.h to file imports
` [PATCH v3 04/49] [HACK] linux-headers: Update headers for 6.8 + kvm-coco-queue + SNP
` [PATCH v3 05/49] [TEMP] hw/i386: Remove redeclaration of struct setup_data
` [PATCH v3 06/49] RAMBlock: Add support of KVM private guest memfd
` [PATCH v3 07/49] HostMem: Add mechanism to opt in kvm guest memfd via MachineState
` [PATCH v3 08/49] trace/kvm: Split address space and slot id in trace_kvm_set_user_memory()
` [PATCH v3 09/49] kvm: Enable KVM_SET_USER_MEMORY_REGION2 for memslot
` [PATCH v3 10/49] kvm: Introduce support for memory_attributes
` [PATCH v3 11/49] physmem: Introduce ram_block_discard_guest_memfd_range()
` [PATCH v3 12/49] kvm: handle KVM_EXIT_MEMORY_FAULT
` [PATCH v3 13/49] [FIXUP] "kvm: handle KVM_EXIT_MEMORY_FAULT": drop qemu_host_page_size
` [PATCH v3 14/49] trace/kvm: Add trace for page convertion between shared and private
` [PATCH v3 15/49] kvm/memory: Make memory type private by default if it has guest memfd backend
` [PATCH v3 16/49] memory: Introduce memory_region_init_ram_guest_memfd()
` [PATCH v3 17/49] pci-host/q35: Move PAM initialization above SMRAM initialization
` [PATCH v3 18/49] q35: Introduce smm_ranges property for q35-pci-host
` [PATCH v3 19/49] kvm: Make kvm_convert_memory() obey ram_block_discard_is_enabled()
` [PATCH v3 20/49] trace/kvm: Add trace for KVM_EXIT_MEMORY_FAULT
` [PATCH v3 21/49] i386/sev: Introduce "sev-common" type to encapsulate common SEV state
` [PATCH v3 22/49] i386/sev: Introduce 'sev-snp-guest' object
` [PATCH v3 23/49] i386/sev: Add a sev_snp_enabled() helper
` [PATCH v3 24/49] target/i386: Add handling for KVM_X86_SNP_VM VM type
` [PATCH v3 25/49] i386/sev: Skip RAMBlock notifiers for SNP
` [PATCH v3 26/49] i386/sev: Skip machine-init-done "
` [PATCH v3 27/49] i386/sev: Set ms->require_guest_memfd "
` [PATCH v3 28/49] i386/sev: Disable SMM "
` [PATCH v3 29/49] i386/sev: Don't disable block discarding "
` [PATCH v3 30/49] i386/cpu: Set SEV-SNP CPUID bit when SNP enabled
` [PATCH v3 31/49] i386/sev: Update query-sev QAPI format to handle SEV-SNP
` [PATCH v3 32/49] i386/sev: Don't return launch measurements for SEV-SNP guests
` [PATCH v3 33/49] kvm: Make kvm_convert_memory() non-static
` [PATCH v3 34/49] i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State Changes
` [PATCH v3 35/49] i386/sev: Add KVM_EXIT_VMGEXIT handling for Page State Changes (MSR-based)
` [PATCH v3 36/49] i386/sev: Add KVM_EXIT_VMGEXIT handling for Extended Guest Requests
` [PATCH v3 37/49] i386/sev: Add the SNP launch start context
` [PATCH v3 38/49] i386/sev: Add handling to encrypt/finalize guest launch data
` [PATCH v3 39/49] i386/sev: Set CPU state to protected once SNP guest payload is finalized
` [PATCH v3 40/49] hw/i386/sev: Add function to get SEV metadata from OVMF header
` [PATCH v3 41/49] i386/sev: Add support for populating OVMF metadata pages
` [PATCH v3 42/49] i386/sev: Add support for SNP CPUID validation
` [PATCH v3 43/49] qapi, i386: Move kernel-hashes to SevCommonProperties
` [PATCH v3 44/49] i386/sev: Extract build_kernel_loader_hashes
` [PATCH v3 45/49] i386/sev: Reorder struct declarations
` [PATCH v3 46/49] i386/sev: Allow measured direct kernel boot on SNP
` [PATCH v3 47/49] hw/i386/sev: Add support to encrypt BIOS when SEV-SNP is enabled
` [PATCH v3 48/49] hw/i386/sev: Use guest_memfd for legacy ROMs
` [PATCH v3 49/49] hw/i386: Add support for loading BIOS using guest_memfd

REGRESSION: RIP: 0010:skb_release_data+0xb8/0x1e0 in vhost/tun
 2024-03-20  9:33 UTC  (9+ messages)

[RFC RESEND 00/16] Split IOMMU DMA mapping operation to two steps
 2024-03-20  8:55 UTC  (12+ messages)

[PATCH 00/12] PCI device authentication
 2024-03-20  8:33 UTC  (5+ messages)
` [PATCH 07/12] spdm: Introduce library to authenticate devices

[PATCH 0/3] KVM: Fix for a mostly benign gpc WARN
 2024-03-20  8:20 UTC  (7+ messages)
` [PATCH 1/3] KVM: Add helpers to consolidate gfn_to_pfn_cache's page split check
` [PATCH 2/3] KVM: Check validity of offset+length of gfn_to_pfn_cache prior to activation
` [PATCH 3/3] KVM: Explicitly disallow activatating a gfn_to_pfn_cache with INVALID_GPA

[PATCH v19 000/130] KVM TDX basic feature support
 2024-03-20  8:15 UTC  (29+ messages)
` [PATCH v19 011/130] KVM: Add new members to struct kvm_gfn_range to operate on
` [PATCH v19 029/130] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v19 030/130] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v19 038/130] KVM: TDX: create/destroy VM structure
` [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v19 040/130] KVM: TDX: Make pmu_intel.c ignore guest TD case
` [PATCH v19 059/130] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v19 098/130] KVM: TDX: Add a place holder to handle TDX VM exit

[PATCH v2] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
 2024-03-20  5:07 UTC 

[PATCH v4 0/2] kvm: add support for guest physical bits
 2024-03-20  2:44 UTC  (3+ messages)
` [PATCH v4 1/2] "

[BUG net-next] arch/x86/kernel/cpu/bugs.c:2935: "Unpatched return thunk in use. This should not happen!" [STACKTRACE]
 2024-03-20  1:28 UTC  (3+ messages)

[RFC PATCH 0/4] KVM: x86/mmu: Rework marking folios dirty/accessed
 2024-03-20  0:50 UTC  (5+ messages)
` [RFC PATCH 1/4] KVM: x86/mmu: Skip the "try unsync" path iff the old SPTE was a leaf SPTE
` [RFC PATCH 2/4] KVM: x86/mmu: Mark folio dirty when creating SPTE, not when zapping/modifying
` [RFC PATCH 3/4] KVM: x86/mmu: Mark page/folio accessed only when zapping leaf SPTEs
` [RFC PATCH 4/4] KVM: x86/mmu: Don't force flush if SPTE update clears Accessed bit

folio_mmapped
 2024-03-19 23:54 UTC  (21+ messages)
              ` folio_mmapped

[PATCH v5 0/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
 2024-03-19 21:08 UTC  (8+ messages)
` [PATCH v5 1/3] KVM: selftests: aarch64: Add helper function for the vpmu vcpu creation
` [PATCH v5 2/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
` [PATCH v5 3/3] KVM: selftests: aarch64: Add invalid filter test in pmu_event_filter_test

[PATCH v4 00/15] KVM: SEV: allow customizing VMSA features
 2024-03-19 20:07 UTC  (8+ messages)
` [PATCH v4 09/15] KVM: SEV: sync FPU and AVX state at LAUNCH_UPDATE_VMSA time
` [PATCH v4 16/15] fixup! "
` [PATCH v4 17/15] selftests: kvm: split "launch" phase of SEV VM creation
` [PATCH v4 18/15] selftests: kvm: add test for transferring FPU state into the VMSA

[RFC PATCH v3 0/5] Add PSCI v1.3 SYSTEM_OFF2 support for hibernation
 2024-03-19 19:41 UTC  (11+ messages)
` [RFC PATCH v3 1/5] firmware/psci: Add definitions for PSCI v1.3 specification (ALPHA)
` [RFC PATCH v3 2/5] KVM: arm64: Add support for PSCI v1.2 and v1.3
` [RFC PATCH v3 3/5] KVM: arm64: Add PSCI v1.3 SYSTEM_OFF2 function for hibernation
` [RFC PATCH v3 4/5] KVM: arm64: nvhe: Pass through PSCI v1.3 SYSTEM_OFF2 call
` [RFC PATCH v3 5/5] arm64: Use SYSTEM_OFF2 PSCI call to power off for hibernate

[GIT PULL] virtio: features, fixes
 2024-03-19 19:24 UTC  (4+ messages)

[RFC PATCH 0/3] powerpc: pSeries: vfio: iommu: Re-enable support for SPAPR TCE VFIO
 2024-03-19 18:36 UTC  (4+ messages)
` [RFC PATCH 1/3] powerpc/pseries/iommu: Bring back userspace view for single level TCE tables

[PATCH v7] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
 2024-03-19 18:18 UTC  (12+ messages)

[PATCH 0/2] KVM: s390: Fix V!=R bug in STFLE shadowing
 2024-03-19 16:44 UTC  (3+ messages)
` [PATCH RESEND 1/2] KVM: s390: Minor refactor of base/ext facility lists
` [PATCH 2/2] KVM: s390: vsie: Use virt_to_phys for facility control block

[PATCH v2] KVM: arm64: Add KVM_CAP to control WFx trapping
 2024-03-19 16:43 UTC 

[PATCH RFC not-to-be-merged] KVM: SVM: Workaround overly strict CR3 check by Hyper-V
 2024-03-19 16:34 UTC 

[RFC PATCH 0/8] KVM: Prepopulate guest memory API
 2024-03-19 16:33 UTC  (12+ messages)
` [RFC PATCH 5/8] KVM: x86/mmu: Introduce kvm_mmu_map_page() for prepopulating guest memory
` [RFC PATCH 6/8] KVM: x86: Implement kvm_arch_{, pre_}vcpu_map_memory()

[syzbot] [kvm?] WARNING in __kvm_gpc_refresh
 2024-03-19 15:57 UTC  (6+ messages)

[PATCH v8] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
 2024-03-19 15:23 UTC  (2+ messages)

[PATCH 0/1] Reenable runtime PM for dynamically unbound devices
 2024-03-19 14:50 UTC  (3+ messages)
` [PATCH 1/1] vfio/pci: "

[PATCH] arch/powerpc/kvm: Add support for reading VPA counters for pseries guests
 2024-03-19 14:28 UTC 

[PATCH v3 0/7] Handle faults in KUnit tests
 2024-03-19 10:48 UTC  (8+ messages)
` [PATCH v3 1/7] kunit: Handle thread creation error
` [PATCH v3 2/7] kunit: Fix kthread reference
` [PATCH v3 3/7] kunit: Fix timeout message
` [PATCH v3 4/7] kunit: Handle test faults
` [PATCH v3 5/7] kunit: Fix KUNIT_SUCCESS() calls in iov_iter tests
` [PATCH v3 6/7] kunit: Print last test location on fault
` [PATCH v3 7/7] kunit: Add tests for fault

Re: Re: EEVDF/vhost regression (bisected to 86bfbb7ce4f6 sched/fair: Add lag based placement)
 2024-03-19  8:59 UTC  (9+ messages)
          `  "

[kvm-unit-tests PATCH v7 00/35] migration, powerpc improvements
 2024-03-19  7:59 UTC  (30+ messages)
` [kvm-unit-tests PATCH v7 07/35] common: add memory dirtying vs migration test
` [kvm-unit-tests PATCH v7 08/35] powerpc: Fix KVM caps on POWER9 hosts
` [kvm-unit-tests PATCH v7 09/35] powerpc: Fix stack backtrace termination
` [kvm-unit-tests PATCH v7 10/35] powerpc: interrupt stack backtracing
` [kvm-unit-tests PATCH v7 11/35] powerpc/sprs: Specify SPRs with data rather than code
` [kvm-unit-tests PATCH v7 12/35] powerpc/sprs: Avoid taking PMU interrupts caused by register fuzzing
` [kvm-unit-tests PATCH v7 13/35] doc: start documentation directory with unittests.cfg doc
` [kvm-unit-tests PATCH v7 14/35] scripts: allow machine option to be specified in unittests.cfg
` [kvm-unit-tests PATCH v7 15/35] scripts: Accommodate powerpc powernv machine differences
` [kvm-unit-tests PATCH v7 16/35] powerpc: Support powernv machine with QEMU TCG
` [kvm-unit-tests PATCH v7 17/35] powerpc: Fix emulator illegal instruction test for powernv
` [kvm-unit-tests PATCH v7 18/35] powerpc/sprs: Test hypervisor registers on powernv machine
` [kvm-unit-tests PATCH v7 19/35] powerpc: general interrupt tests
` [kvm-unit-tests PATCH v7 20/35] powerpc: Add rtas stop-self support
` [kvm-unit-tests PATCH v7 21/35] powerpc: Remove broken SMP exception stack setup
` [kvm-unit-tests PATCH v7 22/35] powerpc: add SMP and IPI support
` [kvm-unit-tests PATCH v7 23/35] powerpc: Permit ACCEL=tcg,thread=single
` [kvm-unit-tests PATCH v7 24/35] powerpc: Avoid using larx/stcx. in spinlocks when only one CPU is running
` [kvm-unit-tests PATCH v7 25/35] powerpc: Add atomics tests
` [kvm-unit-tests PATCH v7 26/35] powerpc: Add timebase tests
` [kvm-unit-tests PATCH v7 27/35] powerpc: Add MMU support
` [kvm-unit-tests PATCH v7 28/35] common/sieve: Use vmalloc.h for setup_mmu definition
` [kvm-unit-tests PATCH v7 29/35] common/sieve: Support machines without MMU
` [kvm-unit-tests PATCH v7 30/35] powerpc: Add sieve.c common test
` [kvm-unit-tests PATCH v7 31/35] powerpc: add usermode support
` [kvm-unit-tests PATCH v7 32/35] powerpc: add pmu tests
` [kvm-unit-tests PATCH v7 33/35] configure: Make arch_libdir a first-class entity
` [kvm-unit-tests PATCH v7 34/35] powerpc: Remove remnants of ppc64 directory and build structure
` [kvm-unit-tests PATCH v7 35/35] powerpc: gitlab CI update


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).