KVM ARM Archive mirror
 help / color / mirror / Atom feed
 messages from 2021-11-17 15:37:29 to 2021-11-24 17:01:01 UTC [more...]

[RFC PATCH v3 00/29] KVM: arm64: Make CPU ID registers writable by userspace
 2021-11-24 17:00 UTC  (38+ messages)
` [RFC PATCH v3 01/29] KVM: arm64: Add has_reset_once flag for vcpu
` [RFC PATCH v3 02/29] KVM: arm64: Save ID registers' sanitized value per vCPU
` [RFC PATCH v3 03/29] KVM: arm64: Introduce struct id_reg_info
` [RFC PATCH v3 04/29] KVM: arm64: Make ID_AA64PFR0_EL1 writable
` [RFC PATCH v3 11/29] KVM: arm64: Make ID_DFR0_EL1 writable
` [RFC PATCH v3 21/29] KVM: arm64: Introduce framework to trap disabled features
` [RFC PATCH v3 29/29] KVM: arm64: selftests: Introduce id_reg_test

[kvm-unit-tests PATCH v8 00/10] MTTCG sanity tests for ARM
 2021-11-24 16:48 UTC  (16+ messages)
` [kvm-unit-tests PATCH v8 01/10] docs: mention checkpatch in the README
` [kvm-unit-tests PATCH v8 02/10] arm/flat.lds: don't drop debug during link
` [kvm-unit-tests PATCH v8 03/10] Makefile: add GNU global tags support
` [kvm-unit-tests PATCH v8 04/10] run_tests.sh: add --config option for alt test set
` [kvm-unit-tests PATCH v8 05/10] lib: add isaac prng library from CCAN
` [kvm-unit-tests PATCH v8 06/10] arm/tlbflush-code: TLB flush during code execution
` [kvm-unit-tests PATCH v8 07/10] arm/locking-tests: add comprehensive locking test
` [kvm-unit-tests PATCH v8 08/10] arm/barrier-litmus-tests: add simple mp and sal litmus tests
` [kvm-unit-tests PATCH v8 09/10] arm/run: use separate --accel form
` [kvm-unit-tests PATCH v8 10/10] arm/tcg-test: some basic TCG exercising tests

[PATCH 0/2] KVM/arm64: Early PSTATE evaluation fixes
 2021-11-24 13:11 UTC  (5+ messages)
` [PATCH 1/2] KVM: arm64: Save PSTATE early on exit
` [PATCH 2/2] KVM: arm64: Move pkvm's special 32bit handling into a generic infrastructure

[RFC PATCH 0/2] KVM: arm64: Host/Guest trace syncronization
 2021-11-24  9:45 UTC  (14+ messages)
` [RFC PATCH 1/2] arm64/tracing: add cntvct based trace clock
` [RFC PATCH 2/2] KVM: arm64: export cntvoff in debugfs

[PATCH v3 0/6] KVM: arm64: Emulate the OS lock
 2021-11-23 21:01 UTC  (7+ messages)
` [PATCH v3 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
` [PATCH v3 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
` [PATCH v3 3/6] KVM: arm64: Allow guest to set the OSLK bit
` [PATCH v3 4/6] KVM: arm64: Emulate the OS Lock
` [PATCH v3 5/6] selftests: KVM: Add OSLSR_EL1 to the list of blessed regs
` [PATCH v3 6/6] selftests: KVM: Test OS lock behavior

[RFC PATCH v2 00/11] KVM: arm64: Add support for hypercall services selection
 2021-11-23 18:48 UTC  (10+ messages)
` [RFC PATCH v2 02/11] KVM: Introduce kvm_vcpu_has_run_once
` [RFC PATCH v2 03/11] KVM: Introduce kvm_vm_has_run_once
` [RFC PATCH v2 04/11] KVM: arm64: Setup a framework for hypercall bitmap firmware registers

[PATCH MANUALSEL 5.10 5/5] KVM: arm64: Cap KVM_CAP_NR_VCPUS by kvm_arm_default_max_vcpus()
 2021-11-23 16:36 UTC 

[PATCH MANUALSEL 5.15 8/8] KVM: arm64: Cap KVM_CAP_NR_VCPUS by kvm_arm_default_max_vcpus()
 2021-11-23 16:36 UTC 

[PATCH 00/17] KVM: selftests: aarch64: Test userspace IRQ injection
 2021-11-23 15:06 UTC  (4+ messages)
` [PATCH 02/17] KVM: selftests: aarch64: add function for accessing GICv3 dist and redist registers

[PATCH v5.5 00/30] KVM: Scalable memslots implementation
 2021-11-23 14:42 UTC  (5+ messages)

[PATCH v2 0/5] KVM: arm64: Rework FPSIMD/SVE tracking
 2021-11-23 12:33 UTC  (9+ messages)
` [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving

[PATCH v5 00/12] KVM: x86/xen: Add in-kernel Xen event channel delivery
 2021-11-23  9:12 UTC  (14+ messages)
` [PATCH v5 01/12] KVM: Introduce CONFIG_HAVE_KVM_DIRTY_RING
` [PATCH v5 02/12] KVM: Add Makefile.kvm for common files, use it for x86
` [PATCH v5 03/12] KVM: s390: Use Makefile.kvm for common files
` [PATCH v5 04/12] KVM: mips: "
` [PATCH v5 05/12] KVM: RISC-V: "
` [PATCH v5 06/12] KVM: powerpc: "
` [PATCH v5 07/12] KVM: arm64: "
` [PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
` [PATCH v5 09/12] KVM: x86/xen: Maintain valid mapping of Xen shared_info page
` [PATCH v5 10/12] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery
` [PATCH v5 11/12] KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty
` [PATCH v5 12/12] KVM: x86: First attempt at converting nested virtual APIC page to gpc

[PATCH 0/4] KVM: arm64: Improve PMU support on heterogeneous systems
 2021-11-22 14:43 UTC  (9+ messages)
` [PATCH 3/4] KVM: arm64: Add KVM_ARM_VCPU_PMU_V3_SET_PMU attribute
` [PATCH 4/4] KVM: arm64: Refuse to run VCPU if the PMU doesn't match the physical CPU

[PATCH v4 0/4] kvm/arm: New VMID allocator based on asid
 2021-11-22 12:18 UTC  (5+ messages)
` [PATCH v4 1/4] KVM: arm64: Introduce a new VMID allocator for KVM
` [PATCH v4 2/4] KVM: arm64: Make VMID bits accessible outside of allocator
` [PATCH v4 3/4] KVM: arm64: Align the VMID allocation with the arm64 ASID
` [PATCH v4 4/4] KVM: arm64: Make active_vmids invalid on vCPU schedule out

[PATCH 0/2] KVM: arm64: nv: Fix issue with Stage 2 MMU init for Nested case
 2021-11-22  9:58 UTC  (3+ messages)
` [PATCH 1/2] KVM: arm64: Use appropriate mmu pointer in stage2 page table init
` [PATCH 2/2] KVM: arm64: nv: fixup! Support multiple nested Stage-2 mmu structures

PATCH v4 00/11] KVM: x86/xen: Add in-kernel Xen event channel delivery
 2021-11-20 18:20 UTC  (17+ messages)
` [PATCH v4 01/11] KVM: Introduce CONFIG_HAVE_KVM_DIRTY_RING
` [PATCH v4 02/11] KVM: Add Makefile.kvm for common files, use it for x86
` [PATCH v4 03/11] KVM: s390: Use Makefile.kvm for common files
` [PATCH v4 04/11] KVM: mips: "
` [PATCH v4 05/11] KVM: RISC-V: "
` [PATCH v4 06/11] KVM: powerpc: "
` [PATCH v4 07/11] KVM: arm64: "
` [PATCH v4 08/11] KVM: Reinstate gfn_to_pfn_cache with invalidation support
` [PATCH v4 09/11] KVM: x86/xen: Maintain valid mapping of Xen shared_info page
` [PATCH v4 10/11] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery
` [PATCH v4 11/11] KVM: x86: First attempt at converting nested virtual APIC page to gpc
` [PATCH v4 12/11] KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty

[kvm-unit-tests PATCH v4 0/3] GIC ITS tests
 2021-11-19 18:32 UTC  (5+ messages)
` [kvm-unit-tests PATCH v4 1/3] arm64: remove invalid check from its-trigger test
` [kvm-unit-tests PATCH v4 2/3] arm64: enable its-migration tests for TCG
` [kvm-unit-tests PATCH v4 3/3] arch-run: do not process ERRATA when running under TCG

[kvm-unit-tests PATCH v3 0/3] GIC ITS tests
 2021-11-19 18:30 UTC  (6+ messages)

[PATCH v3 00/12] KVM: x86/xen: Add in-kernel Xen event channel delivery
 2021-11-19  9:23 UTC  (27+ messages)
` [PATCH v3 01/12] KVM: Introduce CONFIG_HAVE_KVM_DIRTY_RING
` [PATCH v3 02/12] KVM: Add Makefile.kvm for common files, use it for x86
` [PATCH v3 03/12] KVM: s390: Use Makefile.kvm for common files
` [PATCH v3 04/12] KVM: mips: "
` [PATCH v3 05/12] KVM: RISC-V: "
` [PATCH v3 06/12] KVM: powerpc: "
` [PATCH v3 07/12] KVM: arm64: "
` [PATCH v3 08/12] KVM: Propagate vcpu explicitly to mark_page_dirty_in_slot()
` [PATCH v3 09/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
` [PATCH v3 10/12] KVM: x86/xen: Maintain valid mapping of Xen shared_info page
` [PATCH v3 11/12] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery
` [PATCH v3 12/12] KVM: x86: First attempt at converting nested virtual APIC page to gpc

[RFC PATCH v5 kvmtool 0/4] arm64: KVM SPE support
 2021-11-17 15:43 UTC  (5+ messages)
` [RFC PATCH v5 kvmtool 1/4] update_headers: Sync KVM UAPI headers with KVM SPE implementation
` [RFC PATCH v5 kvmtool 2/4] arm/arm64: Make kvm__arch_delete_ram() aarch32/aarch64 specific
` [RFC PATCH v5 kvmtool 3/4] init: Add last_{init, exit} list macros
` [RFC PATCH v5 kvmtool 4/4] arm64: Add SPE support

[RFC PATCH v5 00/38] KVM: arm64: Add Statistical Profiling Extension (SPE) support
 2021-11-17 15:38 UTC  (28+ messages)
` [RFC PATCH v5 12/38] KVM: arm64: Allow userspace to lock and unlock memslots
` [RFC PATCH v5 13/38] KVM: arm64: Add CONFIG_KVM_ARM_SPE Kconfig option
` [RFC PATCH v5 14/38] KVM: arm64: Add SPE capability and VCPU feature
` [RFC PATCH v5 15/38] perf: arm_spe_pmu: Move struct arm_spe_pmu to a separate header file
` [RFC PATCH v5 16/38] KVM: arm64: Allow SPE emulation when the SPE hardware is present
` [RFC PATCH v5 17/38] KVM: arm64: Allow userspace to set the SPE feature only if SPE "
` [RFC PATCH v5 18/38] KVM: arm64: Expose SPE version to guests
` [RFC PATCH v5 19/38] KVM: arm64: Do not run a VCPU on a CPU without SPE
` [RFC PATCH v5 20/38] KVM: arm64: Add a new VCPU device control group for SPE
` [RFC PATCH v5 21/38] KVM: arm64: Add SPE VCPU device attribute to set the interrupt number
` [RFC PATCH v5 22/38] KVM: arm64: Add SPE VCPU device attribute to initialize SPE
` [RFC PATCH v5 23/38] KVM: arm64: debug: Configure MDCR_EL2 when a VCPU has SPE
` [RFC PATCH v5 24/38] KVM: arm64: Move accesses to MDCR_EL2 out of __{activate, deactivate}_traps_common
` [RFC PATCH v5 25/38] KVM: arm64: VHE: Change MDCR_EL2 at world switch if VCPU has SPE
` [RFC PATCH v5 26/38] KVM: arm64: Add SPE system registers to VCPU context
` [RFC PATCH v5 27/38] KVM: arm64: nVHE: Save PMSCR_EL1 to the host context
` [RFC PATCH v5 28/38] KVM: arm64: Rename DEBUG_STATE_SAVE_SPE -> DEBUG_SAVE_SPE_BUFFER flags
` [RFC PATCH v5 29/38] KVM: arm64: nVHE: Context switch SPE state if VCPU has SPE
` [RFC PATCH v5 30/38] KVM: arm64: VHE: "
` [RFC PATCH v5 31/38] KVM: arm64: Save/restore PMSNEVFR_EL1 on VCPU put/load
` [RFC PATCH v5 32/38] KVM: arm64: Allow guest to use physical timestamps if perfmon_capable()
` [RFC PATCH v5 33/38] KVM: arm64: Emulate SPE buffer management interrupt
` [RFC PATCH v5 34/38] KVM: arm64: Add an userspace API to stop a VCPU profiling
` [RFC PATCH v5 35/38] KVM: arm64: Implement "
` [RFC PATCH v5 36/38] KVM: arm64: Add PMSIDR_EL1 to the SPE register context
` [RFC PATCH v5 37/38] KVM: arm64: Make CONFIG_KVM_ARM_SPE depend on !CONFIG_NUMA_BALANCING
` [RFC PATCH v5 38/38] KVM: arm64: Allow userspace to enable SPE for guests


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).