kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-07-31 15:10:19 to 2019-08-02 02:27:11 UTC [more...]

[PATCH 00/34] put_user_pages(): miscellaneous call sites
 2019-08-02  2:20 UTC  (33+ messages)
` [PATCH 03/34] net/ceph: convert put_page() to put_user_page*()
` [PATCH 04/34] x86/kvm: "
` [PATCH 05/34] drm/etnaviv: convert release_pages() to put_user_pages()
` [PATCH 06/34] drm/i915: convert put_page() to put_user_page*()
` [PATCH 07/34] drm/radeon: "
` [PATCH 08/34] media/ivtv: "
` [PATCH 09/34] media/v4l2-core/mm: "
` [PATCH 10/34] genwqe: "
` [PATCH 11/34] scif: "
` [PATCH 12/34] vmci: "
` [PATCH 13/34] rapidio: "
` [PATCH 14/34] oradax: "
` [PATCH 15/34] staging/vc04_services: "
` [PATCH 16/34] drivers/tee: "
` [PATCH 17/34] vfio: "
` [PATCH 18/34] fbdev/pvr2fb: "
` [PATCH 19/34] fsl_hypervisor: "
` [PATCH 20/34] xen: "
` [PATCH 21/34] fs/exec.c: "
` [PATCH 22/34] orangefs: "
` [PATCH 23/34] uprobes: "
` [PATCH 24/34] futex: "
` [PATCH 25/34] mm/frame_vector.c: "
` [PATCH 26/34] mm/gup_benchmark.c: "
` [PATCH 27/34] mm/memory.c: "
` [PATCH 28/34] mm/madvise.c: "
` [PATCH 29/34] mm/process_vm_access.c: "
` [PATCH 30/34] crypt: "
` [PATCH 31/34] nfs: "
` [PATCH 32/34] goldfish_pipe: "
` [PATCH 33/34] kernel/events/core.c: "
` [PATCH 34/34] fs/binfmt_elf: "

[PATCH 00/34] put_user_pages(): miscellaneous call sites
 2019-08-02  2:16 UTC  (3+ messages)
` [PATCH 01/34] mm/gup: add make_dirty arg to put_user_pages_dirty_lock()
` [PATCH 02/34] net/rds: convert put_page() to put_user_page*()

[PATCH] KVM: Disable wake-affine vCPU process to mitigate lock holder preemption
 2019-08-02  0:51 UTC  (5+ messages)

[PATCH v3 1/3] KVM: Fix leak vCPU's VMCS value into other pCPU
 2019-08-02  0:46 UTC  (4+ messages)
` [PATCH v3 2/3] KVM: LAPIC: Don't need to wakeup vCPU twice afer timer fire
` [PATCH v3 3/3] KVM: Check preempted_in_kernel for involuntary preemption

[PATCH v3 0/6] mm / virtio: Provide support for unused page reporting
 2019-08-01 22:43 UTC  (9+ messages)
` [PATCH v3 1/6] mm: Adjust shuffle code to allow for future coalescing
` [PATCH v3 2/6] mm: Move set/get_pcppage_migratetype to mmzone.h
` [PATCH v3 3/6] mm: Use zone and order instead of free area in free_list manipulators
` [PATCH v3 4/6] mm: Introduce Reported pages
` [PATCH v3 5/6] virtio-balloon: Pull page poisoning config out of free page hinting
` [PATCH v3 6/6] virtio-balloon: Add support for providing unused page reports to host
` [PATCH v3 QEMU 1/2] virtio-ballon: Implement support for page poison tracking feature
` [PATCH v3 QEMU 2/2] virtio-balloon: Provide a interface for unused page reporting

[patch 0/5] posix-cpu-timers: Move expiry into task work context
 2019-08-01 21:47 UTC  (19+ messages)
` [patch 1/5] tracehook: Provide TIF_NOTIFY_RESUME handling for KVM
` [patch 2/5] x86/kvm: Handle task_work on VMENTER/EXIT
` [patch 3/5] posix-cpu-timers: Split run_posix_cpu_timers()
` [patch 4/5] posix-cpu-timers: Defer timer handling to task_work
` [patch 5/5] x86: Select POSIX_CPU_TIMERS_TASK_WORK

[PATCH] KVM: x86: Unconditionally call x86 ops that are always implemented
 2019-08-01 21:42 UTC  (3+ messages)

[PATCH 0/3] KVM: x86/mmu: minor MMIO SPTE cleanup
 2019-08-01 20:35 UTC  (4+ messages)
` [PATCH 1/3] KVM: x86: Rename access permissions cache member in struct kvm_vcpu_arch
` [PATCH 2/3] KVM: x86/mmu: Add explicit access mask for MMIO SPTEs
` [PATCH 3/3] KVM: x86/mmu: Consolidate "is MMIO SPTE" code

[PATCH] cpuidle-haltpoll: Enable kvm guest polling when dedicated physical CPUs are available
 2019-08-01 16:54 UTC  (3+ messages)

[PATCH v19 00/15] arm64: untag user pointers passed to the kernel
 2019-08-01 16:45 UTC  (9+ messages)
` [PATCH v19 02/15] arm64: Introduce prctl() options to control the tagged user addresses ABI

[PATCH v2 00/11] VSOCK: add vsock_test test suite
 2019-08-01 16:16 UTC  (15+ messages)
` [PATCH v2 01/11] VSOCK: fix header include in vsock_diag_test
` [PATCH v2 02/11] VSOCK: add SPDX identifiers to vsock tests
` [PATCH v2 03/11] VSOCK: extract utility functions from vsock_diag_test.c
` [PATCH v2 04/11] VSOCK: extract connect/accept "
` [PATCH v2 05/11] VSOCK: add full barrier between test cases
` [PATCH v2 06/11] VSOCK: add send_byte()/recv_byte() test utilities
` [PATCH v2 07/11] VSOCK: add AF_VSOCK test cases
` [PATCH v2 08/11] VSOCK: add vsock_get_local_cid() test utility
` [PATCH v2 09/11] vsock_test: add --transport parameter
` [PATCH v2 10/11] vsock_test: skip read() in test_stream*close tests on a VMCI host
` [PATCH v2 11/11] vsock_test: wait for the remote to close the connection

[PATCH 0/5] x86: KVM: svm: get rid of hardcoded instructions lengths
 2019-08-01 14:43 UTC  (8+ messages)
` [PATCH 1/5] x86: KVM: svm: don't pretend to advance RIP in case wrmsr_interception() results in #GP
` [PATCH 2/5] x86: KVM: svm: avoid flooding logs when skip_emulated_instruction() fails
` [PATCH 3/5] x86: KVM: svm: clear interrupt shadow on all paths in skip_emulated_instruction()
` [PATCH 4/5] x86: KVM: add xsetbv to the emulator
` [PATCH 5/5] x86: KVM: svm: remove hardcoded instruction length from intercepts

[PATCH V2 0/9] Fixes for metadata accelreation
 2019-08-01 14:15 UTC  (15+ messages)
` [PATCH V2 4/9] vhost: reset invalidate_count in vhost_set_vring_num_addr()
` [PATCH V2 7/9] vhost: do not use RCU to synchronize MMU notifier with worker

[PATCH] KVM: selftests: Update gitignore file for latest changes
 2019-08-01 13:58 UTC  (2+ messages)

[PATCH v4 0/5] vsock/virtio: optimizations to increase the throughput
 2019-08-01 13:36 UTC  (13+ messages)
` [PATCH v4 1/5] vsock/virtio: limit the memory used per-socket

[Bug 204401] New: After a VMexit, the guest is re-entring with a wrong vcpu PC address which is causing the guest to crash
 2019-08-01 12:04 UTC 

[PATCH 00/12] block/bio, fs: convert put_page() to put_user_page*()
 2019-08-01  8:20 UTC  (7+ messages)
` [PATCH 03/12] block: bio_release_pages: use flags arg instead of bool

[PATCH 0/3] KVM: X86: Some tracepoint enhancements
 2019-08-01  3:39 UTC  (6+ messages)
` [PATCH 1/3] KVM: X86: Trace vcpu_id for vmexit
` [PATCH 2/3] KVM: X86: Remove tailing newline for tracepoints

[PATCH 3/3] KVM: Fix leak vCPU's VMCS value into other pCPU
 2019-08-01  3:35 UTC  (4+ messages)
` [PATCH v2 "

[PATCH RFC 0/5] x86/KVM/svm: get rid of hardcoded instructions lengths
 2019-08-01  0:17 UTC  (11+ messages)
` [PATCH RFC 3/5] x86: KVM: svm: clear interrupt shadow on all paths in skip_emulated_instruction()

[PATCH v5 0/7] s390: vfio-ap: dynamic configuration support
 2019-07-31 22:41 UTC  (8+ messages)
` [PATCH v5 1/7] s390: vfio-ap: Refactor vfio_ap driver probe and remove callbacks
` [PATCH v5 2/7] s390: zcrypt: driver callback to indicate resource in use
` [PATCH v5 3/7] s390: vfio-ap: implement in-use callback for vfio_ap driver
` [PATCH v5 4/7] s390: vfio-ap: allow assignment of unavailable AP resources to mdev device
` [PATCH v5 5/7] s390: vfio-ap: allow hot plug/unplug of AP resources using "
` [PATCH v5 6/7] s390: vfio-ap: add logging to vfio_ap driver
` [PATCH v5 7/7] s390: vfio-ap: update documentation

[PATCH] vfio: re-arrange vfio region definitions
 2019-07-31 21:33 UTC  (4+ messages)

[PATCH v2 1/2] KVM: remove kvm_arch_has_vcpu_debugfs()
 2019-07-31 18:56 UTC  (2+ messages)
` [PATCH v2 2/2] KVM: no need to check return value of debugfs_create functions

[GIT PULL] KVM/arm updates for 5.3-rc3
 2019-07-31 17:36 UTC  (6+ messages)
` [PATCH 1/5] KVM: arm/arm64: Introduce kvm_pmu_vcpu_init() to setup PMU counter index
` [PATCH 2/5] arm64: KVM: regmap: Fix unexpected switch fall-through
` [PATCH 3/5] KVM: arm: vgic-v3: Mark expected "
` [PATCH 4/5] KVM: arm64: Update kvm_arm_exception_class and esr_class_str for new EC
` [PATCH 5/5] arm64: KVM: hyp: debug-sr: Mark expected switch fall-through

[PATCH 1/3] KVM: Don't need to wakeup vCPU twice afer timer fire
 2019-07-31 16:39 UTC  (4+ messages)

[RFC v2 00/27] Kernel Address Space Isolation
 2019-07-31 16:31 UTC  (8+ messages)

[Bug 203477] New: [AMD][KVM] Windows L1 guest becomes extremely slow and unusable after enabling Hyper-V
 2019-07-31 16:01 UTC  (2+ messages)
` [Bug 203477] "

[PATCH v3 0/3] KVM: selftests: Enable ucall and dirty_log_test on s390x
 2019-07-31 15:15 UTC  (4+ messages)
` [PATCH v3 1/3] KVM: selftests: Split ucall.c into architecture specific files
` [PATCH v3 2/3] KVM: selftests: Implement ucall() for s390x
` [PATCH v3 3/3] KVM: selftests: Enable dirty_log_test on s390x

[PATCHv2 00/59] Intel MKTME enabling
 2019-07-31 15:08 UTC  (39+ messages)
` [PATCHv2 01/59] mm: Do no merge VMAs with different encryption KeyIDs
` [PATCHv2 03/59] mm/ksm: Do not merge pages with different KeyIDs
` [PATCHv2 06/59] mm/khugepaged: Handle encrypted pages
` [PATCHv2 07/59] x86/mm: Mask out KeyID bits from page table entry pfn
` [PATCHv2 10/59] x86/mm: Preserve KeyID on pte_modify() and pgprot_modify()
` [PATCHv2 17/59] x86/mm: Allow to disable MKTME after enumeration
` [PATCHv2 19/59] x86/mm: Implement syncing per-KeyID direct mappings
` [PATCHv2 20/59] x86/mm: Handle encrypted memory in page_to_virt() and __pa()
` [PATCHv2 22/59] mm/rmap: Clear vma->anon_vma on unlink_anon_vmas()
` [PATCHv2 24/59] keys/mktme: Introduce a Kernel Key Service for MKTME
` [PATCHv2 27/59] keys/mktme: Destroy MKTME keys
` [PATCHv2 28/59] keys/mktme: Move the MKTME payload into a cache aligned structure
` [PATCHv2 29/59] keys/mktme: Set up PCONFIG programming targets for MKTME keys
` [PATCHv2 30/59] keys/mktme: Program MKTME keys into the platform hardware
` [PATCHv2 31/59] keys/mktme: Set up a percpu_ref_count for MKTME keys
` [PATCHv2 32/59] keys/mktme: Clear the key programming from the MKTME hardware
` [PATCHv2 33/59] keys/mktme: Require CAP_SYS_RESOURCE capability for MKTME keys
` [PATCHv2 34/59] acpi: Remove __init from acpi table parsing functions
` [PATCHv2 35/59] acpi/hmat: Determine existence of an ACPI HMAT
` [PATCHv2 37/59] acpi/hmat: Evaluate topology presented in ACPI HMAT for MKTME
` [PATCHv2 38/59] keys/mktme: Do not allow key creation in unsafe topologies
` [PATCHv2 39/59] keys/mktme: Support CPU hotplug for MKTME key service
` [PATCHv2 40/59] keys/mktme: Block memory hotplug additions when MKTME is enabled
` [PATCHv2 41/59] mm: Generalize the mprotect implementation to support extensions
` [PATCHv2 43/59] x86/mm: Set KeyIDs in encrypted VMAs for MKTME
` [PATCHv2 45/59] x86/mm: Keep reference counts on hardware key usage "
` [PATCHv2 46/59] mm: Restrict MKTME memory encryption to anonymous VMAs
` [PATCHv2 47/59] kvm, x86, mmu: setup MKTME keyID to spte for given PFN
` [PATCHv2 48/59] iommu/vt-d: Support MKTME in DMA remapping
` [PATCHv2 49/59] x86/mm: introduce common code for mem encryption
` [PATCHv2 52/59] x86/mm: Disable MKTME if not all system memory supports encryption
` [PATCHv2 53/59] x86: Introduce CONFIG_X86_INTEL_MKTME
` [PATCHv2 54/59] x86/mktme: Overview of Multi-Key Total Memory Encryption
` [PATCHv2 55/59] x86/mktme: Document the MKTME provided security mitigations
` [PATCHv2 56/59] x86/mktme: Document the MKTME kernel configuration requirements
` [PATCHv2 57/59] x86/mktme: Document the MKTME Key Service API
` [PATCHv2 58/59] x86/mktme: Document the MKTME API for anonymous memory encryption
` [PATCHv2 59/59] x86/mktme: Demonstration program using the MKTME APIs


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).