messages from 2020-05-29 06:50:55 to 2020-05-30 16:20:16 UTC [more...]
[PATCH 8/9] x86: kvm_hv_set_msr(): use __put_user() instead of 32bit __clear_user()
2020-05-30 16:20 UTC (4+ messages)
[PATCH] KVM: Use previously computed array_size()
2020-05-30 15:58 UTC (2+ messages)
[PATCH] virtio_vsock: Fix race condition in virtio_transport_recv_pkt
2020-05-30 13:03 UTC (3+ messages)
` [PATCH v5] "
` [PATCH v5] virtio_vsock: Fix race condition in virtio_transport_recv_pkt()
[PATCH v3] virtio_vsock: Fix race condition in virtio_transport_recv_pkt()
2020-05-30 12:26 UTC (2+ messages)
[PATCH][v5] KVM: X86: support APERF/MPERF registers
2020-05-30 10:40 UTC (2+ messages)
[PATCH v8 00/18] Add AMD SEV guest live migration support
2020-05-30 5:51 UTC (25+ messages)
` [PATCH v8 08/18] KVM: X86: Introduce KVM_HC_PAGE_ENC_STATUS hypercall
` [PATCH v8 09/18] KVM: x86: Introduce KVM_GET_PAGE_ENC_BITMAP ioctl
` [PATCH v8 10/18] mm: x86: Invoke hypercall when page encryption status is changed
` [PATCH v8 11/18] KVM: x86: Introduce KVM_SET_PAGE_ENC_BITMAP ioctl
` [PATCH v8 12/18] KVM: SVM: Add support for static allocation of unified Page Encryption Bitmap
` [PATCH v8 13/18] KVM: x86: Introduce new KVM_FEATURE_SEV_LIVE_MIGRATION feature & Custom MSR
` [PATCH v8 14/18] EFI: Introduce the new AMD Memory Encryption GUID
` [PATCH v8 15/18] KVM: x86: Add guest support for detecting and enabling SEV Live Migration feature
` [PATCH v8 16/18] KVM: x86: Mark _bss_decrypted section variables as decrypted in page encryption bitmap
` [PATCH v8 17/18] KVM: x86: Add kexec support for SEV Live Migration
` [PATCH v8 18/18] KVM: SVM: Enable SEV live migration feature implicitly on Incoming VM(s)
[PATCH v3 00/28] KVM: nSVM: event fixes and migration support
2020-05-30 5:10 UTC (42+ messages)
` [PATCH 01/30] KVM: x86: track manually whether an event has been injected
` [PATCH 02/30] KVM: x86: enable event window in inject_pending_event
` [PATCH 03/30] KVM: nSVM: inject exceptions via svm_check_nested_events
` [PATCH 04/30] KVM: nSVM: remove exit_required
` [PATCH 05/30] KVM: nSVM: correctly inject INIT vmexits
` [PATCH 06/30] KVM: SVM: always update CR3 in VMCB
` [PATCH 07/30] KVM: nVMX: always update CR3 in VMCS
` [PATCH 08/30] KVM: nSVM: move map argument out of enter_svm_guest_mode
` [PATCH 09/30] KVM: nSVM: extract load_nested_vmcb_control
` [PATCH 10/30] KVM: nSVM: extract preparation of VMCB for nested run
` [PATCH 11/30] KVM: nSVM: move MMU setup to nested_prepare_vmcb_control
` [PATCH 12/30] KVM: nSVM: clean up tsc_offset update
` [PATCH 13/30] KVM: nSVM: pass vmcb_control_area to copy_vmcb_control_area
` [PATCH 14/30] KVM: nSVM: remove trailing padding for struct vmcb_control_area
` [PATCH 15/30] KVM: nSVM: save all control fields in svm->nested
` [PATCH 16/30] KVM: nSVM: restore clobbered INT_CTL fields after clearing VINTR
` [PATCH 17/30] KVM: nSVM: synchronize VMCB controls updated by the processor on every vmexit
` [PATCH 18/30] KVM: nSVM: remove unnecessary if
` [PATCH 19/30] KVM: nSVM: extract svm_set_gif
` [PATCH 20/30] KVM: SVM: preserve VGIF across VMCB switch
` [PATCH 21/30] KVM: nSVM: synthesize correct EXITINTINFO on vmexit
` [PATCH 22/30] KVM: nSVM: remove HF_VINTR_MASK
` [PATCH 23/30] KVM: nSVM: remove HF_HIF_MASK
` [PATCH 24/30] KVM: nSVM: split nested_vmcb_check_controls
` [PATCH 25/30] KVM: nSVM: leave guest mode when clearing EFER.SVME
` [PATCH 26/30] KVM: MMU: pass arbitrary CR0/CR4/EFER to kvm_init_shadow_mmu
` [PATCH 27/30] selftests: kvm: introduce cpu_has_svm() check
` [PATCH 28/30] selftests: kvm: add a SVM version of state-test
` [PATCH 29/30] selftests: kvm: fix smm test on SVM
` [PATCH 30/30] KVM: nSVM: implement KVM_GET_NESTED_STATE and KVM_SET_NESTED_STATE
[PATCH v3] virtio_vsock: Fix race condition in virtio_transport_recv_pkt
2020-05-30 1:38 UTC
[PATCH v2] virtio_vsock: Fix race condition in virtio_transport_recv_pkt
2020-05-30 1:14 UTC (3+ messages)
[PATCH 0/2] vhost, docs: convert to pin_user_pages(), new "case 5"
2020-05-29 23:43 UTC (3+ messages)
` [PATCH 1/2] docs: mm/gup: pin_user_pages.rst: add a "
` [PATCH 2/2] vhost: convert get_user_pages() --> pin_user_pages()
[PATCH] vfio/mdev: Fix reference count leak in add_mdev_supported_type
2020-05-29 22:19 UTC (4+ messages)
[RFC v2 00/18] Refactor configuration of guest memory protection
2020-05-29 22:19 UTC (18+ messages)
` [RFC v2 01/18] target/i386: sev: Remove unused QSevGuestInfoClass
` [RFC v2 02/18] target/i386: sev: Move local structure definitions into .c file
` [RFC v2 03/18] target/i386: sev: Rename QSevGuestInfo
` [RFC v2 04/18] target/i386: sev: Embed SEVState in SevGuestState
` [RFC v2 06/18] target/i386: sev: Remove redundant cbitpos and reduced_phys_bits fields
` [RFC v2 09/18] target/i386: sev: Unify SEVState and SevGuestState
` [RFC v2 16/18] guest memory protection: Add Error ** to GuestMemoryProtection::kvm_init
` [RFC v2 17/18] spapr: Added PEF based guest memory protection
[RFC PATCH v4 00/10] Introduce vendor ops in vfio-pci
2020-05-29 21:45 UTC (3+ messages)
` [RFC PATCH v4 07/10] vfio/pci: introduce a new irq type VFIO_IRQ_TYPE_REMAP_BAR_REGION
[kvm-unit-tests PATCH] x86: realmode: Add suffixes for push, pop and iret
2020-05-29 21:26 UTC
[PATCH 0/8] Convert the intel iommu driver to the dma-iommu api
2020-05-29 21:21 UTC (6+ messages)
[PATCH Kernel v24 0/8] Add UAPIs to support migration for VFIO devices
2020-05-29 21:09 UTC (2+ messages)
[PATCH v1 0/2] Sample mtty: Add migration support
2020-05-29 18:58 UTC (3+ messages)
` [PATCH v1 2/2] Sample mtty: Add migration capability to mtty module
[PATCH Kernel v22 0/8] Add UAPIs to support migration for VFIO devices
2020-05-29 17:57 UTC (12+ messages)
[PATCH v3 00/75] x86: SEV-ES Guest Support
2020-05-29 16:21 UTC (4+ messages)
` [PATCH v3 69/75] x86/realmode: Setup AP jump table
[GIT PULL] KVM/arm64 updates for Linux 5.8
2020-05-29 16:01 UTC (25+ messages)
` [PATCH 01/24] KVM: arm64: Move virt/kvm/arm to arch/arm64
` [PATCH 02/24] KVM: arm64: Kill off CONFIG_KVM_ARM_HOST
` [PATCH 03/24] KVM: arm64: Update help text
` [PATCH 04/24] KVM: arm64: Change CONFIG_KVM to a menuconfig entry
` [PATCH 05/24] KVM: arm64: Clean up kvm makefiles
` [PATCH 06/24] KVM: arm64: Simplify __kvm_timer_set_cntvoff implementation
` [PATCH 07/24] KVM: arm64: Use cpus_have_final_cap for has_vhe()
` [PATCH 08/24] KVM: Fix spelling in code comments
` [PATCH 09/24] KVM: arm64: Sidestep stage2_unmap_vm() on vcpu reset when S2FWB is supported
` [PATCH 10/24] KVM: arm/arm64: Release kvm->mmu_lock in loop to prevent starvation
` [PATCH 11/24] KVM: arm64: Clean up the checking for huge mapping
` [PATCH 12/24] KVM: arm64: Unify handling THP backed host memory
` [PATCH 13/24] KVM: arm64: Support enabling dirty log gradually in small chunks
` [PATCH 14/24] KVM: arm64: Make KVM_CAP_MAX_VCPUS compatible with the selected GIC version
` [PATCH 15/24] KVM: arm64: Clean up cpu_init_hyp_mode()
` [PATCH 16/24] KVM: arm64: Fix incorrect comment on kvm_get_hyp_vector()
` [PATCH 17/24] KVM: arm64: Remove obsolete kvm_virt_to_phys abstraction
` [PATCH 18/24] KVM: arm64: vgic-v3: Take cpu_if pointer directly instead of vcpu
` [PATCH 19/24] KVM: arm64: Refactor vcpu_{read,write}_sys_reg
` [PATCH 20/24] KVM: arm64: Add missing reset handlers for PMU emulation
` [PATCH 21/24] KVM: arm64: Move sysreg reset check to boot time
` [PATCH 22/24] KVM: arm64: Don't use empty structures as CPU reset state
` [PATCH 23/24] KVM: arm64: Parametrize exception entry with a target EL
` [PATCH 24/24] KVM: arm64: Drop obsolete comment about sys_reg ordering
[PATCH 1/2] selftests: kvm: introduce cpu_has_svm() check
2020-05-29 15:28 UTC (4+ messages)
` [PATCH 2/2] selftests: kvm: fix smm test on SVM
[RFC 00/16] KVM protected memory extension
2020-05-29 15:24 UTC (3+ messages)
` [RFC 06/16] KVM: Use GUP instead of copy_from/to_user() to access guest memory
[PATCH v12 0/6] x86/kvm/hyper-v: add support for synthetic
2020-05-29 15:15 UTC (8+ messages)
` [PATCH v12 1/6] x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit
` [PATCH v12 2/6] x86/hyper-v: Add synthetic debugger definitions
` [PATCH v12 3/6] x86/kvm/hyper-v: Add support for synthetic debugger capability
` [PATCH v12 4/6] x86/kvm/hyper-v: enable hypercalls regardless of hypercall page
` [PATCH v12 5/6] x86/kvm/hyper-v: Add support for synthetic debugger via hypercalls
` [PATCH v12 6/6] KVM: selftests: update hyperv_cpuid with SynDBG tests
[PATCH] virtio_vsock: Fix race condition in virtio_transport_recv_pkt
2020-05-29 15:11 UTC (3+ messages)
[PATCH] KVM: x86: Initialize tdp_level during vCPU creation
2020-05-29 13:06 UTC (6+ messages)
system time goes weird in kvm guest after host suspend/resume
2020-05-29 12:33 UTC (7+ messages)
[PATCH kvm-unit-tests] access: disable phys-bits=36 for now
2020-05-29 12:22 UTC (5+ messages)
[PATCH v11 0/7] x86/kvm/hyper-v: add support for synthetic debugger
2020-05-29 12:17 UTC (11+ messages)
` [PATCH v11 2/7] x86/kvm/hyper-v: Simplify addition for custom cpuid leafs
` [PATCH v11 4/7] x86/kvm/hyper-v: Add support for synthetic debugger capability
` [PATCH v11 5/7] x86/kvm/hyper-v: enable hypercalls without hypercall page with syndbg
[PATCH 0/2 v5] Fix VMX preemption timer migration
2020-05-29 11:07 UTC (3+ messages)
` [PATCH 1/2 v5] KVM: nVMX: "
[PATCH RESEND] Enable full width counting for KVM: x86/pmu
2020-05-29 10:23 UTC (8+ messages)
` [PATCH RESEND v4 1/2] KVM: x86/pmu: Tweak kvm_pmu_get_msr to pass 'struct msr_data' in
` [PATCH RESEND v4 2/2] KVM: x86/pmu: Support full width counting
` [kvm-unit-tests PATCH] x86: pmu: Test full-width counter writes support
` [Qemu-devel PATCH] target/i386: define a new MSR based feature word - FEAT_PERF_CAPABILITIES
[PATCH kvm-unit-tests v2] access: disable phys-bits=36 for now
2020-05-29 9:50 UTC
[PATCH v4 0/7] clean up redundant 'kvm_run' parameters
2020-05-29 9:48 UTC (5+ messages)
` [PATCH v4 6/7] KVM: MIPS: "
[PATCH] KVM: VMX: Replace zero-length array with flexible-array
2020-05-29 9:46 UTC (2+ messages)
[PATCH] KVM: No need to retry for hva_to_pfn_remapped()
2020-05-29 9:45 UTC (4+ messages)
[PATCH v4 0/6] scripts: More Python fixes
2020-05-29 9:40 UTC (2+ messages)
[PATCH 0/6] vDPA: doorbell mapping
2020-05-29 9:24 UTC (9+ messages)
` [PATCH 1/6] vhost: allow device that does not depend on vhost worker
` [PATCH 2/6] vhost: use mmgrab() instead of mmget() for non worker device
` [PATCH 3/6] vdpa: introduce get_vq_notification method
` [PATCH 4/6] vhost_vdpa: support doorbell mapping via mmap
` [PATCH 5/6] vdpa: introduce virtio pci driver
` [PATCH 6/6] vdpa: vp_vdpa: report doorbell location
[PATCH 0/6] Refactor handling flow of SET_CPUID*
2020-05-29 8:55 UTC (7+ messages)
` [PATCH 1/6] KVM: X86: Reset vcpu->arch.cpuid_nent to 0 if SET_CPUID fails
` [PATCH 2/6] KVM: X86: Go on updating other CPUID leaves when leaf 1 is absent
` [PATCH 3/6] KVM: X86: Introduce kvm_check_cpuid()
` [PATCH 4/6] KVM: X86: Split kvm_update_cpuid()
` [PATCH 5/6] KVM: X86: Move kvm_x86_ops.cpuid_update() into kvm_update_state_based_on_cpuid()
` [PATCH 6/6] KVM: X86: Move kvm_apic_set_version() to kvm_update_state_based_on_cpuid()
[PATCH v2 00/28] KVM: nSVM: event fixes and migration support
2020-05-29 8:47 UTC (7+ messages)
` [PATCH 02/28] KVM: x86: enable event window in inject_pending_event
` [PATCH 05/28] KVM: nSVM: correctly inject INIT vmexits
[RFC 00/12] Audio DSP VirtIO and vhost drivers
2020-05-29 7:37 UTC (13+ messages)
` [RFC 01/12] ASoC: add function parameters to enable forced path pruning
` [RFC 02/12] ASoC: SOF: extract firmware-related operation into a function
` [RFC 03/12] ASoC: SOF: support IPC with immediate response
` [RFC 04/12] ASoC: SOF: add a power status IPC
` [RFC 05/12] ASoC: SOF: add two helper lookup functions
` [RFC 06/12] ASoC: SOF: add an RPMsg VirtIO DSP driver
` [RFC 07/12] ASoC: SOF: use a macro instead of a hard-coded value
` [RFC 08/12] ASoC: SOF: add a vhost driver: sound part
` [RFC 09/12] ASoC: SOF: VirtIO: free guest pipelines upon termination
` [RFC 10/12] vhost: add an SOF Audio DSP driver
` [RFC 11/12] rpmsg: increase buffer size and reduce buffer number
` [RFC 12/12] rpmsg: add a device ID to also bind to the ADSP device
[PATCH v3 0/5] Add a vhost RPMsg API
2020-05-29 7:06 UTC (4+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).