messages from 2020-10-23 16:31:02 to 2020-10-26 17:05:03 UTC [more...]
[PATCH v11 08/14] s390/vfio-ap: hot plug/unplug queues on bind/unbind of queue device
2020-10-26 17:04 UTC (3+ messages)
[PATCH v11 01/14] s390/vfio-ap: No need to disable IRQ after queue reset
2020-10-26 16:57 UTC (3+ messages)
[PATCH 00/13] s390x/pci: s390-pci updates for kernel 5.10-rc1
2020-10-26 16:53 UTC (20+ messages)
` [PATCH 01/13] update-linux-headers: Add vfio_zdev.h
` [PATCH 02/13] linux-headers: update against 5.10-rc1
` [PATCH 03/13] s390x/pci: Move header files to include/hw/s390x
` [PATCH 04/13] vfio: Create shared routine for scanning info capabilities
` [PATCH 05/13] vfio: Find DMA available capability
` [PATCH 06/13] s390x/pci: Add routine to get the vfio dma available count
` [PATCH 07/13] s390x/pci: Honor DMA limits set by vfio
` [PATCH 08/13] s390x/pci: create a header dedicated to PCI CLP
` [PATCH 09/13] s390x/pci: use a PCI Group structure
` [PATCH 10/13] s390x/pci: clean up s390 PCI groups
` [PATCH 11/13] s390x/pci: use a PCI Function structure
` [PATCH 12/13] vfio: Add routine for finding VFIO_DEVICE_GET_INFO capabilities
` [PATCH 13/13] s390x/pci: get zPCI function info from host
[PATCH] vfio/fsl-mc: Make vfio_fsl_mc_irqs_allocate static
2020-10-26 16:53 UTC
[PATCH v4 0/2] KVM: x86: hyper-v: make KVM_GET_SUPPORTED_HV_CPUID more useful
2020-10-26 16:30 UTC (3+ messages)
` [PATCH v4 1/2] KVM: x86: hyper-v: allow KVM_GET_SUPPORTED_HV_CPUID as a system ioctl
` [PATCH v4 2/2] KVM: selftests: test "
[PATCH] x86: kvm: avoid -Wshadow warning in header
2020-10-26 16:14 UTC
[RFCv2 00/16] KVM protected memory extension
2020-10-26 15:29 UTC (14+ messages)
` [RFCv2 08/16] KVM: Use GUP instead of copy_from/to_user() to access guest memory
` [RFCv2 15/16] KVM: Unmap protected pages from direct mapping
[PATCH 0/8] KVM: arm64: Host EL2 entry improvements
2020-10-26 14:36 UTC (11+ messages)
` [PATCH 1/8] KVM: arm64: Don't corrupt tpidr_el2 on failed HVC call
` [PATCH 2/8] KVM: arm64: Remove leftover kern_hyp_va() in nVHE TLB invalidation
` [PATCH 3/8] KVM: arm64: Drop useless PAN setting on host EL1 to EL2 transition
` [PATCH 4/8] KVM: arm64: Add kimg_hyp_va() helper
` [PATCH 5/8] KVM: arm64: Turn host HVC handling into a dispatch table
` [PATCH 6/8] KVM: arm64: Patch kimage_voffset instead of loading the EL1 value
` [PATCH 7/8] KVM: arm64: Simplify __kvm_enable_ssbs()
` [PATCH 8/8] KVM: arm64: Avoid repetitive stack access on host EL1 to EL2 exception
[PATCH 00/11] KVM: arm64: Move PC/ELR/SPSR/PSTATE updatess to EL2
2020-10-26 14:30 UTC (22+ messages)
` [PATCH 01/11] KVM: arm64: Don't adjust PC on SError during SMC trap
` [PATCH 02/11] KVM: arm64: Move kvm_vcpu_trap_il_is32bit into kvm_skip_instr32()
` [PATCH 03/11] KVM: arm64: Make kvm_skip_instr() and co private to HYP
` [PATCH 04/11] KVM: arm64: Move PC rollback on SError "
` [PATCH 05/11] KVM: arm64: Move VHE direct sysreg accessors into kvm_host.h
` [PATCH 06/11] KVM: arm64: Add basic hooks for injecting exceptions from EL2
` [PATCH 07/11] KVM: arm64: Inject AArch64 exceptions from HYP
` [PATCH 08/11] KVM: arm64: Inject AArch32 "
` [PATCH 09/11] KVM: arm64: Remove SPSR manipulation primitives
` [PATCH 10/11] KVM: arm64: Consolidate exception injection
` [PATCH 11/11] KVM: arm64: Get rid of the AArch32 register mapping code
[Bug 209867] New: CPU soft lockup/stall with nested KVM and SMP
2020-10-26 13:10 UTC (3+ messages)
` [Bug 209867] "
[PATCH v2 0/1] KVM: arm64: fix the mmio faulting
2020-10-26 11:24 UTC (2+ messages)
` [PATCH v2 1/1] KVM: arm64: Correctly handle "
[PATCH v4 00/15] follow_pfn and other iomap races
2020-10-26 10:58 UTC (16+ messages)
` [PATCH v4 01/15] drm/exynos: Stop using frame_vector helpers
` [PATCH v4 02/15] drm/exynos: Use FOLL_LONGTERM for g2d cmdlists
` [PATCH v4 03/15] misc/habana: Stop using frame_vector helpers
` [PATCH v4 04/15] misc/habana: Use FOLL_LONGTERM for userptr
` [PATCH v4 05/15] mm/frame-vector: Use FOLL_LONGTERM
` [PATCH v4 06/15] media: videobuf2: Move frame_vector into media subsystem
` [PATCH v4 07/15] mm: Close race in generic_access_phys
` [PATCH v4 08/15] mm: Add unsafe_follow_pfn
` [PATCH v4 09/15] media/videbuf1|2: Mark follow_pfn usage as unsafe
` [PATCH v4 10/15] vfio/type1: Mark follow_pfn "
` [PATCH v4 11/15] PCI: Obey iomem restrictions for procfs mmap
` [PATCH v4 12/15] /dev/mem: Only set filp->f_mapping
` [PATCH v4 13/15] resource: Move devmem revoke code to resource framework
` [PATCH v4 14/15] sysfs: Support zapping of binary attr mmaps
` [PATCH v4 15/15] PCI: Revoke mappings like devmem
[PATCH 0/2] Fix null pointer dereference in kvm_msr_ignored_check
2020-10-26 9:08 UTC (6+ messages)
` [PATCH 1/2] KVM: selftests: Add get featured msrs test case
` [PATCH 2/2] KVM: X86: Fix null pointer reference for KVM_GET_MSRS
[RESEND v4 0/2] Add bus lock VM exit support
2020-10-26 5:31 UTC (7+ messages)
` [RESEND v4 1/2] KVM: VMX: Convert vcpu_vmx.exit_reason to a union
` [RESEND v4 2/2] KVM: VMX: Enable bus lock VM exit
[PATCH net] vhost_vdpa: Return -EFUALT if copy_from_user() fails
2020-10-26 2:59 UTC (3+ messages)
[Bug 209845] New: ignore_msrs kernel NULL pointer dereference since 12bc2132b15e0a969b3f455d90a5f215ef239eff
2020-10-25 16:24 UTC (3+ messages)
` [Bug 209845] "
[PATCH v2 8/8] x86/ioapic: Generate RTE directly from parent irqchip's MSI message
2020-10-25 13:20 UTC (51+ messages)
` [PATCH v3 00/35] Fix x2apic enablement and allow more CPUs, clean up I/OAPIC and MSI bitfields
` [PATCH v3 01/35] x86/apic: Fix x2apic enablement without interrupt remapping
` [PATCH v3 02/35] x86/msi: Only use high bits of MSI address for DMAR unit
` [PATCH v3 03/35] x86/apic/uv: Fix inconsistent destination mode
` [PATCH v3 04/35] x86/devicetree: Fix the ioapic interrupt type table
` [PATCH v3 05/35] x86/apic: Cleanup delivery mode defines
` [PATCH v3 06/35] x86/apic: Replace pointless apic::dest_logical usage
` [PATCH v3 07/35] x86/apic: Get rid of apic::dest_logical
` [PATCH v3 08/35] x86/apic: Cleanup destination mode
` [PATCH v3 09/35] x86/apic: Always provide irq_compose_msi_msg() method for vector domain
` [PATCH v3 10/35] x86/hpet: Move MSI support into hpet.c
` [PATCH v3 11/35] genirq/msi: Allow shadow declarations of msi_msg::$member
` [PATCH v3 12/35] x86/msi: Provide msi message shadow structs
` [PATCH v3 13/35] iommu/intel: Use msi_msg "
` [PATCH v3 14/35] iommu/amd: "
` [PATCH v3 15/35] PCI: vmd: "
` [PATCH v3 16/35] x86/kvm: "
` [PATCH v3 17/35] x86/pci/xen: "
` [PATCH v3 18/35] x86/msi: Remove msidef.h
` [PATCH v3 19/35] x86/io_apic: Cleanup trigger/polarity helpers
` [PATCH v3 20/35] x86/ioapic: Cleanup IO/APIC route entry structs
` [PATCH v3 21/35] x86/ioapic: Generate RTE directly from parent irqchip's MSI message
` [PATCH v3 22/35] genirq/irqdomain: Implement get_name() method on irqchip fwnodes
` [PATCH v3 23/35] x86/apic: Add select() method on vector irqdomain
` [PATCH v3 24/35] iommu/amd: Implement select() method on remapping irqdomain
` [PATCH v3 25/35] iommu/vt-d: "
` [PATCH v3 26/35] iommu/hyper-v: "
` [PATCH v3 27/35] x86/hpet: Use irq_find_matching_fwspec() to find "
` [PATCH v3 28/35] x86/ioapic: "
` [PATCH v3 29/35] x86: Kill all traces of irq_remapping_get_irq_domain()
` [PATCH v3 30/35] iommu/vt-d: Simplify intel_irq_remapping_select()
` [PATCH v3 31/35] x86/ioapic: Handle Extended Destination ID field in RTE
` [PATCH v3 32/35] x86/apic: Support 15 bits of APIC ID in MSI where available
` [PATCH v3 33/35] iommu/hyper-v: Disable IRQ pseudo-remapping if 15 bit APIC IDs are available
` [PATCH v3 34/35] x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID
` [PATCH v3 35/35] x86/kvm: Enable 15-bit extension when KVM_FEATURE_MSI_EXT_DEST_ID detected
[GIT PULL] KVM fixes for Linux 5.10-rc1
2020-10-24 19:37 UTC (2+ messages)
[PATCH] KVM: vmx: rename pi_init to avoid conflict with paride
2020-10-24 15:18 UTC (2+ messages)
[PATCH] KVM: ioapic: break infinite recursion on lazy EOI
2020-10-24 8:17 UTC
[PATCH] KVM: x86/mmu: Avoid modulo operator on 64-bit value to fix i386 build
2020-10-24 6:29 UTC (2+ messages)
kvm: x86-32 fails to link with tdp_mmu
2020-10-24 3:04 UTC (3+ messages)
[Bug 209253] New: Loss of connectivity on guest after important host <-> guest traffic
2020-10-23 22:28 UTC (4+ messages)
` [Bug 209253] "
[GIT PULL] KVM changes for Linux 5.10
2020-10-23 18:53 UTC
[GIT PULL] vhost,vdpa,virtio: cleanups, fixes
2020-10-23 18:53 UTC (2+ messages)
[PATCH v15 00/14] KVM: Dirty ring interface
2020-10-23 18:33 UTC (15+ messages)
` [PATCH v15 01/14] KVM: Documentation: Update entry for KVM_X86_SET_MSR_FILTER
` [PATCH v15 02/14] KVM: Documentation: Update entry for KVM_CAP_ENFORCE_PV_CPUID
` [PATCH v15 03/14] KVM: X86: Don't track dirty for KVM_SET_[TSS_ADDR|IDENTITY_MAP_ADDR]
` [PATCH v15 04/14] KVM: Pass in kvm pointer into mark_page_dirty_in_slot()
` [PATCH v15 05/14] KVM: X86: Implement ring-based dirty memory tracking
` [PATCH v15 06/14] KVM: Make dirty ring exclusive to dirty bitmap log
` [PATCH v15 07/14] KVM: Don't allocate dirty bitmap if dirty ring is enabled
` [PATCH v15 08/14] KVM: selftests: Always clear dirty bitmap after iteration
` [PATCH v15 09/14] KVM: selftests: Sync uapi/linux/kvm.h to tools/
` [PATCH v15 10/14] KVM: selftests: Use a single binary for dirty/clear log test
` [PATCH v15 11/14] KVM: selftests: Introduce after_vcpu_run hook for dirty "
` [PATCH v15 12/14] KVM: selftests: Add dirty ring buffer test
` [PATCH v15 13/14] KVM: selftests: Let dirty_log_test async for dirty ring test
` [PATCH v15 14/14] KVM: selftests: Add "-c" parameter to dirty log test
[PATCH 1/3] sched: better handling for busy polling loops
2020-10-23 17:48 UTC (2+ messages)
[PATCH v3 0/9] KVM: Support guest MAXPHYADDR < host MAXPHYADDR
2020-10-23 17:43 UTC (10+ messages)
` [PATCH v3 7/9] KVM: VMX: Add guest physical address check in EPT violation and misconfig
[PATCH] KVM: X86: Expose KVM_HINTS_REALTIME in KVM_GET_SUPPORTED_CPUID
2020-10-23 17:03 UTC (7+ messages)
[PATCH 00/22] Introduce the TDP MMU
2020-10-23 16:30 UTC (18+ messages)
` [PATCH 01/22] kvm: mmu: Separate making non-leaf sptes from link_shadow_page
` [PATCH 02/22] kvm: x86/mmu: Separate making SPTEs from set_spte
` [PATCH 04/22] KVM: mmu: extract spte.h and spte.c
` [PATCH 08/22] kvm: x86/mmu: Add functions to handle changed TDP SPTEs
` [PATCH 09/22] KVM: Cache as_id in kvm_memory_slot
` [PATCH 10/22] kvm: x86/mmu: Support zapping SPTEs in the TDP MMU
` [PATCH 11/22] kvm: x86/mmu: Remove disallowed_hugepage_adjust shadow_walk_iterator arg
` [PATCH 12/22] kvm: x86/mmu: Add TDP MMU PF handler
` [PATCH 14/22] kvm: x86/mmu: Support invalidate range MMU notifier for TDP MMU
` [PATCH 15/22] kvm: x86/mmu: Add access tracking for tdp_mmu
` [PATCH 16/22] kvm: x86/mmu: Support changed pte notifier in tdp MMU
` [PATCH 17/22] kvm: x86/mmu: Support dirty logging for the TDP MMU
` [PATCH 18/22] kvm: x86/mmu: Support disabling dirty logging for the tdp MMU
` [PATCH 19/22] kvm: x86/mmu: Support write protection for nesting in "
` [PATCH 20/22] kvm: x86/mmu: Support MMIO in the TDP MMU
` [PATCH 21/22] kvm: x86/mmu: Don't clear write flooding count for direct roots
` [PATCH 22/22] kvm: x86/mmu: NX largepage recovery for TDP MMU
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).