kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-01-29 12:11:56 to 2020-01-30 16:19:09 UTC [more...]

[PATCH 00/10] python: Explicit usage of Python 3
 2020-01-30 16:18 UTC  (18+ messages)
` [PATCH 01/10] scripts: "
` [PATCH 02/10] tests/qemu-iotests: "
` [PATCH 03/10] tests: "
` [PATCH 04/10] scripts/minikconf: "
` [PATCH 05/10] tests/acceptance: Remove shebang header
` [PATCH 06/10] scripts/tracetool: "
` [PATCH 07/10] tests/vm: "
` [PATCH 08/10] tests/qemu-iotests: Explicit usage of Python 3
` [PATCH 09/10] scripts: "
` [PATCH 10/10] tests/qemu-iotests/check: Update to match Python 3 interpreter

[PATCH v2 kvmtool 00/30] Add reassignable BARs and PCIE 1.1 support
 2020-01-30 15:52 UTC  (20+ messages)
` [PATCH v2 kvmtool 09/30] arm/pci: Fix PCI IO region
` [PATCH v2 kvmtool 10/30] virtio/pci: Make memory and IO BARs independent
` [PATCH v2 kvmtool 11/30] vfio/pci: Allocate correct size for MSIX table and PBA BARs
` [PATCH v2 kvmtool 12/30] vfio/pci: Don't assume that only even numbered BARs are 64bit
` [PATCH v2 kvmtool 13/30] vfio/pci: Ignore expansion ROM BAR writes
` [PATCH v2 kvmtool 14/30] vfio/pci: Don't access potentially unallocated regions
` [PATCH v2 kvmtool 15/30] virtio: Don't ignore initialization failures
` [PATCH v2 kvmtool 16/30] Don't ignore errors registering a device, ioport or mmio emulation
` [PATCH v2 kvmtool 17/30] hw/vesa: Don't ignore fatal errors

[PATCH 0/2] kvm: split_lock: Fix emulator and extend #AC handler
 2020-01-30 15:18 UTC  (6+ messages)
` [PATCH 1/2] KVM: x86: Emulate split-lock access as a write
` [PATCH 2/2] KVM: VMX: Extend VMX's #AC handding

[PATCH v8 0/4] KVM: s390: Add new reset vcpu API
 2020-01-30 15:04 UTC  (36+ messages)
` [PATCH v8 1/4] "
  ` [PATCH/FIXUP FOR STABLE BEFORE THIS SERIES] KVM: s390: do not clobber user space fpc during guest reset
              ` [PATCH v2] KVM: s390: do not clobber user space registers during guest reset/store status
` [PATCH v8 2/4] selftests: KVM: Add fpu and one reg set/get library functions
` [PATCH v8 3/4] selftests: KVM: s390x: Add reset tests
` [PATCH v8 4/4] selftests: KVM: testing the local IRQs resets
` [PATCH] KVM: s390: Cleanup initial cpu reset

[GIT PULL 00/23] KVM/arm updates for 5.6
 2020-01-30 14:15 UTC  (26+ messages)
` [PATCH 01/23] KVM: arm64: Only sign-extend MMIO up to register width
` [PATCH 02/23] KVM: arm/arm64: vgic-its: Fix restoration of unmapped collections
` [PATCH 03/23] KVM: arm/arm64: vgic: Handle GICR_PENDBASER.PTZ filed as RAZ
` [PATCH 04/23] arm64: kvm: Fix IDMAP overlap with HYP VA
` [PATCH 05/23] KVM: ARM: Call hyp_cpu_pm_exit at the right place
` [PATCH 06/23] KVM: arm: Remove duplicate include
` [PATCH 07/23] KVM: arm/arm64: Re-check VMA on detecting a poisoned page
` [PATCH 08/23] KVM: arm64: Correct PSTATE on exception entry
` [PATCH 09/23] KVM: arm/arm64: Correct CPSR "
` [PATCH 10/23] KVM: arm/arm64: Correct AArch32 SPSR "
` [PATCH 11/23] KVM: arm/arm64: vgic-its: Properly check the unmapped coll in DISCARD handler
` [PATCH 12/23] KVM: arm/arm64: vgic: Drop the kvm_vgic_register_mmio_region()
` [PATCH 13/23] KVM: arm/arm64: Cleanup MMIO handling
` [PATCH 14/23] arm64: KVM: Add UAPI notes for swapped registers
` [PATCH 15/23] arm64: KVM: Annotate guest entry/exit as a single function
` [PATCH 16/23] KVM: arm/arm64: Fix young bit from mmu notifier
` [PATCH 17/23] KVM: arm: Fix DFSR setting for non-LPAE aarch32 guests
` [PATCH 18/23] KVM: arm: Make inject_abt32() inject an external abort instead
` [PATCH 19/23] KVM: arm64: pmu: Don't increment SW_INCR if PMCR.E is unset
` [PATCH 20/23] KVM: arm64: pmu: Don't mark a counter as chained if the odd one is disabled
` [PATCH 21/23] KVM: arm64: pmu: Fix chained SW_INCR counters
` [PATCH 22/23] KVM: arm64: pmu: Only handle supported event counters
` [PATCH 23/23] KVM: arm64: Treat emulated TVAL TimerValue as a signed 32-bit integer

[PATCH v9 0/6] KVM: s390: Add new reset vcpu API
 2020-01-30 13:25 UTC  (19+ messages)
` [PATCH v9 1/6] KVM: s390: do not clobber registers during guest reset/store status
` [PATCH v9 2/6] KVM: s390: Cleanup initial cpu reset
` [PATCH v9 3/6] KVM: s390: Add new reset vcpu API
    ` [PATCH v9] "
` [PATCH v9 4/6] selftests: KVM: Add fpu and one reg set/get library functions
` [PATCH v9 5/6] selftests: KVM: s390x: Add reset tests
` [PATCH v9 6/6] selftests: KVM: testing the local IRQs resets

[kvm-unit-tests PULL 0/6] s390x updates
 2020-01-30 13:11 UTC  (7+ messages)
` [kvm-unit-tests PULL 1/6] s390x: export sclp_setup_int
` [kvm-unit-tests PULL 2/6] s390x: sclp: add service call instruction wrapper
` [kvm-unit-tests PULL 3/6] s390x: lib: fix stfl wrapper asm
` [kvm-unit-tests PULL 4/6] s390x: lib: add SPX and STPX instruction wrapper
` [kvm-unit-tests PULL 5/6] s390x: lib: fix program interrupt handler if sclp_busy was set
` [kvm-unit-tests PULL 6/6] s390x: SCLP unit test

[kvm-unit-tests PATCH v2 0/9] KVM: arm64: PMUv3 Event Counter Tests
 2020-01-30 11:25 UTC  (10+ messages)
` [kvm-unit-tests PATCH v2 1/9] arm64: Provide read/write_sysreg_s
` [kvm-unit-tests PATCH v2 2/9] arm: pmu: Let pmu tests take a sub-test parameter
` [kvm-unit-tests PATCH v2 3/9] arm: pmu: Add a pmu struct
` [kvm-unit-tests PATCH v2 4/9] arm: pmu: Check Required Event Support
` [kvm-unit-tests PATCH v2 5/9] arm: pmu: Basic event counter Tests
` [kvm-unit-tests PATCH v2 6/9] arm: pmu: Test chained counter
` [kvm-unit-tests PATCH v2 7/9] arm: pmu: test 32-bit <-> 64-bit transitions
` [kvm-unit-tests PATCH v2 8/9] arm: gic: Provide per-IRQ helper functions
` [kvm-unit-tests PATCH v2 9/9] arm: pmu: Test overflow interrupts

Node not reachable on vlan, after vlan is used by virtual machine
 2020-01-30  8:43 UTC 

[PATCH 0/5] KVM: Move x86 init ops to separate struct
 2020-01-30  5:44 UTC  (7+ messages)
` [PATCH 1/5] KVM: Pass kvm_init()'s opaque param to additional arch funcs
` [PATCH 2/5] KVM: x86: Move init-only kvm_x86_ops to separate struct
` [PATCH 3/5] KVM: VMX: Move hardware_setup() definition below vmx_x86_ops
` [PATCH 4/5] KVM: VMX: Configure runtime hooks using vmx_x86_ops
` [PATCH 5/5] KVM: x86: Set kvm_x86_ops only after ->hardware_setup() completes

[PATCH] KVM: x86: Fix perfctr WRMSR for running counters
 2020-01-30  1:09 UTC  (3+ messages)

[GIT PULL] Please pull my kvm-ppc-next-5.6-2 tag
 2020-01-30  0:54 UTC 

[PATCH 00/26] KVM: x86: Purge kvm_x86_ops->*_supported()
 2020-01-30  0:38 UTC  (28+ messages)
` [PATCH 01/26] KVM: x86: Remove superfluous brackets from case statement
` [PATCH 02/26] KVM: x86: Take an unsigned 32-bit int for has_emulated_msr()'s index
` [PATCH 03/26] KVM: x86: Snapshot MSR index in a local variable when processing lists
` [PATCH 04/26] KVM: x86: Add a kvm_x86_ops hook to query virtualized MSR support
` [PATCH 05/26] KVM: x86: Move MSR_TSC_AUX existence checks into vendor code
` [PATCH 06/26] KVM: x86: Move MSR_IA32_BNDCFGS "
` [PATCH 07/26] KVM: VMX: Add helpers to query Intel PT mode
` [PATCH 08/26] KVM: x86: Move RTIT (Intel PT) MSR existence checks into vendor code
` [PATCH 09/26] KVM: x86: Calculate the supported xcr0 mask at load time
` [PATCH 10/26] KVM: x86: Use supported_xcr0 to detect MPX support
` [PATCH 11/26] KVM: x86: Make kvm_mpx_supported() an inline function
` [PATCH 12/26] KVM: x86: Drop explicit @func param from ->set_supported_cpuid()
` [PATCH 13/26] KVM: x86: Use u32 for holding CPUID register value in helpers
` [PATCH 14/26] KVM: x86: Introduce cpuid_entry_{get,has}() accessors
` [PATCH 15/26] KVM: x86: Introduce cpuid_entry_{change,set,clear}() mutators
` [PATCH 16/26] KVM: x86: Add Kconfig-controlled auditing of reverse CPUID lookups
` [PATCH 17/26] KVM: x86: Handle MPX CPUID adjustment in vendor code
` [PATCH 18/26] KVM: x86: Handle INVPCID "
` [PATCH 19/26] KVM: x86: Handle UMIP emulation CPUID adjustment in VMX code
` [PATCH 20/26] KVM: x86: Handle PKU CPUID adjustment in SVM code
` [PATCH 21/26] KVM: x86: Handle RDTSCP CPUID adjustment in VMX code
` [PATCH 22/26] KVM: x86: Handle XSAVES "
` [PATCH 23/26] KVM: x86: Handle Intel PT CPUID adjustment in vendor code
` [PATCH 24/26] KVM: x86: Clear output regs for CPUID 0x14 if PT isn't exposed to guest
` [PATCH 25/26] KVM: x86: Handle main Intel PT CPUID leaf in vendor code
` [PATCH 26/26] KVM: VMX: Directly query Intel PT mode when refreshing PMUs

[RFC v3 0/8] vfio: expose virtual Shared Virtual Addressing to VMs
 2020-01-29 23:56 UTC  (9+ messages)
` [RFC v3 1/8] vfio: Add VFIO_IOMMU_PASID_REQUEST(alloc/free)
` [RFC v3 2/8] vfio/type1: Make per-application (VM) PASID quota tunable
` [RFC v3 3/8] vfio: Reclaim PASIDs when application is down
` [RFC v3 4/8] vfio/type1: Add VFIO_NESTING_GET_IOMMU_UAPI_VERSION

[RFC] eventfd: add EFD_AUTORESET flag
 2020-01-29 17:20 UTC 

[PATCH v1 0/1] vfio-ccw: Fix interrupt handling for HALT/CLEAR
 2020-01-29 16:48 UTC  (11+ messages)
` [PATCH v1 1/1] vfio-ccw: Don't free channel programs for unrelated interrupts

[PATCH] KVM: x86: Mark CR4.UMIP as reserved based on associated CPUID bit
 2020-01-29 15:08 UTC  (2+ messages)

[RFC v3 00/25] intel_iommu: expose Shared Virtual Addressing to VMs
 2020-01-29 13:48 UTC  (22+ messages)
` [RFC v3 05/25] intel_iommu: provide get_iommu_context() callback
` [RFC v3 06/25] scripts/update-linux-headers: Import iommu.h
` [RFC v3 07/25] header file update VFIO/IOMMU vSVA APIs
` [RFC v3 09/25] vfio: check VFIO_TYPE1_NESTING_IOMMU support
` [RFC v3 10/25] vfio: register DualStageIOMMUObject to vIOMMU
` [RFC v3 12/25] vfio/common: add pasid_alloc/free support
` [RFC v3 14/25] intel_iommu: add virtual command capability support
` [RFC v3 16/25] intel_iommu: add PASID cache management infrastructure
` [RFC v3 17/25] vfio: add bind stage-1 page table support
` [RFC v3 18/25] intel_iommu: bind/unbind guest page table to host
` [RFC v3 19/25] intel_iommu: replay guest pasid bindings "
` [RFC v3 20/25] intel_iommu: replay pasid binds after context cache invalidation
` [RFC v3 21/25] intel_iommu: do not pass down pasid bind for PASID #0
` [RFC v3 22/25] vfio: add support for flush iommu stage-1 cache
` [RFC v3 23/25] intel_iommu: process PASID-based iotlb invalidation
` [RFC v3 24/25] intel_iommu: propagate PASID-based iotlb invalidation to host
` [RFC v3 25/25] intel_iommu: process PASID-based Device-TLB invalidation

[RFC v1 0/2] vfio/pci: expose device's PASID capability to VMs
 2020-01-29 12:18 UTC  (3+ messages)
` [RFC v1 1/2] vfio/pci: Expose PCIe PASID capability to guest
` [RFC v1 2/2] vfio/pci: Emulate PASID/PRI capability for VFs


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).