kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-02-21 10:55:02 to 2020-02-24 13:49:43 UTC [more...]

[PATCH 00/61] KVM: x86: Introduce KVM cpu caps
 2020-02-24 13:49 UTC  (26+ messages)
` [PATCH 10/61] KVM: x86: Clean up CPUID 0x7 sub-leaf loop
` [PATCH 11/61] KVM: x86: Drop the explicit @index from do_cpuid_7_mask()
` [PATCH 15/61] KVM: x86: Refactor CPUID 0x4 and 0x8000001d handling
` [PATCH 16/61] KVM: x86: Encapsulate CPUID entries and metadata in struct
` [PATCH 18/61] KVM: x86: Use common loop iterator when handling CPUID 0xD.N
` [PATCH 21/61] KVM: x86: Use supported_xcr0 to detect MPX support
` [PATCH 22/61] KVM: x86: Make kvm_mpx_supported() an inline function
` [PATCH 23/61] KVM: x86: Clear output regs for CPUID 0x14 if PT isn't exposed to guest
` [PATCH 24/61] KVM: x86: Drop explicit @func param from ->set_supported_cpuid()
` [PATCH 25/61] KVM: x86: Use u32 for holding CPUID register value in helpers
` [PATCH 26/61] KVM: x86: Introduce cpuid_entry_{get,has}() accessors
` [PATCH 28/61] KVM: x86: Refactor cpuid_mask() to auto-retrieve the register

kvm-unit-tests : Kconfigs and extra kernel args for full coverage
 2020-02-24 13:47 UTC  (5+ messages)

[RFC PATCH 00/11] Removing Calxeda platform support
 2020-02-24 13:07 UTC  (3+ messages)
` [RFC PATCH 01/11] vfio: Remove Calxeda XGMAC reset driver

[PATCH 0/2] KVM: VMX: Use basic exit reason for cheking and indexing
 2020-02-24 13:04 UTC  (6+ messages)
` [PATCH 1/2] kvm: vmx: Use basic exit reason to check if it's the specific VM EXIT
` [PATCH 2/2] kvm: nvmx: Use basic(exit_reason) when checking specific EXIT_REASON

[PATCH v4 00/36] KVM: s390: Add support for protected VMs
 2020-02-24 11:41 UTC  (37+ messages)
` [PATCH v4 01/36] mm/gup/writeback: add callbacks for inaccessible pages
` [PATCH v4 02/36] KVM: s390/interrupt: do not pin adapter interrupt pages
` [PATCH v4 03/36] s390/protvirt: introduce host side setup
` [PATCH v4 04/36] s390/protvirt: add ultravisor initialization
` [PATCH v4 05/36] s390/mm: provide memory management functions for protected KVM guests
` [PATCH v4 06/36] s390/mm: add (non)secure page access exceptions handlers
` [PATCH v4 07/36] KVM: s390: protvirt: Add UV debug trace
` [PATCH v4 08/36] KVM: s390: add new variants of UV CALL
` [PATCH v4 09/36] KVM: s390: protvirt: Add initial vm and cpu lifecycle handling
` [PATCH v4 10/36] KVM: s390: protvirt: Secure memory is not mergeable
` [PATCH v4 11/36] KVM: s390/mm: Make pages accessible before destroying the guest
` [PATCH v4 12/36] KVM: s390: protvirt: Handle SE notification interceptions
` [PATCH v4 13/36] KVM: s390: protvirt: Instruction emulation
` [PATCH v4 14/36] KVM: s390: protvirt: Implement interrupt injection
` [PATCH v4 15/36] KVM: s390: protvirt: Add SCLP interrupt handling
` [PATCH v4 16/36] KVM: s390: protvirt: Handle spec exception loops
` [PATCH v4 17/36] KVM: s390: protvirt: Add new gprs location handling
` [PATCH v4 18/36] KVM: S390: protvirt: Introduce instruction data area bounce buffer
` [PATCH v4 19/36] KVM: s390: protvirt: handle secure guest prefix pages
` [PATCH v4 20/36] KVM: s390/mm: handle guest unpin events
` [PATCH v4 21/36] KVM: s390: protvirt: Write sthyi data to instruction data area
` [PATCH v4 22/36] KVM: s390: protvirt: STSI handling
` [PATCH v4 23/36] KVM: s390: protvirt: disallow one_reg
` [PATCH v4 24/36] KVM: s390: protvirt: Do only reset registers that are accessible
` [PATCH v4 25/36] KVM: s390: protvirt: Only sync fmt4 registers
` [PATCH v4 26/36] KVM: s390: protvirt: Add program exception injection
` [PATCH v4 27/36] KVM: s390: protvirt: UV calls in support of diag308 0, 1
` [PATCH v4 28/36] KVM: s390: protvirt: Report CPU state to Ultravisor
` [PATCH v4 29/36] KVM: s390: protvirt: Support cmd 5 operation state
` [PATCH v4 30/36] KVM: s390: protvirt: Mask PSW interrupt bits for interception 104 and 112
` [PATCH v4 31/36] KVM: s390: protvirt: do not inject interrupts after start
` [PATCH v4 32/36] KVM: s390: protvirt: Add UV cpu reset calls
` [PATCH v4 33/36] DOCUMENTATION: Protected virtual machine introduction and IPL
` [PATCH v4 34/36] s390: protvirt: Add sysfs firmware interface for Ultravisor information
` [PATCH v4 35/36] KVM: s390: protvirt: introduce and enable KVM_CAP_S390_PROTECTED
` [PATCH v4 36/36] KVM: s390: protvirt: Add KVM api documentation

[RFC PATCH 0/3] KVM: x86: honor guest memory type
 2020-02-24 10:57 UTC  (9+ messages)

[PATCH 0/1] Documentation fixup
 2020-02-24 10:15 UTC  (2+ messages)
` [PATCH 1/1] KVM: s390: rstify new ioctls in api.rst

INFO: task hung in lock_sock_nested (2)
 2020-02-24 10:08 UTC  (2+ messages)

[PATCH RESEND] KVM: X86: eliminate obsolete KVM_GET_CPUID2 ioctl
 2020-02-24 10:06 UTC  (2+ messages)

[kvm-unit-tests PATCH] Makefile: fix stack-protector tests
 2020-02-24  9:50 UTC  (2+ messages)

[PATCH 3/7] docs: fix broken references to text files
 2020-02-24  9:26 UTC  (5+ messages)
` [PATCH 5/7] docs: fix broken references for ReST files that moved around

[PATCH v3 0/7] use vfio_dma_rw to read/write IOVAs from CPU side
 2020-02-24  8:48 UTC  (8+ messages)
` [PATCH v3 1/7] vfio: allow external user to get vfio group from device
` [PATCH v3 2/7] vfio: introduce vfio_dma_rw to read/write a range of IOVAs
` [PATCH v3 3/7] vfio: avoid inefficient lookup of VFIO group in vfio_pin/unpin_pages
` [PATCH v3 4/7] drm/i915/gvt: hold reference of VFIO group during opening of vgpu
` [PATCH v3 5/7] drm/i915/gvt: subsitute kvm_read/write_guest with vfio_dma_rw
` [PATCH v3 6/7] drm/i915/gvt: avoid unnecessary lookup in each vfio pin & unpin pages
` [PATCH v3 7/7] drm/i915/gvt: rw more pages a time for shadow context

[PATCH v24 00/10] Add ARMv8 RAS virtualization support in QEMU
 2020-02-24  8:37 UTC  (7+ messages)
` [PATCH v24 01/10] acpi: nvdimm: change NVDIMM_UUID_LE to a common macro
` [PATCH v24 09/10] target-arm: kvm64: handle SIGBUS signal from kernel or KVM

[PATCH] KVM: x86: Adjust counter sample period after a wrmsr
 2020-02-24  6:56 UTC  (3+ messages)

[PATCH V4 0/5] vDPA support
 2020-02-24  6:48 UTC  (4+ messages)
` [PATCH V4 3/5] vDPA: introduce vDPA bus

[PATCH v3] KVM: apic: avoid calculating pending eoi from an uninitialized val
 2020-02-24  3:46 UTC 

[PATCH v3] KVM: x86: enable dirty log gradually in small chunks
 2020-02-24  3:25 UTC 

[PATCH][resend] KVM: fix error handling in svm_cpu_init
 2020-02-24  2:08 UTC 

[PATCH] KVM: X86: eliminate some meaningless code
 2020-02-24  1:54 UTC 

[PATCH v2] KVM: apic: avoid calculating pending eoi from an uninitialized val
 2020-02-24  1:53 UTC 

[PATCH] KVM: X86: eliminate some meaningless code
 2020-02-24  1:44 UTC 

RFC: Split EPT huge pages in advance of dirty logging
 2020-02-24  1:07 UTC  (9+ messages)

[PATCH 0/3] KVM: x86: VM alloc bug fix and cleanup
 2020-02-23  9:09 UTC  (3+ messages)
` [PATCH 3/3] KVM: x86: Consolidate VM allocation and free for VMX and SVM

[PATCH][resend] KVM: fix error handling in svm_hardware_setup
 2020-02-23  8:13 UTC 

[PATCH] vhost: Check docket sk_family instead of call getname
 2020-02-23  5:43 UTC  (3+ messages)

[PATCH v2] mm/hugetlb: fix a addressing exception caused by huge_pte_offset()
 2020-02-23  1:24 UTC  (5+ messages)

[RFC PATCH 0/5] Removing support for 32bit KVM/arm host
 2020-02-22 21:31 UTC  (3+ messages)

Proposal for MMIO/PIO dispatch file descriptors (ioregionfd)
 2020-02-22 20:19 UTC 

[RFC v3.1 00/22] intel_iommu: expose Shared Virtual Addressing to VMs
 2020-02-22  8:21 UTC  (24+ messages)
` [RFC v3.1 01/22] scripts/update-linux-headers: Import iommu.h
` [RFC v3.1 02/22] header file update VFIO/IOMMU vSVA APIs
` [RFC v3.1 03/22] vfio: check VFIO_TYPE1_NESTING_IOMMU support
` [RFC v3.1 04/22] hw/iommu: introduce HostIOMMUContext
` [RFC v3.1 05/22] hw/pci: add pci_device_setup_iommu
` [RFC v3.1 06/22] vfio/pci: init HostIOMMUContext per-container
` [RFC v3.1 07/22] vfio: get nesting iommu cap info from Kernel
` [RFC v3.1 08/22] vfio/common: add pasid_alloc/free support
` [RFC v3.1 09/22] hw/pci: add pci_device_host_iommu_context()
` [RFC v3.1 10/22] intel_iommu: add virtual command capability support
` [RFC v3.1 11/22] intel_iommu: process pasid cache invalidation
` [RFC v3.1 12/22] intel_iommu: add PASID cache management infrastructure
` [RFC v3.1 13/22] vfio: add bind stage-1 page table support
` [RFC v3.1 14/22] intel_iommu: bind/unbind guest page table to host
` [RFC v3.1 15/22] intel_iommu: replay guest pasid bindings "
` [RFC v3.1 16/22] intel_iommu: replay pasid binds after context cache invalidation
` [RFC v3.1 17/22] intel_iommu: do not pass down pasid bind for PASID #0
` [RFC v3.1 18/22] vfio/common: add support for flush iommu stage-1 cache
` [RFC v3.1 19/22] intel_iommu: process PASID-based iotlb invalidation
` [RFC v3.1 20/22] intel_iommu: propagate PASID-based iotlb invalidation to host
` [RFC v3.1 21/22] intel_iommu: process PASID-based Device-TLB invalidation
` [RFC v3.1 22/22] intel_iommu: modify x-scalable-mode to be string option

[PATCH v2] KVM: x86: enable dirty log gradually in small chunks
 2020-02-22  8:18 UTC  (9+ messages)

[PATCH v2] mm/hugetlb: fix a addressing exception caused by huge_pte_offset()
 2020-02-22  3:33 UTC 

[PATCH] mm/hugetlb: avoid get wrong ptep caused by race
 2020-02-22  2:15 UTC  (8+ messages)

[Bug 206579] New: KVM with passthrough generates "BUG: kernel NULL pointer dereference" and crashes
 2020-02-22  0:21 UTC  (5+ messages)
` [Bug 206579] "

[kvm-unit-tests PATCH] x86: pmu: Test perfctr overflow after WRMSR on a running counter
 2020-02-21 22:41 UTC 

[PATCH v17 0/9] mm / virtio: Provide support for free page reporting
 2020-02-21 20:19 UTC  (7+ messages)
` [PATCH v17 4/9] mm: Introduce Reported pages

[PATCH v2 0/3] KVM: x86: Minor emulator cleanup
 2020-02-21 18:28 UTC  (10+ messages)
` [PATCH v2 1/3] KVM: x86: Add EMULTYPE_PF when emulation is triggered by a page fault
` [PATCH v2 3/3] KVM: x86: Move #PF retry tracking variables into emulation context

[RFC PATCH 0/3] KVM: x86: honor guest memory type
 2020-02-21 18:21 UTC  (11+ messages)

[PATCH v6 00/22] KVM: Dynamically size memslot arrays
 2020-02-21 17:47 UTC  (5+ messages)
` [PATCH v6 14/22] KVM: Clean up local variable usage in __kvm_set_memory_region()
` [PATCH v6 17/22] KVM: Terminate memslot walks via used_slots

[PATCH 00/10] KVM: x86: Clean up VMX's TLB flushing code
 2020-02-21 17:32 UTC  (23+ messages)
` [PATCH 01/10] KVM: VMX: Use vpid_sync_context() directly when possible
` [PATCH 02/10] KVM: VMX: Move vpid_sync_vcpu_addr() down a few lines
` [PATCH 03/10] KVM: VMX: Handle INVVPID fallback logic in vpid_sync_vcpu_addr()
` [PATCH 04/10] KVM: VMX: Fold vpid_sync_vcpu_{single,global}() into vpid_sync_context()
` [PATCH 05/10] KVM: nVMX: Use vpid_sync_vcpu_addr() to emulate INVVPID with address
` [PATCH 06/10] KVM: x86: Move "flush guest's TLB" logic to separate kvm_x86_ops hook
` [PATCH 07/10] KVM: VMX: Clean up vmx_flush_tlb_gva()
` [PATCH 08/10] KVM: x86: Drop @invalidate_gpa param from kvm_x86_ops' tlb_flush()

[PATCH] accel/kvm: Check ioctl(KVM_SET_USER_MEMORY_REGION) return value
 2020-02-21 17:03 UTC  (3+ messages)

[PATCH][resend] KVM: fix error handling in svm_cpu_init
 2020-02-21 16:58 UTC  (2+ messages)

[PATCH kvmtool v3] Add emulation for CFI compatible flash memory
 2020-02-21 16:55 UTC 

[PATCH RFC 0/2] KVM: nVMX: fix apicv disablement for L1
 2020-02-21 16:50 UTC  (2+ messages)

[PATCH] KVM: X86: eliminate some meaningless code
 2020-02-21 16:31 UTC  (3+ messages)

[PATCH v2] KVM: apic: avoid calculating pending eoi from an uninitialized val
 2020-02-21 16:14 UTC  (2+ messages)

[PATCH] kvm: x86: svm: Fix NULL pointer dereference when AVIC not enabled
 2020-02-21 16:04 UTC  (3+ messages)

[PATCH 02/10] KVM: VMX: Move vpid_sync_vcpu_addr() down a few lines
 2020-02-21 14:01 UTC 

[PATCH v3 00/37] KVM: s390: Add support for protected VMs
 2020-02-21 13:45 UTC  (22+ messages)
` [PATCH v3 03/37] s390/protvirt: introduce host side setup
` [PATCH v3 09/37] KVM: s390: protvirt: Add initial vm and cpu lifecycle handling
      ` [PATCH v3.1 "
` [PATCH v3 11/37] KVM: s390: protvirt: Secure memory is not mergeable
` [PATCH v3 36/37] KVM: s390: rstify new ioctls in api.rst

[PATCH v3 02/37] KVM: s390/interrupt: do not pin adapter interrupt pages
 2020-02-21 11:05 UTC  (4+ messages)
` [PATCH v3.1 "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).