kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-03-13 03:40:13 to 2020-03-17 02:02:43 UTC [more...]

[PATCH v5 00/23] irqchip/gic-v4: GICv4.1 architecture support
 2020-03-17  2:02 UTC  (16+ messages)
` [PATCH v5 02/23] irqchip/gic-v4.1: Skip absent CPUs while iterating over redistributors
` [PATCH v5 06/23] irqchip/gic-v4.1: Advertise support v4.1 to KVM
` [PATCH v5 07/23] irqchip/gic-v4.1: Map the ITS SGIR register page
` [PATCH v5 08/23] irqchip/gic-v4.1: Plumb skeletal VSGI irqchip
` [PATCH v5 09/23] irqchip/gic-v4.1: Add initial SGI configuration
` [PATCH v5 10/23] irqchip/gic-v4.1: Plumb mask/unmask SGI callbacks
` [PATCH v5 11/23] irqchip/gic-v4.1: Plumb get/set_irqchip_state "

[PATCH 0/2] kvm-unit-test: nVMX: Test GUEST_BNDCFGS VM-Entry control on vmentry of nested guests
 2020-03-17  1:21 UTC  (3+ messages)
` [PATCH 1/2] kvm-unit-test: VMX: Add enum for GUEST_BNDCFGS field and LOAD_BNDCFGS vmentry control field
` [PATCH 2/2] kvm-unit-test: nVMX: Test GUEST_BNDCFGS VM-Entry control on vmentry of nested guests

[PATCH v3 00/19] Support disabling TCG on ARM (part 2)
 2020-03-16 23:10 UTC  (41+ messages)
` [PATCH v3 01/19] target/arm: Rename KVM set_feature() as kvm_set_feature()
` [PATCH v3 02/19] target/arm: Make set_feature() available for other files
` [PATCH v3 03/19] target/arm: Restrict DC-CVAP instruction to TCG accel
` [PATCH v3 04/19] target/arm: Restric the Address Translate operations "
` [PATCH v3 05/19] target/arm: Restrict Virtualization Host Extensions instructions to TCG
` [PATCH v3 06/19] target/arm: Move Makefile variable restricted to CONFIG_TCG
` [PATCH v3 07/19] target/arm: Make cpu_register() available for other files
` [PATCH v3 08/19] target/arm: Add semihosting stub to allow building without TCG
` [PATCH v3 09/19] target/arm: Move ARM_V7M Kconfig from hw/ to target/
` [PATCH v3 10/19] target/arm: Restrict ARMv4 cpus to TCG accel
` [PATCH v3 11/19] target/arm: Restrict ARMv5 "
` [PATCH v3 12/19] target/arm: Restrict ARMv6 "
` [PATCH v3 13/19] target/arm: Restrict ARMv7 R-profile "
` [PATCH v3 14/19] target/arm: Restrict ARMv7 M-profile "
` [PATCH v3 15/19] target/arm: Make m_helper.c optional via CONFIG_ARM_V7M
` [PATCH v3 16/19] target/arm: Do not build TCG objects when TCG is off
` [PATCH v3 17/19] hw/arm: Automatically select the 'virt' machine on KVM
` [PATCH v3 18/19] hw/arm: Do not build to 'virt' machine on Xen
` [PATCH v3 19/19] .travis.yml: Add a KVM-only Aarch64 job

[Patch v1] x86: Fix the logical destination mode test
 2020-03-16 22:27 UTC  (2+ messages)

[Bug 206825] kernel BUG at arch/x86/kvm/mmu.c:296!
 2020-03-16 22:13 UTC  (2+ messages)

linux-next: Fixes tag needs some work in the kvm tree
 2020-03-16 20:36 UTC 

[PATCH v13 Kernel 0/7] KABIs to support migration for VFIO devices
 2020-03-16 19:25 UTC  (9+ messages)
` [PATCH v13 Kernel 4/7] vfio iommu: Implementation of ioctl to for dirty pages tracking
` [PATCH v13 Kernel 5/7] vfio iommu: Update UNMAP_DMA ioctl to get dirty bitmap before unmap
` [PATCH v13 Kernel 7/7] vfio: Selective dirty page tracking if IOMMU backed device pins pages

[PATCH v2 0/2] KVM: selftests: steal_time cleanups and timespec rework
 2020-03-16 17:37 UTC  (3+ messages)
` [PATCH v2 1/2] fixup! KVM: selftests: Introduce steal-time test
` [PATCH v2 2/2] KVM: selftests: Rework timespec functions and usage

[PATCH] KVM: X86: correct meaningless kvm_apicv_activated() check
 2020-03-16 16:39 UTC  (6+ messages)

[PATCH] KVM: s390: mark sie block as 512 byte aligned
 2020-03-16 14:22 UTC  (4+ messages)

KASAN: user-memory-access Read in kvmclock_cpufreq_notifier
 2020-03-16 14:07 UTC 

[PATCH v2] KVM: s390: Also reset registers in sync regs for initial cpu reset
 2020-03-16 11:45 UTC  (3+ messages)

[PATCH] kvm: support to get/set dirty log initial-all-set capability
 2020-03-16 11:07 UTC  (2+ messages)

[PATCH 0/2] KVM: selftests: steal_time cleanups and timespec rework
 2020-03-16 11:01 UTC  (3+ messages)
` [PATCH 1/2] fixup! KVM: selftests: Introduce steal-time test
` [PATCH 2/2] KVM: selftests: Rework timespec functions and usage

[RFC PATCH] vfio: Ignore -ENODEV when getting MSI cookie
 2020-03-16  8:58 UTC  (3+ messages)

[PATCH v4 0/7] use vfio_dma_rw to read/write IOVAs from CPU side
 2020-03-16  3:24 UTC  (6+ messages)
` [PATCH v4 7/7] drm/i915/gvt: rw more pages a time for shadow context

[GIT PULL 00/36] KVM: s390: Features and Enhancements for 5.7 part1
 2020-03-15 18:15 UTC  (3+ messages)

[PATCH 0/2] Fix errors when try to build kvm selftests on
 2020-03-15  9:34 UTC  (3+ messages)
` [PATCH 1/2] kvm: selftests: Fix no directory error when OUTPUT specified
` [PATCH 2/2] selftests: export INSTALL_HDR_PATH if using "O" to specify output dir

[PATCH v5 0/9] x86/split_lock: Add feature split lock detection
 2020-03-15  5:05 UTC  (10+ messages)
` [PATCH v5 1/9] x86/split_lock: Rework the initialization flow of "
` [PATCH v5 2/9] x86/split_lock: Avoid runtime reads of the TEST_CTRL MSR
` [PATCH v5 3/9] x86/split_lock: Re-define the kernel param option for split_lock_detect
` [PATCH v5 4/9] x86/split_lock: Export handle_user_split_lock()
` [PATCH v5 5/9] kvm: x86: Emulate split-lock access as a write
` [PATCH v5 6/9] kvm: vmx: Extend VMX's #AC interceptor to handle split lock #AC happens in guest
` [PATCH v5 7/9] kvm: x86: Emulate MSR IA32_CORE_CAPABILITIES
` [PATCH v5 8/9] kvm: vmx: Enable MSR_TEST_CTRL for intel guest
` [PATCH v5 9/9] x86: vmx: virtualize split lock detection

BUG: unable to handle kernel NULL pointer dereference in corrupted (5)
 2020-03-14  7:53 UTC 

[PATCH 0/6] KVM: nVMX: propperly handle enlightened vmptrld failure conditions
 2020-03-14 11:52 UTC  (2+ messages)

[PATCH 0/5] selftests: KVM: s390: Accumulated fixes and extensions
 2020-03-14 16:02 UTC  (3+ messages)

[PATCH 0/2] KVM: selftests: Introduce steal-time tests for x86_64 and AArch64
 2020-03-14 11:44 UTC  (4+ messages)
` [PATCH 1/2] KVM: selftests: virt_map should take npages, not size
` [PATCH 2/2] KVM: selftests: Introduce steal-time test

[PATCH 0/4] KVM: selftests: Various cleanups and fixes
 2020-03-14 11:44 UTC  (3+ messages)

[PATCH v2] cpuidle-haltpoll: allow force loading on hosts without the REALTIME hint
 2020-03-14 10:40 UTC  (4+ messages)

[PATCH v2 0/2] kvm: selftests: Introduce TEST_FAIL and convert
 2020-03-14 11:37 UTC  (2+ messages)

[PATCH] KVM: X86: avoid meaningless kvm_apicv_activated() check
 2020-03-14 11:31 UTC  (3+ messages)

[PATCH v5 0/5] x86/kvm/hyper-v: add support for synthetic debugger
 2020-03-14 14:14 UTC  (9+ messages)
` [PATCH v5 1/5] x86/kvm/hyper-v: Explicitly align hcall param for kvm_hyperv_exit
` [PATCH v5 2/5] x86/hyper-v: Add synthetic debugger definitions
` [PATCH v5 3/5] x86/kvm/hyper-v: Add support for synthetic debugger capability
` [PATCH v5 4/5] x86/kvm/hyper-v: enable hypercalls regardless of hypercall page
` [PATCH v5 5/5] x86/kvm/hyper-v: Add support for synthetic debugger via hypercalls

[PATCH] KVM: nVMX: Consolidate nested MTF checks to helper function
 2020-03-14 11:14 UTC  (2+ messages)

[PATCH v8 0/5] Add a unified parameter "nopvspin"
 2020-03-14 11:14 UTC  (2+ messages)

[PATCH v2] KVM: VMX: Micro-optimize vmexit time when not exposing PMU
 2020-03-14 11:00 UTC  (2+ messages)

[GIT PULL 0/1] KVM: s390: Fix for 5.6
 2020-03-14 10:59 UTC  (2+ messages)

[PATCH] kvm: svm: Introduce GA Log tracepoint for AVIC
 2020-03-14 10:58 UTC  (2+ messages)

[PATCH] KVM: selftests: s390x: Provide additional num-guest-pages adjustment
 2020-03-14 10:58 UTC  (2+ messages)

[PATCH v4 00/10] x86/split_lock: Add feature split lock detection support in kvm
 2020-03-15  2:56 UTC  (12+ messages)
` [PATCH v4 01/10] x86/split_lock: Rework the initialization flow of split lock detection
` [PATCH v4 02/10] x86/split_lock: Avoid runtime reads of the TEST_CTRL MSR
` [PATCH v4 03/10] x86/split_lock: Re-define the kernel param option for split_lock_detect
` [PATCH v4 04/10] x86/split_lock: Export handle_user_split_lock()
` [PATCH v4 05/10] x86/split_lock: Add and export several functions for KVM
` [PATCH v4 06/10] kvm: x86: Emulate split-lock access as a write
` [PATCH v4 07/10] kvm: vmx: Extend VMX's #AC interceptor to handle split lock #AC happens in guest
` [PATCH v4 08/10] kvm: x86: Emulate MSR IA32_CORE_CAPABILITIES
` [PATCH v4 09/10] kvm: vmx: Enable MSR_TEST_CTRL for intel guest
` [PATCH v4 10/10] x86: vmx: virtualize split lock detection

[kvm-unit-tests PATCH 0/8] nVMX: Clean up __enter_guest() and co
 2020-03-14 10:35 UTC  (2+ messages)

[GIT PULL] KVM changes for Linux 5.6-rc6
 2020-03-15  2:30 UTC  (2+ messages)

[Patch v2] KVM: x86: Initializing all kvm_lapic_irq fields in ioapic_write_indirect
 2020-03-14  9:45 UTC  (9+ messages)

[PATCH] KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1
 2020-03-14  9:32 UTC  (3+ messages)

[Patch v3] KVM: x86: Initializing all kvm_lapic_irq fields in ioapic_write_indirect
 2020-03-13 17:37 UTC 

[PATCH 00/10] KVM: VMX: Unionize vcpu_vmx.exit_reason
 2020-03-13 16:17 UTC  (23+ messages)
` [PATCH 01/10] KVM: nVMX: Move reflection check into nested_vmx_reflect_vmexit()
` [PATCH 02/10] KVM: nVMX: Drop a superfluous WARN on reflecting EXTERNAL_INTERRUPT
` [PATCH 03/10] KVM: nVMX: Pull exit_reason from vcpu_vmx in nested_vmx_exit_reflected()
` [PATCH 04/10] KVM: VMX: Convert local exit_reason to u16 "
` [PATCH 05/10] KVM: VMX: Convert local exit_reason to u16 in vmx_handle_exit()
` [PATCH 06/10] KVM: nVMX: Convert local exit_reason to u16 in ...enter_non_root_mode()
` [PATCH 07/10] KVM: nVMX: Cast exit_reason to u16 to check for nested EXTERNAL_INTERRUPT
` [PATCH 08/10] KVM: nVMX: Rename exit_reason to vm_exit_reason for nested VM-Exit
` [PATCH 09/10] KVM: VMX: Cache vmx->exit_reason in local u16 in vmx_handle_exit_irqoff()
` [PATCH 10/10] KVM: VMX: Convert vcpu_vmx.exit_reason to a union

[PATCH] KVM: s390: pending interrupts are unlikely
 2020-03-13 12:52 UTC  (3+ messages)

[PATCH -next 018/491] KERNEL VIRTUAL MACHINE for s390 (KVM/s390): Use fallthrough;
 2020-03-13 12:04 UTC  (2+ messages)

[PATCH] KVM: x86: Print symbolic names of VMX VM-Exit flags in traces
 2020-03-13 10:20 UTC  (2+ messages)

[RFC PATCH 00/62] Linux as SEV-ES Guest Support
 2020-03-13  9:12 UTC  (4+ messages)
` [PATCH 38/62] x86/sev-es: Handle instruction fetches from user-space

[PATCH] KVM: VMX: Micro-optimize vmexit time when not exposing PMU
 2020-03-13  9:08 UTC  (8+ messages)

[kvm-unit-tests PATCH v6 00/13] arm/arm64: Add ITS tests
 2020-03-13  8:17 UTC  (4+ messages)
` [kvm-unit-tests PATCH v6 10/13] arm/arm64: ITS: INT functional tests

[PATCH v11 00/20] KVM RISC-V Support
 2020-03-13  7:51 UTC  (21+ messages)
` [PATCH v11 01/20] RISC-V: Export riscv_cpuid_to_hartid_mask() API
` [PATCH v11 02/20] RISC-V: Add bitmap reprensenting ISA features common across CPUs
` [PATCH v11 03/20] RISC-V: Remove N-extension related defines
` [PATCH v11 04/20] RISC-V: Add hypervisor extension related CSR defines
` [PATCH v11 05/20] RISC-V: Add initial skeletal KVM support
` [PATCH v11 06/20] RISC-V: KVM: Implement VCPU create, init and destroy functions
` [PATCH v11 07/20] RISC-V: KVM: Implement VCPU interrupts and requests handling
` [PATCH v11 08/20] RISC-V: KVM: Implement KVM_GET_ONE_REG/KVM_SET_ONE_REG ioctls
` [PATCH v11 09/20] RISC-V: KVM: Implement VCPU world-switch
` [PATCH v11 10/20] RISC-V: KVM: Handle MMIO exits for VCPU
` [PATCH v11 11/20] RISC-V: KVM: Handle WFI "
` [PATCH v11 12/20] RISC-V: KVM: Implement VMID allocator
` [PATCH v11 13/20] RISC-V: KVM: Implement stage2 page table programming
` [PATCH v11 14/20] RISC-V: KVM: Implement MMU notifiers
` [PATCH v11 15/20] RISC-V: KVM: Add timer functionality
` [PATCH v11 16/20] RISC-V: KVM: FP lazy save/restore
` [PATCH v11 17/20] RISC-V: KVM: Implement ONE REG interface for FP registers
` [PATCH v11 18/20] RISC-V: KVM: Add SBI v0.1 support
` [PATCH v11 19/20] RISC-V: KVM: Document RISC-V specific parts of KVM API
` [PATCH v11 20/20] RISC-V: KVM: Add MAINTAINERS entry

[PATCH v2 Resend 1/3] KVM: MIPS: Change KVM_ENTRYHI_ASID to cpu_asid_mask(&current_cpu_data)
 2020-03-13  6:38 UTC  (3+ messages)
` [PATCH v2 Resend 3/3] KVM: MIPS: Support kvm modules autoprobed when startup system


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).