kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-08-21 07:47:51 to 2020-08-25 10:25:27 UTC [more...]

[PATCH v10 00/16] s390/vfio-ap: dynamic configuration support
 2020-08-25 10:25 UTC  (20+ messages)
` [PATCH v10 01/16] s390/vfio-ap: add version vfio_ap module
` [PATCH v10 02/16] s390/vfio-ap: use new AP bus interface to search for queue devices
` [PATCH v10 03/16] s390/vfio-ap: manage link between queue struct and matrix mdev
` [PATCH v10 04/16] s390/zcrypt: driver callback to indicate resource in use
` [PATCH v10 05/16] s390/vfio-ap: implement in-use callback for vfio_ap driver
` [PATCH v10 06/16] s390/vfio-ap: introduce shadow APCB
` [PATCH v10 07/16] s390/vfio-ap: sysfs attribute to display the guest's matrix
` [PATCH v10 08/16] s390/vfio-ap: filter matrix for unavailable queue devices
` [PATCH v10 09/16] s390/vfio-ap: allow assignment of unavailable AP queues to mdev device
` [PATCH v10 10/16] s390/vfio-ap: allow configuration of matrix mdev in use by a KVM guest
` [PATCH v10 11/16] s390/vfio-ap: allow hot plug/unplug of AP resources using mdev device
` [PATCH v10 12/16] s390/zcrypt: Notify driver on config changed and scan complete callbacks
` [PATCH v10 13/16] s390/vfio-ap: handle host AP config change notification
` [PATCH v10 14/16] s390/vfio-ap: handle AP bus scan completed notification
` [PATCH v10 15/16] s390/vfio-ap: handle probe/remove not due to host AP config changes
` [PATCH v10 16/16] s390/vfio-ap: update docs to include dynamic config support

[kvm-unit-tests PATCH v2 0/2] Use same test names in the default and the TAP13 output format
 2020-08-25 10:20 UTC  (3+ messages)
` [kvm-unit-tests PATCH v2 1/2] runtime.bash: remove outdated comment
` [kvm-unit-tests PATCH v2 2/2] Use same test names in the default and the TAP13 output format

[PATCH v6 00/76] x86: SEV-ES Guest Support
 2020-08-25  9:22 UTC  (81+ messages)
` [PATCH v6 01/76] KVM: SVM: nested: Don't allocate VMCB structures on stack
` [PATCH v6 02/76] KVM: SVM: Add GHCB definitions
` [PATCH v6 03/76] KVM: SVM: Add GHCB Accessor functions
` [PATCH v6 04/76] KVM: SVM: Use __packed shorthand
` [PATCH v6 05/76] x86/cpufeatures: Add SEV-ES CPU feature
` [PATCH v6 06/76] x86/traps: Move pf error codes to <asm/trap_pf.h>
` [PATCH v6 07/76] x86/insn: Make inat-tables.c suitable for pre-decompression code
` [PATCH v6 08/76] x86/umip: Factor out instruction fetch
` [PATCH v6 09/76] x86/umip: Factor out instruction decoding
` [PATCH v6 10/76] x86/insn: Add insn_get_modrm_reg_off()
` [PATCH v6 11/76] x86/insn: Add insn_has_rep_prefix() helper
` [PATCH v6 12/76] x86/boot/compressed/64: Disable red-zone usage
` [PATCH v6 13/76] x86/boot/compressed/64: Add IDT Infrastructure
` [PATCH v6 14/76] x86/boot/compressed/64: Rename kaslr_64.c to ident_map_64.c
` [PATCH v6 15/76] x86/boot/compressed/64: Add page-fault handler
` [PATCH v6 16/76] x86/boot/compressed/64: Always switch to own page-table
` [PATCH v6 17/76] x86/boot/compressed/64: Don't pre-map memory in KASLR code
` [PATCH v6 18/76] x86/boot/compressed/64: Change add_identity_map() to take start and end
` [PATCH v6 19/76] x86/boot/compressed/64: Add stage1 #VC handler
` [PATCH v6 20/76] x86/boot/compressed/64: Call set_sev_encryption_mask earlier
` [PATCH v6 21/76] x86/boot/compressed/64: Check return value of kernel_ident_mapping_init()
` [PATCH v6 22/76] x86/boot/compressed/64: Add set_page_en/decrypted() helpers
` [PATCH v6 23/76] x86/boot/compressed/64: Setup GHCB Based VC Exception handler
` [PATCH v6 24/76] x86/boot/compressed/64: Unmap GHCB page before booting the kernel
` [PATCH v6 25/76] x86/sev-es: Add support for handling IOIO exceptions
` [PATCH v6 26/76] x86/fpu: Move xgetbv()/xsetbv() into separate header
` [PATCH v6 27/76] x86/sev-es: Add CPUID handling to #VC handler
` [PATCH v6 28/76] x86/idt: Move IDT to data segment
` [PATCH v6 29/76] x86/idt: Split idt_data setup out of set_intr_gate()
` [PATCH v6 30/76] x86/head/64: Install startup GDT
` [PATCH v6 31/76] x86/head/64: Setup MSR_GS_BASE before calling into C code
` [PATCH v6 32/76] x86/head/64: Load GDT after switch to virtual addresses
` [PATCH v6 33/76] x86/head/64: Load segment registers earlier
` [PATCH v6 34/76] x86/head/64: Switch to initial stack earlier
` [PATCH v6 35/76] x86/head/64: Make fixup_pointer() static inline
` [PATCH v6 36/76] x86/head/64: Load IDT earlier
` [PATCH v6 37/76] x86/head/64: Move early exception dispatch to C code
` [PATCH v6 38/76] x86/head/64: Set CR4.FSGSBASE early
` [PATCH v6 39/76] x86/sev-es: Add SEV-ES Feature Detection
` [PATCH v6 40/76] x86/sev-es: Print SEV-ES info into kernel log
` [PATCH v6 41/76] x86/sev-es: Compile early handler code into kernel image
` [PATCH v6 42/76] x86/sev-es: Setup early #VC handler
` [PATCH v6 43/76] x86/sev-es: Setup GHCB based boot "
` [PATCH v6 44/76] x86/sev-es: Setup per-cpu GHCBs for the runtime handler
` [PATCH v6 45/76] x86/sev-es: Allocate and Map IST stack for #VC handler
` [PATCH v6 46/76] x86/sev-es: Adjust #VC IST Stack on entering NMI handler
` [PATCH v6 47/76] x86/dumpstack/64: Add noinstr version of get_stack_info()
` [PATCH v6 48/76] x86/entry/64: Add entry code for #VC handler
` [PATCH v6 49/76] x86/sev-es: Add Runtime #VC Exception Handler
` [PATCH v6 50/76] x86/sev-es: Wire up existing #VC exit-code handlers
` [PATCH v6 51/76] x86/sev-es: Handle instruction fetches from user-space
` [PATCH v6 52/76] x86/sev-es: Handle MMIO events
` [PATCH v6 53/76] x86/sev-es: Handle MMIO String Instructions
` [PATCH v6 54/76] x86/sev-es: Handle MSR events
` [PATCH v6 55/76] x86/sev-es: Handle DR7 read/write events
` [PATCH v6 56/76] x86/sev-es: Handle WBINVD Events
` [PATCH v6 57/76] x86/sev-es: Handle RDTSC(P) Events
` [PATCH v6 58/76] x86/sev-es: Handle RDPMC Events
` [PATCH v6 59/76] x86/sev-es: Handle INVD Events
` [PATCH v6 60/76] x86/sev-es: Handle MONITOR/MONITORX Events
` [PATCH v6 61/76] x86/sev-es: Handle MWAIT/MWAITX Events
` [PATCH v6 62/76] x86/sev-es: Handle VMMCALL Events
` [PATCH v6 63/76] x86/sev-es: Handle #AC Events
` [PATCH v6 64/76] x86/sev-es: Handle #DB Events
` [PATCH v6 65/76] x86/paravirt: Allow hypervisor specific VMMCALL handling under SEV-ES
` [PATCH v6 66/76] x86/kvm: Add KVM "
` [PATCH v6 67/76] x86/vmware: Add VMware specific handling for VMMCALL "
` [PATCH v6 68/76] x86/realmode: Add SEV-ES specific trampoline entry point
` [PATCH v6 69/76] x86/realmode: Setup AP jump table
` [PATCH v6 70/76] x86/smpboot: Setup TSS for starting AP
` [PATCH v6 71/76] x86/head/64: Don't call verify_cpu() on starting APs
` [PATCH v6 72/76] x86/head/64: Rename start_cpu0
` [PATCH v6 73/76] x86/sev-es: Support CPU offline/online
` [PATCH v6 74/76] x86/sev-es: Handle NMI State
` [PATCH v6 75/76] x86/efi: Add GHCB mappings when SEV-ES is active
` [PATCH v6 76/76] x86/sev-es: Check required CPU features for SEV-ES

[Bug 209025] New: The "VFIO_MAP_DMA failed: Cannot allocate memory" bug is back
 2020-08-25  7:26 UTC  (6+ messages)
` [Bug 209025] "

[PATCH v2 1/2] KVM: LAPIC: Return 0 when getting the tscdeadline timer if the lapic is hw disabled
 2020-08-25  0:58 UTC  (5+ messages)
` [PATCH v2 2/2] KVM: LAPIC: Guarantee the timer is in tsc-deadline mode when setting

[PATCH v4 0/2] Expose new feature for Intel processor
 2020-08-25  0:47 UTC  (3+ messages)
` [PATCH v4 1/2] x86/cpufeatures: Enumerate TSX suspend load address tracking instructions
` [PATCH v4 2/2] x86/kvm: Expose TSX Suspend Load Tracking feature

[PATCH] KVM: VMX: fix crash cleanup when KVM wasn't used
 2020-08-25  0:09 UTC  (6+ messages)

[PATCH v3 00/12] Allow userspace to manage MSRs
 2020-08-24 18:34 UTC  (18+ messages)
` [PATCH v3 05/12] KVM: x86: Add support for exiting to userspace on rdmsr or wrmsr
` [PATCH v3 07/12] KVM: x86: Ensure the MSR bitmap never clears userspace tracked MSRs

[Bug 206579] New: KVM with passthrough generates "BUG: kernel NULL pointer dereference" and crashes
 2020-08-24 17:03 UTC  (2+ messages)
` [Bug 206579] "

vfio-pci regression on x86_64 and Kernel v5.9-rc1
 2020-08-24 14:30 UTC  (2+ messages)

[PATCH v3] PCI: Identifying detached virtual functions
 2020-08-24 14:21 UTC  (3+ messages)
` [PATCH v3] PCI: Introduce flag for "

[kvm-unit-tests PATCH 0/2] Use same test names in the default and the TAP13 output format
 2020-08-24 12:48 UTC  (8+ messages)
` [kvm-unit-tests PATCH 1/2] runtime.bash: remove outdated comment
` [kvm-unit-tests PATCH 2/2] Use same test names in the default and the TAP13 output format

[PATCH v2 0/7] KVM: nSVM: ondemand nested state allocation + smm fixes
 2020-08-24 11:43 UTC  (7+ messages)
` [PATCH v2 2/7] KVM: nSVM: rename nested 'vmcb' to vmcb12_gpa in few places
` [PATCH v2 3/7] KVM: SVM: refactor msr permission bitmap allocation

[PATCH] kvm x86/mmu: use KVM_REQ_MMU_SYNC to sync when needed
 2020-08-24 10:18 UTC 

[PATCH v2] KVM: LAPIC: Narrow down the kick target vCPU
 2020-08-24  5:15 UTC  (2+ messages)

[PATCH 1/2] KVM: LAPIC: Fix updating DFR missing apic map recalculation
 2020-08-24  1:25 UTC  (2+ messages)

[PATCH] KVM: LAPIC: Don't kick vCPU which is injecting already-expired timer
 2020-08-24  0:19 UTC  (3+ messages)

[PATCH 0/8] Convert the intel iommu driver to the dma-iommu api
 2020-08-24  0:04 UTC  (7+ messages)

Modi: Регистрационная информация
 2020-08-23 19:48 UTC 

Modi: Регистрационная информация
 2020-08-23 19:48 UTC 

Modi: Регистрационная информация
 2020-08-23 19:49 UTC 

Modi: Регистрационная информация
 2020-08-23 19:49 UTC 

Modi: Регистрационная информация
 2020-08-23 19:48 UTC 

Modi: Регистрационная информация
 2020-08-23 19:49 UTC 

Modi: Регистрационная информация
 2020-08-23 19:48 UTC 

Modi: Регистрационная информация
 2020-08-23 19:49 UTC 

Modi: Регистрационная информация
 2020-08-23 19:49 UTC 

[PATCH] MIPS: VZ: Only include loongson_regs.h for CPU_LOONGSON64
 2020-08-22 18:24 UTC  (10+ messages)

[GIT PULL] KVM changes for Linux 5.9-rc2
 2020-08-22 17:32 UTC  (2+ messages)

[PATCH] x86/entry/64: Disallow RDPID in paranoid entry if KVM is enabled
 2020-08-22 16:42 UTC  (14+ messages)

[PATCH v5 00/75] x86: SEV-ES Guest Support
 2020-08-22 16:30 UTC  (9+ messages)

[Bug 207489] New: Kernel panic due to Lazy update IOAPIC EOI on an x86_64 *host*, when two (or more) PCI devices from different IOMMU groups are passed to Windows 10 guest, upon guest boot into Windows, with more than 4 VCPUs
 2020-08-22 14:34 UTC  (3+ messages)
` [Bug 207489] "

[RFC PATCH 0/5] KVM: arm64: Add pvtime LPT support
 2020-08-22 10:31 UTC  (4+ messages)

[RFC 0/7] KVM: PKS Virtualization support
 2020-08-22  3:28 UTC  (8+ messages)
` [RFC 2/7] KVM: VMX: Expose IA32_PKRS MSR

[PATCH v2] KVM: nVMX: Update VMCS02 when L2 PAE PDPTE updates detected
 2020-08-22  3:25 UTC  (2+ messages)

[PATCH v2 0/3] KVM: x86: KVM_MEM_PCI_HOLE memory
 2020-08-22  3:19 UTC  (7+ messages)
` [PATCH v2 2/3] KVM: x86: introduce "

[Patch 0/4] Defer page pinning for SEV guests until guest pages touched
 2020-08-21 18:16 UTC  (11+ messages)
` [Patch 2/4] KVM:SVM: Introduce set_spte_notify support

[PATCH AUTOSEL 5.8 36/62] MIPS: KVM: Limit Trap-and-Emulate to MIPS32R2 only
 2020-08-21 16:13 UTC 

[PATCH v2] x86/entry/64: Do not use RDPID in paranoid entry to accomodate KVM
 2020-08-21 15:35 UTC  (4+ messages)

device compatibility interface for live migration with assigned devices
 2020-08-21 14:52 UTC  (14+ messages)
            ` [ovirt-devel] "

[PATCH v6 00/15] vfio: expose virtual Shared Virtual Addressing to VMs
 2020-08-21 13:09 UTC  (4+ messages)
` [PATCH v6 08/15] iommu: Pass domain to sva_unbind_gpasid()

[PATCH v9 0/2] s390: virtio: let arch validate VIRTIO features
 2020-08-21 13:08 UTC  (7+ messages)
` [PATCH v9 1/2] virtio: let arch advertise guest's memory access restrictions
` [PATCH v9 2/2] s390: virtio: PV needs VIRTIO I/O device protection

[PATCH v2 0/6] KVM: arm64: pvtime: Fixes and a new cap
 2020-08-21 13:04 UTC  (3+ messages)

[PATCH kvmtool] update_headers.sh: Remove arm architecture
 2020-08-21 12:28 UTC  (2+ messages)

[PATCH v2 kvmtool] virtio: Fix ordering of virtio_queue__should_signal()
 2020-08-21 12:28 UTC  (2+ messages)

[kvm-unit-tests PATCH 0/4] s390x: Add Protected VM support
 2020-08-21 11:47 UTC  (3+ messages)
` [kvm-unit-tests PATCH 4/4] s390x: add "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).