kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-10-19 16:37:52 to 2020-10-22 02:34:51 UTC [more...]

[PATCH v2 00/20] Introduce the TDP MMU
 2020-10-22  2:34 UTC  (26+ messages)
` [PATCH v2 02/20] kvm: x86/mmu: Introduce tdp_iter
` [PATCH v2 04/20] kvm: x86/mmu: Allocate and free TDP MMU roots
` [PATCH v2 07/20] kvm: x86/mmu: Support zapping SPTEs in the TDP MMU
` [PATCH v2 15/20] kvm: x86/mmu: Support dirty logging for "

[PATCH] KVM: X86: Expose KVM_HINTS_REALTIME in KVM_GET_SUPPORTED_CPUID
 2020-10-22  1:34 UTC 

[PATCH v2] KVM: x86: Add tracepoint for dr_write/dr_read
 2020-10-22  0:43 UTC  (2+ messages)

(proposal) RE: [PATCH v7 00/16] vfio: expose virtual Shared Virtual Addressing to VMs
 2020-10-21 23:53 UTC  (36+ messages)

[PATCH v3 00/16] follow_pfn and other iomap races
 2020-10-21 23:20 UTC  (30+ messages)
` [PATCH v3 01/16] drm/exynos: Stop using frame_vector helpers
` [PATCH v3 02/16] drm/exynos: Use FOLL_LONGTERM for g2d cmdlists
` [PATCH v3 03/16] misc/habana: Stop using frame_vector helpers
` [PATCH v3 04/16] misc/habana: Use FOLL_LONGTERM for userptr
` [PATCH v3 05/16] mm/frame-vector: Use FOLL_LONGTERM
` [PATCH v3 06/16] media: videobuf2: Move frame_vector into media subsystem
` [PATCH v3 07/16] mm: Close race in generic_access_phys
` [PATCH v3 08/16] s390/pci: Remove races against pte updates
` [PATCH v3 09/16] mm: Add unsafe_follow_pfn
` [PATCH v3 10/16] media/videbuf1|2: Mark follow_pfn usage as unsafe
` [PATCH v3 11/16] vfio/type1: Mark follow_pfn "
` [PATCH v3 12/16] PCI: Obey iomem restrictions for procfs mmap
` [PATCH v3 13/16] /dev/mem: Only set filp->f_mapping
` [PATCH v3 14/16] resource: Move devmem revoke code to resource framework
` [PATCH v3 15/16] sysfs: Support zapping of binary attr mmaps
` [PATCH v3 16/16] PCI: Revoke mappings like devmem

[PATCH] KVM: VMX: Forbid userspace MSR filters for x2APIC
 2020-10-21 21:36 UTC 

[PATCH] KVM: VMX: Ignore userspace MSR filters for x2APIC
 2020-10-21 21:36 UTC 

[RFCv2 00/16] KVM protected memory extension
 2020-10-21 18:50 UTC  (35+ messages)
` [RFCv2 01/16] x86/mm: Move force_dma_unencrypted() to common code
` [RFCv2 02/16] x86/kvm: Introduce KVM memory protection feature
` [RFCv2 03/16] x86/kvm: Make DMA pages shared
` [RFCv2 04/16] x86/kvm: Use bounce buffers for KVM memory protection
` [RFCv2 05/16] x86/kvm: Make VirtIO use DMA API in KVM guest
` [RFCv2 06/16] x86/kvmclock: Share hvclock memory with the host
` [RFCv2 07/16] x86/realmode: Share trampoline area if KVM memory protection enabled
` [RFCv2 08/16] KVM: Use GUP instead of copy_from/to_user() to access guest memory
` [RFCv2 09/16] KVM: mm: Introduce VM_KVM_PROTECTED
` [RFCv2 10/16] KVM: x86: Use GUP for page walk instead of __get_user()
` [RFCv2 11/16] KVM: Protected memory extension
` [RFCv2 12/16] KVM: x86: Enabled protected "
` [RFCv2 13/16] KVM: Rework copy_to/from_guest() to avoid direct mapping
` [RFCv2 14/16] KVM: Handle protected memory in __kvm_map_gfn()/__kvm_unmap_gfn()
` [RFCv2 15/16] KVM: Unmap protected pages from direct mapping
` [RFCv2 16/16] mm: Do not use zero page for VM_KVM_PROTECTED VMAs

[PATCH v2 00/10] KVM: VMX: Clean up Hyper-V PV TLB flush
 2020-10-21 17:59 UTC  (23+ messages)
` [PATCH v2 01/10] KVM: VMX: Track common EPTP for Hyper-V's paravirt "
` [PATCH v2 02/10] KVM: VMX: Stash kvm_vmx in a local variable for Hyper-V "
` [PATCH v2 03/10] KVM: VMX: Fold Hyper-V EPTP checking into it's only caller
` [PATCH v2 04/10] KVM: VMX: Do Hyper-V TLB flush iff vCPU's EPTP hasn't been flushed
` [PATCH v2 05/10] KVM: VMX: Invalidate hv_tlb_eptp to denote an EPTP mismatch
` [PATCH v2 06/10] KVM: VMX: Don't invalidate hv_tlb_eptp if the new EPTP matches
` [PATCH v2 07/10] KVM: VMX: Explicitly check for hv_remote_flush_tlb when loading pgd
` [PATCH v2 08/10] KVM: VMX: Define Hyper-V paravirt TLB flush fields iff Hyper-V is enabled
` [PATCH v2 09/10] KVM: VMX: Skip additional Hyper-V TLB EPTP flushes if one fails
` [PATCH v2 10/10] KVM: VMX: Track PGD instead of EPTP for paravirt Hyper-V TLB flush

CPUID.40000001H:EDX.KVM_HINTS_REALTIME[bit 0]
 2020-10-21 17:37 UTC  (4+ messages)

[PATCH] KVM: arm64: Correctly handle the mmio faulting
 2020-10-21 16:16 UTC 

AMD SME encrpytion and PCI BAR pages to user space
 2020-10-21 16:03 UTC  (8+ messages)

[PATCH] s390/vfio-ap: fix unregister GISC when KVM is already gone results in OOPS
 2020-10-21 15:46 UTC  (2+ messages)

[PATCH v2 0/7] Split kvm_update_cpuid_runtime()
 2020-10-21  9:10 UTC  (8+ messages)
` [PATCH v2 1/7] kvm: x86: Extract kvm_apic_base_update_cpuid() from kvm_update_cpuid_runtime()
` [PATCH v2 2/7] kvm: x86: Extract kvm_xcr0_update_cpuid() "
` [PATCH v2 3/7] kvm: x86: Extract kvm_osxsave_update_cpuid() and kvm_pke_update_cpuid() "
` [PATCH v2 4/7] kvm: x86: Extract kvm_mwait_update_cpuid() "
` [PATCH v2 5/7] [Trivial] kvm: x86: cpuid_query_maxphyaddr(): Use a simple 'e' instead of misleading 'best', as the variable name
` [PATCH v2 6/7] kvm: x86: Refactor kvm_vcpu_after_set_cpuid()
` [PATCH v2 7/7] kvm: x86: Remove kvm_update_cpuid_runtime()

[PATCH v2 00/17] follow_pfn and other iomap races
 2020-10-21  7:55 UTC  (5+ messages)
` [PATCH v2 08/17] s390/pci: Remove races against pte updates

[RESEND v4 0/2] Add bus lock VM exit support
 2020-10-20 22:19 UTC  (5+ messages)
` [RESEND v4 1/2] KVM: VMX: Convert vcpu_vmx.exit_reason to a union
` [RESEND v4 2/2] KVM: VMX: Enable bus lock VM exit

[PATCH v3 02/18] iommu/vt-d: Add DEV-MSI support
 2020-10-20 21:42 UTC  (4+ messages)

[PATCH 0/2] KVM: Introduce ioeventfd read support
 2020-10-20 17:09 UTC  (4+ messages)
` [PATCH 1/2] linux-headers: Add support for reads in ioeventfd
` [PATCH 2/2] kvm: Add ioeventfd read test code

[PATCH] drivers/virt: vmgenid: add vm generation id driver
 2020-10-20 16:54 UTC  (16+ messages)

[RFC PATCH 0/9] Split kvm_update_cpuid_runtime()
 2020-10-20 16:44 UTC  (5+ messages)
` [RFC PATCH 1/9] KVM:x86: Abstract sub functions from kvm_update_cpuid_runtime() and kvm_vcpu_after_set_cpuid()

[PATCH] vfio iommu type1: Fix memory leak in vfio_iommu_type1_pin_pages
 2020-10-20 16:34 UTC  (2+ messages)

[PATCH 00/35] Enhance memory utilization with DMEMFS
 2020-10-20 15:22 UTC  (10+ messages)

[kvm-unit-tests PATCHv2] unittests.cfg: Increase timeout for apic test
 2020-10-20 15:05 UTC  (12+ messages)

[PATCH 1/2] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON when vPMU is enabled
 2020-10-20 14:57 UTC  (2+ messages)
` [PATCH 2/2] KVM: vmx/pmu: Use IA32_PERF_CAPABILITIES to adjust features visibility

[Bug 209253] New: Loss of connectivity on guest after important host <-> guest traffic
 2020-10-20 14:28 UTC  (2+ messages)
` [Bug 209253] "

[PATCH kvmtool] arm64: Determine kernel offset even on non-seekable file descriptors
 2020-10-20 12:30 UTC 

[PATCH] KVM: VMX: Forbid userspace MSR filters for x2APIC
 2020-10-20 11:49 UTC  (8+ messages)

[PATCH 1/2] KVM: not register a IRQ bypass producer if unsupported or disabled
 2020-10-20 10:12 UTC  (6+ messages)
` [PATCH 2/2] KVM: not link irqfd with a fake IRQ bypass producer

[PATCH 0/5] KVM: x86: Handle reserved CR4 bit interception in VMX
 2020-10-20  9:13 UTC  (2+ messages)

[PATCH 0/2 v2] KVM: nSVM: Check reserved values for 'Type' and invalid vectors in EVENTINJ
 2020-10-19 22:35 UTC  (3+ messages)
` [PATCH 1/2 "
` [PATCH 2/2 v2] nSVM: Test "

[PATCH 0/2] KVM: nSVM: Check reserved values for 'Type' and invalid vectors in EVENTINJ
 2020-10-19 17:30 UTC  (4+ messages)
` [PATCH 2/2] nSVM: Test "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).