kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-10-26 15:35:29 to 2020-10-29 09:00:27 UTC [more...]

[PATCH v4 00/15] follow_pfn and other iomap races
 2020-10-29  8:57 UTC  (11+ messages)
` [PATCH v4 05/15] mm/frame-vector: Use FOLL_LONGTERM
` [PATCH v4 06/15] media: videobuf2: Move frame_vector into media subsystem
` [PATCH v4 08/15] mm: Add unsafe_follow_pfn
` [PATCH v4 09/15] media/videbuf1|2: Mark follow_pfn usage as unsafe

[PATCH 0/4] kvm: Add a --enable-debug-kvm option to configure
 2020-10-29  6:13 UTC  (8+ messages)
  ` [PATCH 1/4] configure: "
  ` [PATCH 2/4] kvm: Replace DEBUG_KVM with CONFIG_DEBUG_KVM
    ` [PATCH 3/4] kvm: make printf always compile in debug output
      ` [PATCH 4/4] i386/kvm: "

[PATCH 0/3] KVM: x86/mmu: Add macro for hugepage GFN mask
 2020-10-29  7:08 UTC  (11+ messages)
` [PATCH 1/3] KVM: x86/mmu: Add helper macro for computing "
` [PATCH 2/3] KVM: x86/mmu: Open code GFN "rounding" in TDP MMU
` [PATCH 3/3] KVM: x86/mmu: Use hugepage GFN mask to compute GFN offset mask

[PATCH] [v2] x86: apic: avoid -Wshadow warning in header
 2020-10-29  7:04 UTC  (2+ messages)

[PATCH v11 00/14] s390/vfio-ap: dynamic configuration support
 2020-10-28 15:03 UTC  (26+ messages)
` [PATCH v11 01/14] s390/vfio-ap: No need to disable IRQ after queue reset
` [PATCH v11 02/14] 390/vfio-ap: use new AP bus interface to search for queue devices
` [PATCH v11 03/14] s390/vfio-ap: manage link between queue struct and matrix mdev
` [PATCH v11 04/14] s390/zcrypt: driver callback to indicate resource in use
` [PATCH v11 05/14] s390/vfio-ap: implement in-use callback for vfio_ap driver
` [PATCH v11 06/14] s390/vfio-ap: introduce shadow APCB
` [PATCH v11 07/14] s390/vfio-ap: sysfs attribute to display the guest's matrix
` [PATCH v11 08/14] s390/vfio-ap: hot plug/unplug queues on bind/unbind of queue device
` [PATCH v11 09/14] s390/vfio-ap: allow assignment of unavailable AP queues to mdev device
` [PATCH v11 11/14] s390/zcrypt: Notify driver on config changed and scan complete callbacks

[PATCH v2 0/2] DIAG 318 tests and fix
 2020-10-28  8:23 UTC  (8+ messages)
` [PATCH v2 1/2] s390/kvm: fix diag318 reset

[PATCH v2 8/8] x86/ioapic: Generate RTE directly from parent irqchip's MSI message
 2020-10-28 23:22 UTC  (6+ messages)
` [PATCH v3 00/35] Fix x2apic enablement and allow more CPUs, clean up I/OAPIC and MSI bitfields
  ` [PATCH v3 15/35] PCI: vmd: Use msi_msg shadow structs

[Bug 209253] New: Loss of connectivity on guest after important host <-> guest traffic
 2020-10-28 23:41 UTC  (7+ messages)
` [Bug 209253] "

[PATCH v6 0/4] KVM: nSVM: ondemand nested state allocation
 2020-10-28  8:51 UTC  (5+ messages)
` [PATCH v6 2/4] KVM: x86: report negative values from wrmsr emulation to userspace

[PATCH rc] mm: always have io_remap_pfn_range() set pgprot_decrypted()
 2020-10-28 18:53 UTC 

[PATCH 0/8] slab: provide and use krealloc_array()
 2020-10-28  8:47 UTC  (20+ messages)
` [PATCH 1/8] mm: slab: provide krealloc_array()
` [PATCH 2/8] ALSA: pcm: use krealloc_array()
` [PATCH 3/8] vhost: vringh: "
` [PATCH 4/8] pinctrl: "
` [PATCH 5/8] edac: ghes: "
` [PATCH 6/8] drm: atomic: "
` [PATCH 7/8] hwtracing: intel: "
` [PATCH 8/8] dma-buf: "

[RFC PATCH 1/2] sched/wait: Add add_wait_queue_priority()
 2020-10-28 14:44 UTC  (22+ messages)
` [RFC PATCH 2/2] kvm/eventfd: Use priority waitqueue to catch events before userspace
    ` [PATCH 0/3] Allow in-kernel consumers to drain events from eventfd
      ` [PATCH 1/3] eventfd: Export eventfd_ctx_do_read()
      ` [PATCH 2/3] vfio/virqfd: Drain events from eventfd in virqfd_wakeup()
      ` [PATCH 3/3] kvm/eventfd: Drain events from eventfd in irqfd_wakeup()
` [PATCH v2 0/2] Allow KVM IRQFD to consistently intercept events
  ` [PATCH v2 1/2] sched/wait: Add add_wait_queue_priority()
  ` [PATCH v2 2/2] kvm/eventfd: Use priority waitqueue to catch events before userspace

[PATCH] x86: kvm: avoid -Wshadow warning in header
 2020-10-28 18:31 UTC  (3+ messages)

[PATCH 1/3] sched: better handling for busy polling loops
 2020-10-28  0:29 UTC  (5+ messages)

[PATCH 00/11] KVM: arm64: Move PC/ELR/SPSR/PSTATE updatess to EL2
 2020-10-28 20:24 UTC  (19+ messages)
` [PATCH 03/11] KVM: arm64: Make kvm_skip_instr() and co private to HYP
` [PATCH 04/11] KVM: arm64: Move PC rollback on SError "
` [PATCH 07/11] KVM: arm64: Inject AArch64 exceptions from HYP
` [PATCH 08/11] KVM: arm64: Inject AArch32 "

[PATCH 00/22] Introduce the TDP MMU
 2020-10-28 17:36 UTC  (4+ messages)
` [PATCH 04/22] KVM: mmu: extract spte.h and spte.c

[PATCH 0/6] Some fixes and a test for KVM_CAP_ENFORCE_PV_CPUID
 2020-10-27 23:10 UTC  (7+ messages)
` [PATCH 1/6] selftests: kvm: add tsc_msrs_test binary to gitignore
` [PATCH 2/6] Documentation: kvm: fix ordering of msr filter, pv documentation
` [PATCH 3/6] kvm: x86: reads of restricted pv msrs should also result in #GP
` [PATCH 4/6] kvm: x86: ensure pv_cpuid.features is initialized when enabling cap
` [PATCH 5/6] kvm: x86: request masterclock update any time guest uses different msr
` [PATCH 6/6] selftests: kvm: test enforcement of paravirtual cpuid features

[PATCH 0/5] Add a dirty logging performance test
 2020-10-27 23:37 UTC  (6+ messages)
` [PATCH 1/5] KVM: selftests: Factor code out of demand_paging_test
` [PATCH 2/5] KVM: selftests: Remove address rounding in guest code
` [PATCH 3/5] KVM: selftests: Simplify demand_paging_test with timespec_diff_now
` [PATCH 4/5] KVM: selftests: Add wrfract to common guest code
` [PATCH 5/5] KVM: selftests: Introduce the dirty log perf test

[PATCH v3 00/11] KVM: VMX: Clean up Hyper-V PV TLB flush
 2020-10-27 21:23 UTC  (12+ messages)
` [PATCH v3 01/11] KVM: x86: Get active PCID only when writing a CR3 value
` [PATCH v3 02/11] KVM: VMX: Track common EPTP for Hyper-V's paravirt TLB flush
` [PATCH v3 03/11] KVM: VMX: Stash kvm_vmx in a local variable for Hyper-V "
` [PATCH v3 04/11] KVM: VMX: Fold Hyper-V EPTP checking into it's only caller
` [PATCH v3 05/11] KVM: VMX: Do Hyper-V TLB flush iff vCPU's EPTP hasn't been flushed
` [PATCH v3 06/11] KVM: VMX: Invalidate hv_tlb_eptp to denote an EPTP mismatch
` [PATCH v3 07/11] KVM: VMX: Don't invalidate hv_tlb_eptp if the new EPTP matches
` [PATCH v3 08/11] KVM: VMX: Explicitly check for hv_remote_flush_tlb when loading pgd
` [PATCH v3 09/11] KVM: VMX: Define Hyper-V paravirt TLB flush fields iff Hyper-V is enabled
` [PATCH v3 10/11] KVM: VMX: Skip additional Hyper-V TLB EPTP flushes if one fails
` [PATCH v3 11/11] KVM: VMX: Track root HPA instead of EPTP for paravirt Hyper-V TLB flush

[PATCH 1/3] locking/rwlocks: Add contention detection for rwlocks
 2020-10-27 20:17 UTC  (8+ messages)
` [PATCH 2/3] sched: Add needbreak "
` [PATCH 3/3] sched: Add cond_resched_rwlock

[PATCH 1/2] kvm: x86/mmu: Add existing trace points to TDP MMU
 2020-10-27 17:59 UTC  (2+ messages)
` [PATCH 2/2] kvm: x86/mmu: Add TDP MMU SPTE changed trace point

[PATCH v1 1/5] driver core: platform: Introduce platform_get_mem_or_io_resource()
 2020-10-27 17:58 UTC  (2+ messages)
` [PATCH v1 2/5] vfio: platform: Switch to use platform_get_mem_or_io_resource()

[RFC PATCH kvmtool v3 0/3] SPE support
 2020-10-27 17:17 UTC  (4+ messages)
` [RFC PATCH kvmtool v3 1/3] update_headers: Sync kvm UAPI headers with linux 5.10-rc1
` [RFC PATCH kvmtool v3 2/3] init: Add last_{init, exit} list macros
` [RFC PATCH kvmtool v3 3/3] arm64: Add SPE support

[kvm-unit-tests RFC PATCH v2 0/5] arm64: Statistical Profiling Extension Tests
 2020-10-27 17:19 UTC  (6+ messages)
` [kvm-unit-tests RFC PATCH v2 1/5] arm64: Move get_id_aa64dfr0() in processor.h
` [kvm-unit-tests RFC PATCH v2 2/5] lib/{bitops,alloc_page}.h: Add missing headers
` [kvm-unit-tests RFC PATCH v2 3/5] arm64: spe: Add introspection test
` [kvm-unit-tests RFC PATCH v2 4/5] lib: arm/arm64: Add function to unmap a page
` [kvm-unit-tests RFC PATCH v2 5/5] am64: spe: Add buffer test

[PATCH v10 00/11] SMMUv3 Nested Stage Setup (VFIO part)
 2020-10-27 13:04 UTC  (6+ messages)
` [PATCH v10 01/11] vfio: VFIO_IOMMU_SET_PASID_TABLE

AMD SME encrpytion and PCI BAR pages to user space
 2020-10-27 11:58 UTC  (7+ messages)

[PATCH v2 0/1] KVM: arm64: fix the mmio faulting
 2020-10-27  4:04 UTC  (3+ messages)
` [PATCH v2 1/1] KVM: arm64: Correctly handle "

[RFC PATCH 0/8] KVM: x86/mmu: Introduce pinned SPTEs framework
 2020-10-27  3:22 UTC  (5+ messages)

[RFCv2 00/16] KVM protected memory extension
 2020-10-26 23:58 UTC  (15+ messages)
` [RFCv2 08/16] KVM: Use GUP instead of copy_from/to_user() to access guest memory
` [RFCv2 15/16] KVM: Unmap protected pages from direct mapping

[Bug 209867] New: CPU soft lockup/stall with nested KVM and SMP
 2020-10-26 20:05 UTC  (2+ messages)
` [Bug 209867] "

[PATCH] KVM: selftests: test behavior of unmapped L2 APIC-access address
 2020-10-26 18:09 UTC 

[PATCH v3 0/2] KVM: SVM: Create separate vmcbs for L1 and L2
 2020-10-26 17:42 UTC  (3+ messages)
` [PATCH v3 1/2] KVM: SVM: Track asid from vcpu_svm
` [PATCH v3 2/2] KVM: SVM: Use a separate vmcb for the nested L2 guest

[PATCH 00/13] s390x/pci: s390-pci updates for kernel 5.10-rc1
 2020-10-26 17:40 UTC  (18+ messages)
` [PATCH 01/13] update-linux-headers: Add vfio_zdev.h
` [PATCH 02/13] linux-headers: update against 5.10-rc1
` [PATCH 07/13] s390x/pci: Honor DMA limits set by vfio
` [PATCH 08/13] s390x/pci: create a header dedicated to PCI CLP
` [PATCH 09/13] s390x/pci: use a PCI Group structure
` [PATCH 10/13] s390x/pci: clean up s390 PCI groups
` [PATCH 11/13] s390x/pci: use a PCI Function structure
` [PATCH 12/13] vfio: Add routine for finding VFIO_DEVICE_GET_INFO capabilities
` [PATCH 13/13] s390x/pci: get zPCI function info from host

[PATCH v11 12/14] s390/vfio-ap: handle host AP config change notification
 2020-10-26 17:21 UTC  (4+ messages)

[PATCH] vfio/fsl-mc: Make vfio_fsl_mc_irqs_allocate static
 2020-10-26 16:53 UTC 

[PATCH v4 0/2] KVM: x86: hyper-v: make KVM_GET_SUPPORTED_HV_CPUID more useful
 2020-10-26 16:30 UTC  (3+ messages)
` [PATCH v4 1/2] KVM: x86: hyper-v: allow KVM_GET_SUPPORTED_HV_CPUID as a system ioctl
` [PATCH v4 2/2] KVM: selftests: test "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).