messages from 2021-04-22 20:56:53 to 2021-04-26 09:09:12 UTC [more...]
[RFC PATCH 0/6] x86/kvm: Virtual suspend time injection support
2021-04-26 9:06 UTC (4+ messages)
` [RFC PATCH 3/6] x86/kvm: Add CONFIG_KVM_VIRT_SUSPEND_TIMING
` [RFC PATCH 5/6] x86/kvm: Add CONFIG_KVM_VIRT_SUSPEND_TIMING_GUEST
` [RFC PATCH 6/6] x86/kvm: Add a guest side support for virtual suspend time injection
[kvm-unit-tests RFC PATCH 0/1] configure: arm: Replace --vmm with --target
2021-04-26 8:59 UTC (6+ messages)
[PATCH v3 0/4] KVM: x86: MSR_TSC_AUX fixes and improvements
2021-04-26 8:57 UTC (8+ messages)
` [PATCH v3 1/4] KVM: SVM: Inject #GP on guest MSR_TSC_AUX accesses if RDTSCP unsupported
` [PATCH v3 2/4] KVM: SVM: Clear MSR_TSC_AUX[63:32] on write
` [PATCH v3 3/4] KVM: x86: Tie Intel and AMD behavior for MSR_TSC_AUX to guest CPU model
` [PATCH v3 4/4] KVM: SVM: Delay restoration of host MSR_TSC_AUX until return to userspace
[RFC PATCH 0/2] Mitigating Excessive Pause-Loop Exiting in VM-Agnostic KVM
2021-04-26 4:10 UTC (7+ messages)
[PATCH] selftests: kvm: Fix the check of return value
2021-04-26 19:31 UTC
About vcpu scheduling strategy
2021-04-26 3:09 UTC
Intercepting RDTSC instruction by causing a VMEXIT
2021-04-26 1:51 UTC (4+ messages)
[RFC PATCH v3 0/8] Add IOPF support for VFIO passthrough
2021-04-26 1:41 UTC (2+ messages)
[PATCH v3 0/7] Hyper-V nested virt enlightenments for SVM
2021-04-25 13:30 UTC (4+ messages)
` [PATCH v3 4/7] KVM: SVM: hyper-v: Nested enlightenments in VMCB
[PATCH kvm-unit-tests v2 0/8] arm/arm64: Prepare for target-efi
2021-04-25 10:35 UTC (10+ messages)
` [PATCH kvm-unit-tests v2 4/8] arm/arm64: mmu: Stop mapping an assumed IO region
` [PATCH kvm-unit-tests v2 5/8] arm/arm64: mmu: Remove memory layout assumptions
` [PATCH kvm-unit-tests v2 6/8] arm/arm64: setup: Consolidate "
[RFC PATCH 0/7] Untrusted device support for virtio
2021-04-25 1:43 UTC (5+ messages)
[PATCH v3 0/4] KVM statistics data fd-based binary interface
2021-04-24 23:49 UTC (7+ messages)
` [PATCH v3 1/4] KVM: stats: Separate common stats from architecture specific ones
` [PATCH v3 2/4] KVM: stats: Add fd-based API to read binary stats data
` [PATCH v3 3/4] KVM: stats: Add documentation for statistics data binary interface
` [PATCH v3 4/4] KVM: selftests: Add selftest for KVM "
[GIT PULL] KVM fix for 5.12 final
2021-04-24 17:05 UTC (2+ messages)
[PATCH 0/2] Cleanup the registers read/write access
2021-04-24 12:31 UTC (4+ messages)
` [PATCH 1/2] KVM: VMX: Keep registers read/write consistent with definition
[PATCH v14 00/13] SMMUv3 Nested Stage Setup (IOMMU part)
2021-04-24 11:29 UTC (8+ messages)
[PATCH 00/43] KVM: x86: vCPU RESET/INIT fixes and consolidation
2021-04-24 0:46 UTC (44+ messages)
` [PATCH 01/43] KVM: nVMX: Set LDTR to its architecturally defined value on nested VM-Exit
` [PATCH 02/43] KVM: VMX: Set EDX at INIT with CPUID.0x1, Family-Model-Stepping
` [PATCH 03/43] KVM: SVM: Require exact CPUID.0x1 match when stuffing EDX at INIT
` [PATCH 04/43] KVM: SVM: Fall back to KVM's hardcoded value for EDX at RESET/INIT
` [PATCH 05/43] KVM: x86: Split out CR0/CR4 MMU role change detectors to separate helpers
` [PATCH 06/43] KVM: x86: Properly reset MMU context at vCPU RESET/INIT
` [PATCH 07/43] KVM: VMX: Remove explicit MMU reset in enter_rmode()
` [PATCH 08/43] KVM: SVM: Drop explicit MMU reset at RESET/INIT
` [PATCH 09/43] KVM: SVM: Drop a redundant init_vmcb() from svm_create_vcpu()
` [PATCH 10/43] KVM: VMX: Move init_vmcs() invocation to vmx_vcpu_reset()
` [PATCH 11/43] KVM: x86: WARN if the APIC map is dirty without an in-kernel local APIC
` [PATCH 12/43] KVM: x86: Remove defunct BSP "update" in local APIC reset
` [PATCH 13/43] KVM: x86: Migrate the PIT only if vcpu0 is migrated, not any BSP
` [PATCH 14/43] KVM: x86: Don't force set BSP bit when local APIC is managed by userspace
` [PATCH 15/43] KVM: x86: Set BSP bit in reset BSP vCPU's APIC base by default
` [PATCH 16/43] KVM: VMX: Stuff vcpu->arch.apic_base directly at vCPU RESET
` [PATCH 17/43] KVM: x86: Open code necessary bits of kvm_lapic_set_base() "
` [PATCH 18/43] KVM: x86: Consolidate APIC base RESET initialization code
` [PATCH 19/43] KVM: x86: Move EDX initialization at vCPU RESET to common code
` [PATCH 20/43] KVM: SVM: Don't bother writing vmcb->save.rip at vCPU RESET/INIT
` [PATCH 21/43] KVM: VMX: Invert handling of CR0.WP for EPT without unrestricted guest
` [PATCH 22/43] KVM: VMX: Remove direct write to vcpu->arch.cr0 during vCPU RESET/INIT
` [PATCH 23/43] KVM: VMX: Fold ept_update_paging_mode_cr0() back into vmx_set_cr0()
` [PATCH 24/43] KVM: nVMX: Do not clear CR3 load/store exiting bits if L1 wants 'em
` [PATCH 25/43] KVM: VMX: Pull GUEST_CR3 from the VMCS iff CR3 load exiting is disabled
` [PATCH 26/43] KVM: VMX: Process CR0.PG side effects after setting CR0 assets
` [PATCH 27/43] KVM: VMX: Skip emulation required checks during pmode/rmode transitions
` [PATCH 28/43] KVM: nVMX: Don't evaluate "emulation required" on VM-Exit
` [PATCH 29/43] KVM: SVM: Tweak order of cr0/cr4/efer writes at RESET/INIT
` [PATCH 30/43] KVM: SVM: Drop redundant writes to vmcb->save.cr4 "
` [PATCH 31/43] KVM: SVM: Stuff save->dr6 at during VMSA sync, not "
` [PATCH 32/43] KVM: VMX: Skip pointless MSR bitmap update when setting EFER
` [PATCH 33/43] KVM: VMX: Refresh list of user return MSRs after setting guest CPUID
` [PATCH 34/43] KVM: VMX: Don't _explicitly_ reconfigure user return MSRs on vCPU INIT
` [PATCH 35/43] KVM: x86: Move setting of sregs during vCPU RESET/INIT to common x86
` [PATCH 36/43] KVM: VMX: Remove obsolete MSR bitmap refresh at vCPU RESET/INIT
` [PATCH 37/43] KVM: nVMX: Remove obsolete MSR bitmap refresh at nested transitions
` [PATCH 38/43] KVM: VMX: Don't redo x2APIC MSR bitmaps when userspace filter is changed
` [PATCH 39/43] KVM: VMX: Remove unnecessary initialization of msr_bitmap_mode
` [PATCH 40/43] KVM: VMX: Smush x2APIC MSR bitmap adjustments into single function
` [PATCH 41/43] KVM: VMX: Remove redundant write to set vCPU as active at RESET/INIT
` [PATCH 42/43] KVM: VMX: Drop VMWRITEs to zero fields at vCPU RESET
` [PATCH 43/43] KVM: x86: Drop pointless @reset_roots from kvm_init_mmu()
[RFC PATCH v4 0/4] vfio-ccw: Fix interrupt handling for HALT/CLEAR
2021-04-24 0:18 UTC (12+ messages)
[PATCH 00/12] Remove vfio_mdev.c, mdev_parent_ops and more
2021-04-24 0:08 UTC (13+ messages)
` [PATCH 01/12] vfio/mdev: Remove CONFIG_VFIO_MDEV_DEVICE
` [PATCH 02/12] vfio/mdev: Allow the mdev_parent_ops to specify the device driver to bind
` [PATCH 03/12] vfio/mtty: Convert to use vfio_register_group_dev()
` [PATCH 04/12] vfio/mdpy: "
` [PATCH 05/12] vfio/mbochs: "
` [PATCH 07/12] vfio/ccw: "
` [PATCH 08/12] vfio/gvt: "
` [PATCH 09/12] vfio/mdev: Remove mdev_parent_ops dev_attr_groups
` [PATCH 10/12] vfio/mdev: Remove mdev_parent_ops
` [PATCH 11/12] vfio/mdev: Use the driver core to create the 'remove' file
` [PATCH 12/12] vfio/mdev: Remove mdev drvdata
[PATCH] KVM: VMX: Invert the inlining of MSR interception helpers
2021-04-23 22:19 UTC
[PATCH 0/7 v7] KVM: nSVM: Check addresses of MSR bitmap and IO bitmap tables on vmrun of nested guests
2021-04-23 20:31 UTC (9+ messages)
` [PATCH 3/7 v7] KVM: nSVM: No need to set bits 11:0 in MSRPM and IOPM bitmaps
[PATCH] uio/uio_pci_generic: fix return value changed in refactoring
2021-04-23 20:28 UTC (2+ messages)
[PATCH v2 1/2] kvm: x86: Allow userspace to handle emulation errors
2021-04-23 18:43 UTC (16+ messages)
[PATCH v15 00/12] SMMUv3 Nested Stage Setup (IOMMU part)
2021-04-23 18:21 UTC (2+ messages)
[PATCH v2 0/4] Add guest support for SEV live migration
2021-04-23 17:44 UTC (7+ messages)
` [PATCH v2 1/4] KVM: x86: invert KVM_HYPERCALL to default to VMMCALL
` [PATCH v2 2/4] mm: x86: Invoke hypercall when page encryption status is changed
` [PATCH v2 3/4] EFI: Introduce the new AMD Memory Encryption GUID
` [PATCH v2 4/4] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature
[PATCH v2] KVM: x86/xen: Take srcu lock when accessing kvm_memslots()
2021-04-23 15:18 UTC (2+ messages)
[PATCH v2] KVM: SVM: Delay restoration of host MSR_TSC_AUX until return to userspace
2021-04-23 14:18 UTC (7+ messages)
[GIT PULL] KVM/arm64 updates for 5.13
2021-04-23 11:42 UTC (2+ messages)
[PATCH 0/3] KVM: selftests: arm64 exception handling and debug test
2021-04-23 11:22 UTC (8+ messages)
` [PATCH 1/3] KVM: selftests: Add exception handling support for aarch64
` [PATCH 2/3] KVM: selftests: Add aarch64/debug-exceptions test
` [PATCH 3/3] KVM: selftests: Use a ucall for x86 unhandled vector reporting
[PATCH] KVM: hyper-v: Add new exit reason HYPERV_OVERLAY
2021-04-23 10:18 UTC (9+ messages)
[PATCH v3 0/9] KVM: Fix tick-based accounting for x86 guests
2021-04-23 9:32 UTC (5+ messages)
` [PATCH v3 9/9] KVM: Move instrumentation-safe annotations for enter/exit to x86 code
[PATCH] mips/kvm: Use BUG_ON instead of if condition followed by BUG
2021-04-23 8:35 UTC
[PATCH] KVM: x86/xen: Take srcu lock when accessing kvm_memslots()
2021-04-23 8:15 UTC (3+ messages)
[RFC PATCH V2 0/7] Do not read from descripto ring
2021-04-23 8:09 UTC (8+ messages)
` [RFC PATCH V2 1/7] virtio-ring: maintain next in extra state for packed virtqueue
` [RFC PATCH V2 2/7] virtio_ring: rename vring_desc_extra_packed
` [RFC PATCH V2 3/7] virtio-ring: factor out desc_extra allocation
` [RFC PATCH V2 4/7] virtio_ring: secure handling of mapping errors
` [RFC PATCH V2 5/7] virtio_ring: introduce virtqueue_desc_add_split()
` [RFC PATCH V2 6/7] virtio: use err label in __vring_new_virtqueue()
` [RFC PATCH V2 7/7] virtio-ring: store DMA metadata in desc_extra for split virtqueue
[PATCH v5 00/15] KVM: SVM: Misc SEV cleanups
2021-04-23 7:08 UTC (7+ messages)
` [PATCH v5 03/15] KVM: SVM: Disable SEV/SEV-ES if NPT is disabled
[PATCH] KVM: x86: Fix implicit enum conversion goof in scattered reverse CPUID code
2021-04-23 7:08 UTC (5+ messages)
[PATCH] KVM: VMX: use EPT_VIOLATION_GVA_TRANSLATED instead of 0x100
2021-04-23 7:04 UTC (2+ messages)
[PATCH 0/4] KVM: x86: Kill off pdptrs_changed()
2021-04-23 7:04 UTC (6+ messages)
` [PATCH 1/4] KVM: nVMX: Drop obsolete (and pointless) pdptrs_changed() check
` [PATCH 2/4] KVM: nSVM: Drop pointless pdptrs_changed() check on nested transition
` [PATCH 3/4] KVM: x86: Always load PDPTRs on CR3 load for SVM w/o NPT and a PAE guest
` [PATCH 4/4] KVM: x86: Unexport kvm_read_guest_page_mmu()
[kvm-unit-tests PATCH 00/14] x86: MSR_GS_BASE and friends
2021-04-23 6:57 UTC (5+ messages)
` [kvm-unit-tests PATCH 01/14] x86/cstart: Don't use MSR_GS_BASE in 32-bit boot code
[PATCH kvm-unit-tests] x86/cstart: Don't use MSR_GS_BASE in 32-bit boot code
2021-04-23 6:53 UTC
[PATCH kvm-unit-tests] nSVM: Test addresses of MSR and IO permissions maps
2021-04-23 6:53 UTC
[PATCH v4 0/2] kvm/arm64: Try stage2 block mapping for host device MMIO
2021-04-23 1:36 UTC (16+ messages)
` [PATCH v4 1/2] kvm/arm64: Remove the creation time's mapping of MMIO regions
` [PATCH v4 2/2] kvm/arm64: Try stage2 block mapping for host device MMIO
[PATCH] KVM: arm64: Correctly handle the mmio faulting
2021-04-23 1:38 UTC (11+ messages)
[PATCH 0/5] KVM: x86: Use kernel x86 cpuid utilities in KVM selftests
2021-04-23 0:08 UTC (4+ messages)
` [PATCH 3/5] tools headers x86: Copy cpuid helpers from the kernel
[PATCH 0/4] Add guest support for SEV live migration
2021-04-23 0:03 UTC (5+ messages)
` [PATCH 1/4] KVM: x86: Add AMD SEV specific Hypercall3
` [PATCH 3/4] EFI: Introduce the new AMD Memory Encryption GUID
` [PATCH 4/4] x86/kvm: Add guest support for detecting and enabling SEV Live Migration feature
[GIT PULL] virtio: last minute fixes
2021-04-22 23:30 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).