kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-11-12 09:54:35 to 2021-11-15 16:52:13 UTC [more...]

[PATCH Part2 v5 00/45] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2021-11-15 16:52 UTC  (38+ messages)

[PATCH] KVM: x86: Fix recording of guest steal time / preempted status
 2021-11-15 16:50 UTC  (29+ messages)
` [PATCH v2] "
        ` [PATCH v3] "
                            ` [RFC PATCH 0/11] Rework gfn_to_pfn_cache
                              ` [PATCH 01/11] KVM: x86: Fix steal time asm constraints in 32-bit mode
                                ` [PATCH 02/11] KVM: x86/xen: Fix get_attr of KVM_XEN_ATTR_TYPE_SHARED_INFO
                                ` [PATCH 03/11] KVM: selftests: Add event channel upcall support to xen_shinfo_test
                                ` [PATCH 04/11] KVM: x86/xen: Use sizeof_field() instead of open-coding it
                                ` [PATCH 05/11] KVM: nVMX: Use kvm_{read,write}_guest_cached() for shadow_vmcs12
                                ` [PATCH 06/11] KVM: nVMX: Use kvm_read_guest_offset_cached() for nested VMCS check
                                ` [PATCH 07/11] KVM: nVMX: Use a gfn_to_hva_cache for vmptrld
                                ` [PATCH 08/11] KVM: Kill kvm_map_gfn() / kvm_unmap_gfn() and gfn_to_pfn_cache
                                ` [PATCH 09/11] KVM: Reinstate gfn_to_pfn_cache with invalidation support
                                ` [PATCH 10/11] KVM: x86/xen: Maintain valid mapping of Xen shared_info page
                                ` [PATCH 11/11] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery

[PATCH v7 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2021-11-15 16:45 UTC  (10+ messages)
` [PATCH v7 01/45] x86/compressed/64: detect/setup SEV/SME features earlier in boot
` [PATCH v7 15/45] x86/compressed: Register GHCB memory when SEV-SNP is active

[PATCH 00/11] Fix BUG_ON in vfio_iommu_group_notifier()
 2021-11-15 16:17 UTC  (26+ messages)
` [PATCH 01/11] iommu: Add device dma ownership set/release interfaces
` [PATCH 02/11] driver core: Set DMA ownership during driver bind/unbind
` [PATCH 03/11] PCI: pci_stub: Suppress kernel DMA ownership auto-claiming
` [PATCH 04/11] PCI: portdrv: "
` [PATCH 05/11] iommu: Add security context management for assigned devices
` [PATCH 06/11] iommu: Expose group variants of dma ownership interfaces
` [PATCH 07/11] vfio: Use DMA_OWNER_USER to declaim passthrough devices
` [PATCH 08/11] vfio: Remove use of vfio_group_viable()
` [PATCH 09/11] vfio: Delete the unbound_list
` [PATCH 10/11] vfio: Remove iommu group notifier
` [PATCH 11/11] iommu: Remove iommu group changes notifier

[PATCH 0/5] KVM: Cap KVM_CAP_NR_VCPUS by KVM_CAP_MAX_VCPUS and re-purpose it on x86
 2021-11-15 16:04 UTC  (12+ messages)
` [PATCH 1/5] KVM: arm64: Cap KVM_CAP_NR_VCPUS by KVM_CAP_MAX_VCPUS

[PATCH v2 0/2] VMX: nested migration fixes for 32 bit nested guests
 2021-11-15 15:50 UTC  (4+ messages)
` [PATCH v2 1/2] KVM: nVMX: don't use vcpu->arch.efer when checking host state on nested state load
` [PATCH v2 2/2] KVM: x86/mmu: include efer.lma in extended mmu role

[PATCH v17 00/15] s390/vfio-ap: dynamic configuration support
 2021-11-15 15:45 UTC  (2+ messages)

[PATCH 00/11] KVM: x86: TDX preparation of introducing vm_type and blocking ioctls based on vm_type
 2021-11-15 15:39 UTC  (20+ messages)
` [PATCH 01/11] KVM: x86: Introduce vm_type to differentiate normal VMs from confidential VMs
` [PATCH 02/11] KVM: x86: Disable direct IRQ injection for TDX
` [PATCH 03/11] KVM: x86: Clean up kvm_vcpu_ioctl_x86_setup_mce()
` [PATCH 04/11] KVM: x86: Disable MCE related stuff for TDX
` [PATCH 05/11] KVM: x86: Disallow tsc manipulation "
` [PATCH 06/11] KVM: x86: Disable in-kernel I/O APIC and level routes "
` [PATCH 07/11] KVM: x86: Disable SMM "
` [PATCH 08/11] KVM: x86: Disable INIT/SIPI "
` [PATCH 09/11] KVM: x86: Block ioctls to access guest state "
` [PATCH 10/11] KVM: Disallow read-only memory for x86 TDX
` [PATCH 11/11] KVM: Disallow dirty logging "

[PATCH 1/6] vhost: get rid of vhost_poll_flush() wrapper
 2021-11-15 15:30 UTC  (6+ messages)
` [PATCH 2/6] vhost_net: get rid of vhost_net_flush_vq() and extra flush calls
` [PATCH 3/6] vhost_test: remove vhost_test_flush_vq()
` [PATCH 4/6] vhost_vsock: simplify vhost_vsock_flush()
` [PATCH 5/6] vhost_net: remove NOP vhost_net_flush() in vhost_net_release()
` [PATCH 6/6] vhost_net: use RCU callbacks instead of synchronize_rcu()

[PATCH] cpuid: kvm_find_kvm_cpuid_features() should be declared 'static'
 2021-11-15 14:41 UTC 

[for-6.1 v3 0/3] virtiofsd: Add support for FUSE_SYNCFS request
 2021-11-15 14:30 UTC  (3+ messages)

[PATCH v2] KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap()
 2021-11-15 14:08 UTC 

[RFC 0/3] vfio/pci: Enable runtime power management support
 2021-11-15 13:36 UTC  (4+ messages)
` [RFC 1/3] vfio/pci: register vfio-pci driver with runtime PM framework
` [RFC 2/3] vfio/pci: virtualize PME related registers bits and initialize to zero
` [RFC 3/3] vfio/pci: use runtime PM for vfio-device into low power state

Re: [PATCH] KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap()
 2021-11-15 13:00 UTC  (2+ messages)

[PATCH 0/3] VMX: nested migration fixes for 32 bit nested guests
 2021-11-15 12:14 UTC  (6+ messages)
` [PATCH 3/3] KVM: x86/mmu: don't skip mmu initialization when mmu root level changes

[PATCH] KVM: x86: fix cocci warnings
 2021-11-15 11:43 UTC  (4+ messages)

[PATCH] KVM: x86: Fix uninitialized eoi_exit_bitmap usage in vcpu_load_eoi_exitmap()
 2021-11-15 10:24 UTC  (2+ messages)

[RFC PATCH kvmtool 0/2] Introduce VirtIO SCMI Device support
 2021-11-15 10:14 UTC  (3+ messages)
` [RFC PATCH kvmtool 1/2] virtio: Add support for VirtIO SCMI Device
` [RFC PATCH kvmtool 2/2] arm/fdt: Add FDT overlay support

linux-next: Tree for Nov 15 (kvm/x86)
 2021-11-15  3:52 UTC 

[PATCH 0/2] kvm: x86: Fix PMU virtualization for some basic events
 2021-11-15  3:43 UTC  (4+ messages)
` [PATCH 1/2] KVM: x86: Update vPMCs when retiring instructions
` [PATCH 2/2] KVM: x86: Update vPMCs when retiring branch instructions

[PATCH 0/6] KVM: Dirty Quota-Based VM Live Migration Auto-Converge
 2021-11-14 14:57 UTC  (7+ messages)
` [PATCH 1/6] Define data structures for dirty quota migration
` [PATCH 2/6] Init dirty quota flag and allocate memory for vCPUdqctx
` [PATCH 3/6] Add KVM_CAP_DIRTY_QUOTA_MIGRATION and handle vCPU page faults
` [PATCH 4/6] Increment dirty counter for vmexit due to page write fault
` [PATCH 5/6] Exit to userspace when dirty quota is full
` [PATCH 6/6] Free vCPUdqctx memory on vCPU destroy

[PATCH] KVM: Fix steal time asm constraints in 32-bit mode
 2021-11-14  8:59 UTC 

[GIT PULL] Second batch of KVM changes for Linux 5.16 merge window
 2021-11-13 19:15 UTC  (2+ messages)

[PATCH v5.5 00/30] KVM: Scalable memslots implementation
 2021-11-13 15:22 UTC  (5+ messages)
` [PATCH v5.5 26/30] KVM: Keep memslots in tree-based structures instead of array-based ones

[PATCH] nitro_enclaves: Remove redundant 'flush_workqueue()' calls
 2021-11-13 12:44 UTC 

[PATCH v5 0/6] optimize the downtime for vfio migration
 2021-11-13  9:21 UTC  (4+ messages)
` [PATCH v5 4/6] kvm: irqchip: extract kvm_irqchip_add_deferred_msi_route

[RFC PATCH v2 00/11] KVM: arm64: Add support for hypercall services selection
 2021-11-13  1:22 UTC  (12+ messages)
` [RFC PATCH v2 01/11] KVM: arm64: Factor out firmware register handling from psci.c
` [RFC PATCH v2 02/11] KVM: Introduce kvm_vcpu_has_run_once
` [RFC PATCH v2 03/11] KVM: Introduce kvm_vm_has_run_once
` [RFC PATCH v2 04/11] KVM: arm64: Setup a framework for hypercall bitmap firmware registers
` [RFC PATCH v2 05/11] KVM: arm64: Add standard hypervisor firmware register
` [RFC PATCH v2 06/11] KVM: arm64: Add vendor "
` [RFC PATCH v2 07/11] Docs: KVM: Add doc for the bitmap firmware registers
` [RFC PATCH v2 08/11] Docs: KVM: Rename psci.rst to hypercalls.rst
` [RFC PATCH v2 09/11] tools: Import ARM SMCCC definitions
` [RFC PATCH v2 10/11] selftests: KVM: aarch64: Introduce hypercall ABI test
` [RFC PATCH v2 11/11] selftests: KVM: aarch64: Add the bitmap firmware registers to get-reg-list

[kvm-unit-tests PATCH] x86/pmu: Test PMU virtualization on emulated instructions
 2021-11-12 23:56 UTC 

[RFC 00/19] KVM: x86/mmu: Optimize disabling dirty logging
 2021-11-12 23:53 UTC  (3+ messages)
` [RFC 02/19] KVM: x86/mmu: Batch TLB flushes for a single zap

[PATCH v12 0/7] Add AMD SEV and SEV-ES intra host migration support
 2021-11-12 23:12 UTC  (2+ messages)

[RFC PATCH v3 0/2] s390x: Improvements to SIGP handling [KVM]
 2021-11-12 20:30 UTC  (9+ messages)
` [RFC PATCH v3 2/2] KVM: s390: Extend the USER_SIGP capability

[RFC PATCH 0/6] KVM: mm: fd-based approach for supporting KVM guest private memory
 2021-11-12 19:28 UTC  (3+ messages)
` [RFC PATCH 1/6] mm: Add F_SEAL_GUEST to shmem/memfd

[PATCH v2 00/12] x86/sev: KEXEC/KDUMP support for SEV-ES guests
 2021-11-12 16:33 UTC  (3+ messages)
` [PATCH v2 08/12] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2

[PATCH 0/4] KVM: selftests: Avoid mmap_sem contention during memory population
 2021-11-12 16:32 UTC  (6+ messages)
` [PATCH 3/4] KVM: selftests: Wait for all vCPU to be created before entering guest mode

[PATCH kvm-unit-tests 0/2] Groups are separated by spaces
 2021-11-12 15:47 UTC  (5+ messages)
` [PATCH kvm-unit-tests 1/2] unittests.cfg: groups should be space separated
` [PATCH kvm-unit-tests 2/2] runtime: Use find_word with groups

[GIT PULL] KVM/arm64 fixes for 5.16, take #1
 2021-11-12 15:37 UTC 

[PATCH v4 00/15] Support Asynchronous Page Fault
 2021-11-12 15:01 UTC  (3+ messages)
` [PATCH v4 07/15] KVM: arm64: Support page-not-present notification

[kvm-unit-tests PATCH v3 0/3] GIC ITS tests
 2021-11-12 14:54 UTC  (8+ messages)
` [kvm-unit-tests PATCH v3 1/3] arm64: remove invalid check from its-trigger test
` [kvm-unit-tests PATCH v3 2/3] arm64: enable its-migration tests for TCG
` [kvm-unit-tests PATCH v3 3/3] arch-run: do not process ERRATA when running under TCG


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).