messages from 2023-05-20 07:42:44 to 2023-05-23 07:21:53 UTC [more...]
[PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
2023-05-23 7:19 UTC (3+ messages)
` [PATCH v7 08/14] KVM: Rename mmu_notifier_*
[PATCH v2 0/6] KVM: x86/mmu: refine memtype related mmu zap
2023-05-23 6:21 UTC (4+ messages)
` [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
[PATCH] mmu_notifiers: Notify on pte permission upgrades
2023-05-23 6:45 UTC (15+ messages)
[PATCH v2] vfio/type1: check pfn valid before converting to struct page
2023-05-23 5:48 UTC (3+ messages)
[RFC PATCH v3 00/17] vsock: MSG_ZEROCOPY flag support
2023-05-23 5:46 UTC (23+ messages)
` [RFC PATCH v3 01/17] vsock/virtio: read data from non-linear skb
` [RFC PATCH v3 02/17] vhost/vsock: "
` [RFC PATCH v3 03/17] vsock/virtio: support to send "
` [RFC PATCH v3 04/17] vsock/virtio: non-linear skb handling for tap
` [RFC PATCH v3 05/17] vsock/virtio: MSG_ZEROCOPY flag support
` [RFC PATCH v3 06/17] vsock: check error queue to set EPOLLERR
` [RFC PATCH v3 07/17] vsock: read from socket's error queue
` [RFC PATCH v3 08/17] vsock: check for MSG_ZEROCOPY support
` [RFC PATCH v3 09/17] vsock: enable SOCK_SUPPORT_ZC bit
` [RFC PATCH v3 10/17] vhost/vsock: support MSG_ZEROCOPY for transport
` [RFC PATCH v3 11/17] vsock/virtio: "
` [RFC PATCH v3 12/17] vsock/loopback: "
` [RFC PATCH v3 13/17] net/sock: enable setting SO_ZEROCOPY for PF_VSOCK
` [RFC PATCH v3 14/17] docs: net: description of MSG_ZEROCOPY for AF_VSOCK
` [RFC PATCH v3 15/17] test/vsock: MSG_ZEROCOPY flag tests
` [RFC PATCH v3 16/17] test/vsock: MSG_ZEROCOPY support for vsock_perf
` [RFC PATCH v3 17/17] test/vsock: io_uring rx/tx tests
[PATCH v3 0/6] Expose GPU memory as coherently CPU accessible
2023-05-23 5:43 UTC (5+ messages)
` [PATCH v3 3/6] mm: handle poisoning of pfn without struct pages
[PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
2023-05-23 4:47 UTC (13+ messages)
[PATCH v2] KVM: x86/mmu: Assert on @mmu in the __kvm_mmu_invalidate_addr()
2023-05-23 3:29 UTC
[PATCH v10 00/30] Add KVM LoongArch support
2023-05-23 2:54 UTC (8+ messages)
[ANNOUNCE / RFC] Periodic Upstream Call for KVM
2023-05-23 2:19 UTC (4+ messages)
[PATCH v13 000/113] KVM TDX basic feature support
2023-05-23 2:23 UTC (3+ messages)
` [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
[PATCH v11 00/23] Add vfio_device cdev for iommufd support
2023-05-23 2:13 UTC (19+ messages)
` [PATCH v11 03/23] vfio: Accept vfio device file in the KVM facing kAPI
` [PATCH v11 10/23] vfio-iommufd: Move noiommu compat probe out of vfio_iommufd_bind()
` [PATCH v11 13/23] vfio-iommufd: Add detach_ioas support for physical VFIO devices
` [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
` [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
` [PATCH v11 21/23] vfio: Determine noiommu device in __vfio_register_dev()
[PATCH v3 00/18] x86/reboot: KVM: Clean up "emergency" virt code
2023-05-23 2:02 UTC (34+ messages)
` [PATCH v3 02/18] x86/reboot: Harden virtualization hooks for emergency reboot
` [PATCH v3 03/18] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
` [PATCH v3 04/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM "
` [PATCH v3 05/18] x86/reboot: Disable virtualization during reboot iff callback is registered
` [PATCH v3 06/18] x86/reboot: Assert that IRQs are disabled when turning off virtualization
` [PATCH v3 07/18] x86/reboot: Hoist "disable virt" helpers above "emergency reboot" path
` [PATCH v3 08/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_{INTEL,AMD} is enabled
` [PATCH v3 09/18] x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
` [PATCH v3 10/18] x86/virt: KVM: Move VMXOFF helpers into "
` [PATCH v3 13/18] x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()
` [PATCH v3 14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
` [PATCH v3 15/18] KVM: VMX: Ensure CPU is stable when probing basic VMX support
` [PATCH v3 16/18] x86/virt: KVM: Move "disable SVM" helper into KVM SVM
` [PATCH v3 17/18] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
[PATCH 0/2][next] vfio/ccw: Replace one-element array with flexible-array member
2023-05-23 1:35 UTC (3+ messages)
` [PATCH 1/2][next] "
` [PATCH 2/2][next] vfio/ccw: Use struct_size() helper
[PATCH kernel v5 0/6] KVM: SEV: Enable AMD SEV-ES DebugSwap
2023-05-22 23:44 UTC (9+ messages)
` [PATCH kernel v5 3/6] KVM: SEV-ES: explicitly disable debug
` [PATCH kernel v5 4/6] KVM: SVM/SEV/SEV-ES: Rework intercepts
` [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
` [PATCH kernel v5 6/6] x86/sev: Do not handle #VC for DR7 read/write
Rename restrictedmem => guardedmem? (was: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM)
2023-05-23 0:21 UTC (14+ messages)
[PATCH V5 00/11] vfio/pci: Support dynamic allocation of MSI-X interrupts
2023-05-22 22:52 UTC (3+ messages)
[PATCH v10 0/5] Support writable CPU ID registers from userspace
2023-05-22 22:18 UTC (6+ messages)
` [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
` [PATCH v10 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
` [PATCH v10 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
` [PATCH v10 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
` [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
[Bug 217307] New: windows guest entering boot loop when nested virtualization enabled and hyperv installed
2023-05-22 22:14 UTC (2+ messages)
` [Bug 217307] "
[PATCH v6 0/4] KVM: allow mapping non-refcounted pages
2023-05-22 21:55 UTC (5+ messages)
` [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
` [PATCH v6 4/4] KVM: mmu: remove over-aggressive warnings
[PATCH v20 00/21] s390x: CPU Topology
2023-05-22 19:47 UTC (7+ messages)
` [PATCH v20 14/21] tests/avocado: s390x cpu topology core
` [PATCH v20 15/21] tests/avocado: s390x cpu topology polarisation
` [PATCH v20 16/21] tests/avocado: s390x cpu topology entitlement tests
[PATCH v9 0/5] Support writable CPU ID registers from userspace
2023-05-22 17:27 UTC (11+ messages)
` [PATCH v9 1/5] KVM: arm64: Save ID registers' sanitized value per guest
` [PATCH v9 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
[PATCH v4] vfio/pci: Propagate ACPI notifications to user-space via eventfd
2023-05-22 16:58 UTC
[PATCH v2 0/2] KVM: SVM: small tweaks for sev_hardware_setup
2023-05-22 16:12 UTC (3+ messages)
` [PATCH v2 1/2] KVM: SVM: free sev_*asid_bitmap init if SEV init fails
` [PATCH v2 2/2] KVM: SVM: enhance info printk's in SEV init
[PATCH v3 0/2] iommu/amd: Fix GAM IRTEs affinity and GALog restart
2023-05-22 15:16 UTC (2+ messages)
[kvm-unit-tests PATCH v9 0/2] S390x: CPU Topology Information
2023-05-22 15:17 UTC (4+ messages)
` [kvm-unit-tests PATCH v9 1/2] s390x: topology: Check the Perform Topology Function
[PATCH v2 0/7] KVM: selftests: Add tests for pmu event filter
2023-05-22 15:02 UTC (3+ messages)
[PATCH v2 00/13] local_clock() vs noinstr
2023-05-22 14:18 UTC (3+ messages)
` [PATCH v2 06/13] s390/time: Provide sched_clock_noinstr()
[PATCH 1/2] x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline
2023-05-22 14:13 UTC (2+ messages)
[kvm-unit-tests PATCH] arm64: Make vector_table and vector_stub weak symbols
2023-05-22 13:54 UTC (3+ messages)
[PATCH v7 0/1] arm: enable MTE for QEMU + kvm
2023-05-22 12:04 UTC (2+ messages)
[PATCH v6 00/10] Enhance vfio PCI hot reset for vfio cdev device
2023-05-22 11:57 UTC (11+ messages)
` [PATCH v6 01/10] vfio-iommufd: Create iommufd_access for noiommu devices
` [PATCH v6 02/10] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
` [PATCH v6 03/10] vfio/pci: Move the existing hot reset logic to be a helper
` [PATCH v6 04/10] iommufd: Reserve all negative IDs in the iommufd xarray
` [PATCH v6 05/10] iommufd: Add iommufd_ctx_has_group()
` [PATCH v6 06/10] iommufd: Add helper to retrieve iommufd_ctx and devid
` [PATCH v6 07/10] vfio: Mark cdev usage in vfio_device
` [PATCH v6 08/10] vfio: Add helper to search vfio_device in a dev_set
` [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
` [PATCH v6 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
[PATCH RFCv2 00/24] IOMMUFD Dirty Tracking
2023-05-22 10:43 UTC (4+ messages)
` [PATCH RFCv2 21/24] iommu/arm-smmu-v3: Enable HTTU for stage1 with io-pgtable mapping
[RFC PATCH v2 00/11] Intel IA32_SPEC_CTRL Virtualization
2023-05-22 9:43 UTC (11+ messages)
` [RFC PATCH v2 06/11] KVM: x86: Advertise ARCH_CAP_VIRTUAL_ENUM support
` [RFC PATCH v2 08/11] KVM: VMX: Advertise MITI_ENUM_RETPOLINE_S_SUPPORT
` [RFC PATCH v2 09/11] KVM: VMX: Advertise MITI_CTRL_BHB_CLEAR_SEQ_S_SUPPORT
` [RFC PATCH v2 10/11] KVM: selftests: Add tests for virtual enumeration/mitigation MSRs
[PATCH -next v20 00/26] riscv: Add vector ISA support
2023-05-22 9:40 UTC (4+ messages)
` [PATCH -next v20 11/26] riscv: Allocate user's vector context in the first-use trap
[PATCH] vhost: use kzalloc() instead of kmalloc() followed by memset()
2023-05-22 8:50 UTC
[PATCH v11 00/31] Add KVM LoongArch support
2023-05-22 7:14 UTC (34+ messages)
` [PATCH v11 01/31] LoongArch: KVM: Add kvm related header files
` [PATCH v11 02/31] LoongArch: KVM: Implement kvm module related interface
` [PATCH v11 03/31] LoongArch: KVM: Implement kvm hardware enable, disable interface
` [PATCH v11 04/31] LoongArch: KVM: Implement VM related functions
` [PATCH v11 05/31] LoongArch: KVM: Add vcpu related header files
` [PATCH v11 06/31] LoongArch: KVM: Implement vcpu create and destroy interface
` [PATCH v11 07/31] LoongArch: KVM: Implement vcpu run interface
` [PATCH v11 08/31] LoongArch: KVM: Implement vcpu handle exit interface
` [PATCH v11 09/31] LoongArch: KVM: Implement vcpu get, vcpu set registers
` [PATCH v11 10/31] LoongArch: KVM: Implement vcpu ENABLE_CAP ioctl interface
` [PATCH v11 11/31] LoongArch: KVM: Implement fpu related operations for vcpu
` [PATCH v11 12/31] LoongArch: KVM: Implement vcpu interrupt operations
` [PATCH v11 13/31] LoongArch: KVM: Implement misc vcpu related interfaces
` [PATCH v11 14/31] LoongArch: KVM: Implement vcpu load and vcpu put operations
` [PATCH v11 15/31] LoongArch: KVM: Implement vcpu status description
` [PATCH v11 16/31] LoongArch: KVM: Implement update VM id function
` [PATCH v11 17/31] LoongArch: KVM: Implement virtual machine tlb operations
` [PATCH v11 18/31] LoongArch: KVM: Implement vcpu timer operations
` [PATCH v11 19/31] LoongArch: KVM: Implement kvm mmu operations
` [PATCH v11 20/31] LoongArch: KVM: Implement handle csr excption
` [PATCH v11 21/31] LoongArch: KVM: Implement handle iocsr exception
` [PATCH v11 22/31] LoongArch: KVM: Implement handle idle exception
` [PATCH v11 23/31] LoongArch: KVM: Implement handle gspr exception
` [PATCH v11 24/31] LoongArch: KVM: Implement handle mmio exception
` [PATCH v11 25/31] LoongArch: KVM: Implement handle fpu exception
` [PATCH v11 26/31] LoongArch: KVM: Implement kvm exception vector
` [PATCH v11 27/31] LoongArch: KVM: Implement vcpu world switch
` [PATCH v11 28/31] LoongArch: KVM: Implement probe virtualization when LoongArch cpu init
` [PATCH v11 29/31] LoongArch: KVM: Enable kvm config and add the makefile
` [PATCH v11 30/31] LoongArch: KVM: Supplement kvm document about LoongArch-specific part
` [PATCH v11 31/31] LoongArch: KVM: Add maintainers for LoongArch KVM
[PATCH] RISC-V: KVM: Redirect AMO load/store misaligned traps to guest
2023-05-22 4:19 UTC (2+ messages)
[PATCH -next v20 20/26] riscv: Add prctl controls for userspace vector management
2023-05-22 4:12 UTC (3+ messages)
[GIT PULL] KVM fixes for Linux 6.4-rc3
2023-05-21 21:04 UTC (2+ messages)
[PATCH v4 0/6] KVM: arm64: Add support for FEAT_TLBIRANGE
2023-05-21 19:32 UTC (3+ messages)
` [PATCH v4 6/6] KVM: arm64: Use TLBI range-based intructions for unmap
[PATCH] KVM: arm64: Relax trapping of CTR_EL0 when FEAT_EVT is available
2023-05-21 19:19 UTC (3+ messages)
[PATCH v8 0/6] Support writable CPU ID registers from userspace
2023-05-20 8:45 UTC (8+ messages)
` [PATCH v8 6/6] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
[PATCH] vfio/pci: demote hiding ecap messages to debug level
2023-05-20 7:41 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).