kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2016-09-22 16:07:12 to 2016-09-28 12:48:07 UTC [more...]

[PATCH 0/7] Add support for monitoring guest TLB operations
 2016-09-28 12:48 UTC  (4+ messages)
` [PATCH 4/7] arm64: tlbflush.h: add __tlbi() macro

[kvm-unit-tests PATCH] powerpc: Check whether TM is available before running other tests
 2016-09-28 12:41 UTC  (5+ messages)

Status of Virtual Machine Introspection in KVM
 2016-09-28 12:37 UTC 

[RFC PATCH 0/3] kvm: x86: speedups for APICv
 2016-09-28 12:14 UTC  (15+ messages)
` [PATCH 1/3] kvm: x86: avoid atomic operations on APICv vmentry
` [PATCH 2/3] kvm: x86: do not use KVM_REQ_EVENT for APICv interrupt injection
` [PATCH 3/3] KVM: x86: do not scan IRR twice on APICv vmentry

[PATCH] target-i386: fix losing XCR0 processor state component bits
 2016-09-28  8:38 UTC  (3+ messages)

[PATCH v2] target-i386: fix losing XCR0 processor state component bits
 2016-09-28  8:36 UTC 

[PATCH] virtio/s390: add missing \n to end of dev_err message
 2016-09-28  6:38 UTC  (2+ messages)

[kvm-unit-tests PATCH v7 00/13] PCI bus support
 2016-09-28  6:33 UTC  (12+ messages)
` [kvm-unit-tests PATCH v7 06/13] pci: Rework pci_bar_addr()
` [kvm-unit-tests PATCH v7 12/13] pci: Add pci-testdev PCI bus test device

[GIT PULL] Please pull my kvm-ppc-next branch
 2016-09-28  4:46 UTC 

[PATCH v3 1/2] mm, proc: Fix region lost in /proc/self/smaps
 2016-09-28  2:27 UTC  (10+ messages)
` [PATCH v3 2/2] Documentation/filesystems/proc.txt: Add more description for maps/smaps

Problem with UBSAN warning
 2016-09-28  0:53 UTC  (3+ messages)

[RFC 00/11] KVM PCIe/MSI passthrough on ARM/ARM64: re-design with transparent MSI mapping
 2016-09-27 20:48 UTC  (12+ messages)
  ` [RFC 01/11] iommu: Add iommu_domain_msi_geometry and DOMAIN_ATTR_MSI_GEOMETRY
  ` [RFC 02/11] iommu: Introduce IOMMU_CAP_TRANSLATE_MSI capability
  ` [RFC 03/11] iommu: Introduce IOMMU_DOMAIN_MIXED
  ` [RFC 04/11] iommu/dma: Allow MSI-only cookies
  ` [RFC 05/11] iommu/dma: iommu_dma_(un)map_mixed
  ` [RFC 06/11] iommu/arm-smmu: Allow IOMMU_DOMAIN_MIXED domain allocation
  ` [RFC 07/11] iommu: Use IOMMU_DOMAIN_MIXED typed domain when IOMMU translates MSI
  ` [RFC 08/11] vfio/type1: Sets the IOVA window in case MSI IOVA need to be allocated
  ` [RFC 09/11] vfio/type1: Reserve IOVAs for IOMMU_DOMAIN_MIXED domains
  ` [RFC 10/11] iommu/arm-smmu: Do not advertise IOMMU_CAP_INTR_REMAP
  ` [RFC 11/11] iommu/arm-smmu: Advertise IOMMU_CAP_TRANSLATE_MSI

[PATCH 0/3] Support userspace irqchip with arch timers
 2016-09-27 19:08 UTC  (4+ messages)
` [PATCH 1/3] KVM: arm/arm64: Cleanup the arch timer code's irqchip checking
` [PATCH 2/3] KVM: arm/arm64: Add ARM arch timer interrupts ABI
` [PATCH 3/3] KVM: arm/arm64: Support arch timers with a userspace gic

[PULL 00/50] KVM/ARM Changes for v4.9
 2016-09-27 18:05 UTC  (51+ messages)
` [PULL 01/50] KVM: arm/arm64: Add VGICv3 save/restore API documentation
` [PULL 02/50] KVM: arm/arm64: Factor out vgic_attr_regs_access functionality
` [PULL 03/50] KVM: arm/arm64: Rename vgic_attr_regs_access to vgic_attr_regs_access_v2
` [PULL 04/50] arm64: KVM: Optimize __guest_enter/exit() to save a few instructions
` [PULL 05/50] KVM: arm: vgic: Drop build compatibility hack for older kernel versions
` [PULL 06/50] arm/kvm: excise redundant cache maintenance
` [PULL 07/50] arm64/kvm: remove unused stub functions
` [PULL 08/50] KVM: arm/arm64: Get rid of exported aliases to static functions
` [PULL 09/50] arm64: KVM: VHE: reset PSTATE.PAN on entry to EL2
` [PULL 10/50] arm64: KVM: Move kvm_vcpu_get_condition out of emulate.c
` [PULL 11/50] arm64: KVM: Move the AArch32 conditional execution to common code
` [PULL 12/50] arm: KVM: Use common AArch32 conditional execution code
` [PULL 13/50] arm64: KVM: Make kvm_skip_instr32 available to HYP
` [PULL 14/50] arm64: KVM: vgic-v2: Add the GICV emulation infrastructure
` [PULL 15/50] arm64: KVM: vgic-v2: Add GICV access from HYP
` [PULL 16/50] arm64: KVM: vgic-v2: Enable GICV access from HYP if access from guest is unsafe
` [PULL 17/50] arm64: KVM: Rename HCR_VA to HCR_VSE
` [PULL 18/50] arm64: KVM: Preserve pending vSError in world switch
` [PULL 19/50] arm64: KVM: Add Virtual Abort injection helper
` [PULL 20/50] arm64: KVM: Add exception code to report EL1 asynchronous aborts
` [PULL 21/50] arm64: KVM: Add EL1 async abort handler
` [PULL 22/50] arm64: KVM: Route asynchronous aborts
` [PULL 23/50] arm64: KVM: Allow an exit code to be tagged with an SError
` [PULL 24/50] arm64: KVM: Inject a Virtual SError if it was pending
` [PULL 25/50] arm64: KVM: Handle async aborts delivered while at EL2
` [PULL 26/50] arm: KVM: Preserve pending Virtual Abort in world switch
` [PULL 27/50] arm: KVM: Add Virtual Abort injection helper
` [PULL 28/50] arm: KVM: Add HYP async abort handler
` [PULL 29/50] arm: KVM: Allow an exit code to be tagged with a Virtual Abort
` [PULL 30/50] arm: KVM: Handle async aborts delivered while at HYP
` [PULL 31/50] arm: KVM: Inject a Virtual Abort if it was pending
` [PULL 32/50] arm: KVM: Drop unreachable HYP abort handlers
` [PULL 33/50] arm/arm64: KVM: Inject virtual abort when guest exits on external abort
` [PULL 34/50] arm/arm64: KVM: Remove external abort test from MMIO handling
` [PULL 35/50] arm64: KVM: Inject a vSerror if detecting a bad GICV access at EL2
` [PULL 36/50] KVM: ARM: cleanup kvm_timer_hyp_init
` [PULL 37/50] arm64: KVM: Use static keys for selecting the GIC backend
` [PULL 38/50] arm64: KVM: Move GIC accessors to arch_gicv3.h
` [PULL 39/50] arm64: KVM: Move vgic-v3 save/restore to virt/kvm/arm/hyp
` [PULL 40/50] KVM: arm64: vgic-its: Introduce config option to guard ITS specific code
` [PULL 41/50] KVM: arm: vgic: Fix compiler warnings when built for 32-bit
` [PULL 42/50] KVM: arm: vgic: Support 64-bit data manipulation on 32-bit host systems
` [PULL 43/50] ARM: Introduce MPIDR_LEVEL_SHIFT macro
` [PULL 44/50] ARM: Move system register accessors to asm/cp15.h
` [PULL 45/50] ARM: gic-v3: Introduce 32-to-64-bit mappings for GICv3 cpu registers
` [PULL 46/50] ARM: KVM: Support vgic-v3
` [PULL 47/50] arm64: KVM: Remove duplicating init code for setting VMID
` [PULL 48/50] ARM: gic-v3: Work around definition of gic_write_bpr1
` [PULL 49/50] KVM: arm64: Require in-kernel irqchip for PMU support
` [PULL 50/50] KVM: arm/arm64: vgic: Don't flush/sync without a working vgic

[PATCH] KVM: X86: MMU: no mmu_notifier_seq++ in kvm_age_hva
 2016-09-27 17:00 UTC  (5+ messages)

Call for Outreachy mentors
 2016-09-27 16:03 UTC 

[PATCH] KVM: VMX: refactor global page-sized bitmaps
 2016-09-27 14:13 UTC  (4+ messages)

KVM call for agenda for 2016-08-27
 2016-09-27 12:59 UTC  (3+ messages)

[PATCH 0/5] target-i386: Eliminate unnecessary has_msr_* global variables
 2016-09-27 12:44 UTC  (8+ messages)
` [PATCH 1/5] target-i386: Remove has_msr_mtrr global variable
` [PATCH 2/5] target-i386: Remove has_msr_hv_apic "
` [PATCH 3/5] target-i386: Remove has_msr_hv_tsc "
` [PATCH 4/5] target-i386: Clear KVM CPUID features if KVM is disabled
` [PATCH 5/5] target-i386: Remove has_msr_* global vars for KVM features
  ` [Qemu-devel] [PATCH 0/5] target-i386: Eliminate unnecessary has_msr_* global variables

[patch] KVM: PPC: fix a sanity check
 2016-09-27  5:46 UTC  (2+ messages)

[PATCH] KVM: PPC: Book3S PR: Support 64kB page size on POWER8E and POWER8NVL
 2016-09-27  5:45 UTC  (2+ messages)

[PATCH] KVM: PPC: Book3s PR: Allow access to unprivileged MMCR2 register
 2016-09-27  5:45 UTC  (2+ messages)

when guest set A/D bit of guest pte, should VMM intercept and update A/D bit of spte?
 2013-06-18  9:05 UTC 

I’d like to help you out
 2016-09-26 16:10 UTC 

[PATCH v7] KVM: arm/arm64: Route vtimer events to user space
 2016-09-26 12:06 UTC 

[PATCH] vhost: mark symbols static in vhost.c
 2016-09-26 11:45 UTC 

[PATCH] hmp: fix qemu crash due to ioapic state dump w/ split irqchip
 2016-09-26  8:23 UTC  (3+ messages)
` [Qemu-devel] "

Re;一般贸易退税&東莞/深圳/廣州/中山/香港物流
 2016-09-25 19:51 UTC 

[Bug 105311] New: AMD-Vi: Event logged [INVALID_DEVICE_REQUEST device=00:14.0 address=0x000000fdf9103300 flags=0x0600]
 2016-09-24 19:40 UTC  (2+ messages)
` [Bug 105311] "

RE RE
 2016-09-24  6:04 UTC 

[PATCH v6] KVM: arm/arm64: Route vtimer events to user space
 2016-09-23 14:42 UTC  (6+ messages)

[kvm-unit-tests PATCH] arm/arm64: don't configure default devices
 2016-09-23 13:08 UTC 

[PATCH] KVM: VMX: Better name x2apic msr bitmaps
 2016-09-23 11:17 UTC 

[RFC PATCH v1 00/28] x86: Secure Encrypted Virtualization (AMD)
 2016-09-23  9:50 UTC  (22+ messages)
` [RFC PATCH v1 09/28] x86/efi: Access EFI data as encrypted when SEV is active

[PATCH] arm/arm64: KVM: Add support for ARMv8 AArch32 execution state
 2016-09-23  9:30 UTC  (3+ messages)

[PATCH v5] KVM: arm/arm64: Route vtimer events to user space
 2016-09-23  9:22 UTC  (10+ messages)

[RFC/PATCHSET 0/3] virtio: Implement virtio pstore device (v5)
 2016-09-23  5:52 UTC  (7+ messages)
` [PATCH 1/3] virtio: Basic implementation of virtio pstore driver
` [PATCH 2/3] qemu: Implement virtio-pstore device

[PATCH] KVM: x86: handle KVM_SET_VCPU_EVENTS/KVM_VCPUEVENT_VALID_SMM properly
 2016-09-23  4:59 UTC 

[kvm-unit-tests PATCH] x86: move APIC timer related defines to headers
 2016-09-23  3:28 UTC  (2+ messages)

[PATCH v4] KVM: VMX: Enable MSR-BASED TPR shadow even if APICv is inactive
 2016-09-22 23:13 UTC  (2+ messages)

[PATCH v2] KVM: nVMX: Fix the NMI IDT-vectoring handling
 2016-09-22 23:12 UTC  (2+ messages)

[PATCH 1/2] config: move x86 kvm_guest.config to a common locaton
 2016-09-22 23:11 UTC  (2+ messages)

[PATCH] KVM: nVMX: Fix reload apic access page warning
 2016-09-22 23:10 UTC  (2+ messages)

[kvm-unit-tests PATCH v2 0/2] x86: apic: add LVTT test
 2016-09-22 22:41 UTC  (2+ messages)

[PATCH 4.7 002/184] MIPS: KVM: Check for pfn noslot case
 2016-09-22 17:38 UTC 

[PATCH] vfio-pci: Disable INTx after MSI/X teardown
 2016-09-22 17:28 UTC 

[PATCH 4.4 004/118] MIPS: KVM: Check for pfn noslot case
 2016-09-22 17:28 UTC 

[PATCH] vfio-pci: Virtualize PCIe & AF FLR
 2016-09-22 16:41 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).