public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2017-04-24 19:14:54 to 2017-04-27 00:42:44 UTC [more...]

[BUG] x86: failed to boot a kernel on a Ryzen machine
 2017-04-27  0:42 UTC  (8+ messages)

[PATCH v9 0/5] Extend virtio-balloon for fast (de)inflating & fast live migration
 2017-04-26 23:20 UTC  (8+ messages)
` [PATCH v9 2/5] virtio-balloon: VIRTIO_BALLOON_F_BALLOON_CHUNKS
    `  "
            ` [virtio-dev] "

[PATCH] KVM: Expose Virtual Machine Control Structure to SYSFS
 2017-04-26 23:08 UTC 

[PATCH v2] arm64: Add ASM modifier for xN register operands
 2017-04-26 21:46 UTC 

[PATCH v3 00/24] pic/ioapic/irqchip cleanups + minor fixes
 2017-04-26 20:47 UTC  (14+ messages)
` [PATCH v3 01/24] KVM: x86: race between KVM_SET_GSI_ROUTING and KVM_CREATE_IRQCHIP
    ` [PATCH] KVM: x86: don't hold kvm->lock in KVM_SET_GSI_ROUTING

[PATCH] x86: kvm: Avoid guest page table walk when gpa_available is set
 2017-04-26 20:44 UTC  (6+ messages)

[PATCH v2 0/9] KVM: towards maintainable kvm_make_all_cpus_request()
 2017-04-26 20:32 UTC  (10+ messages)
` [PATCH v2 1/9] KVM: add kvm_{test,clear}_request to replace {test,clear}_bit
` [PATCH v2 2/9] KVM: x86: always use kvm_make_request instead of set_bit
` [PATCH v2 3/9] KVM: remove #ifndef CONFIG_S390 around kvm_vcpu_wake_up
` [PATCH v2 4/9] KVM: mark requests that do not need a wakeup
` [PATCH v2 5/9] KVM: perform a wake_up in kvm_make_all_cpus_request
` [PATCH v2 6/9] KVM: add explicit barrier to kvm_vcpu_kick
` [PATCH v2 7/9] KVM: improve arch vcpu request defining
` [PATCH v2 8/9] KVM: return if kvm_vcpu_wake_up() did wake up the VCPU
` [PATCH v2 9/9] KVM: mark requests that need synchronization

[RFC PATCH 0/8] Shared Virtual Memory virtualization for VT-d
 2017-04-26 18:59 UTC  (13+ messages)
` [RFC PATCH 1/8] iommu: Introduce bind_pasid_table API function
` [RFC PATCH 2/8] iommu/vt-d: add bind_pasid_table function
` [RFC PATCH 3/8] iommu: Introduce iommu do invalidate API function
` [RFC PATCH 4/8] iommu/vt-d: Add iommu do invalidate function
` [RFC PATCH 5/8] VFIO: Add new IOTCL for PASID Table bind propagation
` [RFC PATCH 6/8] VFIO: do pasid table binding
` [RFC PATCH 7/8] VFIO: Add new IOCTL for IOMMU TLB invalidate propagation
` [RFC PATCH 8/8] VFIO: do IOMMU TLB invalidation from guest

[RFC 0/3] virtio-iommu: a paravirtualized IOMMU
 2017-04-26 16:24 UTC  (3+ messages)
` [RFC 3/3] virtio-iommu: future work

[PATCH 0/2] kvm: Fixes for race conditions
 2017-04-26 16:17 UTC  (6+ messages)
` [PATCH 1/2] kvm: Fix mmu_notifier release race

[PATCH] kvm: nVMX: Remove superfluous VMX instruction fault checks
 2017-04-26 15:53 UTC  (9+ messages)
` [PATCH v2] "
  ` [PATCH v3] "
    ` [PATCH v4] "

[PATCH v5 00/22] vITS save/restore
 2017-04-26 15:48 UTC  (58+ messages)
` [PATCH v5 01/22] KVM: arm/arm64: Add ITS save/restore API documentation
` [PATCH v5 02/22] KVM: arm/arm64: Add GICV3 pending table save "
` [PATCH v5 03/22] KVM: arm/arm64: vgic-its: rename itte into ite
` [PATCH v5 04/22] arm/arm64: vgic: turn vgic_find_mmio_region into public
` [PATCH v5 05/22] KVM: arm64: vgic-its: KVM_DEV_ARM_VGIC_GRP_ITS_REGS group
` [PATCH v5 06/22] KVM: arm/arm64: vgic: expose (un)lock_all_vcpus
` [PATCH v5 07/22] KVM: arm64: vgic-its: Implement vgic_its_has_attr_regs and attr_regs_access
` [PATCH v5 08/22] KVM: arm64: vgic-its: Implement vgic_mmio_uaccess_write_its_creadr
` [PATCH v5 09/22] KVM: arm64: vgic-its: Introduce migration ABI infrastructure
` [PATCH v5 10/22] KVM: arm64: vgic-its: Implement vgic_mmio_uaccess_write_its_iidr
` [PATCH v5 11/22] KVM: arm64: vgic-its: Interpret MAPD Size field and check related errors
` [PATCH v5 12/22] KVM: arm64: vgic-its: Interpret MAPD ITT_addr field
` [PATCH v5 13/22] KVM: arm64: vgic-its: Check the device id matches TYPER DEVBITS range
` [PATCH v5 14/22] KVM: arm64: vgic-its: KVM_DEV_ARM_ITS_SAVE/RESTORE_TABLES
` [PATCH v5 15/22] KVM: arm64: vgic-its: vgic_its_alloc_ite/device
` [PATCH v5 16/22] KVM: arm64: vgic-its: Add infrastructure for table lookup
` [PATCH v5 17/22] KVM: arm64: vgic-its: Collection table save/restore
` [PATCH v5 18/22] KVM: arm64: vgic-its: vgic_its_check_id returns the entry's GPA
` [PATCH v5 19/22] KVM: arm64: vgic-its: ITT save and restore
` [PATCH v5 20/22] KVM: arm64: vgic-its: Device table save/restore
` [PATCH v5 21/22] KVM: arm64: vgic-its: Fix pending table sync
` [PATCH v5 22/22] KVM: arm64: vgic-v3: KVM_DEV_ARM_VGIC_SAVE_PENDING_TABLES

[PATCH] kvm: async_pf: fix rcu_irq_enter() with irqs enabled
 2017-04-26 15:14 UTC  (2+ messages)

kernel/rcu/tree.c:1031 rcu_irq_enter() invoked with irqs enabled!!!!
 2017-04-26 14:39 UTC  (4+ messages)

[RFC PATCH 00/20] Qemu: Extend intel_iommu emulator to support Shared Virtual Memory
 2017-04-26 13:50 UTC  (22+ messages)
` [RFC PATCH 01/20] intel_iommu: add "ecs" option
` [RFC PATCH 02/20] intel_iommu: exposed extended-context mode to guest
` [RFC PATCH 03/20] intel_iommu: add "svm" option
` [RFC PATCH 04/20] Memory: modify parameter in IOMMUNotifier func
` [RFC PATCH 05/20] VFIO: add new IOCTL for svm bind tasks
` [RFC PATCH 06/20] VFIO: add new notifier for binding PASID table
` [RFC PATCH 07/20] VFIO: check notifier flag in region_del()
` [RFC PATCH 08/20] Memory: add notifier flag check in memory_replay()
` [RFC PATCH 09/20] Memory: introduce iommu_ops->record_device
` [RFC PATCH 10/20] VFIO: notify vIOMMU emulator when device is assigned
` [RFC PATCH 11/20] intel_iommu: provide iommu_ops->record_device
` [RFC PATCH 12/20] Memory: Add func to fire pasidt_bind notifier
` [RFC PATCH 13/20] IOMMU: add pasid_table_info for guest pasid table
` [RFC PATCH 14/20] intel_iommu: add FOR_EACH_ASSIGN_DEVICE macro
` [RFC PATCH 15/20] intel_iommu: link whole guest pasid table to host
` [RFC PATCH 16/20] VFIO: Add notifier for propagating IOMMU TLB invalidate
` [RFC PATCH 17/20] Memory: Add func to fire TLB invalidate notifier
` [RFC PATCH 18/20] intel_iommu: propagate Extended-IOTLB invalidate to host
` [RFC PATCH 19/20] intel_iommu: propagate PASID-Cache "
` [RFC PATCH 20/20] intel_iommu: propagate Ext-Device-TLB "

qemu-kvm hangs with DAX
 2017-04-26 13:43 UTC  (2+ messages)

[GIT PULL 0/3] KVM: s390: feature for 4.12 (kvm/next)
 2017-04-26 12:38 UTC  (4+ messages)
` [GIT PULL 1/3] s390/cpacf: query instructions use unique parameters for compatibility with KMA
` [GIT PULL 2/3] s390/cpacf: Introduce kma instruction
` [GIT PULL 3/3] s390: kvm: Cpu model support for msa6, msa7 and msa8

[GIT PULL 0/2] s390/cpacf: base patches for msa8 cpu model
 2017-04-26 12:38 UTC  (3+ messages)
` [GIT PULL 1/2] s390/cpacf: query instructions use unique parameters for compatibility with KMA
` [GIT PULL 2/2] s390/cpacf: Introduce kma instruction

[PATCH v3] KVM: PPC: Book3S HV: Native usage of the XIVE interrupt controller
 2017-04-26 12:13 UTC  (2+ messages)

(unknown)
 2017-04-26 11:54 UTC 

[RFC PATCH 00/30] Add PCIe SVM support to ARM SMMUv3
 2017-04-26 11:01 UTC  (8+ messages)
` [RFC PATCH 29/30] vfio: Add support for Shared Virtual Memory
` [RFC PATCH 30/30] vfio: Allow to bind foreign task

[kvm-unit-tests PATCH] lib: Add headers to generic library files
 2017-04-26  9:47 UTC  (5+ messages)

about CPU QoS in KVM
 2017-04-26  7:48 UTC  (4+ messages)

[PATCH] KVM: x86: fix emulation of RSM and IRET instructions
 2017-04-26  6:34 UTC  (3+ messages)

[PATCH v3] KVM: PPC: Book3S PR: Do not fail emulation with mtspr/mfspr for unknown SPRs
 2017-04-26  1:07 UTC  (3+ messages)

Get back to me
 2017-04-25 20:06 UTC 

[PATCH V15 00/11] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-04-25 17:46 UTC  (11+ messages)
` [PATCH V15 04/11] efi: parse ARM processor error
` [PATCH V15 06/11] acpi: apei: handle SEA notification type for ARMv8

[vhost:vhost 6/19] drivers/net/virtio_net.c:2089:19: error: assignment of read-only location '*(ctx + (sizetype)rxq2vq(i))'
 2017-04-25 14:52 UTC 

[kvmtool PATCH v10 00/15] kvmtool: arm: ITS emulation and GSI routing support
 2017-04-25 14:39 UTC  (16+ messages)
` [kvmtool PATCH v10 01/15] FDT: use static phandles
` [kvmtool PATCH v10 02/15] arm: use static DT phandle for the GIC
` [kvmtool PATCH v10 03/15] irq: move IRQ routing into irq.c
` [kvmtool PATCH v10 04/15] MSI-X: update GSI routing after changed MSI-X configuration
` [kvmtool PATCH v10 05/15] virtio: fix endianness check for vhost support
` [kvmtool PATCH v10 06/15] PCI: Only allocate IRQ routing entry when available
` [kvmtool PATCH v10 07/15] update public Linux headers for GICv3 ITS emulation
` [kvmtool PATCH v10 08/15] arm: allow vGICv3 emulation
` [kvmtool PATCH v10 09/15] arm: allow creation of an MSI register frame region
` [kvmtool PATCH v10 10/15] arm: FDT: create MSI controller DT node
` [kvmtool PATCH v10 11/15] add kvm__supports_vm_extension()
` [kvmtool PATCH v10 12/15] PCI: inject PCI device ID on MSI injection
` [kvmtool PATCH v10 13/15] arm: setup SPI IRQ routing tables
` [kvmtool PATCH v10 14/15] extend GSI IRQ routing to take a device ID
` [kvmtool PATCH v10 15/15] arm64: enable GICv3-ITS emulation

[PATCH V9 1/3] irq: Allow to pass the IRQF_TIMER flag with percpu irq request
 2017-04-25 13:53 UTC  (15+ messages)

Some problems about KVM vmx-EPTP-switching
 2017-04-25 12:23 UTC 

[PATCH] arm64: Add ASM modifier for xN register operands
 2017-04-25 12:13 UTC  (6+ messages)

[PATCH kvm-unit-tests] arch-run: more qemu binary search cleanup
 2017-04-25  6:19 UTC  (4+ messages)

MONTHLY UPDATE
 2017-04-24 22:59 UTC 

[PATCH v5 00/13] basic channel IO passthrough infrastructure based on vfio
 2017-04-24 22:56 UTC  (6+ messages)
` [PATCH v5 06/13] s390x/css: device support for s390-ccw passthrough
` [PATCH v5 07/13] vfio/ccw: vfio based subchannel passthrough driver

[Bug 195167] New: INVEPT might crash the host
 2017-04-24 22:12 UTC  (3+ messages)
` [Bug 195167] "

[PATCH 0/4] KVM: add KVM_CREATE_VM2 to allow dynamic kvm->vcpus array
 2017-04-24 20:22 UTC  (9+ messages)
` [PATCH 3/4] KVM: add KVM_CREATE_VM2 system ioctl

EXTREMELY IMPORTANT
 2017-04-24 18:50 UTC 

[RFC 0/7] Move accel, KVM, Xen, qtest files to accel/ subdir
 2017-04-24 19:35 UTC  (3+ messages)
` [Qemu-devel] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox