kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-01-17 16:32:08 to 2019-01-24 04:51:59 UTC [more...]

[PATCH net-next V4 0/5] vhost: accelerate metadata access through vmap()
 2019-01-24  4:51 UTC  (12+ messages)
` [PATCH net-next V4 1/5] vhost: generalize adding used elem
` [PATCH net-next V4 2/5] vhost: fine grain userspace memory accessors
` [PATCH net-next V4 3/5] vhost: rename vq_iotlb_prefetch() to vq_meta_prefetch()
` [PATCH net-next V4 4/5] vhost: introduce helpers to get the size of metadata area
` [PATCH net-next V4 5/5] vhost: access vq metadata through kernel virtual address

[PATCH kernel] KVM: PPC: Fix compile when CONFIG_PPC_RADIX_MMU is not defined
 2019-01-24  3:40 UTC  (2+ messages)
` [kernel] "

KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page
 2019-01-24  1:18 UTC  (9+ messages)
` [RFC PATCH] kvm: x86/vmx: Use kzalloc for cached_vmcs12

[PATCH v4 0/9] mmu notifier provide context informations
 2019-01-24  0:00 UTC  (15+ messages)
` [PATCH v4 1/9] mm/mmu_notifier: contextual information for event enums
` [PATCH v4 2/9] mm/mmu_notifier: contextual information for event triggering invalidation
` [PATCH v4 3/9] mm/mmu_notifier: use correct mmu_notifier events for each invalidation
` [PATCH v4 4/9] mm/mmu_notifier: pass down vma and reasons why mmu notifier is happening
` [PATCH v4 5/9] mm/mmu_notifier: mmu_notifier_range_update_to_read_only() helper
` [PATCH v4 6/9] gpu/drm/radeon: optimize out the case when a range is updated to read only
` [PATCH v4 7/9] gpu/drm/amdgpu: "
` [PATCH v4 8/9] gpu/drm/i915: "
` [PATCH v4 9/9] RDMA/umem_odp: "

[PATCH kernel] vfio-pci/nvlink2: Fix ancient gcc warnings
 2019-01-23 23:08 UTC  (5+ messages)

[PATCH 00/19] KVM: PPC: Book3S HV: add XIVE native exploitation mode
 2019-01-23 21:35 UTC  (34+ messages)
` [PATCH 03/19] KVM: PPC: Book3S HV: check the IRQ controller type
` [PATCH 05/19] KVM: PPC: Book3S HV: add a new KVM device for the XIVE native exploitation mode
` [PATCH 06/19] KVM: PPC: Book3S HV: add a GET_ESB_FD control to the XIVE native device
` [PATCH 08/19] KVM: PPC: Book3S HV: add a VC_BASE "
` [PATCH 11/19] KVM: PPC: Book3S HV: add support for the XIVE native exploitation mode hcalls
` [PATCH 17/19] KVM: PPC: Book3S HV: add get/set accessors for the VP XIVE state
  ` [PATCH 18/19] KVM: PPC: Book3S HV: add passthrough support
  ` [PATCH 19/19] KVM: introduce a KVM_DELETE_DEVICE ioctl

[patch 9/9] vfio/pci: Cleanup license mess
 2019-01-23 20:05 UTC  (2+ messages)

[PATCH 0/4] KVM: MMU: fast cleanup D bit based on fast write protect
 2019-01-23 18:38 UTC  (6+ messages)
` [PATCH 4/4] "

[PATCH v5 00/13] KVM/X86: Introduce a new guest mapping interface
 2019-01-23 18:18 UTC  (27+ messages)
` [PATCH v5 01/13] X86/nVMX: handle_vmon: Read 4 bytes from guest memory
` [PATCH v5 02/13] X86/nVMX: Update the PML table without mapping and unmapping the page
` [PATCH v5 03/13] X86/KVM: Handle PFNs outside of kernel reach when touching GPTEs
` [PATCH v5 04/13] KVM: Introduce a new guest mapping API
` [PATCH v5 05/13] X86/nVMX: handle_vmptrld: Use kvm_vcpu_map when copying VMCS12 from guest memory
` [PATCH v5 07/13] KVM/nVMX: Use kvm_vcpu_map when mapping the virtual APIC page
` [PATCH v5 08/13] KVM/nVMX: Use kvm_vcpu_map when mapping the posted interrupt descriptor table
` [PATCH v5 09/13] KVM/X86: Use kvm_vcpu_map in emulator_cmpxchg_emulated
` [PATCH v5 10/13] KVM/nSVM: Use the new mapping API for mapping guest memory
` [PATCH v5 11/13] KVM/nVMX: Use kvm_vcpu_map for accessing the shadow VMCS
` [PATCH v5 12/13] KVM/nVMX: Use kvm_vcpu_map for accessing the enlightened VMCS
` [PATCH v5 13/13] KVM/nVMX: Use page_address_valid in a few more locations

[PATCH v6] x86: load FPU registers on return to userland
 2019-01-23 18:09 UTC  (17+ messages)
` [PATCH 05/22] x86/fpu: Remove fpu->initialized usage in copy_fpstate_to_sigframe()
` [PATCH 12/22] x86/fpu: Only write PKRU if it is different from current
` [PATCH 18/22] x86/fpu: Update xstate's PKRU value on write_pkru()

[PATCH v2 0/5] vfio-ccw: support hsch/csch (kernel part)
 2019-01-23 15:57 UTC  (24+ messages)
` [PATCH v2 1/5] vfio-ccw: make it safe to access channel programs
` [PATCH v2 2/5] vfio-ccw: concurrent I/O handling
` [PATCH v2 3/5] vfio-ccw: add capabilities chain
  ` [qemu-s390x] "
` [PATCH v2 4/5] s390/cio: export hsch to modules
  ` [qemu-s390x] "
` [PATCH v2 5/5] vfio-ccw: add handling for async channel instructions

[PATCH v2 0/3] optimize waiting for free thread to do compression
 2019-01-23 12:51 UTC  (5+ messages)
` [PATCH v2 1/3] migration: introduce pages-per-second

[PATCH] kvm: no need to check return value of debugfs_create functions
 2019-01-23  8:28 UTC  (8+ messages)

[PATCH] KVM: VMX: Fix vm entry failure caused by invalid vmexit controls
 2019-01-23  0:49 UTC  (3+ messages)

[PATCH 1/2] dma-direct: set_memory_{en,de}crypted() take number of pages
 2019-01-22 22:38 UTC  (5+ messages)
` [PATCH 2/2] x86/kvmclock: set_memory_decrypted() takes "

[PATCH v2 0/7] This patch-set is to enable Guest CET support
 2019-01-22 20:59 UTC  (8+ messages)
` [PATCH v2 1/7] KVM:VMX: Define CET VMCS fields and bits
` [PATCH v2 2/7] KVM:CPUID: Define CET CPUID bits and CR4.CET master enable bit
` [PATCH v2 3/7] KVM:CPUID: Add CPUID support for CET xsaves component query
` [PATCH v2 4/7] KVM:CPUID: Fix xsaves area size calculation for CPUID.(EAX=0xD,ECX=1)
` [PATCH v2 5/7] KVM:VMX: Pass through host CET related MSRs to Guest
` [PATCH v2 6/7] KVM:VMX: Load Guest CET via VMCS when CET is enabled in Guest
` [PATCH v2 7/7] KVM:X86: Enable MSR_IA32_XSS bit 11 and 12 for CET xsaves/xrstors

[PATCH 0/2] KVM: arm/arm64: Add VCPU workarounds firmware register
 2019-01-22 15:28 UTC  (11+ messages)
` [PATCH 1/2] KVM: arm/arm64: Add save/restore support for firmware workaround state

[PATCH 3/6] x86: kvm: no need to check return value of debugfs_create functions
 2019-01-22 14:35 UTC 

[PATCH] iommu/intel-iommu: fix memory leak in intel_iommu_put_resv_regions()
 2019-01-22 13:03 UTC  (2+ messages)

[PATCH kvmtool v2 00/13] Implement reset of virtio devices
 2019-01-22 11:51 UTC  (3+ messages)

[PATCH] svm: Fix AVIC incomplete IPI emulation
 2019-01-22 10:25 UTC 

[PATCH] svm: Add warning message for AVIC IPI invalid target
 2019-01-22 10:24 UTC 

[PATCH kvmtool v2 0/6] arm: Add support for firmware booting
 2019-01-22  9:00 UTC  (3+ messages)

[RESEND PATCH V8 0/11] KVM: X86: Introducing ROE Protection Kernel Hardening
 2019-01-22  3:10 UTC  (13+ messages)
` [RESEND PATCH V8 01/11] KVM: State whether memory should be freed in kvm_free_memslot
` [RESEND PATCH V8 02/11] KVM: X86: Add arbitrary data pointer in kvm memslot iterator functions
` [RESEND PATCH V8 03/11] KVM: X86: Add helper function to convert SPTE to GFN
` [RESEND PATCH V8 04/11] KVM: Document Memory ROE
` [RESEND PATCH V8 05/11] KVM: Create architecture independent ROE skeleton
` [RESEND PATCH V8 06/11] KVM: X86: Enable ROE for x86
` [RESEND PATCH V8 07/11] KVM: Add support for byte granular memory ROE
` [RESEND PATCH V8 08/11] KVM: X86: Port ROE_MPROTECT_CHUNK to x86
` [RESEND PATCH V8 09/11] KVM: Add new exit reason For ROE violations
` [RESEND PATCH V8 10/11] KVM: Log ROE violations in system log
` [RESEND PATCH V8 11/11] KVM: ROE: Store protected chunks in red black tree

[PATCH 0/3] virtio-ccw: updates
 2019-01-21 19:30 UTC  (5+ messages)
` [PATCH 1/3] virtio-ccw: diag 500 may return a negative cookie
` [PATCH 2/3] s390/virtio: handle find on invalid queue gracefully
` [PATCH 3/3] virtio-ccw: wire up ->bus_name callback

[PATCH] KVM: nSVM: clear events pending from svm_complete_interrupts() when exiting to L1
 2019-01-21 15:55 UTC  (2+ messages)

[PATCH v2] KVM: x86: Fix single-step debugging
 2019-01-21 14:24 UTC  (2+ messages)

[PATCH] KVM: x86: Fix single-step debugging
 2019-01-21 12:47 UTC  (2+ messages)

[PATCH v2 0/2] vfio-ccw: support hsch/csch (QEMU part)
 2019-01-21 11:05 UTC  (3+ messages)
` [PATCH v2 1/2] vfio-ccw: new capability chain support
` [PATCH v2 2/2] vfio-ccw: support async command subregion

[PATCH] [next] kvm: vmx: fix some -Wmissing-prototypes warnings
 2019-01-21  7:27 UTC 

[PULL] virtio, vhost: fixes and cleanups
 2019-01-20 18:40 UTC  (2+ messages)

[PATCH 0/3] Inject a PMI for KVM Guest when ToPA buffer is filled
 2019-01-19 20:04 UTC  (4+ messages)
` [PATCH 1/3] perf/x86/intel/pt: Move pt structure to global header
` [PATCH 2/3] perf/x86/intel/pt: Inject PMI for KVM guest
` [PATCH 3/3] KVM: x86: Add support of clear Trace_ToPA_PMI status

[PATCH 0/3] vfio-ccw: support hsch/csch (kernel part)
 2019-01-18 13:53 UTC  (10+ messages)
` [PATCH 3/3] vfio-ccw: add handling for asnyc channel instructions

[RFC v3 00/21] SMMUv3 Nested Stage Setup
 2019-01-18 10:02 UTC  (2+ messages)

[PATCH] KVM: x86: Sync the pending Posted-Interrupts
 2019-01-18  6:34 UTC 

[PATCH net V4] vhost: log dirty page correctly
 2019-01-18  5:47 UTC  (4+ messages)

[PATCH 0/2] x86/kvm/hyper-v: fix KVM_CAP_HYPERV_ENLIGHTENED_VMCS
 2019-01-17 17:12 UTC  (3+ messages)
` [PATCH 1/2] x86/kvm/hyper-v: nested_enable_evmcs() sets vmcs_version incorrectly
` [PATCH 2/2] KVM: selftests: check returned evmcs version range


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).