kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-03-12 17:00:38 to 2019-03-15 16:09:05 UTC [more...]

[PATCH v5 00/22] SMMUv3 Nested Stage Setup
 2019-03-15 16:09 UTC  (22+ messages)
` [PATCH v5 02/22] iommu: introduce device fault data
` [PATCH v5 03/22] iommu: introduce device fault report API
` [PATCH v5 05/22] iommu: Introduce cache_invalidate API
` [PATCH v5 07/22] vfio: VFIO_IOMMU_ATTACH/DETACH_PASID_TABLE
` [PATCH v5 08/22] vfio: VFIO_IOMMU_CACHE_INVALIDATE
` [PATCH v5 09/22] vfio: VFIO_IOMMU_BIND/UNBIND_MSI
` [PATCH v5 10/22] iommu/arm-smmu-v3: Link domains and devices
  ` [PATCH v5 01/22] driver core: add per device iommu param
  ` [PATCH v5 04/22] iommu: Introduce attach/detach_pasid_table API
  ` [PATCH v5 06/22] iommu: Introduce bind/unbind_guest_msi
  ` [PATCH v5 11/22] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH v5 12/22] iommu/smmuv3: Get prepared for nested stage support
` [PATCH v5 13/22] iommu/smmuv3: Implement attach/detach_pasid_table
` [PATCH v5 14/22] iommu/smmuv3: Implement cache_invalidate
` [PATCH v5 15/22] dma-iommu: Implement NESTED_MSI cookie
` [PATCH v5 16/22] iommu/smmuv3: Implement bind/unbind_guest_msi
` [PATCH v5 17/22] iommu/smmuv3: Report non recoverable faults
` [PATCH v5 18/22] vfio-pci: Add a new VFIO_REGION_TYPE_NESTED region type
` [PATCH v5 19/22] vfio-pci: Register an iommu fault handler
` [PATCH v5 20/22] vfio_pci: Allow to mmap the fault queue
` [PATCH v5 21/22] vfio-pci: Add VFIO_PCI_DMA_FAULT_IRQ_INDEX

[PATCH RFC] KVM: x86: svm: make sure NMI is injected after nmi_singlestep
 2019-03-15 15:37 UTC 

[PATCH kvmtool v1 1/2] vfio-pci: Release INTx's guest to host eventfd properly
 2019-03-15 14:20 UTC  (4+ messages)
` [PATCH kvmtool v1 2/2] vfio-pci: Fallback to INTx mode when disable MSI/MSIX

[PATCH v5 0/7] vfio: ap: AP Queue Interrupt Control
 2019-03-15 14:10 UTC  (15+ messages)
` [PATCH v5 1/7] s390: ap: kvm: add PQAP interception for AQIC
` [PATCH v5 2/7] s390: ap: new vfio_ap_queue structure
` [PATCH v5 3/7] vfio: ap: register IOMMU VFIO notifier
` [PATCH v5 4/7] s390: ap: setup relation betwen KVM and mediated device
` [PATCH v5 5/7] s390: ap: implement PAPQ AQIC interception in kernel
` [PATCH v5 6/7] s390: ap: Cleanup on removing the AP device
` [PATCH v5 7/7] s390: ap: kvm: Enable PQAP/AQIC facility for the guest

[PATCH V2] cpufreq: Call transition notifier only once for each policy
 2019-03-15 12:29 UTC  (2+ messages)

[PATCH v3 00/17] KVM: PPC: Book3S HV: add XIVE native exploitation mode
 2019-03-15 12:06 UTC  (18+ messages)
` [PATCH v3 01/17] powerpc/xive: add OPAL extensions for the XIVE native exploitation support
` [PATCH v3 02/17] KVM: PPC: Book3S HV: add a new KVM device for the XIVE native exploitation mode
` [PATCH v3 03/17] KVM: PPC: Book3S HV: XIVE: introduce a new capability KVM_CAP_PPC_IRQ_XIVE
` [PATCH v3 04/17] KVM: PPC: Book3S HV: XIVE: add a control to initialize a source
` [PATCH v3 05/17] KVM: PPC: Book3S HV: XIVE: add a control to configure "
` [PATCH v3 06/17] KVM: PPC: Book3S HV: XIVE: add controls for the EQ configuration
` [PATCH v3 07/17] KVM: PPC: Book3S HV: XIVE: add a global reset control
` [PATCH v3 08/17] KVM: PPC: Book3S HV: XIVE: add a control to sync the sources
` [PATCH v3 09/17] KVM: PPC: Book3S HV: XIVE: add a control to dirty the XIVE EQ pages
` [PATCH v3 10/17] KVM: PPC: Book3S HV: XIVE: add get/set accessors for the VP XIVE state
` [PATCH v3 11/17] KVM: introduce a 'mmap' method for KVM devices
` [PATCH v3 12/17] KVM: PPC: Book3S HV: XIVE: add a TIMA mapping
` [PATCH v3 13/17] KVM: PPC: Book3S HV: XIVE: add a mapping for the source ESB pages
` [PATCH v3 14/17] KVM: PPC: Book3S HV: XIVE: add passthrough support
` [PATCH v3 15/17] KVM: PPC: Book3S HV: XIVE: activate XIVE exploitation mode
` [PATCH v3 16/17] KVM: introduce a KVM_DESTROY_DEVICE ioctl
` [PATCH v3 17/17] KVM: PPC: Book3S HV: XIVE: clear the vCPU interrupt presenters

[PATCH 0/3] userfaultfd: allow to forbid unprivileged users
 2019-03-15  8:26 UTC  (16+ messages)

[RFC PATCH V2 0/5] vhost: accelerate metadata access through vmap()
 2019-03-15  4:39 UTC  (23+ messages)

[PATCH 0/5] QEMU VFIO live migration
 2019-03-15  2:24 UTC  (19+ messages)

[PATCH v2 00/16] KVM: PPC: Book3S HV: add XIVE native exploitation mode
 2019-03-15  0:29 UTC  (44+ messages)
` [PATCH v2 01/16] powerpc/xive: add OPAL extensions for the XIVE native exploitation support
` [PATCH v2 03/16] KVM: PPC: Book3S HV: XIVE: introduce a new capability KVM_CAP_PPC_IRQ_XIVE
` [PATCH v2 04/16] KVM: PPC: Book3S HV: XIVE: add a control to initialize a source
` [PATCH v2 06/16] KVM: PPC: Book3S HV: XIVE: add controls for the EQ configuration
` [PATCH v2 09/16] KVM: PPC: Book3S HV: XIVE: add a control to dirty the XIVE EQ pages
` [PATCH v2 10/16] KVM: PPC: Book3S HV: XIVE: add get/set accessors for the VP XIVE state
` [PATCH v2 15/16] KVM: introduce a KVM_DESTROY_DEVICE ioctl
` [PATCH v2 16/16] KVM: PPC: Book3S HV: XIVE: clear the vCPU interrupt presenters

[PATCH v5 00/18] x86/split_lock: Enable #AC exception for split locked accesses
 2019-03-14 23:16 UTC  (32+ messages)
` [PATCH v5 01/18] x86/common: Align cpu_caps_cleared and cpu_caps_set to unsigned long
` [PATCH v5 02/18] drivers/net/b44: Align pwol_mask to unsigned long for better performance
  ` [PATCH v5 03/18] wlcore: simplify/fix/optimize reg_ch_conf_pending operations
  ` [PATCH v5 04/18] x86/split_lock: Align x86_capability to unsigned long to avoid split locked access
` [PATCH v5 05/18] x86/cpufeatures: Enumerate IA32_CORE_CAPABILITIES MSR
` [PATCH v5 06/18] x86/msr-index: Define IA32_CORE_CAPABILITY MSR and #AC exception for split lock bit
` [PATCH v5 07/18] x86/split_lock: Enumerate #AC for split lock by MSR IA32_CORE_CAPABILITY
` [PATCH v5 08/18] x86/split_lock: Define MSR TEST_CTL register
` [PATCH v5 09/18] x86/split_lock: Handle #AC exception for split lock
` [PATCH v5 10/18] kvm/x86: Emulate MSR IA32_CORE_CAPABILITY
` [PATCH v5 11/18] kvm/vmx: Emulate MSR TEST_CTL
` [PATCH v5 12/18] x86/split_lock: Enable #AC for split lock by default
` [PATCH v5 13/18] x86/split_lock: Add a sysfs interface to allow user to enable or disable split lock detection on all CPUs during run time
` [PATCH v5 14/18] x86/clearcpuid: Support multiple clearcpuid options
` [PATCH v5 15/18] x86/clearcpuid: Support feature flag string in kernel option clearcpuid
` [PATCH v5 16/18] x86/clearcpuid: Apply cleared feature bits that are forced set before
` [PATCH v5 17/18] x86/clearcpuid: Clear CPUID bit in CPUID faulting
` [PATCH v5 18/18] Change document for kernel option clearcpuid

[RFC net-next v1 0/3] Support mlx5 mediated devices in host
 2019-03-14 21:38 UTC  (3+ messages)

[RFC][Patch v9 0/6] KVM: Guest Free Page Hinting
 2019-03-14 16:58 UTC  (33+ messages)
` [RFC][Patch v9 2/6] KVM: Enables the kernel to isolate guest free pages

[PATCH] kvm/x86/vmx: switch MSR_MISC_FEATURES_ENABLES between host and guest
 2019-03-14 14:44 UTC  (9+ messages)

[PATCH 0/7] cpufreq: Call transition notifier only once for each policy
 2019-03-14 11:03 UTC  (8+ messages)
` [PATCH 6/7] KVM: x86: Update cpufreq transition notifier to handle multiple CPUs

[PATCH v2] MAINTAINERS: Add KVM selftests to existing KVM entry
 2019-03-13 23:32 UTC 

[PATCH] MAINTAINERS: Add KVM selftests to existing KVM entry
 2019-03-13 20:16 UTC  (2+ messages)

[PATCH] svm: Fix AVIC incomplete IPI emulation
 2019-03-13 19:03 UTC  (6+ messages)

[PATCH] x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init
 2019-03-13 17:13 UTC 

[PATCH 3/3] kvm: don't redefine flags as something else
 2019-03-13 11:06 UTC  (4+ messages)

[PATCH v4 0/7] vfio: ap: AP Queue Interrupt Control
 2019-03-13 10:19 UTC  (10+ messages)
` [PATCH v4 3/7] s390: ap: associate a ap_vfio_queue and a matrix mdev
` [PATCH v4 6/7] s390: ap: Cleanup on removing the AP device

[PATCH v2 1/2] Revert "KVM/MMU: Flush tlb directly in the kvm_zap_gfn_range()"
 2019-03-12 18:45 UTC 

[PATCH RFC 00/39] x86/KVM: Xen HVM guest support
 2019-03-12 17:14 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).