kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-05-03 12:45:16 to 2019-05-06 16:36:55 UTC [more...]

[PATCH v1 0/7] s390: vfio-ccw fixes
 2019-05-06 16:36 UTC  (21+ messages)
` [PATCH 1/7] s390/cio: Update SCSW if it points to the end of the chain
` [PATCH 2/7] s390/cio: Set vfio-ccw FSM state before ioeventfd
` [PATCH 3/7] s390/cio: Split pfn_array_alloc_pin into pieces
` [PATCH 4/7] s390/cio: Initialize the host addresses in pfn_array
` [PATCH 5/7] s390/cio: Allow zero-length CCWs in vfio-ccw
` [PATCH 6/7] s390/cio: Don't pin vfio pages for empty transfers
` [PATCH 7/7] s390/cio: Remove vfio-ccw checks of command codes

[PATCH v15 00/17] arm64: untag user pointers passed to the kernel
 2019-05-06 16:31 UTC  (18+ messages)
` [PATCH v15 01/17] uaccess: add untagged_addr definition for other arches
` [PATCH v15 02/17] arm64: untag user pointers in access_ok and __uaccess_mask_ptr
` [PATCH v15 03/17] lib, arm64: untag user pointers in strn*_user
` [PATCH v15 04/17] mm: add ksys_ wrappers to memory syscalls
` [PATCH v15 05/17] arms64: untag user pointers passed "
` [PATCH v15 06/17] mm: untag user pointers in do_pages_move
` [PATCH v15 07/17] mm, arm64: untag user pointers in mm/gup.c
` [PATCH v15 08/17] mm, arm64: untag user pointers in get_vaddr_frames
` [PATCH v15 09/17] fs, arm64: untag user pointers in copy_mount_options
` [PATCH v15 10/17] fs, arm64: untag user pointers in fs/userfaultfd.c
` [PATCH v15 11/17] drm/amdgpu, arm64: untag user pointers
` [PATCH v15 12/17] drm/radeon, arm64: untag user pointers in radeon_gem_userptr_ioctl
` [PATCH v15 13/17] IB, arm64: untag user pointers in ib_uverbs_(re)reg_mr()
` [PATCH v15 14/17] media/v4l2-core, arm64: untag user pointers in videobuf_dma_contig_user_get
` [PATCH v15 15/17] tee, arm64: untag user pointers in tee_shm_register
` [PATCH v15 16/17] vfio/type1, arm64: untag user pointers in vaddr_get_pfn
` [PATCH v15 17/17] selftests, arm64: add a selftest for passing tagged pointers to kernel

[PATCH v14 00/17] arm64: untag user pointers passed to the kernel
 2019-05-06 16:21 UTC  (13+ messages)
` [PATCH v14 08/17] mm, arm64: untag user pointers in get_vaddr_frames
` [PATCH v14 10/17] fs, arm64: untag user pointers in fs/userfaultfd.c
` [PATCH v14 11/17] drm/amdgpu, arm64: untag user pointers
` [PATCH v14 13/17] IB/mlx4, arm64: untag user pointers in mlx4_get_umem_mr

[PATCH v6 00/17] KVM: PPC: Book3S HV: add XIVE native exploitation mode
 2019-05-06 16:10 UTC  (7+ messages)
` [PATCH v6 17/17] KVM: PPC: Book3S HV: XIVE: replace the 'destroy' method by a 'release' method
  ` [PATCH] KVM: PPC: Book3S HV: XIVE: Prevent races when releasing device
    ` [PATCH v2] "

[PATCH v2] KVM: nVMX: Disable intercept for *_BASE MSR in vmcs02 when possible
 2019-05-06 15:59 UTC 

[RFC 0/7] Convert the Intel iommu driver to the dma-ops api
 2019-05-06 15:27 UTC  (15+ messages)
` [RFC 1/7] iommu/vt-d: Set the dma_ops per device so we can remove the iommu_no_mapping code
` [RFC 2/7] iommu/vt-d: Remove iova handling code from non-dma ops path
` [RFC 3/7] iommu: improve iommu iotlb flushing
` [RFC 4/7] iommu/dma-iommu: Handle freelists in the dma-iommu api path
` [RFC 5/7] iommu/dma-iommu: add wrapper for iommu_dma_free_cpu_cached_iovas
` [RFC 6/7] iommu/vt-d: convert the intel iommu driver to the dma-iommu ops api
` [RFC 7/7] iommu/vt-d: Always set DMA_PTE_READ if the iommu doens't support zero length reads

[PATCH] KVM: PPC: Book3S HV: XIVE: Clear escalation interrupt pointers on device close
 2019-05-06 15:04 UTC  (2+ messages)

[PATCH v2] tests: kvm: Add tests to .gitignore
 2019-05-06 14:19 UTC 

[PATCH v1 0/2] New state handling for VFIO CCW
 2019-05-06 13:11 UTC  (3+ messages)
` [PATCH v1 1/2] vfio-ccw: Set subchannel state STANDBY on open
` [PATCH v1 2/2] vfio-ccw: rework sch_event

[PATCH v2 00/10] RFC: NVME MDEV
 2019-05-06 12:59 UTC  (16+ messages)
` [PATCH v2 06/10] nvme/core: add mdev interfaces
` [PATCH v2 08/10] nvme/pci: implement the mdev external queue allocation interface

Are you still alive
 2019-05-06 11:23 UTC 

[PATCH v2 0/7] s390: vfio-ap: dynamic configuration support
 2019-05-06 10:55 UTC  (14+ messages)
` [PATCH v2 1/7] s390: vfio-ap: wait for queue empty on queue reset
` [PATCH v2 2/7] s390: vfio-ap: maintain a shadow of the guest's CRYCB
` [PATCH v2 3/7] s390: vfio-ap: sysfs interface to display guest CRYCB
` [PATCH v2 4/7] s390: vfio-ap: allow assignment of unavailable AP resources to mdev device
` [PATCH v2 5/7] s390: vfio-ap: allow hot plug/unplug of AP resources using "
` [PATCH v2 6/7] s390: vfio-ap: handle bind and unbind of AP queue device
` [PATCH v2 7/7] s390: vfio-ap: update documentation

KVM: Introduce a 'release' method for KVM devices
 2019-05-06  9:50 UTC  (3+ messages)

[PATCH v2 0/2] introduction of version attribute for VFIO live migration
 2019-05-06  7:41 UTC  (4+ messages)
` [PATCH v2 2/2] drm/i915/gvt: export mdev device version to sysfs for Intel vGPU

[PATCH v8 00/15] x86/split_lock: Enable split lock detection
 2019-05-06  0:21 UTC  (13+ messages)
` [PATCH v8 05/15] x86/msr-index: Define MSR_IA32_CORE_CAPABILITY and split lock detection bit
` [PATCH v8 15/15] x86/split_lock: Add a sysfs interface to enable/disable split lock detection during run time

[PATCH 00/10] s390: virtio: support protected virtualization
 2019-05-05 15:13 UTC  (12+ messages)
` [PATCH 01/10] virtio/s390: use vring_create_virtqueue
` [PATCH 03/10] virtio/s390: enable packed ring

[RFC PATCH V3 0/6] vhost: accelerate metadata access
 2019-05-05  9:20 UTC  (2+ messages)

[PATCH] kvm: Check irqchip mode before assign irqfd
 2019-05-05  9:20 UTC  (2+ messages)

[kvm-unit-tests PATCH v3] x86: Incorporate timestamp in delay() and call the latter in io_delay()
 2019-05-04 22:36 UTC 

[kvm-unit-tests PATCH 0/2] x86: PMU: rdpmc fixes
 2019-05-04 22:31 UTC  (3+ messages)
` [kvm-unit-tests PATCH 1/2] x86: PMU: Fix PMU counters masking
` [kvm-unit-tests PATCH 2/2] x86: PMU: Make fast counters test optional

[PATCH net] vhost_net: fix possible infinite loop
 2019-05-05  4:20 UTC  (4+ messages)

[PATCH v4 0/4] KVM: lapic: Fix a variety of timer adv issues
 2019-05-05  0:43 UTC  (4+ messages)

[kvm-unit-tests PATCH] x86: vmx: Mask undefined bits in exit qualifications
 2019-05-03 17:49 UTC 

[GIT PULL] KVM fixes for 5.1-rc8 or final
 2019-05-04  0:10 UTC  (2+ messages)

[PATCH] mm: add account_locked_vm utility function
 2019-05-03 23:28 UTC  (2+ messages)

[kvm-unit-tests PATCH v2 0/4] Zero allocated pages
 2019-05-03 19:57 UTC  (8+ messages)
` [kvm-unit-tests PATCH v2 1/4] lib/alloc_page: "
` [kvm-unit-tests PATCH v2 2/4] x86: Remove redeundant page zeroing
` [kvm-unit-tests PATCH v2 3/4] lib: "
` [kvm-unit-tests PATCH v2 4/4] arm: "

[PATCH v2] x86: Some cleanup of delay() and io_delay()
 2019-05-03 19:00 UTC  (4+ messages)

[kvm-unit-tests PATCH] x86: eventinj: Do a real io_delay()
 2019-05-03 17:45 UTC  (3+ messages)

[kvm-unit-tests PATCH] lib/alloc_page: Zero allocated pages
 2019-05-03 17:16 UTC  (3+ messages)

[PATCH kvmtool 0/4] kvmtool: clang/GCC9 fixes
 2019-05-03 17:15 UTC  (5+ messages)
` [PATCH kvmtool 1/4] vfio: remove spurious ampersand
` [PATCH kvmtool 2/4] vfio: remove unneeded test
` [PATCH kvmtool 3/4] vfio: rework vfio_irq_set payload setting
` [PATCH kvmtool 4/4] virtio/blk: Avoid taking pointer to packed struct

[PATCH kvmtool 0/2] Automatically clean up ghost socket files
 2019-05-03 17:08 UTC  (3+ messages)
` [PATCH kvmtool 1/2] list: Clean "
` [PATCH kvmtool 2/2] run: Check for ghost socket file upon VM creation

[PATCH 3/3] tests: kvm: Add tests for KVM_SET_NESTED_STATE
 2019-05-03 16:44 UTC  (2+ messages)

[PATCH 1/3] kvm: nVMX: Set nested_run_pending in vmx_set_nested_state after checks complete
 2019-05-03 16:35 UTC  (2+ messages)

[PATCH] tests: kvm: Add tests to .gitignore
 2019-05-03 16:30 UTC  (2+ messages)

[PATCH v6 0/3] KVM: arm/arm64: Add VCPU workarounds firmware register
 2019-05-03 14:27 UTC  (4+ messages)
` [PATCH v6 1/3] arm64: KVM: Propagate full Spectre v2 workaround state to KVM guests
` [PATCH v6 2/3] KVM: arm/arm64: Add save/restore support for firmware workaround state
` [PATCH v6 3/3] KVM: doc: add API documentation on the KVM_REG_ARM_WORKAROUNDS register

[RFC PATCH v1 00/10] Add AMD SEV guest live migration support
 2019-05-03 14:25 UTC  (4+ messages)
` [RFC PATCH v1 08/10] KVM: X86: Introduce KVM_HC_PAGE_ENC_STATUS hypercall

[PATCH] svm/avic: Do not send AVIC doorbell to self
 2019-05-03 13:38 UTC 

[PATCH] svm/avic: Allow avic_vcpu_load logic to support host APIC ID 255
 2019-05-03 13:37 UTC 

[GIT PULL] KVM/arm updates for 5.2
 2019-05-03 12:44 UTC  (49+ messages)
` [PATCH 09/56] KVM: arm64: Add a vcpu flag to control SVE visibility for the guest
` [PATCH 10/56] KVM: arm64: Propagate vcpu into read_id_reg()
` [PATCH 11/56] KVM: arm64: Support runtime sysreg visibility filtering
` [PATCH 12/56] KVM: arm64/sve: System register context switch and access support
` [PATCH 13/56] KVM: arm64/sve: Context switch the SVE registers
` [PATCH 14/56] KVM: Allow 2048-bit register access via ioctl interface
` [PATCH 15/56] KVM: arm64: Add missing #include of <linux/string.h> in guest.c
` [PATCH 16/56] KVM: arm64: Factor out core register ID enumeration
` [PATCH 17/56] KVM: arm64: Reject ioctl access to FPSIMD V-regs on SVE vcpus
` [PATCH 18/56] KVM: arm64/sve: Add SVE support to register access ioctl interface
` [PATCH 19/56] KVM: arm64: Enumerate SVE register indices for KVM_GET_REG_LIST
` [PATCH 20/56] arm64/sve: In-kernel vector length availability query interface
` [PATCH 21/56] KVM: arm/arm64: Add hook for arch-specific KVM initialisation
` [PATCH 22/56] KVM: arm/arm64: Add KVM_ARM_VCPU_FINALIZE ioctl
` [PATCH 23/56] KVM: arm64/sve: Add pseudo-register for the guest's vector lengths
` [PATCH 24/56] KVM: arm64/sve: Allow userspace to enable SVE for vcpus
` [PATCH 25/56] KVM: arm64: Add a capability to advertise SVE support
` [PATCH 26/56] KVM: Document errors for KVM_GET_ONE_REG and KVM_SET_ONE_REG
` [PATCH 27/56] KVM: arm64/sve: Document KVM API extensions for SVE
` [PATCH 28/56] arm64: KVM: Fix system register enumeration
` [PATCH 29/56] arm64/sve: Clarify vq map semantics
` [PATCH 30/56] KVM: arm/arm64: Demote kvm_arm_init_arch_resources() to just set up SVE
` [PATCH 31/56] KVM: arm: Make vcpu finalization stubs into inline functions
` [PATCH 32/56] KVM: arm64/sve: sys_regs: Demote redundant vcpu_has_sve() checks to WARNs
` [PATCH 33/56] KVM: arm64/sve: Clean up UAPI register ID definitions
` [PATCH 34/56] KVM: arm64/sve: Miscellaneous tidyups in guest.c
` [PATCH 35/56] KVM: arm64/sve: Make register ioctl access errors more consistent
` [PATCH 36/56] KVM: arm64/sve: WARN when avoiding divide-by-zero in sve_reg_to_region()
` [PATCH 37/56] KVM: arm64/sve: Simplify KVM_REG_ARM64_SVE_VLS array sizing
` [PATCH 38/56] KVM: arm64/sve: Explain validity checks in set_sve_vls()
` [PATCH 39/56] KVM: arm/arm64: Clean up vcpu finalization function parameter naming
` [PATCH 40/56] KVM: Clarify capability requirements for KVM_ARM_VCPU_FINALIZE
` [PATCH 41/56] KVM: Clarify KVM_{SET,GET}_ONE_REG error code documentation
` [PATCH 42/56] KVM: arm64: Clarify access behaviour for out-of-range SVE register slice IDs
` [PATCH 43/56] KVM: arm64: Add a vcpu flag to control ptrauth for guest
` [PATCH 44/56] KVM: arm/arm64: Context-switch ptrauth registers
` [PATCH 45/56] KVM: arm64: Add userspace flag to enable pointer authentication
` [PATCH 46/56] KVM: arm64: Add capability to advertise ptrauth for guest
` [PATCH 47/56] arm64: arm_pmu: Remove unnecessary isb instruction
` [PATCH 48/56] arm64: KVM: Encapsulate kvm_cpu_context in kvm_host_data
` [PATCH 49/56] arm64: KVM: Add accessors to track guest/host only counters
` [PATCH 50/56] arm64: arm_pmu: Add !VHE support for exclude_host/exclude_guest attributes
` [PATCH 51/56] arm64: KVM: Enable !VHE support for :G/:H perf event modifiers
` [PATCH 52/56] arm64: KVM: Enable VHE "
` [PATCH 53/56] arm64: KVM: Avoid isb's by using direct pmxevtyper sysreg
` [PATCH 54/56] arm64: docs: Document perf event attributes
` [PATCH 55/56] arm64: KVM: Fix perf cycle counter support for VHE
` [PATCH 56/56] KVM: arm64: Fix ptrauth ID register masking logic


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).