messages from 2019-11-12 21:33:20 to 2019-11-14 07:25:28 UTC [more...]
[kvm-unit-tests PATCH v2 0/3] s390x: Improve architectural compliance for diag308
2019-11-14 7:24 UTC (10+ messages)
` [kvm-unit-tests PATCH v2 3/3] s390x: Load reset psw on diag308 reset
` [kvm-unit-tests PATCH v4] "
[PATCH v4 0/6] KVM: x86/vPMU: Efficiency optimization by reusing last created perf_event
2019-11-14 7:13 UTC (4+ messages)
` [PATCH v4 5/6] KVM: x86/vPMU: Reuse perf_event to avoid unnecessary pmc_reprogram_counter
[PATCH v4 00/23] mm/gup: track dma-pinned pages: FOLL_PIN, FOLL_LONGTERM
2019-11-14 6:08 UTC (54+ messages)
` [PATCH v4 01/23] mm/gup: pass flags arg to __gup_device_* functions
` [PATCH v4 02/23] mm/gup: factor out duplicate code from four routines
` [PATCH v4 03/23] mm/gup: move try_get_compound_head() to top, fix minor issues
` [PATCH v4 04/23] mm: devmap: refactor 1-based refcounting for ZONE_DEVICE pages
` [PATCH v4 05/23] goldish_pipe: rename local pin_user_pages() routine
` [PATCH v4 06/23] IB/umem: use get_user_pages_fast() to pin DMA pages
` [PATCH v4 07/23] media/v4l2-core: set pages dirty upon releasing DMA buffers
` [PATCH v4 08/23] vfio, mm: fix get_user_pages_remote() and FOLL_LONGTERM
` [PATCH v4 09/23] mm/gup: introduce pin_user_pages*() and FOLL_PIN
` [PATCH v4 10/23] goldish_pipe: convert to pin_user_pages() and put_user_page()
` [PATCH v4 11/23] IB/{core,hw,umem}: set FOLL_PIN, FOLL_LONGTERM via pin_longterm_pages*()
` [PATCH v4 12/23] mm/process_vm_access: set FOLL_PIN via pin_user_pages_remote()
` [PATCH v4 13/23] drm/via: set FOLL_PIN via pin_user_pages_fast()
` [PATCH v4 14/23] fs/io_uring: set FOLL_PIN via pin_user_pages()
` [PATCH v4 15/23] net/xdp: "
` [PATCH v4 16/23] mm/gup: track FOLL_PIN pages
` [PATCH v4 17/23] media/v4l2-core: pin_longterm_pages (FOLL_PIN) and put_user_page() conversion
` [PATCH v4 18/23] vfio, mm: "
` [PATCH v4 19/23] powerpc: book3s64: convert to pin_longterm_pages() and put_user_page()
` [PATCH v4 20/23] mm/gup_benchmark: use proper FOLL_WRITE flags instead of hard-coding "1"
` [PATCH v4 21/23] mm/gup_benchmark: support pin_user_pages() and related calls
` [PATCH v4 22/23] selftests/vm: run_vmtests: invoke gup_benchmark with basic FOLL_PIN coverage
` [PATCH v4 23/23] mm/gup: remove support for gup(FOLL_LONGTERM)
[FYI PATCH 0/7] Mitigation for CVE-2018-12207
2019-11-14 6:02 UTC (12+ messages)
[PATCH 1/2] KVM: X86: Single target IPI fastpath
2019-11-14 3:12 UTC (5+ messages)
[PATCH v9 Kernel 0/5] Add KABIs to support migration for VFIO devices
2019-11-14 0:36 UTC (24+ messages)
` [PATCH v9 Kernel 1/5] vfio: KABI for migration interface for device state
` [PATCH v9 Kernel 2/5] vfio iommu: Add ioctl defination to get dirty pages bitmap
` [PATCH v9 Kernel 3/5] vfio iommu: Add ioctl defination to unmap IOVA and return dirty bitmap
` [PATCH v9 Kernel 4/5] vfio iommu: Implementation of ioctl to get dirty pages bitmap
` [PATCH v9 Kernel 5/5] vfio iommu: Implementation of ioctl to get dirty bitmap before unmap
[PATCH] selftests: kvm: Simplify loop in kvm_create_max_vcpus test
2019-11-14 0:39 UTC (2+ messages)
[PATCH v5 0/8] KVM: nVMX: Add full nested support for "load IA32_PERF_GLOBAL_CTRL" VM-{Entry,Exit} control
2019-11-14 0:17 UTC (9+ messages)
` [PATCH v5 1/8] KVM: VMX: Add helper to check reserved bits in IA32_PERF_GLOBAL_CTRL
` [PATCH v5 2/8] KVM: nVMX: Check GUEST_IA32_PERF_GLOBAL_CTRL on VM-Entry
` [PATCH v5 3/8] KVM: nVMX: Check HOST_IA32_PERF_GLOBAL_CTRL "
` [PATCH v5 4/8] KVM: nVMX: Use kvm_set_msr to load IA32_PERF_GLOBAL_CTRL on VM-Exit
` [PATCH v5 5/8] KVM: nVMX: Load GUEST_IA32_PERF_GLOBAL_CTRL MSR on VM-Entry
` [PATCH v5 6/8] KVM: nVMX: Expose load IA32_PERF_GLOBAL_CTRL VM-{Entry,Exit} control
` [kvm-unit-tests PATCH v5 7/8] x86: VMX: Make guest_state_test_main() check state from nested VM
` [kvm-unit-tests PATCH v5 8/8] x86: VMX: Add tests for nested "load IA32_PERF_GLOBAL_CTRL"
[PATCH] KVM: Forbid /dev/kvm being opened by a compat task when CONFIG_KVM_COMPAT=n
2019-11-13 21:23 UTC (4+ messages)
[PATCH v3 00/23] mm/gup: track dma-pinned pages: FOLL_PIN, FOLL_LONGTERM
2019-11-13 20:28 UTC (22+ messages)
` [PATCH v3 08/23] vfio, mm: fix get_user_pages_remote() and FOLL_LONGTERM
[RFC v2 0/3] vfio: support Shared Virtual Addressing
2019-11-13 19:45 UTC (23+ messages)
` [RFC v2 1/3] vfio: VFIO_IOMMU_CACHE_INVALIDATE
` [RFC v2 2/3] vfio/type1: VFIO_IOMMU_PASID_REQUEST(alloc/free)
` [RFC v2 3/3] vfio/type1: bind guest pasid (guest page tables) to host
[PATCH] KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast()
2019-11-13 19:30 UTC
[kvm-unit-test PATCH 0/5] Improvements for the Travis CI
2019-11-13 17:48 UTC (16+ messages)
` [kvm-unit-test PATCH 1/5] travis.yml: Re-arrange the test matrix
` [kvm-unit-test PATCH 2/5] travis.yml: Install only the required packages for each entry in the matrix
` [kvm-unit-test PATCH 3/5] travis.yml: Test with KVM instead of TCG (on x86)
` [kvm-unit-tests PATCH v2] "
` [kvm-unit-test PATCH 4/5] travis.yml: Test the i386 build, too
` [kvm-unit-test PATCH 5/5] travis.yml: Expect that at least one test succeeds
[PATCH net-next 00/14] vsock: add multi-transports support
2019-11-13 16:38 UTC (8+ messages)
` [PATCH net-next 11/14] "
[RFC 07/37] KVM: s390: protvirt: Secure memory is not mergeable
2019-11-13 15:54 UTC (4+ messages)
` [RFC v2] "
[PATCH kvm-unit-tests] svm: run tests with host IF=1
2019-11-13 16:12 UTC (4+ messages)
Call for agenda for 2019-11-19 KVM call
2019-11-13 16:27 UTC
[PATCH v9 00/11] SMMUv3 Nested Stage Setup (VFIO part)
2019-11-13 16:24 UTC (7+ messages)
[RFC 00/37] KVM: s390: Add support for protected VMs
2019-11-13 15:57 UTC (17+ messages)
` [RFC 04/37] KVM: s390: protvirt: Add initial lifecycle handling
` [PATCH] Fix unpack
` [RFC 08/37] KVM: s390: add missing include in gmap.h
` [RFC 15/37] KVM: s390: protvirt: Add machine-check interruption injection controls
[kvm-unit-tests PATCH v3 0/2] s390x: SCLP Unit test
2019-11-13 15:41 UTC (6+ messages)
` [kvm-unit-tests PATCH v3 2/2] s390x: SCLP unit test
[PATCH v1 0/4] s390x: Testing the Subchannel I/O
2019-11-13 16:12 UTC (10+ messages)
` [PATCH v1 1/4] s390x: saving regs for interrupts
` [PATCH v1 2/4] s390x: Define the PSW bits
` [PATCH v1 3/4] s390x:irq: make IRQ handler weak
` [PATCH v1 4/4] s390x: Testing the Subchannel I/O read
[PATCH] KVM: VMX: Consume pending LAPIC INIT event when exit on INIT_SIGNAL
2019-11-13 15:24 UTC (2+ messages)
[PATCH] KVM: x86: Optimization: Requst TLB flush in fast_cr3_switch() instead of do it directly
2019-11-13 15:20 UTC (4+ messages)
[PATCH] selftests: kvm: fix build with glibc >= 2.30
2019-11-13 14:48 UTC (2+ messages)
[PATCH] kvm: x86: disable shattered huge page recovery for PREEMPT_RT
2019-11-13 14:47 UTC
[kvm-unit-tests PATCH 00/17] arm: gic: Test SPIs and interrupt groups
2019-11-13 11:26 UTC (7+ messages)
` [kvm-unit-tests PATCH 15/17] arm: gic: Provide FIQ handler
` [kvm-unit-tests PATCH 16/17] arm: gic: Prepare interrupt statistics for both groups
` [kvm-unit-tests PATCH 17/17] arm: gic: Test Group0 SPIs
[PATCH V4] target/i386/kvm: Add Hyper-V direct tlb flush support
2019-11-13 10:19 UTC (5+ messages)
[PATCH] KVM: X86: Reset the three MSR list number variables to 0 in kvm_init_msr_list()
2019-11-13 8:20 UTC (2+ messages)
[PATCH] KVM: SVM: Remove check if APICv enabled in SVM update_cr8_intercept() handler
2019-11-12 23:08 UTC (2+ messages)
[PATCH v3 00/11] Add AMD SEV guest live migration support
2019-11-12 22:27 UTC (6+ messages)
` [PATCH v3 01/11] KVM: SVM: Add KVM_SEV SEND_START command
` [PATCH v3 02/11] KVM: SVM: Add KVM_SEND_UPDATE_DATA command
[GIT PULL] KVM patches for Linux 5.4-rc8
2019-11-12 21:33 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox