messages from 2021-10-12 00:21:53 to 2021-10-13 11:01:22 UTC [more...]
[PATCH RFC] virtio: wrap config->reset calls
2021-10-13 11:00 UTC (2+ messages)
[PATCH RFC 00/15] virtio-mem: Expose device memory via separate memslots
2021-10-13 10:33 UTC (16+ messages)
` [PATCH RFC 01/15] memory: Drop mapping check from memory_region_get_ram_discard_manager()
` [PATCH RFC 02/15] kvm: Return number of free memslots
` [PATCH RFC 03/15] vhost: "
` [PATCH RFC 04/15] memory: Allow for marking memory region aliases unmergeable
` [PATCH RFC 05/15] vhost: Don't merge unmergeable memory sections
` [PATCH RFC 06/15] memory-device: Move memory_device_check_addable() directly into memory_device_pre_plug()
` [PATCH RFC 07/15] memory-device: Generalize memory_device_used_region_size()
` [PATCH RFC 08/15] memory-device: Support memory devices that consume a variable number of memslots
` [PATCH RFC 09/15] vhost: Respect reserved memslots for memory devices when realizing a vhost device
` [PATCH RFC 10/15] virtio-mem: Set the RamDiscardManager for the RAM memory region earlier
` [PATCH RFC 11/15] virtio-mem: Fix typo in virito_mem_intersect_memory_section() function name
` [PATCH RFC 12/15] virtio-mem: Expose device memory via separate memslots
` [PATCH RFC 13/15] vhost-user: Increase VHOST_USER_MAX_RAM_SLOTS to 496 with CONFIG_VIRTIO_MEM
` [PATCH RFC 14/15] libvhost-user: Increase VHOST_USER_MAX_RAM_SLOTS to 4096
` [PATCH RFC 15/15] virtio-mem: Set "max-memslots" to 0 (auto) for the 6.2 machine
[kvm-unit-tests PATCH 0/2] s390x: Cleanup and maintenance 3
2021-10-13 10:38 UTC (6+ messages)
` [kvm-unit-tests PATCH 1/2] lib: s390x: Fix PSW constant
` [kvm-unit-tests PATCH 2/2] lib: s390x: snippet.h: Add a few constants that will make our life easier
[patch 00/31] x86/fpu: Preparatory cleanups for AMX support (part 1)
2021-10-13 10:25 UTC (38+ messages)
` [patch 04/31] x86/fpu: Restrict xsaves()/xrstors() to independent states
` [patch 09/31] x86/fpu: Do not inherit FPU context for CLONE_THREAD
` [patch 11/31] x86/fpu/xstate: Provide and use for_each_xfeature()
` [patch 13/31] x86/fpu: Move KVMs FPU swapping to FPU core
` [patch 14/31] x86/fpu: Replace KVMs homebrewn FPU copy from user
` [patch 15/31] x86/fpu: Rework copy_xstate_to_uabi_buf()
` [patch 16/31] x86/fpu: Replace KVMs homebrewn FPU copy to user
` [patch V2 16/31] x86/fpu: Replace KVMs home brewed "
` [patch 24/31] x86/fpu: Move fpregs_restore_userregs() to core
` [patch 26/31] x86/fpu: Move fpstate functions to api.h
` [patch 28/31] x86/sev: Include fpu/xcr.h
[PATCH][v2] KVM: x86: directly call wbinvd for local cpu when emulate wbinvd
2021-10-13 9:42 UTC
[kvm-unit-tests PATCH] s390x/snippets: Define all things that are needed to link the libc
2021-10-13 9:51 UTC (2+ messages)
[PATCH V1 mlx5-next 00/13] Add mlx5 live migration driver
2021-10-13 9:47 UTC (14+ messages)
` [PATCH V1 mlx5-next 01/13] PCI/IOV: Provide internal VF index
` [PATCH V1 mlx5-next 02/13] net/mlx5: Reuse exported virtfn index function call
` [PATCH V1 mlx5-next 03/13] net/mlx5: Disable SRIOV before PF removal
` [PATCH V1 mlx5-next 04/13] PCI/IOV: Allow SRIOV VF drivers to reach the drvdata of a PF
` [PATCH V1 mlx5-next 05/13] net/mlx5: Expose APIs to get/put the mlx5 core device
` [PATCH V1 mlx5-next 06/13] vdpa/mlx5: Use mlx5_vf_get_core_dev() to get PF device
` [PATCH V1 mlx5-next 07/13] vfio: Add 'invalid' state definitions
` [PATCH V1 mlx5-next 08/13] vfio/pci_core: Make the region->release() function optional
` [PATCH V1 mlx5-next 09/13] net/mlx5: Introduce migration bits and structures
` [PATCH V1 mlx5-next 10/13] vfio/mlx5: Expose migration commands over mlx5 device
` [PATCH V1 mlx5-next 11/13] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
` [PATCH V1 mlx5-next 12/13] vfio/pci: Add infrastructure to let vfio_pci_core drivers trap device RESET
` [PATCH V1 mlx5-next 13/13] vfio/mlx5: Trap device RESET and update state accordingly
[PATCH 0/3] KVM: qemu patches for few KVM features I developed
2021-10-13 9:32 UTC (2+ messages)
[PATCH v6 0/4] KVM: x86: Convey the exit reason, etc. to user-space on emulation failure
2021-10-13 9:29 UTC (4+ messages)
` [PATCH v6 1/4] KVM: x86: Clarify the kvm_run.emulation_failure structure layout
[PATCH v2 0/2] x86: sgx_vepc: implement ioctl to EREMOVE all pages
2021-10-13 7:38 UTC (10+ messages)
` [PATCH v2 1/2] x86: sgx_vepc: extract sgx_vepc_remove_page
` [PATCH v2 2/2] x86: sgx_vepc: implement SGX_IOC_VEPC_REMOVE ioctl
[RFC 00/20] Introduce /dev/iommu for userspace I/O address space management
2021-10-13 7:14 UTC (13+ messages)
` [RFC 11/20] iommu/iommufd: Add IOMMU_IOASID_ALLOC/FREE
[RFC PATCH v1 0/6] Improvements to SIGP handling [KVM]
2021-10-13 5:54 UTC (12+ messages)
` [RFC PATCH v1 1/6] KVM: s390: Simplify SIGP Set Arch handling
` [RFC PATCH v1 3/6] KVM: s390: Simplify SIGP Restart
` [RFC PATCH v1 6/6] KVM: s390: Add a routine for setting userspace CPU state
[PATCH] KVM: MMU: make PTE_PREFETCH_NUM tunable
2021-10-13 5:52 UTC (3+ messages)
[PATCH v8 0/8] KVM: arm64: Add idempotent controls to migrate guest counter
2021-10-13 5:10 UTC (3+ messages)
` [PATCH v8 5/8] arm64: cpufeature: Enumerate support for FEAT_ECV >= 0x2
[PATCH v2 00/11] KVM: arm64: Implement PSCI SYSTEM_SUSPEND support
2021-10-13 4:48 UTC (8+ messages)
` [PATCH v2 03/11] KVM: arm64: Encapsulate reset request logic in a helper function
[PATCH v4 0/4] KVM: allow mapping non-refcounted pages
2021-10-13 3:29 UTC (4+ messages)
` [PATCH v4 4/4] KVM: mmu: remove over-aggressive warnings
[RFC 00/16] KVM: selftests: Add tests for SEV, SEV-ES, and SEV-SNP guests
2021-10-13 2:20 UTC (9+ messages)
` [RFC 02/16] KVM: selftests: add hooks for managing encrypted guest memory
` [RFC 04/16] KVM: selftests: set CPUID before setting sregs in vcpu creation
` [RFC 06/16] KVM: selftests: add library for creating/interacting with SEV guests
[PATCH 0/5] Update vfio_group to use the modern cdev lifecycle
2021-10-13 1:07 UTC (15+ messages)
` [PATCH 1/5] vfio: Delete vfio_get/put_group from vfio_iommu_group_notifier()
` [PATCH 2/5] vfio: Do not open code the group list search in vfio_create_group()
` [PATCH 4/5] vfio: Use a refcount_t instead of a kref in the vfio_group
` [PATCH 5/5] vfio: Use cdev_device_add() instead of device_create()
[PATCH 0/2] KVM: x86: Revert to fix apic_hw_disabled underflow
2021-10-13 0:35 UTC (3+ messages)
` [PATCH 1/2] Revert "KVM: x86: Open code necessary bits of kvm_lapic_set_base() at vCPU RESET"
` [PATCH 2/2] KVM: x86: WARN if APIC HW/SW disable static keys are non-zero on unload
[PATCH Part2 v5 00/45] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2021-10-13 0:23 UTC (11+ messages)
` [PATCH Part2 v5 20/45] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
` [PATCH Part2 v5 21/45] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH Part2 v5 26/45] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
` [PATCH Part2 v5 37/45] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH Part2 v5 39/45] KVM: SVM: Introduce ops for the post gfn map and unmap
[PATCH] KVM: selftests: Rename vm_open() to __vm_create()
2021-10-13 0:08 UTC (4+ messages)
[PATCH v7] vfio/pci: Add OpRegion 2.0+ Extended VBT support
2021-10-12 23:10 UTC (4+ messages)
` [PATCH v8] "
[PROBLEM] Frequently get "irq 31: nobody cared" when passing through 2x GPUs that share same pci switch via vfio
2021-10-12 22:35 UTC (8+ messages)
[PATCH V3] KVM: SEV: Acquire vcpu mutex when updating VMSA
2021-10-12 21:24 UTC
[PATCH 0/5 V10] Add AMD SEV and SEV-ES intra host migration support
2021-10-12 20:48 UTC (6+ messages)
` [PATCH 1/5 V10] KVM: SEV: Refactor out sev_es_state struct
` [PATCH 2/5 V10] KVM: SEV: Add support for SEV intra host migration
` [PATCH 3/5 V10] KVM: SEV: Add support for SEV-ES "
` [PATCH 4/5 V10] selftest: KVM: Add open sev dev helper
` [PATCH 5/5 V10] selftest: KVM: Add intra host migration tests
[PATCH v3 0/5] Add SBI v0.2 support for KVM
2021-10-12 16:46 UTC (7+ messages)
` [PATCH v3 5/5] RISC-V: Add SBI HSM extension in KVM
[PATCH v2 0/5] KVM: arm64: Assorted vgic-v3 fixes
2021-10-12 16:05 UTC (3+ messages)
` [PATCH v2 3/5] KVM: arm64: vgic-v3: Reduce common group trapping to ICV_DIR_EL1 when possible
[PATCH] x86/hyperv: Protect set_hv_tscchange_cb() against getting preempted
2021-10-12 15:50 UTC
[PATCH kvmtool 00/10] Run kvm-unit-tests with --kernel
2021-10-12 14:24 UTC (5+ messages)
` [PATCH kvmtool 08/10] Add --nocompat option to disable compat warnings
[PATCH] KVM: arm64: Fix reporting of endianess when the access originates at EL0
2021-10-12 14:20 UTC (3+ messages)
[PATCH] iommu: intel: remove flooding of non-error logs, when new-DMA-PTE is the same as old-DMA-PTE
2021-10-12 14:02 UTC (10+ messages)
[PATCH v2 kvmtool 0/7] vfio/pci: Fix MSIX table and PBA size allocation
2021-10-12 13:52 UTC (10+ messages)
` [PATCH v2 kvmtool 1/7] arm/gicv2m: Set errno when gicv2_update_routing() fails
` [PATCH v2 kvmtool 2/7] vfio/pci.c: Remove double include for assert.h
` [PATCH v2 kvmtool 3/7] pci: Fix pci_dev_* print macros
` [PATCH v2 kvmtool 4/7] vfio/pci: Rename PBA offset in device descriptor to fd_offset
` [PATCH v2 kvmtool 5/7] vfio/pci: Rework MSIX table and PBA physical size allocation
` [PATCH v2 kvmtool 6/7] vfio/pci: Print an error when offset is outside of the MSIX table or PBA
` [PATCH v2 kvmtool 7/7] vfio/pci: Align MSIX Table and PBA size to guest maximum page size
[PATCH v5 00/14] KVM: s390: pv: implement lazy destroy for reboot
2021-10-12 12:31 UTC (13+ messages)
` [PATCH v5 04/14] KVM: s390: pv: avoid stalls when making pages secure
` [PATCH v5 05/14] KVM: s390: pv: leak the topmost page table when destroy fails
` [PATCH v5 06/14] KVM: s390: pv: properly handle page flags for protected guests
` [PATCH v5 08/14] KVM: s390: pv: handle secure storage exceptions for normal guests
[PATCH v1 kvmtool 0/7] vfio/pci: Fix MSIX table and PBA size allocation
2021-10-12 10:50 UTC (3+ messages)
[PATCH 0/2] KVM: x86: Fix and cleanup for recent AVIC changes
2021-10-12 9:53 UTC (5+ messages)
[PATCH] KVM: x86: directly call wbinvd for local cpu when emulate wbinvd
2021-10-12 8:48 UTC (3+ messages)
` 答复: "
[PATCH 00/14] nSVM fixes and optional features
2021-10-12 7:51 UTC (6+ messages)
` [PATCH 07/14] KVM: x86: SVM: add warning for CVE-2021-3656
[PATCH kvm-unit-tests] arm64: gic-v3: Avoid NULL dereferences
2021-10-12 6:53 UTC (2+ messages)
[PATCH v4 00/23] target/i386/sev: Housekeeping SEV + measured Linux SEV guest
2021-10-12 6:15 UTC (4+ messages)
` [PATCH v4 12/23] target/i386/sev: Use g_autofree in sev_launch_get_measure()
MMIO/PIO dispatch file descriptors (ioregionfd) design discussion
2021-10-12 5:34 UTC (2+ messages)
[RFC PATCH 00/25] KVM: arm64: Make CPU ID registers writable by userspace
2021-10-12 4:35 UTC (26+ messages)
` [RFC PATCH 01/25] KVM: arm64: Add has_reset_once flag for vcpu
` [RFC PATCH 02/25] KVM: arm64: Save ID registers' sanitized value per vCPU
` [RFC PATCH 03/25] KVM: arm64: Introduce a validation function for an ID register
` [RFC PATCH 04/25] KVM: arm64: Introduce struct id_reg_info
` [RFC PATCH 05/25] KVM: arm64: Keep consistency of ID registers between vCPUs
` [RFC PATCH 06/25] KVM: arm64: Make ID_AA64PFR0_EL1 writable
` [RFC PATCH 07/25] KVM: arm64: Make ID_AA64PFR1_EL1 writable
` [RFC PATCH 08/25] KVM: arm64: Make ID_AA64ISAR0_EL1 writable
` [RFC PATCH 09/25] KVM: arm64: Make ID_AA64ISAR1_EL1 writable
` [RFC PATCH 10/25] KVM: arm64: Make ID_AA64DFR0_EL1 writable
` [RFC PATCH 11/25] KVM: arm64: Make ID_DFR0_EL1 writable
` [RFC PATCH 12/25] KVM: arm64: Make MVFR1_EL1 writable
` [RFC PATCH 13/25] KVM: arm64: Make ID registers without id_reg_info writable
` [RFC PATCH 14/25] KVM: arm64: Add consistency checking for frac fields of ID registers
` [RFC PATCH 15/25] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
` [RFC PATCH 16/25] KVM: arm64: Use vcpu->arch cptr_el2 to track value of cptr_el2 for VHE
` [RFC PATCH 17/25] KVM: arm64: Use vcpu->arch.mdcr_el2 to track value of mdcr_el2
` [RFC PATCH 18/25] KVM: arm64: Introduce framework to trap disabled features
` [RFC PATCH 19/25] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
` [RFC PATCH 20/25] KVM: arm64: Trap disabled features of ID_AA64PFR1_EL1
` [RFC PATCH 21/25] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
` [RFC PATCH 22/25] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
` [RFC PATCH 23/25] KVM: arm64: Trap disabled features of ID_AA64ISAR1_EL1
` [RFC PATCH 24/25] KVM: arm64: Activate trapping of disabled CPU features for the guest
` [RFC PATCH 25/25] KVM: arm64: selftests: Introduce id_reg_test
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).