messages from 2023-01-05 00:41:33 to 2023-01-06 16:43:48 UTC [more...]
[PATCH 0/8] Let iommufd charge IOPTE allocations to the memory cgroup
2023-01-06 16:42 UTC (2+ messages)
` [PATCH 5/8] iommufd: Use GFP_KERNEL_ACCOUNT for iommu_map()
[RFC 00/12] Add vfio_device cdev for iommufd support
2023-01-06 16:08 UTC (7+ messages)
` [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
[PATCH V7 0/7] fixes for virtual address update
2023-01-06 15:14 UTC (6+ messages)
` [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
[PATCH v3 0/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
2023-01-06 14:29 UTC (8+ messages)
` [PATCH v3 1/1] "
[PATCH iommufd v3 0/9] Remove IOMMU_CAP_INTR_REMAP
2023-01-06 13:12 UTC (16+ messages)
` [PATCH iommufd v3 1/9] irq: Add msi_device_has_isolated_msi()
` [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
` [PATCH iommufd v3 3/9] vfio/type1: Convert to iommu_group_has_isolated_msi()
` [PATCH iommufd v3 4/9] iommufd: Convert to msi_device_has_isolated_msi()
` [PATCH iommufd v3 5/9] irq: Remove unused irq_domain_check_msi_remap() code
` [PATCH iommufd v3 6/9] irq: Rename IRQ_DOMAIN_MSI_REMAP to IRQ_DOMAIN_ISOLATED_MSI
` [PATCH iommufd v3 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
` [PATCH iommufd v3 8/9] irq/s390: Add arch_is_isolated_msi() for s390
` [PATCH iommufd v3 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
[PATCH v7 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
2023-01-06 10:36 UTC (3+ messages)
` [PATCH v7 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
` [PATCH v7 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
[RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
2023-01-06 10:06 UTC (10+ messages)
` [PATCH 0/2] Fix deadlocks in kvm_vm_ioctl_set_msr_filter() and
` [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
2023-01-06 9:40 UTC (13+ messages)
` [PATCH v10 2/9] KVM: Introduce per-page memory attributes
` [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
` [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
[RFC PATCH v2 00/32] x86: enable FRED for x86-64
2023-01-06 8:56 UTC (33+ messages)
` [RFC PATCH v2 01/32] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
` [RFC PATCH v2 02/32] x86/traps: add a system interrupt table for system interrupt dispatch
` [RFC PATCH v2 03/32] x86/traps: add install_system_interrupt_handler()
` [RFC PATCH v2 04/32] x86/traps: add external_interrupt() to dispatch external interrupts
` [RFC PATCH v2 05/32] x86/traps: add exc_raise_irq() for VMX IRQ reinjection
` [RFC PATCH v2 06/32] x86/cpufeature: add the cpu feature bit for FRED
` [RFC PATCH v2 07/32] x86/opcode: add ERETU, ERETS instructions to x86-opcode-map
` [RFC PATCH v2 08/32] x86/objtool: teach objtool about ERETU and ERETS
` [RFC PATCH v2 09/32] x86/cpu: add X86_CR4_FRED macro
` [RFC PATCH v2 10/32] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
` [RFC PATCH v2 11/32] x86/fred: if CONFIG_X86_FRED is disabled, disable FRED support
` [RFC PATCH v2 12/32] x86/cpu: add MSR numbers for FRED configuration
` [RFC PATCH v2 13/32] x86/fred: header file for event types
` [RFC PATCH v2 14/32] x86/fred: header file with FRED definitions
` [RFC PATCH v2 15/32] x86/fred: make unions for the cs and ss fields in struct pt_regs
` [RFC PATCH v2 16/32] x86/fred: reserve space for the FRED stack frame
` [RFC PATCH v2 17/32] x86/fred: add a page fault entry stub for FRED
` [RFC PATCH v2 18/32] x86/fred: add a debug "
` [RFC PATCH v2 19/32] x86/fred: add a NMI "
` [RFC PATCH v2 20/32] x86/fred: add a machine check "
` [RFC PATCH v2 21/32] x86/fred: FRED entry/exit and dispatch code
` [RFC PATCH v2 22/32] x86/fred: FRED initialization code
` [RFC PATCH v2 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
` [RFC PATCH v2 24/32] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
` [RFC PATCH v2 25/32] x86/fred: disallow the swapgs instruction "
` [RFC PATCH v2 26/32] x86/fred: no ESPFIX needed "
` [RFC PATCH v2 27/32] x86/fred: allow single-step trap and NMI when starting a new thread
` [RFC PATCH v2 28/32] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
` [RFC PATCH v2 29/32] x86/ia32: do not modify the DPL bits for a null selector
` [RFC PATCH v2 30/32] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
` [RFC PATCH v2 31/32] x86/fred: allow dynamic stack frame size
` [RFC PATCH v2 32/32] x86/fred: disable FRED by default in its early stage
[PATCH v6 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
2023-01-06 9:20 UTC (6+ messages)
` [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
[kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
2023-01-06 7:11 UTC (3+ messages)
[PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
2023-01-06 5:56 UTC (19+ messages)
` [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
` [PATCH 09/27] drm/i915/gvt: Protect gfn hash table with dedicated mutex
` [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid
[PATCH][resend] KVM: x86: fire timer when it is migrated and expired, and in oneshot mode
2023-01-06 4:06 UTC
[PATCH] kvm: x86/mmu: Remove FNAME(is_self_change_mapping)
2023-01-06 1:45 UTC (2+ messages)
[Bug 216891] New: The interface for creating SR-IOV VF doesn't exist
2023-01-06 1:40 UTC (2+ messages)
` [Bug 216891] "
[PATCH v5 00/33] KVM: x86: AVIC and local APIC fixes+cleanups
2023-01-06 1:13 UTC (34+ messages)
` [PATCH v5 01/33] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
` [PATCH v5 02/33] KVM: x86: Purge "highest ISR" cache when updating APICv state
` [PATCH v5 03/33] KVM: SVM: Flush the "current" TLB when activating AVIC
` [PATCH v5 04/33] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
` [PATCH v5 05/33] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
` [PATCH v5 06/33] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
` [PATCH v5 07/33] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
` [PATCH v5 08/33] KVM: x86: Handle APICv updates for APIC "mode" changes via request
` [PATCH v5 09/33] KVM: x86: Move APIC access page helper to common x86 code
` [PATCH v5 10/33] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
` [PATCH v5 11/33] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean
` [PATCH v5 12/33] KVM: SVM: Compute dest based on sender's x2APIC status for AVIC kick
` [PATCH v5 13/33] KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast
` [PATCH v5 14/33] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
` [PATCH v5 15/33] KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch
` [PATCH v5 16/33] KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU
` [PATCH v5 17/33] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
` [PATCH v5 18/33] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
` [PATCH v5 19/33] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
` [PATCH v5 20/33] KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
` [PATCH v5 21/33] KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
` [PATCH v5 22/33] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
` [PATCH v5 23/33] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
` [PATCH v5 24/33] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
` [PATCH v5 25/33] KVM: SVM: Always update local APIC on writes to logical dest register
` [PATCH v5 26/33] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
` [PATCH v5 27/33] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
` [PATCH v5 28/33] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
` [PATCH v5 29/33] KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps
` [PATCH v5 30/33] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
` [PATCH v5 31/33] KVM: x86: Track required APICv inhibits with variable, not callback
` [PATCH v5 32/33] KVM: x86: Allow APICv APIC ID inhibit to be cleared
` [PATCH v5 33/33] KVM: x86: Add helpers to recalc physical vs. logical optimized APIC maps
[PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-01-05 23:37 UTC (35+ messages)
` [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
` [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
` [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
` [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
` [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
` [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
[PATCH v2 0/6] Clean up the supported xfeatures
2023-01-05 23:10 UTC (5+ messages)
` [PATCH v2 6/6] KVM: selftests: Add XCR0 Test
[PATCH] Documentation: kvm: clarify SRCU locking order
2023-01-05 22:38 UTC (3+ messages)
[PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP)
2023-01-05 22:31 UTC (11+ messages)
` [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
[PATCH v2] KVM: x86: Replace cpu_dirty_logging_count with nr_memslots_dirty_logging
2023-01-05 21:43 UTC
[PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
2023-01-05 20:28 UTC (4+ messages)
[PATCH] KVM: x86: Replace 0-length arrays with flexible arrays
2023-01-05 19:05 UTC
[PATCH] KVM: x86: Replace cpu_dirty_logging_count with nr_memslots_dirty_logging
2023-01-05 18:08 UTC (2+ messages)
[kvm-unit-tests GIT PULL 0/4] s390x: storage key and CMM concurrent tests
2023-01-05 16:39 UTC (7+ messages)
` [kvm-unit-tests GIT PULL 1/4] lib: s390x: add PSW and PSW_WITH_CUR_MASK macros
` [kvm-unit-tests GIT PULL 2/4] s390x: use the new "
` [kvm-unit-tests GIT PULL 3/4] s390x: add parallel skey migration test
` [kvm-unit-tests GIT PULL 4/4] s390x: add CMM test during migration
[PATCH v2 0/1] vfio/type1: Fix vfio-pci pass-through of ISM devices
2023-01-05 16:06 UTC (3+ messages)
` [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
[GIT PULL] KVM/arm64 fixes for 6.2, take #1
2023-01-05 15:42 UTC
[PATCH rcu 01/27] arch/x86: Remove "select SRCU"
2023-01-05 15:30 UTC (6+ messages)
` [PATCH rcu 03/27] arch/mips/kvm: "
` [PATCH rcu 05/27] arch/riscv/kvm: "
` [PATCH rcu 06/27] arch/s390/kvm: "
[PATCH v14 00/11] s390x: CPU Topology
2023-01-05 14:53 UTC (12+ messages)
` [PATCH v14 01/11] s390x/cpu topology: adding s390 specificities to CPU topology
` [PATCH v14 02/11] s390x/cpu topology: add topology entries on CPU hotplug
` [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
` [PATCH v14 04/11] s390x/sclp: reporting the maximum nested topology entries
` [PATCH v14 05/11] s390x/cpu topology: resetting the Topology-Change-Report
` [PATCH v14 06/11] s390x/cpu topology: interception of PTF instruction
` [PATCH v14 07/11] target/s390x/cpu topology: activating CPU topology
` [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
` [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
` [PATCH v14 10/11] qapi/s390/cpu topology: POLARITY_CHANGE qapi event
` [PATCH v14 11/11] docs/s390x/cpu topology: document s390x cpu topology
[PATCH v5] KVM: MMU: Make the definition of 'INVALID_GPA' common
2023-01-05 13:01 UTC
[PATCH 0/3] x86/cpu: KVM: Make SGX and VMX depend on FEAT_CTL
2023-01-05 10:15 UTC (9+ messages)
` [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
[PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
2023-01-05 10:08 UTC (3+ messages)
[kvm-unit-tests PATCH v1] s390x: Fix integer literal in skey.c
2023-01-05 10:05 UTC (2+ messages)
[PATCH] kvm: x86/mmu: Don't clear write flooding for direct SP
2023-01-05 10:03 UTC
[PATCH] kvm: x86/mmu: Rename SPTE_TDP_AD_ENABLED_MASK to SPTE_TDP_AD_ENABLED
2023-01-05 10:02 UTC
[PATCH 1/7] kvm: x86/mmu: Use KVM_MMU_ROOT_XXX for kvm_mmu_invalidate_gva()
2023-01-05 9:58 UTC (7+ messages)
` [PATCH 2/7] kvm: x86/mmu: Use kvm_mmu_invalidate_gva() in kvm_mmu_invpcid_gva()
` [PATCH 3/7] kvm: x86/mmu: Use kvm_mmu_invalidate_gva() in nested_ept_invalidate_addr()
` [PATCH 4/7] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
` [PATCH 5/7] kvm: x86/mmu: Move the code out of FNAME(sync_page)'s loop body into mmu.c
` [PATCH 6/7] kvm: x86/mmu: Remove FNAME(invlpg)
` [PATCH 7/7] kvm: x86/mmu: Remove @no_dirty_log from FNAME(prefetch_gpte)
[PATCH] vhost-test: remove meaningless debug info
2023-01-05 7:03 UTC
[syzbot] kernel BUG in vhost_vsock_handle_tx_kick
2023-01-05 4:51 UTC (2+ messages)
[PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
2023-01-05 2:59 UTC (3+ messages)
[GIT PULL v2] virtio,vhost,vdpa: fixes, cleanups
2023-01-05 1:22 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).