messages from 2023-05-22 07:45:25 to 2023-05-24 01:47:56 UTC [more...]
[PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
2023-05-24 1:47 UTC (2+ messages)
` [PATCH 2/2] arm64: Notify on pte permission upgrades
[PATCH -next v20 00/26] riscv: Add vector ISA support
2023-05-24 0:49 UTC (9+ messages)
` [PATCH -next v20 11/26] riscv: Allocate user's vector context in the first-use trap
` [PATCH -next v20 20/26] riscv: Add prctl controls for userspace vector management
` [PATCH -next v20 21/26] riscv: Add sysctl to set the default vector rule for new processes
[PATCH -next v20 10/26] riscv: Add task switch support for vector
2023-05-24 0:49 UTC (2+ messages)
[PATCH -next v20 12/26] riscv: Add ptrace vector support
2023-05-24 0:49 UTC (2+ messages)
[PATCH -next v20 09/26] riscv: Introduce struct/helpers to save/restore per-task Vector state
2023-05-24 0:49 UTC (2+ messages)
[PATCH -next v20 03/26] riscv: hwprobe: Add support for probing V in RISCV_HWPROBE_KEY_IMA_EXT_0
2023-05-24 0:48 UTC (2+ messages)
[PATCH -next v20 23/26] riscv: Enable Vector code to be built
2023-05-24 0:22 UTC (2+ messages)
[PATCH v2 0/6] KVM: x86/mmu: refine memtype related mmu zap
2023-05-24 0:15 UTC (10+ messages)
` [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
` [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
[PATCH] vfio/pci: Also demote hiding standard cap messages
2023-05-23 22:52 UTC
[PATCH] vfio/pci: demote hiding ecap messages to debug level
2023-05-23 22:43 UTC (2+ messages)
[PATCH V5 00/11] vfio/pci: Support dynamic allocation of MSI-X interrupts
2023-05-23 22:43 UTC (4+ messages)
[PATCH v2] vfio/type1: check pfn valid before converting to struct page
2023-05-23 21:44 UTC (5+ messages)
[PATCH 1/2] x86/msr: Read MSRs individually
2023-05-23 20:31 UTC (3+ messages)
` [PATCH 2/2] x86/msr: Allow unprivileged read access to some MSRs
[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
2023-05-23 18:59 UTC (5+ messages)
` [PATCH v10 2/9] KVM: Introduce per-page memory attributes
[PATCH 0/2][next] vfio/ccw: Replace one-element array with flexible-array member
2023-05-23 18:58 UTC (11+ messages)
` [PATCH 1/2][next] "
` [PATCH 2/2][next] vfio/ccw: Use struct_size() helper
[Bug 217472] New: ACPI _OSC features have different values in Host OS and Guest OS
2023-05-23 18:06 UTC (2+ messages)
[PATCH v3 00/22] Improve scalability of KVM + userfaultfd live migration via annotated memory faults
2023-05-23 17:49 UTC (4+ messages)
[PATCH v2] KVM: SVM: Remove TSS reloading code after VMEXIT
2023-05-23 16:56 UTC
[PATCH] KVM: x86: vPMU: truncate counter value to allowed width
2023-05-23 16:42 UTC (3+ messages)
Deadlock due to EPT_VIOLATION
2023-05-23 16:22 UTC (2+ messages)
[PATCH 0/2] KVM: arm64: Handle MTE Set/Way CMOs
2023-05-23 16:13 UTC (2+ messages)
[PATCH v11 00/23] Add vfio_device cdev for iommufd support
2023-05-23 15:51 UTC (22+ messages)
` [PATCH v11 03/23] vfio: Accept vfio device file in the KVM facing kAPI
` [PATCH v11 10/23] vfio-iommufd: Move noiommu compat probe out of vfio_iommufd_bind()
` [PATCH v11 13/23] vfio-iommufd: Add detach_ioas support for physical VFIO devices
` [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
` [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
` [PATCH v11 21/23] vfio: Determine noiommu device in __vfio_register_dev()
[PATCH kernel v5 0/6] KVM: SEV: Enable AMD SEV-ES DebugSwap
2023-05-23 15:44 UTC (11+ messages)
` [PATCH kernel v5 3/6] KVM: SEV-ES: explicitly disable debug
` [PATCH kernel v5 4/6] KVM: SVM/SEV/SEV-ES: Rework intercepts
` [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
` [PATCH kernel v5 6/6] x86/sev: Do not handle #VC for DR7 read/write
[PATCH kvmtool v2 1/2] virtio/rng: switch to using /dev/urandom
2023-05-23 15:40 UTC (5+ messages)
` [PATCH kvmtool v2 2/2] virtio/rng: return at least one byte of entropy
[PATCH] KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
2023-05-23 15:10 UTC (3+ messages)
[PATCH] vhost: use kzalloc() instead of kmalloc() followed by memset()
2023-05-23 14:54 UTC (2+ messages)
[PATCH 1/2] x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline
2023-05-23 14:34 UTC (4+ messages)
[PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
2023-05-23 14:19 UTC (4+ messages)
` [PATCH v7 08/14] KVM: Rename mmu_notifier_*
[kvm-unit-tests PATCH v2] arm64: Make vector_table and vector_stub weak symbols
2023-05-23 13:53 UTC
[PATCH v10 00/30] Add KVM LoongArch support
2023-05-23 11:57 UTC (8+ messages)
[PATCH kvmtool 00/16] Fix vhost-net, scsi and vsock
2023-05-23 10:46 UTC (2+ messages)
[PTACH v2 1/6] update-linux-headers: sync-up header with Linux for KVM AIA support
2023-05-23 9:51 UTC (5+ messages)
[kvm-unit-tests PATCH] arm64: Make vector_table and vector_stub weak symbols
2023-05-23 9:52 UTC (5+ messages)
[RFC PATCH 00/32] ACPI/arm64: add support for virtual cpuhotplug
2023-05-23 9:32 UTC (3+ messages)
` [RFC PATCH 30/32] KVM: arm64: Pass PSCI calls to userspace
[PATCH v3 00/21] Enable CET Virtualization
2023-05-23 8:57 UTC (5+ messages)
` [PATCH v3 13/21] KVM:VMX: Emulate reads and writes to CET MSRs
` [PATCH v3 14/21] KVM:VMX: Add a synthetic MSR to allow userspace to access GUEST_SSP
[PATCH v13 000/113] KVM TDX basic feature support
2023-05-23 8:17 UTC (5+ messages)
` [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
[Bug 217307] New: windows guest entering boot loop when nested virtualization enabled and hyperv installed
2023-05-23 7:38 UTC (3+ messages)
` [Bug 217307] "
[PATCH] mmu_notifiers: Notify on pte permission upgrades
2023-05-23 6:45 UTC (15+ messages)
[RFC PATCH v3 00/17] vsock: MSG_ZEROCOPY flag support
2023-05-23 5:46 UTC (16+ messages)
` [RFC PATCH v3 04/17] vsock/virtio: non-linear skb handling for tap
` [RFC PATCH v3 05/17] vsock/virtio: MSG_ZEROCOPY flag support
` [RFC PATCH v3 10/17] vhost/vsock: support MSG_ZEROCOPY for transport
` [RFC PATCH v3 11/17] vsock/virtio: "
` [RFC PATCH v3 12/17] vsock/loopback: "
` [RFC PATCH v3 13/17] net/sock: enable setting SO_ZEROCOPY for PF_VSOCK
` [RFC PATCH v3 14/17] docs: net: description of MSG_ZEROCOPY for AF_VSOCK
` [RFC PATCH v3 15/17] test/vsock: MSG_ZEROCOPY flag tests
` [RFC PATCH v3 16/17] test/vsock: MSG_ZEROCOPY support for vsock_perf
` [RFC PATCH v3 17/17] test/vsock: io_uring rx/tx tests
[PATCH v3 0/6] Expose GPU memory as coherently CPU accessible
2023-05-23 5:43 UTC (5+ messages)
` [PATCH v3 3/6] mm: handle poisoning of pfn without struct pages
[PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
2023-05-23 4:47 UTC (13+ messages)
[PATCH v2] KVM: x86/mmu: Assert on @mmu in the __kvm_mmu_invalidate_addr()
2023-05-23 3:29 UTC
[ANNOUNCE / RFC] Periodic Upstream Call for KVM
2023-05-23 2:19 UTC (4+ messages)
[PATCH v3 00/18] x86/reboot: KVM: Clean up "emergency" virt code
2023-05-23 2:02 UTC (34+ messages)
` [PATCH v3 02/18] x86/reboot: Harden virtualization hooks for emergency reboot
` [PATCH v3 03/18] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
` [PATCH v3 04/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM "
` [PATCH v3 05/18] x86/reboot: Disable virtualization during reboot iff callback is registered
` [PATCH v3 06/18] x86/reboot: Assert that IRQs are disabled when turning off virtualization
` [PATCH v3 07/18] x86/reboot: Hoist "disable virt" helpers above "emergency reboot" path
` [PATCH v3 08/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_{INTEL,AMD} is enabled
` [PATCH v3 09/18] x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
` [PATCH v3 10/18] x86/virt: KVM: Move VMXOFF helpers into "
` [PATCH v3 13/18] x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()
` [PATCH v3 14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
` [PATCH v3 15/18] KVM: VMX: Ensure CPU is stable when probing basic VMX support
` [PATCH v3 16/18] x86/virt: KVM: Move "disable SVM" helper into KVM SVM
` [PATCH v3 17/18] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
Rename restrictedmem => guardedmem? (was: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM)
2023-05-23 0:21 UTC (14+ messages)
[PATCH v10 0/5] Support writable CPU ID registers from userspace
2023-05-22 22:18 UTC (6+ messages)
` [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
` [PATCH v10 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
` [PATCH v10 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
` [PATCH v10 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
` [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
[PATCH v6 0/4] KVM: allow mapping non-refcounted pages
2023-05-22 21:55 UTC (5+ messages)
` [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
` [PATCH v6 4/4] KVM: mmu: remove over-aggressive warnings
[PATCH v20 00/21] s390x: CPU Topology
2023-05-22 19:47 UTC (7+ messages)
` [PATCH v20 14/21] tests/avocado: s390x cpu topology core
` [PATCH v20 15/21] tests/avocado: s390x cpu topology polarisation
` [PATCH v20 16/21] tests/avocado: s390x cpu topology entitlement tests
[PATCH v9 0/5] Support writable CPU ID registers from userspace
2023-05-22 17:27 UTC (11+ messages)
` [PATCH v9 1/5] KVM: arm64: Save ID registers' sanitized value per guest
` [PATCH v9 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
[PATCH v4] vfio/pci: Propagate ACPI notifications to user-space via eventfd
2023-05-22 16:58 UTC
[PATCH v2 0/2] KVM: SVM: small tweaks for sev_hardware_setup
2023-05-22 16:12 UTC (3+ messages)
` [PATCH v2 1/2] KVM: SVM: free sev_*asid_bitmap init if SEV init fails
` [PATCH v2 2/2] KVM: SVM: enhance info printk's in SEV init
[PATCH v3 0/2] iommu/amd: Fix GAM IRTEs affinity and GALog restart
2023-05-22 15:16 UTC (2+ messages)
[kvm-unit-tests PATCH v9 0/2] S390x: CPU Topology Information
2023-05-22 15:17 UTC (4+ messages)
` [kvm-unit-tests PATCH v9 1/2] s390x: topology: Check the Perform Topology Function
[PATCH v2 0/7] KVM: selftests: Add tests for pmu event filter
2023-05-22 15:02 UTC (3+ messages)
[PATCH v2 00/13] local_clock() vs noinstr
2023-05-22 14:18 UTC (3+ messages)
` [PATCH v2 06/13] s390/time: Provide sched_clock_noinstr()
[PATCH v7 0/1] arm: enable MTE for QEMU + kvm
2023-05-22 12:04 UTC (2+ messages)
[PATCH v6 00/10] Enhance vfio PCI hot reset for vfio cdev device
2023-05-22 11:57 UTC (11+ messages)
` [PATCH v6 01/10] vfio-iommufd: Create iommufd_access for noiommu devices
` [PATCH v6 02/10] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
` [PATCH v6 03/10] vfio/pci: Move the existing hot reset logic to be a helper
` [PATCH v6 04/10] iommufd: Reserve all negative IDs in the iommufd xarray
` [PATCH v6 05/10] iommufd: Add iommufd_ctx_has_group()
` [PATCH v6 06/10] iommufd: Add helper to retrieve iommufd_ctx and devid
` [PATCH v6 07/10] vfio: Mark cdev usage in vfio_device
` [PATCH v6 08/10] vfio: Add helper to search vfio_device in a dev_set
` [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
` [PATCH v6 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
[PATCH RFCv2 00/24] IOMMUFD Dirty Tracking
2023-05-22 10:43 UTC (4+ messages)
` [PATCH RFCv2 21/24] iommu/arm-smmu-v3: Enable HTTU for stage1 with io-pgtable mapping
[RFC PATCH v2 00/11] Intel IA32_SPEC_CTRL Virtualization
2023-05-22 9:43 UTC (7+ messages)
` [RFC PATCH v2 08/11] KVM: VMX: Advertise MITI_ENUM_RETPOLINE_S_SUPPORT
` [RFC PATCH v2 09/11] KVM: VMX: Advertise MITI_CTRL_BHB_CLEAR_SEQ_S_SUPPORT
` [RFC PATCH v2 10/11] KVM: selftests: Add tests for virtual enumeration/mitigation MSRs
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox