messages from 2024-06-20 17:06:43 to 2024-06-23 13:45:03 UTC [more...]
[PATCH AUTOSEL 6.6 09/16] vfio: Create vfio_fs_type with inode per device
2024-06-23 13:44 UTC
[PATCH AUTOSEL 6.9 09/21] vfio: Create vfio_fs_type with inode per device
2024-06-23 13:43 UTC (3+ messages)
` [PATCH AUTOSEL 6.9 10/21] vfio/pci: Use unmap_mapping_range()
` [PATCH AUTOSEL 6.9 20/21] vfio/pci: Insert full vma on mmap'd MMIO fault
[PATCH v2 0/6] LoongArch: KVM: Fix some issues relative with mmu
2024-06-23 10:18 UTC (9+ messages)
` [PATCH v2 1/6] LoongArch: KVM: Delay secondary mmu tlb flush until guest entry
` [PATCH v2 2/6] LoongArch: KVM: Select huge page only if secondary mmu supports it
` [PATCH v2 4/6] LoongArch: KVM: Add memory barrier before update pmd entry
` [PATCH v2 6/6] LoongArch: KVM: Mark page accessed and dirty with page ref added
[PATCH vhost v9 0/6] refactor the params of find_vqs()
2024-06-23 10:14 UTC (7+ messages)
` [PATCH vhost v9 2/6] virtio: remove support for names array entries being null
[PATCH v3 0/4] LoongArch: KVM: Add Binary Translation extension support
2024-06-23 10:14 UTC (5+ messages)
` [PATCH v3 1/4] LoongArch: KVM: Add HW "
` [PATCH v3 4/4] LoongArch: KVM: Add VM LBT feature detection support
[PATCH v2] KVM: x86: add missing MODULE_DESCRIPTION() macros
2024-06-23 5:44 UTC
[PATCH v1 0/5] SEV-SNP: Add KVM support for attestation and KVM_EXIT_COCO
2024-06-22 20:28 UTC (15+ messages)
` [PATCH v1 1/5] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v1-revised "
` [PATCH v1 2/5] x86/sev: Move sev_guest.h into common SEV header
` [PATCH v1 3/5] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
` [PATCH v1 4/5] KVM: Introduce KVM_EXIT_COCO exit type
` [PATCH v1 5/5] KVM: SEV: Add certificate support for SNP_EXTENDED_GUEST_REQUEST events
[PATCH] KVM: selftests: Assert that MPIDR_EL1 is unchanged across vCPU reset
2024-06-22 18:11 UTC (2+ messages)
[PATCH] KVM: arm64: nv: Unfudge ID_AA64PFR0_EL1 masking
2024-06-22 18:11 UTC (3+ messages)
[GIT PULL] KVM fixes for Linux 6.10-rc5
2024-06-22 15:21 UTC (2+ messages)
[PATCH v5 0/4] Add Svade and Svadu Extensions Support
2024-06-22 12:01 UTC (30+ messages)
` [PATCH v5 1/4] RISC-V: "
` [PATCH v5 2/4] dt-bindings: riscv: Add Svade and Svadu Entries
` [PATCH v5 3/4] RISC-V: KVM: Add Svade and Svadu Extensions Support for Guest/VM
` [PATCH v5 4/4] KVM: riscv: selftests: Add Svade and Svadu Extension to get-reg-list test
[PATCH 0/9] Enable haltpoll for arm64
2024-06-21 23:59 UTC (4+ messages)
` [PATCH 8/9] arm64: support cpuidle-haltpoll
[PATCH] KVM: x86: Complain about an attempt to change the APIC base address
2024-06-21 22:48 UTC
[PATCH v6 0/3] vfio/pci: Support 8-byte PCI loads and stores
2024-06-21 21:50 UTC (3+ messages)
[RFC PATCH v5 00/29] TDX KVM selftests
2024-06-21 20:52 UTC (11+ messages)
[PATCH 0/1] KVM: selftests: pmu_counters_test: increase robustness of LLC cache misses
2024-06-21 20:43 UTC (2+ messages)
` [PATCH 1/1] "
[RFC PATCH v1 0/2] virtio/vsock: some updates for deferred credit update
2024-06-21 19:25 UTC (3+ messages)
` [RFC PATCH v1 1/2] virtio/vsock: rework deferred credit update logic
` [RFC PATCH v1 2/2] vsock/test: add test for deferred credit update
[PATCH v3 00/17] TDX MMU prep series part 1
2024-06-21 19:08 UTC (4+ messages)
` [PATCH v3 17/17] KVM: x86/tdp_mmu: Take root types for kvm_tdp_mmu_invalidate_all_roots()
[PATCH v11 0/8] KVM: allow mapping non-refcounted pages
2024-06-21 18:32 UTC (2+ messages)
[PATCH v1] selftests/harness: Fix tests timeout and race condition
2024-06-21 18:06 UTC
[GIT PULL] KVM/riscv fixes for 6.10 take #2
2024-06-21 16:57 UTC (3+ messages)
[PATCH RFC 0/5] mm/gup: Introduce exclusive GUP pinning
2024-06-21 16:54 UTC (40+ messages)
[PATCH v9 00/24] Add Secure TSC support for SNP guests
2024-06-21 16:54 UTC (3+ messages)
` [PATCH v9 03/24] virt: sev-guest: Make payload a variable length array
[Bug 218739] New: pmu_counters_test kvm-selftest fails with (count != NUM_INSNS_RETIRED)
2024-06-21 15:14 UTC (4+ messages)
` [Bug 218739] "
[PATCH 3/7] mm/mprotect: Push mmu notifier to PUDs
2024-06-21 14:25 UTC
[PATCH v3 00/14] arm64: Support for running as a guest in Arm CCA
2024-06-21 14:24 UTC (11+ messages)
` [PATCH v3 09/14] arm64: Enable memory encrypt for Realms
` [PATCH v3 12/14] arm64: realm: Support nonsecure ITS emulation shared
[PATCH 0/2] KVM vPMU code refine
2024-06-21 13:48 UTC (11+ messages)
` [PATCH 1/2] KVM: x86/pmu: Define KVM_PMC_MAX_GENERIC for platform independence
` [PATCH 2/2] selftests: kvm: Reduce verbosity of "Random seed" messages
[PATCH v5 00/10] KVM: arm64: Allow userspace to modify CTR_EL0
2024-06-21 12:55 UTC (3+ messages)
[PATCH] KVM: SVM: let alternatives handle the cases when rsb filling is required
2024-06-21 12:51 UTC (2+ messages)
[PATCH v10 00/24] Add Secure TSC support for SNP guests
2024-06-21 12:39 UTC (25+ messages)
` [PATCH v10 01/24] virt: sev-guest: Use AES GCM crypto library
` [PATCH v10 02/24] virt: sev-guest: Replace dev_dbg with pr_debug
` [PATCH v10 03/24] virt: sev-guest: Make payload a variable length array
` [PATCH v10 04/24] virt: sev-guest: Add SNP guest request structure
` [PATCH v10 05/24] virt: sev-guest: Fix user-visible strings
` [PATCH v10 06/24] virt: sev-guest: Simplify VMPCK and sequence number assignments
` [PATCH v10 07/24] virt: sev-guest: Store VMPCK index to SNP guest device structure
` [PATCH v10 08/24] virt: sev-guest: Take mutex in snp_send_guest_request()
` [PATCH v10 09/24] virt: sev-guest: Carve out SNP guest messaging init/exit
` [PATCH v10 10/24] x86/sev: Move core SEV guest driver routines to common code
` [PATCH v10 11/24] x86/sev: Replace dev_[err,alert] with pr_[err,alert]
` [PATCH v10 12/24] x86/sev: Make snp_issue_guest_request() static
` [PATCH v10 13/24] x86/sev: Make sev-guest driver functional again
` [PATCH v10 14/24] x86/sev: Handle failures from snp_init()
` [PATCH v10 15/24] x86/sev: Cache the secrets page address
` [PATCH v10 16/24] x86/sev: Drop sev_guest_platform_data structure
` [PATCH v10 17/24] x86/cc: Add CC_ATTR_GUEST_SECURE_TSC
` [PATCH v10 18/24] x86/sev: Add Secure TSC support for SNP guests
` [PATCH v10 19/24] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
` [PATCH v10 20/24] x86/sev: Prevent RDTSC/RDTSCP interception "
` [PATCH v10 21/24] x86/kvmclock: Skip kvmclock when Secure TSC is available
` [PATCH v10 22/24] x86/sev: Mark Secure TSC as reliable
` [PATCH v10 23/24] x86/cpu/amd: Do not print FW_BUG for Secure TSC
` [PATCH v10 24/24] x86/sev: Enable Secure TSC for SNP guests
[PATCH] crypto: qat - fix linking errors when PCI_IOV is disabled
2024-06-21 12:28 UTC (2+ messages)
[kvm-unit-tests PATCH] x86: replace segment selector magic number with macro definition
2024-06-21 12:26 UTC
[GIT PULL] KVM: Fixes for 6.10-rcN
2024-06-21 12:02 UTC (2+ messages)
[PATCH v8 0/8] update linux headers to v6.10-rc1 and shutdown support for pvpanic
2024-06-21 10:45 UTC (4+ messages)
` [PATCH v8 3/8] hw/misc/pvpanic: centralize definition of supported events
[kvm-unit-tests PATCH v1] s390x: Split and rework cpacf query functions
2024-06-21 10:22 UTC
[PATCH net-next 2/2] vsock/virtio: avoid enqueue packets when work queue is empty
2024-06-21 9:47 UTC (4+ messages)
[PATCH 00/14] replace call_rcu by kfree_rcu for simple kmem_cache_free callback
2024-06-21 9:32 UTC (11+ messages)
[kvm-unit-tests PATCH v3 0/7] s390x: STFLE nested interpretation
2024-06-21 7:13 UTC (16+ messages)
` [kvm-unit-tests PATCH v3 2/7] s390x: lib: Remove double include
` [kvm-unit-tests PATCH v3 3/7] s390x: Add sie_is_pv
` [kvm-unit-tests PATCH v3 4/7] s390x: Add function for checking diagnose intercepts
` [kvm-unit-tests PATCH v3 5/7] s390x: Add library functions for exiting from snippet
` [kvm-unit-tests PATCH v3 7/7] s390x: Add test for STFLE interpretive execution (format-0)
hola
2024-06-21 2:36 UTC
[PATCH 0/5] Introduce a quirk to control memslot zap behavior
2024-06-21 2:14 UTC (12+ messages)
` [PATCH] KVM: x86/mmu: Implement memslot deletion for TDX
[PATCH] KVM: Remove duplicated zero clear with dirty_bitmap buffer
2024-06-21 1:59 UTC (5+ messages)
[PATCH 0/5] KVM: VMX: Drop MTRR virtualization, honor guest PAT
2024-06-21 0:52 UTC (5+ messages)
` [PATCH 4/5] KVM: x86: Ensure a full memory barrier is emitted in the VM-Exit path
[PATCH 0/5] riscv: add support for Zaamo and Zalrsc extensions
2024-06-20 22:52 UTC (3+ messages)
` [PATCH 3/5] riscv: hwprobe: export "
[PATCH v10 0/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
2024-06-20 22:30 UTC (5+ messages)
` [PATCH v10 1/3] KVM: selftests: aarch64: Add helper function for the vpmu vcpu creation
` [PATCH v10 2/3] KVM: selftests: aarch64: Introduce pmu_event_filter_test
[PATCH kvm-unit-tests] fix cirrus-ci-macos-i386 CI job
2024-06-20 21:45 UTC
[GIT PULL] KVM/arm64 fixes for 6.10, take #2
2024-06-20 21:38 UTC (2+ messages)
[kvm-unit-tests GIT PULL] x86: Fixes, cleanups, and new tests
2024-06-20 21:38 UTC (2+ messages)
[PATCH] KVM: Discard zero mask with function kvm_dirty_ring_reset
2024-06-20 21:20 UTC (2+ messages)
[PATCH] kvm: Simplify kvm_get_running_vcpu()
2024-06-20 21:15 UTC (2+ messages)
[PATCH v4 00/40] lib/find: add atomic find_bit() primitives
2024-06-20 20:32 UTC (10+ messages)
` [PATCH v4 01/40] "
` [PATCH v4 02/40] lib/find: add test for atomic find_bit() ops
` [PATCH v4 13/40] KVM: x86: hyper-v: optimize and cleanup kvm_hv_process_stimers()
` [PATCH v4 37/40] KVM: PPC: Book3s HV: drop locking around kvmppc_uvmem_bitmap
[PATCH v3 00/15] KVM: arm64: nv: FPSIMD/SVE, plus some other CPTR goodies
2024-06-20 20:02 UTC (2+ messages)
[PATCH v2 00/12] maintainer updates pre-PR (gdbstub, plugins, time control)
2024-06-20 18:40 UTC (5+ messages)
` [PATCH v2 09/12] plugins: add migration blocker
` [PATCH v2 12/12] accel/tcg: Avoid unnecessary call overhead from qemu_plugin_vcpu_mem_cb
[PATCH] KVM: VMX: Remove unnecessary INVEPT[GLOBAL] from hardware enable path
2024-06-20 18:19 UTC (2+ messages)
[PATCH v5 0/8] KVM: arm64: Add support for hypervisor kCFI
2024-06-20 17:56 UTC (2+ messages)
[RFC PATCH 1/1] kvm: Note an RCU quiescent state on guest exit
2024-06-20 17:26 UTC (8+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox