messages from 2024-11-25 04:48:33 to 2024-11-27 20:38:20 UTC [more...]
[PATCH 00/15] Unify MSR intercepts in x86
2024-11-27 20:38 UTC (17+ messages)
` [PATCH 01/15] KVM: x86: Use non-atomic bit ops to manipulate "shadow" MSR intercepts
` [PATCH 02/15] KVM: SVM: Use non-atomic bit ops to manipulate MSR interception bitmaps
` [PATCH 03/15] KVM: SVM: Invert the polarity of the "shadow" "
` [PATCH 04/15] KVM: SVM: Track MSRPM as "unsigned long", not "u32"
` [PATCH 05/15] KVM: x86: SVM: Adopt VMX style MSR intercepts in SVM
` [PATCH 06/15] KVM: SVM: Disable intercepts for all direct access MSRs on MSR filter changes
` [PATCH 07/15] KVM: SVM: Delete old SVM MSR management code
` [PATCH 08/15] KVM: SVM: Pass through GHCB MSR if and only if VM is SEV-ES
` [PATCH 09/15] KVM: SVM: Drop "always" flag from list of possible passthrough MSRs
` [PATCH 10/15] KVM: SVM: Don't "NULL terminate" the "
` [PATCH 11/15] KVM: VMX: Make list of possible passthrough MSRs "const"
` [PATCH 12/15] KVM: x86: Track possible passthrough MSRs in kvm_x86_ops
` [PATCH 13/15] KVM: x86: Move ownership of passthrough MSR "shadow" to common x86
` [PATCH 14/15] KVM: x86: Hoist SVM MSR intercepts to common x86 code
` [PATCH 15/15] KVM: x86: Hoist VMX "
[PATCH v3 0/3] KVM: VMX: Initialize TDX during KVM module load
2024-11-27 20:10 UTC (4+ messages)
` [PATCH 1/3] KVM: Export hardware virtualization enabling/disabling functions
` [PATCH 2/3] KVM: VMX: Refactor VMX module init/exit functions
` [PATCH 3/3] KVM: VMX: Initialize TDX during KVM module load
[RFC PATCH 0/6] SEAMCALL Wrappers
2024-11-27 18:15 UTC (9+ messages)
` [RFC PATCH 1/6] x86/virt/tdx: Add SEAMCALL wrappers for TDX KeyID management
[PATCH v2 00/24] TDX MMU Part 2
2024-11-27 18:08 UTC (9+ messages)
` [PATCH v2 21/24] KVM: TDX: Add an ioctl to create initial guest memory
` [RFC PATCH 0/2] SEPT SEAMCALL retry proposal
` [RFC PATCH 2/2] KVM: TDX: Kick off vCPUs when SEAMCALL is busy during TD page removal
[PATCH 0/2] KVM_ASYNC_PF_SEND_ALWAYS
2024-11-27 17:26 UTC (3+ messages)
` [PATCH 1/2] KVM: x86: async_pf: remove support for KVM_ASYNC_PF_SEND_ALWAYS
` [PATCH 2/2] KVM: x86: async_pf: determine x86 user as cpl == 3
drivers/pci: (and/or KVM): Slow PCI initialization during VM boot with passthrough of large BAR Nvidia GPUs on DGX H100
2024-11-27 17:22 UTC (8+ messages)
[GIT PULL] KVM/riscv changes for 6.13, part #2
2024-11-27 16:59 UTC (6+ messages)
[Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
2024-11-27 16:43 UTC (2+ messages)
` [Invitation] bi-weekly guest_memfd upstream call on 2024-12-05
[PATCH] tools/kvm_stat: fix termination behavior when not on a terminal
2024-11-27 16:30 UTC (3+ messages)
[GIT PULL] Please pull IOMMUFD subsystem changes #2
2024-11-27 15:57 UTC
[PATCH v2 22/49] KVM: x86: Add a macro to precisely handle aliased 0x1.EDX CPUID features
2024-11-27 14:38 UTC (11+ messages)
[PATCH 0/7] KVM: TDX: TD vcpu enter/exit
2024-11-27 14:00 UTC (29+ messages)
` [PATCH RFC 1/7] x86/virt/tdx: Add SEAMCALL wrapper to enter/exit TDX guest
` [PATCH 3/7] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH 4/7] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH 7/7] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
[PATCH v2 0/2] x86: KVM: Add missing AMD features
2024-11-27 11:26 UTC (5+ messages)
` [PATCH v2 1/2] x86: KVM: Advertise FSRS and FSRC on AMD to userspace
` [PATCH v2 2/2] x86: KVM: Advertise AMD's speculation control features
[PATCH] KVM: x86: async_pf: check earlier if can deliver async pf
2024-11-27 10:35 UTC (9+ messages)
[PATCH] KVM: make uevents configurable
2024-11-27 9:04 UTC (6+ messages)
[GIT PULL] virtio: features, fixes, cleanups
2024-11-27 8:30 UTC (2+ messages)
[PATCH v3 00/27] Enable FRED with KVM VMX
2024-11-27 7:58 UTC (15+ messages)
` [PATCH v3 05/27] KVM: VMX: Disable FRED if FRED consistency checks fail
` [PATCH v3 09/27] KVM: VMX: Do not use MAX_POSSIBLE_PASSTHROUGH_MSRS in array definition
[PATCH v2 0/2] Add Error Recovery support for Virtio PCI devices
2024-11-27 6:57 UTC (3+ messages)
` [PATCH 1/2] virtio_pci: Add support for PCIe Function Level Reset
` [PATCH 2/2] virtio_blk: Add support for transport error recovery
[PATCH v3 0/5] Introduce new headers for Hyper-V
2024-11-26 17:28 UTC (10+ messages)
` [PATCH v3 1/5] hyperv: Move hv_connection_id to hyperv-tlfs.h
` [PATCH v3 2/5] hyperv: Clean up unnecessary #includes
` [PATCH v3 3/5] hyperv: Add new Hyper-V headers in include/hyperv
` [PATCH v3 4/5] hyperv: Switch from hyperv-tlfs.h to hyperv/hvhdk.h
` [PATCH v3 5/5] hyperv: Remove the now unused hyperv-tlfs.h files
[PATCH v2 0/1] KVM: arm64: Map GPU memory with no struct pages
2024-11-26 17:10 UTC (2+ messages)
[syzbot] [kvm?] WARNING: locking bug in kvm_xen_set_evtchn_fast
2024-11-26 16:26 UTC (5+ messages)
[GIT PULL] VFIO updates for v6.13-rc1
2024-11-26 16:23 UTC
[RFC PATCH 0/4] KVM: ioctl for populating guest_memfd
2024-11-26 16:04 UTC (14+ messages)
` [PATCH 1/4] KVM: guest_memfd: add generic post_populate callback
[PATCH v2 0/3] KVM: s390: Couple of small cmpxchg() optimizations
2024-11-26 13:33 UTC (10+ messages)
` [PATCH v2 1/3] KVM: s390: Use try_cmpxchg() instead of cmpxchg() loops
` [PATCH v2 2/3] KVM: s390: Remove one byte cmpxchg() usage
` [PATCH v2 3/3] KVM: s390: Increase size of union sca_utility to four bytes
[PATCH v9 00/15] arm64: support poll_idle()
2024-11-26 10:36 UTC (4+ messages)
` [PATCH v9 01/15] asm-generic: add barrier smp_cond_load_relaxed_timeout()
[PATCH v2 0/6] Introduce CET supervisor state support
2024-11-26 10:28 UTC (8+ messages)
` [PATCH v2 1/6] x86/fpu/xstate: Always preserve non-user xfeatures/flags in __state_perm
` [PATCH v2 2/6] x86/fpu/xstate: Add CET supervisor mode state support
` [PATCH v2 3/6] x86/fpu/xstate: Introduce XFEATURE_MASK_KERNEL_DYNAMIC xfeature set
` [PATCH v2 4/6] x86/fpu/xstate: Introduce fpu_guest_cfg for guest FPU configuration
` [PATCH v2 5/6] x86/fpu/xstate: Create guest fpstate with guest specific config
` [PATCH v2 6/6] x86/fpu/xstate: Warn if CET supervisor state is detected in normal fpstate
[PATCH] kvm/debugfs: add file to get vcpu steal time statistics
2024-11-26 9:54 UTC (8+ messages)
[PATCH v6 00/60] QEMU TDX support
2024-11-26 9:46 UTC (5+ messages)
` [PATCH v6 07/60] kvm: Introduce kvm_arch_pre_create_vcpu()
[PATCH v2 0/4] Introduce a quirk to control memslot zap behavior
2024-11-26 9:15 UTC (5+ messages)
` [PATCH v2 1/4] KVM: x86/mmu: "
[PATCH] KVM: selftests: Remove unneeded semicolon
2024-11-26 7:37 UTC
[PATCH v3 0/4] Allow AVIC's IPI virtualization to be optional
2024-11-26 0:25 UTC (7+ messages)
[PATCH v3] vfio/pci: Properly hide first-in-list PCIe extended capability
2024-11-25 19:18 UTC (2+ messages)
[PATCH v5 0/2] mm: Refactor KVM guest_memfd to introduce guestmem library
2024-11-25 18:04 UTC (2+ messages)
Using the ldp instruction to access the I/O address space in KVM mode causes an exception
2024-11-25 17:16 UTC (2+ messages)
[kvm-unit-tests PATCH v4 0/5] riscv: add SBI SSE extension tests
2024-11-25 16:21 UTC (6+ messages)
` [kvm-unit-tests PATCH v4 1/5] kbuild: allow multiple asm-offsets file to be generated
` [kvm-unit-tests PATCH v4 2/5] riscv: use asm-offsets to generate SBI_EXT_HSM values
` [kvm-unit-tests PATCH v4 3/5] riscv: Add "-deps" handling for tests
` [kvm-unit-tests PATCH v4 4/5] riscv: lib: Add SBI SSE extension definitions
` [kvm-unit-tests PATCH v4 5/5] riscv: sbi: Add SSE extension tests
[PATCH 0/3] KVM: s390: Couple of small cmpxchg() optimizations
2024-11-25 16:20 UTC (11+ messages)
` [PATCH 1/3] KVM: s390: Use try_cmpxchg() instead of cmpxchg() loops
` [PATCH 2/3] KVM: s390: Remove one byte cmpxchg() usage
` [PATCH 3/3] KVM: s390: Increase size of union sca_utility to four bytes
[RFC PATCH 00/15] iommu/riscv: Add irqbypass support
2024-11-25 15:07 UTC (11+ messages)
` [RFC PATCH 08/15] iommu/riscv: Add IRQ domain for interrupt remapping
[PATCH v1 00/11] fs/proc/vmcore: kdump support for virtio-mem on s390
2024-11-25 14:41 UTC (5+ messages)
` [PATCH v1 03/11] fs/proc/vmcore: disallow vmcore modifications after the vmcore was opened
[kvm-unit-tests PATCH v3 0/4] riscv: add SBI SSE extension tests
2024-11-25 14:41 UTC (13+ messages)
` [kvm-unit-tests PATCH v3 1/4] riscv: Add "-deps" handling for tests
` [kvm-unit-tests PATCH v3 2/4] riscv: lib: Add SBI SSE extension definitions
` [kvm-unit-tests PATCH v3 3/4] riscv: lib: Add SSE assembly entry handling
` [kvm-unit-tests PATCH v3 4/4] riscv: sbi: Add SSE extension tests
[RFC RESEND 0/6] hugetlbfs largepage RAS project
2024-11-25 14:27 UTC (9+ messages)
` [PATCH v3 0/7] hugetlbfs memory HW error fixes
` [PATCH v3 1/7] hwpoison_page_list and qemu_ram_remap are based of pages
` [PATCH v3 2/7] system/physmem: poisoned memory discard on reboot
` [PATCH v3 3/7] accel/kvm: Report the loss of a large memory page
` [PATCH v3 4/7] numa: Introduce and use ram_block_notify_remap()
` [PATCH v3 5/7] hostmem: Factor out applying settings
` [PATCH v3 6/7] hostmem: Handle remapping of RAM
` [PATCH v3 7/7] system/physmem: Memory settings applied on remap notification
[PATCH v3 1/2] KVM: x86: Check hypercall's exit to userspace generically
2024-11-25 12:08 UTC (13+ messages)
[PATCH RFC v3 0/3] riscv: add Svukte extension
2024-11-25 12:08 UTC (3+ messages)
` [PATCH RFC v3 3/3] riscv: KVM: Add Svukte extension support for Guest/VM
[PATCH] vfio/mlx5: Align the page tracking max message size with the device capability
2024-11-25 11:32 UTC
[PATCH] KVM: x86: switch hugepage recovery thread to vhost_task
2024-11-25 11:22 UTC (5+ messages)
[RFC 00/14] AMD: Add Secure AVIC Guest Support
2024-11-25 11:16 UTC (10+ messages)
` [RFC 01/14] x86/apic: Add new driver for Secure AVIC
[kvm-unit-tests PATCH v2 0/3] riscv: add SBI SSE extension tests
2024-11-25 10:29 UTC (10+ messages)
` [kvm-unit-tests PATCH v2 2/3] riscv: lib: Add SSE assembly entry handling
` [kvm-unit-tests PATCH v2 3/3] riscv: sbi: Add SSE extension tests
[PATCH v2] vfio/pci: Properly hide first-in-list PCIe extended capability
2024-11-25 4:53 UTC (6+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox