public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2013-03-11 17:20:34 to 2013-03-14 08:05:08 UTC [more...]

[PATCH 1/2] KVM: nVMX: Clean up and fix pin-based execution controls
 2013-03-14  8:05 UTC  (9+ messages)
` [PATCH] KVM: nVMX: Add preemption timer support

[PATCH] KVM: nVMX: Provide EFER.LMA saving support
 2013-03-14  8:01 UTC  (3+ messages)

[PATCH 6/7] Rename EMULATE_DO_PAPR to EMULATE_EXIT_USER
 2013-03-14  5:59 UTC  (5+ messages)

[PATCH 0/2] KVM: Optimize mmio spte zapping when creating/moving memslot
 2013-03-14  5:45 UTC  (19+ messages)
` [PATCH 1/2] KVM: MMU: Mark sp mmio cached when creating mmio spte
` [PATCH 2/2] KVM: x86: Optimize mmio spte zapping when creating/moving memslot

[PATCH 0/7] KVM :PPC: Userspace Debug support
 2013-03-14  5:18 UTC  (13+ messages)
` [PATCH 2/7] Added ONE_REG interface for debug instruction
` [PATCH 3/7] KVM: PPC: debug stub interface parameter defined
` [PATCH 4/7] booke: Save and restore debug registers on guest entry and exit
` [PATCH 7/7] KVM: PPC: Add userspace debug stub support

[PATCH 0/6] KVM: MMU: fast zap all shadow pages
 2013-03-14  4:42 UTC  (10+ messages)
` [PATCH 1/6] KVM: MMU: move mmu related members into a separate struct
` [PATCH 2/6] KVM: MMU: introduce mmu_cache->pte_list_descs
` [PATCH 3/6] KVM: x86: introduce memslot_set_lpage_disallowed
` [PATCH 4/6] KVM: x86: introduce kvm_clear_all_gfn_page_info
` [PATCH 5/6] KVM: MMU: delete shadow page from hash list in kvm_mmu_prepare_zap_page
` [PATCH 6/6] KVM: MMU: fast zap all shadow pages

[PATCH V2 WIP 0/2] vhost-scsi: new device supporting the tcm_vhost Linux kernel module
 2013-03-14  4:25 UTC  (6+ messages)
` [PATCH V2 WIP 1/2] virtio-scsi: create VirtIOSCSICommon
` [PATCH V2 WIP 2/2] vhost-scsi: new device supporting the tcm_vhost Linux kernel module

[PATCH 0/3] ARM: EXYNOS5250: Enable KVM support
 2013-03-14  3:26 UTC  (5+ messages)
` [PATCH 1/3] ARM: EXYNOS5250: dts: Declare the gic as a15 compatible
` [PATCH 2/3] ARM: EXYNOS5250: dts: Add architected timer nodes
` [PATCH 3/3] ARM: EXYNOS5250: Register architected timers
  ` [kvmarm] "

[Bug 55201] New: host panic when "creating guest, doing scp and killing QEMU process" continuously
 2013-03-14  2:58 UTC  (3+ messages)
` [Bug 55201] "

[PATCH 0/4] tcm_vhost lock and flush fix
 2013-03-14  2:17 UTC  (19+ messages)
` [PATCH 1/4] tcm_vhost: Add missed lock in vhost_scsi_clear_endpoint()
` [PATCH 2/4] tcm_vhost: Introduce tcm_vhost_check_endpoint()
` [PATCH 3/4] tcm_vhost: Fix vs->vs_endpoint checking in vhost_scsi_handle_vq()
` [PATCH 4/4] tcm_vhost: Flush vhost_work in vhost_scsi_flush()

[PATCH v2] KVM: x86: Rework INIT and SIPI handling
 2013-03-14  2:10 UTC  (6+ messages)

[PATCH V2 0/3] tcm_vhost lock and flush fix
 2013-03-14  2:07 UTC  (6+ messages)
` [PATCH V2 1/3] tcm_vhost: Add missed lock in vhost_scsi_clear_endpoint()
` [PATCH V2 2/3] tcm_vhost: Flush vhost_work in vhost_scsi_flush()
` [PATCH V2 3/3] tcm_vhost: Use vq->private_data to indicate if the endpoint is setup

[STRAWMAN PATCH] KVM: PPC: Add ioctl to specify interrupt controller architecture to emulate
 2013-03-14  1:26 UTC  (4+ messages)

[PATCH] KVM: Add KVM_CAP_IRQ_ARCH capability
 2013-03-14  1:20 UTC 

[PATCH 00/29] Port of KVM to arm64
 2013-03-13 20:34 UTC  (20+ messages)
` [PATCH 04/29] arm64: KVM: system register definitions for 64bit guests
` [PATCH 06/29] arm64: KVM: fault injection into a guest
` [PATCH 10/29] arm64: KVM: Cortex-A57 specific system registers handling
` [PATCH 12/29] arm64: KVM: kvm_arch and kvm_vcpu_arch definitions
` [PATCH 14/29] arm64: KVM: guest one-reg interface
` [PATCH 16/29] arm64: KVM: HYP mode world switch implementation

[PATCH][v4] PPC: add paravirt idle loop for 64-bit book E
 2013-03-13 19:22 UTC  (2+ messages)

[PATCH 0/3] KVM: nVMX: Make direct IRQ/NMI injection work
 2013-03-13 16:53 UTC  (4+ messages)
` [PATCH 1/3] KVM: nVMX: Fix injection of PENDING_INTERRUPT and NMI_WINDOW exits to L1
` [PATCH 2/3] KVM: nVMX: Fix conditions for NMI and interrupt injection
` [PATCH 3/3] KVM: nVMX: Rework event injection and recovery

[PATCH] KVM: x86: Rework INIT and SIPI handling
 2013-03-13 13:18 UTC  (14+ messages)

KVM: MMU: make kvm_mmu_available_pages robust against n_used_mmu_pages > n_max_mmu_pages
 2013-03-13  9:46 UTC  (3+ messages)

[PATCH] KVM: x86: Convert INIT and SIPI signals into synchronously handled events
 2013-03-13  9:08 UTC  (25+ messages)

[PATCH V2 0/6] tcm_vhost hotplug/hotunplug support and locking/flushing fix
 2013-03-13  8:11 UTC  (6+ messages)

[PATCH 0/2] tcm_vhost: Wait for pending requests in flush and clear endpoint operation
 2013-03-13  5:16 UTC  (8+ messages)
` [PATCH 1/2] tcm_vhost: Wait for pending requests in vhost_scsi_flush()

Win2003 disk corruption with kvm-1.0. and virtio
 2013-03-12 21:10 UTC  (7+ messages)

[PATCH v7 0/3] AER-KVM: Error containment of VFIO devices assigned to KVM guests
 2013-03-12 21:08 UTC  (2+ messages)

win2k guest vm won't boot under Fedora 18 KVM
 2013-03-12 19:16 UTC  (5+ messages)

KVM call minutes 2013-03-12
 2013-03-12 14:21 UTC 

[PATCH] x86: kvm: reset the bootstrap processor when it gets an INIT
 2013-03-12 11:28 UTC  (31+ messages)

[PATCH] KVM: x86: Drop unused return code from VCPU reset callback
 2013-03-12 11:26 UTC  (3+ messages)

VMX: x86: handle host TSC calibration failure
 2013-03-12 11:18 UTC  (2+ messages)

Causing VMEXIT on every branch instruction by the Guest
 2013-03-12 10:49 UTC 

[PATCH 12/17] cpu: Move halted and interrupt_request fields to CPUState
 2013-03-12  9:49 UTC  (2+ messages)
` [PATCH 14/17] cpu: Pass CPUState to cpu_interrupt()

[PATCH v3 0/5] kvm: Make ioeventfd usable on s390
 2013-03-12  3:47 UTC  (6+ messages)
    ` virtio-s390: document GPR4/GPR2 cookie values

[PATCH V3 0/2] tcm_vhost hotplug/hotunplug support
 2013-03-12  2:45 UTC  (3+ messages)
` [PATCH V3 1/2] tcm_vhost: Introduce tcm_vhost_check_feature()
` [PATCH V3 2/2] tcm_vhost: Add hotplug/hotunplug support

latest kvm-kmod + kvm git vs. 3.8.* distro kernel
 2013-03-11 20:24 UTC  (3+ messages)

KVM call agenda for 2013-03-12
 2013-03-11 18:36 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox