messages from 2014-04-17 14:17:48 to 2014-04-23 19:32:28 UTC [more...]
[PATCH 0/2] KVM: async_pf: use_mm/mm_users fixes
2014-04-23 19:32 UTC (7+ messages)
` [PATCH 1/2] KVM: async_pf: kill the unnecessary use_mm/unuse_mm async_pf_execute()
` [PATCH 2/2] KVM: async_pf: mm->mm_users can not pin apf->mm
[patch 0/2] expose invariant tsc flag for kvm guests
2014-04-23 19:09 UTC (14+ messages)
` [patch 1/2] target-i386: support "invariant tsc" flag
` [patch 2/2] target-i386: block migration and savevm if invariant tsc is exposed
` [patch 0/2] expose invariant tsc flag for kvm guests (v2)
[PATCH RFC untested] kvm/x86: implement hv EOI assist
2014-04-23 18:30 UTC (8+ messages)
[PATCH v9 00/19] qspinlock: a 4-byte queue spinlock with PV support
2014-04-23 17:55 UTC (64+ messages)
` [PATCH v9 01/19] qspinlock: A simple generic 4-byte queue spinlock
` [PATCH v9 02/19] qspinlock, x86: Enable x86-64 to use "
` [PATCH v9 03/19] qspinlock: Add pending bit
` [PATCH v9 04/19] qspinlock: Extract out the exchange of tail code word
` [PATCH v9 05/19] qspinlock: Optimize for smaller NR_CPUS
` [PATCH v9 06/19] qspinlock: prolong the stay in the pending bit path
` [PATCH v9 07/19] qspinlock: Use a simple write to grab the lock, if applicable
` [PATCH v9 08/19] qspinlock: Make a new qnode structure to support virtualization
` [PATCH v9 09/19] qspinlock: Prepare for unfair lock support
` [PATCH v9 10/19] qspinlock, x86: Allow unfair spinlock in a virtual guest
` [PATCH v9 11/19] qspinlock: Split the MCS queuing code into a separate slowerpath
` [PATCH v9 12/19] unfair qspinlock: Variable frequency lock stealing mechanism
` [PATCH v9 13/19] unfair qspinlock: Enable lock stealing in lock waiters
` [PATCH v9 14/19] pvqspinlock, x86: Rename paravirt_ticketlocks_enabled
` [PATCH v9 15/19] pvqspinlock, x86: Add PV data structure & methods
` [PATCH v9 16/19] pvqspinlock: Enable coexistence with the unfair lock
` [PATCH v9 17/19] pvqspinlock: Add qspinlock para-virtualization support
` [PATCH v9 18/19] pvqspinlock, x86: Enable PV qspinlock PV for KVM
` [PATCH v9 19/19] pvqspinlock, x86: Enable PV qspinlock for XEN
Who signed gemu-1.7.1.tar.bz2?
2014-04-23 14:24 UTC (7+ messages)
` [Qemu-devel] "
[PATCH v5] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors
2014-04-23 13:31 UTC (9+ messages)
` [PATCH 3.13] "
[PATCH] perf/tool: Fix usage of trace events with '-' in trace system name
2014-04-23 12:34 UTC (8+ messages)
Asking for informations
2014-04-23 12:23 UTC (2+ messages)
[PATCH kvm-unit-tests] x86/debug: return report_summary
2014-04-23 12:01 UTC
sparc/sparc64 status
2014-04-23 11:03 UTC
Google Summer of Code and Outreach Program for Women accepted projects
2014-04-23 9:25 UTC
[kvm-kmod PATCH 2/2] sync: copy linux/vfio.h from kvm source tree
2014-04-23 6:00 UTC (4+ messages)
[PATCH v3 3/4] live migration support for VM dirty log management
2014-04-22 23:18 UTC
[PATCH v3 4/4] add 2nd stage page fault handling during live migration
2014-04-22 23:18 UTC
[PATCH v3 2/4] live migration support for initial write protect of VM
2014-04-22 23:18 UTC
[PATCH v3 1/4] add ARMv7 HYP API to flush VM TLBs without address param
2014-04-22 23:17 UTC
[PATCH v3 0/4] live migration dirty bitmap support for ARMv7
2014-04-22 23:17 UTC
[PATCH v3 0/3] nVMX: Fixes to run Xen as L1
2014-04-22 21:41 UTC (5+ messages)
` [PATCH v3 1/3] KVM: nVMX: Don't advertise single context invalidation for invept
` [PATCH v3 2/3] KVM: nVMX: Ack and write vector info to intr_info if L1 asks us to
` [PATCH v3 3/3] KVM: nVMX: Advertise support for interrupt acknowledgement
[PATCH 0/3] bridge: few enhancements and small fixes
2014-04-22 19:43 UTC (11+ messages)
` [PATCH 1/3] bridge: preserve random init MAC address
` [PATCH 2/3] bridge: trigger a bridge calculation upon port changes
[PATCH v2] KVM: x86: Check for host supported fields in shadow vmcs
2014-04-22 19:31 UTC (5+ messages)
commit 0bf1457f0cfca7b " mm: vmscan: do not swap anon pages just because free+file is low" causes heavy performance regression on paging
2014-04-22 18:58 UTC (7+ messages)
[kvm-kmod PATCH 1/2] Provide VFIO_DMA_CC_IOMMU and *cpu_notifier* functions for kernels < 3.15
2014-04-22 14:51 UTC
Bug - IP Address
2014-04-22 13:25 UTC (2+ messages)
[GIT PULL 0/54] KVM: s390: Features and Fixes for 3.16
2014-04-22 11:32 UTC (3+ messages)
` [GIT PULL 08/54] KVM: s390: Per-vm kvm device controls
` [GIT PULL 10/54] KVM: s390: Exploiting generic userspace interface for cmma
[PATCH 0/5] KVM: x86: Fix KVM behavior that does not follow spec
2014-04-22 6:04 UTC (8+ messages)
` [PATCH 1/5] KVM: x86: Fix wrong/stuck PMU when guest does not use PMI
` [PATCH 2/5] KVM: x86: Fix CR3 reserved bits
` [PATCH 3/5] KVM: x86: IN instruction emulation should ignore REP-prefix
` [PATCH 4/5] KVM: x86: RSI/RDI/RCX are zero-extended when affected by string ops
` [PATCH 5/5] KVM: x86: Processor mode may be determined incorrectly
[RFC PATCH 0/5] KVM: speed up invalid guest state emulation
2014-04-22 3:25 UTC (6+ messages)
` [RFC PATCH 1/5] KVM: vmx: speed up emulation of invalid guest state
CPUs support APIC virtualization
2014-04-22 3:08 UTC
(unknown),
2014-04-21 21:49 UTC (5+ messages)
`
NX/DEP from host to guest
2014-04-21 20:31 UTC (2+ messages)
[PATCH 0/3] Introduce per-vm kvm device attributes
2014-04-21 20:48 UTC (5+ messages)
` [PATCH 3/3] kvm: s390: Exploiting generic userspace interface for cmma
` [PATCH 3/3] kvm: s390: Exploiting generic userspace interface for cmma\
Raw Disk Not Appearing in Guests
2014-04-21 20:26 UTC (2+ messages)
[RFC PATCH 0/6] KVM: x86: speedups for emulator memory accesses
2014-04-21 20:12 UTC (2+ messages)
[Bug 65081] New: Starting a second guest with -smp 2 makes the first guest very slow and the second one hang (or also very slow)
2014-04-21 18:28 UTC (4+ messages)
` [Bug 65081] "
[PATCH] KVM: x86: Check for host supported fields in shadow vmcs
2014-04-21 13:55 UTC (3+ messages)
[PATCH] kvm: Use pci_enable_msix_range() instead of pci_enable_msix()
2014-04-21 13:38 UTC (10+ messages)
` [PATCH v2] kvm: Use pci_enable_msix_exact() "
[PATCH v10 00/12] In-kernel PSCI v0.2 emulation for KVM ARM/ARM64
2014-04-21 13:00 UTC (13+ messages)
` [PATCH v10 01/12] KVM: Add capability to advertise PSCI v0.2 support
` [PATCH v10 02/12] ARM/ARM64: KVM: Add common header for PSCI related defines
` [PATCH v10 03/12] ARM/ARM64: KVM: Add base for PSCI v0.2 emulation
` [PATCH v10 04/12] KVM: Documentation: Add info regarding KVM_ARM_VCPU_PSCI_0_2 feature
` [PATCH v10 05/12] ARM/ARM64: KVM: Make kvm_psci_call() return convention more flexible
` [PATCH v10 06/12] KVM: Add KVM_EXIT_SYSTEM_EVENT to user space API header
` [PATCH v10 07/12] ARM/ARM64: KVM: Emulate PSCI v0.2 SYSTEM_OFF and SYSTEM_RESET
` [PATCH v10 08/12] ARM/ARM64: KVM: Emulate PSCI v0.2 AFFINITY_INFO
` [PATCH v10 09/12] ARM/ARM64: KVM: Emulate PSCI v0.2 MIGRATE_INFO_TYPE and related functions
` [PATCH v10 10/12] ARM/ARM64: KVM: Fix CPU_ON emulation for PSCI v0.2
` [PATCH v10 11/12] ARM/ARM64: KVM: Emulate PSCI v0.2 CPU_SUSPEND
` [PATCH v10 12/12] ARM/ARM64: KVM: Advertise KVM_CAP_ARM_PSCI_0_2 to user space
[3.11.y.z extended stable] Patch "MIPS: KVM: Pass reserved instruction exceptions to guest" has been added to staging queue
2014-04-21 9:29 UTC
Very poor write performance
2014-04-19 14:51 UTC (3+ messages)
[PATCH 4/5] add 2nd stage page fault handling during live migration
2014-04-18 19:45 UTC (3+ messages)
kvm-unit-tests: repo next branch
2014-04-18 13:20 UTC
[PATCH 3/5] live migration support for VM dirty log management
2014-04-18 8:23 UTC (4+ messages)
[Bug 73331] New: Nested Virtualization, L2 cannot boot up on Ivybridge and Haswell
2014-04-17 18:57 UTC (2+ messages)
` [Bug 73331] "
[PATCH 1/2] kvm: support any-length wildcard ioeventfd
2014-04-17 17:04 UTC (4+ messages)
` [PATCH 2/2] vmx: speed up wildcard MMIO EVENTFD
[PATCH 1/2] kvm tools: ARM: bring generated pci FDT node in-line with kernel binding
2014-04-17 14:57 UTC (2+ messages)
` [PATCH 2/2] kvm tools: ARM: allow potential relocation of IO port
[PATCH] kvm-unit-tests/x86: fix unittests.cfg typo
2014-04-17 14:17 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox