messages from 2014-11-26 16:40:58 to 2014-11-29 11:29:11 UTC [more...]
[RFC PATCH 0/5] ARM: KVM: Enable the ioeventfd capability of KVM on ARM
2014-11-29 11:29 UTC (14+ messages)
` [RFC PATCH 1/5] KVM: redesing kvm_io_bus_ API to pass VCPU structure to the callbacks
` [RFC PATCH 2/5] ARM: on IO mem abort - route the call to KVM MMIO bus
` [RFC PATCH 3/5] KVM: ARM VGIC add kvm_io_bus_ frontend
` [RFC PATCH 4/5] ARM: enable linking against eventfd and irqchip
KVM checkpatch.pl issue
2014-11-29 11:09 UTC
[Bug 88671] New: BUG at drivers/pci/ats.c:62! the second time booting a kvm guest with pci passthrough
2014-11-29 2:39 UTC (4+ messages)
` [Bug 88671] "
` [Bug 88671] Radeon driver fails to reset hardware properly after kvm guest reboot
[PATCH] KVM: Introduce dynamically registered hypercall capability
2014-11-29 1:29 UTC (4+ messages)
How does qemu know the virtual memory of the guest os?
2014-11-29 0:17 UTC
[PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT
2014-11-28 21:51 UTC (7+ messages)
` [Xen-devel] "
[GIT PULL 00/11] KVM: s390: Several changes for 3.19 (kvm/next)
2014-11-28 17:20 UTC (16+ messages)
` [GIT PULL 01/11] KVM: s390: Small fixes for the PFMF handler
` [GIT PULL 02/11] KVM: s390: Fix rewinding of the PSW pointing to an EXECUTE instruction
` [GIT PULL 03/11] KVM: s390: trigger the right CPU exit for floating interrupts
` [GIT PULL 04/11] KVM: S390: Create helper function get_guest_storage_key
` [GIT PULL 05/11] KVM: s390: refactor interrupt injection code
` [GIT PULL 06/11] KVM: s390: external param not valid for cpu timer and ckc
` [GIT PULL 07/11] KVM: s390: add defines for virtio and pfault interrupt code
` [GIT PULL 08/11] KVM: s390: refactor interrupt delivery code
` [GIT PULL 09/11] KVM: s390: add bitmap for handling cpu-local interrupts
` [GIT PULL 10/11] KVM: s390: handle pending local interrupts via bitmap
` [GIT PULL 11/11] KVM: s390: allow injecting all kinds of machine checks
[PATCH RFC 0/2] assign each vcpu an owning thread and improve yielding
2014-11-28 11:40 UTC (8+ messages)
` [PATCH RFC 1/2] KVM: don't check for PF_VCPU when yielding
[PATCH] xsave: export get_xsave_addr
2014-11-28 10:29 UTC (2+ messages)
[PATCH RFC v4 00/16] qemu: towards virtio-1 host support
2014-11-28 9:50 UTC (30+ messages)
` [PATCH RFC v4 01/16] linux-headers/virtio_config: Update with VIRTIO_F_VERSION_1
` [PATCH RFC v4 02/16] virtio: cull virtio_bus_set_vdev_features
` [PATCH RFC v4 03/16] virtio: support more feature bits
` [PATCH RFC v4 04/16] s390x/virtio-ccw: fix check for WRITE_FEAT
` [PATCH RFC v4 05/16] virtio: introduce legacy virtio devices
` [PATCH RFC v4 06/16] virtio: allow virtio-1 queue layout
` [PATCH RFC v4 07/16] dataplane: allow virtio-1 devices
` [PATCH RFC v4 08/16] s390x/css: Add a callback for when subchannel gets disabled
` [PATCH RFC v4 09/16] s390x/virtio-ccw: add virtio set-revision call
` [PATCH RFC v4 10/16] s390x/virtio-ccw: support virtio-1 set_vq format
` [PATCH RFC v4 11/16] virtio: disallow late feature changes for virtio-1
` [PATCH RFC v4 12/16] virtio: allow to fail setting status
` [PATCH RFC v4 13/16] s390x/virtio-ccw: enable virtio 1.0
` [PATCH RFC v4 14/16] virtio-net: no writeable mac for virtio-1
` [PATCH RFC v4 15/16] virtio-net: support longer header
` [PATCH RFC v4 16/16] virtio-net: enable virtio 1.0
[question] lots of interrupts injected to vm when pressing some key w/o releasing
2014-11-28 9:44 UTC (11+ messages)
` [question] lots of interrupts injected to vm when pressing somekey "
[PATCH v6 28/46] vhost: make features 64 bit
2014-11-28 8:38 UTC (13+ messages)
` [PATCH v6 29/46] vhost: add memory access wrappers
` [PATCH v6 30/46] vhost/net: force len for TX to host endian
` [PATCH v6 31/46] vhost: virtio 1.0 endian-ness support
` [PATCH v6 32/46] vhost/net: virtio 1.0 byte swap
` [PATCH v6 33/46] vhost/net: larger header for virtio 1.0
` [PATCH v6 35/46] vhost/net: enable "
` [PATCH v6 36/46] vhost/net: suppress compiler warning
` [PATCH v6 45/46] vhost/scsi: partial virtio 1.0 support
[PATCH 0/5] Improve PSCI system events and fix reboot bugs
2014-11-27 23:10 UTC (9+ messages)
` [PATCH 1/5] arm/arm64: KVM: Correct KVM_ARM_VCPU_INIT power off option
` [PATCH 2/5] arm/arm64: KVM: Reset the HCR on each vcpu when resetting the vcpu
` [PATCH 3/5] arm/arm64: KVM: Clarify KVM_ARM_VCPU_INIT ABI
` [PATCH 4/5] arm/arm64: KVM: Introduce stage2_unmap_vm
` [PATCH 5/5] arm/arm64: KVM: Turn off vcpus and flush stage-2 pgtables on sytem exit events
[PATCH 0/4] KVM: x86: APIC fixes
2014-11-27 22:30 UTC (10+ messages)
` [PATCH 1/4] KVM: x86: deliver phys lowest-prio
` [PATCH 2/4] KVM: x86: fix APIC physical destination wrapping
` [PATCH 3/4] KVM: x86: allow 256 logical x2APICs again
` [PATCH 4/4] KVM: x86: don't retry hopeless APIC delivery
` [PATCH 5/4] KVM: x86: check bounds of APIC maps
[PATCH 00/21] Fixes for various KVM bugs
2014-11-27 22:26 UTC (12+ messages)
` [PATCH 14/21] KVM: x86: Software disabled APIC should still deliver NMIs
[PATCH v10 01/20] vfio/platform: initial skeleton of VFIO support for platform devices
2014-11-27 17:33 UTC (20+ messages)
` [PATCH v10 02/20] vfio: platform: probe to devices on the platform bus
` [PATCH v10 03/20] vfio: platform: add the VFIO PLATFORM module to Kconfig
` [PATCH v10 04/20] vfio: amba: VFIO support for AMBA devices
` [PATCH v10 05/20] vfio: amba: add the VFIO for AMBA devices module to Kconfig
` [PATCH v10 06/20] vfio/platform: return info for bound device
` [PATCH v10 07/20] vfio/platform: return info for device memory mapped IO regions
` [PATCH v10 08/20] vfio/platform: read and write support for the device fd
` [PATCH v10 09/20] vfio/platform: support MMAP of MMIO regions
` [PATCH v10 10/20] vfio/platform: return IRQ info
` [PATCH v10 11/20] vfio/platform: initial interrupts support code
` [PATCH v10 12/20] vfio/platform: trigger an interrupt via eventfd
` [PATCH v10 13/20] vfio/platform: support for level sensitive interrupts
` [PATCH v10 14/20] vfio: add a vfio_ prefix to virqfd_enable and virqfd_disable and export
` [PATCH v10 15/20] vfio: virqfd: rename vfio_pci_virqfd_init and vfio_pci_virqfd_exit
` [PATCH v10 16/20] vfio: add local lock for virqfd instead of depending on VFIO PCI
` [PATCH v10 17/20] vfio: pass an opaque pointer on virqfd initialization
` [PATCH v10 18/20] vfio: move eventfd support code for VFIO_PCI to a separate file
` [PATCH v10 19/20] vfio: initialize the virqfd workqueue in VFIO generic code
` [PATCH v10 20/20] vfio/platform: implement IRQ masking/unmasking via an eventfd
[PATCH v3 1/6] vfio: implement iommu driver capabilities with an enum
2014-11-27 17:22 UTC (6+ messages)
` [PATCH v3 2/6] vfio: type1: support for ARM SMMUs
` [PATCH v3 3/6] vfio: introduce the VFIO_DMA_MAP_FLAG_NOEXEC flag
` [PATCH v3 4/6] vfio: type1: replace domain wide protection flags with supported capabilities
` [PATCH v3 5/6] vfio: type1: replace vfio_domains_have_iommu_cache with generic function
` [PATCH v3 6/6] vfio: type1: implement the VFIO_DMA_MAP_FLAG_NOEXEC flag
[PATCH] KVM: x86: Fix reserved x2apic registers
2014-11-27 17:08 UTC (3+ messages)
` [PATCH v2] "
[PATCH] KVM: x86: use MSR_ICR instead of a number
2014-11-27 17:07 UTC (2+ messages)
[PATCH] KVM: x86: Generate #UD when memory operand is required
2014-11-27 14:58 UTC (2+ messages)
[PATCH v5 27/45] vhost: make features 64 bit
2014-11-27 12:33 UTC (9+ messages)
` [PATCH v5 28/45] vhost: add memory access wrappers
` [PATCH v5 29/45] vhost/net: force len for TX to host endian
` [PATCH v5 30/45] vhost: virtio 1.0 endian-ness support
` [PATCH v5 31/45] vhost/net: virtio 1.0 byte swap
` [PATCH v5 32/45] vhost/net: larger header for virtio 1.0
` [PATCH v5 34/45] vhost/net: enable "
` [PATCH v5 35/45] vhost/net: suppress compiler warning
` [PATCH v5 44/45] vhost/scsi: partial virtio 1.0 support
Allocating dedicated RAM to host that guest can not use
2014-11-27 12:16 UTC (4+ messages)
[RFC PATCH 0/6] ARM64: KVM: PMU infrastructure support
2014-11-27 11:06 UTC (15+ messages)
[RFC PATCH] KVM: Introduce dynamically registered hypercall capability
2014-11-27 10:37 UTC
[PATCH RFC v3 00/12] qemu: towards virtio-1 host support
2014-11-27 10:34 UTC (18+ messages)
` [PATCH RFC v3 01/12] linux-headers/virtio_config: Update with VIRTIO_F_VERSION_1
` [PATCH RFC v3 02/12] virtio: cull virtio_bus_set_vdev_features
` [PATCH RFC v3 03/12] virtio: support more feature bits
` [PATCH RFC v3 04/12] s390x/virtio-ccw: fix check for WRITE_FEAT
` [PATCH RFC v3 05/12] virtio: introduce legacy virtio devices
` [Qemu-devel] "
` [PATCH RFC v3 06/12] virtio: allow virtio-1 queue layout
` [PATCH RFC v3 07/12] dataplane: allow virtio-1 devices
` [PATCH RFC v3 08/12] s390x/css: Add a callback for when subchannel gets disabled
` [PATCH RFC v3 09/12] s390x/virtio-ccw: add virtio set-revision call
` [PATCH RFC v3 10/12] s390x/virtio-ccw: support virtio-1 set_vq format
` [PATCH RFC v3 11/12] virtio-net/virtio-blk: enable virtio 1.0
` [PATCH RFC v3 12/12] s390x/virtio-ccw: "
[PATCH net-next] vhost: remove unnecessary forward declarations in vhost.h
2014-11-27 6:41 UTC
[question] what is virtio-1 device?
2014-11-27 2:11 UTC (5+ messages)
[PATCH 1/3] KVM: PPC: BOOK3S: HV: Add helpers for lock/unlock hpte
2014-11-27 0:45 UTC (3+ messages)
` [PATCH 3/3] KVM: PPC: BOOK3S: HV: Rename variable for better readability
[PATCH kvm-unit-tests] x86: Test illegal movbe
2014-11-26 21:42 UTC (2+ messages)
` [PATCH kvm-unit-tests v2] "
[PATCH 0/7] KVM Guest Debug support for arm64
2014-11-26 19:27 UTC (21+ messages)
` [PATCH 2/7] KVM: arm: guest debug, define API headers
` [PATCH 3/7] KVM: arm: guest debug, add stub KVM_SET_GUEST_DEBUG ioctl
` [PATCH 4/7] KVM: arm64: guest debug, add SW break point support
` [PATCH 5/7] KVM: arm64: guest debug, add support for single-step
` [PATCH 6/7] KVM: arm64: re-factor hyp.S debug register code
` [PATCH 7/7] KVM: arm64: guest debug, HW assisted debug support
[CFT PATCH v2 0/2] KVM: support XSAVES usage in the host
2014-11-26 17:31 UTC (9+ messages)
` [CFT PATCH v2 2/2] KVM: x86: "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).