messages from 2017-06-09 11:49:48 to 2017-06-15 05:48:45 UTC [more...]
[PATCH kernel 0/3 REPOST] vfio-pci: Add support for mmapping MSI-X table
2017-06-15 5:48 UTC (4+ messages)
` [PATCH kernel 1/3] PCI: Add a new PCI_BUS_FLAGS_MSI_REMAP flag
` [PATCH kernel 2/3] pci-ioda: Set PCI_BUS_FLAGS_MSI_REMAP for IODA host bridge
` [PATCH kernel 3/3] vfio-pci: Allow to expose MSI-X table to userspace if interrupt remapping is enabled
[PATCH kernel 0/3] vfio-pci: Add support for mmapping MSI-X table
2017-06-15 5:44 UTC (5+ messages)
` [PATCH kernel 1/3] PCI: Add a new PCI_BUS_FLAGS_MSI_REMAP flag
` [PATCH kernel 2/3] pci-ioda: Set PCI_BUS_FLAGS_MSI_REMAP for IODA host bridge
` [PATCH kernel 3/3] vfio-pci: Allow to expose MSI-X table to userspace if interrupt remapping is enabled
[PATCH 0/4] KVM: async_pf: Fix async_pf exception injection
2017-06-15 2:43 UTC (17+ messages)
` [PATCH 1/4] KVM: x86: Simple kvm_x86_ops->queue_exception parameter
` [PATCH 2/4] KVM: async_pf: Add L1 guest async_pf #PF vmexit handler
` [PATCH 3/4] KVM: async_pf: Force a nested vmexit if the injected #PF is async_pf
` [PATCH 4/4] KVM: async_pf: Let host know whether the guest support delivery async_pf as #PF vmexit
[PATCH v2 0/4] KVM: async_pf: Fix async_pf exception injection
2017-06-15 2:26 UTC (5+ messages)
` [PATCH v2 1/4] KVM: x86: Simple kvm_x86_ops->queue_exception parameter
` [PATCH v2 2/4] KVM: async_pf: Add L1 guest async_pf #PF vmexit handler
` [PATCH v2 3/4] KVM: async_pf: Force a nested vmexit if the injected #PF is async_pf
` [PATCH v2 4/4] KVM: async_pf: Let host know whether the guest support delivery async_pf as #PF vmexit
[PATCH v6 00/34] x86: Secure Memory Encryption (AMD)
2017-06-14 20:40 UTC (48+ messages)
` [PATCH v6 05/34] x86/CPU/AMD: Handle SME reduction in physical address size
` [PATCH v6 06/34] x86/mm: Add Secure Memory Encryption (SME) support
` [PATCH v6 09/34] x86/mm: Simplify p[gum]d_page() macros
` [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
` [Xen-devel] "
` [PATCH v6 13/34] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v6 14/34] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v6 18/34] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v6 20/34] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v6 22/34] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v6 23/34] x86, realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v6 24/34] x86, swiotlb: Add memory encryption support
` [PATCH v6 25/34] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
[PATCH kvm-unit-tests v3 0/9] Extend and apply the errata framework
2017-06-14 18:58 UTC (14+ messages)
` [PATCH kvm-unit-tests v3 1/9] arch-run: introduce initrd_create
` [PATCH kvm-unit-tests v3 2/9] arch-run: provide errata from run env
` [PATCH kvm-unit-tests v3 3/9] x86/run: source config.mak
` [PATCH kvm-unit-tests v3 4/9] arch-run: generate errata when no environ is provided
` [PATCH kvm-unit-tests v3 5/9] mkstandalone: provide errata to tests
` [PATCH kvm-unit-tests v3 6/9] errata: add ERRATA_FORCE
` [PATCH kvm-unit-tests v3 7/9] README: add section on guarding unsafe tests
` [PATCH kvm-unit-tests v3 8/9] AArch32: apply errata framework to unsafe pmccntr64 test
` [PATCH kvm-unit-tests v3 9/9] arm/arm64: apply errata framework to unsafe cpu-on test
[PATCH kvm-unit-tests v2 0/8] x86: introduce and apply on_cpus
2017-06-14 18:58 UTC (10+ messages)
` [PATCH kvm-unit-tests v2 1/8] arm/arm64: smp: give on_cpus an argument
` [PATCH kvm-unit-tests v2 2/8] x86/unittests.cfg: create hyperv group
` [PATCH kvm-unit-tests v2 3/8] lib/x86/smp: introduce on_cpus and cpus_active
` [PATCH kvm-unit-tests v2 4/8] x86/hyperv_clock: apply on_cpus
` [PATCH kvm-unit-tests v2 5/8] x86/hyperv_stimer: "
` [PATCH kvm-unit-tests v2 6/8] x86/hyperv_synic: "
` [PATCH kvm-unit-tests v2 7/8] x86/kvmclock_test: "
` [PATCH kvm-unit-tests v2 8/8] x86/vmexit: "
[PATCH kvm-unit-tests 0/5] add test for hyperv connections
2017-06-14 18:58 UTC (10+ messages)
` [PATCH kvm-unit-tests 5/5] add hyperv_connections test
[kvm-unit-tests PATCH v4] s390x: Interception tests
2017-06-14 18:52 UTC (2+ messages)
[PATCH kvm-unit-tests] x86: clean up GDTs
2017-06-14 18:52 UTC (2+ messages)
[RFC PATCH 00/10] Basic KVM SGX Virtualization support
2017-06-14 17:03 UTC (29+ messages)
` [PATCH 08/10] kvm: vmx: add guest's IA32_SGXLEPUBKEYHASHn runtime switch support
` [intel-sgx-kernel-dev] "
[PATCH v6 23/34] x86, realmode: Decrypt trampoline area if memory encryption is active
2017-06-14 16:39 UTC
[PATCH 0/7] vfio: Fix release ordering races and use driver_override
2017-06-14 13:17 UTC (19+ messages)
` [PATCH 1/7] vfio: Fix group release deadlock
` [PATCH 2/7] kvm-vfio: Decouple only when we match a group
` [PATCH 3/7] vfio: New external user group/file match
` [PATCH 4/7] iommu: Add driver-not-bound notification
` [PATCH 5/7] vfio: Create interface for vfio bus drivers to register
` [PATCH 6/7] vfio: Register pci, platform, amba, and mdev bus drivers
` [PATCH 7/7] vfio: Use driver_override to avert binding to compromising drivers
[PATCH 00/10] ARM/ARM64 Direct EOI setup for VFIO wired interrupts
2017-06-14 8:41 UTC (5+ messages)
` [PATCH 05/10] VFIO: pci: Introduce direct EOI INTx interrupt handler
[Bug 196067] New: Kernel WARNING: CPU: 14 PID: 2920 at arch/x86/kvm/svm.c:1484 avic_vcpu_load+0x16b/0x180 [kvm_amd]
2017-06-14 3:30 UTC
[PATCH v11 0/6] Virtio-balloon Enhancement
2017-06-13 18:55 UTC (15+ messages)
` [PATCH v11 3/6] virtio-balloon: VIRTIO_BALLOON_F_PAGE_CHUNKS
` [PATCH v11 4/6] mm: function to offer a page block on the free list
` [PATCH v11 6/6] virtio-balloon: VIRTIO_BALLOON_F_CMD_VQ
[PATCH] vfio: Use ERR_CAST() instead of open coding it
2017-06-13 15:30 UTC (2+ messages)
[PATCH RFC] KVM: X86: save and load PVCLOCK_TSC_UNSTABLE_BIT when migration
2017-06-13 13:52 UTC (4+ messages)
[PATCH RFC] migration: kvmclock: save and load the PVCLOCK_TSC_UNSTABLE_BIT flag when migration
2017-06-13 13:41 UTC (3+ messages)
[PATCH kvm-unit-tests v2 0/9] Extend and apply the errata framework
2017-06-13 10:01 UTC (9+ messages)
` [PATCH kvm-unit-tests v2 1/9] arch-run: introduce initrd_create
` [PATCH kvm-unit-tests v2 4/9] arch-run: generate errata when no environ is provided
[PATCH] include/linux/vfio.h: Guard powerpc-specific functions with CONFIG_VFIO_SPAPR_EEH
2017-06-13 8:36 UTC (4+ messages)
` [kbuild-all] "
[PATCH kvm-unit-tests 0/7] x86: introduce and apply on_cpus
2017-06-13 8:14 UTC (4+ messages)
` [PATCH kvm-unit-tests 2/7] lib/x86/smp: introduce on_cpus
[PATCH 4.11 127/150] srcu: Allow use of Classic SRCU from both process and interrupt context
2017-06-12 15:25 UTC
[Bug 195315] New: Kernel WARNING: At arch/x86/kvm/lapic.c:1468 kvm_lapic_expired_hv_timer+0xee/0x110
2017-06-12 15:23 UTC (3+ messages)
` [Bug 195315] "
I Would love to discuse something with you
2017-06-12 14:51 UTC
[PATCH v2] KVM: ARM64: fix phy counter access failure in guest
2017-06-12 14:37 UTC (4+ messages)
Speeding up VMX with GDT fixmap trickery?
2017-06-12 14:14 UTC (4+ messages)
[GIT PULL] KVM changes for 4.12-rc5
2017-06-11 18:08 UTC (2+ messages)
[kvm:master 5/5] arch/x86//kvm/mmu.c:3725:2: note: in expansion of macro 'if'
2017-06-11 7:26 UTC (4+ messages)
[PATCH v6] KVM: x86: avoid large stack allocations in em_fxrstor
2017-06-11 7:02 UTC (3+ messages)
[kvm:master 5/5] arch/x86/kvm/mmu.c:3725:19: error: implicit declaration of function 'can_do_async_pf'
2017-06-09 17:29 UTC
[PATCH] vfio: Test realized when using VFIOGroup.device_list iterator
2017-06-09 17:30 UTC
[PATCH] KVM: ARM64: fix phy counter access failure in guest
2017-06-09 16:22 UTC
[PATCH v3 00/27] arm64: KVM: Mediate access to GICv3 sysregs at EL2
2017-06-09 15:34 UTC (28+ messages)
` [PATCH v3 01/27] arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
` [PATCH v3 03/27] KVM: arm64: Make kvm_condition_valid32() accessible from EL2
` [PATCH v3 04/27] KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
` [PATCH v3 05/27] KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
` [PATCH v3 07/27] KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
` [PATCH v3 08/27] KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
` [PATCH v3 10/27] KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
` [PATCH v3 12/27] KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
` [PATCH v3 13/27] KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
` [PATCH v3 19/27] arm64: Add workaround for Cavium Thunder erratum 30115
` [PATCH v3 20/27] KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler
` [PATCH v3 21/27] KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler
` [PATCH v3 22/27] KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler
` [PATCH v3 23/27] KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler
` [PATCH v3 24/27] KVM: arm64: Enable GICv3 common sysreg trapping via command-line
` [PATCH v3 25/27] KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
` [PATCH v3 26/27] KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
` [PATCH v3 27/27] KVM: arm64: Log an error if trapping a write-to-read-only "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).