messages from 2017-11-22 07:28:09 to 2017-11-26 18:58:52 UTC [more...]
[PATCH 00/37] Optimize KVM/ARM for VHE systems
2017-11-26 18:58 UTC (35+ messages)
` [PATCH 01/37] KVM: arm64: Avoid storing the vcpu pointer on the stack
` [PATCH 04/37] KVM: arm/arm64: Get rid of vcpu->arch.irq_lines
` [PATCH 05/37] KVM: Record the executing ioctl number on the vcpu struct
` [PATCH 07/37] KVM: arm/arm64: Add kvm_vcpu_load_sysregs and kvm_vcpu_put_sysregs
` [PATCH 08/37] KVM: arm64: Defer restoring host VFP state to vcpu_put
` [PATCH 09/37] KVM: arm64: Move debug dirty flag calculation out of world switch
` [PATCH 28/37] KVM: arm64: Move common VHE/non-VHE trap config in separate functions
` [PATCH 32/37] KVM: arm/arm64: Handle VGICv2 save/restore from the main VGIC code
` [PATCH 35/37] KVM: arm/arm64: Get rid of vgic_elrsr
` [PATCH 36/37] KVM: arm/arm64: Move VGIC APR save/restore to vgic put/load
[PATCH 1/2] KVM: x86: Store the microcode version in struct kvm_arch
2017-11-26 16:41 UTC (2+ messages)
` [PATCH 2/2] KVM: x86: Allow userspace to define what's the microcode version
[PATCH v2 01/11] powerpc/kvm/xive: Add more debugfs queues info
2017-11-25 5:17 UTC (15+ messages)
` [PATCH v2 02/11] powerpc/kvm/xive: Enable use of the new "single escalation" feature
` [PATCH v2 03/11] powerpc/kvm/xive: Don't use existing "prodded" flag for xive escalations
` [PATCH v2 04/11] powerpc/kvm/xive: Check DR not IR to chose real vs virt mode MMIOs
` [PATCH v2 05/11] powerpc/kvm/xive: Make xive_pushed a byte, not a word
` [PATCH v2 06/11] powerpc/xive: Move definition of ESB bits
` [PATCH v2 07/11] powerpc/xive: Add interrupt flag to disable automatic EOI
` [PATCH v2 08/11] powerpc/kvm/xive: Keep escalation interrupt masked unless ceded
` [PATCH v2 09/11] powerpc/kvm: Make "no_xive:" label local
` [PATCH v2 10/11] powerpc/kvm: Store the MMU mode in the PACA on KVM exit
` [PATCH v2 11/11] powerpc/kvm: Use the PACA virt/real mode info instead of mfmsr
2f47e7e19f ("x86/mm/kaiser: Use PCID feature to make user and .."): WARNING: CPU: 0 PID: 1 at mm/early_ioremap.c:114 __early_ioremap
2017-11-26 11:49 UTC
[PATCH 00/15] Move vcpu_load and vcpu_put calls to arch code
2017-11-26 9:11 UTC (18+ messages)
` [PATCH 01/15] KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code
` [PATCH 02/15] KVM: Factor out vcpu->pid adjustment for KVM_RUN
` [PATCH 03/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run
` [PATCH 04/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs
` [PATCH 05/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs
` [PATCH 06/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_sregs
` [PATCH 07/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs
` [PATCH 08/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate
` [PATCH 09/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate
` [PATCH 10/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate
` [PATCH 11/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug
` [PATCH 12/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu
` [PATCH 13/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu
` [PATCH 14/15] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl
` [PATCH 15/15] KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN
[PATCH] arm64: KVM: Hide PMU from guests when disabled
2017-11-25 17:40 UTC
06222d856e ("x86/mm/kaiser: Use PCID feature to make user and .."): WARNING: CPU: 0 PID: 1 at mm/early_ioremap.c:114 __early_ioremap
2017-11-25 13:34 UTC (2+ messages)
` 06222d856e ("x86/mm/kaiser: Use PCID feature to make user and kernel switches faster"): BUG: kernel hang in boot stage
[PATCH 0/3] KVM: Tie MWAIT/HLT/PAUSE interception to initially disabled capabilities
2017-11-25 13:09 UTC (4+ messages)
` [PATCH 1/3] KVM: Don't enable MWAIT in guest by default
` [PATCH 2/3] KVM: Add capability to not exit on HLT
` [PATCH 3/3] KVM: Add capability to not exit on PAUSE
[PATCH v2] KVM: X86: Fix softlockup when get the current kvmclock timestamp
2017-11-25 3:14 UTC (2+ messages)
[GIT PULL] Please pull paulus/powerpc kvm-ppc-fixes-4.15-1 tag
2017-11-24 23:21 UTC
[PATCH] KVM: Let KVM_SET_SIGNAL_MASK work as advertised
2017-11-24 21:39 UTC
[PATCH v1 0/2] tools/kvm_stat: misc fixes
2017-11-24 20:32 UTC (3+ messages)
` [PATCH v1 1/2] tools/kvm_stat: fix command line option '-g'
` [PATCH v1 2/2] tools/kvm_stat: fix drilldown in events by guests mode
Shutting down a VM with Kernel 4.14 will sometime hang and a reboot is the only way to recover. [1]
2017-11-24 16:22 UTC (7+ messages)
` Shutting down a VM with Kernel 4.14 will sometime hang and a reboot is the only way to recover
[GIT PULL] Trimmed second batch of KVM changes for Linux 4.15
2017-11-24 16:00 UTC
[PATCH v3] KVM: s390: mark irq_state.flags as non-usable
2017-11-24 15:11 UTC (2+ messages)
Windows 10 guest hang during 'info mem'
2017-11-24 14:50 UTC (3+ messages)
` [Qemu-devel] "
KVM "fake DAX" flushing interface - discussion
2017-11-24 13:20 UTC (23+ messages)
` [Qemu-devel] "
[PATCH RESEND v12 00/12] Add RAS virtualization support in QEMU
2017-11-24 11:57 UTC (2+ messages)
[x86 RAS question] what is the behavior that guest happen machine check exceptions(MCEs) on page table
2017-11-24 10:23 UTC (5+ messages)
[PATCH] KVM: Expose new cpu features to guest
2017-11-24 10:14 UTC (4+ messages)
[GIT PULL] Second batch of KVM changes for Linux 4.15
2017-11-24 9:36 UTC (3+ messages)
VMs freezing when host is running 4.14
2017-11-24 8:08 UTC (9+ messages)
[x86 RAS question] what is the behavior that guest happen machine check exceptions(MCEs) on page table
2017-11-24 6:13 UTC
[RFC PATCH kernel] vfio-pci: Allow write combining
2017-11-24 4:58 UTC (14+ messages)
Qemu with kvm enabled can boot kernel even if identity page map is not set correctly
2017-11-24 3:13 UTC
[PATCH v2 0/3] KVM: nVMX: Do not expose APICv to L1 if disabled on L0
2017-11-23 23:57 UTC (11+ messages)
` [PATCH v2 1/3] KVM: nVMX: Refresh APICv secondary exec controls by re-calculating all of them
` [PATCH v2 2/3] KVM: nVMX: Update nested MSRs in case APICv refreshing
` [PATCH v2 3/3] KVM: nVMX: Fix nested APICv Secondary CPU Controls when apicv disabled
[PATCH] KVM: nVMX: Eliminate vmcs02 pool
2017-11-23 23:46 UTC (5+ messages)
[RFC PATCH kernel] KVM: PPC: Book3S PR: Fix WIMG handling under pHyp
2017-11-23 23:33 UTC (3+ messages)
[PATCH v2 0/8] KVM: Fix multiple issues in handling pending/injected events
2017-11-23 23:05 UTC (10+ messages)
` [PATCH v2 3/8] KVM: x86: set/get_events ioctl should consider only injected exceptions
` [PATCH v2 4/8] KVM: x86: Warn if userspace overrides existing injected exception/interrupt
[RFC PATCH] KVM: Only register preempt notifiers and load arch cpu state as needed
2017-11-23 18:43 UTC (10+ messages)
[PATCH kvm-unit-tests 0/2] arm/arm64: some fixups
2017-11-23 16:23 UTC (4+ messages)
` [PATCH kvm-unit-tests 2/2] arm/arm64: mmu: add missing TLB flushes
[PATCH v2] KVM: VMX: Fix vmx->nested freeing when no SMI handler
2017-11-23 16:04 UTC (2+ messages)
[BUG/RFC] INIT IPI lost when VM starts
2017-11-23 15:41 UTC (5+ messages)
[PATCH 0/2] Lapic LDR fixup
2017-11-23 15:31 UTC (3+ messages)
` [PATCH 1/2] KVM: lapic: Split out x2apic ldr calculation
[x86 RAS question] what is the behavior that guest happen machine check exceptions(MCEs) on page table
2017-11-23 13:38 UTC (2+ messages)
[PATCH v1 0/2] Additional single-step-cases
2017-11-23 12:39 UTC (5+ messages)
` [PATCH v1 1/2] kvm: arm64: handle single-step during SError exceptions
` [PATCH v1 2/2] kvm: arm64: handle single-step of hyp emulated mmio instructions
Speak at FOSDEM18 Virt & IaaS Devroom!
2017-11-23 10:51 UTC
[RFC PATCH] kvm: arm64: handle single-step of hyp emulated mmio instructions
2017-11-23 10:20 UTC (3+ messages)
[PATCH 0/5] KVM: PPC: Book3S: Miscellaneous minor fixes
2017-11-23 10:15 UTC (9+ messages)
` [PATCH 1/5] KVM: PPC: Book3S HV: Avoid shifts by negative amounts
` [PATCH 2/5] KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix()
` [PATCH 3/5] KVM: PPC: Book3S HV: Remove useless statement
` [PATCH 4/5] KVM: PPC: Book3S HV: Fix conditions for starting vcpu
` [PATCH 5/5] KVM: PPC: Book3S: Eliminate some unnecessary checks
[PATCH] KVM: VMX: Fix vmx->nested freeing when no SMI handler
2017-11-23 9:13 UTC (9+ messages)
passing FDs across domains
2017-11-23 8:17 UTC (13+ messages)
[RFC PATCH] powerpc: add tests for XICS
2017-11-23 4:52 UTC (5+ messages)
` [RFC kvm-unit-tests "
[RFC PATCH kernel] vfio-pci: Fix sparse capability when no parts of MSIX BAR can be mapped
2017-11-23 4:56 UTC
[PATCH kernel] vfio/spapr: Add trace points for map/unmap
2017-11-23 4:13 UTC (5+ messages)
Fwd: vhost-net drops packets at low cpu occupancy
2017-11-22 22:45 UTC
[PATCH v4 kvmtool 00/12] Add vfio-pci support
2017-11-22 18:58 UTC (13+ messages)
` [PATCH v4 kvmtool 01/12] pci: add config operations callbacks on the PCI header
` [PATCH v4 kvmtool 02/12] pci: allow to specify IRQ type for PCI devices
` [PATCH v4 kvmtool 03/12] irq: add irqfd helpers
` [PATCH v4 kvmtool 04/12] Extend memory bank API with memory types
` [PATCH v4 kvmtool 05/12] pci: add capability helpers
` [PATCH v4 kvmtool 06/12] Import VFIO headers
` [PATCH v4 kvmtool 07/12] Add PCI device passthrough using VFIO
` [PATCH v4 kvmtool 08/12] vfio-pci: add MSI-X support
` [PATCH v4 kvmtool 09/12] vfio-pci: add MSI support
` [PATCH v4 kvmtool 10/12] vfio: Support non-mmappable regions
` [PATCH v4 kvmtool 11/12] Introduce reserved memory regions
` [PATCH v4 kvmtool 12/12] vfio: check reserved regions before mapping DMA
[RFC 00/19] KVM: s390/crypto/vfio: guest dedicated crypto adapters
2017-11-22 13:47 UTC (14+ messages)
[PATCH v2 1/1] KVM: s390: mark irq_state.flags as non-usable
2017-11-22 12:25 UTC (2+ messages)
[PATCH v3 0/3] KVM: arm64: single step emulation instructions
2017-11-22 11:46 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).