messages from 2018-04-16 11:08:06 to 2018-04-20 12:15:47 UTC [more...]
[PATCH] KVM: s390: reset crypto attributes for all vcpus
2018-04-20 12:15 UTC (4+ messages)
[PATCH 0/4] vfio: ccw: error handling fixes and improvements
2018-04-20 11:55 UTC (8+ messages)
` [PATCH 1/4] vfio: ccw: fix cleanup if cp_prefetch fails
[PATCH] vfio iommu type1: no need to check task->mm if task has been destroyed
2018-04-20 11:52 UTC (4+ messages)
[PATCH] VFIO: Fix Documentation
2018-04-20 10:07 UTC
[GVT-g] [ANNOUNCE] 2018-Q1 release of KVMGT (Intel GVT-g for KVM)
2018-04-20 9:27 UTC
[PULL 0/1] vfio-ccw: bug fix
2018-04-20 8:24 UTC (2+ messages)
` [PULL 1/1] vfio: ccw: process ssch with interrupts disabled
[PATCH v2] KVM: Extend MAX_IRQ_ROUTES to 4096 for all archs
2018-04-20 7:15 UTC (2+ messages)
[RFC] vhost: introduce mdev based hardware vhost backend
2018-04-20 3:52 UTC (9+ messages)
[PATCH] KVM: X86: Extend MAX_IRQ_ROUTES to 4096
2018-04-20 0:55 UTC (4+ messages)
[pci PATCH v7 0/5] Add support for unmanaged SR-IOV
2018-04-20 0:46 UTC (11+ messages)
` [pci PATCH v7 2/5] virtio_pci: Add support for unmanaged SR-IOV on virtio_pci devices
` [virtio-dev] "
[PATCH RESEND v2] i386/kvm: add support for KVM_CAP_X86_DISABLE_EXITS
2018-04-19 21:53 UTC (10+ messages)
[PATCH] vfio-ccw: process ssch with interrupts disabled
2018-04-19 15:22 UTC (5+ messages)
[libvirt] [PATCH 0/3] sample: vfio mdev display devices
2018-04-19 14:54 UTC (5+ messages)
[PATCH 00/10] vfio: ccw: Refactoring the VFIO CCW state machine
2018-04-19 14:48 UTC (11+ messages)
` [PATCH 01/10] vfio: ccw: Moving state change out of IRQ context
` [PATCH 02/10] vfio: ccw: Transform FSM functions to return state
` [PATCH 03/10] vfio: ccw: new SCH_EVENT event
` [PATCH 04/10] vfio: ccw: replace IO_REQ event with SSCH_REQ event
` [PATCH 05/10] vfio: ccw: Suppress unused event parameter
` [PATCH 06/10] vfio: ccw: Make FSM functions atomic
` [PATCH 07/10] vfio: ccw: Introduce the INIT event
` [PATCH 08/10] vfio: ccw: Handling reset and shutdown with states
` [PATCH 09/10] vfio: ccw: Suppressing the BOXED state
` [PATCH 10/10] vfio: ccw: Let user wait when busy on IO
[PATCH v4 00/15] s390: vfio-ap: guest dedicated crypto adapters
2018-04-19 14:28 UTC (58+ messages)
` [PATCH v4 01/15] s390: zcrypt: externalize AP instructions available function
` [PATCH v4 02/15] KVM: s390: reset crypto attributes for all vcpus
` [PATCH v4 03/15] KVM: s390: refactor crypto initialization
` [PATCH v4 05/15] KVM: s390: enable/disable AP interpretive execution
` [PATCH v4 13/15] KVM: s390: configure the guest's AP devices
` [PATCH v4 15/15] s390: doc: detailed specifications for AP virtualization
[PATCH] kvm: Change return type to vm_fault_t
2018-04-19 13:56 UTC (2+ messages)
[PATCH v11 0/4] set VSESR_EL2 by user space and support NOTIFY_SEI notification
2018-04-19 4:09 UTC (5+ messages)
[PATCH 0/4] move kvm_para.h to standard-headers
2018-04-18 17:42 UTC (14+ messages)
` [PATCH 1/4] update-linux-headers.sh: drop kvm_para.h hacks
` [PATCH 2/4] include/standard-headers: add asm-x86/kvm_para.h
` [PATCH 3/4] x86/cpu: use standard-headers/asm-x86.kvm_para.h
` [PATCH 4/4] linux-headers: drop kvm_para.h
[PATCH] KVM: selftests: exit with 0 status code when tests cannot be run
2018-04-18 17:16 UTC
[PATCH v6 0/7] vfio/type1: Add support for valid iova list management
2018-04-18 11:40 UTC (8+ messages)
` [PATCH v6 5/7] vfio/type1: check dma map request is within a valid iova range
` [PATCH v6 1/7] vfio/type1: Introduce iova list and add iommu aperture validity check
` [PATCH v6 2/7] vfio/type1: Check reserve region conflict and update iova list
` [PATCH v6 3/7] vfio/type1: Update iova list on detach
` [PATCH v6 4/7] iommu/dma: Move PCI window region reservation back into dma specific path
` [PATCH v6 6/7] vfio/type1: Add IOVA range capability support
` [PATCH v6 7/7] vfio/type1: remove duplicate retrieval of reserved regions
[PATCH] KVM: X86: Allow userspace to define the microcode version
2018-04-18 10:36 UTC (17+ messages)
[PATCH v7 0/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
2018-04-18 8:11 UTC (14+ messages)
` [PATCH v7 1/7] xen/pvh: Split CONFIG_XEN_PVH into CONFIG_PVH and CONFIG_XEN_PVH
` [PATCH v7 2/7] xen/pvh: Move PVH entry code out of Xen specific tree
` [PATCH v7 3/7] xen/pvh: Create a new file for Xen specific PVH code
` [PATCH v7 4/7] xen/pvh: Move Xen specific PVH VM initialization out of common file
` [PATCH v7 5/7] xen/pvh: Move Xen code for getting mem map via hcall "
` [PATCH v7 6/7] xen/pvh: Add memory map pointer to hvm_start_info struct
` [PATCH v7 7/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
[PATCH 13/24] x86/speculation: Use IBRS if available before calling into firmware
2018-04-18 3:18 UTC (9+ messages)
` [PATCH 14/24] x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP
` [PATCH 18/24] KVM/x86: Add IBPB support
` [PATCH 19/24] KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
` [PATCH 20/24] KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
` [PATCH 21/24] KVM/SVM: "
` [PATCH 22/24] KVM/x86: Remove indirect MSR op calls from SPEC_CTRL
` [PATCH 23/24] KVM/VMX: Optimize vmx_vcpu_run() and svm_vcpu_run() by marking the RDMSR path as unlikely()
` [PATCH 24/24] x86/spectre_v2: Don't check microcode versions when running under hypervisors
[PATCH] KVM: arm/arm64: VGIC: Kick new VCPU on interrupt migration
2018-04-17 11:32 UTC (2+ messages)
[PATCH] arm64: KVM: Demote SVE and LORegion warnings to debug only
2018-04-17 11:25 UTC (2+ messages)
[PATCH v3 0/2] KVM: MSR-based features
2018-04-17 9:47 UTC (2+ messages)
[PATCH v2] i386/kvm: add support for KVM_CAP_X86_DISABLE_EXITS
2018-04-17 8:21 UTC (3+ messages)
[PATCH 0/3] KVM: VMX: Allow to disable ioport intercept per-VM by userspace
2018-04-17 5:46 UTC (4+ messages)
` [PATCH 1/3] KVM: VMX: Introduce per-VM I/O permission bitmaps
` [PATCH 2/3] KVM: X86: Allow userspace to disable ioport intercept
` [PATCH 3/3] KVM: VMX: Allow I/O port 0x80 bypass when userspace prefer
[PATCH] x86/headers/UAPI: Move DISABLE_EXITS KVM capability bits to the UAPI
2018-04-17 4:43 UTC
[PATCH 13/24] x86/speculation: Use IBRS if available before calling into firmware
2018-04-17 4:27 UTC (9+ messages)
` [PATCH 14/24] x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP
` [PATCH 18/24] KVM/x86: Add IBPB support
` [PATCH 19/24] KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
` [PATCH 20/24] KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
` [PATCH 21/24] KVM/SVM: "
` [PATCH 22/24] KVM/x86: Remove indirect MSR op calls from SPEC_CTRL
` [PATCH 23/24] KVM/VMX: Optimize vmx_vcpu_run() and svm_vcpu_run() by marking the RDMSR path as unlikely()
` [PATCH 24/24] x86/spectre_v2: Don't check microcode versions when running under hypervisors
[PATCH 14/23] x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP
2018-04-16 18:33 UTC (4+ messages)
` [PATCH 22/23] KVM/x86: Remove indirect MSR op calls from SPEC_CTRL
` [PATCH 23/23] KVM/VMX: Optimize vmx_vcpu_run() and svm_vcpu_run() by marking the RDMSR path as unlikely()
` [PATCH 24/24] x86/spectre_v2: Don't check microcode versions when running under hypervisors
[PATCH 1/2] X86/KVM: Properly restore 'tsc_offset' when running an L2 guest
2018-04-16 17:15 UTC (4+ messages)
` [PATCH 2/2] kvm: nVMX: Introduce KVM_CAP_STATE
[PATCH] KVM: Switch 'requests' to be 64-bit (explicitly)
2018-04-16 16:28 UTC (4+ messages)
[GIT PULL] KVM fixes for 4.17-rc2
2018-04-16 16:12 UTC
[PATCH v4] X86/KVM: Properly update 'tsc_offset' to represent the running guest
2018-04-16 15:45 UTC (3+ messages)
Xen inside KVM on AMD: Linux HVM/PVH crashes on AP bring up
2018-04-16 15:14 UTC
[PATCH v2 00/12] KVM/X86: Introduce a new guest mapping interface
2018-04-16 12:27 UTC (6+ messages)
` [PATCH v2 03/12] X86/nVMX: Update the PML table without mapping and unmapping the page
[PATCH v3 0/6] KVM: x86: hyperv: PV TLB flush for Windows guests
2018-04-16 11:08 UTC (2+ messages)
` [PATCH v3 6/6] KVM: x86: hyperv: declare KVM_CAP_HYPERV_TLBFLUSH capability
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox