messages from 2018-05-11 19:06:26 to 2018-05-16 15:21:31 UTC [more...]
[PATCH v4 0/8] KVM: x86: hyperv: PV TLB flush for Windows guests
2018-05-16 15:21 UTC (9+ messages)
` [PATCH v4 1/8] x86/hyper-v: move struct hv_flush_pcpu{,ex} definitions to common header
` [PATCH v4 2/8] x86/hyperv: fix typo in 'HV_GENERIC_SET_SPARCE_4K' definition
` [PATCH v4 3/8] KVM: x86: hyperv: use defines when parsing hypercall parameters
` [PATCH v4 4/8] KVM: x86: hyperv: do rep check for each hypercall separately
` [PATCH v4 5/8] KVM: introduce kvm_make_vcpus_request_mask() API
` [PATCH v4 6/8] KVM: x86: hyperv: simplistic HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} implementation
` [PATCH v4 7/8] KVM: x86: hyperv: simplistic HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE}_EX implementation
` [PATCH v4 8/8] KVM: x86: hyperv: declare KVM_CAP_HYPERV_TLBFLUSH capability
[PATCH RESEND v2] i386/kvm: add support for KVM_CAP_X86_DISABLE_EXITS
2018-05-16 15:13 UTC (17+ messages)
[PATCH v5 00/13] s390: vfio-ap: guest dedicated crypto adapters
2018-05-16 14:41 UTC (37+ messages)
` [PATCH v5 01/13] KVM: s390: Interface to test whether APXA installed
` [PATCH v5 02/13] KVM: s390: refactor crypto initialization
` [PATCH v5 04/13] s390: vfio-ap: base implementation of VFIO AP device driver
` [PATCH v5 05/13] s390: vfio-ap: register matrix device with VFIO mdev framework
` [PATCH v5 06/13] KVM: s390: interfaces to manage guest's AP matrix
` [PATCH v5 10/13] s390: vfio-ap: sysfs interface to view matrix mdev matrix
` [PATCH v5 11/13] KVM: s390: implement mediated device open callback
[PATCH] vfio/mdev: Check globally for duplicate devices
2018-05-16 14:38 UTC (4+ messages)
[PATCH RFC 0/2] vfio-ccw: exploit halt/clear subchannel support
2018-05-16 13:53 UTC (5+ messages)
` [PATCH RFC 1/2] vfio-ccw: forward halt/clear to device if supported
[PATCH RFC 0/2] vfio-ccw: support for {halt,clear} subchannel
2018-05-16 13:32 UTC (5+ messages)
` [PATCH RFC 2/2] vfio-ccw: support for halt/clear subchannel
[PATCH v9 0/7] i386: Enable TOPOEXT to support hyperthreading on AMD CPU
2018-05-16 12:52 UTC (13+ messages)
` [PATCH v9 1/7] pc: add 2.13 machine types
` [PATCH v9 2/7] i386: Add new property to control cache info
` [PATCH v9 3/7] i386: Populate AMD Processor Cache Information for cpuid 0x8000001D
` [PATCH v9 4/7] i386: Clean up cache CPUID code
` [PATCH v9 5/7] i386: Add support for CPUID_8000_001E for AMD
` [PATCH v9 6/7] i386: Enable TOPOEXT feature on AMD EPYC CPU
` [PATCH v9 7/7] i386: Remove generic SMT thread check
[PATCH 0/2] Use sbitmap instead of percpu_ida
2018-05-16 12:47 UTC (8+ messages)
` [PATCH 1/2] Convert target drivers to use sbitmap
` [RFC PATCH] iscsit_wait_for_tag() can be static
` [PATCH 2/2] Remove percpu_ida
[PATCH] arm64: KVM: reduce guest fpsimd trap
2018-05-16 12:46 UTC (4+ messages)
[RFC V4 PATCH 0/8] Packed ring layout for vhost
2018-05-16 12:32 UTC (9+ messages)
` [RFC V4 PATCH 1/8] vhost: move get_rx_bufs to vhost.c
` [RFC V4 PATCH 2/8] vhost: hide used ring layout from device
` [RFC V4 PATCH 3/8] vhost: do not use vring_used_elem
` [RFC V4 PATCH 4/8] vhost_net: do not explicitly manipulate vhost_used_elem
` [RFC V4 PATCH 5/8] vhost: vhost_put_user() can accept metadata type
` [RFC V4 PATCH 6/8] virtio: introduce packed ring defines
` [RFC V4 PATCH 7/8] vhost: packed ring support
` [RFC V4 PATCH 8/8] vhost: event suppression for packed ring
[RFC][PATCH] KVM: APPLES can improve the performance of applications and virtualized systems by up to 49%
2018-05-16 9:49 UTC (3+ messages)
[PATCH v8 00/12] Intel Processor Trace virtualization enabling
2018-05-16 9:42 UTC (15+ messages)
` [PATCH v8 01/12] perf/x86/intel/pt: Move Intel-PT MSRs bit definitions to a public header
` [PATCH v8 02/12] perf/x86/intel/pt: Change pt_cap_get() to a public function
` [PATCH v8 03/12] perf/x86/intel/pt: Add new bit definitions for Intel PT MSRs
` [PATCH v8 04/12] perf/x86/intel/pt: add new capability for Intel PT
` [PATCH v8 05/12] perf/x86/intel/pt: Introduce a new function to get capability of "
` [PATCH v8 06/12] KVM: x86: Add Intel Processor Trace virtualization mode
` [PATCH v8 07/12] KVM: x86: Add Intel Processor Trace cpuid emulation
` [PATCH v8 08/12] KVM: x86: Add Intel Processor Trace context switch for each vcpu
` [PATCH v8 09/12] KVM: x86: Introduce a function to initialize the PT configuration
` [PATCH v8 10/12] KVM: x86: Implement Intel Processor Trace MSRs read/write emulation
` [PATCH v8 11/12] KVM: x86: Set intercept for Intel PT MSRs read/write
` [PATCH v8 12/12] KVM: x86: Disable Intel Processor Trace when VMXON in L1 guest
[PATCH] kvm: Delete the slot only when KVM_MEM_READONLY flag is changed
2018-05-16 9:18 UTC
[PATCH v2 11/30] KVM: PPC: Book3S PR: implement RFID TM behavior to suppress change from S0 to N0
2018-05-16 2:13 UTC (10+ messages)
` [PATCH v2 17/30] KVM: PPC: Book3S PR: make mtspr/mfspr emulation behavior based on active TM SPRs
` [PATCH v2 18/30] KVM: PPC: Book3S PR: always fail transaction in guest privilege state
` [PATCH v2 29/30] KVM: PPC: add KVM_SET_ONE_REG/KVM_GET_ONE_REG to async ioctl
[PATCH 0/3] KVM: VMX: Allow to disable ioport intercept per-VM by userspace
2018-05-16 1:13 UTC (15+ messages)
` [PATCH 1/3] KVM: VMX: Introduce per-VM I/O permission bitmaps
` [PATCH 2/3] KVM: X86: Allow userspace to disable ioport intercept
` [PATCH 3/3] KVM: VMX: Allow I/O port 0x80 bypass when userspace prefer
[PATCH v12 0/4] set VSESR_EL2 by user space and support NOTIFY_SEI notification
2018-05-15 20:58 UTC (5+ messages)
` [PATCH v12 1/4] arm64: KVM: export the capability to set guest SError syndrome
` [PATCH v12 2/4] arm/arm64: KVM: Add KVM_GET/SET_VCPU_EVENTS
` [PATCH v12 3/4] ACPI / APEI: Add SEI notification type support for ARMv8
` [PATCH v12 4/4] arm64: handle NOTIFY_SEI notification by the APEI driver
[PATCH v2 00/12] KVM/X86: Introduce a new guest mapping interface
2018-05-15 16:06 UTC (5+ messages)
[PATCH v2 00/40] Shared Virtual Addressing for the IOMMU
2018-05-15 14:16 UTC (19+ messages)
` [PATCH v2 16/40] arm64: mm: Pin down ASIDs for sharing mm with devices
` [PATCH v2 25/40] iommu/arm-smmu-v3: Add support for VHE
` [PATCH v2 26/40] iommu/arm-smmu-v3: Enable broadcast TLB maintenance
` [PATCH v2 27/40] iommu/arm-smmu-v3: Add SVA feature checking
` [PATCH v2 28/40] iommu/arm-smmu-v3: Implement mm operations
` [PATCH v2 29/40] iommu/arm-smmu-v3: Add support for Hardware Translation Table Update
` [PATCH v2 30/40] iommu/arm-smmu-v3: Register I/O Page Fault queue
` [PATCH v2 31/40] iommu/arm-smmu-v3: Improve add_device error handling
` [PATCH v2 32/40] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH v2 33/40] iommu/arm-smmu-v3: Add stall support for platform devices
` [PATCH v2 34/40] ACPI/IORT: Check ATS capability in root complex nodes
` [PATCH v2 35/40] iommu/arm-smmu-v3: Add support for PCI ATS
` [PATCH v2 36/40] iommu/arm-smmu-v3: Hook up ATC invalidation to mm ops
` [PATCH v2 37/40] iommu/arm-smmu-v3: Disable tagged pointers
` [PATCH v2 38/40] PCI: Make "PRG Response PASID Required" handling common
` [PATCH v2 39/40] iommu/arm-smmu-v3: Add support for PRI
` [PATCH v2 40/40] iommu/arm-smmu-v3: Add support for PCI PASID
[PATCH 0/4] move kvm_para.h to standard-headers
2018-05-15 12:56 UTC (3+ messages)
[PATCH v2 00/30] KVM: PPC: Book3S PR: Transaction memory support on PR KVM
2018-05-15 12:41 UTC (6+ messages)
` [PATCH v2 07/30] KVM: PPC: Book3S PR: add C function wrapper for _kvmppc_save/restore_tm()
[PATCH 0/4] KVM: arm/arm64: Fix locking issues
2018-05-15 12:05 UTC (5+ messages)
[PATCH RFC v2 0/5] KVM: nVMX: Enlightened VMCS for Hyper-V on KVM
2018-05-15 11:11 UTC (4+ messages)
` [PATCH RFC v2 3/5] KVM: nVMX: add enlightened VMCS state
[PATCH v3] KVM: X86: Lower the default timer frequency limit to 200us
2018-05-15 9:57 UTC (3+ messages)
CONFIG_KCOV causing crash in svm_vcpu_run()
2018-05-15 5:33 UTC (4+ messages)
[PATCH v6 0/9] i386: Enable TOPOEXT to support hyperthreading on AMD CPU
2018-05-14 23:49 UTC (4+ messages)
` [PATCH v6 7/9] i386: Add support for CPUID_8000_001E for AMD
[PATCH] KVM: fix spelling mistake: "cop_unsuable" -> "cop_unusable"
2018-05-14 22:13 UTC
[PATCH v8 0/8] i386: Enable TOPOEXT to support hyperthreading on AMD CPU
2018-05-14 16:44 UTC (12+ messages)
` [PATCH v8 1/8] i386: Helpers to encode cache information consistently
` [PATCH v8 3/8] i386: Add new property to control cache info
` [PATCH v8 7/8] i386: Enable TOPOEXT feature on AMD EPYC CPU
[PATCH v2] KVM: X86: Fix CR3 reserve bits
2018-05-14 16:14 UTC (3+ messages)
[PATCH 1/1] s390: vfio-ccw: push down unsupported IDA check
2018-05-14 15:01 UTC (6+ messages)
ping latency issue on passthrough guest
2018-05-14 9:02 UTC (5+ messages)
linux-next: manual merge of the kselftest tree with the kvm-fixes tree
2018-05-14 5:36 UTC
Xen inside KVM on AMD: Linux HVM/PVH crashes on AP bring up
2018-05-13 22:03 UTC (2+ messages)
KASAN: slab-out-of-bounds Read in vmx_vcpu_run
2018-05-13 14:21 UTC
[PATCH v2] KVM: X86: Fix CR3 reserve bits
2018-05-13 11:19 UTC
[PATCH 1/2] KVM: X86: Fix CR3 reserve bits
2018-05-13 9:14 UTC (2+ messages)
[PATCH 1/2] KVM: X86: Fix CR3 reserve bits
2018-05-13 8:54 UTC (2+ messages)
[PATCH v3 0/6] KVM: x86: hyperv: PV TLB flush for Windows guests
2018-05-13 8:47 UTC (4+ messages)
` [PATCH v3 4/6] KVM: x86: hyperv: simplistic HVCALL_FLUSH_VIRTUAL_ADDRESS_{LIST,SPACE} implementation
[PATCH 2/2] KVM: X86: Fix loss of CR3_PCID_INVD bit when guest writes CR3
2018-05-13 8:44 UTC (2+ messages)
general protection fault in __radix_tree_delete
2018-05-13 8:26 UTC (2+ messages)
[PATCH 1/2] KVM: X86: Fix CR3 reserve bits
2018-05-13 8:25 UTC (2+ messages)
KASAN: use-after-free Write in irq_bypass_register_consumer
2018-05-13 6:21 UTC (8+ messages)
` "
[PATCH 2/2] KVM: X86: Fix loss of CR3_PCID_INVD bit when guest writes CR3
2018-05-13 3:24 UTC
[PATCH 1/2] KVM: X86: Fix CR3 reserve bits
2018-05-13 3:22 UTC
[PATCH] vfio: platform: Fix using devices in PM Domains
2018-05-11 19:45 UTC (3+ messages)
` [PATCH v3 1/2] vfio: platform: Fix reset module leak in error path
[PATCH v2] vfio: platform: Make printed error messages more consistent
2018-05-11 19:45 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox