public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-06-06 14:15:31 to 2018-06-11 11:57:01 UTC [more...]

[PATCH v4 0/8] KVM: x86: hyperv: PV TLB flush for Windows guests
 2018-06-11 11:57 UTC  (4+ messages)
` [PATCH v4 5/8] KVM: introduce kvm_make_vcpus_request_mask() API

[PATCH v5 00/13] s390: vfio-ap: guest dedicated crypto adapters
 2018-06-11 11:49 UTC  (32+ messages)
` [PATCH v5 04/13] s390: vfio-ap: base implementation of VFIO AP device driver
` [PATCH v5 10/13] s390: vfio-ap: sysfs interface to view matrix mdev matrix
` [PATCH v5 11/13] KVM: s390: implement mediated device open callback

[PATCH v9 00/12] Intel Processor Trace virtualization enabling
 2018-06-11 11:41 UTC  (26+ messages)
` [PATCH v9 01/12] perf/x86/intel/pt: Move Intel-PT MSRs bit definitions to a public header
` [PATCH v9 03/12] perf/x86/intel/pt: Add new bit definitions for Intel PT MSRs
` [PATCH v9 04/12] perf/x86/intel/pt: add new capability for Intel PT
` [PATCH v9 06/12] KVM: x86: Add Intel Processor Trace virtualization mode
` [PATCH v9 09/12] KVM: x86: Introduce a function to initialize the PT configuration
` [PATCH v9 10/12] KVM: x86: Implement Intel Processor Trace MSRs read/write emulation
` [PATCH v9 11/12] KVM: x86: Set intercept for Intel PT MSRs read/write

[PATCH RFC 0/2] vfio-ccw: support for {halt,clear} subchannel
 2018-06-11 11:12 UTC  (22+ messages)
` [PATCH RFC 2/2] vfio-ccw: support for halt/clear subchannel
                      ` [qemu-s390x] "
                              ` [Qemu-devel] "

An emulation failure occurs, if I hotplug vcpus immediately after the VM start
 2018-06-11 10:44 UTC  (16+ messages)

[PATCH 1/2] KVM: Fix lock holder candidate yield
 2018-06-11  9:03 UTC  (4+ messages)
` [PATCH 2/2] sched/core: Consider afffinity constrain when yield to a task

[RFC v1 0/2] Detect & register virtio-crypto algos only if it can be supported by backend
 2018-06-11  8:48 UTC  (5+ messages)
` [RFC v1 1/2] crypto/virtio-crypto: Read crypto services and algorithm masks
` [RFC v1 2/2] crypto/virtio-crypto: Register an algo only if it's supported

[PATCH 00/12] migration: improve multithreads for compression and decompression
 2018-06-11  8:00 UTC  (4+ messages)
` [PATCH 01/12] migration: do not wait if no free thread

[PATCH net] vhost_net: remove VHOST_NET_F_VIRTIO_NET_HDR support
 2018-06-11  3:08 UTC  (7+ messages)

[PATCH 11/11] tools/cpupower: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:25 UTC 

[PATCH 10/11] driver/edac: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:24 UTC 

[PATCH 09/11] driver/cpufreq: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:24 UTC 

[PATCH 08/11] driver/acpi: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:23 UTC 

[PATCH 07/11] x86/xen: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:23 UTC 

[PATCH 06/11] x86/kvm: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:23 UTC 

[PATCH 05/11] x86/mce: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:23 UTC 

[PATCH 04/11] x86/perf: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:22 UTC 

[PATCH 03/11] x86/cpu/bug: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:22 UTC 

[PATCH 02/11] x86/pci: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:21 UTC 

[PATCH 01/11] x86/cpu: Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:21 UTC 

[PATCH 00/11] Add support for Hygon's Dhyana Family 18h processor
 2018-06-09 13:20 UTC 

[PATCH RESEND v4 0/2] support exception state migration and set VSESR_EL2 by user space
 2018-06-09 12:40 UTC  (5+ messages)
` [PATCH RESEND v4 1/2] arm64: KVM: export the capability to set guest SError syndrome
` [PATCH RESEND v4 2/2] arm/arm64: KVM: Add KVM_GET/SET_VCPU_EVENTS

[PATCH v2 0/6] KVM/arm64: Cache maintenance relaxations
 2018-06-09 12:34 UTC  (13+ messages)
` [PATCH v2 2/6] arm64: KVM: Handle Set/Way CMOs as NOPs if FWB is present
` [PATCH v2 3/6] arm64: KVM: Avoid marking pages as XN in Stage-2 if CTR_EL0.DIC is set
` [PATCH v2 4/6] KVM: arm/arm64: Consolidate page-table accessors
` [PATCH v2 5/6] KVM: arm/arm64: Stop using {pmd,pud,pgd}_populate
` [PATCH v2 6/6] KVM: arm/arm64: Remove unnecessary CMOs when creating HYP page tables

[PATCH kernel 0/6] powerpc/powernv/iommu: Optimize memory use
 2018-06-09  8:53 UTC  (10+ messages)
` [PATCH kernel 1/6] powerpc/powernv: Remove useless wrapper
` [PATCH kernel 2/6] powerpc/powernv: Move TCE manupulation code to its own file
` [PATCH kernel 3/6] KVM: PPC: Make iommu_table::it_userspace big endian
` [PATCH kernel 4/6] powerpc/powernv: Add indirect levels to it_userspace
` [PATCH kernel 5/6] powerpc/powernv: Rework TCE level allocation
` [PATCH kernel 6/6] powerpc/powernv/ioda: Allocate indirect TCE levels on demand

[PATCH v12 0/4] i386: Enable TOPOEXT to support hyperthreading on AMD CPU
 2018-06-08 22:59 UTC  (17+ messages)
` [PATCH v12 1/4] i386: Add support for CPUID_8000_001E for AMD
` [PATCH v12 2/4] i386: Verify if topoext feature can be supported
` [PATCH v12 3/4] i386: Enable TOPOEXT feature on AMD EPYC CPU
` [PATCH v12 4/4] i386: Remove generic SMT thread check

[PATCH v13 0/5] i386: Enable TOPOEXT to support hyperthreading on AMD CPU
 2018-06-08 22:56 UTC  (6+ messages)
` [PATCH v13 1/5] i386: Add support for CPUID_8000_001E for AMD
` [PATCH v13 2/5] i386: Introduce auto_topoext bit to manage topoext
` [PATCH v13 3/5] i386: Enable TOPOEXT feature on AMD EPYC CPU
` [PATCH v13 4/5] i386: Verify and enable topoext feature if supported
` [PATCH v13 5/5] i386: Remove generic SMT thread check

[PATCH v1] AMD SSB bits
 2018-06-08 21:30 UTC  (9+ messages)
` [PATCH v1 3/3] x86/bugs: Switch the selection of mitigation from CPU vendor to CPU features
` [PATCH QEMU] Patches for new AMD CPU bits
  ` [PATCH 1/2] i386: define the AMD 'amd-ssbd' CPUID feature bit

[PATCH v11 00/13] Intel SGX1 support
 2018-06-08 17:09 UTC  (2+ messages)
` [PATCH v11 05/13] x86, cpufeatures: add Intel-defined SGX leaf CPUID_12_EAX

[RFC PATCH kernel 0/5] powerpc/P9/vfio: Pass through NVIDIA Tesla V100
 2018-06-08  5:03 UTC  (24+ messages)
` [RFC PATCH kernel 1/5] vfio/spapr_tce: Simplify page contained test
` [RFC PATCH kernel 2/5] powerpc/iommu_context: Change referencing in API
` [RFC PATCH kernel 3/5] powerpc/iommu: Do not pin memory of a memory device
` [RFC PATCH kernel 4/5] vfio_pci: Allow mapping extra regions
` [RFC PATCH kernel 5/5] vfio_pci: Add NVIDIA GV100GL [Tesla V100 SXM2] [10de:1db1] subdriver

[PATCH v4 0/2] support exception state migration and set VSESR_EL2 by user space
 2018-06-08  3:20 UTC  (4+ messages)
` [PATCH v4 1/2] arm64: KVM: export the capability to set guest SError syndrome
` [PATCH v4 2/2] arm/arm64: KVM: Add KVM_GET/SET_VCPU_EVENTS

[RFC PATCH] iommu/vt-d: Exclude known RMRRs from reserved ranges
 2018-06-08  2:56 UTC  (4+ messages)

[PATCH] kvm: support -realtime cpu-pm=on|off
 2018-06-08  0:10 UTC  (2+ messages)

[PATCH] kvm: fix typo in flag name
 2018-06-07 23:19 UTC 

KMSAN: uninit-value in _copy_to_iter (2)
 2018-06-07 19:29 UTC  (11+ messages)
    `  "

Make CONFIG_NET and CONFIG_SECCOMP_FILTER independent of CONFIG_NET
 2018-06-07 15:48 UTC  (5+ messages)
  ` [less-CONFIG_NET 7/7] kvm: drop CONFIG_NET

[PATCH v6 0/7] vfio/type1: Add support for valid iova list management
 2018-06-07 15:05 UTC  (7+ messages)

[PATCH 3.16 064/410] x86/speculation: Correct Speculation Control microcode blacklist again
 2018-06-07 14:05 UTC  (11+ messages)
` [PATCH 3.16 334/410] x86/spectre_v2: Don't check microcode versions when running under hypervisors
` [PATCH 3.16 057/410] KVM/VMX: Allow direct access to MSR_IA32_SPEC_CTRL
` [PATCH 3.16 058/410] KVM/SVM: "
` [PATCH 3.16 056/410] KVM/VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
` [PATCH 3.16 061/410] KVM/VMX: Optimize vmx_vcpu_run() and svm_vcpu_run() by marking the RDMSR path as unlikely()
` [PATCH 3.16 050/410] x86/speculation: Use IBRS if available before calling into firmware
` [PATCH 3.16 055/410] KVM/x86: Add IBPB support
` [PATCH 3.16 059/410] KVM/x86: Remove indirect MSR op calls from SPEC_CTRL
` [PATCH 3.16 063/410] x86/speculation: Update Speculation Control microcode blacklist
` [PATCH 3.16 060/410] x86/speculation: Move firmware_restrict_branch_speculation_*() from C to CPP

[PATCH] Fix SSBD not being exposed to guests. (v1)
 2018-06-07 13:14 UTC  (4+ messages)
` [PATCH] KVM: VMX: Expose SSBD properly to guests


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox