messages from 2019-01-17 16:32:08 to 2019-01-24 04:51:59 UTC [more...]
[PATCH net-next V4 0/5] vhost: accelerate metadata access through vmap()
2019-01-24 4:51 UTC (12+ messages)
` [PATCH net-next V4 1/5] vhost: generalize adding used elem
` [PATCH net-next V4 2/5] vhost: fine grain userspace memory accessors
` [PATCH net-next V4 3/5] vhost: rename vq_iotlb_prefetch() to vq_meta_prefetch()
` [PATCH net-next V4 4/5] vhost: introduce helpers to get the size of metadata area
` [PATCH net-next V4 5/5] vhost: access vq metadata through kernel virtual address
[PATCH kernel] KVM: PPC: Fix compile when CONFIG_PPC_RADIX_MMU is not defined
2019-01-24 3:40 UTC (2+ messages)
` [kernel] "
KMSAN: kernel-infoleak in kvm_vcpu_write_guest_page
2019-01-24 1:18 UTC (9+ messages)
` [RFC PATCH] kvm: x86/vmx: Use kzalloc for cached_vmcs12
[PATCH v4 0/9] mmu notifier provide context informations
2019-01-24 0:00 UTC (15+ messages)
` [PATCH v4 1/9] mm/mmu_notifier: contextual information for event enums
` [PATCH v4 2/9] mm/mmu_notifier: contextual information for event triggering invalidation
` [PATCH v4 3/9] mm/mmu_notifier: use correct mmu_notifier events for each invalidation
` [PATCH v4 4/9] mm/mmu_notifier: pass down vma and reasons why mmu notifier is happening
` [PATCH v4 5/9] mm/mmu_notifier: mmu_notifier_range_update_to_read_only() helper
` [PATCH v4 6/9] gpu/drm/radeon: optimize out the case when a range is updated to read only
` [PATCH v4 7/9] gpu/drm/amdgpu: "
` [PATCH v4 8/9] gpu/drm/i915: "
` [PATCH v4 9/9] RDMA/umem_odp: "
[PATCH kernel] vfio-pci/nvlink2: Fix ancient gcc warnings
2019-01-23 23:08 UTC (5+ messages)
[PATCH 00/19] KVM: PPC: Book3S HV: add XIVE native exploitation mode
2019-01-23 21:35 UTC (34+ messages)
` [PATCH 03/19] KVM: PPC: Book3S HV: check the IRQ controller type
` [PATCH 05/19] KVM: PPC: Book3S HV: add a new KVM device for the XIVE native exploitation mode
` [PATCH 06/19] KVM: PPC: Book3S HV: add a GET_ESB_FD control to the XIVE native device
` [PATCH 08/19] KVM: PPC: Book3S HV: add a VC_BASE "
` [PATCH 11/19] KVM: PPC: Book3S HV: add support for the XIVE native exploitation mode hcalls
` [PATCH 17/19] KVM: PPC: Book3S HV: add get/set accessors for the VP XIVE state
` [PATCH 18/19] KVM: PPC: Book3S HV: add passthrough support
` [PATCH 19/19] KVM: introduce a KVM_DELETE_DEVICE ioctl
[patch 9/9] vfio/pci: Cleanup license mess
2019-01-23 20:05 UTC (2+ messages)
[PATCH 0/4] KVM: MMU: fast cleanup D bit based on fast write protect
2019-01-23 18:38 UTC (6+ messages)
` [PATCH 4/4] "
[PATCH v5 00/13] KVM/X86: Introduce a new guest mapping interface
2019-01-23 18:18 UTC (27+ messages)
` [PATCH v5 01/13] X86/nVMX: handle_vmon: Read 4 bytes from guest memory
` [PATCH v5 02/13] X86/nVMX: Update the PML table without mapping and unmapping the page
` [PATCH v5 03/13] X86/KVM: Handle PFNs outside of kernel reach when touching GPTEs
` [PATCH v5 04/13] KVM: Introduce a new guest mapping API
` [PATCH v5 05/13] X86/nVMX: handle_vmptrld: Use kvm_vcpu_map when copying VMCS12 from guest memory
` [PATCH v5 07/13] KVM/nVMX: Use kvm_vcpu_map when mapping the virtual APIC page
` [PATCH v5 08/13] KVM/nVMX: Use kvm_vcpu_map when mapping the posted interrupt descriptor table
` [PATCH v5 09/13] KVM/X86: Use kvm_vcpu_map in emulator_cmpxchg_emulated
` [PATCH v5 10/13] KVM/nSVM: Use the new mapping API for mapping guest memory
` [PATCH v5 11/13] KVM/nVMX: Use kvm_vcpu_map for accessing the shadow VMCS
` [PATCH v5 12/13] KVM/nVMX: Use kvm_vcpu_map for accessing the enlightened VMCS
` [PATCH v5 13/13] KVM/nVMX: Use page_address_valid in a few more locations
[PATCH v6] x86: load FPU registers on return to userland
2019-01-23 18:09 UTC (17+ messages)
` [PATCH 05/22] x86/fpu: Remove fpu->initialized usage in copy_fpstate_to_sigframe()
` [PATCH 12/22] x86/fpu: Only write PKRU if it is different from current
` [PATCH 18/22] x86/fpu: Update xstate's PKRU value on write_pkru()
[PATCH v2 0/5] vfio-ccw: support hsch/csch (kernel part)
2019-01-23 15:57 UTC (24+ messages)
` [PATCH v2 1/5] vfio-ccw: make it safe to access channel programs
` [PATCH v2 2/5] vfio-ccw: concurrent I/O handling
` [PATCH v2 3/5] vfio-ccw: add capabilities chain
` [qemu-s390x] "
` [PATCH v2 4/5] s390/cio: export hsch to modules
` [qemu-s390x] "
` [PATCH v2 5/5] vfio-ccw: add handling for async channel instructions
[PATCH v2 0/3] optimize waiting for free thread to do compression
2019-01-23 12:51 UTC (5+ messages)
` [PATCH v2 1/3] migration: introduce pages-per-second
[PATCH] kvm: no need to check return value of debugfs_create functions
2019-01-23 8:28 UTC (8+ messages)
[PATCH] KVM: VMX: Fix vm entry failure caused by invalid vmexit controls
2019-01-23 0:49 UTC (3+ messages)
[PATCH 1/2] dma-direct: set_memory_{en,de}crypted() take number of pages
2019-01-22 22:38 UTC (5+ messages)
` [PATCH 2/2] x86/kvmclock: set_memory_decrypted() takes "
[PATCH v2 0/7] This patch-set is to enable Guest CET support
2019-01-22 20:59 UTC (8+ messages)
` [PATCH v2 1/7] KVM:VMX: Define CET VMCS fields and bits
` [PATCH v2 2/7] KVM:CPUID: Define CET CPUID bits and CR4.CET master enable bit
` [PATCH v2 3/7] KVM:CPUID: Add CPUID support for CET xsaves component query
` [PATCH v2 4/7] KVM:CPUID: Fix xsaves area size calculation for CPUID.(EAX=0xD,ECX=1)
` [PATCH v2 5/7] KVM:VMX: Pass through host CET related MSRs to Guest
` [PATCH v2 6/7] KVM:VMX: Load Guest CET via VMCS when CET is enabled in Guest
` [PATCH v2 7/7] KVM:X86: Enable MSR_IA32_XSS bit 11 and 12 for CET xsaves/xrstors
[PATCH 0/2] KVM: arm/arm64: Add VCPU workarounds firmware register
2019-01-22 15:28 UTC (11+ messages)
` [PATCH 1/2] KVM: arm/arm64: Add save/restore support for firmware workaround state
[PATCH 3/6] x86: kvm: no need to check return value of debugfs_create functions
2019-01-22 14:35 UTC
[PATCH] iommu/intel-iommu: fix memory leak in intel_iommu_put_resv_regions()
2019-01-22 13:03 UTC (2+ messages)
[PATCH kvmtool v2 00/13] Implement reset of virtio devices
2019-01-22 11:51 UTC (3+ messages)
[PATCH] svm: Fix AVIC incomplete IPI emulation
2019-01-22 10:25 UTC
[PATCH] svm: Add warning message for AVIC IPI invalid target
2019-01-22 10:24 UTC
[PATCH kvmtool v2 0/6] arm: Add support for firmware booting
2019-01-22 9:00 UTC (3+ messages)
[RESEND PATCH V8 0/11] KVM: X86: Introducing ROE Protection Kernel Hardening
2019-01-22 3:10 UTC (13+ messages)
` [RESEND PATCH V8 01/11] KVM: State whether memory should be freed in kvm_free_memslot
` [RESEND PATCH V8 02/11] KVM: X86: Add arbitrary data pointer in kvm memslot iterator functions
` [RESEND PATCH V8 03/11] KVM: X86: Add helper function to convert SPTE to GFN
` [RESEND PATCH V8 04/11] KVM: Document Memory ROE
` [RESEND PATCH V8 05/11] KVM: Create architecture independent ROE skeleton
` [RESEND PATCH V8 06/11] KVM: X86: Enable ROE for x86
` [RESEND PATCH V8 07/11] KVM: Add support for byte granular memory ROE
` [RESEND PATCH V8 08/11] KVM: X86: Port ROE_MPROTECT_CHUNK to x86
` [RESEND PATCH V8 09/11] KVM: Add new exit reason For ROE violations
` [RESEND PATCH V8 10/11] KVM: Log ROE violations in system log
` [RESEND PATCH V8 11/11] KVM: ROE: Store protected chunks in red black tree
[PATCH 0/3] virtio-ccw: updates
2019-01-21 19:30 UTC (5+ messages)
` [PATCH 1/3] virtio-ccw: diag 500 may return a negative cookie
` [PATCH 2/3] s390/virtio: handle find on invalid queue gracefully
` [PATCH 3/3] virtio-ccw: wire up ->bus_name callback
[PATCH] KVM: nSVM: clear events pending from svm_complete_interrupts() when exiting to L1
2019-01-21 15:55 UTC (2+ messages)
[PATCH v2] KVM: x86: Fix single-step debugging
2019-01-21 14:24 UTC (2+ messages)
[PATCH] KVM: x86: Fix single-step debugging
2019-01-21 12:47 UTC (2+ messages)
[PATCH v2 0/2] vfio-ccw: support hsch/csch (QEMU part)
2019-01-21 11:05 UTC (3+ messages)
` [PATCH v2 1/2] vfio-ccw: new capability chain support
` [PATCH v2 2/2] vfio-ccw: support async command subregion
[PATCH] [next] kvm: vmx: fix some -Wmissing-prototypes warnings
2019-01-21 7:27 UTC
[PULL] virtio, vhost: fixes and cleanups
2019-01-20 18:40 UTC (2+ messages)
[PATCH 0/3] Inject a PMI for KVM Guest when ToPA buffer is filled
2019-01-19 20:04 UTC (4+ messages)
` [PATCH 1/3] perf/x86/intel/pt: Move pt structure to global header
` [PATCH 2/3] perf/x86/intel/pt: Inject PMI for KVM guest
` [PATCH 3/3] KVM: x86: Add support of clear Trace_ToPA_PMI status
[PATCH 0/3] vfio-ccw: support hsch/csch (kernel part)
2019-01-18 13:53 UTC (10+ messages)
` [PATCH 3/3] vfio-ccw: add handling for asnyc channel instructions
[RFC v3 00/21] SMMUv3 Nested Stage Setup
2019-01-18 10:02 UTC (2+ messages)
[PATCH] KVM: x86: Sync the pending Posted-Interrupts
2019-01-18 6:34 UTC
[PATCH net V4] vhost: log dirty page correctly
2019-01-18 5:47 UTC (4+ messages)
[PATCH 0/2] x86/kvm/hyper-v: fix KVM_CAP_HYPERV_ENLIGHTENED_VMCS
2019-01-17 17:12 UTC (3+ messages)
` [PATCH 1/2] x86/kvm/hyper-v: nested_enable_evmcs() sets vmcs_version incorrectly
` [PATCH 2/2] KVM: selftests: check returned evmcs version range
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).