messages from 2019-02-25 03:47:26 to 2019-03-04 10:07:14 UTC [more...]
[PATCH v3 0/8] This patch-set is to enable Guest CET support
2019-03-04 18:53 UTC (36+ messages)
` [PATCH v3 1/8] KVM:VMX: Define CET VMCS fields and bits
` [PATCH v3 2/8] KVM:CPUID: Define CET CPUID bits and CR4.CET master enable bit
` [PATCH v3 3/8] KVM:CPUID: Add CPUID support for Guest CET
` [PATCH v3 4/8] KVM:CPUID: Fix xsaves area size calculation for CPUID.(EAX=0xD,ECX=1)
` [PATCH v3 5/8] KVM:VMX: Pass through host CET related MSRs to Guest
` [PATCH v3 6/8] KVM:VMX: Load Guest CET via VMCS when CET is enabled in Guest
` [PATCH v3 7/8] KVM:X86: Add XSS bit 11 and 12 support for CET xsaves/xrstors
` [PATCH v3 8/8] KVM:X86: Add user-space read/write interface for CET MSRs
[PATCH v4 00/17] x86/split_lock: Enable #AC exception for split locked accesses
2019-03-04 10:00 UTC (22+ messages)
` [PATCH v4 01/17] x86/common: Align cpu_caps_cleared and cpu_caps_set to unsigned long
` [PATCH v4 02/17] drivers/net/b44: Align pwol_mask to unsigned long for better performance
` [PATCH v4 03/17] wlcore: Align reg_ch_conf_pending and tmp_ch_bitmap "
` [PATCH v4 04/17] x86/split_lock: Align x86_capability to unsigned long to avoid split locked access
` [PATCH v4 05/17] x86/cpufeatures: Enumerate IA32_CORE_CAPABILITIES MSR
` [PATCH v4 06/17] x86/msr-index: Define IA32_CORE_CAPABILITY MSR and #AC exception for split lock bit
` [PATCH v4 07/17] x86/split_lock: Enumerate #AC for split lock by MSR IA32_CORE_CAPABILITY
` [PATCH v4 08/17] x86/clearcpuid: Support multiple clearcpuid options
` [PATCH v4 09/17] x86/clearcpuid: Support feature flag string in kernel option clearcpuid
` [PATCH v4 10/17] x86/clearcpuid: Apply cleared feature bits that are forced set before
` [PATCH v4 11/17] x86/clearcpuid: Clear CPUID bit in CPUID faulting
` [PATCH v4 12/17] Change document for kernel option clearcpuid
` [PATCH v4 13/17] x86/split_lock: Handle #AC exception for split lock
` [PATCH v4 14/17] x86/split_lock: Add a sysfs interface to allow user to enable or disable split lock detection on all CPUs during run time
` [PATCH v4 15/17] kvm: x86: Report CORE_CAPABILITY on GET_SUPPORTED_CPUID
` [PATCH v4 16/17] kvm: x86: Add support IA32_CORE_CAPABILITY MSR
` [PATCH v4 17/17] kvm: vmx: Emulate TEST_CTL MSR
[PATCH v4 0/7] vfio: ap: AP Queue Interrupt Control
2019-03-04 9:47 UTC (69+ messages)
` [PATCH v4 1/7] s390: ap: kvm: add PQAP interception for AQIC
` [PATCH v4 2/7] s390: ap: new vfio_ap_queue structure
` [PATCH v4 3/7] s390: ap: associate a ap_vfio_queue and a matrix mdev
` [PATCH v4 4/7] vfio: ap: register IOMMU VFIO notifier
` [PATCH v4 5/7] s390: ap: implement PAPQ AQIC interception in kernel
` [PATCH v4 6/7] s390: ap: Cleanup on removing the AP device
An issue for ARM VM panic after resume from suspend
2019-03-04 6:48 UTC
linux-next: manual merge of the kvm tree with Linus' tree
2019-03-04 2:50 UTC
[PATCH] x86: define a new MSR based feature word -- FEAT_CORE_CAPABILITY
2019-03-04 2:00 UTC
[PATCH] KVM: PPC: powerpc: Add count cache flush parameters to kvmppc_get_cpu_char()
2019-03-03 9:06 UTC (4+ messages)
[PATCH v4 0/2] KVM: arm/arm64: Add VCPU workarounds firmware register
2019-03-01 15:19 UTC (5+ messages)
` [PATCH v4 1/2] KVM: arm/arm64: Add save/restore support for firmware workaround state
` [PATCH v4 2/2] KVM: doc: add API documentation on the KVM_REG_ARM_WORKAROUNDS register
[PATCH v3 0/2] vfio-ccw: support hsch/csch (QEMU part)
2019-03-01 9:39 UTC (3+ messages)
` [PATCH v3 1/2] vfio-ccw: new capability chain support
` [PATCH v3 2/2] vfio-ccw: support async command subregion
[PATCH v4 0/6] vfio-ccw: support hsch/csch (kernel part)
2019-03-01 9:39 UTC (7+ messages)
` [PATCH v4 1/6] vfio-ccw: make it safe to access channel programs
` [PATCH v4 2/6] vfio-ccw: rework ssch state handling
` [PATCH v4 3/6] vfio-ccw: protect the I/O region
` [PATCH v4 4/6] vfio-ccw: add capabilities chain
` [PATCH v4 5/6] s390/cio: export hsch to modules
` [PATCH v4 6/6] vfio-ccw: add handling for async channel instructions
[PATCH] vfio/pci: use correct format characters
2019-02-28 20:45 UTC (2+ messages)
[PATCH] kvm: properly check debugfs dentry before using it
2019-02-28 18:04 UTC (4+ messages)
general protection fault in __dentry_path
2019-02-28 15:32 UTC (6+ messages)
` [PATCH] kvm: properly check debugfs dentry before using it
[PATCH AUTOSEL 4.9 08/19] vsock/virtio: fix kernel panic after device hot-unplug
2019-02-28 15:15 UTC (2+ messages)
` [PATCH AUTOSEL 4.9 09/19] vsock/virtio: reset connected sockets on device removal
[PATCH AUTOSEL 4.14 22/36] vsock/virtio: fix kernel panic after device hot-unplug
2019-02-28 15:13 UTC (2+ messages)
` [PATCH AUTOSEL 4.14 23/36] vsock/virtio: reset connected sockets on device removal
[PATCH AUTOSEL 4.19 41/64] vsock/virtio: fix kernel panic after device hot-unplug
2019-02-28 15:10 UTC (2+ messages)
` [PATCH AUTOSEL 4.19 42/64] vsock/virtio: reset connected sockets on device removal
[PATCH AUTOSEL 4.20 54/81] vsock/virtio: fix kernel panic after device hot-unplug
2019-02-28 15:07 UTC (2+ messages)
` [PATCH AUTOSEL 4.20 55/81] vsock/virtio: reset connected sockets on device removal
[RESEND PATCH 0/7] Add FOLL_LONGTERM to GUP fast and use it
2019-02-27 19:14 UTC (2+ messages)
Call for agenda for 2019-03-05
2019-02-27 12:47 UTC
[PATCH 0/5] KVM: arm/arm64: Fix VCPU power management problems
2019-02-27 12:05 UTC (8+ messages)
` [PATCH 1/5] KVM: arm/arm64: Reset the VCPU without preemption and vcpu state loaded
CONFIG_KCOV causing crash in svm_vcpu_run()
2019-02-27 8:21 UTC (6+ messages)
general protection fault in kvm_ioapic_scan_entry
2019-02-26 23:49 UTC (2+ messages)
[PATCH v2 00/16] KVM: PPC: Book3S HV: add XIVE native exploitation mode
2019-02-26 23:22 UTC (29+ messages)
` [PATCH v2 01/16] powerpc/xive: add OPAL extensions for the XIVE native exploitation support
` [PATCH v2 03/16] KVM: PPC: Book3S HV: XIVE: introduce a new capability KVM_CAP_PPC_IRQ_XIVE
` [PATCH v2 04/16] KVM: PPC: Book3S HV: XIVE: add a control to initialize a source
` [PATCH v2 06/16] KVM: PPC: Book3S HV: XIVE: add controls for the EQ configuration
` [PATCH v2 11/16] KVM: introduce a 'mmap' method for KVM devices
` [PATCH v2 13/16] KVM: PPC: Book3S HV: XIVE: add a mapping for the source ESB pages
` [PATCH v2 14/16] KVM: PPC: Book3S HV: XIVE: add passthrough support
` [PATCH v2 15/16] KVM: introduce a KVM_DESTROY_DEVICE ioctl
` [PATCH v2 16/16] KVM: PPC: Book3S HV: XIVE: clear the vCPU interrupt presenters
[PATCH] KVM: PPC: Fix compilation when KVM is not enabled
2019-02-26 22:21 UTC
Announcing GSoC and Outreachy 2019 internships
2019-02-26 20:18 UTC
[PATCH v6] x86: load FPU registers on return to userland
2019-02-26 16:38 UTC (10+ messages)
` [PATCH 05/22] x86/fpu: Remove fpu->initialized usage in copy_fpstate_to_sigframe()
[PATCH V3 00/10] X86/KVM/Hyper-V: Add HV ept tlb range list flush support in KVM
2019-02-26 14:21 UTC (6+ messages)
` [PATCH V3 1/10] X86/Hyper-V: Add parameter offset for hyperv_fill_flush_guest_mapping_list()
` [Update PATCH "
` [Update PATCH V3 2/10] KVM/VMX: Fill range list in kvm_fill_hv_flush_list_func()
[PATCH RFC 00/39] x86/KVM: Xen HVM guest support
2019-02-26 11:20 UTC (4+ messages)
` [PATCH RFC 20/39] xen-blkback: module_exit support
[PATCH v7 0/9] vfio/mdev: IOMMU aware mediated device
2019-02-26 10:37 UTC (2+ messages)
[kvm-unit-tests PATCH v3 0/5] arm/arm64: Add support for running under kvmtool
2019-02-26 9:29 UTC (7+ messages)
` [kvm-unit-tests PATCH v3 1/5] lib: arm: Use UART address from generated config.h
BUG: unable to handle kernel paging request in __kvm_mmu_prepare_zap_page
2019-02-25 20:09 UTC (2+ messages)
[PATCH v7] x86: load FPU registers on return to userland
2019-02-25 18:16 UTC (5+ messages)
` [PATCH 12/22] x86/fpu: Only write PKRU if it is different from current
` [PATCH 14/22] x86/fpu: Eager switch PKRU state
[PATCH v4 00/22] SMMUv3 Nested Stage Setup
2019-02-25 17:30 UTC (4+ messages)
` [PATCH v4 19/22] vfio-pci: Register an iommu fault handler
[RFC][Patch v8 0/7] KVM: Guest Free Page Hinting
2019-02-25 13:01 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox