messages from 2019-11-21 00:58:48 to 2019-11-22 16:02:42 UTC [more...]
[PATCH v3 00/19] x86/cpu: Clean up handling of VMX features
2019-11-22 16:02 UTC (19+ messages)
` [PATCH v3 01/19] x86/msr-index: Clean up bit defines for IA32_FEATURE_CONTROL MSR
` [PATCH v3 04/19] x86/intel: Initialize IA32_FEATURE_CONTROL MSR at boot
` [PATCH v3 05/19] x86/mce: WARN once if IA32_FEATURE_CONTROL MSR is left unlocked
` [PATCH v3 09/19] x86/cpu: Clear VMX feature flag if VMX is not fully enabled
` [PATCH v3 12/19] x86/vmx: Introduce VMX_FEATURES_*
[PATCH v7 0/9] Enable Sub-Page Write Protection Support
2019-11-22 15:55 UTC (31+ messages)
` [PATCH v7 1/9] Documentation: Introduce EPT based Subpage Protection and related ioctls
` [PATCH v7 2/9] vmx: spp: Add control flags for Sub-Page Protection(SPP)
` [PATCH v7 3/9] mmu: spp: Add SPP Table setup functions
` [PATCH v7 4/9] mmu: spp: Add functions to create/destroy SPP bitmap block
` [PATCH v7 5/9] x86: spp: Introduce user-space SPP IOCTLs
` [PATCH v7 6/9] vmx: spp: Set up SPP paging table at vmentry/vmexit
` [PATCH v7 8/9] mmu: spp: Handle SPP protected pages when VM memory changes
[RESEND PATCH v21 0/6] Add ARMv8 RAS virtualization support in QEMU
2019-11-22 15:47 UTC (10+ messages)
` [RESEND PATCH v21 3/6] ACPI: Add APEI GHES table generation support
` [RESEND PATCH v21 5/6] target-arm: kvm64: handle SIGBUS signal from kernel or KVM
[PATCH kvm-unit-tests] runtime: set MAX_SMP to number of online cpus
2019-11-22 15:15 UTC (6+ messages)
[PATCH 0/2] Limit memory encryption cpuid pass through
2019-11-22 14:34 UTC (8+ messages)
` [PATCH 1/2] KVM x86: Move kvm cpuid support out of svm
` [PATCH 2/2] KVM x86: Mask memory encryption guest cpuid
[Bug 205631] New: kvm: Unknown symbol
2019-11-22 13:29 UTC
[PATCH v1 0/4] s390x: Testing the Subchannel I/O
2019-11-22 12:48 UTC (8+ messages)
` [PATCH v1 4/4] s390x: Testing the Subchannel I/O read
[PATCH -next] KVM: x86: remove set but not used variable 'called'
2019-11-22 12:45 UTC (12+ messages)
` [PATCH -next v2] "
[PATCH v3 00/10] vfio_pci: wrap pci device as a mediated device
2019-11-21 11:23 UTC (11+ messages)
` [PATCH v3 01/10] vfio_pci: move vfio_pci_is_vga/vfio_vga_disabled to header
` [PATCH v3 02/10] vfio_pci: refine user config reference in vfio-pci module
` [PATCH v3 03/10] vfio_pci: refine vfio_pci_driver reference in vfio_pci.c
` [PATCH v3 04/10] vfio_pci: make common functions be extern
` [PATCH v3 05/10] vfio_pci: duplicate vfio_pci.c
` [PATCH v3 06/10] vfio_pci: shrink vfio_pci_common.c
` [PATCH v3 07/10] vfio_pci: shrink vfio_pci.c
` [PATCH v3 08/10] vfio/pci: protect cap/ecap_perm bits alloc/free
` [PATCH v3 09/10] samples: add vfio-mdev-pci driver
` [PATCH v3 10/10] samples: refine "
[PATCH v7 00/24] mm/gup: track dma-pinned pages: FOLL_PIN
2019-11-22 11:15 UTC (50+ messages)
` [PATCH v7 01/24] mm/gup: pass flags arg to __gup_device_* functions
` [PATCH v7 02/24] mm/gup: factor out duplicate code from four routines
` [PATCH v7 03/24] mm/gup: move try_get_compound_head() to top, fix minor issues
` [PATCH v7 04/24] mm: Cleanup __put_devmap_managed_page() vs ->page_free()
` [PATCH v7 05/24] mm: devmap: refactor 1-based refcounting for ZONE_DEVICE pages
` [PATCH v7 06/24] goldish_pipe: rename local pin_user_pages() routine
` [PATCH v7 07/24] IB/umem: use get_user_pages_fast() to pin DMA pages
` [PATCH v7 08/24] media/v4l2-core: set pages dirty upon releasing DMA buffers
` [PATCH v7 09/24] vfio, mm: fix get_user_pages_remote() and FOLL_LONGTERM
` [PATCH v7 10/24] mm/gup: introduce pin_user_pages*() and FOLL_PIN
` [PATCH v7 11/24] goldish_pipe: convert to pin_user_pages() and put_user_page()
` [PATCH v7 12/24] IB/{core,hw,umem}: set FOLL_PIN via pin_user_pages*(), fix up ODP
` [PATCH v7 13/24] mm/process_vm_access: set FOLL_PIN via pin_user_pages_remote()
` [PATCH v7 14/24] drm/via: set FOLL_PIN via pin_user_pages_fast()
` [PATCH v7 15/24] fs/io_uring: set FOLL_PIN via pin_user_pages()
` [PATCH v7 16/24] net/xdp: "
` [PATCH v7 17/24] mm/gup: track FOLL_PIN pages
` [PATCH v7 18/24] media/v4l2-core: pin_user_pages (FOLL_PIN) and put_user_page() conversion
` [PATCH v7 19/24] vfio, mm: "
` [PATCH v7 20/24] powerpc: book3s64: convert to pin_user_pages() and put_user_page()
` [PATCH v7 21/24] mm/gup_benchmark: use proper FOLL_WRITE flags instead of hard-coding "1"
` [PATCH v7 22/24] mm/gup_benchmark: support pin_user_pages() and related calls
` [PATCH v7 23/24] selftests/vm: run_vmtests: invoke gup_benchmark with basic FOLL_PIN coverage
` [PATCH v7 24/24] mm, tree-wide: rename put_user_page*() to unpin_user_page*()
[PATCH] MAINTAINERS: Add myself as maintainer of virtio-vsock
2019-11-22 10:20 UTC
[PATCH net-next 0/6] vsock: add local transport support
2019-11-22 10:02 UTC (22+ messages)
` [PATCH net-next 2/6] vsock: add VMADDR_CID_LOCAL definition
` [PATCH net-next 3/6] vsock: add local transport support in the vsock core
` [PATCH net-next 4/6] vsock: add vsock_loopback transport
` [PATCH net-next 5/6] vsock: use local transport when it is loaded
general protection fault in __schedule (2)
2019-11-22 7:19 UTC
[PATCH 0/5] vfio/spapr: Handle changes of master irq chip for VFIO devices
2019-11-22 6:09 UTC (14+ messages)
` [PATCH 2/5] vfio/pci: Split vfio_intx_update()
` [PATCH 3/5] vfio/pci: Respond to KVM irqchip change notifier
` [PATCH 4/5] spapr: Handle irq backend changes with VFIO PCI devices
` [PATCH 5/5] spapr: Work around spurious warnings from vfio INTx initialization
[PATCH AUTOSEL 4.19 065/219] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
2019-11-22 5:47 UTC (4+ messages)
` [PATCH AUTOSEL 4.19 084/219] vfio-mdev/samples: Use u8 instead of char for handle functions
` [PATCH AUTOSEL 4.19 093/219] KVM: s390: unregister debug feature on failing arch init
` [PATCH AUTOSEL 4.19 123/219] vfio/spapr_tce: Get rid of possible infinite loop
[PATCH AUTOSEL 4.4 23/68] KVM: s390: unregister debug feature on failing arch init
2019-11-22 6:12 UTC
[PATCH AUTOSEL 4.14 027/127] kvm: vmx: Set IA32_TSC_AUX for legacy mode guests
2019-11-22 5:54 UTC (4+ messages)
` [PATCH AUTOSEL 4.14 036/127] vfio-mdev/samples: Use u8 instead of char for handle functions
` [PATCH AUTOSEL 4.14 042/127] KVM: s390: unregister debug feature on failing arch init
` [PATCH AUTOSEL 4.14 068/127] vfio/spapr_tce: Get rid of possible infinite loop
[PATCH AUTOSEL 4.9 28/91] KVM: s390: unregister debug feature on failing arch init
2019-11-22 6:00 UTC (2+ messages)
` [PATCH AUTOSEL 4.9 50/91] vfio/spapr_tce: Get rid of possible infinite loop
WARNING bisected (was Re: [PATCH v7 08/10] mm: rework non-root kmem_cache lifecycle management)
2019-11-21 22:09 UTC (8+ messages)
[PATCH] KVM: nVMX: expose "load IA32_PERF_GLOBAL_CTRL" controls
2019-11-21 18:42 UTC (2+ messages)
[PATCH] KVM: nVMX: expose "load IA32_PERF_GLOBAL_CTRL" controls
2019-11-21 14:28 UTC (2+ messages)
[PATCH V1 0/2] Intel IFC VF driver for VDPA
2019-11-21 13:34 UTC (3+ messages)
` [RFC V1 1/2] vhost: IFC VF initialization functions
` [RFC V1 2/2] vhost: Support for virtio_mdev and vhost_mdev
[Bug 205619] no bugs
2019-11-21 12:45 UTC
[PATCH] KVM: x86: create mmu/ subdirectory
2019-11-21 10:45 UTC
Memory regions and VMAs across architectures
2019-11-21 9:40 UTC (5+ messages)
[PATCH] KVM: nVMX: Remove unnecessary TLB flushes on L1<->L2 switches when L1 use apic-access-page
2019-11-21 9:39 UTC (5+ messages)
[GIT PULL] KVM/arm updates for 5.5
2019-11-21 9:06 UTC (3+ messages)
[PATCH 0/5] KVM: vmx: implement MSR_IA32_TSX_CTRL for guests
2019-11-21 9:05 UTC (4+ messages)
` [PATCH 5/5] KVM: vmx: use MSR_IA32_TSX_CTRL to hard-disable TSX on guest that lack it
[PATCH] KVM: nVMX: Do not mark vmcs02->apic_access_page as dirty when unpinning
2019-11-21 9:03 UTC (2+ messages)
[PATCH] KVM: arm: get rid of unused arg in cpu_init_hyp_mode()
2019-11-21 7:15 UTC
[PATCH] virt: Fix Kconfig indentation
2019-11-21 3:25 UTC
[PATCH v2 1/2] KVM: VMX: FIXED+PHYSICAL mode single target IPI fastpath
2019-11-21 3:19 UTC (10+ messages)
[PATCH v4 1/2] KVM: VMX: FIXED+PHYSICAL mode single target IPI fastpath
2019-11-21 3:17 UTC (2+ messages)
` [PATCH v4 2/2] KVM: LAPIC: micro-optimize fixed mode ipi delivery
[PATCH v3 1/2] KVM: VMX: FIXED+PHYSICAL mode single target IPI fastpath
2019-11-21 3:16 UTC (3+ messages)
kernel panic: stack is corrupted in vhost_net_ioctl
2019-11-21 1:25 UTC
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).