messages from 2019-03-17 17:22:24 to 2019-03-21 17:10:05 UTC [more...]
[PATCH v7] x86: load FPU registers on return to userland
2019-03-21 17:10 UTC (8+ messages)
` [PATCH 14/22] x86/fpu: Eager switch PKRU state
(unknown)
2019-03-21 17:07 UTC (33+ messages)
` [PATCH 1/9] vfio/mdev: add .request callback
` [PATCH 2/9] nvme/core: add some more values from the spec
` [PATCH 3/9] nvme/core: add NVME_CTRL_SUSPENDED controller state
` [PATCH 4/9] nvme/pci: use the NVME_CTRL_SUSPENDED state
` [PATCH 5/9] nvme/pci: add known admin effects to augument admin effects log page
` [PATCH 6/9] nvme/pci: init shadow doorbell after each reset
` [PATCH 7/9] nvme/core: add mdev interfaces
` [PATCH 8/9] nvme/core: add nvme-mdev core driver
` [PATCH 9/9] nvme/pci: implement the mdev external queue allocation interface
` [PATCH 0/9] RFC: NVME VFIO mediated device
` your mail
`
[PATCH V3] cpufreq: Call transition notifier only once for each policy
2019-03-21 15:49 UTC (3+ messages)
[RFC PATCH 0/1] KVM: PPC: Inform userspace about singlestep support
2019-03-21 14:35 UTC (4+ messages)
` [RFC PATCH 1/1] KVM: PPC: Report single stepping capability
[PATCH v6 00/22] SMMUv3 Nested Stage Setup
2019-03-21 14:32 UTC (16+ messages)
` [PATCH v6 05/22] iommu: Introduce cache_invalidate API
` [PATCH v6 14/22] iommu/smmuv3: Implement cache_invalidate
` [PATCH v6 15/22] dma-iommu: Implement NESTED_MSI cookie
` [PATCH v6 16/22] iommu/smmuv3: Implement bind/unbind_guest_msi
` [PATCH v6 17/22] iommu/smmuv3: Report non recoverable faults
` [PATCH v6 18/22] vfio-pci: Add a new VFIO_REGION_TYPE_NESTED region type
` [PATCH v6 19/22] vfio-pci: Register an iommu fault handler
` [PATCH v6 20/22] vfio_pci: Allow to mmap the fault queue
` [PATCH v6 21/22] vfio-pci: Add VFIO_PCI_DMA_FAULT_IRQ_INDEX
` [PATCH v6 22/22] vfio: Document nested stage control
[PATCH v5 0/7] vfio: ap: AP Queue Interrupt Control
2019-03-21 14:05 UTC (19+ messages)
` [PATCH v5 1/7] s390: ap: kvm: add PQAP interception for AQIC
` [PATCH v5 4/7] s390: ap: setup relation betwen KVM and mediated device
[PATCH v4 0/2] KVM: arm/arm64: Add VCPU workarounds firmware register
2019-03-21 12:54 UTC (5+ messages)
` [PATCH v4 1/2] KVM: arm/arm64: Add save/restore support for firmware workaround state
` [PATCH v4 2/2] KVM: doc: add API documentation on the KVM_REG_ARM_WORKAROUNDS register
[PATCH v4 00/17] KVM: PPC: Book3S HV: add XIVE native exploitation mode
2019-03-21 8:48 UTC (20+ messages)
` [PATCH v4 01/17] powerpc/xive: add OPAL extensions for the XIVE native exploitation support
` [PATCH v4 02/17] KVM: PPC: Book3S HV: add a new KVM device for the XIVE native exploitation mode
` [PATCH v4 03/17] KVM: PPC: Book3S HV: XIVE: introduce a new capability KVM_CAP_PPC_IRQ_XIVE
` [PATCH v4 04/17] KVM: PPC: Book3S HV: XIVE: add a control to initialize a source
` [PATCH v4 05/17] KVM: PPC: Book3S HV: XIVE: add a control to configure "
` [PATCH v4 06/17] KVM: PPC: Book3S HV: XIVE: add controls for the EQ configuration
` [PATCH v4 07/17] KVM: PPC: Book3S HV: XIVE: add a global reset control
` [PATCH v4 08/17] KVM: PPC: Book3S HV: XIVE: add a control to sync the sources
` [PATCH v4 09/17] KVM: PPC: Book3S HV: XIVE: add a control to dirty the XIVE EQ pages
` [PATCH v4 10/17] KVM: PPC: Book3S HV: XIVE: add get/set accessors for the VP XIVE state
` [PATCH v4 11/17] KVM: introduce a 'mmap' method for KVM devices
` [PATCH v4 12/17] KVM: PPC: Book3S HV: XIVE: add a TIMA mapping
` [PATCH v4 13/17] KVM: PPC: Book3S HV: XIVE: add a mapping for the source ESB pages
` [PATCH v4 14/17] KVM: PPC: Book3S HV: XIVE: add passthrough support
` [PATCH v4 15/17] KVM: PPC: Book3S HV: XIVE: activate XIVE exploitation mode
` [PATCH v4 16/17] KVM: introduce a KVM_DESTROY_DEVICE ioctl
` [PATCH v4 17/17] KVM: PPC: Book3S HV: XIVE: clear the vCPU interrupt presenters
[PATCH] x86: kvm: hyper-v: deal with buggy TLB flush requests from WS2012
2019-03-20 17:43 UTC
[PATCH v2] kvm: arm: Fix handling of stage2 huge mappings
2019-03-20 17:31 UTC (2+ messages)
[PATCH] kvm: arm: Fix handling of stage2 huge mappings
2019-03-20 17:24 UTC (9+ messages)
[RFC] Question about enable doorbell irq and halt_poll process
2019-03-20 17:02 UTC (3+ messages)
[PATCH 0/2] i386: arch_capabilities fixes + migratability
2019-03-20 15:18 UTC (2+ messages)
[patch] kvm: svm: fix potential get_num_contig_pages overflow
2019-03-20 14:07 UTC (2+ messages)
[PATCH v2 0/2] Avoid cpuid faulting leaking and one optimization
2019-03-20 13:26 UTC (11+ messages)
` [PATCH v2 1/2] kvm/vmx: avoid CPUID faulting leaking to guest
` [PATCH v2 2/2] kvm/vmx: Using hardware cpuid faulting to avoid emulation overhead
[RFC][Patch v9 0/6] KVM: Guest Free Page Hinting
2019-03-20 13:18 UTC (12+ messages)
[PATCH 00/52] [RFC] virtio-fs: shared file system for virtual machines
2019-03-20 10:42 UTC (7+ messages)
` [PATCH 18/52] virtio-fs: Map cache using the values from the capabilities
` [PATCH] virtio-fs: fix multiple tag support
[PATCH] x86/Hyper-V: Fix definition HV_MAX_FLUSH_REP_COUNT
2019-03-20 8:29 UTC (3+ messages)
[PATCH] svm/avic: iommu/amd: Flush IOMMU IRT after update all entries
2019-03-20 8:14 UTC
[PATCH] Revert "svm: Fix AVIC incomplete IPI emulation"
2019-03-20 8:12 UTC
[PATCH] vfio/spapr_tce: Make symbol 'tce_iommu_driver_ops' static
2019-03-20 6:47 UTC (2+ messages)
[PATCH v3 00/17] KVM: PPC: Book3S HV: add XIVE native exploitation mode
2019-03-20 6:44 UTC (34+ messages)
` [PATCH v3 02/17] KVM: PPC: Book3S HV: add a new KVM device for the "
` [PATCH v3 03/17] KVM: PPC: Book3S HV: XIVE: introduce a new capability KVM_CAP_PPC_IRQ_XIVE
` [PATCH v3 04/17] KVM: PPC: Book3S HV: XIVE: add a control to initialize a source
` [PATCH v3 06/17] KVM: PPC: Book3S HV: XIVE: add controls for the EQ configuration
` [PATCH v3 07/17] KVM: PPC: Book3S HV: XIVE: add a global reset control
` [PATCH v3 08/17] KVM: PPC: Book3S HV: XIVE: add a control to sync the sources
` [PATCH v3 09/17] KVM: PPC: Book3S HV: XIVE: add a control to dirty the XIVE EQ pages
` [PATCH v3 10/17] KVM: PPC: Book3S HV: XIVE: add get/set accessors for the VP XIVE state
` [PATCH v3 11/17] KVM: introduce a 'mmap' method for KVM devices
` [PATCH v3 14/17] KVM: PPC: Book3S HV: XIVE: add passthrough support
` [PATCH v3 15/17] KVM: PPC: Book3S HV: XIVE: activate XIVE exploitation mode
` [PATCH v3 16/17] KVM: introduce a KVM_DESTROY_DEVICE ioctl
` [PATCH v3 17/17] KVM: PPC: Book3S HV: XIVE: clear the vCPU interrupt presenters
[PATCH kvmtool v2 0/3] vfio-pci: Support INTx mode re-enabling
2019-03-20 6:20 UTC (4+ messages)
` [PATCH kvmtool v2 1/3] vfio-pci: Release INTx's unmask eventfd properly
` [PATCH kvmtool v2 2/3] vfio-pci: Remove useless FDs reservation in vfio_pci_enable_intx()
` [PATCH kvmtool v2 3/3] vfio-pci: Re-enable INTx mode when disable MSI/MSIX
[PATCH v7 0/9] vfio/mdev: IOMMU aware mediated device
2019-03-20 5:52 UTC (6+ messages)
` [PATCH v7 9/9] vfio/type1: Handle different mdev isolation type
INFO: task hung in vhost_net_stop_vq
2019-03-20 5:21 UTC (2+ messages)
[PATCH kvmtool v1 1/2] vfio-pci: Release INTx's guest to host eventfd properly
2019-03-20 1:04 UTC (4+ messages)
` [PATCH kvmtool v1 2/2] vfio-pci: Fallback to INTx mode when disable MSI/MSIX
[RFC PATCH] KVM: arm/arm64: Enable direct irqfd MSI injection
2019-03-19 16:57 UTC (9+ messages)
[PATCH 0/2] KVM: arm/arm64: vgic-its: Guest memory access fixes
2019-03-19 15:47 UTC (6+ messages)
` [PATCH 1/2] KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory
` [PATCH 2/2] KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots
[PATCH V2] cpufreq: Call transition notifier only once for each policy
2019-03-19 15:44 UTC (13+ messages)
[PATCH v6 00/14] KVM/X86: Introduce a new guest mapping interface
2019-03-18 19:16 UTC (4+ messages)
[RFC PATCH v4 0/8] This patch-set is to enable Guest CET support
2019-03-18 15:03 UTC (9+ messages)
` [RFC PATCH v4 1/8] KVM:VMX: Define CET VMCS fields and bits
` [RFC PATCH v4 2/8] KVM:CPUID: Add CET CPUID support for Guest
` [RFC PATCH v4 3/8] KVM:CPUID: Fix xsaves area size calculation for CPUID.(EAX=0xD,ECX=1)
` [RFC PATCH v4 4/8] KVM:VMX: Pass through host CET related MSRs to Guest
` [RFC PATCH v4 5/8] KVM:VMX: Load Guest CET via VMCS when CET is enabled in Guest
` [RFC PATCH v4 6/8] KVM:x86: Allow Guest to set supported bits in XSS
` [RFC PATCH v4 7/8] KVM:x86: load guest fpu state when accessing MSRs managed by XSAVES
` [RFC PATCH v4 8/8] KVM:x86: Add user-space read/write interface for CET MSRs
[PATCH v5 00/22] SMMUv3 Nested Stage Setup
2019-03-18 12:44 UTC (6+ messages)
` [PATCH v5 05/22] iommu: Introduce cache_invalidate API
[PATCH] x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init
2019-03-18 9:35 UTC (2+ messages)
[PATCH 0/5] QEMU VFIO live migration
2019-03-18 3:27 UTC (13+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).