messages from 2020-02-17 12:08:00 to 2020-02-18 18:48:07 UTC [more...]
[PATCH] KVM: Suppress warning in __kvm_gfn_to_hva_cache_init
2020-02-18 18:47 UTC
[RFC PATCH 00/11] Removing Calxeda platform support
2020-02-18 18:40 UTC (20+ messages)
` [RFC PATCH 01/11] vfio: Remove Calxeda XGMAC reset driver
` [RFC PATCH 02/11] ata: Remove Calxeda AHCI driver
` [RFC PATCH 03/11] cpuidle: Remove Calxeda driver
` [RFC PATCH 04/11] cpufreq: "
` [RFC PATCH 05/11] EDAC: Remove Calxeda drivers
` [RFC PATCH 06/11] iommu: arm-smmu: Remove Calxeda secure mode quirk
` [RFC PATCH 07/11] net: Remove Calxeda XGMAC driver
` [RFC PATCH 08/11] clk: Remove Calxeda driver
` [RFC PATCH 09/11] ARM: Remove Calxeda platform support
` [RFC PATCH 10/11] ARM: dts: Remove Calxeda platforms
` [RFC PATCH 11/11] dt-bindings: Remove Calxeda platforms bindings
[PATCH 0/5] Random debug/PMU fixes for 5.6
2020-02-18 18:15 UTC (9+ messages)
` [PATCH 1/5] KVM: arm64: Fix missing RES1 in emulation of DBGBIDR
` [PATCH 3/5] kvm: arm64: Limit PMU version to ARMv8.1
` [PATCH 4/5] KVM: arm64: Limit the debug architecture to ARMv8.0
[PATCH RFC] target/i386: filter out VMX_PIN_BASED_POSTED_INTR when enabling SynIC
2020-02-18 17:47 UTC (6+ messages)
[PATCH 00/13] KVM: selftests: Various fixes and cleanups
2020-02-18 17:43 UTC (8+ messages)
` [PATCH 02/13] fixup! KVM: selftests: Add support for vcpu_args_set to aarch64 and s390x
` [PATCH 03/13] fixup! KVM: selftests: Support multiple vCPUs in demand paging test
` [PATCH 04/13] fixup! KVM: selftests: Add memory size parameter to the "
RFC: Split EPT huge pages in advance of dirty logging
2020-02-18 17:43 UTC (2+ messages)
[PATCH] KVM: x86: enable dirty log gradually in small chunks
2020-02-18 17:26 UTC (4+ messages)
[PATCH v5 00/19] KVM: Dynamically size memslot arrays
2020-02-18 17:10 UTC (13+ messages)
` [PATCH v5 15/19] KVM: Provide common implementation for generic dirty log functions
[PATCH v17 0/9] mm / virtio: Provide support for free page reporting
2020-02-18 16:37 UTC (5+ messages)
[PATCH v2 00/42] KVM: s390: Add support for protected VMs
2020-02-18 16:33 UTC (82+ messages)
` [PATCH v2 01/42] mm:gup/writeback: add callbacks for inaccessible pages
` [PATCH v2 05/42] s390/mm: provide memory management functions for protected KVM guests
` [PATCH v2 09/42] KVM: s390: protvirt: Add initial vm and cpu lifecycle handling
` [PATCH 0/2] example changes
` [PATCH 1/2] lock changes
` [PATCH 2/2] merge vm/cpu create
` [PATCH v2.1] KVM: s390: protvirt: Add initial vm and cpu lifecycle handling
` [PATCH v2 19/42] KVM: s390: protvirt: Add new gprs location handling
` [PATCH v2 20/42] KVM: S390: protvirt: Introduce instruction data area bounce buffer
` [PATCH v2 22/42] KVM: s390/mm: handle guest unpin events
` [PATCH v2 23/42] KVM: s390: protvirt: Write sthyi data to instruction data area
` [PATCH v2 24/42] KVM: s390: protvirt: STSI handling
` [PATCH v2 25/42] KVM: s390: protvirt: disallow one_reg
` [PATCH v2 26/42] KVM: s390: protvirt: Do only reset registers that are accessible
` [PATCH v2 28/42] KVM: s390: protvirt: Add program exception injection
` [PATCH v2 29/42] KVM: s390: protvirt: Add diag 308 subcode 8 - 10 handling
` [PATCH v2 30/42] KVM: s390: protvirt: UV calls in support of diag308 0, 1
` [PATCH v2 31/42] KVM: s390: protvirt: Report CPU state to Ultravisor
` [PATCH v2 32/42] KVM: s390: protvirt: Support cmd 5 operation state
` [PATCH v2 33/42] KVM: s390: protvirt: Mask PSW interrupt bits for interception 104 and 112
` [PATCH v2 34/42] KVM: s390: protvirt: do not inject interrupts after start
` [PATCH v2 35/42] KVM: s390: protvirt: Add UV cpu reset calls
` [PATCH v2 39/42] example for future extension: mm:gup/writeback: add callbacks for inaccessible pages: error cases
` [PATCH v2 40/42] example for future extension: mm:gup/writeback: add callbacks for inaccessible pages: source indication
[PATCH v4 1/2] KVM: X86: Less kvmclock sync induced vmexits after VM boots
2020-02-18 16:31 UTC (6+ messages)
` [PATCH RESEND v4 2/2] KVM: nVMX: Hold KVM's srcu lock when syncing vmcs12->shadow
[PATCH] kvm: x86: Print "disabled by bios" only once per host
2020-02-18 16:28 UTC (3+ messages)
[RFC PATCH 0/3] KVM: x86: honor guest memory type
2020-02-18 16:28 UTC (9+ messages)
[PATCH] KVM: VMX: replace "fall through" with "return true" to indicate different case
2020-02-18 16:25 UTC (5+ messages)
[PATCH 00/35] KVM: s390: Add support for protected VMs
2020-02-18 16:02 UTC (12+ messages)
` [PATCH 01/35] mm:gup/writeback: add callbacks for inaccessible pages
[PATCH v4 00/20] irqchip/gic-v4: GICv4.1 architecture support
2020-02-18 15:31 UTC (11+ messages)
` [PATCH v4 06/20] irqchip/gic-v4.1: Add initial SGI configuration
` [PATCH v4 08/20] irqchip/gic-v4.1: Plumb get/set_irqchip_state SGI callbacks
` [PATCH v4 15/20] KVM: arm64: GICv4.1: Add direct injection capability to SGI registers
[PATCH V2 3/5] vDPA: introduce vDPA bus
2020-02-18 13:56 UTC (11+ messages)
[PATCH] vhost: introduce vDPA based backend
2020-02-18 13:53 UTC (2+ messages)
[RFC PATCH 1/2] KVM: CPUID: Enable supervisor XSAVE states in CPUID enumeration and XSS
2020-02-18 12:46 UTC (7+ messages)
[PATCH] KVM: apic: rename apic_lvt_vector and apic_lvt_enabled
2020-02-18 12:27 UTC (2+ messages)
[PATCH] KVM: LAPIC: Recalculate apic map in batch
2020-02-18 12:24 UTC (2+ messages)
[PATCH] mm/hugetlb: avoid get wrong ptep caused by race
2020-02-18 12:10 UTC
[PATCH 2/2] KVM: add support for page hinting
2020-02-18 11:45 UTC (2+ messages)
[PATCH] KVM: x86: don't notify userspace IOAPIC on edge-triggered interrupt EOI
2020-02-18 9:51 UTC (2+ messages)
[Bug 206579] New: KVM with passthrough generates "BUG: kernel NULL pointer dereference" and crashes
2020-02-18 6:45 UTC (2+ messages)
` [Bug 206579] "
[PATCH v12 Kernel 0/7] KABIs to support migration for VFIO devices
2020-02-18 5:58 UTC (10+ messages)
` [PATCH v12 Kernel 4/7] vfio iommu: Implementation of ioctl to for dirty pages tracking
[RFC v3 0/8] vfio: expose virtual Shared Virtual Addressing to VMs
2020-02-18 5:07 UTC (5+ messages)
` [RFC v3 1/8] vfio: Add VFIO_IOMMU_PASID_REQUEST(alloc/free)
[PATCH RESEND v2 1/2] KVM: Introduce pv check helpers
2020-02-18 2:12 UTC
[PATCH] KVM: apic: remove unused function apic_lvt_vector()
2020-02-18 1:56 UTC
[PATCH v2 2/2] KVM: Pre-allocate 1 cpumask variable per cpu for both pv tlb and pv ipis
2020-02-18 1:23 UTC (6+ messages)
[PATCH] KVM: x86: eliminate some unreachable code
2020-02-18 1:19 UTC
[PATCH RESEND v2 1/2] KVM: Introduce pv check helpers
2020-02-18 1:08 UTC (2+ messages)
` [PATCH RESEND v2 2/2] KVM: Pre-allocate 1 cpumask variable per cpu for both pv tlb and pv ipis
[RFC PATCH] security,anon_inodes,kvm: enable security support for anon inodes
2020-02-18 0:14 UTC (2+ messages)
[PATCH 00/12] SEV Live Migration Patchset
2020-02-17 19:49 UTC (5+ messages)
[PATCH v2] x86/cpu: Move prototype for get_umwait_control_msr() to global location
2020-02-17 18:38 UTC (2+ messages)
` [tip: x86/cleanups] x86/cpu: Move prototype for get_umwait_control_msr() to a "
[PATCH 0/2] KVM: arm/arm64: Fixes for scheudling htimer of emulated timers
2020-02-17 18:35 UTC (5+ messages)
` [PATCH 1/2] KVM: arm/arm64: Fix spurious htimer setup for emulated timer
` [PATCH 2/2] KVM: arm/arm64: Fix htimer setup for emulated timer when irq goes down
` Re: [PATCH 0/2] KVM: arm/arm64: Fixes for scheudling htimer of emulated timers
[PATCH v2 00/94] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
2020-02-17 17:43 UTC (13+ messages)
` [PATCH v2 09/94] KVM: arm64: nv: Support virtual EL2 exceptions
` [PATCH v2 12/94] KVM: arm64: nv: Add EL2->EL1 translation helpers
` [PATCH v2 15/94] KVM: arm64: nv: Handle SPSR_EL2 specially
` [PATCH v2 31/94] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
` [PATCH v2 32/94] KVM: arm64: nv: Filter out unsupported features from ID regs
[PATCH] KVM: VMX: Add VMX_FEATURE_USR_WAIT_PAUSE
2020-02-17 17:14 UTC (4+ messages)
[PATCH] KVM: Add the check and free to avoid unknown errors
2020-02-17 17:15 UTC (2+ messages)
[PATCH] KVM: apic: remove unused function apic_lvt_vector()
2020-02-17 17:13 UTC (4+ messages)
[PATCH v2] kvm/emulate: fix a -Werror=cast-function-type
2020-02-17 17:12 UTC (2+ messages)
[PATCH] KVM: x86: eliminate some unreachable code
2020-02-17 17:11 UTC (3+ messages)
[PATCH v3 2/2] KVM: nVMX: Hold KVM's srcu lock when syncing vmcs12->shadow
2020-02-17 17:09 UTC (2+ messages)
[PATCH] KVM: x86: Fix print format and coding style
2020-02-17 17:07 UTC (3+ messages)
[PATCH v2] KVM: VMX: Add 'else' to split mutually exclusive case
2020-02-17 16:40 UTC (2+ messages)
[PATCH] kvm/emulate: fix a -Werror=cast-function-type
2020-02-17 16:32 UTC (8+ messages)
[PATCH] KVM: x86: don't notify userspace IOAPIC on edge-triggered interrupt EOI
2020-02-17 16:12 UTC (2+ messages)
[PATCH 0/2] KVM: arm64: Filtering PMU events
2020-02-17 15:33 UTC (5+ messages)
` [PATCH 1/2] KVM: arm64: Add PMU event filtering infrastructure
[PATCH v2] KVM: X86: Grab KVM's srcu lock when accessing hv assist page
2020-02-17 13:16 UTC (4+ messages)
[PATCH v3 1/2] KVM: X86: Less kvmclock sync induced vmexits after VM boots
2020-02-17 13:12 UTC (3+ messages)
[PATCH v24 00/10] Add ARMv8 RAS virtualization support in QEMU
2020-02-17 13:12 UTC (11+ messages)
` [PATCH v24 01/10] acpi: nvdimm: change NVDIMM_UUID_LE to a common macro
` [PATCH v24 02/10] hw/arm/virt: Introduce a RAS machine option
` [PATCH v24 03/10] docs: APEI GHES generation and CPER record description
` [PATCH v24 04/10] ACPI: Build related register address fields via hardware error fw_cfg blob
` [PATCH v24 05/10] ACPI: Build Hardware Error Source Table
` [PATCH v24 06/10] ACPI: Record the Generic Error Status Block address
` [PATCH v24 07/10] KVM: Move hwpoison page related functions into kvm-all.c
` [PATCH v24 08/10] ACPI: Record Generic Error Status Block(GESB) table
` [PATCH v24 09/10] target-arm: kvm64: handle SIGBUS signal from kernel or KVM
` [PATCH v24 10/10] MAINTAINERS: Add ACPI/HEST/GHES entries
CPU vulnerabilities in public clouds
2020-02-17 12:30 UTC (3+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).