Jan Beulich ([email protected])

Number of posts: 1047 (0.5 per day)
First post: 2012-02-03 15:06:32
Last post: 2017-11-08 11:19:59

Date List Subject
2022-11-11 13:41:32 linux-kernel Re: [PATCH v4] x86/xen: Add support for HVMOP_set_evtchn_upcall_vector
2022-11-08 17:00:13 linux-kernel Re: [PATCH v4] x86/xen: Add support for HVMOP_set_evtchn_upcall_vector
2022-11-03 16:47:50 linux-kernel Re: [PATCH v4] x86/xen: Add support for HVMOP_set_evtchn_upcall_vector
2022-11-03 13:49:24 linux-kernel Re: [PATCH v4] x86/xen: Add support for HVMOP_set_evtchn_upcall_vector
2022-10-20 13:41:09 linux-kernel Re: [PATCH] x86/xen: silence smatch warning in pmu_msr_chk_emulated()
2022-10-06 09:31:25 linux-kernel Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
2022-10-06 07:38:26 linux-kernel [PATCH] x86/assembly: replace MOVSD uses
2022-10-05 12:28:25 linux-kernel Re: [PATCH v3 2/4] xen/pv: fix vendor checks for pmu emulation
2022-10-05 12:25:05 linux-kernel Re: [PATCH v3 1/4] xen/pv: add fault recovery control to pmu msr accesses
2022-10-05 06:33:04 linux-kernel Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
2022-10-04 16:14:55 linux-kernel Re: [PATCH v2 1/3] xen/pv: allow pmu msr accesses to cause GP
2022-10-04 12:13:17 linux-kernel Re: [PATCH v2 2/3] xen/pv: refactor msr access functions to support safe and unsafe accesses
2022-10-04 11:06:55 linux-kernel Re: [PATCH v2 1/3] xen/pv: allow pmu msr accesses to cause GP
2022-10-04 09:24:39 linux-kernel Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
2022-09-30 07:12:59 linux-kernel Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
2022-09-26 18:02:31 linux-kernel Re: [PATCH 1/3] xen/pv: allow pmu msr accesses to cause GP
2022-09-26 17:54:33 linux-kernel Re: [PATCH 3/3] xen/pv: support selecting safe/unsafe msr accesses
2022-09-22 06:50:01 linux-kernel Re: [PATCH v3] Support ESRT in Xen dom0
2022-09-21 21:24:14 linux-kernel Re: [PATCH v3] Support ESRT in Xen dom0
2022-09-20 16:16:43 linux-kernel Re: [PATCH v3] Support ESRT in Xen dom0
2022-09-15 15:01:34 linux-kernel Re: [PATCH] xen/xenbus: fix xenbus_setup_ring()
2022-09-15 12:27:55 linux-kernel Re: [PATCH] xen/privcmd: remove privcmd_ioctl_mmap()
2022-09-15 09:42:54 linux-kernel Re: [PATCH] xen/privcmd: remove privcmd_ioctl_mmap()
2022-09-06 07:10:27 linux-kernel Re: [PATCH] Add support for ESRT loading under Xen
2022-08-26 08:22:18 linux-kernel Re: [PATCH] Add support for ESRT loading under Xen
2022-08-25 15:17:27 linux-kernel Re: [PATCH v4] xen/privcmd: fix error exit of privcmd_ioctl_dm_op()
2022-08-25 12:53:59 linux-kernel Re: [PATCH v3] xen/privcmd: fix error exit of privcmd_ioctl_dm_op()
2022-08-25 12:50:26 linux-kernel Re: [PATCH v3] xen/privcmd: fix error exit of privcmd_ioctl_dm_op()
2022-08-25 11:03:22 linux-kernel Re: [PATCH v2] xen/privcmd: fix error exit of privcmd_ioctl_dm_op()
2022-08-25 10:23:26 linux-kernel Re: [PATCH v2] xen/privcmd: fix error exit of privcmd_ioctl_dm_op()
2022-08-25 08:33:38 linux-kernel Re: [PATCH] xen/privcmd: fix error exit of privcmd_ioctl_dm_op()
2022-08-24 15:00:57 linux-kernel Re: [POSSIBLE BUG] Dereferencing of NULL pointer
2022-08-16 10:08:59 linux-kernel Re: [PATCH] x86/entry: fix entry_INT80_compat for Xen PV guests
2022-08-10 07:17:08 linux-kernel Re: [PATCH 1/4] xen: x86: set the config XEN_512GB after config change
2022-07-18 11:52:49 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-18 06:28:32 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-15 10:10:08 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-14 06:43:39 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-13 15:07:16 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-13 14:05:30 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-13 14:01:55 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-13 09:58:00 linux-kernel Re: [PATCH] xen/netback: handle empty rx queue in xenvif_rx_next_skb()
2022-07-13 09:29:47 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-13 08:13:19 linux-kernel Re: [PATCH] xen/netback: handle empty rx queue in xenvif_rx_next_skb()
2022-07-13 06:35:47 linux-kernel Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-13 06:01:01 linux-kernel Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR
2022-07-12 06:39:50 linux-kernel Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen
2022-07-07 06:47:37 linux-kernel Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen
2022-07-06 06:29:22 linux-kernel Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen
2022-07-05 16:13:06 linux-kernel Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen
2022-07-05 11:25:02 linux-kernel Re: Ping: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen