messages from 2017-12-04 13:16:53 to 2017-12-06 08:31:23 UTC [more...]
new KVM branch for linux-next
2017-12-06 8:31 UTC (2+ messages)
BSOD with [PATCH 00/13] mmu_notifier kill invalidate_page callback
2017-12-06 8:15 UTC (4+ messages)
` [PATCH 1/2] KVM: x86: fix APIC page invalidation
[PATCH] x86,kvm: move qemu/guest FPU switching out to vcpu_run
2017-12-06 2:48 UTC (4+ messages)
[PATCH 1/2] KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
2017-12-06 1:38 UTC (14+ messages)
` [PATCH 2/2] KVM: VMX: Use just one page for I/O permission bitmaps
[PATCH v2] KVM: VMX: Cache IA32_DEBUGCTL in memory
2017-12-06 0:15 UTC (3+ messages)
[PATCH tip/core/rcu 21/21] drivers/vhost: Remove now-redundant read_barrier_depends()
2017-12-05 23:39 UTC (22+ messages)
[PATCH v6 0/8] Handle forwarded level-triggered interrupts
2017-12-05 22:39 UTC (15+ messages)
` [PATCH v6 1/8] KVM: arm/arm64: Remove redundant preemptible checks
` [PATCH v6 2/8] KVM: arm/arm64: Factor out functionality to get vgic mmio requester_vcpu
` [PATCH v6 3/8] KVM: arm/arm64: Don't cache the timer IRQ level
` [PATCH v6 4/8] KVM: arm/arm64: vgic: Support level-triggered mapped interrupts
` [PATCH v6 5/8] KVM: arm/arm64: Support a vgic interrupt line level sample function
` [PATCH v6 6/8] KVM: arm/arm64: Support VGIC dist pend/active changes for mapped IRQs
` [PATCH v6 7/8] KVM: arm/arm64: Provide a get_input_level for the arch timer
` [PATCH v6 8/8] KVM: arm/arm64: Avoid work when userspace iqchips are not used
[PATCH v2 0/2] KVM: nVMX: misc changes
2017-12-05 21:44 UTC (2+ messages)
[PATCH] KVM: Expose new cpu features to guest
2017-12-05 21:43 UTC (2+ messages)
[PATCH] KVM: VMX: fix page leak in hardware_setup()
2017-12-05 21:37 UTC (2+ messages)
[PATCH] KVM: x86: Add emulation of MSR_SMI_COUNT
2017-12-05 21:09 UTC (2+ messages)
WARNING in x86_emulate_insn
2017-12-05 20:07 UTC
[PATCH 0/4] KVM: s390: Fixes for 4.15
2017-12-05 18:19 UTC (14+ messages)
` [PATCH 1/4] KVM: s390: add SPDX identifiers to the remaining files
` [PATCH 2/4] KVM: s390: Remove redundant license text
` [PATCH 3/4] KVM: s390: mark irq_state.flags as non-usable
` [PATCH 4/4] KVM: s390: Fix skey emulation permission check
[PULL 00/19] KVM/ARM Fixes for v4.15
2017-12-05 17:59 UTC (21+ messages)
` [PULL 01/19] KVM: arm/arm64: Don't enable/disable physical timer access on VHE
` [PULL 02/19] KVM: arm/arm64: VGIC: extend !vgic_is_initialized guard
` [PULL 03/19] KVM: arm/arm64: vgic-irqfd: Fix MSI entry allocation
` [PULL 04/19] KVM: arm/arm64: vgic: Preserve the revious read from the pending table
` [PULL 05/19] KVM: arm/arm64: vgic-its: "
` [PULL 06/19] KVM: arm/arm64: vgic-its: Check result of allocation before use
` [PULL 07/19] KVM: arm/arm64: vgic-v4: Only perform an unmap for valid vLPIs
` [PULL 08/19] arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one
` [PULL 09/19] arm: KVM: Fix "
` [PULL 10/19] KVM: arm/arm64: debug: Introduce helper for single-step
` [PULL 11/19] kvm: arm64: handle single-stepping trapped instructions
` [PULL 12/19] kvm: arm64: handle single-step of userspace mmio instructions
` [PULL 13/19] kvm: arm64: handle single-step during SError exceptions
` [PULL 14/19] kvm: arm64: handle single-step of hyp emulated mmio instructions
` [PULL 15/19] KVM: arm/arm64: Avoid attempting to load timer vgic state without a vgic
` [PULL 16/19] kvm: arm: don't treat unavailable HYP mode as an error
` [PULL 17/19] KVM: arm/arm64: Fix spinlock acquisition in vgic_set_owner
` [PULL 18/19] KVM: arm/arm64: kvm_arch_destroy_vm cleanups
` [PULL 19/19] KVM: arm/arm64: Fix broken GICH_ELRSR big endian conversion
[PATCH v2 0/4] Support Perf Extension on AMD KVM guests
2017-12-05 17:56 UTC (11+ messages)
` [PATCH v2 3/4] Add support for AMD Core Perf Extension in guest
[PATCH v2] KVM: VMX: Fix rflags cache during vCPU reset
2017-12-05 17:53 UTC (7+ messages)
[RFC 00/19] KVM: s390/crypto/vfio: guest dedicated crypto adapters
2017-12-05 15:14 UTC (32+ messages)
` [RFC 19/19] s390/facilities: enable AP facilities needed by guest
[PATCH v3 00/16] Move vcpu_load and vcpu_put calls to arch code
2017-12-05 14:39 UTC (19+ messages)
` [PATCH v3 01/16] KVM: Take vcpu->mutex outside vcpu_load
` [PATCH v3 02/16] KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code
` [PATCH v3 03/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run
` [PATCH v3 04/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs
` [PATCH v3 05/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs
` [PATCH v3 06/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_sregs
` [PATCH v3 07/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs
` [PATCH v3 08/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate
` [PATCH v3 09/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate
` [PATCH v3 10/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate
` [PATCH v3 11/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug
` [PATCH v3 12/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu
` [PATCH v3 13/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu
` [PATCH v3 14/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl
` [PATCH v3 15/16] KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN
` [PATCH v3 16/16] KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init
[PATCH v7 0/4] KVM: X86: Add Paravirt TLB Shootdown
2017-12-05 11:36 UTC (2+ messages)
[Bug 197951] New: QEMU/KVM & VFIO & PCI passthru with Windows 10 x64 guest: memory access intermittently causes CRITICAL_STRUCTURE_CORRUPTION BSOD unless swap is disabled on host, since 4.12.13
2017-12-05 10:04 UTC (7+ messages)
` [Bug 197951] "
[PATCH v2 0/5]: KVM: nVMX: Fix multiple issues with nested-posted-interrupts
2017-12-05 8:36 UTC (7+ messages)
` [PATCH v2 1/5] KVM: nVMX: Remove pi_pending as signal to process nested posted-interrupts
` [PATCH v2 2/5] KVM: nVMX: Re-evaluate L1 pending events when running L2 and L1 got posted-interrupt
` [PATCH v2 3/5] KVM: nVMX: Fix injection to L2 when L1 don't intercept external-interrupts
` [PATCH v2 4/5] KVM: nVMX: Deliver missed nested-PI notification-vector via self-IPI while interrupts disabled
` [PATCH v2 5/5] KVM: nVMX: Wake halted L2 on nested posted-interrupt
[PATCH 1/2] KVM: MMU: Fix infinite loop when there is no available mmu page
2017-12-05 6:21 UTC (2+ messages)
` [PATCH 2/2] KVM: X86: Fix load RFLAGS w/o the fixed bit
[Part2 PATCH v9 30/38] KVM: SVM: Add support for SEV LAUNCH_FINISH command
2017-12-05 1:06 UTC (9+ messages)
` [Part2 PATCH v9 31/38] KVM: SVM: Add support for SEV GUEST_STATUS command
` [Part2 PATCH v9 32/38] KVM: SVM: Add support for SEV DEBUG_DECRYPT command
` [Part2 PATCH v9 33/38] KVM: SVM: Add support for SEV DEBUG_ENCRYPT command
` [Part2 PATCH v9 34/38] KVM: SVM: Add support for SEV LAUNCH_SECRET command
` [Part2 PATCH v9 35/38] KVM: SVM: Pin guest memory when SEV is active
` [Part2 PATCH v9 36/38] KVM: SVM: Clear C-bit from the page fault address
` [Part2 PATCH v9 37/38] KVM: SVM: Do not install #UD intercept when SEV is enabled
` [Part2 PATCH v9 38/38] KVM: X86: Restart the guest when insn_len is zero and "
[Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
2017-12-05 1:04 UTC (30+ messages)
` [Part2 PATCH v9 01/38] Documentation/virtual/kvm: Add AMD Secure Encrypted Virtualization (SEV)
` [Part2 PATCH v9 02/38] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature
` [Part2 PATCH v9 03/38] kvm: svm: prepare for new bit definition in nested_ctl
` [Part2 PATCH v9 04/38] kvm: svm: Add SEV feature definitions to KVM
` [Part2 PATCH v9 05/38] KVM: SVM: Prepare to reserve asid for SEV guest
` [Part2 PATCH v9 06/38] KVM: X86: Extend CPUID range to include new leaf
` [Part2 PATCH v9 07/38] KVM: Introduce KVM_MEMORY_ENCRYPT_OP ioctl
` [Part2 PATCH v9 08/38] KVM: Introduce KVM_MEMORY_ENCRYPT_{UN,}REG_REGION ioctl
` [Part2 PATCH v9 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
` [Part2 PATCH v9 10/38] crypto: ccp: Define SEV userspace ioctl and command id
` [Part2 PATCH v9 11/38] crypto: ccp: Define SEV key management "
` [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
` [Part2 PATCH v9 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
` [Part2 PATCH v9 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
` [Part2 PATCH v9 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS "
` [Part2 PATCH v9 16/38] crypto: ccp: Implement SEV_PEK_GEN "
` [Part2 PATCH v9 17/38] crypto: ccp: Implement SEV_PDH_GEN "
` [Part2 PATCH v9 18/38] crypto: ccp: Implement SEV_PEK_CSR "
` [Part2 PATCH v9 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT "
` [Part2 PATCH v9 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT "
` [Part2 PATCH v9 21/38] KVM: X86: Add CONFIG_KVM_AMD_SEV
` [Part2 PATCH v9 22/38] KVM: SVM: Reserve ASID range for SEV guest
` [Part2 PATCH v9 23/38] KVM: SVM: Add sev module_param
` [Part2 PATCH v9 24/38] KVM: Define SEV key management command id
` [Part2 PATCH v9 25/38] KVM: SVM: Add KVM_SEV_INIT command
` [Part2 PATCH v9 26/38] KVM: SVM: VMRUN should use associated ASID when SEV is enabled
` [Part2 PATCH v9 27/38] KVM: SVM: Add support for KVM_SEV_LAUNCH_START command
` [Part2 PATCH v9 28/38] KVM: SVM: Add support for KVM_SEV_LAUNCH_UPDATE_DATA command
` [Part2 PATCH v9 29/38] KVM: SVM: Add support for KVM_SEV_LAUNCH_MEASURE command
[Bug 197861] New: Shutting down a VM with Kernel 4.14 will sometime hang and a reboot is the only way to recover
2017-12-04 20:33 UTC (2+ messages)
` [Bug 197861] "
Shutting down a VM with Kernel 4.14 will sometime hang and a reboot is the only way to recover. [1]
2017-12-04 19:51 UTC (18+ messages)
` Shutting down a VM with Kernel 4.14 will sometime hang and a reboot is the only way to recover
[PATCH v5 0/8] Handle forwarded level-triggered interrupts
2017-12-04 19:31 UTC (7+ messages)
` [PATCH v5 2/8] KVM: arm/arm64: Factor out functionality to get vgic mmio requester_vcpu
` [PATCH v5 6/8] KVM: arm/arm64: Support VGIC dist pend/active changes for mapped IRQs
[PATCH 0/2] x86:kvm:hyperv: guest->host event signaling via eventfd
2017-12-04 19:00 UTC (3+ messages)
` [PATCH 1/2] x86:kvm:hyperv: factor out kvm.arch.hyperv (de)init
` [PATCH 2/2] x86:kvm:hyperv: guest->host event signaling via eventfd
[PATCH v2 0/2] Fix use after free in HPT resizing code and related minor improvements
2017-12-04 15:02 UTC (4+ messages)
` [PATCH v2 1/2] KVM: PPC: Book3S HV: Drop prepare_done from struct kvm_resize_hpt and cleanups
` [PATCH v2 2/2] KVM: PPC: Book3S HV: Fix use after free in case of multiple resize requests
[RFC v2 PATCH] ksm: add offset arg to memcmp_pages() to speedup comparing
2017-12-04 14:55 UTC (2+ messages)
[PULL 00/19] KVM/ARM Fixes for v4.15
2017-12-04 14:28 UTC (2+ messages)
[RFC PATCH v3 0/1] VM introspection
2017-12-04 14:09 UTC (3+ messages)
[PULL] vhost: cleanups and fixes
2017-12-04 13:25 UTC
Using KVM from a process inside a Docker container
2017-12-04 13:16 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).