kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-12-04 13:16:53 to 2017-12-06 08:31:23 UTC [more...]

new KVM branch for linux-next
 2017-12-06  8:31 UTC  (2+ messages)

BSOD with [PATCH 00/13] mmu_notifier kill invalidate_page callback
 2017-12-06  8:15 UTC  (4+ messages)
` [PATCH 1/2] KVM: x86: fix APIC page invalidation

[PATCH] x86,kvm: move qemu/guest FPU switching out to vcpu_run
 2017-12-06  2:48 UTC  (4+ messages)

[PATCH 1/2] KVM: VMX: remove I/O port 0x80 bypass on Intel hosts
 2017-12-06  1:38 UTC  (14+ messages)
` [PATCH 2/2] KVM: VMX: Use just one page for I/O permission bitmaps

[PATCH v2] KVM: VMX: Cache IA32_DEBUGCTL in memory
 2017-12-06  0:15 UTC  (3+ messages)

[PATCH tip/core/rcu 21/21] drivers/vhost: Remove now-redundant read_barrier_depends()
 2017-12-05 23:39 UTC  (22+ messages)

[PATCH v6 0/8] Handle forwarded level-triggered interrupts
 2017-12-05 22:39 UTC  (15+ messages)
` [PATCH v6 1/8] KVM: arm/arm64: Remove redundant preemptible checks
` [PATCH v6 2/8] KVM: arm/arm64: Factor out functionality to get vgic mmio requester_vcpu
` [PATCH v6 3/8] KVM: arm/arm64: Don't cache the timer IRQ level
` [PATCH v6 4/8] KVM: arm/arm64: vgic: Support level-triggered mapped interrupts
` [PATCH v6 5/8] KVM: arm/arm64: Support a vgic interrupt line level sample function
` [PATCH v6 6/8] KVM: arm/arm64: Support VGIC dist pend/active changes for mapped IRQs
` [PATCH v6 7/8] KVM: arm/arm64: Provide a get_input_level for the arch timer
` [PATCH v6 8/8] KVM: arm/arm64: Avoid work when userspace iqchips are not used

[PATCH v2 0/2] KVM: nVMX: misc changes
 2017-12-05 21:44 UTC  (2+ messages)

[PATCH] KVM: Expose new cpu features to guest
 2017-12-05 21:43 UTC  (2+ messages)

[PATCH] KVM: VMX: fix page leak in hardware_setup()
 2017-12-05 21:37 UTC  (2+ messages)

[PATCH] KVM: x86: Add emulation of MSR_SMI_COUNT
 2017-12-05 21:09 UTC  (2+ messages)

WARNING in x86_emulate_insn
 2017-12-05 20:07 UTC 

[PATCH 0/4] KVM: s390: Fixes for 4.15
 2017-12-05 18:19 UTC  (14+ messages)
` [PATCH 1/4] KVM: s390: add SPDX identifiers to the remaining files
` [PATCH 2/4] KVM: s390: Remove redundant license text
` [PATCH 3/4] KVM: s390: mark irq_state.flags as non-usable
` [PATCH 4/4] KVM: s390: Fix skey emulation permission check

[PULL 00/19] KVM/ARM Fixes for v4.15
 2017-12-05 17:59 UTC  (21+ messages)
` [PULL 01/19] KVM: arm/arm64: Don't enable/disable physical timer access on VHE
` [PULL 02/19] KVM: arm/arm64: VGIC: extend !vgic_is_initialized guard
` [PULL 03/19] KVM: arm/arm64: vgic-irqfd: Fix MSI entry allocation
` [PULL 04/19] KVM: arm/arm64: vgic: Preserve the revious read from the pending table
` [PULL 05/19] KVM: arm/arm64: vgic-its: "
` [PULL 06/19] KVM: arm/arm64: vgic-its: Check result of allocation before use
` [PULL 07/19] KVM: arm/arm64: vgic-v4: Only perform an unmap for valid vLPIs
` [PULL 08/19] arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one
` [PULL 09/19] arm: KVM: Fix "
` [PULL 10/19] KVM: arm/arm64: debug: Introduce helper for single-step
` [PULL 11/19] kvm: arm64: handle single-stepping trapped instructions
` [PULL 12/19] kvm: arm64: handle single-step of userspace mmio instructions
` [PULL 13/19] kvm: arm64: handle single-step during SError exceptions
` [PULL 14/19] kvm: arm64: handle single-step of hyp emulated mmio instructions
` [PULL 15/19] KVM: arm/arm64: Avoid attempting to load timer vgic state without a vgic
` [PULL 16/19] kvm: arm: don't treat unavailable HYP mode as an error
` [PULL 17/19] KVM: arm/arm64: Fix spinlock acquisition in vgic_set_owner
` [PULL 18/19] KVM: arm/arm64: kvm_arch_destroy_vm cleanups
` [PULL 19/19] KVM: arm/arm64: Fix broken GICH_ELRSR big endian conversion

[PATCH v2 0/4] Support Perf Extension on AMD KVM guests
 2017-12-05 17:56 UTC  (11+ messages)
` [PATCH v2 3/4] Add support for AMD Core Perf Extension in guest

[PATCH v2] KVM: VMX: Fix rflags cache during vCPU reset
 2017-12-05 17:53 UTC  (7+ messages)

[RFC 00/19] KVM: s390/crypto/vfio: guest dedicated crypto adapters
 2017-12-05 15:14 UTC  (32+ messages)
` [RFC 19/19] s390/facilities: enable AP facilities needed by guest

[PATCH v3 00/16] Move vcpu_load and vcpu_put calls to arch code
 2017-12-05 14:39 UTC  (19+ messages)
` [PATCH v3 01/16] KVM: Take vcpu->mutex outside vcpu_load
` [PATCH v3 02/16] KVM: Prepare for moving vcpu_load/vcpu_put into arch specific code
` [PATCH v3 03/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_run
` [PATCH v3 04/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_regs
` [PATCH v3 05/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_regs
` [PATCH v3 06/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_sregs
` [PATCH v3 07/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_sregs
` [PATCH v3 08/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_mpstate
` [PATCH v3 09/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_mpstate
` [PATCH v3 10/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_translate
` [PATCH v3 11/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_guest_debug
` [PATCH v3 12/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_get_fpu
` [PATCH v3 13/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl_set_fpu
` [PATCH v3 14/16] KVM: Move vcpu_load to arch-specific kvm_arch_vcpu_ioctl
` [PATCH v3 15/16] KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN
` [PATCH v3 16/16] KVM: arm/arm64: Move vcpu_load call after kvm_vcpu_first_run_init

[PATCH v7 0/4] KVM: X86: Add Paravirt TLB Shootdown
 2017-12-05 11:36 UTC  (2+ messages)

[Bug 197951] New: QEMU/KVM & VFIO & PCI passthru with Windows 10 x64 guest: memory access intermittently causes CRITICAL_STRUCTURE_CORRUPTION BSOD unless swap is disabled on host, since 4.12.13
 2017-12-05 10:04 UTC  (7+ messages)
` [Bug 197951] "

[PATCH v2 0/5]: KVM: nVMX: Fix multiple issues with nested-posted-interrupts
 2017-12-05  8:36 UTC  (7+ messages)
` [PATCH v2 1/5] KVM: nVMX: Remove pi_pending as signal to process nested posted-interrupts
` [PATCH v2 2/5] KVM: nVMX: Re-evaluate L1 pending events when running L2 and L1 got posted-interrupt
` [PATCH v2 3/5] KVM: nVMX: Fix injection to L2 when L1 don't intercept external-interrupts
` [PATCH v2 4/5] KVM: nVMX: Deliver missed nested-PI notification-vector via self-IPI while interrupts disabled
` [PATCH v2 5/5] KVM: nVMX: Wake halted L2 on nested posted-interrupt

[PATCH 1/2] KVM: MMU: Fix infinite loop when there is no available mmu page
 2017-12-05  6:21 UTC  (2+ messages)
` [PATCH 2/2] KVM: X86: Fix load RFLAGS w/o the fixed bit

[Part2 PATCH v9 30/38] KVM: SVM: Add support for SEV LAUNCH_FINISH command
 2017-12-05  1:06 UTC  (9+ messages)
` [Part2 PATCH v9 31/38] KVM: SVM: Add support for SEV GUEST_STATUS command
` [Part2 PATCH v9 32/38] KVM: SVM: Add support for SEV DEBUG_DECRYPT command
` [Part2 PATCH v9 33/38] KVM: SVM: Add support for SEV DEBUG_ENCRYPT command
` [Part2 PATCH v9 34/38] KVM: SVM: Add support for SEV LAUNCH_SECRET command
` [Part2 PATCH v9 35/38] KVM: SVM: Pin guest memory when SEV is active
` [Part2 PATCH v9 36/38] KVM: SVM: Clear C-bit from the page fault address
` [Part2 PATCH v9 37/38] KVM: SVM: Do not install #UD intercept when SEV is enabled
` [Part2 PATCH v9 38/38] KVM: X86: Restart the guest when insn_len is zero and "

[Part2 PATCH v9 00/38] x86: Secure Encrypted Virtualization (AMD)
 2017-12-05  1:04 UTC  (30+ messages)
` [Part2 PATCH v9 01/38] Documentation/virtual/kvm: Add AMD Secure Encrypted Virtualization (SEV)
` [Part2 PATCH v9 02/38] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature
` [Part2 PATCH v9 03/38] kvm: svm: prepare for new bit definition in nested_ctl
` [Part2 PATCH v9 04/38] kvm: svm: Add SEV feature definitions to KVM
` [Part2 PATCH v9 05/38] KVM: SVM: Prepare to reserve asid for SEV guest
` [Part2 PATCH v9 06/38] KVM: X86: Extend CPUID range to include new leaf
` [Part2 PATCH v9 07/38] KVM: Introduce KVM_MEMORY_ENCRYPT_OP ioctl
` [Part2 PATCH v9 08/38] KVM: Introduce KVM_MEMORY_ENCRYPT_{UN,}REG_REGION ioctl
` [Part2 PATCH v9 09/38] crypto: ccp: Build the AMD secure processor driver only with AMD CPU support
` [Part2 PATCH v9 10/38] crypto: ccp: Define SEV userspace ioctl and command id
` [Part2 PATCH v9 11/38] crypto: ccp: Define SEV key management "
` [Part2 PATCH v9 12/38] crypto: ccp: Add Platform Security Processor (PSP) device support
` [Part2 PATCH v9 13/38] crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support
` [Part2 PATCH v9 14/38] crypto: ccp: Implement SEV_FACTORY_RESET ioctl command
` [Part2 PATCH v9 15/38] crypto: ccp: Implement SEV_PLATFORM_STATUS "
` [Part2 PATCH v9 16/38] crypto: ccp: Implement SEV_PEK_GEN "
` [Part2 PATCH v9 17/38] crypto: ccp: Implement SEV_PDH_GEN "
` [Part2 PATCH v9 18/38] crypto: ccp: Implement SEV_PEK_CSR "
` [Part2 PATCH v9 19/38] crypto: ccp: Implement SEV_PEK_CERT_IMPORT "
` [Part2 PATCH v9 20/38] crypto: ccp: Implement SEV_PDH_CERT_EXPORT "
` [Part2 PATCH v9 21/38] KVM: X86: Add CONFIG_KVM_AMD_SEV
` [Part2 PATCH v9 22/38] KVM: SVM: Reserve ASID range for SEV guest
` [Part2 PATCH v9 23/38] KVM: SVM: Add sev module_param
` [Part2 PATCH v9 24/38] KVM: Define SEV key management command id
` [Part2 PATCH v9 25/38] KVM: SVM: Add KVM_SEV_INIT command
` [Part2 PATCH v9 26/38] KVM: SVM: VMRUN should use associated ASID when SEV is enabled
` [Part2 PATCH v9 27/38] KVM: SVM: Add support for KVM_SEV_LAUNCH_START command
` [Part2 PATCH v9 28/38] KVM: SVM: Add support for KVM_SEV_LAUNCH_UPDATE_DATA command
` [Part2 PATCH v9 29/38] KVM: SVM: Add support for KVM_SEV_LAUNCH_MEASURE command

[Bug 197861] New: Shutting down a VM with Kernel 4.14 will sometime hang and a reboot is the only way to recover
 2017-12-04 20:33 UTC  (2+ messages)
` [Bug 197861] "

Shutting down a VM with Kernel 4.14 will sometime hang and a reboot is the only way to recover. [1]
 2017-12-04 19:51 UTC  (18+ messages)
    ` Shutting down a VM with Kernel 4.14 will sometime hang and a reboot is the only way to recover

[PATCH v5 0/8] Handle forwarded level-triggered interrupts
 2017-12-04 19:31 UTC  (7+ messages)
` [PATCH v5 2/8] KVM: arm/arm64: Factor out functionality to get vgic mmio requester_vcpu
` [PATCH v5 6/8] KVM: arm/arm64: Support VGIC dist pend/active changes for mapped IRQs

[PATCH 0/2] x86:kvm:hyperv: guest->host event signaling via eventfd
 2017-12-04 19:00 UTC  (3+ messages)
` [PATCH 1/2] x86:kvm:hyperv: factor out kvm.arch.hyperv (de)init
` [PATCH 2/2] x86:kvm:hyperv: guest->host event signaling via eventfd

[PATCH v2 0/2] Fix use after free in HPT resizing code and related minor improvements
 2017-12-04 15:02 UTC  (4+ messages)
` [PATCH v2 1/2] KVM: PPC: Book3S HV: Drop prepare_done from struct kvm_resize_hpt and cleanups
` [PATCH v2 2/2] KVM: PPC: Book3S HV: Fix use after free in case of multiple resize requests

[RFC v2 PATCH] ksm: add offset arg to memcmp_pages() to speedup comparing
 2017-12-04 14:55 UTC  (2+ messages)

[PULL 00/19] KVM/ARM Fixes for v4.15
 2017-12-04 14:28 UTC  (2+ messages)

[RFC PATCH v3 0/1] VM introspection
 2017-12-04 14:09 UTC  (3+ messages)

[PULL] vhost: cleanups and fixes
 2017-12-04 13:25 UTC 

Using KVM from a process inside a Docker container
 2017-12-04 13:16 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).