public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-01-26 15:53:45 to 2018-01-30 03:13:53 UTC [more...]

[PATCH 00/26] KVM: PPC: Book3S PR: Transaction memory support on PR KVM
 2018-01-30  3:13 UTC  (27+ messages)
` [PATCH 02/26] KVM: PPC: Book3S PR: add new parameter (guest MSR) for kvmppc_save_tm()/kvmppc_restore_tm()
` [PATCH 04/26] KVM: PPC: Book3S PR: add C function wrapper for _kvmppc_save/restore_tm()
` [PATCH 13/26] KVM: PPC: Book3S PR: adds new kvmppc_copyto_vcpu_tm/kvmppc_copyfrom_vcpu_tm API for PR KVM
` [PATCH 16/26] KVM: PPC: Book3S PR: add transaction memory save/restore skeleton "
` [PATCH 17/26] KVM: PPC: Book3S PR: add math support for PR KVM HTM
` [PATCH 18/26] KVM: PPC: Book3S PR: make mtspr/mfspr emulation behavior based on active TM SPRs
` [PATCH 19/26] KVM: PPC: Book3S PR: always fail transaction in guest privilege state
` [PATCH 22/26] KVM: PPC: Book3S PR: add emulation for trechkpt in PR KVM

[RFC 05/10] x86/speculation: Add basic IBRS support infrastructure
 2018-01-30  3:13 UTC  (20+ messages)
` [RFC,05/10] "

[RFC,05/10] x86/speculation: Add basic IBRS support infrastructure
 2018-01-30  1:30 UTC  (8+ messages)

[PATCH v3 0/4] KVM: Expose speculation control feature to guests
 2018-01-30  0:25 UTC  (7+ messages)
` [PATCH v3 1/4] KVM: x86: Update the reverse_cpuid list to include CPUID_7_EDX
` [PATCH v3 2/4] KVM: x86: Add IBPB support
` [PATCH v3 3/4] KVM: VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
` [PATCH v3 4/4] KVM: VMX: Allow direct access to MSR_IA32_SPEC_CTRL

[PATCH] KVM: PPC: Book3S HV: Drop locks before reading guest memory
 2018-01-29 23:51 UTC 

[PATCH] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
 2018-01-29 23:01 UTC  (10+ messages)

[PATCH v4 0/7] x86/kvm/hyperv: stable clocksource for L2 guests when running nested KVM on Hyper-V
 2018-01-29 21:48 UTC  (4+ messages)
` [PATCH v4 5/7] x86/irq: Count Hyper-V reenlightenment interrupts

[PATCH v3 0/2] KVM: x86: Add SYNC REGS functionality
 2018-01-29 21:13 UTC  (6+ messages)
` [PATCH v3 1/2] KVM: x86: add SYNC_REGS_SIZE_BYTES #define
` [PATCH v3 2/2] KVM: x86: KVM_CAP_SYNC_REGS

3.400,000.00 Eur
 2018-01-29 20:05 UTC 

3.400,000.00 Eur
 2018-01-29 20:05 UTC 

[RFC][PATCH 0/5] s390: improve speculative execution handling v2
 2018-01-29 20:12 UTC  (11+ messages)
` [PATCH 1/5] prctl: add PR_ISOLATE_BP process control
      ` Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]

[PATCH] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
 2018-01-29 19:27 UTC  (16+ messages)

[PATCH v2 0/4] KVM: Expose speculation control feature to guests
 2018-01-29 19:19 UTC  (16+ messages)
` [PATCH v2 1/4] x86: kvm: Update the reverse_cpuid list to include CPUID_7_EDX
` [PATCH v2 2/4] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
` [PATCH v2 3/4] x86/kvm: Add IBPB support
` [PATCH v2 4/4] x86: vmx: Allow direct access to MSR_IA32_ARCH_CAPABILITIES

[PATCH v6 00/23] x86: Secure Encrypted Virtualization (AMD)
 2018-01-29 18:31 UTC  (28+ messages)
` [PATCH v6 01/23] memattrs: add debug attribute
` [PATCH v6 02/23] exec: add ram_debug_ops support
` [PATCH v6 03/23] exec: add debug version of physical memory read and write API
` [PATCH v6 04/23] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v6 05/23] target/i386: add memory encryption feature cpuid support
` [PATCH v6 06/23] machine: add -memory-encryption property
` [PATCH v6 07/23] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v6 08/23] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v6 09/23] accel: add Secure Encrypted Virtulization (SEV) object
` [PATCH v6 10/23] sev: add command to initialize the memory encryption context
` [PATCH v6 11/23] sev: register the guest memory range which may contain encrypted data
` [PATCH v6 12/23] kvm: introduce memory encryption APIs
` [PATCH v6 13/23] hmp: display memory encryption support in 'info kvm'
` [PATCH v6 14/23] sev: add command to create launch memory encryption context
` [PATCH v6 15/23] sev: add command to encrypt guest memory region
` [PATCH v6 16/23] target/i386: encrypt bios rom
` [PATCH v6 17/23] qapi: add SEV_MEASUREMENT event
` [PATCH v6 18/23] sev: emit the "
` [PATCH v6 19/23] sev: Finalize the SEV guest launch flow
` [PATCH v6 20/23] hw: i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v6 21/23] sev: add debug encrypt and decrypt commands
` [PATCH v6 22/23] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v6 23/23] sev: add migration blocker
` [Qemu-devel] [PATCH v6 00/23] x86: Secure Encrypted Virtualization (AMD)

Shared value between host and guests
 2018-01-29 17:45 UTC  (9+ messages)

[PATCH] KVM:x86: AMD Processor Topology Information
 2018-01-29 16:39 UTC  (4+ messages)

[PATCH v2 1/2] i386: Add Intel Processor Trace feature support
 2018-01-29 16:27 UTC  (4+ messages)

[PATCH v2 0/3] Per-VCPU MSR bitmaps patches - topic branch for x86/pti
 2018-01-29 14:57 UTC  (9+ messages)
` [PATCH v2 1/3] KVM: nVMX: Eliminate vmcs02 pool
` [PATCH v2 2/3] KVM: VMX: introduce alloc_loaded_vmcs
` [PATCH v2 3/3] KVM: VMX: make MSR bitmaps per-VCPU

[RFC 00/10] Speculation Control feature support
 2018-01-29 14:07 UTC  (5+ messages)
` [RFC 04/10] x86/mm: Only flush indirect branches when switching into non dumpable process

linux-next: manual merge of the kvm tree with Linus' tree
 2018-01-29 10:35 UTC  (8+ messages)

[PULL 1/1] kvm-all: Partially reverts 4fe6d78b2e to remove the cleanup call
 2018-01-29  7:48 UTC  (9+ messages)
  ` [Qemu-devel] "

KASAN: use-after-free Write in irq_bypass_register_consumer
 2018-01-29  5:29 UTC  (6+ messages)
    `  "

[RFC 09/10] x86/enter: Create macros to restrict/unrestrict Indirect Branch Speculation
 2018-01-27 15:55 UTC  (20+ messages)

[PATCH v24 0/2] Virtio-balloon: support free page reporting
 2018-01-27 14:00 UTC  (8+ messages)
` [PATCH v24 1/2] mm: support reporting free page blocks

[PATCH 0/3] Per-VCPU MSR bitmaps patches - topic branch for x86/pti
 2018-01-27  8:39 UTC  (5+ messages)
` [PATCH 1/3] KVM: nVMX: Eliminate vmcs02 pool
` [PATCH 2/3] KVM: VMX: introduce alloc_loaded_vmcs
` [PATCH 3/3] KVM: VMX: make MSR bitmaps per-VCPU

KASAN: stack-out-of-bounds Read in write_mmio
 2018-01-27  1:36 UTC  (4+ messages)

BUG: unable to handle kernel NULL pointer dereference in irq_bypass_register_consumer
 2018-01-26 23:25 UTC  (3+ messages)

[PATCH 0/5] Enable TOPOEXT to support hyperthreading on AMD CPU
 2018-01-26 21:39 UTC  (6+ messages)
` [PATCH 1/5] target/i386: Fix instruction cache associativity for AMD
` [PATCH 2/5] target/i386: Populate AMD Processor Cache Information
` [PATCH 3/5] target/i386: Add support for CPUID_8000_001E for AMD
` [PATCH 4/5] target/i386: Enable TOPOEXT feature on AMD EPYC CPU
` [PATCH 5/5] target/i386: Remove generic SMT thread check

BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:LINE
 2018-01-26 21:11 UTC  (3+ messages)

WARNING in do_debug
 2018-01-26 19:47 UTC  (4+ messages)

Back porting preemption timer patches from 4.13 to 4.9 RT kernel
 2018-01-26 19:10 UTC  (2+ messages)

[PATCH v2] x86/kvm/vmx: do not use vm-exit instruction length for fast MMIO when running nested
 2018-01-26 17:19 UTC  (2+ messages)

[GIT PULL 00/22] KVM: s390: Fixes and features for 4.16 part 2
 2018-01-26 15:53 UTC  (15+ messages)
` [GIT PULL 09/22] KVM: s390: introduce and use kvm_s390_clear_cpuflags()
` [GIT PULL 10/22] KVM: s390: introduce and use kvm_s390_test_cpuflags()
` [GIT PULL 11/22] KVM: s390: reverse bit ordering of irqs in pending mask
` [GIT PULL 12/22] KVM: s390: define GISA format-0 data structure
` [GIT PULL 13/22] s390/bitops: add test_and_clear_bit_inv()
` [GIT PULL 14/22] KVM: s390: implement GISA IPM related primitives
` [GIT PULL 15/22] s390/css: indicate the availability of the AIV facility
` [GIT PULL 16/22] KVM: s390: exploit GISA and AIV for emulated interrupts
` [GIT PULL 17/22] KVM: s390: abstract adapter interruption word generation from ISC
` [GIT PULL 18/22] KVM: s390: add GISA interrupts to FLIC ioctl interface
` [GIT PULL 19/22] KVM: s390: make kvm_s390_get_io_int() aware of GISA
` [GIT PULL 20/22] KVM: s390: activate GISA for emulated interrupts
` [GIT PULL 21/22] s390/sclp: expose the GISA format facility
` [GIT PULL 22/22] KVM: s390: introduce the format-1 GISA


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox