messages from 2018-01-26 19:14:13 to 2018-01-30 14:06:22 UTC [more...]
[PATCH] kvm: x86: remove efer_reload entry in kvm_vcpu_stat
2018-01-30 14:06 UTC (2+ messages)
[PATCH v4 0/7] x86/kvm/hyperv: stable clocksource for L2 guests when running nested KVM on Hyper-V
2018-01-30 14:02 UTC (5+ messages)
` [PATCH v4 5/7] x86/irq: Count Hyper-V reenlightenment interrupts
[PATCH] KVM:x86: AMD Processor Topology Information
2018-01-30 13:54 UTC (5+ messages)
[RFC 05/10] x86/speculation: Add basic IBRS support infrastructure
2018-01-30 13:54 UTC (27+ messages)
` [RFC,05/10] "
Darlehensangebot
2018-01-30 13:35 UTC
[PATCH 9/8] KVM: x86: limit MSR_IA32_SPEC_CTRL access based on CPUID availability
2018-01-30 13:21 UTC (2+ messages)
` [9/8] "
[PATCH v2 0/3] Per-VCPU MSR bitmaps patches - topic branch for x86/pti
2018-01-30 13:07 UTC (10+ messages)
` [PATCH v2 1/3] KVM: nVMX: Eliminate vmcs02 pool
` [PATCH v2 2/3] KVM: VMX: introduce alloc_loaded_vmcs
` [PATCH v2 3/3] KVM: VMX: make MSR bitmaps per-VCPU
` [v2,3/3] "
[PATCH v9 0/9] Handle forwarded level-triggered interrupts
2018-01-30 12:49 UTC (4+ messages)
` [PATCH v9 7/9] KVM: arm/arm64: Provide a get_input_level for the arch timer
[PATCH] KVM: arm/arm64: Fix arch timers with userspace irqchips
2018-01-30 12:46 UTC
[PATCH 0/3] Additional fixes for kvmarm/next
2018-01-30 12:42 UTC (4+ messages)
` [PATCH 1/3] KVM: arm/arm64: Fix incorrect timer_is_pending logic
` [PATCH 2/3] KVM: arm/arm64: Fix userspace_irqchip_in_use counting
` [PATCH 3/3] KVM: arm/arm64: Fixup userspace irqchip static key optimization
[PATCH v3 0/2] KVM: x86: Add SYNC REGS functionality
2018-01-30 11:35 UTC (8+ messages)
` [PATCH v3 1/2] KVM: x86: add SYNC_REGS_SIZE_BYTES #define
` [PATCH v3 2/2] KVM: x86: KVM_CAP_SYNC_REGS
[RFC/PATCH v2 00/22] KVM/s390: Hugetlbfs enablement
2018-01-30 10:19 UTC (3+ messages)
` [PATCH v2] mm: s390: Only notify on 4k pages
KASAN: use-after-free Read in perf_trace_lock_acquire (2)
2018-01-30 9:52 UTC
[PATCH v3 0/4] KVM: Expose speculation control feature to guests
2018-01-30 9:32 UTC (9+ messages)
` [PATCH v3 1/4] KVM: x86: Update the reverse_cpuid list to include CPUID_7_EDX
` [PATCH v3 2/4] KVM: x86: Add IBPB support
` [PATCH v3 3/4] KVM: VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
` [PATCH v3 4/4] KVM: VMX: Allow direct access to MSR_IA32_SPEC_CTRL
[RFC PATCH 0/3] vfio: ccw: basic channel path event handling
2018-01-30 5:27 UTC (7+ messages)
` [Qemu-devel] "
[PATCH 00/26] KVM: PPC: Book3S PR: Transaction memory support on PR KVM
2018-01-30 3:26 UTC (36+ messages)
` [PATCH 02/26] KVM: PPC: Book3S PR: add new parameter (guest MSR) for kvmppc_save_tm()/kvmppc_restore_tm()
` [PATCH 04/26] KVM: PPC: Book3S PR: add C function wrapper for _kvmppc_save/restore_tm()
` [PATCH 13/26] KVM: PPC: Book3S PR: adds new kvmppc_copyto_vcpu_tm/kvmppc_copyfrom_vcpu_tm API for PR KVM
` [PATCH 16/26] KVM: PPC: Book3S PR: add transaction memory save/restore skeleton "
` [PATCH 17/26] KVM: PPC: Book3S PR: add math support for PR KVM HTM
` [PATCH 18/26] KVM: PPC: Book3S PR: make mtspr/mfspr emulation behavior based on active TM SPRs
` [PATCH 19/26] KVM: PPC: Book3S PR: always fail transaction in guest privilege state
` [PATCH 21/26] KVM: PPC: Book3S PR: adds emulation for treclaim
` [PATCH 22/26] KVM: PPC: Book3S PR: add emulation for trechkpt in PR KVM
` [PATCH 23/26] KVM: PPC: Book3S PR: add emulation for tabort. for privilege guest
` [PATCH 25/26] KVM: PPC: Book3S PR: Support TAR handling for PR KVM HTM
[RFC,05/10] x86/speculation: Add basic IBRS support infrastructure
2018-01-30 1:30 UTC (8+ messages)
[PATCH] KVM: PPC: Book3S HV: Drop locks before reading guest memory
2018-01-29 23:51 UTC
[PATCH] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
2018-01-29 23:01 UTC (10+ messages)
3.400,000.00 Eur
2018-01-29 20:05 UTC
3.400,000.00 Eur
2018-01-29 20:05 UTC
[RFC][PATCH 0/5] s390: improve speculative execution handling v2
2018-01-29 20:12 UTC (11+ messages)
` [PATCH 1/5] prctl: add PR_ISOLATE_BP process control
` Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]
[PATCH] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
2018-01-29 19:27 UTC (16+ messages)
[PATCH v2 0/4] KVM: Expose speculation control feature to guests
2018-01-29 19:19 UTC (16+ messages)
` [PATCH v2 1/4] x86: kvm: Update the reverse_cpuid list to include CPUID_7_EDX
` [PATCH v2 2/4] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
` [PATCH v2 3/4] x86/kvm: Add IBPB support
` [PATCH v2 4/4] x86: vmx: Allow direct access to MSR_IA32_ARCH_CAPABILITIES
[PATCH v6 00/23] x86: Secure Encrypted Virtualization (AMD)
2018-01-29 18:31 UTC (28+ messages)
` [PATCH v6 01/23] memattrs: add debug attribute
` [PATCH v6 02/23] exec: add ram_debug_ops support
` [PATCH v6 03/23] exec: add debug version of physical memory read and write API
` [PATCH v6 04/23] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v6 05/23] target/i386: add memory encryption feature cpuid support
` [PATCH v6 06/23] machine: add -memory-encryption property
` [PATCH v6 07/23] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v6 08/23] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v6 09/23] accel: add Secure Encrypted Virtulization (SEV) object
` [PATCH v6 10/23] sev: add command to initialize the memory encryption context
` [PATCH v6 11/23] sev: register the guest memory range which may contain encrypted data
` [PATCH v6 12/23] kvm: introduce memory encryption APIs
` [PATCH v6 13/23] hmp: display memory encryption support in 'info kvm'
` [PATCH v6 14/23] sev: add command to create launch memory encryption context
` [PATCH v6 15/23] sev: add command to encrypt guest memory region
` [PATCH v6 16/23] target/i386: encrypt bios rom
` [PATCH v6 17/23] qapi: add SEV_MEASUREMENT event
` [PATCH v6 18/23] sev: emit the "
` [PATCH v6 19/23] sev: Finalize the SEV guest launch flow
` [PATCH v6 20/23] hw: i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v6 21/23] sev: add debug encrypt and decrypt commands
` [PATCH v6 22/23] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v6 23/23] sev: add migration blocker
` [Qemu-devel] [PATCH v6 00/23] x86: Secure Encrypted Virtualization (AMD)
Shared value between host and guests
2018-01-29 17:45 UTC (9+ messages)
[PATCH v2 1/2] i386: Add Intel Processor Trace feature support
2018-01-29 16:27 UTC (4+ messages)
[RFC 00/10] Speculation Control feature support
2018-01-29 14:07 UTC (5+ messages)
` [RFC 04/10] x86/mm: Only flush indirect branches when switching into non dumpable process
linux-next: manual merge of the kvm tree with Linus' tree
2018-01-29 10:35 UTC (8+ messages)
[PULL 1/1] kvm-all: Partially reverts 4fe6d78b2e to remove the cleanup call
2018-01-29 7:48 UTC (9+ messages)
` [Qemu-devel] "
KASAN: use-after-free Write in irq_bypass_register_consumer
2018-01-29 5:29 UTC (6+ messages)
` "
[RFC 09/10] x86/enter: Create macros to restrict/unrestrict Indirect Branch Speculation
2018-01-27 15:55 UTC (9+ messages)
[PATCH v24 0/2] Virtio-balloon: support free page reporting
2018-01-27 14:00 UTC (8+ messages)
` [PATCH v24 1/2] mm: support reporting free page blocks
[PATCH 0/3] Per-VCPU MSR bitmaps patches - topic branch for x86/pti
2018-01-27 8:39 UTC (5+ messages)
` [PATCH 1/3] KVM: nVMX: Eliminate vmcs02 pool
` [PATCH 2/3] KVM: VMX: introduce alloc_loaded_vmcs
` [PATCH 3/3] KVM: VMX: make MSR bitmaps per-VCPU
KASAN: stack-out-of-bounds Read in write_mmio
2018-01-27 1:36 UTC (4+ messages)
BUG: unable to handle kernel NULL pointer dereference in irq_bypass_register_consumer
2018-01-26 23:25 UTC (3+ messages)
[PATCH 0/5] Enable TOPOEXT to support hyperthreading on AMD CPU
2018-01-26 21:39 UTC (6+ messages)
` [PATCH 1/5] target/i386: Fix instruction cache associativity for AMD
` [PATCH 2/5] target/i386: Populate AMD Processor Cache Information
` [PATCH 3/5] target/i386: Add support for CPUID_8000_001E for AMD
` [PATCH 4/5] target/i386: Enable TOPOEXT feature on AMD EPYC CPU
` [PATCH 5/5] target/i386: Remove generic SMT thread check
BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:LINE
2018-01-26 21:11 UTC (3+ messages)
WARNING in do_debug
2018-01-26 19:47 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox