public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-01-29 17:41:54 to 2018-01-31 08:57:48 UTC [more...]

[PATCH v3 0/2] KVM: s390: fix storage attributes migration
 2018-01-31  8:57 UTC  (4+ messages)
` [PATCH v3 1/2] KVM: s390x: some utility functions for migration
` [PATCH v3 2/2] KVM: s390: Fix storage attributes migration with memory slots

[kvm-unit-tests PATCH] kvm-unit-tests: Gtests Framework and Example Tests
 2018-01-31  8:56 UTC  (3+ messages)

[PATCH v9 0/9] Handle forwarded level-triggered interrupts
 2018-01-31  8:32 UTC  (6+ messages)
` [PATCH v9 7/9] KVM: arm/arm64: Provide a get_input_level for the arch timer

[PATCH 0/3] KVM: s390: update maintainers
 2018-01-31  8:31 UTC  (11+ messages)
` [PATCH 1/3] MAINTAINERS: add David as a reviewer for KVM/s390
` [PATCH 2/3] MAINTAINERS: add Halil as additional vfio-ccw maintainer
` [PATCH 3/3] MAINTAINERS: update KVM/s390 maintainers

[PATCH 0/3] Additional fixes for kvmarm/next
 2018-01-31  8:26 UTC  (5+ messages)
` [PATCH 1/3] KVM: arm/arm64: Fix incorrect timer_is_pending logic
` [PATCH 2/3] KVM: arm/arm64: Fix userspace_irqchip_in_use counting
` [PATCH 3/3] KVM: arm/arm64: Fixup userspace irqchip static key optimization

[PATCH v3 0/4] KVM: Expose speculation control feature to guests
 2018-01-31  6:54 UTC  (30+ messages)
` [PATCH v3 1/4] KVM: x86: Update the reverse_cpuid list to include CPUID_7_EDX
` [PATCH v3 2/4] KVM: x86: Add IBPB support
` [PATCH v3 3/4] KVM: VMX: Emulate MSR_IA32_ARCH_CAPABILITIES
` [PATCH v3 4/4] KVM: VMX: Allow direct access to MSR_IA32_SPEC_CTRL

[PATCH] KVM: PPC: Book3S PR: close a race window when SVCPU pointer is hold before kvmppc_copy_from_svcpu()
 2018-01-31  4:23 UTC 

[PATCH 0/2] iommu / vfio: Clean up iommu_map[_fast] interface
 2018-01-31  1:48 UTC  (3+ messages)
  ` [PATCH 1/2] iommu: Fix iommu_unmap and iommu_unmap_fast return type
  ` [PATCH 2/2] vfio/type1: Add iommu_unmap error check when vfio_unmap_unpin

[PATCH 9/8] KVM: x86: limit MSR_IA32_SPEC_CTRL access based on CPUID availability
 2018-01-31  1:06 UTC  (11+ messages)
` [9/8] "

[PATCH v4 0/7] x86/kvm/hyperv: stable clocksource for L2 guests when running nested KVM on Hyper-V
 2018-01-30 23:48 UTC  (7+ messages)
` [PATCH v4 5/7] x86/irq: Count Hyper-V reenlightenment interrupts

[PATCH v25 0/2] Virtio-balloon: support free page reporting
 2018-01-30 23:44 UTC  (7+ messages)
` [PATCH v25 2/2] virtio-balloon: VIRTIO_BALLOON_F_FREE_PAGE_HINT
    ` [virtio-dev] "

[PATCH v6 00/23] x86: Secure Encrypted Virtualization (AMD)
 2018-01-30 23:26 UTC  (38+ messages)
` [PATCH v6 01/23] memattrs: add debug attribute
` [PATCH v6 02/23] exec: add ram_debug_ops support
` [PATCH v6 03/23] exec: add debug version of physical memory read and write API
` [PATCH v6 04/23] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v6 05/23] target/i386: add memory encryption feature cpuid support
` [PATCH v6 06/23] machine: add -memory-encryption property
` [PATCH v6 07/23] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v6 08/23] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v6 09/23] accel: add Secure Encrypted Virtulization (SEV) object
` [PATCH v6 10/23] sev: add command to initialize the memory encryption context
` [PATCH v6 11/23] sev: register the guest memory range which may contain encrypted data
` [PATCH v6 12/23] kvm: introduce memory encryption APIs
` [PATCH v6 13/23] hmp: display memory encryption support in 'info kvm'
` [PATCH v6 14/23] sev: add command to create launch memory encryption context
` [PATCH v6 15/23] sev: add command to encrypt guest memory region
` [PATCH v6 16/23] target/i386: encrypt bios rom
` [PATCH v6 17/23] qapi: add SEV_MEASUREMENT event
` [PATCH v6 18/23] sev: emit the "
` [PATCH v6 19/23] sev: Finalize the SEV guest launch flow
` [PATCH v6 20/23] hw: i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v6 21/23] sev: add debug encrypt and decrypt commands
` [PATCH v6 22/23] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v6 23/23] sev: add migration blocker
` [Qemu-devel] [PATCH v6 00/23] x86: Secure Encrypted Virtualization (AMD)

kernel BUG at arch/x86/kvm/mmu.c:LINE!
 2018-01-30 20:49 UTC  (6+ messages)
` [PATCH] KVM: prevent overlap between user and private memslots

[RFC 05/10] x86/speculation: Add basic IBRS support infrastructure
 2018-01-30 20:46 UTC  (32+ messages)
` [RFC,05/10] "

[PATCH v4 0/3] Support Perf Extensions on AMD KVM guests
 2018-01-30 17:32 UTC  (4+ messages)
` [PATCH v4 1/3] x86/msr: Add AMD Core Perf Extension MSRs
` [PATCH v4 2/3] x86/kvm: Add support for AMD Core Perf Extension in guest
` [PATCH v4 3/3] x86/kvm: Expose AMD Core Perf Extension flag to guests

[PATCH 0/3] Per-VCPU MSR bitmaps patches - topic branch for x86/pti
 2018-01-30 17:12 UTC  (3+ messages)
` [PATCH 3/3] KVM: VMX: make MSR bitmaps per-VCPU

[GIT PULL 00/22] KVM: s390: Fixes and features for 4.16 part 2
 2018-01-30 16:57 UTC  (2+ messages)

[PATCH v2 0/3] Per-VCPU MSR bitmaps patches - topic branch for x86/pti
 2018-01-30 16:30 UTC  (5+ messages)
` [PATCH v2 3/3] KVM: VMX: make MSR bitmaps per-VCPU
  ` [v2,3/3] "

[PATCH] kvm: x86: remove efer_reload entry in kvm_vcpu_stat
 2018-01-30 14:06 UTC  (2+ messages)

[PATCH] KVM:x86: AMD Processor Topology Information
 2018-01-30 13:54 UTC  (3+ messages)

Darlehensangebot
 2018-01-30 13:35 UTC 

[PATCH] KVM: arm/arm64: Fix arch timers with userspace irqchips
 2018-01-30 12:46 UTC 

[PATCH v3 0/2] KVM: x86: Add SYNC REGS functionality
 2018-01-30 11:35 UTC  (8+ messages)
` [PATCH v3 1/2] KVM: x86: add SYNC_REGS_SIZE_BYTES #define
` [PATCH v3 2/2] KVM: x86: KVM_CAP_SYNC_REGS

[RFC/PATCH v2 00/22] KVM/s390: Hugetlbfs enablement
 2018-01-30 10:19 UTC  (3+ messages)
` [PATCH v2] mm: s390: Only notify on 4k pages

KASAN: use-after-free Read in perf_trace_lock_acquire (2)
 2018-01-30  9:52 UTC 

[RFC PATCH 0/3] vfio: ccw: basic channel path event handling
 2018-01-30  5:27 UTC  (7+ messages)
` [Qemu-devel] "

[PATCH 00/26] KVM: PPC: Book3S PR: Transaction memory support on PR KVM
 2018-01-30  3:26 UTC  (34+ messages)
` [PATCH 02/26] KVM: PPC: Book3S PR: add new parameter (guest MSR) for kvmppc_save_tm()/kvmppc_restore_tm()
` [PATCH 04/26] KVM: PPC: Book3S PR: add C function wrapper for _kvmppc_save/restore_tm()
` [PATCH 13/26] KVM: PPC: Book3S PR: adds new kvmppc_copyto_vcpu_tm/kvmppc_copyfrom_vcpu_tm API for PR KVM
` [PATCH 16/26] KVM: PPC: Book3S PR: add transaction memory save/restore skeleton "
` [PATCH 17/26] KVM: PPC: Book3S PR: add math support for PR KVM HTM
` [PATCH 18/26] KVM: PPC: Book3S PR: make mtspr/mfspr emulation behavior based on active TM SPRs
` [PATCH 19/26] KVM: PPC: Book3S PR: always fail transaction in guest privilege state
` [PATCH 21/26] KVM: PPC: Book3S PR: adds emulation for treclaim
` [PATCH 22/26] KVM: PPC: Book3S PR: add emulation for trechkpt in PR KVM
` [PATCH 23/26] KVM: PPC: Book3S PR: add emulation for tabort. for privilege guest
` [PATCH 25/26] KVM: PPC: Book3S PR: Support TAR handling for PR KVM HTM

[RFC,05/10] x86/speculation: Add basic IBRS support infrastructure
 2018-01-30  1:30 UTC  (8+ messages)

[PATCH] KVM: PPC: Book3S HV: Drop locks before reading guest memory
 2018-01-29 23:51 UTC 

[PATCH] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
 2018-01-29 23:01 UTC  (5+ messages)

3.400,000.00 Eur
 2018-01-29 20:05 UTC 

3.400,000.00 Eur
 2018-01-29 20:05 UTC 

[RFC][PATCH 0/5] s390: improve speculative execution handling v2
 2018-01-29 20:12 UTC  (11+ messages)
` [PATCH 1/5] prctl: add PR_ISOLATE_BP process control
      ` Avoiding information leaks between users and between processes by default? [Was: : [PATCH 1/5] prctl: add PR_ISOLATE_BP process control]

[PATCH] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
 2018-01-29 19:27 UTC  (7+ messages)

[PATCH v2 0/4] KVM: Expose speculation control feature to guests
 2018-01-29 19:19 UTC  (10+ messages)
` [PATCH v2 1/4] x86: kvm: Update the reverse_cpuid list to include CPUID_7_EDX
` [PATCH v2 2/4] x86: vmx: Allow direct access to MSR_IA32_SPEC_CTRL
` [PATCH v2 3/4] x86/kvm: Add IBPB support
` [PATCH v2 4/4] x86: vmx: Allow direct access to MSR_IA32_ARCH_CAPABILITIES

Shared value between host and guests
 2018-01-29 17:45 UTC  (7+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox