public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-02-27 15:44:02 to 2018-03-01 15:07:14 UTC [more...]

[PATCH 1/1] vfio-ccw: fence off transport mode
 2018-03-01 15:07 UTC  (2+ messages)

[RFC PATCH v4 0/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
 2018-03-01 15:02 UTC  (24+ messages)
` [RFC PATCH v4 1/7] xen/pvh: Split CONFIG_XEN_PVH into CONFIG_PVH and CONFIG_XEN_PVH
  ` [Xen-devel] "
` [RFC PATCH v4 2/7] xen/pvh: Move PVH entry code out of Xen specific tree
  ` [Xen-devel] "
` [RFC PATCH v4 3/7] xen/pvh: Create a new file for Xen specific PVH code
  ` [Xen-devel] "
` [RFC PATCH v4 4/7] xen/pvh: Move Xen specific PVH VM initialization out of common code
` [RFC PATCH v4 5/7] xen/pvh: Move Xen code for getting mem map via hcall out of common file
` [RFC PATCH v4 6/7] xen/pvh: Add memory map pointer to hvm_start_info struct
` [RFC PATCH v4 7/7] KVM: x86: Allow Qemu/KVM to use PVH entry point

[PATCH v2 0/4] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
 2018-03-01 14:59 UTC  (5+ messages)
` [PATCH v2 1/3] x86/kvm/hyper-v: add reenlightenment MSRs support
` [PATCH v2 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change
` [PATCH v2 3/3] x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked

[PATCH] KVM: x86: fix vcpu initialization with userspace lapic
 2018-03-01 14:37 UTC  (3+ messages)

[PATCH v2 00/15] s390: vfio-ap: guest dedicated crypto adapters
 2018-03-01  9:59 UTC  (43+ messages)
` [PATCH v2 01/15] KVM: s390: refactor crypto initialization
` [PATCH v2 02/15] s390: vsie: implement AP support for second level guest
` [PATCH v2 03/15] s390: zcrypt: externalize AP instructions available function
` [PATCH v2 04/15] KVM: s390: CPU model support for AP virtualization
` [PATCH v2 05/15] s390: vfio-ap: base implementation of VFIO AP device driver
` [PATCH v2 07/15] KVM: s390: Interfaces to configure/deconfigure guest's AP matrix
` [PATCH v2 08/15] KVM: s390: interface to enable AP execution mode
` [PATCH v2 13/15] KVM: s390: Configure the guest's CRYCB
` [PATCH v2 15/15] s390: doc: detailed specifications for AP virtualization

[PATCH 1/3] KVM: X86: Provides userspace with a capability to not intercept MWAIT
 2018-03-01  9:49 UTC  (3+ messages)
` [PATCH 2/3] KVM: X86: Provides userspace with a capability to not intercept HLT
` [PATCH 3/3] KVM: X86: Provides userspace with a capability to not intercept PAUSE

[PATCH 00/37] Shared Virtual Addressing for the IOMMU
 2018-03-01  8:04 UTC  (24+ messages)
` [PATCH 01/37] iommu: Introduce Shared Virtual Addressing API
` [PATCH 02/37] iommu/sva: Bind process address spaces to devices
` [PATCH 03/37] iommu/sva: Manage process address spaces
` [PATCH 16/37] iommu: Add generic PASID table library
` [PATCH 37/37] vfio: Add support for Shared Virtual Addressing

[PATCH] pci-iov: Add support for unmanaged SR-IOV
 2018-03-01  0:36 UTC  (7+ messages)

[PATCH] x86/kvm/mmu: const-ify struct kvm_memory_slot pointers
 2018-02-28 22:23 UTC 

[PATCH v2 0/5] Enable TOPOEXT to support hyperthreading on AMD CPU
 2018-02-28 22:18 UTC  (11+ messages)
` [PATCH v2 1/5] target/i386: Fix a minor typo found while reviwing
` [PATCH v2 2/5] target/i386: Populate AMD Processor Cache Information
` [PATCH v2 3/5] target/i386: Add support for CPUID_8000_001E for AMD

[PATCH v10 00/29] x86: Secure Encrypted Virtualization (AMD)
 2018-02-28 21:43 UTC  (30+ messages)
` [PATCH v10 01/28] memattrs: add debug attribute
` [PATCH v10 02/28] exec: add ram_debug_ops support
` [PATCH v10 03/28] exec: add debug version of physical memory read and write API
` [PATCH v10 04/28] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v10 05/28] machine: add -memory-encryption property
` [PATCH v10 06/28] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v10 07/28] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v10 08/28] target/i386: add Secure Encrypted Virtulization (SEV) object
` [PATCH v10 09/28] qmp: add query-sev command
` [PATCH v10 10/28] include: add psp-sev.h header file
` [PATCH v10 11/28] sev/i386: add command to initialize the memory encryption context
` [PATCH v10 12/28] sev/i386: register the guest memory range which may contain encrypted data
` [PATCH v10 13/28] kvm: introduce memory encryption APIs
` [PATCH v10 14/28] hmp: add 'info sev' command
` [PATCH v10 15/28] sev/i386: add command to create launch memory encryption context
` [PATCH v10 16/28] sev/i386: add command to encrypt guest memory region
` [PATCH v10 17/28] target/i386: encrypt bios rom
` [PATCH v10 18/28] sev/i386: add support to LAUNCH_MEASURE command
` [PATCH v10 19/28] sev/i386: finalize the SEV guest launch flow
` [PATCH v10 20/28] hw/i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v10 21/28] sev/i386: add debug encrypt and decrypt commands
` [PATCH v10 22/28] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v10 23/28] qmp: add query-sev-launch-measure command
` [PATCH v10 24/28] sev/i386: add migration blocker
` [PATCH v10 25/28] cpu/i386: populate CPUID 0x8000_001F when SEV is active
` [PATCH v10 26/28] qmp: add query-sev-capabilities command
` [PATCH v10 27/28] sev/i386: add sev_get_capabilities()
` [PATCH v10 28/28] tests/qmp-test: blacklist sev specific qmp commands

[PATCH 0/5] vfio/quirks: ioeventfd support
 2018-02-28 20:46 UTC  (6+ messages)
` [PATCH 1/5] vfio/quirks: Add common quirk alloc helper
` [PATCH 2/5] vfio/quirks: Add quirk reset callback
` [PATCH 3/5] vfio/quirks: ioeventfd quirk acceleration
` [PATCH 4/5] vfio: Update linux header
` [PATCH 5/5] vfio/quirks: Enable ioeventfd quirks to be handled by vfio directly

[PATCH 0/3] vfio/pci: ioeventfd support
 2018-02-28 20:15 UTC  (4+ messages)
` [PATCH 1/3] vfio/pci: Pull BAR mapping setup from read-write path
` [PATCH 2/3] vfio/pci: Use endian neutral helpers
` [PATCH 3/3] vfio/pci: Add ioeventfd support

[PATCH] X86/KVM: Update the exit_qualification access bits while walking an address
 2018-02-28 18:06 UTC 

[PATCH 0/3] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
 2018-02-28 17:43 UTC  (10+ messages)
` [PATCH 1/3] x86/kvm/hyper-v: add reenlightenment MSRs support
` [PATCH 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change
` [PATCH 3/3] x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked

[PATCH v2 0/5] Enlightened VMCS support for KVM on Hyper-V
 2018-02-28 17:19 UTC  (2+ messages)

[PATCH v4 4/6] vfio/type1: check dma map request is within a valid iova range
 2018-02-28 15:32 UTC  (12+ messages)

[PATCH 3.16 093/254] MIPS: Clear [MSA]FPE CSR.Cause after notify_die()
 2018-02-28 15:20 UTC 

[PATCH v2] target-i386: add KVM_HINTS_DEDICATED performance hint
 2018-02-28 15:05 UTC  (3+ messages)

[PATCH RESEND v5 1/2] KVM: X86: Introduce kvm_get_msr_feature()
 2018-02-28  6:57 UTC  (4+ messages)
` [PATCH RESEND v5 2/2] KVM: X86: Allow userspace to define the microcode version

[PATCH] KVM: surround kvm_arch_vcpu_async_ioctl() with #ifdef
 2018-02-28  6:53 UTC  (2+ messages)

[PATCH v5 1/2] KVM: X86: Introduce kvm_get_msr_feature()
 2018-02-28  5:59 UTC  (4+ messages)
` [PATCH v5 2/2] KVM: X86: Allow userspace to define the microcode version

Call for GSoC & Outreachy 2018 mentors & project ideas
 2018-02-27 23:54 UTC  (7+ messages)
` [Qemu-devel] "

[PATCH v4 00/12] vfio, dax: prevent long term filesystem-dax pins and other fixes
 2018-02-27 22:23 UTC  (2+ messages)

[PATCH v2 11/30] KVM: PPC: Book3S PR: implement RFID TM behavior to suppress change from S0 to N0
 2018-02-27 17:52 UTC  (20+ messages)
` [PATCH v2 12/30] KVM: PPC: Book3S PR: prevent TS bits change in kvmppc_interrupt_pr()
` [PATCH v2 13/30] KVM: PPC: Book3S PR: adds new kvmppc_copyto_vcpu_tm/kvmppc_copyfrom_vcpu_tm API for PR KVM
` [PATCH v2 14/30] KVM: PPC: Book3S PR: add kvmppc_save/restore_tm_sprs() APIs
` [PATCH v2 15/30] KVM: PPC: Book3S PR: add transaction memory save/restore skeleton for PR KVM
` [PATCH v2 16/30] KVM: PPC: Book3S PR: add math support for PR KVM HTM
` [PATCH v2 17/30] KVM: PPC: Book3S PR: make mtspr/mfspr emulation behavior based on active TM SPRs
` [PATCH v2 18/30] KVM: PPC: Book3S PR: always fail transaction in guest privilege state
` [PATCH v2 19/30] KVM: PPC: Book3S PR: enable NV reg restore for reading TM SPR at "
` [PATCH v2 20/30] KVM: PPC: Book3S PR: adds emulation for treclaim
` [PATCH v2 21/30] KVM: PPC: Book3S PR: add emulation for trechkpt in PR KVM
` [PATCH v2 22/30] KVM: PPC: Book3S PR: add emulation for tabort. for privilege guest
` [PATCH v2 23/30] KVM: PPC: Book3S PR: add guard code to prevent returning to guest with PR=0 and Transactional state
` [PATCH v2 24/30] KVM: PPC: Book3S PR: Support TAR handling for PR KVM HTM
` [PATCH v2 25/30] KVM: PPC: Book3S PR: enable HTM for PR KVM for KVM_CHECK_EXTENSION ioctl
` [PATCH v2 26/30] KVM: PPC: move vcpu_load/vcpu_put down to each ioctl case in kvm_arch_vcpu_ioctl
` [PATCH v2 27/30] KVM: PPC: remove load/put vcpu for KVM_GET/SET_ONE_REG ioctl
` [PATCH v2 28/30] KVM: PPC: remove load/put vcpu for KVM_GET_REGS/KVM_SET_REGS
` [PATCH v2 29/30] KVM: PPC: add KVM_SET_ONE_REG/KVM_GET_ONE_REG to async ioctl
` [PATCH v2 30/30] KVM: PPC: Book3S PR: enable kvmppc_get/set_one_reg_pr() for HTM registers

[PATCH v2 00/30] KVM: PPC: Book3S PR: Transaction memory support on PR KVM
 2018-02-27 17:37 UTC  (11+ messages)
` [PATCH v2 01/30] powerpc: export symbol msr_check_and_set()
` [PATCH v2 02/30] powerpc: add TEXASR related macros
` [PATCH v2 03/30] powerpc: export tm_enable()/tm_disable/tm_abort() APIs
` [PATCH v2 04/30] KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file
` [PATCH v2 05/30] KVM: PPC: Book3S PR: add new parameter (guest MSR) for kvmppc_save_tm()/kvmppc_restore_tm()
` [PATCH v2 06/30] KVM: PPC: Book3S PR: turn on FP/VSX/VMX MSR bits in kvmppc_save_tm()
` [PATCH v2 07/30] KVM: PPC: Book3S PR: add C function wrapper for _kvmppc_save/restore_tm()
` [PATCH v2 08/30] KVM: PPC: Book3S PR: In PR KVM suspends Transactional state when inject an interrupt
` [PATCH v2 09/30] KVM: PPC: Book3S PR: PR KVM pass through MSR TM/TS bits to shadow_msr
` [PATCH v2 10/30] KVM: PPC: Book3S PR: Sync TM bits to shadow msr for problem state guest

[PATCH v9 00/29] x86: Secure Encrypted Virtualization (AMD)
 2018-02-27 15:44 UTC  (5+ messages)
` [PATCH v9 16/29] sev/i386: add command to encrypt guest memory region


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox