messages from 2018-02-28 02:31:39 to 2018-03-01 21:39:04 UTC [more...]
[PATCH] KVM: VMX: expose the host's ARCH_CAPABILITIES MSR to userspace
2018-03-01 21:39 UTC (2+ messages)
[PATCH v2 00/15] s390: vfio-ap: guest dedicated crypto adapters
2018-03-01 20:42 UTC (39+ messages)
` [PATCH v2 01/15] KVM: s390: refactor crypto initialization
` [PATCH v2 02/15] s390: vsie: implement AP support for second level guest
` [PATCH v2 03/15] s390: zcrypt: externalize AP instructions available function
` [PATCH v2 04/15] KVM: s390: CPU model support for AP virtualization
` [PATCH v2 05/15] s390: vfio-ap: base implementation of VFIO AP device driver
` [PATCH v2 07/15] KVM: s390: Interfaces to configure/deconfigure guest's AP matrix
` [PATCH v2 08/15] KVM: s390: interface to enable AP execution mode
` [PATCH v2 13/15] KVM: s390: Configure the guest's CRYCB
[PATCH] pci-iov: Add support for unmanaged SR-IOV
2018-03-01 20:22 UTC (8+ messages)
[PATCH v10 00/29] x86: Secure Encrypted Virtualization (AMD)
2018-03-01 20:13 UTC (33+ messages)
` [PATCH v10 01/28] memattrs: add debug attribute
` [PATCH v10 02/28] exec: add ram_debug_ops support
` [PATCH v10 03/28] exec: add debug version of physical memory read and write API
` [PATCH v10 04/28] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v10 05/28] machine: add -memory-encryption property
` [PATCH v10 06/28] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v10 07/28] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v10 08/28] target/i386: add Secure Encrypted Virtulization (SEV) object
` [PATCH v10 09/28] qmp: add query-sev command
` [PATCH v10 10/28] include: add psp-sev.h header file
` [PATCH v10 11/28] sev/i386: add command to initialize the memory encryption context
` [PATCH v10 12/28] sev/i386: register the guest memory range which may contain encrypted data
` [PATCH v10 13/28] kvm: introduce memory encryption APIs
` [PATCH v10 14/28] hmp: add 'info sev' command
` [PATCH v10 15/28] sev/i386: add command to create launch memory encryption context
` [PATCH v10 16/28] sev/i386: add command to encrypt guest memory region
` [PATCH v10 17/28] target/i386: encrypt bios rom
` [PATCH v10 18/28] sev/i386: add support to LAUNCH_MEASURE command
` [PATCH v10 19/28] sev/i386: finalize the SEV guest launch flow
` [PATCH v10 20/28] hw/i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v10 21/28] sev/i386: add debug encrypt and decrypt commands
` [PATCH v10 22/28] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v10 23/28] qmp: add query-sev-launch-measure command
` [PATCH v10 24/28] sev/i386: add migration blocker
` [PATCH v10 25/28] cpu/i386: populate CPUID 0x8000_001F when SEV is active
` [PATCH v10 26/28] qmp: add query-sev-capabilities command
` [PATCH v10 27/28] sev/i386: add sev_get_capabilities()
` [PATCH v10 28/28] tests/qmp-test: blacklist sev specific qmp commands
[PATCH v2 0/5] Enable TOPOEXT to support hyperthreading on AMD CPU
2018-03-01 19:57 UTC (14+ messages)
` [PATCH v2 1/5] target/i386: Fix a minor typo found while reviwing
` [PATCH v2 2/5] target/i386: Populate AMD Processor Cache Information
` [PATCH v2 3/5] target/i386: Add support for CPUID_8000_001E for AMD
[PATCH 00/10] KVM/X86: Handle guest memory that does not have a struct page
2018-03-01 17:51 UTC (2+ messages)
[RFC PATCH v4 0/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
2018-03-01 17:43 UTC (32+ messages)
` [RFC PATCH v4 1/7] xen/pvh: Split CONFIG_XEN_PVH into CONFIG_PVH and CONFIG_XEN_PVH
` [Xen-devel] "
` [RFC PATCH v4 2/7] xen/pvh: Move PVH entry code out of Xen specific tree
` [Xen-devel] "
` [RFC PATCH v4 3/7] xen/pvh: Create a new file for Xen specific PVH code
` [Xen-devel] "
` [RFC PATCH v4 4/7] xen/pvh: Move Xen specific PVH VM initialization out of common code
` [RFC PATCH v4 5/7] xen/pvh: Move Xen code for getting mem map via hcall out of common file
` [RFC PATCH v4 6/7] xen/pvh: Add memory map pointer to hvm_start_info struct
` [RFC PATCH v4 7/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
[PATCH v5 00/23] KVM/arm64: Randomise EL2 mappings (variant 3a mitigation)
2018-03-01 15:55 UTC (24+ messages)
` [PATCH v5 01/23] arm64: alternatives: Add dynamic patching feature
` [PATCH v5 02/23] arm64: insn: Add N immediate encoding
` [PATCH v5 03/23] arm64: insn: Add encoder for bitwise operations using literals
` [PATCH v5 04/23] arm64: KVM: Dynamically patch the kernel/hyp VA mask
` [PATCH v5 05/23] arm64: cpufeatures: Drop the ARM64_HYP_OFFSET_LOW feature flag
` [PATCH v5 06/23] KVM: arm/arm64: Do not use kern_hyp_va() with kvm_vgic_global_state
` [PATCH v5 07/23] KVM: arm/arm64: Demote HYP VA range display to being a debug feature
` [PATCH v5 08/23] KVM: arm/arm64: Move ioremap calls to create_hyp_io_mappings
` [PATCH v5 09/23] KVM: arm/arm64: Keep GICv2 HYP VAs in kvm_vgic_global_state
` [PATCH v5 10/23] KVM: arm/arm64: Move HYP IO VAs to the "idmap" range
` [PATCH v5 11/23] arm64; insn: Add encoder for the EXTR instruction
` [PATCH v5 12/23] arm64: insn: Allow ADD/SUB (immediate) with LSL #12
` [PATCH v5 13/23] arm64: KVM: Dynamically compute the HYP VA mask
` [PATCH v5 14/23] arm64: KVM: Introduce EL2 VA randomisation
` [PATCH v5 15/23] arm64: Update the KVM memory map documentation
` [PATCH v5 16/23] arm64: KVM: Move vector offsetting from hyp-init.S to kvm_get_hyp_vector
` [PATCH v5 17/23] arm64: KVM: Move stashing of x0/x1 into the vector code itself
` [PATCH v5 18/23] arm64: KVM: Add epilogue branching to the vector code
` [PATCH v5 19/23] arm64: KVM: Allow far branches from vector slots to the main vectors
` [PATCH v5 20/23] arm/arm64: KVM: Introduce EL2-specific executable mappings
` [PATCH v5 21/23] arm64: Make BP hardening slot counter available
` [PATCH v5 22/23] arm64: KVM: Allow mapping of vectors outside of the RAM region
` [PATCH v5 23/23] arm64: Enable ARM64_HARDEN_EL2_VECTORS on Cortex-A57 and A72
[PATCH] x86/MSR: Move native_* variants to msr.h
2018-03-01 15:13 UTC
[PATCH 1/1] vfio-ccw: fence off transport mode
2018-03-01 15:07 UTC (2+ messages)
[PATCH v2 0/4] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
2018-03-01 14:59 UTC (5+ messages)
` [PATCH v2 1/3] x86/kvm/hyper-v: add reenlightenment MSRs support
` [PATCH v2 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change
` [PATCH v2 3/3] x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked
[PATCH] KVM: x86: fix vcpu initialization with userspace lapic
2018-03-01 14:37 UTC (3+ messages)
[PATCH 1/3] KVM: X86: Provides userspace with a capability to not intercept MWAIT
2018-03-01 9:49 UTC (3+ messages)
` [PATCH 2/3] KVM: X86: Provides userspace with a capability to not intercept HLT
` [PATCH 3/3] KVM: X86: Provides userspace with a capability to not intercept PAUSE
[PATCH 00/37] Shared Virtual Addressing for the IOMMU
2018-03-01 8:04 UTC (24+ messages)
` [PATCH 01/37] iommu: Introduce Shared Virtual Addressing API
` [PATCH 02/37] iommu/sva: Bind process address spaces to devices
` [PATCH 03/37] iommu/sva: Manage process address spaces
` [PATCH 16/37] iommu: Add generic PASID table library
` [PATCH 37/37] vfio: Add support for Shared Virtual Addressing
[PATCH] x86/kvm/mmu: const-ify struct kvm_memory_slot pointers
2018-02-28 22:23 UTC
[PATCH 0/5] vfio/quirks: ioeventfd support
2018-02-28 20:46 UTC (6+ messages)
` [PATCH 1/5] vfio/quirks: Add common quirk alloc helper
` [PATCH 2/5] vfio/quirks: Add quirk reset callback
` [PATCH 3/5] vfio/quirks: ioeventfd quirk acceleration
` [PATCH 4/5] vfio: Update linux header
` [PATCH 5/5] vfio/quirks: Enable ioeventfd quirks to be handled by vfio directly
[PATCH 0/3] vfio/pci: ioeventfd support
2018-02-28 20:15 UTC (4+ messages)
` [PATCH 1/3] vfio/pci: Pull BAR mapping setup from read-write path
` [PATCH 2/3] vfio/pci: Use endian neutral helpers
` [PATCH 3/3] vfio/pci: Add ioeventfd support
[PATCH] X86/KVM: Update the exit_qualification access bits while walking an address
2018-02-28 18:06 UTC
[PATCH 0/3] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
2018-02-28 17:43 UTC (10+ messages)
` [PATCH 1/3] x86/kvm/hyper-v: add reenlightenment MSRs support
` [PATCH 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change
` [PATCH 3/3] x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked
[PATCH v2 0/5] Enlightened VMCS support for KVM on Hyper-V
2018-02-28 17:19 UTC (2+ messages)
[PATCH v4 4/6] vfio/type1: check dma map request is within a valid iova range
2018-02-28 15:32 UTC (10+ messages)
[PATCH 3.16 093/254] MIPS: Clear [MSA]FPE CSR.Cause after notify_die()
2018-02-28 15:20 UTC
[PATCH v2] target-i386: add KVM_HINTS_DEDICATED performance hint
2018-02-28 15:05 UTC (3+ messages)
[PATCH RESEND v5 1/2] KVM: X86: Introduce kvm_get_msr_feature()
2018-02-28 6:57 UTC (4+ messages)
` [PATCH RESEND v5 2/2] KVM: X86: Allow userspace to define the microcode version
[PATCH] KVM: surround kvm_arch_vcpu_async_ioctl() with #ifdef
2018-02-28 6:53 UTC (2+ messages)
[PATCH v5 1/2] KVM: X86: Introduce kvm_get_msr_feature()
2018-02-28 5:59 UTC (4+ messages)
` [PATCH v5 2/2] KVM: X86: Allow userspace to define the microcode version
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox