public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-02-28 02:31:39 to 2018-03-01 21:39:04 UTC [more...]

[PATCH] KVM: VMX: expose the host's ARCH_CAPABILITIES MSR to userspace
 2018-03-01 21:39 UTC  (2+ messages)

[PATCH v2 00/15] s390: vfio-ap: guest dedicated crypto adapters
 2018-03-01 20:42 UTC  (39+ messages)
` [PATCH v2 01/15] KVM: s390: refactor crypto initialization
` [PATCH v2 02/15] s390: vsie: implement AP support for second level guest
` [PATCH v2 03/15] s390: zcrypt: externalize AP instructions available function
` [PATCH v2 04/15] KVM: s390: CPU model support for AP virtualization
` [PATCH v2 05/15] s390: vfio-ap: base implementation of VFIO AP device driver
` [PATCH v2 07/15] KVM: s390: Interfaces to configure/deconfigure guest's AP matrix
` [PATCH v2 08/15] KVM: s390: interface to enable AP execution mode
` [PATCH v2 13/15] KVM: s390: Configure the guest's CRYCB

[PATCH] pci-iov: Add support for unmanaged SR-IOV
 2018-03-01 20:22 UTC  (8+ messages)

[PATCH v10 00/29] x86: Secure Encrypted Virtualization (AMD)
 2018-03-01 20:13 UTC  (33+ messages)
` [PATCH v10 01/28] memattrs: add debug attribute
` [PATCH v10 02/28] exec: add ram_debug_ops support
` [PATCH v10 03/28] exec: add debug version of physical memory read and write API
` [PATCH v10 04/28] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v10 05/28] machine: add -memory-encryption property
` [PATCH v10 06/28] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v10 07/28] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v10 08/28] target/i386: add Secure Encrypted Virtulization (SEV) object
` [PATCH v10 09/28] qmp: add query-sev command
` [PATCH v10 10/28] include: add psp-sev.h header file
` [PATCH v10 11/28] sev/i386: add command to initialize the memory encryption context
` [PATCH v10 12/28] sev/i386: register the guest memory range which may contain encrypted data
` [PATCH v10 13/28] kvm: introduce memory encryption APIs
` [PATCH v10 14/28] hmp: add 'info sev' command
` [PATCH v10 15/28] sev/i386: add command to create launch memory encryption context
` [PATCH v10 16/28] sev/i386: add command to encrypt guest memory region
` [PATCH v10 17/28] target/i386: encrypt bios rom
` [PATCH v10 18/28] sev/i386: add support to LAUNCH_MEASURE command
` [PATCH v10 19/28] sev/i386: finalize the SEV guest launch flow
` [PATCH v10 20/28] hw/i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v10 21/28] sev/i386: add debug encrypt and decrypt commands
` [PATCH v10 22/28] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v10 23/28] qmp: add query-sev-launch-measure command
` [PATCH v10 24/28] sev/i386: add migration blocker
` [PATCH v10 25/28] cpu/i386: populate CPUID 0x8000_001F when SEV is active
` [PATCH v10 26/28] qmp: add query-sev-capabilities command
` [PATCH v10 27/28] sev/i386: add sev_get_capabilities()
` [PATCH v10 28/28] tests/qmp-test: blacklist sev specific qmp commands

[PATCH v2 0/5] Enable TOPOEXT to support hyperthreading on AMD CPU
 2018-03-01 19:57 UTC  (14+ messages)
` [PATCH v2 1/5] target/i386: Fix a minor typo found while reviwing
` [PATCH v2 2/5] target/i386: Populate AMD Processor Cache Information
` [PATCH v2 3/5] target/i386: Add support for CPUID_8000_001E for AMD

[PATCH 00/10] KVM/X86: Handle guest memory that does not have a struct page
 2018-03-01 17:51 UTC  (2+ messages)

[RFC PATCH v4 0/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
 2018-03-01 17:43 UTC  (32+ messages)
` [RFC PATCH v4 1/7] xen/pvh: Split CONFIG_XEN_PVH into CONFIG_PVH and CONFIG_XEN_PVH
  ` [Xen-devel] "
` [RFC PATCH v4 2/7] xen/pvh: Move PVH entry code out of Xen specific tree
  ` [Xen-devel] "
` [RFC PATCH v4 3/7] xen/pvh: Create a new file for Xen specific PVH code
  ` [Xen-devel] "
` [RFC PATCH v4 4/7] xen/pvh: Move Xen specific PVH VM initialization out of common code
` [RFC PATCH v4 5/7] xen/pvh: Move Xen code for getting mem map via hcall out of common file
` [RFC PATCH v4 6/7] xen/pvh: Add memory map pointer to hvm_start_info struct
` [RFC PATCH v4 7/7] KVM: x86: Allow Qemu/KVM to use PVH entry point

[PATCH v5 00/23] KVM/arm64: Randomise EL2 mappings (variant 3a mitigation)
 2018-03-01 15:55 UTC  (24+ messages)
` [PATCH v5 01/23] arm64: alternatives: Add dynamic patching feature
` [PATCH v5 02/23] arm64: insn: Add N immediate encoding
` [PATCH v5 03/23] arm64: insn: Add encoder for bitwise operations using literals
` [PATCH v5 04/23] arm64: KVM: Dynamically patch the kernel/hyp VA mask
` [PATCH v5 05/23] arm64: cpufeatures: Drop the ARM64_HYP_OFFSET_LOW feature flag
` [PATCH v5 06/23] KVM: arm/arm64: Do not use kern_hyp_va() with kvm_vgic_global_state
` [PATCH v5 07/23] KVM: arm/arm64: Demote HYP VA range display to being a debug feature
` [PATCH v5 08/23] KVM: arm/arm64: Move ioremap calls to create_hyp_io_mappings
` [PATCH v5 09/23] KVM: arm/arm64: Keep GICv2 HYP VAs in kvm_vgic_global_state
` [PATCH v5 10/23] KVM: arm/arm64: Move HYP IO VAs to the "idmap" range
` [PATCH v5 11/23] arm64; insn: Add encoder for the EXTR instruction
` [PATCH v5 12/23] arm64: insn: Allow ADD/SUB (immediate) with LSL #12
` [PATCH v5 13/23] arm64: KVM: Dynamically compute the HYP VA mask
` [PATCH v5 14/23] arm64: KVM: Introduce EL2 VA randomisation
` [PATCH v5 15/23] arm64: Update the KVM memory map documentation
` [PATCH v5 16/23] arm64: KVM: Move vector offsetting from hyp-init.S to kvm_get_hyp_vector
` [PATCH v5 17/23] arm64: KVM: Move stashing of x0/x1 into the vector code itself
` [PATCH v5 18/23] arm64: KVM: Add epilogue branching to the vector code
` [PATCH v5 19/23] arm64: KVM: Allow far branches from vector slots to the main vectors
` [PATCH v5 20/23] arm/arm64: KVM: Introduce EL2-specific executable mappings
` [PATCH v5 21/23] arm64: Make BP hardening slot counter available
` [PATCH v5 22/23] arm64: KVM: Allow mapping of vectors outside of the RAM region
` [PATCH v5 23/23] arm64: Enable ARM64_HARDEN_EL2_VECTORS on Cortex-A57 and A72

[PATCH] x86/MSR: Move native_* variants to msr.h
 2018-03-01 15:13 UTC 

[PATCH 1/1] vfio-ccw: fence off transport mode
 2018-03-01 15:07 UTC  (2+ messages)

[PATCH v2 0/4] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
 2018-03-01 14:59 UTC  (5+ messages)
` [PATCH v2 1/3] x86/kvm/hyper-v: add reenlightenment MSRs support
` [PATCH v2 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change
` [PATCH v2 3/3] x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked

[PATCH] KVM: x86: fix vcpu initialization with userspace lapic
 2018-03-01 14:37 UTC  (3+ messages)

[PATCH 1/3] KVM: X86: Provides userspace with a capability to not intercept MWAIT
 2018-03-01  9:49 UTC  (3+ messages)
` [PATCH 2/3] KVM: X86: Provides userspace with a capability to not intercept HLT
` [PATCH 3/3] KVM: X86: Provides userspace with a capability to not intercept PAUSE

[PATCH 00/37] Shared Virtual Addressing for the IOMMU
 2018-03-01  8:04 UTC  (24+ messages)
` [PATCH 01/37] iommu: Introduce Shared Virtual Addressing API
` [PATCH 02/37] iommu/sva: Bind process address spaces to devices
` [PATCH 03/37] iommu/sva: Manage process address spaces
` [PATCH 16/37] iommu: Add generic PASID table library
` [PATCH 37/37] vfio: Add support for Shared Virtual Addressing

[PATCH] x86/kvm/mmu: const-ify struct kvm_memory_slot pointers
 2018-02-28 22:23 UTC 

[PATCH 0/5] vfio/quirks: ioeventfd support
 2018-02-28 20:46 UTC  (6+ messages)
` [PATCH 1/5] vfio/quirks: Add common quirk alloc helper
` [PATCH 2/5] vfio/quirks: Add quirk reset callback
` [PATCH 3/5] vfio/quirks: ioeventfd quirk acceleration
` [PATCH 4/5] vfio: Update linux header
` [PATCH 5/5] vfio/quirks: Enable ioeventfd quirks to be handled by vfio directly

[PATCH 0/3] vfio/pci: ioeventfd support
 2018-02-28 20:15 UTC  (4+ messages)
` [PATCH 1/3] vfio/pci: Pull BAR mapping setup from read-write path
` [PATCH 2/3] vfio/pci: Use endian neutral helpers
` [PATCH 3/3] vfio/pci: Add ioeventfd support

[PATCH] X86/KVM: Update the exit_qualification access bits while walking an address
 2018-02-28 18:06 UTC 

[PATCH 0/3] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
 2018-02-28 17:43 UTC  (10+ messages)
` [PATCH 1/3] x86/kvm/hyper-v: add reenlightenment MSRs support
` [PATCH 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change
` [PATCH 3/3] x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked

[PATCH v2 0/5] Enlightened VMCS support for KVM on Hyper-V
 2018-02-28 17:19 UTC  (2+ messages)

[PATCH v4 4/6] vfio/type1: check dma map request is within a valid iova range
 2018-02-28 15:32 UTC  (10+ messages)

[PATCH 3.16 093/254] MIPS: Clear [MSA]FPE CSR.Cause after notify_die()
 2018-02-28 15:20 UTC 

[PATCH v2] target-i386: add KVM_HINTS_DEDICATED performance hint
 2018-02-28 15:05 UTC  (3+ messages)

[PATCH RESEND v5 1/2] KVM: X86: Introduce kvm_get_msr_feature()
 2018-02-28  6:57 UTC  (4+ messages)
` [PATCH RESEND v5 2/2] KVM: X86: Allow userspace to define the microcode version

[PATCH] KVM: surround kvm_arch_vcpu_async_ioctl() with #ifdef
 2018-02-28  6:53 UTC  (2+ messages)

[PATCH v5 1/2] KVM: X86: Introduce kvm_get_msr_feature()
 2018-02-28  5:59 UTC  (4+ messages)
` [PATCH v5 2/2] KVM: X86: Allow userspace to define the microcode version


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox