messages from 2018-02-28 19:38:17 to 2018-03-04 10:17:53 UTC [more...]
[PATCH] X86/KVM: Update the exit_qualification access bits while walking an address
2018-03-04 10:17 UTC (4+ messages)
` [PATCH] nvmx: Check exit qualification RD/WR permission for MMIO accesses
[PATCH AUTOSEL for 4.15 054/102] KVM: X86: Restart the guest when insn_len is zero and SEV is enabled
2018-03-03 22:24 UTC
[PATCH v10 0/5] set VSESR_EL2 by user space and support NOTIFY_SEI notification
2018-03-03 16:09 UTC (6+ messages)
` [PATCH v10 1/5] arm64: KVM: Prepare set virtual SEI syndrome value
` [PATCH v10 2/5] arm64: KVM: export the capability to set guest SError syndrome
` [PATCH v10 3/5] arm/arm64: KVM: Introduce set and get per-vcpu event
` [PATCH v10 4/5] ACPI / APEI: Add SEI notification type support for ARMv8
` [PATCH v10 5/5] arm64: handle NOTIFY_SEI notification by the APEI driver
[RFC] vfio iommu type1: improve memory pinning process for raw PFN mapping
2018-03-03 12:10 UTC (2+ messages)
` [RFC v2] "
[PATCH v5 00/12] vfio, dax: prevent long term filesystem-dax pins and other fixes
2018-03-03 2:19 UTC (7+ messages)
` [PATCH v5 12/12] vfio: disable filesystem-dax page pinning
[PATCH] pci-iov: Add support for unmanaged SR-IOV
2018-03-03 0:59 UTC (16+ messages)
[PATCH 0/3] vfio/pci: ioeventfd support
2018-03-03 0:43 UTC (7+ messages)
` [PATCH 1/3] vfio/pci: Pull BAR mapping setup from read-write path
` [PATCH 2/3] vfio/pci: Use endian neutral helpers
` [PATCH 3/3] vfio/pci: Add ioeventfd support
[PATCH 0/3] pci-iov: Add support for unmanaged SR-IOV
2018-03-03 0:20 UTC (6+ messages)
` [PATCH 1/3] "
` [PATCH 2/3] vfio: Add support for unmanaged or userspace managed SR-IOV
` [PATCH 3/3] virtio_pci: Add support for unmanaged SR-IOV on virtio_pci devices
[GIT PULL] KVM fixes for Linux 4.16-rc4
2018-03-02 21:42 UTC
[PATCH] KVM: VMX: expose the host's ARCH_CAPABILITIES MSR to userspace
2018-03-02 21:42 UTC (4+ messages)
[PATCH RESEND v5 1/2] KVM: X86: Introduce kvm_get_msr_feature()
2018-03-02 21:21 UTC (2+ messages)
[PATCH RFC 0/3] x86/kvm: avoid expensive rdmsrs for FS/GS base MSRs
2018-03-02 20:20 UTC (6+ messages)
` [PATCH RFC 1/3] x86/kvm/vmx: read MSR_FS_BASE from current->thread
` [PATCH RFC 2/3] x86/kvm/vmx: read MSR_KERNEL_GS_BASE "
` [PATCH RFC 3/3] x86/kvm/vmx: avoid expensive rdmsr for MSR_GS_BASE
[PATCH v2 00/15] s390: vfio-ap: guest dedicated crypto adapters
2018-03-02 19:54 UTC (30+ messages)
` [PATCH v2 01/15] KVM: s390: refactor crypto initialization
` [PATCH v2 03/15] s390: zcrypt: externalize AP instructions available function
` [PATCH v2 05/15] s390: vfio-ap: base implementation of VFIO AP device driver
` [PATCH v2 07/15] KVM: s390: Interfaces to configure/deconfigure guest's AP matrix
` [PATCH v2 08/15] KVM: s390: interface to enable AP execution mode
` [PATCH v2 13/15] KVM: s390: Configure the guest's CRYCB
[PATCH 00/10] KVM/X86: Handle guest memory that does not have a struct page
2018-03-02 17:40 UTC (3+ messages)
[PATCH v4 4/6] vfio/type1: check dma map request is within a valid iova range
2018-03-02 17:16 UTC (11+ messages)
[PATCH v2 0/5] Enable TOPOEXT to support hyperthreading on AMD CPU
2018-03-02 16:50 UTC (16+ messages)
` [PATCH v2 1/5] target/i386: Fix a minor typo found while reviwing
` [PATCH v2 2/5] target/i386: Populate AMD Processor Cache Information
` [PATCH v2 3/5] target/i386: Add support for CPUID_8000_001E for AMD
[PATCH 00/37] Shared Virtual Addressing for the IOMMU
2018-03-02 16:42 UTC (15+ messages)
` [PATCH 02/37] iommu/sva: Bind process address spaces to devices
` [PATCH 03/37] iommu/sva: Manage process address spaces
[RFC 0/3] arch/x86/kvm: Introduce PLE(pause loop exit) logic in SVM
2018-03-02 16:17 UTC (4+ messages)
` [RFC 1/3] arch/x86/kvm: SVM: Introduce pause filter threshold
` [RFC 2/3] arch/x86/kvm: VMX: Bring the common code to header file
` [RFC 3/3] arch/x86/kvm: SVM: Introduce pause loop exit logic in SVM
[PATCH 1/1] vfio-ccw: fence off transport mode
2018-03-02 12:03 UTC (3+ messages)
[PATCH] x86/MSR: Move native_* variants to msr.h
2018-03-02 12:01 UTC (2+ messages)
[PATCH v10 00/29] x86: Secure Encrypted Virtualization (AMD)
2018-03-02 11:31 UTC (34+ messages)
` [PATCH v10 01/28] memattrs: add debug attribute
` [PATCH v10 02/28] exec: add ram_debug_ops support
` [PATCH v10 03/28] exec: add debug version of physical memory read and write API
` [PATCH v10 04/28] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v10 05/28] machine: add -memory-encryption property
` [PATCH v10 06/28] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v10 07/28] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v10 08/28] target/i386: add Secure Encrypted Virtulization (SEV) object
` [PATCH v10 09/28] qmp: add query-sev command
` [PATCH v10 10/28] include: add psp-sev.h header file
` [PATCH v10 11/28] sev/i386: add command to initialize the memory encryption context
` [PATCH v10 12/28] sev/i386: register the guest memory range which may contain encrypted data
` [PATCH v10 13/28] kvm: introduce memory encryption APIs
` [PATCH v10 14/28] hmp: add 'info sev' command
` [PATCH v10 15/28] sev/i386: add command to create launch memory encryption context
` [PATCH v10 16/28] sev/i386: add command to encrypt guest memory region
` [PATCH v10 17/28] target/i386: encrypt bios rom
` [PATCH v10 18/28] sev/i386: add support to LAUNCH_MEASURE command
` [PATCH v10 19/28] sev/i386: finalize the SEV guest launch flow
` [PATCH v10 20/28] hw/i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v10 21/28] sev/i386: add debug encrypt and decrypt commands
` [PATCH v10 22/28] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v10 23/28] qmp: add query-sev-launch-measure command
` [PATCH v10 24/28] sev/i386: add migration blocker
` [PATCH v10 25/28] cpu/i386: populate CPUID 0x8000_001F when SEV is active
` [PATCH v10 26/28] qmp: add query-sev-capabilities command
` [PATCH v10 27/28] sev/i386: add sev_get_capabilities()
` [PATCH v10 28/28] tests/qmp-test: blacklist sev specific qmp commands
[RFC PATCH v4 0/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
2018-03-01 17:43 UTC (32+ messages)
` [RFC PATCH v4 1/7] xen/pvh: Split CONFIG_XEN_PVH into CONFIG_PVH and CONFIG_XEN_PVH
` [Xen-devel] "
` [RFC PATCH v4 2/7] xen/pvh: Move PVH entry code out of Xen specific tree
` [Xen-devel] "
` [RFC PATCH v4 3/7] xen/pvh: Create a new file for Xen specific PVH code
` [Xen-devel] "
` [RFC PATCH v4 4/7] xen/pvh: Move Xen specific PVH VM initialization out of common code
` [RFC PATCH v4 5/7] xen/pvh: Move Xen code for getting mem map via hcall out of common file
` [RFC PATCH v4 6/7] xen/pvh: Add memory map pointer to hvm_start_info struct
` [RFC PATCH v4 7/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
[PATCH v5 00/23] KVM/arm64: Randomise EL2 mappings (variant 3a mitigation)
2018-03-01 15:55 UTC (24+ messages)
` [PATCH v5 01/23] arm64: alternatives: Add dynamic patching feature
` [PATCH v5 02/23] arm64: insn: Add N immediate encoding
` [PATCH v5 03/23] arm64: insn: Add encoder for bitwise operations using literals
` [PATCH v5 04/23] arm64: KVM: Dynamically patch the kernel/hyp VA mask
` [PATCH v5 05/23] arm64: cpufeatures: Drop the ARM64_HYP_OFFSET_LOW feature flag
` [PATCH v5 06/23] KVM: arm/arm64: Do not use kern_hyp_va() with kvm_vgic_global_state
` [PATCH v5 07/23] KVM: arm/arm64: Demote HYP VA range display to being a debug feature
` [PATCH v5 08/23] KVM: arm/arm64: Move ioremap calls to create_hyp_io_mappings
` [PATCH v5 09/23] KVM: arm/arm64: Keep GICv2 HYP VAs in kvm_vgic_global_state
` [PATCH v5 10/23] KVM: arm/arm64: Move HYP IO VAs to the "idmap" range
` [PATCH v5 11/23] arm64; insn: Add encoder for the EXTR instruction
` [PATCH v5 12/23] arm64: insn: Allow ADD/SUB (immediate) with LSL #12
` [PATCH v5 13/23] arm64: KVM: Dynamically compute the HYP VA mask
` [PATCH v5 14/23] arm64: KVM: Introduce EL2 VA randomisation
` [PATCH v5 15/23] arm64: Update the KVM memory map documentation
` [PATCH v5 16/23] arm64: KVM: Move vector offsetting from hyp-init.S to kvm_get_hyp_vector
` [PATCH v5 17/23] arm64: KVM: Move stashing of x0/x1 into the vector code itself
` [PATCH v5 18/23] arm64: KVM: Add epilogue branching to the vector code
` [PATCH v5 19/23] arm64: KVM: Allow far branches from vector slots to the main vectors
` [PATCH v5 20/23] arm/arm64: KVM: Introduce EL2-specific executable mappings
` [PATCH v5 21/23] arm64: Make BP hardening slot counter available
` [PATCH v5 22/23] arm64: KVM: Allow mapping of vectors outside of the RAM region
` [PATCH v5 23/23] arm64: Enable ARM64_HARDEN_EL2_VECTORS on Cortex-A57 and A72
[PATCH v2 0/4] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
2018-03-01 14:59 UTC (5+ messages)
` [PATCH v2 1/3] x86/kvm/hyper-v: add reenlightenment MSRs support
` [PATCH v2 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change
` [PATCH v2 3/3] x86/kvm/hyper-v: inject #GP only when invalid SINTx vector is unmasked
[PATCH] KVM: x86: fix vcpu initialization with userspace lapic
2018-03-01 14:37 UTC (3+ messages)
[PATCH 1/3] KVM: X86: Provides userspace with a capability to not intercept MWAIT
2018-03-01 9:49 UTC (3+ messages)
` [PATCH 2/3] KVM: X86: Provides userspace with a capability to not intercept HLT
` [PATCH 3/3] KVM: X86: Provides userspace with a capability to not intercept PAUSE
[PATCH] x86/kvm/mmu: const-ify struct kvm_memory_slot pointers
2018-02-28 22:23 UTC
[PATCH 0/5] vfio/quirks: ioeventfd support
2018-02-28 20:46 UTC (6+ messages)
` [PATCH 1/5] vfio/quirks: Add common quirk alloc helper
` [PATCH 2/5] vfio/quirks: Add quirk reset callback
` [PATCH 3/5] vfio/quirks: ioeventfd quirk acceleration
` [PATCH 4/5] vfio: Update linux header
` [PATCH 5/5] vfio/quirks: Enable ioeventfd quirks to be handled by vfio directly
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox