messages from 2018-03-06 10:24:29 to 2018-03-09 10:12:01 UTC [more...]
[PATCH v12 00/28] x86: Secure Encrypted Virtualization (AMD)
2018-03-09 10:12 UTC (44+ messages)
` [PATCH v12 01/28] memattrs: add debug attribute
` [PATCH v12 02/28] exec: add ram_debug_ops support
` [PATCH v12 03/28] exec: add debug version of physical memory read and write API
` [PATCH v12 04/28] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v12 05/28] machine: add -memory-encryption property
` [PATCH v12 06/28] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v12 07/28] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v12 08/28] target/i386: add Secure Encrypted Virtulization (SEV) object
` [PATCH v12 09/28] qmp: add query-sev command
` [PATCH v12 10/28] include: add psp-sev.h header file
` [PATCH v12 11/28] sev/i386: add command to initialize the memory encryption context
` [PATCH v12 12/28] sev/i386: register the guest memory range which may contain encrypted data
` [PATCH v12 13/28] kvm: introduce memory encryption APIs
` [PATCH v12 14/28] hmp: add 'info sev' command
` [PATCH v12 15/28] sev/i386: add command to create launch memory encryption context
` [PATCH v12 16/28] sev/i386: add command to encrypt guest memory region
` [PATCH v12 17/28] target/i386: encrypt bios rom
` [PATCH v12 18/28] sev/i386: add support to LAUNCH_MEASURE command
` [PATCH v12 19/28] sev/i386: finalize the SEV guest launch flow
` [PATCH v12 20/28] hw/i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v12 21/28] sev/i386: add debug encrypt and decrypt commands
` [PATCH v12 22/28] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v12 23/28] qmp: add query-sev-launch-measure command
` [PATCH v12 24/28] sev/i386: add migration blocker
` [PATCH v12 25/28] cpu/i386: populate CPUID 0x8000_001F when SEV is active
` [PATCH v12 26/28] qmp: add query-sev-capabilities command
` [PATCH v12 27/28] sev/i386: add sev_get_capabilities()
` [PATCH v12 28/28] tests/qmp-test: blacklist sev specific qmp commands
[PATCH] drivers: vhost: vsock: fixed a brace coding style issue
2018-03-09 9:52 UTC (2+ messages)
[PATCH] KVM/x86: Move X86_CR4_OSXSAVE check into kvm_valid_sregs()
2018-03-09 8:45 UTC
[PATCH] KVM/X86: Check input sreg values before loading vcpu
2018-03-09 7:24 UTC (3+ messages)
[PATCH net 0/3] Several fixes for vhost_net ptr_ring usage
2018-03-09 6:50 UTC (4+ messages)
` [PATCH net 1/3] vhost_net: initialize rx_ring in vhost_net_open()
` [PATCH net 2/3] vhost_net: keep private_data and rx_ring synced
` [PATCH net 3/3] vhost_net: examine pointer types during un-producing
[PATCH net] vhost_net: examine pointer types during un-producing
2018-03-09 6:21 UTC (3+ messages)
[PATCH] vfio-mdev/samples: change RDI interrupt condition
2018-03-09 6:06 UTC (2+ messages)
[PATCH 1/3] KVM: X86: Provides userspace with a capability to not intercept MWAIT
2018-03-09 2:34 UTC (9+ messages)
` [PATCH 2/3] KVM: X86: Provides userspace with a capability to not intercept HLT
` [PATCH 3/3] KVM: X86: Provides userspace with a capability to not intercept PAUSE
[PATCH] KVM: x86: Fix device passthrough when SME is active
2018-03-08 23:17 UTC
[PATCH v2 00/15] s390: vfio-ap: guest dedicated crypto adapters
2018-03-08 23:03 UTC (3+ messages)
` [PATCH v2 07/15] KVM: s390: Interfaces to configure/deconfigure guest's AP matrix
[PATCH v2 0/4] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
2018-03-08 21:08 UTC (3+ messages)
` [PATCH v2 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change
[pci PATCH v4 0/4] Add support for unmanaged SR-IOV
2018-03-08 19:04 UTC (5+ messages)
` [pci PATCH v4 1/4] pci-iov: "
` [pci PATCH v4 2/4] virtio_pci: Add support for unmanaged SR-IOV on virtio_pci devices
` [pci PATCH v4 3/4] ena: Migrate over to "unmanaged SR-IOV" support
` [pci PATCH v4 4/4] nvme: "
[PATCH 0/2] KVM: arm/arm64: GICv2-on-v3 fixes
2018-03-08 18:39 UTC (11+ messages)
` [PATCH 1/2] KVM: arm/arm64: vgic: Don't populate multiple LRs with the same vintid
` [PATCH 2/2] kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3
[PATCH v5 00/23] KVM/arm64: Randomise EL2 mappings (variant 3a mitigation)
2018-03-08 17:54 UTC (21+ messages)
` [PATCH v5 01/23] arm64: alternatives: Add dynamic patching feature
` [PATCH v5 02/23] arm64: insn: Add N immediate encoding
` [PATCH v5 03/23] arm64: insn: Add encoder for bitwise operations using literals
` [PATCH v5 04/23] arm64: KVM: Dynamically patch the kernel/hyp VA mask
` [PATCH v5 05/23] arm64: cpufeatures: Drop the ARM64_HYP_OFFSET_LOW feature flag
` [PATCH v5 11/23] arm64; insn: Add encoder for the EXTR instruction
` [PATCH v5 12/23] arm64: insn: Allow ADD/SUB (immediate) with LSL #12
` [PATCH v5 18/23] arm64: KVM: Add epilogue branching to the vector code
` [PATCH v5 19/23] arm64: KVM: Allow far branches from vector slots to the main vectors
` [PATCH v5 22/23] arm64: KVM: Allow mapping of vectors outside of the RAM region
[PATCH 00/37] Shared Virtual Addressing for the IOMMU
2018-03-08 17:44 UTC (19+ messages)
` [PATCH 03/37] iommu/sva: Manage process address spaces
` [PATCH 07/37] iommu: Add a page fault handler
` [PATCH 27/37] iommu/arm-smmu-v3: Register fault workqueue
` [PATCH 28/37] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH 31/37] iommu/arm-smmu-v3: Add support for PCI ATS
` [PATCH 35/37] iommu/arm-smmu-v3: Add support for PRI
[PATCH v2 0/5] Enlightened VMCS support for KVM on Hyper-V
2018-03-08 16:56 UTC (12+ messages)
` [PATCH v2 1/5] x86/kvm: rename HV_X64_MSR_APIC_ASSIST_PAGE to HV_X64_MSR_VP_ASSIST_PAGE
` [PATCH v2 5/5] x86/kvm: use Enlightened VMCS when running on Hyper-V
4.14.18 -> 4.14.24 - almost all guests hanged
2018-03-08 14:17 UTC (3+ messages)
[PATCH v4 4/6] vfio/type1: check dma map request is within a valid iova range
2018-03-08 9:35 UTC (12+ messages)
[PATCH] KVM: X86: Allow userspace to define the microcode version
2018-03-08 9:24 UTC (2+ messages)
` [tip:x86/pti] x86/spectre_v2: Don't check microcode versions when running under hypervisors
[PATCH RFC 0/5] powerpc & KVM: Work around POWER9 TM hardware bugs
2018-03-08 7:02 UTC (6+ messages)
` [PATCH RFC 1/5] powerpc: Add a CPU feature bit for TM bug workarounds on POWER9 v2.2
` [PATCH RFC 2/5] powerpc/powernv: Provide a way to force a core into SMT4 mode
` [PATCH RFC 3/5] KVM: PPC: Book3S HV: Work around transactional memory bugs in POWER9
` [PATCH RFC 4/5] KVM: PPC: Book3S HV: Work around XER[SO] bug in fake suspend mode
` [PATCH RFC 5/5] KVM: PPC: Book3S HV: Work around TEXASR "
[PATCH AUTOSEL for 4.9 052/190] x86/reboot: Turn off KVM when halting a CPU
2018-03-08 4:59 UTC
[PATCH v11 00/28] x86: Secure Encrypted Virtualization (AMD)
2018-03-08 1:10 UTC (37+ messages)
` [PATCH v11 01/28] memattrs: add debug attribute
` [PATCH v11 02/28] exec: add ram_debug_ops support
` [PATCH v11 03/28] exec: add debug version of physical memory read and write API
` [PATCH v11 04/28] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v11 05/28] machine: add -memory-encryption property
` [PATCH v11 06/28] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v11 07/28] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v11 08/28] target/i386: add Secure Encrypted Virtulization (SEV) object
` [PATCH v11 09/28] qmp: add query-sev command
` [PATCH v11 10/28] include: add psp-sev.h header file
` [PATCH v11 11/28] sev/i386: add command to initialize the memory encryption context
` [PATCH v11 12/28] sev/i386: register the guest memory range which may contain encrypted data
` [PATCH v11 13/28] kvm: introduce memory encryption APIs
` [PATCH v11 14/28] hmp: add 'info sev' command
` [PATCH v11 15/28] sev/i386: add command to create launch memory encryption context
` [PATCH v11 16/28] sev/i386: add command to encrypt guest memory region
` [PATCH v11 17/28] target/i386: encrypt bios rom
` [PATCH v11 18/28] sev/i386: add support to LAUNCH_MEASURE command
` [PATCH v11 19/28] sev/i386: finalize the SEV guest launch flow
` [PATCH v11 20/28] hw/i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v11 21/28] sev/i386: add debug encrypt and decrypt commands
` [PATCH v11 22/28] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v11 23/28] qmp: add query-sev-launch-measure command
` [PATCH v11 24/28] sev/i386: add migration blocker
` [PATCH v11 25/28] cpu/i386: populate CPUID 0x8000_001F when SEV is active
` [PATCH v11 26/28] qmp: add query-sev-capabilities command
` [PATCH v11 27/28] sev/i386: add sev_get_capabilities()
` [PATCH v11 28/28] tests/qmp-test: blacklist sev specific qmp commands
[PULL] virtio: bugfix
2018-03-07 23:29 UTC
[PATCH 4.14 027/110] vfio: disable filesystem-dax page pinning
2018-03-07 19:38 UTC
[PATCH 4.15 032/122] vfio: disable filesystem-dax page pinning
2018-03-07 19:37 UTC
[pci PATCH v3 0/3] Add support for unmanaged SR-IOV
2018-03-07 19:05 UTC (6+ messages)
` [pci PATCH v3 1/3] pci-iov: "
` [pci PATCH v3 2/3] vfio: Add support for unmanaged or userspace managed SR-IOV
` [pci PATCH v3 3/3] virtio_pci: Add support for unmanaged SR-IOV on virtio_pci devices
[PATCH] KVM: x86: Make enum conversion explicit in kvm_pdptr_read()
2018-03-07 18:23 UTC (2+ messages)
[PATCH 0/2] KVM: nVMX: expose VMX capabilities as MSR features
2018-03-07 15:55 UTC (2+ messages)
[PATCH] KVM: VMX: expose the host's ARCH_CAPABILITIES MSR to userspace
2018-03-07 15:39 UTC (8+ messages)
[PATCH] KVM: lapic: stop advertising DIRECTED_EOI when in-kernel IOAPIC is in use
2018-03-07 13:53 UTC (3+ messages)
[PATCH v10 00/29] x86: Secure Encrypted Virtualization (AMD)
2018-03-07 13:19 UTC (6+ messages)
` [PATCH v10 11/28] sev/i386: add command to initialize the memory encryption context
` [PATCH v10 25/28] cpu/i386: populate CPUID 0x8000_001F when SEV is active
[PATCH RFC 0/3] x86/kvm: avoid expensive rdmsrs for FS/GS base MSRs
2018-03-07 13:15 UTC (4+ messages)
` [PATCH RFC 1/3] x86/kvm/vmx: read MSR_FS_BASE from current->thread
[PATCH] KVM: arm/arm64: Reset mapped IRQs on VM reset
2018-03-07 13:02 UTC (2+ messages)
[PATCH v5 00/40] Optimize KVM/ARM for VHE systems
2018-03-07 13:01 UTC (3+ messages)
` [PATCH v5 01/40] KVM: arm/arm64: Avoid vcpu_load for other vcpu ioctls than KVM_RUN
KVM call for 2018-03-13
2018-03-07 13:00 UTC
[PATCH 0/3] vfio/pci: ioeventfd support
2018-03-07 7:11 UTC (5+ messages)
` [PATCH 1/3] vfio/pci: Pull BAR mapping setup from read-write path
` [PATCH 3/3] vfio/pci: Add ioeventfd support
[PATCH 0/5] vfio/quirks: ioeventfd support
2018-03-07 7:06 UTC (7+ messages)
` [PATCH 1/5] vfio/quirks: Add common quirk alloc helper
` [PATCH 2/5] vfio/quirks: Add quirk reset callback
` [PATCH 3/5] vfio/quirks: ioeventfd quirk acceleration
[PATCH v4 0/3] KVM: Introduce dedicated vCPUs hint KVM_HINTS_DEDICATED
2018-03-07 0:41 UTC (3+ messages)
[PATCH] pci-iov: Add support for unmanaged SR-IOV
2018-03-07 0:40 UTC (11+ messages)
[PATCH v5 0/3] Support Perf Extension on AMD KVM guests
2018-03-06 21:03 UTC (5+ messages)
` [PATCH v5 1/3] x86/msr: Add AMD Core Perf Extension MSRs
[PATCH v2] KVM: arm: reserve bit in KVM_REG_ARM encoding for secure/nonsecure
2018-03-06 19:47 UTC
[PATCH] KVM: arm: reserve bit in KVM_REG_ARM encoding for secure/nonsecure
2018-03-06 19:14 UTC (6+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox