public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-03-08 12:48:37 to 2018-03-13 11:31:44 UTC [more...]

[PATCH v5 00/23] KVM/arm64: Randomise EL2 mappings (variant 3a mitigation)
 2018-03-13 11:31 UTC  (24+ messages)
` [PATCH v5 03/23] arm64: insn: Add encoder for bitwise operations using literals
` [PATCH v5 05/23] arm64: cpufeatures: Drop the ARM64_HYP_OFFSET_LOW feature flag
` [PATCH v5 09/23] KVM: arm/arm64: Keep GICv2 HYP VAs in kvm_vgic_global_state
` [PATCH v5 10/23] KVM: arm/arm64: Move HYP IO VAs to the "idmap" range
` [PATCH v5 14/23] arm64: KVM: Introduce EL2 VA randomisation
` [PATCH v5 18/23] arm64: KVM: Add epilogue branching to the vector code
` [PATCH v5 19/23] arm64: KVM: Allow far branches from vector slots to the main vectors
` [PATCH v5 22/23] arm64: KVM: Allow mapping of vectors outside of the RAM region

[PATCH v12 00/28] x86: Secure Encrypted Virtualization (AMD)
 2018-03-13 11:28 UTC  (48+ messages)
` [PATCH v12 04/28] monitor/i386: use debug APIs when accessing guest memory
` [PATCH v12 05/28] machine: add -memory-encryption property
` [PATCH v12 06/28] kvm: update kvm.h to include memory encryption ioctls
` [PATCH v12 07/28] docs: add AMD Secure Encrypted Virtualization (SEV)
` [PATCH v12 08/28] target/i386: add Secure Encrypted Virtulization (SEV) object
` [PATCH v12 09/28] qmp: add query-sev command
` [PATCH v12 10/28] include: add psp-sev.h header file
` [PATCH v12 11/28] sev/i386: add command to initialize the memory encryption context
` [PATCH v12 12/28] sev/i386: register the guest memory range which may contain encrypted data
` [PATCH v12 13/28] kvm: introduce memory encryption APIs
` [PATCH v12 14/28] hmp: add 'info sev' command
` [PATCH v12 15/28] sev/i386: add command to create launch memory encryption context
` [PATCH v12 16/28] sev/i386: add command to encrypt guest memory region
` [PATCH v12 17/28] target/i386: encrypt bios rom
` [PATCH v12 18/28] sev/i386: add support to LAUNCH_MEASURE command
` [PATCH v12 19/28] sev/i386: finalize the SEV guest launch flow
` [PATCH v12 20/28] hw/i386: set ram_debug_ops when memory encryption is enabled
` [PATCH v12 21/28] sev/i386: add debug encrypt and decrypt commands
` [PATCH v12 22/28] target/i386: clear C-bit when walking SEV guest page table
` [PATCH v12 23/28] qmp: add query-sev-launch-measure command
` [PATCH v12 24/28] sev/i386: add migration blocker
` [PATCH v12 25/28] cpu/i386: populate CPUID 0x8000_001F when SEV is active
` [PATCH v12 26/28] qmp: add query-sev-capabilities command
` [PATCH v12 27/28] sev/i386: add sev_get_capabilities()
` [PATCH v12 28/28] tests/qmp-test: blacklist sev specific qmp commands

[PATCH v4 1/2] i386: Add Intel Processor Trace feature support
 2018-03-13 11:16 UTC  (5+ messages)

[pci PATCH v5 0/4] Series short description
 2018-03-13  9:14 UTC  (15+ messages)
` [pci PATCH v5 1/4] pci: Add pci_sriov_configure_simple for PFs that don't manage VF resources
` [pci PATCH v5 2/4] virtio_pci: Add support for unmanaged SR-IOV on virtio_pci devices
` [pci PATCH v5 3/4] ena: Migrate over to unmanaged SR-IOV support
` [pci PATCH v5 4/4] nvme: "

[PATCH] KVM: x86: Add support for save/load MSR_SMI_COUNT
 2018-03-13  8:20 UTC  (2+ messages)

[PATCH 0/8] migration: improve and cleanup compression
 2018-03-13  7:57 UTC  (9+ messages)
` [PATCH 1/8] migration: stop compressing page in migration thread
` [PATCH 2/8] migration: stop allocating and freeing memory frequently
` [PATCH 3/8] migration: support to detect compression and decompression errors
` [PATCH 4/8] migration: introduce control_save_page()
` [PATCH 5/8] migration: move calling control_save_page to the common place
` [PATCH 6/8] migration: move calling save_zero_page "
` [PATCH 7/8] migration: introduce save_normal_page()
` [PATCH 8/8] migration: remove ram_save_compressed_page()

[PATCH v2 0/2] KVM: arm/arm64: GICv2-on-v3 fixes
 2018-03-13  0:45 UTC  (5+ messages)
` [PATCH v2 1/2] KVM: arm/arm64: vgic: Don't populate multiple LRs with the same vintid
` [PATCH v2 2/2] kvm: arm/arm64: vgic-v3: Tighten synchronization for guests using v2 on v3

[PATCH] vfio/type1: Search for a fitting iommu_domain before attaching the iommu_group
 2018-03-12 23:26 UTC  (2+ messages)

[RFC] vfio iommu type1: improve memory pinning process for raw PFN mapping
 2018-03-12 22:06 UTC  (3+ messages)
  ` [RFC v2] "

[PATCH v4 0/5] Enable TOPOEXT to support hyperthreading on AMD CPU
 2018-03-12 21:00 UTC  (6+ messages)
` [PATCH v4 1/5] target/i386: Generalize some of the macro definitions
` [PATCH v4 2/5] target/i386: Populate AMD Processor Cache Information
` [PATCH v4 3/5] target/i386: Add support for CPUID_8000_001E for AMD
` [PATCH v4 4/5] target/i386: Enable TOPOEXT feature on AMD EPYC CPU
` [PATCH v4 5/5] target/i386: Remove generic SMT thread check

WARNING in kvm_arch_vcpu_ioctl_run (2)
 2018-03-12 18:49 UTC  (7+ messages)

[pci PATCH v5 0/4] Add support for unmanaged SR-IOV (was: Series short description)
 2018-03-12 17:25 UTC 

[PATCH 0/3] x86/kvm: avoid expensive rdmsrs for FS/GS base MSRs
 2018-03-12 17:11 UTC  (12+ messages)
` [PATCH 1/3] x86/kvm/vmx: read MSR_FS_BASE from current->thread
` [PATCH 2/3] x86/kvm/vmx: read MSR_KERNEL_GS_BASE "
` [PATCH 3/3] x86/kvm/vmx: avoid expensive rdmsr for MSR_GS_BASE

[pci PATCH v4 0/4] Add support for unmanaged SR-IOV
 2018-03-12 16:28 UTC  (9+ messages)
` [pci PATCH v4 1/4] pci-iov: "
` [pci PATCH v4 2/4] virtio_pci: Add support for unmanaged SR-IOV on virtio_pci devices
` [pci PATCH v4 3/4] ena: Migrate over to "unmanaged SR-IOV" support
` [pci PATCH v4 4/4] nvme: "

Patch "x86/spectre_v2: Don't check microcode versions when running under hypervisors" has been added to the 4.9-stable tree
 2018-03-12 15:48 UTC 

Patch "x86/spectre_v2: Don't check microcode versions when running under hypervisors" has been added to the 4.15-stable tree
 2018-03-12 15:45 UTC 

Patch "x86/spectre_v2: Don't check microcode versions when running under hypervisors" has been added to the 4.14-stable tree
 2018-03-12 15:42 UTC 

[PATCH v3 0/7] Enlightened VMCS support for KVM on Hyper-V
 2018-03-12 14:19 UTC  (10+ messages)
` [PATCH v3 1/7] x86/hyper-v: move hyperv.h out of uapi
` [PATCH v3 2/7] x86/hyper-v: move definitions from TLFS to hyperv-tlfs.h
` [PATCH v3 3/7] x86/kvm: rename HV_X64_MSR_APIC_ASSIST_PAGE to HV_X64_MSR_VP_ASSIST_PAGE
` [PATCH v3 4/7] x86/hyper-v: allocate and use Virtual Processor Assist Pages
` [PATCH v3 5/7] x86/hyper-v: define struct hv_enlightened_vmcs and clean field bits
` [PATCH v3 6/7] x86/hyper-v: detect nested features
` [PATCH v3 7/7] x86/kvm: use Enlightened VMCS when running on Hyper-V

[PATCH v2 0/3] Provides userspace with per-VM capability to improve latency
 2018-03-12 11:53 UTC  (4+ messages)
` [PATCH v2 1/3] KVM: X86: Provides userspace with a capability to not intercept MWAIT
` [PATCH v2 2/3] KVM: X86: Provides userspace with a capability to not intercept HLT
` [PATCH v2 3/3] KVM: X86: Provides userspace with a capability to not intercept PAUSE

[PATCH] X86/KVM: Update the exit_qualification access bits while walking an address
 2018-03-12  8:55 UTC  (5+ messages)

[PATCH 3.16 62/76] x86/kvm: Update spectre-v1 mitigation
 2018-03-12  3:06 UTC 

[PATCH 3.2 092/104] x86/kvm: Update spectre-v1 mitigation
 2018-03-12  3:03 UTC 

[PATCH 0/2] KVM: arm/arm64: GICv2-on-v3 fixes
 2018-03-11  1:51 UTC  (11+ messages)
` [PATCH 1/2] KVM: arm/arm64: vgic: Don't populate multiple LRs with the same vintid

[RFC 0/3] arch/x86/kvm: Introduce PLE(pause loop exit) logic in SVM
 2018-03-10  5:07 UTC  (4+ messages)
` [RFC 3/3] arch/x86/kvm: SVM: Introduce pause loop exit "

[PATCH v2] target-i386: add KVM_HINTS_DEDICATED performance hint
 2018-03-10  1:43 UTC  (3+ messages)

[GIT PULL] KVM fixes for Linux 4.16-rc5
 2018-03-09 21:34 UTC 

[PATCH net 0/3] Several fixes for vhost_net ptr_ring usage
 2018-03-09 17:03 UTC  (8+ messages)
` [PATCH net 1/3] vhost_net: initialize rx_ring in vhost_net_open()
` [PATCH net 2/3] vhost_net: keep private_data and rx_ring synced
` [PATCH net 3/3] vhost_net: examine pointer types during un-producing

[PATCH] drivers: vhost: vsock: fixed a brace coding style issue
 2018-03-09 16:39 UTC  (3+ messages)

[PATCH v2 0/4] x86/kvm/hyper-v: More fixes for TSC page clocksource for Hyper-V on KVM
 2018-03-09 15:45 UTC  (5+ messages)
` [PATCH v2 2/3] x86/kvm/hyper-v: remove stale entries from vec_bitmap/auto_eoi_bitmap on vector change

[PATCH 00/37] Shared Virtual Addressing for the IOMMU
 2018-03-09 11:44 UTC  (13+ messages)
` [PATCH 07/37] iommu: Add a page fault handler
` [PATCH 17/37] iommu/arm-smmu-v3: Move context descriptor code
` [PATCH 27/37] iommu/arm-smmu-v3: Register fault workqueue
` [PATCH 28/37] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH 31/37] iommu/arm-smmu-v3: Add support for PCI ATS
` [PATCH 35/37] iommu/arm-smmu-v3: Add support for PRI

[PATCH] KVM/x86: Move X86_CR4_OSXSAVE check into kvm_valid_sregs()
 2018-03-09  8:45 UTC 

[PATCH] KVM/X86: Check input sreg values before loading vcpu
 2018-03-09  7:24 UTC  (3+ messages)

[PATCH net] vhost_net: examine pointer types during un-producing
 2018-03-09  6:21 UTC  (3+ messages)

[PATCH] vfio-mdev/samples: change RDI interrupt condition
 2018-03-09  6:06 UTC  (2+ messages)

[PATCH 1/3] KVM: X86: Provides userspace with a capability to not intercept MWAIT
 2018-03-09  2:34 UTC  (9+ messages)
` [PATCH 2/3] KVM: X86: Provides userspace with a capability to not intercept HLT
` [PATCH 3/3] KVM: X86: Provides userspace with a capability to not intercept PAUSE

[PATCH] KVM: x86: Fix device passthrough when SME is active
 2018-03-08 23:17 UTC 

[PATCH v2 00/15] s390: vfio-ap: guest dedicated crypto adapters
 2018-03-08 23:03 UTC  (3+ messages)
` [PATCH v2 07/15] KVM: s390: Interfaces to configure/deconfigure guest's AP matrix

[PATCH v2 0/5] Enlightened VMCS support for KVM on Hyper-V
 2018-03-08 16:56 UTC  (12+ messages)
` [PATCH v2 1/5] x86/kvm: rename HV_X64_MSR_APIC_ASSIST_PAGE to HV_X64_MSR_VP_ASSIST_PAGE
` [PATCH v2 5/5] x86/kvm: use Enlightened VMCS when running on Hyper-V

4.14.18 -> 4.14.24 - almost all guests hanged
 2018-03-08 14:17 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox