public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-05-21 15:13:58 to 2018-05-24 11:03:41 UTC [more...]

[PATCH v3 00/27] x86: PIE support and option to extend KASLR randomization
 2018-05-24 11:03 UTC  (35+ messages)
` [PATCH v3 01/27] x86/crypto: Adapt assembly for PIE support
` [PATCH v3 02/27] x86: Use symbol name on bug table "
` [PATCH v3 03/27] x86: Use symbol name in jump "
` [PATCH v3 04/27] x86: Add macro to get symbol address "
` [PATCH v3 05/27] x86: relocate_kernel - Adapt assembly "
` [PATCH v3 06/27] x86/entry/64: "
` [PATCH v3 07/27] x86: pm-trace - "
` [PATCH v3 08/27] x86/CPU: "
` [PATCH v3 09/27] x86/acpi: "
` [PATCH v3 10/27] x86/boot/64: "
` [PATCH v3 11/27] x86/power/64: "
` [PATCH v3 12/27] x86/paravirt: "
` [PATCH v3 13/27] x86/boot/64: Build head64.c as mcmodel large when PIE is enabled
` [PATCH v3 14/27] x86/percpu: Adapt percpu for PIE support
` [PATCH v3 15/27] compiler: Option to default to hidden symbols
` [PATCH v3 16/27] compiler: Option to add PROVIDE_HIDDEN replacement for weak symbols
` [PATCH v3 17/27] x86/relocs: Handle PIE relocations
` [PATCH v3 18/27] xen: Adapt assembly for PIE support
` [PATCH v3 19/27] kvm: "
` [PATCH v3 20/27] x86: Support global stack cookie
` [PATCH v3 21/27] x86/ftrace: Adapt function tracing for PIE support
` [PATCH v3 22/27] x86/modules: Add option to start module section after kernel
` [PATCH v3 23/27] x86/modules: Adapt module loading for PIE support
` [PATCH v3 24/27] x86/mm: Make the x86 GOT read-only
` [PATCH v3 25/27] x86/pie: Add option to build the kernel as PIE
` [PATCH v3 26/27] x86/relocs: Add option to generate 64-bit relocations
` [PATCH v3 27/27] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB

[PATCH] KVM: PPC: remove mmio_vsx_tx_sx_enabled in PR KVM MMIO emulation
 2018-05-24  9:21 UTC  (2+ messages)

[PATCH v5 00/13] s390: vfio-ap: guest dedicated crypto adapters
 2018-05-24  9:10 UTC  (30+ messages)
` [PATCH v5 05/13] s390: vfio-ap: register matrix device with VFIO mdev framework
` [PATCH v5 06/13] KVM: s390: interfaces to manage guest's AP matrix
` [PATCH v5 10/13] s390: vfio-ap: sysfs interface to view matrix mdev matrix
` [PATCH v5 11/13] KVM: s390: implement mediated device open callback

[PATCH RFCv2 0/4] virtio-mem: paravirtualized memory
 2018-05-23 18:27 UTC 

[PATCH v10 0/5] i386: Enable TOPOEXT to support hyperthreading on AMD CPU
 2018-05-23 18:16 UTC  (12+ messages)
` [PATCH v10 1/5] i386: Clean up cache CPUID code
` [PATCH v10 2/5] i386: Populate AMD Processor Cache Information for cpuid 0x8000001D
` [PATCH v10 3/5] i386: Add support for CPUID_8000_001E for AMD
` [PATCH v10 4/5] i386: Enable TOPOEXT feature on AMD EPYC CPU
` [PATCH v10 5/5] i386: Remove generic SMT thread check

[PATCH v7 0/7] KVM: x86: Allow Qemu/KVM to use PVH entry point
 2018-05-23 16:56 UTC  (4+ messages)

[PATCH] Use 'imply' with SEV Kconfig CRYPTO dependencies
 2018-05-23 14:46 UTC  (2+ messages)

[PULL 07/28] x86/cpu: use standard-headers/asm-x86.kvm_para.h
 2018-05-23 14:43 UTC 

[PATCH v4 0/2] vfio/mdev: Device namespace protection
 2018-05-23 13:34 UTC  (12+ messages)
` [PATCH v4 1/2] vfio/mdev: Check globally for duplicate devices
` [PATCH v4 2/2] vfio/mdev: Re-order sysfs attribute creation

[PATCH v2 0/3] Provides userspace with per-VM capability to improve latency
 2018-05-23 11:22 UTC  (2+ messages)

[PATCH v4 0/4] vfio: ccw: error handling fixes and improvements
 2018-05-23 10:25 UTC  (7+ messages)
` [PATCH v4 1/4] vfio: ccw: shorten kernel doc description for pfn_array_pin()
` [PATCH v4 2/4] vfio: ccw: refactor and improve pfn_array_alloc_pin()
` [PATCH v4 3/4] vfio: ccw: set ccw->cda to NULL defensively
` [PATCH v4 4/4] vfio: ccw: add traceponits for interesting error paths

[PATCH v2 00/40] Shared Virtual Addressing for the IOMMU
 2018-05-23  9:38 UTC  (11+ messages)
` [PATCH v2 03/40] iommu/sva: Manage process address spaces
` [PATCH v2 07/40] iommu: Add a page fault handler
` [PATCH v2 13/40] vfio: Add support for Shared Virtual Addressing

[RFC V4 PATCH 0/8] Packed ring layout for vhost
 2018-05-23  8:57 UTC  (6+ messages)
` [RFC V4 PATCH 7/8] vhost: packed ring support

[PATCH 00/10] vfio: ccw: Refactoring the VFIO CCW state machine
 2018-05-23  8:19 UTC  (13+ messages)
` [PATCH 04/10] vfio: ccw: replace IO_REQ event with SSCH_REQ event

[PATCH v4 00/29] KVM: PPC: Book3S PR: Transaction memory support on PR KVM
 2018-05-23  7:02 UTC  (30+ messages)
` [PATCH v4 01/29] powerpc: export symbol msr_check_and_set()
` [PATCH v4 02/29] powerpc: add TEXASR related macros
` [PATCH v4 03/29] powerpc: export tm_enable()/tm_disable/tm_abort() APIs
` [PATCH v4 04/29] KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file
` [PATCH v4 05/29] KVM: PPC: Book3S PR: add new parameter (guest MSR) for kvmppc_save_tm()/kvmppc_restore_tm()
` [PATCH v4 06/29] KVM: PPC: Book3S PR: turn on FP/VSX/VMX MSR bits in kvmppc_save_tm()
` [PATCH v4 07/29] KVM: PPC: Book3S PR: add C function wrapper for _kvmppc_save/restore_tm()
` [PATCH v4 08/29] KVM: PPC: Book3S PR: In PR KVM suspends Transactional state when inject an interrupt
` [PATCH v4 09/29] KVM: PPC: Book3S PR: PR KVM pass through MSR TM/TS bits to shadow_msr
` [PATCH v4 10/29] KVM: PPC: Book3S PR: Sync TM bits to shadow msr for problem state guest
` [PATCH v4 11/29] KVM: PPC: Book3S PR: implement RFID TM behavior to suppress change from S0 to N0
` [PATCH v4 12/29] KVM: PPC: Book3S PR: prevent TS bits change in kvmppc_interrupt_pr()
` [PATCH v4 13/29] KVM: PPC: Book3S PR: adds new kvmppc_copyto_vcpu_tm/kvmppc_copyfrom_vcpu_tm API for PR KVM
` [PATCH v4 14/29] KVM: PPC: Book3S PR: add kvmppc_save/restore_tm_sprs() APIs
` [PATCH v4 15/29] KVM: PPC: Book3S PR: add transaction memory save/restore skeleton for PR KVM
` [PATCH v4 16/29] KVM: PPC: Book3S PR: add math support for PR KVM HTM
` [PATCH v4 17/29] KVM: PPC: Book3S PR: make mtspr/mfspr emulation behavior based on active TM SPRs
` [PATCH v4 18/29] KVM: PPC: Book3S PR: always fail transaction in guest privilege state
` [PATCH v4 19/29] KVM: PPC: Book3S PR: enable NV reg restore for reading TM SPR at "
` [PATCH v4 20/29] KVM: PPC: Book3S PR: adds emulation for treclaim
` [PATCH v4 21/29] KVM: PPC: Book3S PR: add emulation for trechkpt in PR KVM
` [PATCH v4 22/29] KVM: PPC: Book3S PR: add emulation for tabort. for privilege guest
` [PATCH v4 23/29] KVM: PPC: Book3S PR: add guard code to prevent returning to guest with PR=0 and Transactional state
` [PATCH v4 24/29] KVM: PPC: Book3S PR: Support TAR handling for PR KVM HTM
` [PATCH v4 25/29] KVM: PPC: Book3S PR: enable HTM for PR KVM for KVM_CHECK_EXTENSION ioctl
` [PATCH v4 26/29] KVM: PPC: move vcpu_load/vcpu_put down to each ioctl case in kvm_arch_vcpu_ioctl
` [PATCH v4 27/29] KVM: PPC: remove load/put vcpu for KVM_GET/SET_ONE_REG ioctl
` [PATCH v4 28/29] KVM: PPC: remove load/put vcpu for KVM_GET_REGS/KVM_SET_REGS
` [PATCH v4 29/29] KVM: PPC: Book3S PR: enable kvmppc_get/set_one_reg_pr() for HTM registers

[PATCH v3 00/29] KVM: PPC: Book3S PR: Transaction memory support on PR KVM
 2018-05-23  7:01 UTC  (4+ messages)
` [PATCH v3 24/29] KVM: PPC: Book3S PR: Support TAR handling for PR KVM HTM

[PATCH v3 0/7] KVM: PPC: reimplement mmio emulation with analyse_instr()
 2018-05-23  3:06 UTC  (4+ messages)
` [PATCH v3 5/7] KVM: PPC: reimplements LOAD_VSX/STORE_VSX instruction mmio emulation with analyse_intr() input

[PATCH v3 0/4] vfio: ccw: error handling fixes and improvements
 2018-05-23  2:45 UTC  (5+ messages)
` [PATCH v3 1/4] vfio: ccw: shorten kernel doc description for pfn_array_pin()
` [PATCH v3 2/4] vfio: ccw: refactor and improve pfn_array_alloc_pin()
` [PATCH v3 3/4] vfio: ccw: set ccw->cda to NULL defensively
` [PATCH v3 4/4] vfio: ccw: add traceponits for interesting error paths

[PATCH] Fix SSBD not being exposed to guests. (v1)
 2018-05-22 23:50 UTC  (3+ messages)
` [PATCH] KVM: VMX: Expose SSBD properly to guests

CONFIG_KCOV causing crash in svm_vcpu_run()
 2018-05-22 21:56 UTC  (4+ messages)

[PATCH] KVM: Switch 'requests' to be 64-bit (explicitly)
 2018-05-22 15:47 UTC  (4+ messages)

[PATCH v2 00/12] KVM/X86: Introduce a new guest mapping interface
 2018-05-22 15:43 UTC  (6+ messages)

[PATCH RFC 0/2] vfio-ccw: support for {halt,clear} subchannel
 2018-05-22 15:10 UTC  (7+ messages)
` [PATCH RFC 2/2] vfio-ccw: support for halt/clear subchannel

[PATCH v3 0/6] vfio/quirks: ioeventfd support
 2018-05-22 14:04 UTC  (3+ messages)
` [PATCH v3 1/6] scripts/update-linux-headers: Update handling of __aligned_u64

[PATCH v2 0/5] vfio: ccw: error handling fixes and improvements
 2018-05-22 12:55 UTC  (7+ messages)
` [PATCH v2 5/5] vfio: ccw: add traceponits for interesting error paths

[RFC PATCH net-next 00/12] XDP batching for TUN/vhost_net
 2018-05-22 12:41 UTC  (17+ messages)
` [RFC PATCH net-next 01/12] vhost_net: introduce helper to initialize tx iov iter
` [RFC PATCH net-next 02/12] vhost_net: introduce vhost_exceeds_weight()
` [RFC PATCH net-next 03/12] vhost_net: introduce vhost_has_more_pkts()
` [RFC PATCH net-next 04/12] vhost_net: split out datacopy logic
` [RFC PATCH net-next 10/12] vhost_net: build xdp buff

[PATCH v7 08/13] KVM: arm/arm64: Remove kvm_vgic_vcpu_early_init
 2018-05-22 12:22 UTC  (4+ messages)

[PATCH net] vhost: synchronize IOTLB message with dev cleanup
 2018-05-22 11:58 UTC 

[PULL 0/3] Speculative store buffer bypass mitigation (CVE-2018-3639)
 2018-05-22  9:59 UTC  (5+ messages)
` [PULL 1/3] i386: define the 'ssbd' CPUID feature bit (CVE-2018-3639)
` [PULL 2/3] i386: Define the Virt SSBD MSR and handling of it (CVE-2018-3639)
` [PULL 3/3] i386: define the AMD 'virt-ssbd' CPUID feature bit (CVE-2018-3639)

KASAN: use-after-free Read in vhost_chr_write_iter
 2018-05-22  8:42 UTC  (8+ messages)

[PATCH v8 00/13] KVM: arm/arm64: Allow multiple GICv3 redistributor regions
 2018-05-22  7:55 UTC  (14+ messages)
` [PATCH v8 01/13] KVM: arm/arm64: Set dist->spis to NULL after kfree
` [PATCH v8 02/13] KVM: arm/arm64: Document KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
` [PATCH v8 03/13] KVM: arm/arm64: Replace the single rdist region by a list
` [PATCH v8 04/13] KVM: arm/arm64: Helper to locate free rdist index
` [PATCH v8 05/13] KVM: arm/arm64: Revisit Redistributor TYPER last bit computation
` [PATCH v8 06/13] KVM: arm/arm64: Adapt vgic_v3_check_base to multiple rdist regions
` [PATCH v8 07/13] KVM: arm/arm64: Helper to register a new redistributor region
` [PATCH v8 08/13] KVM: arm/arm64: Remove kvm_vgic_vcpu_early_init
` [PATCH v8 09/13] KVM: arm/arm64: Check vcpu redist base before registering an iodev
` [PATCH v8 10/13] KVM: arm/arm64: Check all vcpu redistributors are set on map_resources
` [PATCH v8 11/13] KVM: arm/arm64: Add KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
` [PATCH v8 12/13] KVM: arm/arm64: Implement KVM_VGIC_V3_ADDR_TYPE_REDIST_REGION
` [PATCH v8 13/13] KVM: arm/arm64: Bump VGIC_V3_MAX_CPUS to 512

[PATCH v9 00/12] Intel Processor Trace virtualization enabling
 2018-05-22  4:52 UTC  (13+ messages)
` [PATCH v9 01/12] perf/x86/intel/pt: Move Intel-PT MSRs bit definitions to a public header
` [PATCH v9 02/12] perf/x86/intel/pt: Change pt_cap_get() to a public function
` [PATCH v9 03/12] perf/x86/intel/pt: Add new bit definitions for Intel PT MSRs
` [PATCH v9 04/12] perf/x86/intel/pt: add new capability for Intel PT
` [PATCH v9 05/12] perf/x86/intel/pt: Introduce a new function to get capability of "
` [PATCH v9 06/12] KVM: x86: Add Intel Processor Trace virtualization mode
` [PATCH v9 07/12] KVM: x86: Add Intel Processor Trace cpuid emulation
` [PATCH v9 08/12] KVM: x86: Add Intel Processor Trace context switch for each vcpu
` [PATCH v9 09/12] KVM: x86: Introduce a function to initialize the PT configuration
` [PATCH v9 10/12] KVM: x86: Implement Intel Processor Trace MSRs read/write emulation
` [PATCH v9 11/12] KVM: x86: Set intercept for Intel PT MSRs read/write
` [PATCH v9 12/12] KVM: x86: Disable Intel Processor Trace when VMXON in L1 guest

[PATCH 0/3] i386: speculative store buffer bypass mitigation (CVE-2018-3639)
 2018-05-21 21:59 UTC  (5+ messages)
` [PATCH 1/3] i386: define the 'ssbd' CPUID feature bit (CVE-2018-3639)
` [PATCH 2/3] i386: define the AMD 'virt-ssbd' "
` [PATCH 3/3] i386: Define the Virt SSBD MSR and handling of it (CVE-2018-3639)

KASAN: use-after-free Read in irq_bypass_unregister_consumer
 2018-05-21 17:25 UTC 

[PATCH] KVM: X86: prevent integer overflows in KVM_MEMORY_ENCRYPT_REG_REGION
 2018-05-21 15:52 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox