kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-05-07 14:16:33 to 2019-05-08 14:51:30 UTC [more...]

[PATCH, RFC 00/62] Intel MKTME enabling
 2019-05-08 14:44 UTC  (53+ messages)
` [PATCH, RFC 07/62] x86/mm: Mask out KeyID bits from page table entry pfn
` [PATCH, RFC 09/62] x86/mm: Preserve KeyID on pte_modify() and pgprot_modify()
` [PATCH, RFC 12/62] x86/mm: Add a helper to retrieve KeyID for a VMA
` [PATCH, RFC 13/62] x86/mm: Add hooks to allocate and free encrypted pages
` [PATCH, RFC 15/62] x86/mm: Rename CONFIG_RANDOMIZE_MEMORY_PHYSICAL_PADDING
` [PATCH, RFC 16/62] x86/mm: Allow to disable MKTME after enumeration
` [PATCH, RFC 17/62] x86/mm: Calculate direct mapping size
` [PATCH, RFC 18/62] x86/mm: Implement syncing per-KeyID direct mappings
` [PATCH, RFC 19/62] x86/mm: Handle encrypted memory in page_to_virt() and __pa()
` [PATCH, RFC 20/62] mm/page_ext: Export lookup_page_ext() symbol
` [PATCH, RFC 21/62] mm/rmap: Clear vma->anon_vma on unlink_anon_vmas()
` [PATCH, RFC 22/62] x86/pconfig: Set a valid encryption algorithm for all MKTME commands
` [PATCH, RFC 23/62] keys/mktme: Introduce a Kernel Key Service for MKTME
` [PATCH, RFC 24/62] keys/mktme: Preparse the MKTME key payload
` [PATCH, RFC 25/62] keys/mktme: Instantiate and destroy MKTME keys
` [PATCH, RFC 26/62] keys/mktme: Move the MKTME payload into a cache aligned structure
` [PATCH, RFC 27/62] keys/mktme: Strengthen the entropy of CPU generated MKTME keys
` [PATCH, RFC 28/62] keys/mktme: Set up PCONFIG programming targets for "
` [PATCH, RFC 29/62] keys/mktme: Program MKTME keys into the platform hardware
` [PATCH, RFC 30/62] keys/mktme: Set up a percpu_ref_count for MKTME keys
` [PATCH, RFC 31/62] keys/mktme: Require CAP_SYS_RESOURCE capability "
` [PATCH, RFC 32/62] keys/mktme: Store MKTME payloads if cmdline parameter allows
` [PATCH, RFC 33/62] acpi: Remove __init from acpi table parsing functions
` [PATCH, RFC 34/62] acpi/hmat: Determine existence of an ACPI HMAT
` [PATCH, RFC 35/62] keys/mktme: Require ACPI HMAT to register the MKTME Key Service
` [PATCH, RFC 36/62] acpi/hmat: Evaluate topology presented in ACPI HMAT for MKTME
` [PATCH, RFC 37/62] keys/mktme: Do not allow key creation in unsafe topologies
` [PATCH, RFC 38/62] keys/mktme: Support CPU hotplug for MKTME key service
` [PATCH, RFC 39/62] keys/mktme: Find new PCONFIG targets during memory hotplug
` [PATCH, RFC 40/62] keys/mktme: Program new PCONFIG targets with MKTME keys
` [PATCH, RFC 41/62] keys/mktme: Support memory hotplug for "
` [PATCH, RFC 42/62] mm: Generalize the mprotect implementation to support extensions
` [PATCH, RFC 43/62] syscall/x86: Wire up a system call for MKTME encryption keys
` [PATCH, RFC 44/62] x86/mm: Set KeyIDs in encrypted VMAs for MKTME
` [PATCH, RFC 45/62] mm: Add the encrypt_mprotect() system call "
` [PATCH, RFC 46/62] x86/mm: Keep reference counts on encrypted VMAs "
` [PATCH, RFC 47/62] mm: Restrict MKTME memory encryption to anonymous VMAs
` [PATCH, RFC 48/62] selftests/x86/mktme: Test the MKTME APIs
` [PATCH, RFC 49/62] mm, x86: export several MKTME variables
` [PATCH, RFC 50/62] kvm, x86, mmu: setup MKTME keyID to spte for given PFN
` [PATCH, RFC 51/62] iommu/vt-d: Support MKTME in DMA remapping
` [PATCH, RFC 52/62] x86/mm: introduce common code for mem encryption
` [PATCH, RFC 53/62] x86/mm: Use common code for DMA memory encryption
` [PATCH, RFC 54/62] x86/mm: Disable MKTME on incompatible platform configurations
` [PATCH, RFC 55/62] x86/mm: Disable MKTME if not all system memory supports encryption
` [PATCH, RFC 56/62] x86: Introduce CONFIG_X86_INTEL_MKTME
` [PATCH, RFC 57/62] x86/mktme: Overview of Multi-Key Total Memory Encryption
` [PATCH, RFC 58/62] x86/mktme: Document the MKTME provided security mitigations
` [PATCH, RFC 59/62] x86/mktme: Document the MKTME kernel configuration requirements
` [PATCH, RFC 60/62] x86/mktme: Document the MKTME Key Service API
` [PATCH, RFC 61/62] x86/mktme: Document the MKTME API for anonymous memory encryption
` [PATCH, RFC 62/62] x86/mktme: Demonstration program using the MKTME APIs

[PATCH 00/10] s390: virtio: support protected virtualization
 2019-05-08 14:46 UTC  (15+ messages)
` [PATCH 04/10] s390/mm: force swiotlb for "
` [PATCH 05/10] s390/cio: introduce DMA pools to cio
` [PATCH 06/10] s390/cio: add basic protected virtualization support
` [PATCH 07/10] s390/airq: use DMA memory for adapter interrupts
` [PATCH 08/10] virtio/s390: add indirection to indicators access
` [PATCH 09/10] virtio/s390: use DMA memory for ccw I/O and classic notifiers

[PATCH v2] KVM: nVMX: Disable intercept for *_BASE MSR in vmcs02 when possible
 2019-05-08 14:45 UTC  (3+ messages)

[PATCH v7 00/23] SMMUv3 Nested Stage Setup
 2019-05-08 14:38 UTC  (9+ messages)
` [PATCH v7 06/23] iommu: Introduce bind/unbind_guest_msi
` [PATCH v7 11/23] iommu/arm-smmu-v3: Maintain a SID->device structure
` [PATCH v7 12/23] iommu/smmuv3: Get prepared for nested stage support
` [PATCH v7 13/23] iommu/smmuv3: Implement attach/detach_pasid_table

[PATCH v2] kvm: nVMX: Set nested_run_pending in vmx_set_nested_state after checks complete
 2019-05-08 14:20 UTC  (2+ messages)

[Bug 203543] New: Starting with kernel 5.1.0-rc6, kvm_intel can no longer be loaded in nested kvm/guests
 2019-05-08 13:51 UTC  (7+ messages)
` [Bug 203543] "

[PATCH v1 0/7] s390: vfio-ccw fixes
 2019-05-08 13:36 UTC  (13+ messages)
` [PATCH 3/7] s390/cio: Split pfn_array_alloc_pin into pieces
` [PATCH 7/7] s390/cio: Remove vfio-ccw checks of command codes

[PATCH 00/16] treewide: fix match_string() helper when array size
 2019-05-08 13:22 UTC  (23+ messages)
` [PATCH 01/16] lib: fix match_string() helper on -1 "
` [PATCH 01/16] lib: fix match_string() helper when array size is positive
` [PATCH 02/16] treewide: rename match_string() -> __match_string()
` [PATCH 03/16] lib,treewide: add new match_string() helper/macro
` [PATCH 04/16] powerpc/xmon: use "
` [PATCH 05/16] ALSA: oxygen: "
` [PATCH 06/16] x86/mtrr: use new match_string() helper + add gaps == minor fix
` [PATCH 07/16] device connection: use new match_string() helper/macro
` [PATCH 08/16] cpufreq/intel_pstate: remove NULL entry + use match_string()
` [PATCH 09/16] mmc: sdhci-xenon: use new match_string() helper/macro
` [PATCH 10/16] pinctrl: armada-37xx: "
` [PATCH 11/16] mm/vmpressure.c: "
` [PATCH 12/16] rdmacg: "
` [PATCH 13/16] drm/edid: "
` [PATCH 14/16] staging: gdm724x: "
` [PATCH 15/16] video: fbdev: pxafb: "
` [PATCH 16/16] sched: debug: "

[PATCH v2 00/10] RFC: NVME MDEV
 2019-05-08 12:39 UTC  (5+ messages)

[PATCH v2 0/2] introduction of version attribute for VFIO live migration
 2019-05-08 12:10 UTC  (10+ messages)
` [PATCH v2 2/2] drm/i915/gvt: export mdev device version to sysfs for Intel vGPU
  ` [PATCH v2 1/2] vfio/mdev: add version attribute for mdev device

[PATCH 1/3] kvm: nVMX: Set nested_run_pending in vmx_set_nested_state after checks complete
 2019-05-08 12:11 UTC  (3+ messages)

[PATCH 3/3] tests: kvm: Add tests for KVM_SET_NESTED_STATE
 2019-05-08 12:07 UTC  (4+ messages)

[PATCH] tests: kvm: Add tests to .gitignore
 2019-05-08 12:01 UTC  (2+ messages)

[PATCH] tests: kvm: Add tests for KVM_CAP_MAX_VCPUS and KVM_CAP_MAX_CPU_ID
 2019-05-08 12:01 UTC  (2+ messages)

[PATCH v2] tests: kvm: Add tests to .gitignore
 2019-05-08 11:55 UTC  (2+ messages)

[PATCH v2 0/3] kvm: Some more trivial fixes for clear dirty log
 2019-05-08 11:49 UTC  (5+ messages)
` [PATCH v2 1/3] KVM: Fix the bitmap range to copy during clear dirty
` [PATCH v2 2/3] KVM: Fix loop of clear dirty with possible off-by-one
` [PATCH v2 3/3] KVM: Introduce KVM_CAP_MANUAL_DIRTY_LOG_PROTECT_2

BUG: soft lockup in kvm_vm_ioctl
 2019-05-08 11:25 UTC  (4+ messages)

[PATCH v7 0/6] virtio pmem driver
 2019-05-08 11:19 UTC  (15+ messages)
` [PATCH v7 2/6] virtio-pmem: Add "
    ` [Qemu-devel] "
` [PATCH v7 3/6] libnvdimm: add dax_dev sync flag
` [PATCH v7 4/6] dax: check synchronous mapping is supported
  ` [Qemu-devel] "
` [PATCH v7 6/6] xfs: disable map_sync for async flush
      ` [Qemu-devel] "

[PATCH] KVM: fix 'release' method of KVM device
 2019-05-08 10:17 UTC  (4+ messages)

[PATCH v1 0/2] New state handling for VFIO CCW
 2019-05-08  9:53 UTC  (7+ messages)
` [PATCH v1 1/2] vfio-ccw: Set subchannel state STANDBY on open
` [PATCH v1 2/2] vfio-ccw: rework sch_event

[PATCH 0/2] kvm: Some more trivial fixes for clear dirty log
 2019-05-08  8:36 UTC  (5+ messages)
` [PATCH 1/2] kvm: Fix the bitmap range to copy during clear dirty
` [PATCH 2/2] kvm: Fix loop of clear dirty with off-by-one

[PATCH RFC] vhost: don't use kmap() to log dirty pages
 2019-05-08  4:28 UTC  (5+ messages)

[PATCH] sched: introduce configurable delay before entering idle
 2019-05-07 23:44 UTC  (3+ messages)

[PATCH 00/15] KVM: nVMX: Optimize nested VM-Entry
 2019-05-07 21:01 UTC  (18+ messages)
` [PATCH 01/15] KVM: nVMX: Don't dump VMCS if virtual APIC page can't be mapped
` [PATCH 02/15] KVM: VMX: Always signal #GP on WRMSR to MSR_IA32_CR_PAT with bad value
` [PATCH 03/15] KVM: nVMX: Always sync GUEST_BNDCFGS when it comes from vmcs01
` [PATCH 04/15] KVM: nVMX: Write ENCLS-exiting bitmap once per vmcs02
` [PATCH 05/15] KVM: nVMX: Don't rewrite GUEST_PML_INDEX during nested VM-Entry
` [PATCH 06/15] KVM: nVMX: Don't "put" vCPU or host state when switching VMCS
` [PATCH 07/15] KVM: nVMX: Don't reread VMCS-agnostic "
` [PATCH 08/15] KVM: nVMX: Don't speculatively write virtual-APIC page address
` [PATCH 09/15] KVM: nVMX: Don't speculatively write APIC-access "
` [PATCH 10/15] KVM: nVMX: Update vmcs12 for MSR_IA32_CR_PAT when it's written
` [PATCH 11/15] KVM: nVMX: Update vmcs12 for SYSENTER MSRs when they're written
` [PATCH 12/15] KVM: nVMX: Update vmcs12 for MSR_IA32_DEBUGCTLMSR when it's written
` [PATCH 13/15] KVM: nVMX: Update vmcs02 GUEST_IA32_DEBUGCTL only when vmcs12 is dirty
` [PATCH 14/15] KVM: nVMX: Don't update GUEST_BNDCFGS if it's clean in HV eVMCS
` [PATCH 15/15] KVM: nVMX: Copy PDPTRs to/from vmcs12 only when necessary

[PATCH v8 00/15] x86/split_lock: Enable split lock detection
 2019-05-07 20:48 UTC  (5+ messages)
` [PATCH v8 13/15] x86/split_lock: Enable split lock detection by default

[PATCH 00/13] KVM: VMX: Reduce VMWRITEs to VMCS controls
 2019-05-07 19:18 UTC  (14+ messages)
` [PATCH 01/13] KVM: nVMX: Use adjusted pin controls for vmcs02
` [PATCH 02/13] KVM: VMX: Add builder macros for shadowing controls
` [PATCH 03/13] KVM: VMX: Shadow VMCS pin controls
` [PATCH 04/13] KVM: VMX: Shadow VMCS primary execution controls
` [PATCH 05/13] KVM: VMX: Shadow VMCS secondary "
` [PATCH 06/13] KVM: nVMX: Shadow VMCS controls on a per-VMCS basis
` [PATCH 07/13] KVM: nVMX: Don't reset VMCS controls shadow on VMCS switch
` [PATCH 08/13] KVM: VMX: Explicitly initialize controls shadow at VMCS allocation
` [PATCH 09/13] KVM: nVMX: Preserve last USE_MSR_BITMAPS when preparing vmcs02
` [PATCH 10/13] KVM: nVMX: Preset *DT exiting in vmcs02 when emulating UMIP
` [PATCH 11/13] KVM: VMX: Drop hv_timer_armed from 'struct loaded_vmcs'
` [PATCH 12/13] KVM: nVMX: Don't mark vmcs12 as dirty when L1 writes pin controls
` [PATCH 13/13] KVM: VMX: Leave preemption timer running when it's disabled

[PATCH v15 00/17] arm64: untag user pointers passed to the kernel
 2019-05-07 16:44 UTC  (5+ messages)
` [PATCH v15 11/17] drm/amdgpu, arm64: untag user pointers
` [PATCH v15 12/17] drm/radeon, arm64: untag user pointers in radeon_gem_userptr_ioctl

[PATCH 0/7] KVM: nVMX: Optimize VMCS data copying
 2019-05-07 15:36 UTC  (8+ messages)
` [PATCH 1/7] KVM: nVMX: Intercept VMWRITEs to read-only shadow VMCS fields
` [PATCH 2/7] KVM: nVMX: Intercept VMWRITEs to GUEST_{CS,SS}_AR_BYTES
` [PATCH 3/7] KVM: nVMX: Track vmcs12 offsets for shadowed VMCS fields
` [PATCH 4/7] KVM: nVMX: Lift sync_vmcs12() out of prepare_vmcs12()
` [PATCH 5/7] KVM: nVMX: Use descriptive names for VMCS sync functions and flags
` [PATCH 6/7] KVM: nVMX: Add helpers to identify shadowed VMCS fields
` [PATCH 7/7] KVM: nVMX: Sync rarely accessed guest fields only when needed

[PATCH v2 0/7] s390: vfio-ap: dynamic configuration support
 2019-05-07 15:15 UTC  (11+ messages)
` [PATCH v2 1/7] s390: vfio-ap: wait for queue empty on queue reset
` [PATCH v2 2/7] s390: vfio-ap: maintain a shadow of the guest's CRYCB

[PATCH] svm/avic: Allow avic_vcpu_load logic to support host APIC ID 255
 2019-05-07 14:16 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).