Linux KVM Virtualization
[Prev Page][Next Page]
- [RFC PATCH v3 06/11] vhost/vsock: enable zerocopy callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 05/11] vhost/vsock: switch packet's buffer allocation
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 04/11] virtio/vsock: add transport zerocopy callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 03/11] af_vsock: add zerocopy receive logic
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 02/11] virtio/vsock: update, 'virtio_transport_recv_pkt()'
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 01/11] virtio/vsock: rework packet allocation logic
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 00/11] virtio/vsock: experimental zerocopy receive
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [GIT PULL] More KVM fixes for Linux 6.1-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH vfio 12/13] vfio/mlx5: Fallback to STOP_COPY upon specific PRE_COPY error
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 13/13] vfio/mlx5: Enable MIGRATION_PRE_COPY flag
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 11/13] vfio/mlx5: Introduce multiple loads
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 10/13] vfio/mlx5: Introduce SW headers for migration states
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 09/13] vfio/mlx5: Manage read() of multiple state saves
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 08/13] vfio/mlx5: Introduce vfio precopy ioctl implementation
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 07/13] vfio/mlx5: Introduce device transitions of PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 06/13] vfio/mlx5: Refactor total_length name and usage
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 05/13] vfio/mlx5: Enforce a single SAVE command at a time
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 04/13] vfio: Extend the device migration protocol with PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 03/13] net/mlx5: Introduce ifc bits for pre_copy
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 02/13] vfio/mlx5: Fix a typo in mlx5vf_cmd_load_vhca_state()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 01/13] vfio: Add an option to get migration data size
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 00/13] Add migration PRE_COPY support for mlx5 driver
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v8 0/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v8 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH -next] vfio/mlx5: Switch to use module_pci_driver() macro
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [GIT PULL] More KVM fixes for Linux 6.1-rc4
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] tools/kvm_stat: fix attack vector with user controlled FUSE mounts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/speculation: Support Automatic IBRS under virtualization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 2/3] vfio: Add an open counter to vfio_device_set
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v5 3/3] vfio/pci: Check the device set open count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v5 1/3] vfio: Fix container device registration life cycle
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v5 2/3] vfio: Export the device set open count
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v5 0/3] vfio/pci: Check the device set open count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH] KVM: selftests: Delete the semicolon after curly braces
- From: Shaomin Deng <dengshaomin@xxxxxxxxxx>
- RE: [PATCH 2/3] x86/speculation: Support Automatic IBRS
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 2/3] x86/speculation: Support Automatic IBRS
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/14] arm64: Add ID_DFR0_EL1.PerfMon values for PMUv3p7 and IMP_DEF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 5/6] KVM: selftests: Move hypercall() to hyper.h
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 4/6] KVM: selftests: Make Hyper-V guest OS ID common
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 0/6] Add Hyper-v extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v3 03/15] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- RE: [PATCH v3 03/15] interval-tree: Add a utility to iterate over spans in an interval tree
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] KVM: selftests: memslot_perf_test: aarch64 cleanup/fixes
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v8 7/7] KVM: selftests: Automate choosing dirty ring size in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v8 6/7] KVM: selftests: Clear dirty ring states between two modes in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v8 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v8 5/7] KVM: selftests: Use host page size to map ring buffer in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v8 2/7] KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v8 1/7] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v8 0/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 0/3] x86/speculation: Support Automatic IBRS
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 00/15] IOMMUFD Generic interface
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/speculation: Support Automatic IBRS under virtualization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 2/3] x86/speculation: Support Automatic IBRS
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/3] x86/cpufeatures: Add support for cpuid leaf 80000021/EAX (FeatureExt2Eax)
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 3/3] x86/speculation: Support Automatic IBRS under virtualization
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH 2/3] x86/speculation: Support Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH 1/3] x86/cpufeatures: Add support for cpuid leaf 80000021/EAX (FeatureExt2Eax)
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH 0/3] x86/speculation: Support Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v3 00/15] IOMMUFD Generic interface
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/3] vfio: Add an open counter to vfio_device_set
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 1/3] vfio: Fix container device registration life cycle
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 01/14] arm64: Add ID_DFR0_EL1.PerfMon values for PMUv3p7 and IMP_DEF
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/44] KVM: Initialize IRQ FD after arch hardware setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v4 3/3] vfio/pci: Check the device set open_count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v4 2/3] vfio: Add an open counter to vfio_device_set
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v4 1/3] vfio: Fix container device registration life cycle
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v4 0/3] vfio/pci: Check the device set open_count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- Re: [PATCH 07/10] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 05/10] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 15/15] iommufd: Add a selftest
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 03/15] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 02/15] iommu: Add device-centric DMA ownership interfaces
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 01/15] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 08/44] KVM: x86: Move hardware setup/unsetup to init/exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 8/15] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 8/15] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM vs AMD: Re: [PATCH v3 48/59] x86/retbleed: Add SKL return thunk
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: KVM vs AMD: Re: [PATCH v3 48/59] x86/retbleed: Add SKL return thunk
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH kvmtool] hw/i8042: Fix value uninitialized in kbd_io()
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [RFC PATCH 0/3] KVM: allow listener to stop all vcpus before
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [RFC PATCH 2/3] KVM: keep track of running vcpu ioctls
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [RFC PATCH 3/3] kvm: Atomic memslot updates
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [RFC PATCH 1/3] KVM: keep track of running ioctls
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v2 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 3/4] KVM: nVMX: Prepare to sanitize tertiary execution controls with eVMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 1/4] KVM: nVMX: Sanitize primary processor-based VM-execution controls with eVMCS too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Only dump VSMA to klog for debugging
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V2] KVM: SVM: Only dump VSMA to klog for debugging
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v3 7/7] vfio: Remove vfio_free_device
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v3 5/7] vfio/ccw: remove release completion
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v3 1/7] vfio/ccw: create a parent struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v3 0/7] vfio-ccw parent rework
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v3 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v3 2/7] vfio/ccw: remove private->sch
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v3 3/7] vfio/ccw: move private initialization to callback
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v3 4/7] vfio/ccw: move private to mdev lifecycle
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v2 1/2] hisi_acc_vfio_pci: Add debugfs to migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: KVM vs AMD: Re: [PATCH v3 48/59] x86/retbleed: Add SKL return thunk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/7] vfio/ccw: move private to mdev lifecycle
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/7] vfio-ccw parent rework
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] kvm/arm: Fix pvtime documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures #forregzbot
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] tools/kvm_stat: fix attack vector with user controlled FUSE mounts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] tools/kvm_stat: fix attack vector with user controlled FUSE mounts
- From: Matthias Gerstner <matthias.gerstner@xxxxxxx>
- Re: [PATCH] kvm/arm: Fix pvtime documentation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v11 09/11] s390x/cpu topology: add topology machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [PATCH v3 11/15] iommufd: Add a HW pagetable object
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] arm64: paravirt: remove conduit check in has_pv_steal_clock
- From: Steven Price <steven.price@xxxxxxx>
- Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 36/44] KVM: x86: Do compatibility checks when onlining CPU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [External] Re: [RFC 5/6] KVM: arm64: Support the VCPU preemption check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH 08/44] KVM: x86: Move hardware setup/unsetup to init/exit
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [v2 6/6] KVM: selftests: add tests for PV time specific hypercall
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [v2 5/6] KVM: arm64: Support the VCPU preemption check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [v2 4/6] KVM: arm64: Provide VCPU attributes for PV lock
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [v2 1/6] KVM: arm64: Document PV-lock interface
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [v2 3/6] KVM: arm64: Support pvlock preempted via shared structure
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [v2 2/6] KVM: arm64: Add SMCCC paravirtualised lock calls
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH] arm64: paravirt: remove conduit check in has_pv_steal_clock
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- RE: [PATCH v3 15/15] iommufd: Add a selftest
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 03/44] KVM: Allocate cpus_hardware_enabled after arch hardware setup
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Fix a typo about the usage of kvcalloc()
- From: "liaochang (A)" <liaochang1@xxxxxxxxxx>
- Re: [PATCH v2 1/2] hisi_acc_vfio_pci: Add debugfs to migration driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH] KVM: x86: replace IS_ERR() with IS_ERR_VALUE()
- From: Deming Wang <wangdeming@xxxxxxxxxx>
- Re: [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/8] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] kvm/arm: Fix pvtime documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH v5 8/8] Documentation: document the ABI changes for KVM_CAP_ARM_MTE
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 7/8] KVM: arm64: permit all VM_MTE_ALLOWED mappings with MTE enabled
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 6/8] KVM: arm64: unify the tests for VMAs in memslots when MTE is enabled
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 5/8] arm64: mte: Lock a page for MTE tag initialisation
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 4/8] mm: Add PG_arch_3 page flag
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 3/8] KVM: arm64: Simplify the sanitise_mte_tags() logic
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 2/8] arm64: mte: Fix/clarify the PG_mte_tagged semantics
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 1/8] mm: Do not enable PG_arch_2 for all 64-bit architectures
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 15/15] iommufd: Add a selftest
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 02/44] KVM: Initialize IRQ FD after arch hardware setup
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v2 0/7] vfio-ccw parent rework
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] vfio: Remove vfio_free_device
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] vfio/ccw: remove release completion
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/7] vfio/ccw: move private to mdev lifecycle
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [RESEND PATCH v2] kvm: x86: Keep the lock order consistent
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/7] vfio/ccw: create a parent struct
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- KVM vs AMD: Re: [PATCH v3 48/59] x86/retbleed: Add SKL return thunk
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH 36/44] KVM: x86: Do compatibility checks when onlining CPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Only dump VSMA to klog for debugging
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH -next] vfio/mlx5: Switch to use module_pci_driver() macro
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 0/7] vfio-ccw parent rework
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 07/14] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 07/14] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH] KVM: SVM: Only dump VSMA to klog for debugging
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH 36/44] KVM: x86: Do compatibility checks when onlining CPU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v2] KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 1/2] hisi_acc_vfio_pci: Add debugfs to migration driver
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v10 039/108] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 8/15] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v9 6/7] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v9 7/7] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v9 5/7] KVM: selftests: Shorten the test args in memslot_modification_stress_test.c
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v9 4/7] KVM: selftests: Use SZ_* macros from sizes.h in max_guest_memory_test.c
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v9 3/7] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v9 0/7] dirty_log_perf_test vCPU pinning
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v9 2/7] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v9 1/7] KVM: selftests: Add missing break between -e and -g option in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH -next] vfio/mlx5: Switch to use module_pci_driver() macro
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 5/7] KVM: selftests: Shorten the test args in memslot_modification_stress_test.c
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [syzbot] BUG: unable to handle kernel paging request in vmx_handle_exit_irqoff
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 36/44] KVM: x86: Do compatibility checks when onlining CPU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 39/44] KVM: Drop kvm_count_lock and instead protect kvm_usage_count with kvm_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 36/44] KVM: x86: Do compatibility checks when onlining CPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 09/11] s390x/cpu topology: add topology machine property
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v11 11/11] docs/s390x: document s390x cpu topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 09/11] s390x/cpu topology: add topology machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 02/11] s390x/cpu topology: add max_threads machine class attribute
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 06/11] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 10/11] s390x/cpu_topology: activating CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 00/11] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 07/11] target/s390x: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 05/11] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 03/11] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v11 08/11] s390x/cpu topology: add topology_capable QEMU capability
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 1/4] KVM: selftests: implement random number generator for guest code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v9 4/4] KVM: selftests: randomize page access order
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v9 3/4] KVM: selftests: randomize which pages are written vs read
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v9 2/4] KVM: selftests: create -r argument to specify random seed
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH] kvm/arm: Fix pvtime documentation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] kvm/arm: Fix pvtime documentation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 17/44] KVM: arm64: Do arm/arch initialiation without bouncing through kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v3 0/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 39/44] KVM: Drop kvm_count_lock and instead protect kvm_usage_count with kvm_lock
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH 36/44] KVM: x86: Do compatibility checks when onlining CPU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] KVM: replace direct irq.h inclusion
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 10/14] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 10/44] KVM: VMX: Clean up eVMCS enabling if KVM initialization fails
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 6/9] kvm: selftests: add svm nested shutdown test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] tools/kvm_stat: fix attack vector with user controlled FUSE mounts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 7/9] KVM: x86: allow L1 to not intercept triple fault
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 8/9] KVM: selftests: add svm part to triple_fault_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 5/9] KVM: selftests: move idt_entry to header
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 4/9] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 6/9] kvm: selftests: add svm nested shutdown test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 3/9] KVM: x86: add kvm_leave_nested
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 1/9] KVM: x86: nSVM: leave nested mode on vCPU free
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 2/9] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 0/9] nSVM: Security and correctness fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] tools/kvm_stat: fix attack vector with user controlled FUSE mounts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/9] nSVM: Security and correctness fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 10/44] KVM: VMX: Clean up eVMCS enabling if KVM initialization fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/44] KVM: VMX: Clean up eVMCS enabling if KVM initialization fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/9] KVM: x86: add kvm_leave_nested
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 4/9] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 6/9] kvm: selftests: add svm nested shutdown test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] tools/kvm_stat: fix attack vector with user controlled FUSE mounts
- From: Matthias Gerstner <matthias.gerstner@xxxxxxx>
- [PATCH 8/9] KVM: selftests: add svm part to triple_fault_test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 7/9] KVM: x86: allow L1 to not intercept triple fault
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 5/9] KVM: selftests: move idt_entry to header
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 1/9] KVM: x86: nSVM: leave nested mode on vCPU free
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/9] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/9] nSVM: Security and correctness fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [External] Re: [RFC 1/6] KVM: arm64: Document PV-lock interface
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] kvm/arm: Fix pvtime documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] kvm/arm: Fix pvtime documentation
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH v10 039/108] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Fix a typo about the usage of kvcalloc()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC 5/6] KVM: arm64: Support the VCPU preemption check
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH 25/44] KVM: s390: Do s390 specific init without bouncing through kvm_init()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [External] Re: [RFC 1/6] KVM: arm64: Document PV-lock interface
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH] kvm/arm: Fix pvtime documentation
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH 04/44] KVM: Teardown VFIO ops earlier in kvm_exit()
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 25/44] KVM: s390: Do s390 specific init without bouncing through kvm_init()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 14/14] KVM: arm64: Handle stage-2 faults in parallel
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 13/14] KVM: arm64: Make table->block changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 11/14] KVM: arm64: Make block->table PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 12/14] KVM: arm64: Make leaf->leaf PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 10/14] KVM: arm64: Split init and set for table PTE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 09/14] KVM: arm64: Atomically update stage 2 leaf attributes in parallel walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 07/14] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 04/14] KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 06/14] KVM: arm64: Use an opaque type for pteps
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 05/14] KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 03/14] KVM: arm64: Pass mm_ops through the visitor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 01/14] KVM: arm64: Combine visitor arguments into a context structure
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 02/14] KVM: arm64: Stash observed pte value in visitor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 00/14] KVM: arm64: Parallel stage-2 fault handling
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 1/8] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/14] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 031/108] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [syzbot] WARNING in __perf_event_overflow
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 17/44] KVM: arm64: Do arm/arch initialiation without bouncing through kvm_init()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- RE: [PATCH v3 06/15] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 30/44] KVM: Drop kvm_arch_check_processor_compat() hook
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 27/44] KVM: Drop kvm_arch_{init,exit}() hooks
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v10 031/108] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 25/44] KVM: s390: Do s390 specific init without bouncing through kvm_init()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 22/44] KVM: RISC-V: Do arch init directly in riscv_kvm_init()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 20/44] KVM: MIPS: Setup VZ emulation? directly from kvm_mips_init()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 21/44] KVM: MIPS: Register die notifier prior to kvm_init()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [PATCH v3 03/15] interval-tree: Add a utility to iterate over spans in an interval tree
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [syzbot] WARNING in __perf_event_overflow
- From: syzbot <syzbot+589d998651a580e6135d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Fix a typo about the usage of kvcalloc()
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: [PATCH v3 02/15] iommu: Add device-centric DMA ownership interfaces
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 01/15] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 10/14] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [PATCH 08/10] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 05/10] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Fix a typo about the usage of kvcalloc()
- From: "liaochang (A)" <liaochang1@xxxxxxxxxx>
- Re: [RFC 1/6] KVM: arm64: Document PV-lock interface
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [syzbot] BUG: unable to handle kernel paging request in vmx_handle_exit_irqoff
- From: syzbot <syzbot+8cdd16fd5a6c0565e227@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v2 8/8] x86: KVM: Advertise PREFETCHIT0/1 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 6/8] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 7/8] x86: KVM: Advertise AVX-NE-CONVERT CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 5/8] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 4/8] x86: KVM: Advertise AMX-FP16 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 0/8] x86: KVM: Advertise CPUID of new Intel platform instructions to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 3/8] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/8] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v2 2/8] x86/cpufeatures: Replace [CPUID_DUMMY] in cpuid_leafs[] with the last leaf
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] x86: KVM: Enable AMX-FP16 CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Fix a typo about the usage of kvcalloc()
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 060/108] KVM: Add functions to set GFN to private or shared
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 017/108] KVM: TDX: Refuse to unplug the last cpu on the package
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH 2/2] KVM: x86: Fix a typo about the usage of kvcalloc()
- From: Liao Chang <liaochang1@xxxxxxxxxx>
- Re: [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 014/108] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 6/7] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 5/7] KVM: selftests: Shorten the test args in memslot_modification_stress_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 010/108] KVM: TDX: Add TDX "architectural" error codes
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v9 0/4] randomize memory access of dirty_log_perf_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v8 5/7] KVM: selftests: Shorten the test args in memslot_modification_stress_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 4/7] KVM: selftests: Use SZ_1G from sizes.h in max_guest_memory_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 0/4] randomize memory access of dirty_log_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 2/4] KVM: selftests: create -r argument to specify random seed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 1/7] KVM: selftests: Add missing break between -e and -g option in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v8 3/7] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v8 7/7] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v8 4/7] KVM: selftests: Use SZ_1G from sizes.h in max_guest_memory_test.c
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v8 2/7] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v8 6/7] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v8 5/7] KVM: selftests: Shorten the test args in memslot_modification_stress_test.c
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v8 0/7] dirty_log_perf_test vCPU pinning
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v9 1/4] KVM: selftests: implement random number generator for guest code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 43/44] KVM: Register syscore (suspend/resume) ops early in kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 44/44] KVM: Opt out of generic hardware enabling on s390 and PPC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 40/44] KVM: Remove on_each_cpu(hardware_disable_nolock) in kvm_exit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 41/44] KVM: Use a per-CPU variable to track which CPUs have enabled virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 39/44] KVM: Drop kvm_count_lock and instead protect kvm_usage_count with kvm_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 36/44] KVM: x86: Do compatibility checks when onlining CPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 37/44] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 35/44] KVM: SVM: Check for SVM support in CPU compatibility checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 30/44] KVM: Drop kvm_arch_check_processor_compat() hook
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 42/44] KVM: Make hardware_enable_failed a local variable in the "enable all" path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 31/44] KVM: x86: Use KBUILD_MODNAME to specify vendor module name
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 34/44] KVM: VMX: Shuffle support checks and hardware enabling code around
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 32/44] KVM: x86: Unify pr_fmt to use module name for all KVM modules
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 24/44] KVM: PPC: Move processor compatibility check to module init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 25/44] KVM: s390: Do s390 specific init without bouncing through kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 29/44] KVM: x86: Do CPU compatibility checks in x86 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 28/44] KVM: VMX: Make VMCS configuration/capabilities structs read-only after init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 27/44] KVM: Drop kvm_arch_{init,exit}() hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 22/44] KVM: RISC-V: Do arch init directly in riscv_kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 21/44] KVM: MIPS: Register die notifier prior to kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 18/44] KVM: arm64: Mark kvm_arm_init() and its unique descendants as __init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 20/44] KVM: MIPS: Setup VZ emulation? directly from kvm_mips_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 26/44] KVM: s390: Mark __kvm_s390_init() and its descendants as __init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 19/44] KVM: MIPS: Hardcode callbacks to hardware virtualization extensions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/44] KVM: arm64: Unregister perf callbacks if hypervisor finalization fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/44] KVM: arm64: Free hypervisor allocations if vector slot init fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 23/44] KVM: RISC-V: Tag init functions and data with __init, __ro_after_init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 17/44] KVM: arm64: Do arm/arch initialiation without bouncing through kvm_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/44] KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/44] KVM: s390: Unwind kvm_arch_init() piece-by-piece() if a step fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/44] KVM: s390: Move hardware setup/unsetup to init/exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/44] KVM: x86: Move guts of kvm_arch_init() to standalone helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/44] KVM: x86: Move hardware setup/unsetup to init/exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/44] KVM: Drop arch hardware (un)setup hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/44] KVM: arm64: Simplify the CPUHP logic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/44] KVM: Teardown VFIO ops earlier in kvm_exit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/44] KVM: VMX: Clean up eVMCS enabling if KVM initialization fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/44] KVM: x86: Do timer initialization after XCR0 configuration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/44] KVM: x86: Serialize vendor module initialization (hardware setup)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/44] KVM: Allocate cpus_hardware_enabled after arch hardware setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/44] KVM: Initialize IRQ FD after arch hardware setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/44] KVM: Register /dev/kvm as the _very_ last thing during initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v3 12/15] KVM: arm64: Make block->table PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 27/27] x86/pmu: Add AMD Guest PerfMonV2 testcases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 26/27] x86/pmu: Update testcases to cover AMD PMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 23/27] x86/pmu: Add global helpers to cover Intel Arch PMU Version 1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 24/27] x86/pmu: Add gp_events pointer to route different event tables
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 25/27] x86/pmu: Add pmu_caps flag to track if CPU is Intel (versus AMD)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 22/27] x86: Add tests for Guest Processor Event Based Sampling (PEBS)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 21/27] x86/pmu: Track global status/control/clear MSRs in pmu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 19/27] x86/pmu: Add helper to get fixed counter MSR index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 17/27] x86/pmu: Drop wrappers that just passthrough pmu_caps fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 16/27] x86/pmu: Snapshot CPUID.0xA PMU capabilities during BSP initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 20/27] x86/pmu: Reset GP and Fixed counters during pmu_init().
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 15/27] x86/pmu: Snapshot PMU perf_capabilities during BSP initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 14/27] x86: Add a helper for the BSP's final init sequence common to all flavors
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 18/27] x86/pmu: Track GP counter and event select base MSRs in pmu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 13/27] x86/pmu: Add lib/x86/pmu.[c.h] and move common code to header files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 12/27] x86/pmu: Rename PC_VECTOR to PMI_VECTOR for better readability
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 11/27] x86/pmu: Update rdpmc testcase to cover #GP path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 10/27] x86/pmu: Refine info to clarify the current support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 09/27] x86: create pmu group for quick pmu-scope testing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 08/27] x86/pmu: Reset the expected count of the fixed counter 0 when i386
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 07/27] x86/pmu: Introduce multiple_{one, many}() to improve readability
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 06/27] x86/pmu: Introduce __start_event() to drop all of the manual zeroing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 05/27] x86/pmu: Fix printed messages for emulated instruction test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 04/27] x86/pmu: Report SKIP when testing Intel LBR on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 03/27] x86/pmu: Pop up FW prefix to avoid out-of-context propagation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 02/27] x86/pmu: Test emulation instructions on full-width counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 01/27] x86/pmu: Add PDCM check before accessing PERF_CAP register
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 00/27] x86/pmu: Test case optimization, fixes and additions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v3 04/10] KVM: selftests: Move flds instruction emulation failure handling to header
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2] KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit()
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 23/24] x86/pmu: Update testcases to cover AMD PMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/7] vfio/ccw: create a parent struct
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Use SRCU to protect zap in __kvm_set_or_clear_apicv_inhibit
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v2 1/7] vfio/ccw: create a parent struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v3 04/10] KVM: selftests: Move flds instruction emulation failure handling to header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 00/30] KVM: hardware enable/disable reorganize
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 15/15] iommufd: Add a selftest
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH v4 10/10] KVM: selftests: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 09/10] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 07/10] KVM: selftests: Avoid JMP in non-faulting path of KVM_ASM_SAFE()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 08/10] KVM: selftests: Provide error code as a KVM_ASM_SAFE() output
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 06/10] KVM: selftests: Copy KVM PFERR masks into selftests
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 03/10] KVM: selftests: Delete dead ucall code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 04/10] KVM: selftests: Move flds instruction emulation failure handling to header
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 05/10] KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 02/10] KVM: selftests: Explicitly require instructions bytes
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 01/10] KVM: selftests: Rename emulator_error_test to smaller_maxphyaddr_emulation_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 00/10] KVM: selftests: Fix and clean up emulator_error_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 00/24] x86/pmu: Test case optimization, fixes and additions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/6] x86: KVM: Enable AMX-FP16 CPUID and expose it to guest
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v3 04/10] KVM: selftests: Move flds instruction emulation failure handling to header
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 2/6] x86: KVM: Enable AMX-FP16 CPUID and expose it to guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/6] x86: KVM: Enable AMX-FP16 CPUID and expose it to guest
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 00/30] KVM: hardware enable/disable reorganize
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.19 03/10] kvm: x86: Do proper cleanup if kvm_x86_ops->vm_init() fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.0 03/11] kvm: x86: Do proper cleanup if kvm_x86_ops->vm_init() fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 23/24] x86/pmu: Update testcases to cover AMD PMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 18/24] x86/pmu: Add a set of helpers related to global registers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 17/24] x86/pmu: Add GP/Fixed counters reset helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 16/24] x86/pmu: Add GP counter related helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 15/24] x86/pmu: Initialize PMU perf_capabilities at pmu_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 14/24] x86/pmu: Read cpuid(10) in the pmu_init() to reduce VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: VMX: remove regs argument of __vmx_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 11/24] x86/pmu: Update rdpmc testcase to cover #GP path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 06/24] x86/pmu: Introduce __start_event() to drop all of the manual zeroing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 7/7] vfio: Remove vfio_free_device
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH] x86/pmu: Disable inlining of measure()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: x86: Apply NX mitigation more precisely
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 0/8] KVM: x86: Intel LBR related perf cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 5/9] KVM: arm64: Improve no-running-vcpu report for dirty ring
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 0/5] MSR filtering and MSR exiting flag clean up
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Peter Xu <peterx@xxxxxxxxxx>
- RE: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- [syzbot] BUG: unable to handle kernel paging request in vmx_handle_exit_irqoff
- From: syzbot <syzbot+8cdd16fd5a6c0565e227@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [RFC 4/6] KVM: arm64: Provide VCPU attributes for PV lock
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [RFC 3/6] KVM: arm64: Support pvlock preempted via shared structure
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [RFC 6/6] KVM: selftests: add tests for PV time specific hypercalls
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [RFC 5/6] KVM: arm64: Support the VCPU preemption check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [RFC 1/6] KVM: arm64: Document PV-lock interface
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [RFC 2/6] KVM: arm64: Add SMCCC paravirtualised lock calls
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [RFC 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v9 4/4] KVM: selftests: randomize page access order
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v9 3/4] KVM: selftests: randomize which pages are written vs read
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v9 1/4] KVM: selftests: implement random number generator for guest code
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v9 0/4] randomize memory access of dirty_log_perf_test
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v9 2/4] KVM: selftests: create -r argument to specify random seed
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: simplify hardware initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 7/7] vfio: Remove vfio_free_device
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH v2 0/7] vfio-ccw parent rework
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 5/7] vfio/ccw: remove release completion
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 4/7] vfio/ccw: move private to mdev lifecycle
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 7/7] vfio: Remove vfio_free_device
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 1/7] vfio/ccw: create a parent struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 3/7] vfio/ccw: move private initialization to callback
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 2/7] vfio/ccw: remove private->sch
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Peter Xu <peterx@xxxxxxxxxx>
- RE: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- [PATCH 5/5] s390/uaccess: add cmpxchg_user_key()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH 4/5] s390/extable: add EX_TABLE_UA_LOAD_REGPAIR() macro
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH 3/5] s390/cmpxchg: remove digits from input constraints
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH 2/5] s390/cmpxchg: make variables local to each case label
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH 1/5] s390/cmpxchg: use symbolic names for inline assembly operands
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 15/15] iommufd: Add a selftest
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 07/15] iommufd: PFN handling for iopt_pages
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 09/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.1, take #3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: use vma_lookup() instead of find_vma_intersection()
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 017/108] KVM: TDX: Refuse to unplug the last cpu on the package
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH kvmtool] hw/i8042: Fix value uninitialized in kbd_io()
- From: hbuxiaofei <hbuxiaofei@xxxxxxxxx>
- [PATCH kvmtool] hw/i8042: Fix value uninitialized in kbd_io()
- From: hbuxiaofei <hbuxiaofei@xxxxxxxxx>
- [PATCH] hw/i8042: Fix value uninitialized in kbd_io()
- From: hbuxiaofei <hbuxiaofei@xxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 4/4] KVM: arm64: Simplify the CPUHP logic
- From: isaku.yamahata@xxxxxxxxx
- [PATCH 3/4] KVM: kvm_main.c: Remove a global variable, hardware_enable_failed
- From: isaku.yamahata@xxxxxxxxx
- [PATCH 2/4] KVM: Make cpus_hardware_enabled cpumask_t instead of cpumask_var_t
- From: isaku.yamahata@xxxxxxxxx
- [PATCH 1/4] KVM: Remove on_each_cpu(hardware_disable_nolock) in kvm_exit()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH 0/4] KVM: simplify hardware initialization
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- Re: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v3] vfio/pci: Accept a non-zero open_count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- Re: [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 12/15] KVM: arm64: Make block->table PTE changes parallel-aware
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [RFC 1/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [RFC 0/1] KVM: selftests: rseq_test: use vdso_getcpu() instead of syscall()
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: iommufd branch into linux-next
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH 27/30] KVM: x86/mmu: Use kstrtobool() instead of strtobool()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v3 09/15] KVM: arm64: Free removed stage-2 tables in RCU callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 09/15] KVM: arm64: Free removed stage-2 tables in RCU callback
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 15/15] iommufd: Add a selftest
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 09/15] KVM: arm64: Free removed stage-2 tables in RCU callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 07/15] iommufd: PFN handling for iopt_pages
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [GIT PULL] KVM changes for 6.1-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v7 4/5] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 4/5] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 09/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/pmu: Disable inlining of measure()
- From: Bill Wendling <morbo@xxxxxxxxxx>
- Re: [PATCH v7 4/5] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/pmu: Disable inlining of measure()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: nVMX: Add IBPB between L2 and L1 to
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION e9d267f752f8ff62f0111cea90e3ced4fc595b4f
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/7] KVM: VMX: remove regs argument of __vmx_vcpu_run
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/10] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: VMX: remove regs argument of __vmx_vcpu_run
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v13 45/48] KVM: selftests: Introduce rdmsr_from_l2() and use it for MSR-Bitmap tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v13 45/48] KVM: selftests: Introduce rdmsr_from_l2() and use it for MSR-Bitmap tests
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v13 41/48] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 45/48] KVM: selftests: Introduce rdmsr_from_l2() and use it for MSR-Bitmap tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 8/15] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 3/9] RISC-V: KVM: Define a probe function for SBI extension data structures
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC 8/9] RISC-V: KVM: Implement perf support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 44/48] KVM: selftests: Stuff RAX/RCX with 'safe' values in vmmcall()/vmcall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 47/48] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 44/48] KVM: selftests: Stuff RAX/RCX with 'safe' values in vmmcall()/vmcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 48/48] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 45/48] KVM: selftests: Introduce rdmsr_from_l2() and use it for MSR-Bitmap tests
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 46/48] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 43/48] KVM: selftests: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 40/48] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 37/48] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 41/48] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 42/48] KVM: selftests: Create a vendor independent helper to allocate Hyper-V specific test pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 39/48] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 36/48] KVM: selftests: Drop helpers to read/write page table entries
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 35/48] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 34/48] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 38/48] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 32/48] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 29/48] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 26/48] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 27/48] KVM: x86: Make kvm_hv_get_assist_page() return 0/-errno
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 33/48] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 31/48] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 30/48] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 28/48] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]