Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v2 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 2/4] vfio: Move vfio_spapr_iommu_eeh_ioctl into vfio_iommu_spapr_tce.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 0/4] Simplify the module and kconfig structure in vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 1/4] vfio/pci: Move all the SPAPR PCI specific logic to vfio_pci_core.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 3/4] vfio: Remove CONFIG_VFIO_SPAPR_EEH
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- [PATCH 5.4 33/37] x86/bugs: Add Cannon lake to RETBleed affected CPU list
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 29/37] KVM: VMX: Fix IBRS handling after vmexit
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 37/37] x86/speculation: Add RSB VM Exit protections
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 32/37] x86/cpu/amd: Enumerate BTC_NO
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 28/37] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 36/37] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 34/37] x86/speculation: Disable RRSBA behavior
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 35/37] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 31/37] x86/common: Stamp out the stepping madness
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 30/37] x86/speculation: Fill RSB on vmexit for IBRS
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 26/37] KVM: VMX: Flatten __vmx_vcpu_run()
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 27/37] KVM: VMX: Convert launched argument to flags
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 20/37] x86/speculation: Fix firmware entry SPEC_CTRL handling
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 24/37] KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 23/37] x86/speculation: Remove x86_spec_ctrl_mask
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 21/37] x86/speculation: Fix SPEC_CTRL write on SMT state change
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 22/37] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 19/37] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 25/37] KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 18/37] x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 17/37] intel_idle: Disable IBRS during long idle
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 16/37] x86/bugs: Report Intel retbleed vulnerability
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 15/37] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 14/37] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 13/37] x86/bugs: Optimize SPEC_CTRL MSR writes
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 12/37] x86/entry: Add kernel IBRS implementation
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 11/37] x86/entry: Remove skip_r11rcx
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 10/37] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 09/37] x86/bugs: Add AMD retbleed= boot parameter
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 08/37] x86/bugs: Report AMD retbleed vulnerability
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 07/37] x86/cpufeatures: Move RETPOLINE flags to word 11
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 06/37] x86/kvm/vmx: Make noinstr clean
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 05/37] x86/cpu: Add a steppings field to struct x86_cpu_id
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 04/37] x86/cpu: Add consistent CPU match macros
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 03/37] x86/devicetable: Move x86 specific macro out of generic code
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 02/37] Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 01/37] Revert "x86/speculation: Add RSB VM Exit protections"
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 00/37] IBRS support // Retbleed mitigations
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- Re: [PATCH v10 30/39] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC v3 6/7] virtio: in order support for virtio_ring
- From: Guo Zhi <qtxuning1999@xxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: Nested AVIC design (was:Re: [RFC PATCH v3 04/19] KVM: x86: mmu: allow to enable write tracking externally)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/4] x86: nSVM: Add testing for routing L2 exceptions
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/4] x86: nSVM: Add testing for routing L2 exceptions
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH] KVM: VMX: Resume guest immediately when injecting #GP on ECREATE
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH AUTOSEL 5.19 22/29] KVM: s390: Pass initialized arg even if unused
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Keith Busch <kbusch@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 updates for 6.1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [GIT PULL] KVM/riscv changes for 6.1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/3] riscv: kvm: use generic entry for TIF_NOTIFY_RESUME and misc
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH] selftests/kvm: Avoid for loop initialization using vcpu->id in xapic_state_test
- From: Gautam Menghani <gautammenghani201@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Advertise new kvmarm mailing list
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: arm64: Advertise new kvmarm mailing list
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 000/105] KVM TDX basic feature support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 8/9] KVM: s390: selftest: memop: Fix typo
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [kvm-unit-tests PATCH 9/9] x86/apic: Add test to verify aliased xAPIC IDs both receive IPI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 8/9] x86/apic: Add test for logical mode IPI delivery (cluster and flat)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 5/9] x86/apic: Restore APIC to original state after every sub-test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 6/9] x86/apic: Enable IRQs on vCPU0 for all tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 7/9] x86/apic: Run tests that modify APIC ID and/or APIC_BASE after other tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/9] x86/apic: Replaces spaces with tabs to fix indentation in apic.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/9] x86/apic: Add test config to allow running apic tests against SVM's AVIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 4/9] x86/apic: Assert that vCPU0's APIC is enabled at the start of the test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/9] x86/apic: Add helpers to query current APIC state, e.g. xAPIC vs. x2APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/9] x86/apic: Cleanups and new tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 32/32] KVM: x86: Track required APICv inhibits with variable, not callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 22/32] KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 26/32] KVM: SVM: Always update local APIC on writes to logical dest register
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 25/32] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 30/32] KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 29/32] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 18/32] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 16/32] KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 20/32] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 23/32] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 21/32] KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 17/32] KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 15/32] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 09/32] KVM: x86: Handle APICv updates for APIC "mode" changes via request
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 05/32] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 07/32] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 02/32] KVM: x86: Purge "highest ISR" cache when updating APICv state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 12/32] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 08/32] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 04/32] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 10/32] KVM: x86: Move APIC access page helper to common x86 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 13/32] KVM: SVM: Compute dest based on sender's x2APIC status for AVIC kick
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 06/32] KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 14/32] KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 01/32] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- [PATCH v5 7/7] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 0/7] KVM: x86: Apply NX mitigation more precisely
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 2/7] KVM: x86/mmu: Rename NX huge pages fields/functions for consistency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 5/7] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 4/7] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 3/7] KVM: x86/mmu: Properly account NX huge page workaround for nonpaging MMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 1/7] KVM: x86/mmu: Tag disallowed NX huge pages even if they're not tracked
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 6/7] KVM: x86/mmu: Add helper to convert SPTE value to its shadow page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: VMX: Resume guest immediately when injecting #GP on ECREATE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: Handle all known exceptions with ASM_TRY()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] nVMX: Use ASM_TRY() for VMREAD and VMWRITE page fault tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] nVMX: Fix VMREAD/VMWRITE #PF tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] nVMX: Dedup the bulk of the VMREAD/VMWRITE #PF tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] Simplify some of the locking in vfio_group
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: simplify the mdev interface v8
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- [PATCH v1 6/9] KVM: s390: selftest: memop: Add bad address test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 5/9] KVM: s390: selftest: memop: Replace macros by functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 9/9] KVM: s390: selftest: memop: Fix wrong address being used in test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 7/9] KVM: s390: selftest: memop: Add cmpxchg tests
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 8/9] KVM: s390: selftest: memop: Fix typo
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 3/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 4/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- Re: [PATCH 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: Guest IA32_SPEC_CTRL on AMD hosts without X86_FEATURE_V_SPEC_CTRL
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] First batch of KVM changes for Linux 6.1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] Final set of (mostly selftests) KVM patches for Linux 6.0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] virtio: fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [GIT PULL] virtio: fixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v3] hyperv: fix SynIC SINT assertion failure on guest reset
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] i386/sev: Update checks and information related to reduced-phys-bits
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 4/4] i386/cpu: Update how the EBX register of CPUID 0x8000001F is set
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 2/4] qemu-options.hx: Update the reduced-phys-bits documentation
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 0/4] Qemu SEV reduced-phys-bits fixes
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 1/4] qapi, i386/sev: Change the reduced-phys-bits value from 5 to 1
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v14 5/6] KVM: s390: pv: support for Destroy fast UVC
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 3/6] KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 4/6] KVM: s390: pv: avoid export before import if possible
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 6/6] KVM: s390: pv: module parameter to fence asynchronous destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 1/6] KVM: s390: pv: asynchronous destroy for reboot
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 2/6] KVM: s390: pv: api documentation for asynchronous destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 0/6] KVM: s390: pv: implement lazy destroy for reboot
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [KVM] 7055fb1131: WARNING:at_arch/x86/kvm/x86.c:#inject_pending_event[kvm]
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- [PATCH v9 104/105] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 103/105] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 105/105] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 101/105] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 100/105] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 102/105] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 098/105] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 099/105] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 097/105] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 094/105] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 093/105] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 095/105] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 096/105] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 092/105] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 091/105] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 060/105] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 062/105] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 090/105] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 058/105] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 089/105] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 061/105] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 087/105] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 086/105] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 059/105] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 057/105] KVM: Add functions to set GFN to private or shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 070/105] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 088/105] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 056/105] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 053/105] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 055/105] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 054/105] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 080/105] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 051/105] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 050/105] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 085/105] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 046/105] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 073/105] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 074/105] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 067/105] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 079/105] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 077/105] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 082/105] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 068/105] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 049/105] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 081/105] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 047/105] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 072/105] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 084/105] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 083/105] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 078/105] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 048/105] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 052/105] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 069/105] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 066/105] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 044/105] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 076/105] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 043/105] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 045/105] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 042/105] KVM: x86/mmu: Require TDP MMU for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 038/105] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 024/105] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 040/105] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 025/105] KVM: TDX: Use private memory for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 029/105] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 030/105] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 037/105] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 033/105] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 026/105] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 034/105] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 065/105] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 039/105] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 075/105] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 027/105] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 064/105] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 035/105] KVM: TDX: Enable mmio spte caching always for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 028/105] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 023/105] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 063/105] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 031/105] KVM: x86/mmu: Make sync_page not use hard-coded 0 as the initial SPTE value
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 032/105] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 041/105] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 036/105] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 071/105] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 011/105] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 022/105] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 018/105] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 006/105] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 008/105] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 020/105] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 007/105] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 019/105] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 021/105] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 012/105] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 004/105] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 005/105] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 010/105] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 016/105] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 001/105] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 002/105] KVM: x86: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 003/105] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 009/105] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 014/105] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 015/105] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCHv3 0/2] qemu direct io alignment fix
- From: Kevin Wolf <kwolf@xxxxxxxxxx>
- [PATCH v9 017/105] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 000/105] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 013/105] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH 2/2] vfio: Change vfio_group->group_rwsem to a mutex
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v8 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] vfio: Remove the vfio_group->users and users_comp
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: x86/mmu: Bug the VM if KVM attempts to double count an NX huge page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v4 15/15] vfio: Add struct device to vfio_device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Junichi Uekawa (上川純一) <uekawa@xxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Enable notify VM exit
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/6] KVM: x86: Mask off reserved bits in CPUID.8000001FH
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 5/6] KVM: x86: Mask off reserved bits in CPUID.8000001EH
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 4/6] KVM: x86: Mask off reserved bits in CPUID.8000001AH
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 3/6] KVM: x86: Mask off reserved bits in CPUID.80000008H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: Nested AVIC design (was:Re: [RFC PATCH v3 04/19] KVM: x86: mmu: allow to enable write tracking externally)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/4] KVM: selftests: Explicitly require instructions bytes in emulator_error_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 3/4] KVM: selftests: Skip emulator_error_test if KVM_CAP_EXIT_ON_EMULATION_FAILURE not available
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 2/4] KVM: selftests: Delete dead ucall code from emulator_error_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 1/4] KVM: selftests: Use MMIO to trigger emulation in emulator_error_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 0/4] KVM: selftests: Fix and clean up emulator_error_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: allow compiling out SMM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCHv3 2/2] block: use the request length for iov alignment
- From: Keith Busch <kbusch@xxxxxxxx>
- [PATCHv3 1/2] block: move bdrv_qiov_is_aligned to file-posix
- From: Keith Busch <kbusch@xxxxxxxx>
- [PATCHv3 0/2] qemu direct io alignment fix
- From: Keith Busch <kbusch@xxxxxxxx>
- Re: [PATCH v3 0/3] KVM: selftests: Fix nx_huge_pages_test when TDP is disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 15/15] vfio: Add struct device to vfio_device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: Guest IA32_SPEC_CTRL on AMD hosts without X86_FEATURE_V_SPEC_CTRL
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 3/3] KVM: selftests: Fix nx_huge_pages_test on TDP-disabled hosts
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 2/3] KVM: selftests: Add helpers to read kvm_{intel,amd} boolean module parameters
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 1/3] KVM: selftests: Tell the compiler that code after TEST_FAIL() is unreachable
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 0/3] KVM: selftests: Fix nx_huge_pages_test when TDP is disabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2] hyperv: fix SynIC SINT assertion failure on guest reset
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 15/15] vfio: Add struct device to vfio_device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Guest IA32_SPEC_CTRL on AMD hosts without X86_FEATURE_V_SPEC_CTRL
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: don't apply host security mitigations to the guest
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 07/10] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Enable notify VM exit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 7/8] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86: start moving SMM-related functions to new files
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 2/8] KVM: x86: move SMM entry to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 0/8] KVM: x86: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 3/8] KVM: x86: move SMM exit to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 6/8] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 4/8] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 8/8] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 5/8] KVM: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] hyperv: fix SynIC SINT assertion failure on guest reset
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 15/15] vfio: Add struct device to vfio_device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v8 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Christoph Hellwig <hch@xxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: selftests: Add helper to read boolean module parameters
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] KVM: allow compiling out SMM support
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Keith Busch <kbusch@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: selftests: Implement memcmp(), memcpy(), and memset() for guest use
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 0/4] Simplify the module and kconfig structure in vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 1/4] vfio/pci: Move all the SPAPR PCI specific logic to vfio_pci_core.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/4] vfio: Move vfio_spapr_iommu_eeh_ioctl into vfio_iommu_spapr_tce.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 3/4] vfio: Remove CONFIG_VFIO_SPAPR_EEH
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/2] vfio: Change vfio_group->group_rwsem to a mutex
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 0/2] Simplify some of the locking in vfio_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 1/2] vfio: Remove the vfio_group->users and users_comp
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: don't apply host security mitigations to the guest
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 00/25] KVM: arm64: Introduce pKVM hyp VM and vCPU state at EL2
- From: Vincent Donnefort <vdonnefort@xxxxxxxxxx>
- [PATCH kvmtool v2] virtio-net: Fix vq->use_event_idx flag check
- From: Tu Dinh Ngoc <dinhngoc.tu@xxxxxxx>
- [PATCH v1 45/51] gdbstub: move guest debug support check to ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v1 46/51] accel/kvm: move kvm_update_guest_debug to inline stub
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v1 44/51] gdbstub: move breakpoint logic to accel ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v1 43/51] gdbstub: move sstep flags probing into AccelClass
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH kvmtool v2] virtio-net: Fix vq->use_event_idx flag check
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH kvmtool] mmio: Fix wrong PIO tree search size
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH kvmtool v2] virtio-net: Fix vq->use_event_idx flag check
- From: Tu Dinh Ngoc <dinhngoc.tu@xxxxxxx>
- Re: [PATCH kvmtool] virtio-net: Fix vq->use_event_idx flag check
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v2 0/6] KVM: Fix dirty-ring ordering on weakly ordered architectures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: selftests: Implement memcmp(), memcpy(), and memset() for guest use
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V3 0/6] Conditionally read fields in dev cfg space
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH V3 0/6] Conditionally read fields in dev cfg space
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V3 0/6] Conditionally read fields in dev cfg space
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [RESEND PATCH v8 4/4] i386: add notify VM exit support
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [RESEND PATCH v8 1/4] i386: kvm: extend kvm_{get, put}_vcpu_events to support pending triple fault
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [RESEND PATCH v8 3/4] kvm: expose struct KVMState
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [RESEND PATCH v8 2/4] kvm: allow target-specific accelerator properties
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [RESEND PATCH v8 0/4] Enable notify VM exit
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: simplify the mdev interface v8
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v8 3/4] kvm: expose struct KVMState
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v8 4/4] i386: add notify VM exit support
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v8 2/4] kvm: allow target-specific accelerator properties
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v8 1/4] i386: kvm: extend kvm_{get, put}_vcpu_events to support pending triple fault
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v8 0/4] Enable notify VM exit
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v3] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Ajay Kaher <akaher@xxxxxxxxxx>
- Re: [PATCH RFC v2 02/13] iommufd: Overview documentation
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH V3 6/6] vDPA: conditionally read MTU and MAC in dev cfg space
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V3 5/6] vDPA: fix spars cast warning in vdpa_dev_net_mq_config_fill
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V3 4/6] vDPA: check virtio device features to detect MQ
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V3 3/6] vDPA: check VIRTIO_NET_F_RSS for max_virtqueue_paris's presence
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V3 2/6] vDPA: only report driver features if FEATURES_OK is set
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V3 1/6] vDPA: allow userspace to query features of a vDPA device
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V3 0/6] Conditionally read fields in dev cfg space
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- KVM: x86: Second batch of updates for 6.1, i.e. kvm/queue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH 2/2] KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 1/2] KVM: VMX: Guest usage of IA32_SPEC_CTRL is likely
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 7/7] Revert "KVM: selftests: Fix nested SVM tests when built with clang"
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v2 6/7] KVM: selftests: Dedup subtests of fix_hypercall_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/7] KVM: selftests: Hardcode VMCALL/VMMCALL opcodes in "fix hypercall" test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/7] KVM: selftests: Remove unnecessary register shuffling in fix_hypercall_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/7] Revert "KVM: selftests: Fix nested SVM tests when built with clang"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/7] KVM: selftests: Explicitly verify KVM doesn't patch hypercall if quirk==off
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/7] KVM: selftests: Compare insn opcodes directly in fix_hypercall_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/7] KVM: selftests: Implement memcmp(), memcpy(), and memset() for guest use
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/7] KVM: selftests: Fix "fix hypercall test" build errors
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: VMX: Make vmread_error_trampoline() uncallable from C code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Junichi Uekawa (上川純一) <uekawa@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: selftests: Rename perf_test_util symbols to memstress
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: Skip tests that require EPT when it is not available
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: Gracefully handle empty stack traces
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: selftests: Fix nx_huge_pages_test on TDP-disabled hosts
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: selftests: Add helper to read boolean module parameters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 07/28] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Fix spelling mistake "miliseconds" -> "milliseconds"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Fix spelling mistake "begining" -> "beginning"
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: selftests: Fix spelling mistake "begining" -> "beginning"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- [PATCH] KVM: selftests: Fix spelling mistake "UFFDIO_CONINUE" -> "UFFDIO_CONTINUE"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v3 05/28] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- Re: [PATCH v3 1/6] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in validate_direct_spte()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/28] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v7 2/2] s390x: Test specification exceptions during transaction
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v7 1/2] s390x: Add specification exception test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v7 0/2] Add specification exception tests
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: simplify the mdev interface v8
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 2/3] KVM: selftests: Add helper to read boolean module parameters
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: selftests: Fix nx_huge_pages_test when TDP is disabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: selftests: Fix nx_huge_pages_test on TDP-disabled hosts
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: selftests: Tell the compiler that code after TEST_FAIL() is unreachable
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v3 05/28] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v9 01/10] s390x/cpus: Make absence of multithreading clear
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v8 10/14] KVM: selftests: aarch64: Add aarch64/page_fault_test
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v3 05/28] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/28] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 07/28] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: SEV: Fix a few small typos
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [RFC PATCH 9/9] kvm_main.c: handle atomic memslot update
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 7/9] kvm_main.c: duplicate invalid memslot also in inactive list
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] kvm_main.c: split __kvm_set_memory_region logic in kvm_check_mem and kvm_prepare_batch
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 4/9] kvm_main.c: split logic in kvm_set_memslots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v8 10/14] KVM: selftests: aarch64: Add aarch64/page_fault_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 04/15] target/arm: ensure KVM traps set appropriate MemTxAttrs
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH v3 05/28] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 3/9] kvm_main.c: introduce kvm_internal_memory_region_list
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] kvm.h: introduce KVM_SET_USER_MEMORY_REGION_LIST ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/9] kvm_main.c: move slot check in kvm_set_memory_region
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 07/28] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 01/10] s390x/cpus: Make absence of multithreading clear
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v9 01/10] s390x/cpus: Make absence of multithreading clear
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v2] hyperv: fix SynIC SINT assertion failure on guest reset
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RESEND PATCH] KVM: selftests: Update top-of-file comment in psci_test
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH kvmtool] mmio: Fix wrong PIO tree search size
- From: dinhngoc.tu@xxxxxxx
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH kvmtool] virtio-net: Fix vq->use_event_idx flag check
- From: dinhngoc.tu@xxxxxxx
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: allow compiling out SMM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v9 08/10] target/s390x: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 01/10] s390x/cpus: Make absence of multithreading clear
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 02/10] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: simplify the mdev interface v8
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH] KVM: s390: pci: register pci hooks without interpretation
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC v2] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC v2] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 1/5] perf/x86/intel/lbr: use setup_clear_cpu_cap instead of clear_cpu_cap
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH][RESEND] hyperv: fix SynIC SINT assertion failure on guest reset
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 03/10] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 03/10] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v2] KVM: SVM: Replace kmap_atomic() with kmap_local_page()
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v9 03/10] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 04/10] hw/core: introducing drawer and books for s390x
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 04/10] hw/core: introducing drawer and books for s390x
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] riscv: kvm: use generic entry for TIF_NOTIFY_RESUME and misc
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] RISC-V: KVM: Record number of signal exits as a vCPU stat
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 05/10] s390x/cpu: reporting drawers and books topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/10] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 07/10] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/10] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [RFC v2] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v9 00/10] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 10/10] docs/s390x: document s390x cpu topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 09/10] s390x/cpu_topology: activating CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Junichi Uekawa <uekawa@xxxxxxxxxxxx>
- Re: [PATCH v3 07/28] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 05/28] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 1/3] RISC-V: KVM: Record number of signal exits as a vCPU stat
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v8 10/14] KVM: selftests: aarch64: Add aarch64/page_fault_test
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- RE: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 05/28] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Alejandro Jimenez <alejandro.j.jimenez@xxxxxxxxxx>
- Re: [PATCH v7 2/2] i386: Add notify VM exit support
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v7 1/2] i386: kvm: extend kvm_{get, put}_vcpu_events to support pending triple fault
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH kernel] KVM: SVM: Fix function name in comment
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 10/14] KVM: selftests: aarch64: Add aarch64/page_fault_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: simplify the mdev interface v8
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC v2] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH v2] KVM: selftests: Gracefully handle empty stack traces
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Un-inhibit APICv/AVIC when switching to x2APIC mode
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: simplify the mdev interface v8
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH] Documentation: KVM: Describe guest CPUID.15H settings for in-kernel APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] KVM: selftests: Gracefully handle empty stack traces
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH] KVM: allow compiling out SMM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH RFC v2 02/13] iommufd: Overview documentation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH] KVM: x86: disable on 32-bit unless CONFIG_BROKEN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Skip tests that require EPT when it is not available
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] perf/x86/intel/pt: Introduce and export pt_get_curr_event()
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- [PATCH v2] KVM: selftests: Skip tests that require EPT when it is not available
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in validate_direct_spte()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH net] rhashtable: fix crash due to mm api change
- From: Martin Zaharinov <micron10@xxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v4 1/6] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/6] KVM: Fix dirty-ring ordering on weakly ordered architectures
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH] KVM: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH][RESEND] hyperv: fix SynIC SINT assertion failure on guest reset
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 09/10] s390x/cpu_topology: activating CPU topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [RFC PATCH 9/9] kvm_main.c: handle atomic memslot update
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- RE: [RFC PATCH v2 2/3] perf/x86/intel/pt: Introduce and export pt_get_curr_event()
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- [PATCH v3 15/15] accel/kvm: move kvm_update_guest_debug to inline stub
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 12/15] gdbstub: move sstep flags probing into AccelClass
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [RESEND PATCH v2] kvm: mmu: fix typos in struct kvm_arch
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 13/15] gdbstub: move breakpoint logic to accel ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 14/15] gdbstub: move guest debug support check to ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 04/15] target/arm: ensure KVM traps set appropriate MemTxAttrs
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Hide IA32_PLATFORM_DCA_CAP[31:0] from the guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Gracefully handle empty stack traces
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH net-next 0/4] shrink struct ubuf_info
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH v7 2/2] i386: Add notify VM exit support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 1/2] i386: kvm: extend kvm_{get, put}_vcpu_events to support pending triple fault
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v9 02/10] s390x/cpu topology: core_id sets s390x CPU topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH] kvm: vmx: keep constant definition format consistent
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: replace assertion with warning in access_tracking_perf_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Fix nx_huge_pages_test on TDP-disabled hosts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Skip tests that require EPT when it is not available
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 1/6] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v4 0/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 1/6] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/hyperv: Move VMCB enlightenment definitions to hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v9 01/10] s390x/cpus: Make absence of multithreading clear
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH V2 RESEND 2/6] vDPA: only report driver features if FEATURES_OK is set
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- Re: [PATCH V2 RESEND 1/6] vDPA: allow userspace to query features of a vDPA device
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- Re: [RFC PATCH 9/9] kvm_main.c: handle atomic memslot update
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [RFC PATCH 9/9] kvm_main.c: handle atomic memslot update
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 9/9] kvm_main.c: handle atomic memslot update
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH 5.4 1/1] KVM: SEV: add cache flush to solve SEV cache incoherency issues
- From: Ovidiu Panait <ovidiu.panait@xxxxxxxxxxxxx>
- Re: [RFC PATCH 9/9] kvm_main.c: handle atomic memslot update
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 0/9] kvm: implement atomic memslot updates
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH net] rhashtable: fix crash due to mm api change
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC v2] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH net] rhashtable: fix crash due to mm api change
- From: Martin Zaharinov <micron10@xxxxxxxxx>
- Re: [PATCH V2 RESEND 5/6] vDPA: fix spars cast warning in vdpa_dev_net_mq_config_fill
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V2 RESEND 4/6] vDPA: check virtio device features to detect MQ
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V2 RESEND 3/6] vDPA: check VIRTIO_NET_F_RSS for max_virtqueue_paris's presence
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V2 RESEND 2/6] vDPA: only report driver features if FEATURES_OK is set
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V2 RESEND 1/6] vDPA: allow userspace to query features of a vDPA device
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH net] rhashtable: fix crash due to mm api change
- From: Martin Zaharinov <micron10@xxxxxxxxx>
- [PATCH V2 RESEND 6/6] vDPA: conditionally read MTU and MAC in dev cfg space
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 RESEND 5/6] vDPA: fix spars cast warning in vdpa_dev_net_mq_config_fill
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 RESEND 3/6] vDPA: check VIRTIO_NET_F_RSS for max_virtqueue_paris's presence
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 RESEND 4/6] vDPA: check virtio device features to detect MQ
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 RESEND 2/6] vDPA: only report driver features if FEATURES_OK is set
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 RESEND 1/6] vDPA: allow userspace to query features of a vDPA device
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 RESEND 0/6] Conditionally read fields in dev cfg space
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 1/6] vDPA: allow userspace to query features of a vDPA device
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 4/6] vDPA: check virtio device features to detect MQ
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 6/6] vDPA: conditionally read MTU and MAC in dev cfg space
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 5/6] vDPA: fix spars cast warning in vdpa_dev_net_mq_config_fill
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 0/6] Conditionally read fields in dev cfg space
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 2/6] vDPA: only report driver features if FEATURES_OK is set
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 3/6] vDPA: check VIRTIO_NET_F_RSS for max_virtqueue_paris's presence
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in validate_direct_spte()
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio: Use filp instead of fd
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/14] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 12/14] vfio/mdev: consolidate all the available_instance sysfs into the core code
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 14/14] vfio/mdev: add mdev available instance checking to the core
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 05/14] vfio/mdev: simplify mdev_type handling
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 11/14] vfio/mdev: consolidate all the name sysfs into the core code
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 10/14] vfio/mdev: consolidate all the device_api sysfs into the core code
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 09/14] vfio/mdev: remove mtype_get_parent_dev
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH] vfio: Use filp instead of fd
- From: tomorrow Wang (王德明) <wangdeming@xxxxxxxxxx>
- Re: [PATCH] vfio: Use filp instead of fd
- From: tomorrow Wang (王德明) <wangdeming@xxxxxxxxxx>
- Re: [PATCH v2 0/6] KVM: Fix dirty-ring ordering on weakly ordered architectures
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v4 6/6] KVM: selftests: Automate choosing dirty ring size in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v4 5/6] KVM: selftests: Clear dirty ring states between two modes in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v4 4/6] KVM: selftests: Use host page size to map ring buffer in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v4 2/6] KVM: x86: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v4 1/6] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v4 0/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v5 27/30] RFC: KVM: powerpc: Move processor compatibility check to hardware setup
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 5.4 1/1] KVM: SEV: add cache flush to solve SEV cache incoherency issues
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5.4 1/1] KVM: SEV: add cache flush to solve SEV cache incoherency issues
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [PATCH] KVM: selftests: Skip tests that require EPT when it is not available
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V2 PATCH 4/8] KVM: selftests: x86: Precompute the result for is_{intel,amd}_cpu()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [V2 PATCH 4/8] KVM: selftests: x86: Precompute the result for is_{intel,amd}_cpu()
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [V2 PATCH 4/8] KVM: selftests: x86: Precompute the result for is_{intel,amd}_cpu()
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [V2 PATCH 8/8] KVM: selftests: x86: xen: Execute cpu specific vmcall instruction
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [V2 PATCH 7/8] Kvm: selftests: x86: Execute cpu specific vmcall instruction
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [V2 PATCH 4/8] KVM: selftests: x86: Precompute the result for is_{intel,amd}_cpu()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [V2 PATCH 5/8] KVM: selftests: x86: delete svm_vmcall_test
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [V2 PATCH 4/8] KVM: selftests: x86: Precompute the result for is_{intel,amd}_cpu()
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [V2 PATCH 3/8] KVM: selftests: Add arch specific post vm load setup
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]