Linux KVM Virtualization
[Prev Page][Next Page]
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.18 1/6] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 3/3] KVM: selftests: Restrict test region to 48-bit physical addresses when using nested
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 1/3] KVM: x86: disable preemption while updating apicv inhibition
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 2/3] KVM: x86: disable preemption around the call to kvm_arch_vcpu_{un|}blocking
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 3/3] KVM: selftests: Restrict test region to 48-bit physical addresses when using nested
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 2/3] KVM: x86: disable preemption around the call to kvm_arch_vcpu_{un|}blocking
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 1/3] KVM: x86: disable preemption while updating apicv inhibition
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFT][PATCH v1 1/6] vfio/ap: Pass in physical address of ind to ap_aqic()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v20 10/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on assign/unassign
- From: "Jason J. Herne" <jjherne@xxxxxxxxxxxxx>
- Re: [PATCH v20 20/20] MAINTAINERS: pick up all vfio_ap docs for VFIO AP maintainers
- From: "Jason J. Herne" <jjherne@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] vfio/type1: Simplify bus_type determination
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- RE: [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 17/23] arm64: Copy code from GNU-EFI
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v6 19/22] KVM: x86/mmu: Zap collapsible SPTEs in shadow MMU at all possible levels
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- RE: [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- RE: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH] vfio: check vfio_register_iommu_driver() return value
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 10/22] KVM: x86/mmu: Pass memory caches to allocate SPs separately
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 19/22] KVM: x86/mmu: Zap collapsible SPTEs in shadow MMU at all possible levels
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH RFC 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 10/22] KVM: x86/mmu: Pass memory caches to allocate SPs separately
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/23] arm64: Add a new type of memory type flag MR_F_RESERVED
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 13/23] arm/arm64: Rename etext to _etext
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 11/23] lib/efi: Add support for getting the cmdline
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 10/23] lib/printf: Add support for printing wide strings
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [kvm-unit-tests PATCH v2 06/23] arm/arm64: Add support for discovering the UART through ACPI
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 05/23] arm/arm64: Add support for setting up the PSCI conduit through ACPI
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH 04/11] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 09/11] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 01/11] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 08/11] KVM: VMX: Support TSC scaling with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 03/11] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 00/11] KVM: VMX: Support TscScaling and EnclsExitingBitmap whith eVMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH QEMU EXAMPLE] i386: Support Enlightened VMCS revisions
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 05/11] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 11/11] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 02/11] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 10/11] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 06/11] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 07/11] KVM: selftests: Switch to KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v20 19/20] s390/Docs: new doc describing lock usage by the vfio_ap device driver
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 15/20] s390/vfio-ap: implement in-use callback for vfio_ap driver
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 20/20] MAINTAINERS: pick up all vfio_ap docs for VFIO AP maintainers
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 18/20] s390/vfio-ap: update docs to include dynamic config support
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 14/20] s390/vfio-ap: reset queues after adapter/domain unassignment
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 16/20] s390/vfio-ap: sysfs attribute to display the guest's matrix
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 12/20] s390/vfio-ap: allow hot plug/unplug of AP devices when assigned/unassigned
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 13/20] s390/vfio-ap: hot plug/unplug of AP devices when probed/removed
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 17/20] s390/vfio-ap: handle config changed and scan complete notification
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 10/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on assign/unassign
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 11/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on queue probe/remove
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 06/20] s390/vfio-ap: allow assignment of unavailable AP queues to mdev device
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 08/20] s390/vfio-ap: introduce new mutex to control access to the KVM pointer
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 09/20] s390/vfio-ap: use proper locking order when setting/clearing KVM pointer
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 04/20] s390/vfio-ap: introduce shadow APCB
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 02/20] s390/vfio-ap: move probe and remove callbacks to vfio_ap_ops.c
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 07/20] s390/vfio-ap: rename matrix_dev->lock mutex to matrix_dev->mdevs_lock
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 05/20] s390/vfio-ap: refresh guest's APCB by filtering AP resources assigned to mdev
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 03/20] s390/vfio-ap: manage link between queue struct and matrix mdev
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 01/20] s390/vfio-ap: use new AP bus interface to search for queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/3] More skey instr. emulation test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] s390x: Rework TEID decoding and usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 19/19] vdpasim: control virtqueue support
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [kvm-unit-tests PATCH] Add test for #SMI during interrupt window
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 01/11] KVM: x86: emulator: em_sysexit should update ctxt->mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 07/11] KVM: x86: emulator/smm: add structs for KVM's smram layout
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 08/11] KVM: x86: emulator/smm: use smram struct for 32 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 10/11] KVM: x86: SVM: use smram structs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 11/11] KVM: x86: emulator/smm: preserve interrupt shadow in SMRAM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 06/11] KVM: x86: emulator/smm: number of GPRs in the SMRAM image depends on the image format
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 05/11] KVM: x86: emulator: update the emulation mode after CR0 write
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 02/11] KVM: x86: emulator: introduce update_emulation_mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 03/11] KVM: x86: emulator: remove assign_eip_near/far
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 09/11] KVM: x86: emulator/smm: use smram struct for 64 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 04/11] KVM: x86: emulator: update the emulation mode after rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 00/11] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: selftests: Consolidate ucall code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: selftests: Consolidate boilerplate code in get_ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/3] s390x: Test TEID values in storage key test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 3/3] s390x: Test effect of storage keys on diag 308
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/3] s390x: Test effect of storage keys on some more instructions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/3] More skey instr. emulation test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] s390x: lib: SOP facility query function
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] s390x: Fix sclp facility bit numbers
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v7 17/39] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 00/39] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 17/39] KVM: x86: hyper-v: L2 TLB flush
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 1/2] drm: Implement DRM aperture helpers under video/
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 1/2] drm: Implement DRM aperture helpers under video/
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH V2] virtio: disable notification hardening by default
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH V2] virtio: disable notification hardening by default
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V2] virtio: disable notification hardening by default
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH Part2 v6 01/49] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] KVM: Fix a typo
- From: Zhang Jiaming <jiaming@xxxxxxxxxxxx>
- RE: [PATCH] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vfio: check vfio_register_iommu_driver() return value
- From: Bo Liu <liubo03@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [External] [PATCH v9 9/9] KVM: VMX: enable IPI virtualization
- From: Shenming Lu <lushenming@xxxxxxxxxxxxx>
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 2/2] vfio/pci: Remove console drivers
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 1/2] drm: Implement DRM aperture helpers under video/
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH] RISC-V: KVM: Improve ISA extension by using a bitmap
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH Part2 v6 48/49] *debug: warn and retry failed rmpupdates
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 49/49] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 47/49] *fix for stale per-cpu pointer due to cond_resched during ghcb mapping
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 45/49] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 46/49] ccp: add support to decrypt the page
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 44/49] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 43/49] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 40/49] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 33/49] KVM: x86: Update page-fault trace to log full 64-bit error code
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 39/49] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 37/49] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 38/49] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 36/49] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 32/49] KVM: x86: Define RMP page fault error bits for #NPF
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 34/49] KVM: SVM: Do not use long-lived GHCB map while setting scratch area
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 30/49] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX and SNP
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 29/49] KVM: X86: Keep the NPT and RMP page level in sync
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 31/49] KVM: x86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 27/49] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 22/49] KVM: SVM: Add initial SEV-SNP support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 24/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 20/49] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 26/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 23/49] KVM: SVM: Add KVM_SNP_INIT command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 21/49] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 25/49] KVM: SVM: Disallow registering memory range from HugeTLB for SNP guest
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 19/49] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 18/49] crypto: ccp: Provide APIs to query extended attestation report
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 15/49] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 16/49] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 08/49] x86/traps: Define RMP violation #PF error code
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 11/49] crypto:ccp: Define the SEV-SNP commands
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 10/49] x86/fault: Add support to dump RMP entry on fault
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP)
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 01/49] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 04/49] x86/sev: set SYSCFG.MFMD
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/5] KVM: x86: Quirk "MWAIT never faults" behavior
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/7] KVM: x86: Attempt to wrangle PEBS/PMU into submission
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86: Ignore benign host accesses to "unsupported" PEBS and BTS MSRs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 6/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v8 12/12] s390x/cpu_topology: activating CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 10/12] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 09/12] target/s390x: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 06/12] s390x/cpu_topology: Adding drawers to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 08/12] s390x/cpu_topology: implementing numa for the s390x topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 11/12] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 07/12] s390x/cpu_topology: Adding drawers to STSI
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 02/12] s390x/cpu_topology: CPU topology objects and structures
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 05/12] s390x/cpu_topology: Adding books to STSI
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 00/12] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 01/12] Update Linux Headers
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 04/12] s390x/cpu_topology: Adding books to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 03/12] s390x/cpu_topology: implementating Store Topology System Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [PATCH 5.10 75/84] KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v10 2/3] KVM: s390: guest support for topology function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v10 1/3] KVM: s390: ipte lock for SCA access should be contained in KVM
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v10 0/3] s390x: KVM: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Fix filename reporting in guest asserts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: selftests: Consolidate ucall code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959
- From: 潘高宁 <pgn@xxxxxxxxxx>
- Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Alexander Mikhalitsyn <alexander.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Alexander Mikhalitsyn <alexander.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [External] [PATCH v9 9/9] KVM: VMX: enable IPI virtualization
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [External] [PATCH v9 9/9] KVM: VMX: enable IPI virtualization
- From: Shenming Lu <lushenming@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v1 1/6] vfio/ap: Pass in physical address of ind to ap_aqic()
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v11 18/19] KVM: s390: pv: avoid export before import if possible
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v11 15/19] KVM: s390: pv: asynchronous destroy for reboot
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v11 16/19] KVM: s390: pv: api documentation for asynchronous destroy
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [Patch 0/1] A bug fix to the error handling path in vfio_device_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: selftests: Consolidate common code for popuplating ucall struct
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: selftests: Consolidate ucall code
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH V2] virtio: disable notification hardening by default
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/8] x86: nSVM: Move all nNPT test cases from svm_tests.c to a separate file.
- From: "Shukla, Manali" <mashukla@xxxxxxx>
- Re: [PATCH 2/3] KVM: selftests: Consolidate boilerplate code in get_ucall()
- From: "Huang, Shaoqin" <shaoqin.huang@xxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 04/13] vfio/mdev: remove mdev_{create,remove}_sysfs_files
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 04/23] lib: Extend the definition of the ACPI table FADT
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftest: Add __weak stubs for ucall_arch_(un)init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: selftests: Consolidate ucall code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: selftests: Consolidate common code for popuplating ucall struct
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: Consolidate boilerplate code in get_ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] vfio: Replace the iommu notifier with a device list
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 07dc787be2316e243a16a33d0a9b734cd9365bd3
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] KVM: SEV: Init target VMCBs in sev_migrate_from
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFT][PATCH v1 3/6] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 1/2] Documentation/x86: Add the AMX enabling example
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v6 6/8] KVM: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: SEV: Init target VMCBs in sev_migrate_from
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 22/22] KVM: x86/mmu: Extend Eager Page Splitting to nested MMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 21/22] KVM: Allow for different capacities in kvm_mmu_memory_cache structs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 21/22] KVM: Allow for different capacities in kvm_mmu_memory_cache structs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 20/22] KVM: x86/mmu: Refactor drop_large_spte()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v6 19/22] KVM: x86/mmu: Zap collapsible SPTEs in shadow MMU at all possible levels
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v6 15/22] KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: 'WARNING in vcpu_enter_guest' bug in arch/x86/kvm/x86.c:9877
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 10/21] vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v6 17/22] KVM: x86/mmu: Cache the access bits of shadowed translations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 16/22] KVM: x86/mmu: Update page stats in __rmap_add()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 18/22] KVM: x86/mmu: Extend make_huge_page_split_spte() for the shadow MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 14/22] KVM: x86/mmu: Pass const memslot to rmap_add()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 13/22] KVM: x86/mmu: Allow NULL @vcpu in kvm_mmu_find_shadow_page()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 05/22] KVM: x86/mmu: Always pass 0 for @quadrant when gptes are 8 bytes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 04/22] KVM: x86/mmu: Derive shadow MMU page role from parent
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: nSVM: implement nested VNMI
- From: "Shukla, Santosh" <santosh.shukla@xxxxxxx>
- Re: [PATCH 5/7] KVM: SVM: Add VNMI support in inject_nmi
- From: "Shukla, Santosh" <santosh.shukla@xxxxxxx>
- Re: [PATCH v6 10/22] KVM: x86/mmu: Pass memory caches to allocate SPs separately
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: "Shukla, Santosh" <santosh.shukla@xxxxxxx>
- Re: [PATCH 3/7] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: "Shukla, Santosh" <santosh.shukla@xxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v9 2/3] s390x: KVM: guest support for topology function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: "Shukla, Santosh" <santosh.shukla@xxxxxxx>
- Re: [PATCH 2/7] KVM: SVM: Add VNMI bit definition
- From: "Shukla, Santosh" <santosh.shukla@xxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [CFP LPC 2022] VFIO/IOMMU/PCI Microconference
- From: Jörg Rödel <joro@xxxxxxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- RE: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v1 3/6] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Add Oliver as a reviewer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- RE: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] x86: Skip perf related tests when pmu is disabled
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] x86: Skip running test when pmu is disabled
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH RFC 4/4] kvm/x86: Allow to respond to generic signals during slow page faults
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH RFC 3/4] kvm: Add new pfn error KVM_PFN_ERR_INTR
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH RFC 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH RFC 2/4] kvm: Merge "atomic" and "write" in __gfn_to_pfn_memslot()
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH RFC 0/4] kvm/mm: Allow GUP to respond to non fatal signals
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Zack Rusin <zackr@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/3] x86: Remove perf enable bit from default config
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v6 04/22] KVM: x86/mmu: Derive shadow MMU page role from parent
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 2/6] vfio/ccw: Only pass in contiguous pages
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 3/6] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 4/6] vfio: Rename user_iova of vfio_dma_rw()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 1/6] vfio/ap: Pass in physical address of ind to ap_aqic()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 0/6] Update vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 01/21] KVM: nVMX: Unconditionally purge queued/injected events on nested "exit"
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 2/2] Documentation/x86: Explain guest XSTATE permission control
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/2] Documentation/x86: Add the AMX enabling example
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- RE: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 2/2] Documentation/x86: Explain guest XSTATE permission control
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH 1/2] Documentation/x86: Add the AMX enabling example
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH 0/2] Documentation/x86: Update the dynamic XSTATE doc
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Zack Rusin <zackr@xxxxxxxxxx>
- [PATCH v2 1/2] drm: Implement DRM aperture helpers under video/
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 2/2] vfio/pci: Remove console drivers
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION c6d7e3b385f19869ab96e9404c92ff1abc34f2c8
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Zack Rusin <zackr@xxxxxxxxxx>
- Re: [PATCH v6 03/22] KVM: x86/mmu: Stop passing @direct to mmu_alloc_root()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: oliver.upton@xxxxxxxxx
- Re: [kvm-unit-tests PATCH v2 3/3] x86: Skip perf related tests when pmu is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] x86: Skip running test when pmu is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/3] x86: Remove perf enable bit from default config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests] x86: do not overwrite bits 7 and 12 of MSR_IA32_MISC_ENABLE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/5] KVM: Hoist debugfs_dentry init to kvm_create_vm_debugfs() (again)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/5] KVM: Actually create debugfs in kvm_create_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/5] KVM: Get an fd before creating the VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: Shove vm stats_id init into kvm_create_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/5] KVM: Shove vcpu stats_id init into kvm_vcpu_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: Shove vm stats_id init into kvm_create_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 07/10] vfio/ccw: Create an OPEN FSM Event
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/10] vfio/ccw: Create an OPEN FSM Event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/10] vfio/ccw: Do not change FSM state in subchannel event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/19] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/10] KVM: Avoid pfn_to_page() and vice versa when releasing pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 01/10] KVM: Do not zero initialize 'pfn' in hva_to_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 08/10] vfio/ccw: Create a CLOSE FSM event
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- RE: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 02/11] x86: Move ap_init() to smp.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/10] vfio/ccw: Create an OPEN FSM Event
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 04/10] vfio/ccw: Remove private->mdev
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/10] vfio/ccw: Do not change FSM state in subchannel event
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: vmx, pmu: accept 0 for absent MSRs when host-initiated
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 16/19] KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 00/10] KVM: Clean up 'struct page' / pfn helpers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 04/10] KVM: Avoid pfn_to_page() and vice versa when releasing pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH kvmtool] arm: gic: fdt: fix PPI CPU mask calculation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 01/10] KVM: Do not zero initialize 'pfn' in hva_to_pfn()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Add Oliver as a reviewer
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: selftests: enumerate GUEST_ASSERT arguments
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: selftests: Write REPORT_GUEST_ASSERT macros to pair with GUEST_ASSERT
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Fix filename reporting in guest asserts
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 02/11] x86: Move ap_init() to smp.c
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 16/19] KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: vmx, pmu: accept 0 for absent MSRs when host-initiated
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 04/19] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] KVM: arm64: Add Oliver as a reviewer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 16/19] KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 12/19] KVM: VMX: Emulate reads and writes to CET MSRs
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 04/19] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 11/19] KVM: x86: Add fault checks for CR4.CET
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 10/19] KVM: VMX: Introduce CET VMCS fields and flags
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 09/19] KVM: x86: Add #CP support in guest exception classification.
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 13/19] KVM: VMX: Add a synthetic MSR to allow userspace VMM to access GUEST_SSP
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 17/19] KVM: VMX: Pass through CET MSRs to the guest when supported
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 14/19] KVM: x86: Report CET MSRs as to-be-saved if CET is supported
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 01/19] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 15/19] KVM: x86: Save/Restore GUEST_SSP to/from SMM state save area
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 18/19] KVM: nVMX: Enable CET support for nested VMX
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 05/19] x86/fpu: Add helper for modifying xstate
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 07/19] KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 06/19] KVM: x86: Report XSS as an MSR to be saved if there are supported features
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 08/19] KVM: x86: Load guest fpu state when accessing MSRs managed by XSAVES
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 02/19] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 00/19] Refresh queued CET virtualization series
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- RE: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 2/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 8cb8311e95e3bb58bd84d6350365f14a718faa6d
- From: "Chen, Rong A" <rong.a.chen@xxxxxxxxx>
- RE: [RFC PATCH v3 5/7] KVM: x86: add vCPU scoped toggling for disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH v2 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 4/8] x86: Improve set_mmu_range() to implement npt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/8] x86: nSVM: Build up the nested page table dynamically
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 2/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 0/5] Simplify vfio_iommu_type1 attach/detach routine
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 4/8] x86: Improve set_mmu_range() to implement npt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/8] x86: nSVM: Allow nSVM tests run with PT_USER_MASK enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/8] x86: nSVM: Move all nNPT test cases from svm_tests.c to a separate file.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 09/13] x86: Move 32-bit => 64-bit transition code to trampolines.S
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 13/13] x86: Add ap_online() to consolidate final "AP is alive!" code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 07/13] x86: efi: Provide a stack within testcase memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 00/13] x86: SMP Support for x86 UEFI Tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 06/13] x86: Move load_gdt_tss() to desc.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 11/13] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 01/13] x86: Use an explicit magic string to detect that dummy.efi passes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 10/13] x86: efi, smp: Transition APs from 16-bit to 32-bit mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 04/13] x86: Move load_idt() to desc.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 02/13] x86: Share realmode trampoline between i386 and x86_64
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 08/13] x86: efi: Provide percpu storage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 12/13] x86: Rename ap_init() to bringup_aps()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 05/13] x86: desc: Split IDT entry setup into a generic helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 03/13] x86: Move ap_init() to smp.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 11/11] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 10/11] x86: efi, smp: Transition APs from 32-bit to 64-bit mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 09/11] x86: Move 32-bit bringup routines to start32.S
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [kvm-unit-tests PATCH v3 02/11] x86: Move ap_init() to smp.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 00/11] SMP Support for x86 UEFI Tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 02/11] x86: Move ap_init() to smp.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 01/10] vfio/ccw: Remove UUID from s390 debug log
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 12/13] vfio/mdev: consolidate all the description sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 11/13] vfio/mdev: consolidate all the available_instance sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- [PATCH v2 03/10] vfio/ccw: Do not change FSM state in subchannel event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 08/10] vfio/ccw: Create a CLOSE FSM event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 05/10] vfio/ccw: Pass enum to FSM event jumptable
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 02/10] vfio/ccw: Fix FSM state if mdev probe fails
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 06/10] vfio/ccw: Flatten MDEV device (un)register
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 10/10] vfio/ccw: Move FSM open/close to MDEV open/close
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 00/10] s390/vfio-ccw rework
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 01/10] vfio/ccw: Remove UUID from s390 debug log
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 04/10] vfio/ccw: Remove private->mdev
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 09/10] vfio/ccw: Refactor vfio_ccw_mdev_reset
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 07/10] vfio/ccw: Create an OPEN FSM Event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 10/13] vfio/mdev: consolidate all the name sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 09/13] vfio/mdev: consolidate all the device_api sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 06/13] vfio/mdev: unexport mdev_bus_type
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 08/13] vfio/mdev: remove mtype_get_parent_dev
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 05/13] vfio/mdev: remove mdev_from_dev
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 07/13] vfio/mdev: remove mdev_parent_dev
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 04/13] vfio/mdev: remove mdev_{create,remove}_sysfs_files
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Alexander Mikhalitsyn <alexander@xxxxxxxxxxxxx>
- [PATCH 3/4] KVM: selftests: Write REPORT_GUEST_ASSERT macros to pair with GUEST_ASSERT
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4/4] KVM: selftests: Fix filename reporting in guest asserts
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 0/4] Fix filename reporting in guest asserts
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 1/4] KVM: selftests: enumerate GUEST_ASSERT arguments
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 01/13] vfio/mdev: make mdev.h standalone includable
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: vmx, pmu: accept 0 for absent MSRs when host-initiated
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [RFC PATCH v3 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH RESEND] tools/kvm_stat: fix display of error when multiple processes are found
- From: Dmitry Klochkov <kdmitry556@xxxxxxxxx>
- Re: [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 1/4] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 1/4] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 6/6] KVM: SEV-ES: reuse advance_sev_es_emulated_ins for OUT too
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Alexander Mikhalitsyn <alexander.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [Bug 216137] Kernel Will Not Compile using GCC 12.1
- From: bugzilla-daemon@xxxxxxxxxx
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr_update()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 11/19] KVM: arm64: Move vcpu ON_UNSUPPORTED_CPU flag to the state flag set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 11/19] KVM: arm64: Move vcpu ON_UNSUPPORTED_CPU flag to the state flag set
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC v1 5/5] KVM: VMX: Support TSC scaling with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: nVMX: Support loading MSRs before nested state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH RFC v1 4/5] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 3/5] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 2/5] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 0/5] KVM: VMX: Support TscScaling and EnclsExitingBitmap whith eVMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 1/5] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2] x86: kvm: remove NULL check before kfree
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND] tools/kvm_stat: fix display of error when multiple processes are found
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Skip filter updates for MSRs that KVM is already intercepting
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Use try_cmpxchg64 in tdp_mmu_set_spte_atomic
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: VMX: Use try_cmpxchg64 in pi_try_set_control
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Use try_cmpxchg64 in fast_pf_fix_direct_spte
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v11 14/19] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v11 14/19] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v11 15/19] KVM: s390: pv: asynchronous destroy for reboot
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH v2 0/3] Improve instruction and CSR emulation in KVM RISC-V
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] RISC-V: KVM: Factor-out instruction emulation into separate sources
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Bug report: vfio over kernel 5.19 - mm area
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH v2 3/3] RISC-V: KVM: Add extensible CSR emulation framework
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] RISC-V: KVM: Add extensible system instruction emulation framework
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 14/19] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v11 14/19] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v11 07/19] KVM: s390: pv: module parameter to fence asynchronous destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- 答复: [PATCH] KVM: Use consistent type for return value of kvm_mmu_memory_cache_nr_free_objects()
- From: Bo Liu (刘波)-浪潮信息 <liubo03@xxxxxxxxxx>
- Re: [PATCH v11 07/19] KVM: s390: pv: module parameter to fence asynchronous destroy
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/3] x86: Skip perf related tests when pmu is disabled
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/3] Fix up failures induced by !enable_pmu
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/3] x86: Skip running test when pmu is disabled
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/3] x86: Remove perf enable bit from default config
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH] vhost-vdpa: Remove usage of the deprecated ida_simple_xxx API
- From: Bo Liu <liubo03@xxxxxxxxxx>
- RE: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Zhenyu Wang <zhenyuw@xxxxxxxxxxxxxxx>
- [Bug 216137] Kernel Will Not Compile using GCC 12.1
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 13/13] vfio/mdev: add mdev available instance checking to the core
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Christoph Hellwig <hch@xxxxxx>
- [Bug 216137] New: Kernel Will Not Compile using GCC 12.1
- From: bugzilla-daemon@xxxxxxxxxx
- Re: 答复: [PATCH] KVM: x86: add a bool variable to distinguish whether to use PVIPI
- From: Chao Gao <chao.gao@xxxxxxxxx>
- 答复: [PATCH] KVM: x86: add a bool variable to distinguish whether to use PVIPI
- From: "Wang,Guangju" <wangguangju@xxxxxxxxx>
- Re: [RFC PATCH v3 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH v3 4/7] KVM: x86: Let userspace re-enable previously disabled exits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH v3 5/7] KVM: x86: add vCPU scoped toggling for disabled exits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [RFC PATCH v3 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 6/7] KVM: x86: Add a new guest_debug flag forcing exit to userspace
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 4/7] KVM: x86: Let userspace re-enable previously disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 3/7] KVM: x86: Reject disabling of MWAIT interception when not allowed
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 5/7] KVM: x86: add vCPU scoped toggling for disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 2/7] KVM: x86: Move *_in_guest power management flags to vCPU scope
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 1/7] KVM: x86: only allow exits disable before vCPUs created
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 0/7] KVM: x86: add per-vCPU exits disable capability
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- RE: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Parav Pandit <parav@xxxxxxxxxx>
- [PATCH v2 8/8] KVM: x86/mmu: Use common logic for computing the 32/64-bit base PA mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/8] KVM: x86/mmu: Use common macros to compute 32/64-bit paging masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/8] KVM: x86/mmu: Truncate paging32's PT_BASE_ADDR_MASK to 32 bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/8] KVM: x86/mmu: Dedup macros for computing various page table masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/8] KVM: VMX: Refactor 32-bit PSE PT creation to avoid using MMU macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/8] KVM: x86/mmu: Bury 32-bit PSE paging helpers in paging_tmpl.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86/mmu: Drop unused CMPXCHG macro from paging_tmpl.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/8] KVM: x86/mmu: Use separate namespaces gPTEs and SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86: Move "apicv_active" into "struct kvm_lapic"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: x86: Use lapic_in_kernel() to query in-kernel APIC in APICv helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86: Check for in-kernel xAPIC when querying APICv for directed yield
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr_update()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: SVM: Drop unused AVIC / kvm_x86_ops declarations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86: Move apicv_active into kvm_lapic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Query vcpu->vcpu_idx directly and drop its accessor, again
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: x86: Query vcpu->vcpu_idx directly and drop its accessor, again
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: nVMX: Update vmcs12 on BNDCFGS write, not at vmcs02=>vmcs12 sync
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: nVMX: Save BNDCFGS to vmcs12 iff relevant controls are exposed to L1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: nVMX: Support loading MSRs before nested state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: nVMX: Rename nested.vmcs01_* fields to nested.pre_vmenter_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 21/21] KVM: selftests: Add an x86-only test to verify nested exception queueing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/21] KVM: x86: Morph pending exceptions to pending VM-Exits at queue time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/21] KVM: selftests: Use uapi header to get VMX and SVM exit reasons/codes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/21] KVM: x86: Evaluate ability to inject SMI/NMI/IRQ after potential VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/21] KVM: x86: Treat pending TRIPLE_FAULT requests as pending exceptions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/21] KVM: VMX: Update MTF and ICEBP comments to document KVM's subtle behavior
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/21] KVM: x86: Use kvm_queue_exception_e() to queue #DF
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/21] KVM: x86: Hoist nested event checks above event injection logic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/21] KVM: x86: Formalize blocking of nested pending exceptions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/21] KVM: x86: Make kvm_queued_exception a properly named, visible struct
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/21] KVM: VMX: Inject #PF on ENCLS as "emulated" #PF
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/21] KVM: nVMX: Ignore SIPI that arrives in L2 when vCPU is not in WFS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/21] KVM: x86: Rename kvm_x86_ops.queue_exception to inject_exception
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/21] KVM: nVMX: Unconditionally clear mtf_pending on nested VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/21] KVM: x86: Use DR7_GD macro instead of open coding check in emulator
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/21] KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/21] KVM: x86: Don't check for code breakpoints when emulating on exception
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/21] KVM: nVMX: Treat General Detect #DB (DR7.GD=1) as fault-like
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/21] KVM: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/21] KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/21] KVM: nVMX: Unconditionally purge queued/injected events on nested "exit"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 3/8] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- [PATCH v2 40/42] KVM: selftests: Clean up requirements for XFD-aware XSAVE features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 42/42] KVM: selftests: Drop unused SVM_CPUID_FUNC macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 38/42] KVM: selftests: Check KVM's supported CPUID, not host CPUID, for XFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 39/42] KVM: selftests: Skip AMX test if ARCH_REQ_XCOMP_GUEST_PERM isn't supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 36/42] KVM: selftests: Rename kvm_get_supported_cpuid_index() to __..._entry()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 41/42] KVM: selftests: Use the common cpuid() helper in cpu_vendor_string_is()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 34/42] KVM: selftests: Use this_cpu_has() to detect SVM support in L1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 37/42] KVM: selftests: Inline "get max CPUID leaf" helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]