Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH RFC 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH RFC 2/4] kvm: Merge "atomic" and "write" in __gfn_to_pfn_memslot()
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH RFC 0/4] kvm/mm: Allow GUP to respond to non fatal signals
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Zack Rusin <zackr@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/3] x86: Remove perf enable bit from default config
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v6 04/22] KVM: x86/mmu: Derive shadow MMU page role from parent
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 2/6] vfio/ccw: Only pass in contiguous pages
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 3/6] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 4/6] vfio: Rename user_iova of vfio_dma_rw()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 1/6] vfio/ap: Pass in physical address of ind to ap_aqic()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFT][PATCH v1 0/6] Update vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 01/21] KVM: nVMX: Unconditionally purge queued/injected events on nested "exit"
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 2/2] Documentation/x86: Explain guest XSTATE permission control
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/2] Documentation/x86: Add the AMX enabling example
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- RE: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 2/2] Documentation/x86: Explain guest XSTATE permission control
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH 1/2] Documentation/x86: Add the AMX enabling example
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH 0/2] Documentation/x86: Update the dynamic XSTATE doc
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Zack Rusin <zackr@xxxxxxxxxx>
- [PATCH v2 1/2] drm: Implement DRM aperture helpers under video/
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 2/2] vfio/pci: Remove console drivers
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION c6d7e3b385f19869ab96e9404c92ff1abc34f2c8
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Zack Rusin <zackr@xxxxxxxxxx>
- Re: [PATCH v6 03/22] KVM: x86/mmu: Stop passing @direct to mmu_alloc_root()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: oliver.upton@xxxxxxxxx
- Re: [kvm-unit-tests PATCH v2 3/3] x86: Skip perf related tests when pmu is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] x86: Skip running test when pmu is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/3] x86: Remove perf enable bit from default config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests] x86: do not overwrite bits 7 and 12 of MSR_IA32_MISC_ENABLE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/5] KVM: Hoist debugfs_dentry init to kvm_create_vm_debugfs() (again)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/5] KVM: Actually create debugfs in kvm_create_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/5] KVM: Get an fd before creating the VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: Shove vm stats_id init into kvm_create_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/5] KVM: Shove vcpu stats_id init into kvm_vcpu_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: Shove vm stats_id init into kvm_create_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 07/10] vfio/ccw: Create an OPEN FSM Event
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/10] vfio/ccw: Create an OPEN FSM Event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/10] vfio/ccw: Do not change FSM state in subchannel event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/19] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/10] KVM: Avoid pfn_to_page() and vice versa when releasing pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 01/10] KVM: Do not zero initialize 'pfn' in hva_to_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 08/10] vfio/ccw: Create a CLOSE FSM event
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- RE: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 02/11] x86: Move ap_init() to smp.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/10] vfio/ccw: Create an OPEN FSM Event
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 04/10] vfio/ccw: Remove private->mdev
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/10] vfio/ccw: Do not change FSM state in subchannel event
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: vmx, pmu: accept 0 for absent MSRs when host-initiated
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 16/19] KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 00/10] KVM: Clean up 'struct page' / pfn helpers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 04/10] KVM: Avoid pfn_to_page() and vice versa when releasing pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH kvmtool] arm: gic: fdt: fix PPI CPU mask calculation
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 01/10] KVM: Do not zero initialize 'pfn' in hva_to_pfn()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Add Oliver as a reviewer
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: selftests: enumerate GUEST_ASSERT arguments
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: selftests: Write REPORT_GUEST_ASSERT macros to pair with GUEST_ASSERT
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Fix filename reporting in guest asserts
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 02/11] x86: Move ap_init() to smp.c
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 16/19] KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: vmx, pmu: accept 0 for absent MSRs when host-initiated
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 04/19] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/19] Refresh queued CET virtualization series
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] KVM: arm64: Add Oliver as a reviewer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 16/19] KVM: x86: Enable CET virtualization for VMX and advertise CET to userspace
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 12/19] KVM: VMX: Emulate reads and writes to CET MSRs
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 04/19] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 11/19] KVM: x86: Add fault checks for CR4.CET
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 10/19] KVM: VMX: Introduce CET VMCS fields and flags
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 03/19] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 09/19] KVM: x86: Add #CP support in guest exception classification.
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 13/19] KVM: VMX: Add a synthetic MSR to allow userspace VMM to access GUEST_SSP
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 17/19] KVM: VMX: Pass through CET MSRs to the guest when supported
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 14/19] KVM: x86: Report CET MSRs as to-be-saved if CET is supported
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 01/19] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 15/19] KVM: x86: Save/Restore GUEST_SSP to/from SMM state save area
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 18/19] KVM: nVMX: Enable CET support for nested VMX
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 05/19] x86/fpu: Add helper for modifying xstate
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 07/19] KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 06/19] KVM: x86: Report XSS as an MSR to be saved if there are supported features
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 19/19] KVM: x86: Enable supervisor IBT support for guest
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 08/19] KVM: x86: Load guest fpu state when accessing MSRs managed by XSAVES
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 02/19] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH 00/19] Refresh queued CET virtualization series
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- RE: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 2/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 8cb8311e95e3bb58bd84d6350365f14a718faa6d
- From: "Chen, Rong A" <rong.a.chen@xxxxxxxxx>
- RE: [RFC PATCH v3 5/7] KVM: x86: add vCPU scoped toggling for disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH v2 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 4/8] x86: Improve set_mmu_range() to implement npt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/8] x86: nSVM: Build up the nested page table dynamically
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 2/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 0/5] Simplify vfio_iommu_type1 attach/detach routine
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 4/8] x86: Improve set_mmu_range() to implement npt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/8] x86: nSVM: Allow nSVM tests run with PT_USER_MASK enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/8] x86: nSVM: Move all nNPT test cases from svm_tests.c to a separate file.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 09/13] x86: Move 32-bit => 64-bit transition code to trampolines.S
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 13/13] x86: Add ap_online() to consolidate final "AP is alive!" code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 07/13] x86: efi: Provide a stack within testcase memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 00/13] x86: SMP Support for x86 UEFI Tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 06/13] x86: Move load_gdt_tss() to desc.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 11/13] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 01/13] x86: Use an explicit magic string to detect that dummy.efi passes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 10/13] x86: efi, smp: Transition APs from 16-bit to 32-bit mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 04/13] x86: Move load_idt() to desc.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 02/13] x86: Share realmode trampoline between i386 and x86_64
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 08/13] x86: efi: Provide percpu storage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 12/13] x86: Rename ap_init() to bringup_aps()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 05/13] x86: desc: Split IDT entry setup into a generic helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 03/13] x86: Move ap_init() to smp.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 11/11] x86: Provide a common 64-bit AP entrypoint for EFI and non-EFI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 10/11] x86: efi, smp: Transition APs from 32-bit to 64-bit mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 09/11] x86: Move 32-bit bringup routines to start32.S
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [kvm-unit-tests PATCH v3 02/11] x86: Move ap_init() to smp.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 00/11] SMP Support for x86 UEFI Tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 02/11] x86: Move ap_init() to smp.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 01/10] vfio/ccw: Remove UUID from s390 debug log
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 12/13] vfio/mdev: consolidate all the description sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 11/13] vfio/mdev: consolidate all the available_instance sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- [PATCH v2 03/10] vfio/ccw: Do not change FSM state in subchannel event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 08/10] vfio/ccw: Create a CLOSE FSM event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 05/10] vfio/ccw: Pass enum to FSM event jumptable
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 02/10] vfio/ccw: Fix FSM state if mdev probe fails
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 06/10] vfio/ccw: Flatten MDEV device (un)register
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 10/10] vfio/ccw: Move FSM open/close to MDEV open/close
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 00/10] s390/vfio-ccw rework
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 01/10] vfio/ccw: Remove UUID from s390 debug log
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 04/10] vfio/ccw: Remove private->mdev
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 09/10] vfio/ccw: Refactor vfio_ccw_mdev_reset
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 07/10] vfio/ccw: Create an OPEN FSM Event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 10/13] vfio/mdev: consolidate all the name sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 09/13] vfio/mdev: consolidate all the device_api sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 06/13] vfio/mdev: unexport mdev_bus_type
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 08/13] vfio/mdev: remove mtype_get_parent_dev
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 05/13] vfio/mdev: remove mdev_from_dev
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 07/13] vfio/mdev: remove mdev_parent_dev
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 04/13] vfio/mdev: remove mdev_{create,remove}_sysfs_files
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Alexander Mikhalitsyn <alexander@xxxxxxxxxxxxx>
- [PATCH 3/4] KVM: selftests: Write REPORT_GUEST_ASSERT macros to pair with GUEST_ASSERT
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4/4] KVM: selftests: Fix filename reporting in guest asserts
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 0/4] Fix filename reporting in guest asserts
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 1/4] KVM: selftests: enumerate GUEST_ASSERT arguments
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 01/13] vfio/mdev: make mdev.h standalone includable
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- [PATCH] selftests: KVM: Handle compiler optimizations in ucall
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: vmx, pmu: accept 0 for absent MSRs when host-initiated
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [RFC PATCH v3 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH RESEND] tools/kvm_stat: fix display of error when multiple processes are found
- From: Dmitry Klochkov <kdmitry556@xxxxxxxxx>
- Re: [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 1/4] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 1/4] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 6/6] KVM: SEV-ES: reuse advance_sev_es_emulated_ins for OUT too
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Alexander Mikhalitsyn <alexander.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [Bug 216137] Kernel Will Not Compile using GCC 12.1
- From: bugzilla-daemon@xxxxxxxxxx
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr_update()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 11/19] KVM: arm64: Move vcpu ON_UNSUPPORTED_CPU flag to the state flag set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 11/19] KVM: arm64: Move vcpu ON_UNSUPPORTED_CPU flag to the state flag set
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC v1 5/5] KVM: VMX: Support TSC scaling with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: nVMX: Support loading MSRs before nested state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH RFC v1 4/5] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 3/5] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 2/5] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 0/5] KVM: VMX: Support TscScaling and EnclsExitingBitmap whith eVMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 1/5] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2] x86: kvm: remove NULL check before kfree
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND] tools/kvm_stat: fix display of error when multiple processes are found
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Skip filter updates for MSRs that KVM is already intercepting
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Use try_cmpxchg64 in tdp_mmu_set_spte_atomic
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: VMX: Use try_cmpxchg64 in pi_try_set_control
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Use try_cmpxchg64 in fast_pf_fix_direct_spte
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v11 14/19] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v11 14/19] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v11 15/19] KVM: s390: pv: asynchronous destroy for reboot
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: Bug report: vfio over kernel 5.19 - mm area
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH v2 0/3] Improve instruction and CSR emulation in KVM RISC-V
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] RISC-V: KVM: Factor-out instruction emulation into separate sources
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Bug report: vfio over kernel 5.19 - mm area
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH v2 3/3] RISC-V: KVM: Add extensible CSR emulation framework
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] RISC-V: KVM: Add extensible system instruction emulation framework
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 14/19] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v11 14/19] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v11 07/19] KVM: s390: pv: module parameter to fence asynchronous destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- 答复: [PATCH] KVM: Use consistent type for return value of kvm_mmu_memory_cache_nr_free_objects()
- From: Bo Liu (刘波)-浪潮信息 <liubo03@xxxxxxxxxx>
- Re: [PATCH v11 07/19] KVM: s390: pv: module parameter to fence asynchronous destroy
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/3] x86: Skip perf related tests when pmu is disabled
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/3] Fix up failures induced by !enable_pmu
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/3] x86: Skip running test when pmu is disabled
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/3] x86: Remove perf enable bit from default config
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH] vhost-vdpa: Remove usage of the deprecated ida_simple_xxx API
- From: Bo Liu <liubo03@xxxxxxxxxx>
- RE: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Zhenyu Wang <zhenyuw@xxxxxxxxxxxxxxx>
- [Bug 216137] Kernel Will Not Compile using GCC 12.1
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 13/13] vfio/mdev: add mdev available instance checking to the core
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Christoph Hellwig <hch@xxxxxx>
- [Bug 216137] New: Kernel Will Not Compile using GCC 12.1
- From: bugzilla-daemon@xxxxxxxxxx
- Re: 答复: [PATCH] KVM: x86: add a bool variable to distinguish whether to use PVIPI
- From: Chao Gao <chao.gao@xxxxxxxxx>
- 答复: [PATCH] KVM: x86: add a bool variable to distinguish whether to use PVIPI
- From: "Wang,Guangju" <wangguangju@xxxxxxxxx>
- Re: [RFC PATCH v3 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH v3 4/7] KVM: x86: Let userspace re-enable previously disabled exits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [RFC PATCH v3 5/7] KVM: x86: add vCPU scoped toggling for disabled exits
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [RFC PATCH v3 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 6/7] KVM: x86: Add a new guest_debug flag forcing exit to userspace
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 4/7] KVM: x86: Let userspace re-enable previously disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 3/7] KVM: x86: Reject disabling of MWAIT interception when not allowed
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 5/7] KVM: x86: add vCPU scoped toggling for disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 2/7] KVM: x86: Move *_in_guest power management flags to vCPU scope
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 1/7] KVM: x86: only allow exits disable before vCPUs created
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v3 0/7] KVM: x86: add per-vCPU exits disable capability
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- RE: [PATCH v4 0/4] Implement vdpasim stop operation
- From: Parav Pandit <parav@xxxxxxxxxx>
- [PATCH v2 8/8] KVM: x86/mmu: Use common logic for computing the 32/64-bit base PA mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/8] KVM: x86/mmu: Use common macros to compute 32/64-bit paging masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/8] KVM: x86/mmu: Truncate paging32's PT_BASE_ADDR_MASK to 32 bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/8] KVM: x86/mmu: Dedup macros for computing various page table masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/8] KVM: VMX: Refactor 32-bit PSE PT creation to avoid using MMU macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/8] KVM: x86/mmu: Bury 32-bit PSE paging helpers in paging_tmpl.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86/mmu: Drop unused CMPXCHG macro from paging_tmpl.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/8] KVM: x86/mmu: Use separate namespaces gPTEs and SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86: Move "apicv_active" into "struct kvm_lapic"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: x86: Use lapic_in_kernel() to query in-kernel APIC in APICv helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86: Check for in-kernel xAPIC when querying APICv for directed yield
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86: Drop @vcpu parameter from kvm_x86_ops.hwapic_isr_update()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: SVM: Drop unused AVIC / kvm_x86_ops declarations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86: Move apicv_active into kvm_lapic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Query vcpu->vcpu_idx directly and drop its accessor, again
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: x86: Query vcpu->vcpu_idx directly and drop its accessor, again
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: nVMX: Snapshot pre-VM-Enter DEBUGCTL for !nested_run_pending case
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: nVMX: Update vmcs12 on BNDCFGS write, not at vmcs02=>vmcs12 sync
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: nVMX: Save BNDCFGS to vmcs12 iff relevant controls are exposed to L1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: nVMX: Snapshot pre-VM-Enter BNDCFGS for !nested_run_pending case
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: nVMX: Support loading MSRs before nested state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: nVMX: Rename nested.vmcs01_* fields to nested.pre_vmenter_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 21/21] KVM: selftests: Add an x86-only test to verify nested exception queueing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/21] KVM: x86: Morph pending exceptions to pending VM-Exits at queue time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/21] KVM: selftests: Use uapi header to get VMX and SVM exit reasons/codes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/21] KVM: x86: Evaluate ability to inject SMI/NMI/IRQ after potential VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/21] KVM: x86: Treat pending TRIPLE_FAULT requests as pending exceptions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/21] KVM: VMX: Update MTF and ICEBP comments to document KVM's subtle behavior
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/21] KVM: x86: Use kvm_queue_exception_e() to queue #DF
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/21] KVM: x86: Hoist nested event checks above event injection logic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/21] KVM: x86: Formalize blocking of nested pending exceptions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/21] KVM: x86: Make kvm_queued_exception a properly named, visible struct
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/21] KVM: VMX: Inject #PF on ENCLS as "emulated" #PF
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/21] KVM: nVMX: Ignore SIPI that arrives in L2 when vCPU is not in WFS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/21] KVM: x86: Rename kvm_x86_ops.queue_exception to inject_exception
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/21] KVM: nVMX: Unconditionally clear mtf_pending on nested VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/21] KVM: x86: Use DR7_GD macro instead of open coding check in emulator
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/21] KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/21] KVM: x86: Don't check for code breakpoints when emulating on exception
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/21] KVM: nVMX: Treat General Detect #DB (DR7.GD=1) as fault-like
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/21] KVM: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/21] KVM: VMX: Drop bits 31:16 when shoving exception error code into VMCS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/21] KVM: nVMX: Unconditionally purge queued/injected events on nested "exit"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 3/8] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- [PATCH v2 40/42] KVM: selftests: Clean up requirements for XFD-aware XSAVE features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 42/42] KVM: selftests: Drop unused SVM_CPUID_FUNC macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 38/42] KVM: selftests: Check KVM's supported CPUID, not host CPUID, for XFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 39/42] KVM: selftests: Skip AMX test if ARCH_REQ_XCOMP_GUEST_PERM isn't supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 36/42] KVM: selftests: Rename kvm_get_supported_cpuid_index() to __..._entry()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 41/42] KVM: selftests: Use the common cpuid() helper in cpu_vendor_string_is()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 34/42] KVM: selftests: Use this_cpu_has() to detect SVM support in L1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 37/42] KVM: selftests: Inline "get max CPUID leaf" helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 35/42] KVM: selftests: Drop unnecessary use of kvm_get_supported_cpuid_index()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 33/42] KVM: selftests: Use this_cpu_has() in CR4/CPUID sync test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 30/42] KVM: selftests: Make get_supported_cpuid() returns "const"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 27/42] KVM: selftests: Use vcpu_get_cpuid_entry() in CPUID test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 29/42] KVM: selftests: Use vcpu_clear_cpuid_feature() to clear x2APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 32/42] KVM: selftests: Add this_cpu_has() to query X86_FEATURE_* via cpuid()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 31/42] KVM: selftests: Set input function/index in raw CPUID helper(s)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 25/42] KVM: selftests: Use vcpu_get_cpuid_entry() in PV features test (sort of)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 28/42] KVM: selftests: Use vcpu_{set,clear}_cpuid_feature() in nVMX state test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 26/42] KVM: selftests: Use vCPU's CPUID directly in Hyper-V test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 23/42] KVM: selftests: Use vm->pa_bits to generate reserved PA bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 24/42] KVM: selftests: Add and use helper to set vCPU's CPUID maxphyaddr
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/42] KVM: selftests: Cache CPUID in struct kvm_vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/42] KVM: selftests: Split out kvm_cpuid2_size() from allocate_kvm_cpuid2()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 21/42] KVM: selftests: Use get_cpuid_entry() in kvm_get_supported_cpuid_index()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 22/42] KVM: selftests: Add helpers to get and modify a vCPU's CPUID entries
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/42] KVM: selftests: Don't use a static local in vcpu_get_supported_hv_cpuid()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/42] KVM: selftests: Rename and tweak get_cpuid() to get_cpuid_entry()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/42] KVM: selftests: Use kvm_cpu_has() for nSVM soft INT injection test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/42] KVM: selftests: Remove the obsolete/dead MMU role test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/42] KVM: selftests: Verify that kvm_cpuid2.entries layout is unchanged by KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/42] KVM: selftests: Use kvm_cpu_has() for KVM's PV steal time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/42] KVM: selftests: Use kvm_cpu_has() for XSAVE in cr4_cpuid_sync_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/42] KVM: selftests: Use kvm_cpu_has() in AMX test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/42] KVM: selftests: Check for _both_ XTILE data and cfg in AMX test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/42] KVM: selftests: Use kvm_cpu_has() for XSAVES in XSS MSR test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/42] KVM: selftests: Use kvm_cpu_has() in the SEV migration test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/42] KVM: selftests: Add framework to query KVM CPUID bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/42] KVM: selftests: Drop redundant vcpu_set_cpuid() from PMU selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/42] KVM: selftests: Use kvm_cpu_has() for nested VMX checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/42] KVM: selftests: Use kvm_cpu_has() to query PDCM in PMU selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/42] KVM: selftests: Use kvm_cpu_has() for nested SVM checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/42] KVM: sefltests: Use CPUID_XSAVE and CPUID_OSXAVE instead of X86_FEATURE_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/42] KVM: selftests: Set KVM's supported CPUID as vCPU's CPUID during recreate
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/42] KVM: selftests: Overhaul Part II - CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Alper Gun <alpergun@xxxxxxxxxx>
- Re: [RFC PATCH v6 090/104] KVM: TDX: Handle TDX PV CPUID hypercall
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [RFC PATCH v6 093/104] KVM: TDX: Handle TDX PV MMIO hypercall
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH 0/6] KVM: Trivial cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: x86/mmu: Drop unused CMPXCHG macro from paging_tmpl.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: x86/mmu: Drop unused CMPXCHG macro from paging_tmpl.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: selftests: Fix memop extension capability check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Remove the mismatched parameter comments
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] More KVM changes for Linux 5.19-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [kvm:queue 5/184] arch/x86/kvm/svm/avic.c:913:6: warning: shift count >= width of type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Hide SEV migration lockdep goo behind CONFIG_DEBUG_LOCK_ALLOC
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: selftests: Fixups for overhaul
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: Use consistent type for return value of kvm_mmu_memory_cache_nr_free_objects()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: selftests: Fix memop extension capability check
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH] KVM: s390: selftests: Fix memop extension capability check
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Jun 14 (arch/x86/kvm/svm/avic.c)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: add a bool variable to distinguish whether to use PVIPI
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [GIT PULL] More KVM changes for Linux 5.19-rc3
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [kvm:queue 5/184] arch/x86/kvm/svm/avic.c:913:6: warning: shift count >= width of type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL 2/5] s390x: add cmm migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 3/5] s390x: Introduce symbol for lowcore and use it
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 1/5] lib: s390x: add header for CMM related defines
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 5/5] s390x: add migration test for storage keys
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 0/5] s390x: some migration tests and gcc12 support
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 4/5] s390x: Fix gcc 12 warning about array bounds
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: Use consistent type for return value of kvm_mmu_memory_cache_nr_free_objects()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] More KVM changes for Linux 5.19-rc3
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: kvm_binary_stats_test: Fix index expressions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: add a bool variable to distinguish whether to use PVIPI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: x86/mmu: Drop unused CMPXCHG macro from paging_tmpl.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 00/19] KVM: s390: pv: implement lazy destroy for reboot
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 3/8] KVM: x86/mmu: Bury 32-bit PSE paging helpers in paging_tmpl.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/4] KVM: s390: selftests: Use TAP interface in the memop test
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v11 13/19] KVM: s390: pv: destroy the configuration before its memory
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 1/1] s390x: add migration test for storage keys
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] x86: kvm: remove NULL check before kfree
- From: Dongliang Mu <mudongliangabcd@xxxxxxxxx>
- [PATCH v2] x86: kvm: remove NULL check before kfree
- From: Dongliang Mu <dzm91@xxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: "Meyer, Kyle" <kyle.meyer@xxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH RESEND] tools/kvm_stat: fix display of error when multiple processes are found
- From: Dmitry Klochkov <kdmitry556@xxxxxxxxx>
- Re: [kvm:queue 5/184] arch/x86/kvm/svm/avic.c:913:6: warning: shift count >= width of type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] x86: kvm: remove NULL check before kfree
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [kvm-unit-tests PATCH v6 1/1] s390x: add migration test for storage keys
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 0/1] s390x: add migration test for storage keys
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 1/4] KVM: s390: selftests: Use TAP interface in the memop test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- RE: [PATCH 13/13] vfio/mdev: add mdev available instance checking to the core
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 11/13] vfio/mdev: consolidate all the available_instance sysfs into the core code
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 11/13] vfio/mdev: consolidate all the available_instance sysfs into the core code
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 10/13] vfio/mdev: consolidate all the name sysfs into the core code
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 09/13] vfio/mdev: consolidate all the device_api sysfs into the core code
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 01/13] vfio/mdev: make mdev.h standalone includable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] KVM: Use consistent type for return value of kvm_mmu_memory_cache_nr_free_objects()
- From: Bo Liu <liubo03@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Remove the mismatched parameter comments
- From: "Huang, Shaoqin" <shaoqin.huang@xxxxxxxxx>
- Re: [PATCH v9 10/21] vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH] x86: kvm: remove NULL check before kfree
- From: Dongliang Mu <dzm91@xxxxxxxxxxx>
- Re: [PATCH v9 20/21] KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/2] arm/kvm: enable MTE if available
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [GIT PULL] More KVM changes for Linux 5.19-rc3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Remove the mismatched parameter comments
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] KVM: selftests: kvm_binary_stats_test: Fix index expressions
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: selftests: Fixups for overhaul
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: selftests: Fixups for overhaul
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Remove the mismatched parameter comments
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86: Ignore benign host accesses to "unsupported" PEBS and BTS MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] KVM: selftests: Remove the mismatched parameter comments
- From: shaoqin.huang@xxxxxxxxx
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: simplify the mdev interface v2
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: simplify the mdev interface v2
- From: Christoph Hellwig <hch@xxxxxx>
- Re: simplify the mdev interface v2
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: simplify the mdev interface v2
- From: Christoph Hellwig <hch@xxxxxx>
- Re: simplify the mdev interface v2
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 13/13] vfio/mdev: add mdev available instance checking to the core
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 12/13] vfio/mdev: consolidate all the description sysfs into the core code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 11/13] vfio/mdev: consolidate all the available_instance sysfs into the core code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 10/13] vfio/mdev: consolidate all the name sysfs into the core code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 09/13] vfio/mdev: consolidate all the device_api sysfs into the core code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 08/13] vfio/mdev: remove mtype_get_parent_dev
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 07/13] vfio/mdev: remove mdev_parent_dev
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 06/13] vfio/mdev: unexport mdev_bus_type
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 04/13] vfio/mdev: remove mdev_{create,remove}_sysfs_files
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 05/13] vfio/mdev: remove mdev_from_dev
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 03/13] vfio/mdev: simplify mdev_type handling
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 01/13] vfio/mdev: make mdev.h standalone includable
- From: Christoph Hellwig <hch@xxxxxx>
- simplify the mdev interface v2
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH v2 0/8] virtio/vsock: experimental zerocopy receive
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v2 19/19] KVM: arm64: Move the handling of !FP outside of the fast path
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: add a bool variable to distinguish whether to use PVIPI
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH MANUALSEL 5.4] KVM: Don't null dereference ops->destroy
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 3/8] KVM: x86/mmu: Bury 32-bit PSE paging helpers in paging_tmpl.h
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH MANUALSEL 4.14] KVM: Don't null dereference ops->destroy
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 1/4] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 1/4] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 4/4] KVM: Don't null dereference ops->destroy
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 1/6] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 4.9] KVM: Don't null dereference ops->destroy
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 4.19] KVM: Don't null dereference ops->destroy
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: x86/mmu: Drop unused CMPXCHG macro from paging_tmpl.h
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH MANUALSEL 5.10] KVM: Don't null dereference ops->destroy
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 3/6] KVM: selftests: Make hyperv_clock selftest more stable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 4/6] KVM: x86/MMU: Zap non-leaf SPTEs when disabling dirty logging
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 2/4] KVM: x86: do not set st->preempted when going back to user space
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 3/4] KVM: selftests: Make hyperv_clock selftest more stable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 3/4] KVM: selftests: Make hyperv_clock selftest more stable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 2/4] KVM: x86: do not set st->preempted when going back to user space
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 4/4] KVM: Don't null dereference ops->destroy
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 6/6] KVM: Don't null dereference ops->destroy
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 2/6] KVM: x86: do not set st->preempted when going back to user space
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/8] Move npt test cases and NPT code improvements
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Remove unused "type" of split_page_type()
- From: sunliming <kelulanainsley@xxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Ashish Kalra <ashkalra@xxxxxxx>
- Re: [PATCH Part2 v5 14/45] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Alper Gun <alpergun@xxxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Alper Gun <alpergun@xxxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Ashish Kalra <ashkalra@xxxxxxx>
- [PATCH 2/8] KVM: VMX: Refactor 32-bit PSE PT creation to avoid using MMU macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/8] KVM: x86/mmu: Use separate namespaces for guest PTEs and shadow PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/8] KVM: x86/mmu: Bury 32-bit PSE paging helpers in paging_tmpl.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/8] KVM: x86/mmu: Truncate paging32's PT_BASE_ADDR_MASK to 32 bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/8] KVM: x86/mmu: Use common macros to compute 32/64-bit paging masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/8] KVM: x86/mmu: Use common logic for computing the 32/64-bit base PA mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/8] KVM: x86/mmu: Dedup macros for computing various page table masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/8] KVM: x86/mmu: Drop unused CMPXCHG macro from paging_tmpl.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/8] KVM: x86/mmu: Use separate namespaces gPTEs and SPTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Hide SEV migration lockdep goo behind CONFIG_DEBUG_LOCK_ALLOC
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH] KVM: SVM: Hide SEV migration lockdep goo behind CONFIG_DEBUG_LOCK_ALLOC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 01/10] KVM: selftests: Remove dynamic memory allocation for stats header
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 00/10] KVM: x86: Add a cap to disable NX hugepages on a VM
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 10/10] KVM: selftests: Cache binary stats metadata for duration of test
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 03/10] KVM: selftests: Read binary stats desc in lib
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 07/10] KVM: x86: Fix errant brace in KVM capability handling
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 04/10] KVM: selftests: Clean up coding style in binary stats test
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 02/10] KVM: selftests: Read binary stats header in lib
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 09/10] KVM: selftests: Test disabling NX hugepages on a VM
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 05/10] KVM: selftests: Read binary stat data in lib
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 08/10] KVM: x86/MMU: Allow NX huge pages to be disabled on a per-vm basis
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v9 06/10] KVM: selftests: Add NX huge pages test
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH Part2 v5 23/45] KVM: SVM: Add KVM_SNP_INIT command
- From: Alper Gun <alpergun@xxxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Add support for Virtual SPEC_CTRL
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Add support for Virtual SPEC_CTRL
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC V1 PATCH 0/3] selftests: KVM: sev: selftests for fd-based approach of supporting private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 1/4] KVM: selftests: Add a missing apostrophe in comment to show ownership
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: selftests: Add a missing apostrophe in comment to show ownership
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Add support for Virtual SPEC_CTRL
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: selftests: Add a missing apostrophe in comment to show ownership
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [syzbot] WARNING in handle_exception_nmi (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC V1 PATCH 0/3] selftests: KVM: sev: selftests for fd-based approach of supporting private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC 0/3] SCMI Vhost and Virtio backend implementation
- From: Cristian Marussi <cristian.marussi@xxxxxxx>
- Re: [PATCH] KVM: x86: add a bool variable to distinguish whether to use PVIPI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [RFC 1/3] dt-bindings: arm: Add document for SCMI Virtio backend device
- From: Sudeep Holla <sudeep.holla@xxxxxxx>
- [PATCH v7 4/4] KVM SEV-ES: Add tests to validate VC handling for IO instructions
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v7 2/4] KVM: SEV-ES: Add tests to validate VC handling for CPUID and WBINVD
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v7 0/4] KVM: SEV-ES: Add tests to validate #VC handling
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v7 1/4] KVM: SEV-ES: Add configuration options to test #VC handling
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v7 3/4] KVM: SEV-ES: Add tests to validate VC handling for MSR and DR7 register accesses
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/4] KVM: selftests: Add a missing apostrophe in comment to show ownership
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/4] KVM: selftests: Use kvm_has_cap(), not kvm_check_cap(), where possible
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/4] KVM: selftests: Call a dummy helper in VM/vCPU ioctls() to enforce type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/4] KVM: selftests: Drop a duplicate TEST_ASSERT() in vm_nr_pages_required()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/4] KVM: selftests: Fixups for overhaul
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: SVM: Add support for Virtual SPEC_CTRL
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: Kyle Meyer <kyle.meyer@xxxxxxx>
- [kvm:queue 5/184] arch/x86/kvm/svm/avic.c:913:6: warning: shift count >= width of type
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v7 34/39] KVM: selftests: nSVM: Allocate Hyper-V partition assist and VP assist pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 32/39] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86: Ignore benign host accesses to "unsupported" PEBS and BTS MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 22/39] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 33/39] KVM: selftests: nVMX: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 31/39] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 24/39] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 25/39] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 21/39] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 19/39] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 20/39] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 15/39] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 16/39] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 18/39] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 17/39] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 28/39] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 29/39] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 30/39] KVM: selftests: Export _vm_get_page_table_entry()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 27/39] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 23/39] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 14/39] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 13/39] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 12/39] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 11/39] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 38/39] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 26/39] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 37/39] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 36/39] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 35/39] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 39/39] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 08/39] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 00/39] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 05/39] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 02/39] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 06/39] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 09/39] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 04/39] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 07/39] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 03/39] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 01/39] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v6 05/38] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 144/144] KVM: selftests: Sanity check input to ioctls() at build time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH -fixes v2] riscv: Fix missing PAGE_PFN_MASK
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add extensible CSR emulation framework
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/1] s390x: add migration test for storage keys
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/1] s390x: add migration test for storage keys
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] RISC-V: KVM: Add extensible system instruction emulation framework
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH -fixes v2] riscv: Fix missing PAGE_PFN_MASK
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/1] s390x: add migration test for storage keys:q!
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] virtio/vsock: experimental zerocopy receive
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH -fixes v2] riscv: Fix missing PAGE_PFN_MASK
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/8] af_vsock: add zerocopy receive logic
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Thomas Huth <thuth@xxxxxxxxxx>
- RE: [KVM] a5202946dc: kernel-selftests.kvm.make_fail
- From: "Sang, Oliver" <oliver.sang@xxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- RE: [KVM] a5202946dc: kernel-selftests.kvm.make_fail
- From: "Qiang, Chenyi" <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v5 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: "Huang, Shaoqin" <shaoqin.huang@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Remove unused "type" of split_page_type()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add extensible CSR emulation framework
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [no subject]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] RISC-V: KVM: Add extensible system instruction emulation framework
- From: Liu Zhao <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/19] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot] WARNING in handle_exception_nmi (2)
- From: syzbot <syzbot+4688c50a9c8e68e7aaa1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Remove unused "type" of split_page_type()
- From: sunliming <sunliming@xxxxxxxxxx>
- Re: [GIT PULL] virtio,vdpa: fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 06/19] KVM: arm64: Add three sets of flags to the vcpu state
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 05/19] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix a misplaced paranthesis in APICV inhibit mask generation
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [GIT PULL] virtio,vdpa: fixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH 7/7] KVM: x86: Ignore benign host writes to "unsupported" F15H_PERF_CTL MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] Revert "KVM: x86: always allow host-initiated writes to PMU MSRs"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: VMX: Use vcpu_get_perf_capabilities() to get guest-visible value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/7] KVM: x86: Ignore benign host accesses to "unsupported" PEBS and BTS MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] Revert "KVM: x86/pmu: Accept 0 for absent PMU MSRs when host-initiated if !enable_pmu"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: Give host userspace full control of MSR_IA32_MISC_ENABLES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: VMX: Give host userspace full control of MSR_IA32_PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] KVM: x86: Attempt to wrangle PEBS/PMU into submission
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] vfio: de-extern-ify function prototypes
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] KVM: VMX: Skip filter updates for MSRs that KVM is already intercepting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v6 095/104] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [RFC V1 PATCH 0/3] selftests: KVM: sev: selftests for fd-based approach of supporting private memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH RFC 1/2] arm/kvm: enable MTE if available
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH RFC 0/2] arm: enable MTE for QEMU + kvm
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v5 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]