Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/49] KVM: x86: replace bitmap_weight with bitmap_empty where appropriate
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 02/12] KVM: MMU: move MMU role accessors to header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/12] KVM: x86: host-initiated EFER.LME write affects the MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix rmap allocation for very large memslots
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: David Dunn <daviddunn@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH V2] selftests: kvm: Remove absent target file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] selftests: kvm: Remove absent target file
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH V2] selftests: kvm: Remove absent target file
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- [PATCH] selftest: KVM: Remove absent target file
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests BUG] x86: debug.c compilation error with --target-efi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: x86: Reconsider the current approach of vPMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 5/6] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 8/8] KVM: x86: Report deprecated x87 features in supported CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] x86/emulator: Add some tests for far jmp instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 3/6] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 5/6] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 1/8] KVM: eventfd: Fix false positive RCU usage warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 2/6] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 8/8] KVM: x86: Report deprecated x87 features in supported CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 1/6] KVM: eventfd: Fix false positive RCU usage warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/3] x86/emulator: Rename test_ljmp() as test_far_jmp()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/3] x86/emulator: Add some tests for far ret instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/23] KVM: MMU: pass uses_nx directly to reset_shadow_zero_bits_mask
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 6/6] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 4/6] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.4 1/2] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.4 2/2] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] x86 UEFI: Fix broken build for UEFI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH RFC 12/39] KVM: x86/xen: store virq when assigning evtchn
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [kvm-unit-tests PATCH RFC 4/4] Rename --target-efi to --efi-payload
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 3/4] configure: Make the --target option available to all architectures
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 2/4] configure: Restrict --target-efi to x86_64
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 1/4] configure: Fix whitespaces for the --gen-se-header help text
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- RE: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v3 09/10] KVM: s390: Update api documentation for memop ioctl
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH RFC 15/39] KVM: x86/xen: handle PV spinlocks slowpath
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Distinguish EVENTSEL bitmasks for uniform event creation and filtering
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 4/5] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH] KVM: arm64: Simplify the CPUHP logic
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [Bug 199727] CPU freezes in KVM guests during high IO load on host
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH RFC 15/39] KVM: x86/xen: handle PV spinlocks slowpath
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH RFC 12/39] KVM: x86/xen: store virq when assigning evtchn
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: KVM: x86: Reconsider the current approach of vPMU
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [kvm-unit-tests BUG] x86: debug.c compilation error with --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: x86/pmu: Distinguish EVENTSEL bitmasks for uniform event creation and filtering
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 14/30] vfio/pci: re-introduce CONFIG_VFIO_PCI_ZDEV
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 03/23] KVM: MMU: remove valid from extended role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Fix emulation in writing cr8
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH RFC] KVM: x86: hyper-v: Avoid writing to TSC page without an active vCPU
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH] x86 UEFI: Fix broken build for UEFI
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] x86/emulator: Add some tests for far jmp instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] x86/emulator: Rename test_ljmp() as test_far_jmp()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH v3] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] x86/emulator: Add some tests for far ret instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/2] x86/emulator: Add some tests for loading segment descriptor in emulator
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH] KVM: x86/mmu: make apf token non-zero to fix bug
- From: Liang Zhang <zhangliang5@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] x86/emulator: Add some tests for lret instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 04/26] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/26] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v3] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH v0 08/15] KVM: x86/xen: intercept EVTCHNOP_send from guests
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 02/15] KVM: x86/xen: Use gfn_to_pfn_cache for runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 09/15] KVM: x86/xen: handle PV IPI vcpu yield
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 15/15] KVM: x86/xen: handle PV spinlocks slowpath
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 0/2] Enable legacy LBR support for guest
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v0 11/15] KVM: x86/xen: handle PV timers oneshot mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 04/15] KVM: x86/xen: Use gfn_to_pfn_cache for vcpu_info
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 03/15] KVM: x86: Use gfn_to_pfn_cache for pv_time
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 10/15] KVM: x86/xen: Add KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 14/15] KVM: x86/xen: Advertise and document KVM_XEN_HVM_CONFIG_EVTCHN_SEND
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 06/15] KVM: x86/xen: Make kvm_xen_set_evtchn() reusable from other places
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 07/15] KVM: x86/xen: Support direct injection of event channel events
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 01/15] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 00/15] KVM: Add Xen event channel acceleration
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 12/15] KVM: x86/xen: Kernel acceleration for XENVER_version
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 05/15] KVM: x86/xen: Use gfn_to_pfn_cache for vcpu_time_info
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 13/15] KVM: x86/xen: Support per-vCPU event channel upcall via local APIC
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 01/23] KVM: MMU: pass uses_nx directly to reset_shadow_zero_bits_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/23] KVM: MMU: constify uses of struct kvm_mmu_role_regs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/23] KVM: MMU: remove valid from extended role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/23] KVM: MMU: nested EPT cannot be used in SMM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/2] x86/emulator: Add some tests for ljmp instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] x86/emulator: Add some tests for lret instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: KVM: x86: Reconsider the current approach of vPMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 5/5] KVM: Do compatibility checks on hotplugged CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: nVMX: Add a quirk for KVM tweaks to VMX control MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/5] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/5] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH MANUALSEL 5.4 1/2] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 6/6] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.4 2/2] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 4/6] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 3/6] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 5/6] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 2/6] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 1/6] KVM: eventfd: Fix false positive RCU usage warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 8/8] KVM: x86: Report deprecated x87 features in supported CPUID
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH MANUALSEL 5.15 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 1/8] KVM: eventfd: Fix false positive RCU usage warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 8/8] KVM: x86: Report deprecated x87 features in supported CPUID
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 1/8] KVM: eventfd: Fix false positive RCU usage warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix emulation in writing cr8
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v10 45/45] virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 44/45] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 42/45] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 43/45] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 40/45] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 33/45] x86/boot: Add a pointer to Confidential Computing blob in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 29/45] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 39/45] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 32/45] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 35/45] x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 36/45] x86/compressed: Export and rename add_identity_map()
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 38/45] x86/sev: Add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 41/45] x86/sev: Register SEV-SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 37/45] x86/compressed/64: Add identity mapping for Confidential Computing blob
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 34/45] x86/compressed: Add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 30/45] KVM: x86: Move lookup of indexed CPUID leafs to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 31/45] x86/sev: Move MSR-based VMGEXITs for CPUID to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 28/45] x86/compressed/acpi: Move EFI kexec handling into common code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 25/45] x86/compressed/acpi: Move EFI system table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 23/45] x86/head/64: Re-enable stack protection
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 26/45] x86/compressed/acpi: Move EFI config table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 27/45] x86/compressed/acpi: Move EFI vendor table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 24/45] x86/compressed/acpi: Move EFI detection to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 22/45] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 19/45] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 18/45] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 20/45] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 16/45] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 14/45] x86/sev: Check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 17/45] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 15/45] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 13/45] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 12/45] x86/sev: Check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 09/45] x86/mm: Extend cc_attr to include AMD SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 02/45] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 06/45] x86/boot: Use MSR read/write helpers instead of inline assembly
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 04/45] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 07/45] x86/compressed/64: Detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 11/45] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 05/45] x86/boot: Introduce helpers for MSR reads/writes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 01/45] KVM: SVM: Define sev_features and vmpl field in the VMSA
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 10/45] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 08/45] x86/sev: Detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 03/45] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 1/5] KVM: x86: Move check_processor_compatibility from init ops to runtime ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 32/64] KVM: arm64: nv: Filter out unsupported features from ID regs
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v5 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v6 3/3] KVM: selftests: Verify disabling PMU virtualization via KVM_CAP_CONFIG_PMU
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v6 2/3] KVM: selftests: Allow creation of selftest VM without vcpus
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v6 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v6 0/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH kvm-unit-tests] vmexit: add test toggling CR0.WP and CR4.PGE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 04/10] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 01/10] s390/uaccess: Add copy_from/to_user_key functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 07/10] KVM: s390: Rename existing vcpu memop functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 08/10] KVM: s390: Add capability for storage key extension of MEM_OP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 10/10] KVM: s390: selftests: Test memops with storage keys
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 09/10] KVM: s390: Update api documentation for memop ioctl
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 03/10] KVM: s390: handle_tprot: Honor storage keys
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 00/10] KVM: s390: Do storage key checking
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/12] KVM: MMU: look for a cached PGD when going from 32-bit to 64-bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/12] KVM: x86: use struct kvm_mmu_root_info for mmu->root
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/12] KVM: x86: do not unload MMU roots on all role changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/12] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/12] KVM: MMU: load new PGD after the shadow MMU is initialized
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/12] KVM: MMU: rename kvm_mmu_reload
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/12] KVM: MMU: avoid NULL-pointer dereference on page freeing bugs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/12] KVM: MMU: move MMU role accessors to header
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/12] KVM: MMU: WARN if PAE roots linger after kvm_mmu_unload
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/12] KVM: x86: host-initiated EFER.LME write affects the MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 31/64] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH v2 10/10] x86: AMD SEV-ES: Handle string IO for IOIO #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 09/10] x86: AMD SEV-ES: Handle IOIO #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 08/10] x86: AMD SEV-ES: Handle MSR #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 03/10] lib: x86: Import insn decoder from Linux
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 07/10] x86: AMD SEV-ES: Handle CPUID #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 06/10] lib/x86: Move xsave helpers to lib/
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 05/10] x86: AMD SEV-ES: Prepare for #VC processing
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 04/10] x86: AMD SEV-ES: Pull related GHCB definitions and helpers from Linux
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 01/10] x86: AMD SEV-ES: Setup #VC exception handler for AMD SEV-ES
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 02/10] x86: Move svm.h to lib/x86/
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 00/10] Add #VC exception handling for AMD SEV-ES
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2] x86/efi: Allow specifying AMD SEV/SEV-ES guest launch policy to run
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH v6 30/64] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v5] KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 1/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- [PATCH v3 0/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH v9 02/43] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: Call for GSoC and Outreachy project ideas for summer 2022
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] perf/x86: Fix native_perf_sched_clock_from_tsc() with __sched_clock_offset
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 02/11] perf/x86: Add support for TSC as a perf event clock
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v2] vfio/pci: fix memory leak during D3hot to D0 transition
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: KVM: x86: Reconsider the current approach of vPMU
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] perf/x86: Add support for TSC as a perf event clock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 03/11] perf/x86: Add support for TSC in nanoseconds as a perf event clock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] perf/x86: Fix native_perf_sched_clock_from_tsc() with __sched_clock_offset
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 06/23] KVM: MMU: load new PGD once nested two-dimensional paging is initialized
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 29/64] KVM: arm64: nv: Forward debug traps to the nested guest
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/4] s390x: topology: Check the Perform Topology Function
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH 01/11] perf/x86: Fix native_perf_sched_clock_from_tsc() with __sched_clock_offset
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 02/11] perf/x86: Add support for TSC as a perf event clock
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 04/11] perf tools: Add new perf clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 05/11] perf tools: Add API probes for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 03/11] perf/x86: Add support for TSC in nanoseconds as a perf event clock
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH kvm-unit-tests v2] arm64: Fix compiling with ancient compiler
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Stop exposing unknown AMX Tile Palettes and accelerator units
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v5 0/2] Enable legacy LBR support for guest
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 11/11] perf intel-pt: Add documentation for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 06/11] perf tools: Add new clock IDs to "perf time to TSC" test
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 09/11] perf intel-pt: Use CLOCK_PERF_HW_CLOCK_NS by default
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 08/11] perf intel-pt: Add support for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 07/11] perf tools: Add perf_read_tsc_conv_for_clockid()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 10/11] perf intel-pt: Add config variables for timing parameters
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 00/11] perf intel-pt: Add perf event clocks to better support VM tracing
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- KVM: x86: Reconsider the current approach of vPMU
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 2/5] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 3/5] KVM: Provide more information in kernel log if hardware enabling fails
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 4/5] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 5/5] KVM: Do compatibility checks on hotplugged CPUs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 1/5] KVM: x86: Move check_processor_compatibility from init ops to runtime ops
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 0/5] Improve KVM's interaction with CPU hotplug
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH] KVM: x86: Fix emulation in writing cr8
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 23/26] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH] KVM: x86: Yield to IPI target vCPU only if it is busy
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: one question about your patch "vhost: log dirty page correctly"
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: nVMX: Add a quirk for KVM tweaks to VMX control MSRs
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: Do compatibility checks on hotplugged CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 12/15] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: fix memory leak during D3hot to D0 transition
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v4 00/12] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 04/12] mm/shmem: Support memfile_notifier
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 02/12] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 0/5] kvm: selftests: aarch64: some fixes for vgic_irq
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 0/6] KVM: arm64: Emulate the OS Lock
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Drop unused param from kvm_psci_version()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM64: Guest performance improvement during dirty
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: vgic: Read HW interrupt pending state from the HW
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- [PATCH v2 0/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- [PATCH v5 1/1] x86/test: Add a test for AMD SEV-ES #VC handling
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v5 0/1] x86/test: Add a test for AMD SEV-ES #VC handling
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v6 28/64] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v9 30/43] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
- From: Borislav Petkov <bp@xxxxxxxxx>
- KVM call for agenda for 2022-02-22
- From: Juan Quintela <quintela@xxxxxxxxxx>
- KVM call minutes for 2022-02-08
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v9 33/43] x86/compressed: Add SEV-SNP feature detection/setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/4] s390x: uv-guest: remove duplicated checks
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v9 30/43] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 27/64] KVM: arm64: nv: Allow a sysreg to be hidden from userspace only
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 02/11] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] KVM: SVM: implement force_intercept_exceptions_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: x86: add force_intercept_exceptions_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC v4 4/8] hisi_acc_vfio_pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 02/11] KVM: s390: Honor storage keys when accessing guest memory
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v9 33/43] x86/compressed: Add SEV-SNP feature detection/setup
- From: Michael Roth <michael.roth@xxxxxxx>
- [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 8/8] hisi_acc_vfio_pci: Use its own PCI reset_done error handler
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 4/8] hisi_acc_vfio_pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 2/8] crypto: hisilicon/qm: Move few definitions to common header
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 0/8] vfio/hisilicon: add ACC live migration driver
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 3/8] hisi_acc_qm: Move PCI device IDs to common header
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 1/8] crypto: hisilicon/qm: Move the QM header to include/linux
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 4/4] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 3/4] s390x: topology: Check the Perform Topology Function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/4] S390x: CPU Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/4] s390x: lib: Add SCLP toplogy nested level
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] s390/uaccess: Add copy_from/to_user_key functions
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH 3/7] svm: NMI is an "exception" and not interrupt in x86 land
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/7] svm: Fix reg_corruption test, to avoid timer interrupt firing in later tests.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 5/7] svm: add SVM_BARE_VMRUN
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2] KVM: X86: Introduce vfio_intr_stat per-vm debugfs file
- From: Yuan ZhaoXiong <yuanzhaoxiong@xxxxxxxxx>
- [PATCH] KVM: arm64: vgic: Read HW interrupt pending state from the HW
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RESEND 00/30] My patch queue
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 6/7] svm: add tests for LBR virtualization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/7] My set of KVM unit tests + fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 04/11] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH 1/7] pmu_lbr: few fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 4/7] svm: intercept shutdown in all svm tests by default
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH RESEND 07/30] KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control them
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 7/7] svm: add tests for case when L1 intercepts various hardware interrupts (an interrupt, SMI, NMI), but lets L2 control either EFLAG.IF or GIF
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 01/11] s390/uaccess: Add copy_from/to_user_key functions
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH RFC 15/39] KVM: x86/xen: handle PV spinlocks slowpath
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RESEND 00/30] My patch queue
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND 07/30] KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control them
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v5 02/14] driver core: Add dma_cleanup callback in bus_type
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 07/30] KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control them
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 09/11] KVM: s390: Add capability for storage key extension of MEM_OP IOCTL
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] s390/uaccess: Add copy_from/to_user_key functions
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH kvm/queue v2 3/3] KVM: x86/pmu: Setup the {inte|amd}_event_mapping[] when hardware_setup
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: s390: Update api documentation for memop ioctl
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v2 3/3] KVM: x86/emulator: Move the unhandled outer privilege level logic of far return into __load_segment_descriptor()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH v2 2/3] KVM: x86/emulator: Fix wrong privilege check for code segment in __load_segment_descriptor()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH v2 1/3] KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH v2 0/3] KVM: x86/emulator: Fix wrong checks when loading code segment in emulator
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] x86/emulator: Add some tests for ljmp instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] x86/emulator: Add some tests for lret instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] x86/emulator: Add some tests for loading segment descriptor in emulator
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH v4 02/12] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH 00/30] My patch queue
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 02/14] driver core: Add dma_cleanup callback in bus_type
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 37/43] x86/sev: Add SEV-SNP feature detection/setup
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v17 14/15] s390/ap: notify drivers on config changed and scan complete callbacks
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v2 1/1] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v1 1/2] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- [PATCH] KVM: arm64: Drop unused param from kvm_psci_version()
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [kvm-unit-tests 02/13] x86: AMD SEV-ES: Setup #VC exception handler for AMD SEV-ES
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v17 14/15] s390/ap: notify drivers on config changed and scan complete callbacks
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] kvm: x86: better handling of NULL-able kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v9 30/43] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 21/23] KVM: MMU: store shadow_root_level into mmu_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 22/23] KVM: MMU: use cpu_role for root_level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 23/23] KVM: MMU: replace direct_map with mmu_role.direct
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Allow SEV intra-host migration of VM with mirrors
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 1/2] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PATCH 20/23] KVM: MMU: pull CPU role computation to kvm_init_mmu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 13/23] KVM: MMU: remove kvm_calc_shadow_root_page_role_common
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 11/23] KVM: MMU: do not recompute root level from kvm_mmu_role_regs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v3 05/10] x86/sev: Setup code to park APs in the AP Jump Table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 11/23] KVM: MMU: do not recompute root level from kvm_mmu_role_regs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v3 04/10] x86/sev: Cache AP Jump Table Address
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/23] KVM: MMU: pass uses_nx directly to reset_shadow_zero_bits_mask
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 10/23] KVM: MMU: split cpu_role from mmu_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 00/30] My patch queue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests v2 PATCH] vmx: Fix EPT accessed and dirty flag test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests 10/13] x86: AMD SEV-ES: Handle RDTSC/RDTSCP #VC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests 07/13] x86: AMD SEV-ES: Handle WBINVD #VC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests 02/13] x86: AMD SEV-ES: Setup #VC exception handler for AMD SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/2] x86/emulator: Add some tests for lret instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 1/2] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 1/2] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PATCH v3 14/30] vfio/pci: re-introduce CONFIG_VFIO_PCI_ZDEV
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Fix wrong privilege check for code segment in __load_segment_descriptor()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v17 14/15] s390/ap: notify drivers on config changed and scan complete callbacks
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] s390/uaccess: Add copy_from/to_user_key functions
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: fix memory leak during D3hot to D0 transition
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH v1] KVM: X86: Introduce vfio_intr_stat per-vm debugfs file
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: nVMX: Keep KVM updates to BNDCFGS ctrl bits across MSR write
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v4 0/9] Parallel CPU bringup for x86_64
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v4 02/12] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v9 38/43] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: nVMX: Keep KVM updates to BNDCFGS ctrl bits across MSR write
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: fix trailing spaces and incorrect indent in function parameter.
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: nVMX: Keep KVM updates to BNDCFGS ctrl bits across MSR write
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: nVMX: Keep KVM updates to BNDCFGS ctrl bits across MSR write
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: nVMX: Keep KVM updates to BNDCFGS ctrl bits across MSR write
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: nVMX: Add a quirk for KVM tweaks to VMX control MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 14/30] vfio/pci: re-introduce CONFIG_VFIO_PCI_ZDEV
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v2 3/7] KVM: nVMX: Roll all entry/exit ctl updates into a single helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 31/43] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH V7 mlx5-next 05/15] net/mlx5: Expose APIs to get/put the mlx5 core device
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 06/15] net/mlx5: Introduce migration bits and structures
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 07/15] vfio: Have the core code decode the VFIO_DEVICE_FEATURE ioctl
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 13/15] vfio/pci: Expose vfio_pci_core_aer_err_detected()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 02/15] net/mlx5: Reuse exported virtfn index function call
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 03/15] net/mlx5: Disable SRIOV before PF removal
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 10/15] vfio: Remove migration protocol v1 documentation
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 09/15] vfio: Extend the device migration protocol with RUNNING_P2P
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: nVMX: Keep KVM updates to BNDCFGS ctrl bits across MSR write
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH V7 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 12/15] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 15/15] vfio: Extend the device migration protocol with PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 01/15] PCI/IOV: Add pci_iov_vf_id() to get VF index
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 11/15] vfio/mlx5: Expose migration commands over mlx5 device
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 04/15] PCI/IOV: Add pci_iov_get_pf_drvdata() to allow VF reaching the drvdata of a PF
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V7 mlx5-next 00/15] Add mlx5 live migration driver and v2 migration protocol
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- [PATCH v2 03/11] KVM: s390: handle_tprot: Honor storage keys
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 02/11] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 00/11] KVM: s390: Do storage key checking
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 07/11] KVM: s390: Rename existing vcpu memop functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 11/11] KVM: s390: Update api documentation for memop ioctl
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v9 31/43] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 04/11] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 08/11] KVM: s390: selftests: Test memops with storage keys
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v9 38/43] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v2 01/11] s390/uaccess: Add copy_from/to_user_key functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 10/11] KVM: s390: selftests: Make use of capability in MEM_OP test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 06/11] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 09/11] KVM: s390: Add capability for storage key extension of MEM_OP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] Revert "svm: Add warning message for AVIC IPI invalid target"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 29/30] KVM: s390: introduce CPU feature for zPCI Interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: VMX: Use local pointer to vcpu_vmx in vmx_vcpu_after_set_cpuid()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 6/7] selftests: KVM: Add test for BNDCFGS VMX control MSR bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 26/64] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v3 26/30] vfio-pci/zdev: wire up zPCI adapter interrupt forwarding support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] KVM: nVMX: Keep KVM updates to PERF_GLOBAL_CTRL ctrl bits across MSR write
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 04/11] KVM: SVM: Use common kvm_apic_write_nodecode() for AVIC write traps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v6 25/64] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 01/23] KVM: MMU: pass uses_nx directly to reset_shadow_zero_bits_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RESEND 30/30] KVM: x86: get rid of KVM_REQ_GET_NESTED_STATE_PAGES
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 05/30] KVM: x86: nSVM: expose clean bit support to the guest
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 19/30] KVM: x86: mmu: add gfn_in_memslot helper
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 16/30] KVM: x86: SVM: allow to force AVIC to be enabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 29/30] KVM: VMX: implement force_intercept_exceptions_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 24/30] KVM: x86: nSVM: implement nested VMLOAD/VMSAVE
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 10/30] KVM: x86: SVM: fix race between interrupt delivery and AVIC inhibition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 09/30] KVM: x86: SVM: move avic definitions from AMD's spec to svm.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 17/30] KVM: x86: mmu: trace kvm_mmu_set_spte after the new SPTE was set
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 07/30] KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control them
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 08/30] KVM: x86: lapic: don't touch irr_pending in kvm_apic_update_apicv when inhibiting it
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 01/30] KVM: x86: SVM: don't passthrough SMAP/SMEP/PKE bits in !NPT && !gCR0.PG case
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 13/30] KVM: x86: lapic: don't allow to change APIC ID when apic acceleration is enabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 12/30] KVM: x86: SVM: allow AVIC to co-exist with a nested guest running
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 22/30] KVM: x86: nSVM: correctly virtualize LBR msrs when L2 is running
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 15/30] KVM: x86: SVM: remove avic's broken code that updated APIC ID
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 25/30] KVM: x86: nSVM: support PAUSE filter threshold and count when cpu_pm=on
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 21/30] x86: KVMGT: use kvm_page_track_write_tracking_enable
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 14/30] KVM: x86: lapic: don't allow to change local apic id when using older x2apic api
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 28/30] KVM: SVM: implement force_intercept_exceptions_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 00/30] My patch queue
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 04/30] KVM: x86: nSVM/nVMX: set nested_run_pending on VM entry which is a result of RSM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 26/30] KVM: x86: nSVM: implement nested vGIF
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 27/30] KVM: x86: add force_intercept_exceptions_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 02/30] KVM: x86: nSVM: fix potential NULL derefernce on nested migration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 23/30] KVM: x86: nSVM: implement nested LBR virtualization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 03/30] KVM: x86: nSVM: mark vmcb01 as dirty when restoring SMM saved state
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 18/30] KVM: x86: mmu: add strict mmu mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 06/30] KVM: x86: mark syntethic SMM vmexit as SVM_EXIT_SW
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 11/30] KVM: x86: SVM: use vmcb01 in avic_init_vmcb
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND 20/30] KVM: x86: mmu: allow to enable write tracking externally
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 30/30] MAINTAINERS: additional files related kvm s390 pci passthrough
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 14/30] vfio/pci: re-introduce CONFIG_VFIO_PCI_ZDEV
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v6 24/64] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v6 22/64] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v7 16/17] KVM: s390: pv: add KVM_CAP_S390_PROT_REBOOT_ASYNC
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v9 41/43] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 15/17] KVM: s390: pv: api documentation for asynchronous destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 16/17] KVM: s390: pv: add KVM_CAP_S390_PROT_REBOOT_ASYNC
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 01/17] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 16/17] KVM: s390: pv: add KVM_CAP_S390_PROT_REBOOT_ASYNC
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 06/23] KVM: MMU: load new PGD once nested two-dimensional paging is initialized
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 41/43] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v7 15/17] KVM: s390: pv: api documentation for asynchronous destroy
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 01/17] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 06/23] KVM: MMU: load new PGD once nested two-dimensional paging is initialized
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 1/2] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 01/12] mm/shmem: Introduce F_SEAL_INACCESSIBLE
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v3 30/30] MAINTAINERS: additional files related kvm s390 pci passthrough
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/17] KVM: s390: pv: add mmu_notifier
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- kvm-unit-tests: timed out on arm64 devices
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: [PATCH v7 01/17] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 12/17] KVM: s390: pv: refactoring of kvm_s390_pv_deinit_vm
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/17] KVM: s390: pv: add mmu_notifier
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/17] KVM: s390: pv: refactor s390_reset_acc
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/17] KVM: s390: pv: refactor s390_reset_acc
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/17] KVM: s390: pv: refactor s390_reset_acc
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 08/17] KVM: s390: pv: make kvm_s390_cpus_from_pv global
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/17] KVM: s390: pv: refactor s390_reset_acc
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 09/17] KVM: s390: pv: clear the state without memset
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/30] s390/pci: get SHM information from list pci
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 03/17] KVM: s390: pv: handle secure storage exceptions for normal guests
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/30] s390/airq: allow for airq structure that uses an input vector
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v9 43/43] virt: sevguest: Add support to get extended report
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 01/17] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 06/30] s390/airq: allow for airq structure that uses an input vector
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v3 05/30] s390/airq: pass more TPI info to airq handlers
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v3 14/30] vfio/pci: re-introduce CONFIG_VFIO_PCI_ZDEV
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] nSVM: Add testing for routing L2 exceptions
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: Add routines to set/clear PT_USER_MASK for all pages
- From: Manali Shukla <manali.shukla@xxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86: Make exception_mnemonic() visible to the tests
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v4 09/17] perf/core: Use static_call to optimize perf_guest_info_callbacks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86: nSVM: Add an exception test framework and tests
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH v9 41/43] virt: Add SEV-SNP guest driver
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 09/17] perf/core: Use static_call to optimize perf_guest_info_callbacks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 40/43] x86/sev: Register SEV-SNP guest request platform device
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 38/43] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 37/43] x86/sev: Add SEV-SNP feature detection/setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 36/43] x86/compressed/64: Add identity mapping for Confidential Computing blob
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 35/43] x86/compressed: Export and rename add_identity_map()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 09/17] perf/core: Use static_call to optimize perf_guest_info_callbacks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 33/43] x86/compressed: Add SEV-SNP feature detection/setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 38/43] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86: allow defining return-0 static calls
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- 答复: [PATCH] KVM: X86: set vcpu preempted only if it is preempted
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [PATCH v9 31/43] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 09/17] perf/core: Use static_call to optimize perf_guest_info_callbacks
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- 答复: [PATCH][v3] KVM: x86: refine kvm_vcpu_is_preempted
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- 答复: [PATCH] KVM: X86: set vcpu preempted only if it is preempted
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [PATCH v2 3/7] KVM: nVMX: Roll all entry/exit ctl updates into a single helper
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 5.17-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v9 38/43] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 31/43] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 31/43] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 01/23] KVM: MMU: pass uses_nx directly to reset_shadow_zero_bits_mask
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 03/23] KVM: MMU: remove valid from extended role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/23] KVM: MMU: split cpu_role from mmu_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]