Linux KVM Virtualization
[Prev Page][Next Page]
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Increase KVM_MAX_VCPUS to 2048
- From: Kyle Meyer <kyle.meyer@xxxxxxx>
- [kvm:queue 5/184] arch/x86/kvm/svm/avic.c:913:6: warning: shift count >= width of type
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v7 34/39] KVM: selftests: nSVM: Allocate Hyper-V partition assist and VP assist pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 32/39] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86: Ignore benign host accesses to "unsupported" PEBS and BTS MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 22/39] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 33/39] KVM: selftests: nVMX: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 31/39] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 24/39] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 25/39] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 21/39] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 19/39] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 20/39] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 15/39] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 16/39] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 18/39] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 17/39] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 28/39] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 29/39] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 30/39] KVM: selftests: Export _vm_get_page_table_entry()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 27/39] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 23/39] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 14/39] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 13/39] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 12/39] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 11/39] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 38/39] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 26/39] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 37/39] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 36/39] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 35/39] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 39/39] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 08/39] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 00/39] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 05/39] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 02/39] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 06/39] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 09/39] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 04/39] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 07/39] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 03/39] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v7 01/39] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v6 05/38] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 144/144] KVM: selftests: Sanity check input to ioctls() at build time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH -fixes v2] riscv: Fix missing PAGE_PFN_MASK
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add extensible CSR emulation framework
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/1] s390x: add migration test for storage keys
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/1] s390x: add migration test for storage keys
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] RISC-V: KVM: Add extensible system instruction emulation framework
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH -fixes v2] riscv: Fix missing PAGE_PFN_MASK
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/1] s390x: add migration test for storage keys:q!
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] virtio/vsock: experimental zerocopy receive
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH -fixes v2] riscv: Fix missing PAGE_PFN_MASK
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/8] af_vsock: add zerocopy receive logic
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Thomas Huth <thuth@xxxxxxxxxx>
- RE: [KVM] a5202946dc: kernel-selftests.kvm.make_fail
- From: "Sang, Oliver" <oliver.sang@xxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- RE: [KVM] a5202946dc: kernel-selftests.kvm.make_fail
- From: "Qiang, Chenyi" <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v5 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: "Huang, Shaoqin" <shaoqin.huang@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Remove unused "type" of split_page_type()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 3/3] RISC-V: KVM: Add extensible CSR emulation framework
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [no subject]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] RISC-V: KVM: Add extensible system instruction emulation framework
- From: Liu Zhao <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/19] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot] WARNING in handle_exception_nmi (2)
- From: syzbot <syzbot+4688c50a9c8e68e7aaa1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Remove unused "type" of split_page_type()
- From: sunliming <sunliming@xxxxxxxxxx>
- Re: [GIT PULL] virtio,vdpa: fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 06/19] KVM: arm64: Add three sets of flags to the vcpu state
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 05/19] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix a misplaced paranthesis in APICV inhibit mask generation
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [GIT PULL] virtio,vdpa: fixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH 7/7] KVM: x86: Ignore benign host writes to "unsupported" F15H_PERF_CTL MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] Revert "KVM: x86: always allow host-initiated writes to PMU MSRs"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: VMX: Use vcpu_get_perf_capabilities() to get guest-visible value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/7] KVM: x86: Ignore benign host accesses to "unsupported" PEBS and BTS MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] Revert "KVM: x86/pmu: Accept 0 for absent PMU MSRs when host-initiated if !enable_pmu"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: Give host userspace full control of MSR_IA32_MISC_ENABLES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: VMX: Give host userspace full control of MSR_IA32_PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] KVM: x86: Attempt to wrangle PEBS/PMU into submission
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] vfio: de-extern-ify function prototypes
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] KVM: VMX: Skip filter updates for MSRs that KVM is already intercepting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v6 095/104] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: [RFC V1 PATCH 0/3] selftests: KVM: sev: selftests for fd-based approach of supporting private memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH RFC 1/2] arm/kvm: enable MTE if available
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH RFC 0/2] arm: enable MTE for QEMU + kvm
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v5 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH] KVM: SVM: Fix a misplaced paranthesis in APICV inhibit mask generation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 144/144] KVM: selftests: Sanity check input to ioctls() at build time
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 143/144] KVM: selftests: Add TEST_REQUIRE macros to reduce skipping copy+paste
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 142/144] KVM: selftests: Add kvm_has_cap() to provide syntactic sugar
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 138/144] KVM: selftests: Move per-VM/per-vCPU nr pages calculation to __vm_create()
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 132/144] KVM: selftests: Purge vm+vcpu_id == vcpu silliness
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [PATCH v5 8/8] KVM: selftests: Add a self test for CMCI and UCNA emulations.
- From: Jue Wang <juew@xxxxxxxxxx>
- [PATCH v5 7/8] KVM: x86: Enable CMCI capability by default and handle injected UCNA errors
- From: Jue Wang <juew@xxxxxxxxxx>
- [PATCH v5 6/8] KVM: x86: Add emulation for MSR_IA32_MCx_CTL2 MSRs.
- From: Jue Wang <juew@xxxxxxxxxx>
- [PATCH v5 5/8] KVM: x86: Use kcalloc to allocate the mce_banks array.
- From: Jue Wang <juew@xxxxxxxxxx>
- [PATCH v5 4/8] KVM: x86: Add Corrected Machine Check Interrupt (CMCI) emulation to lapic.
- From: Jue Wang <juew@xxxxxxxxxx>
- [PATCH v5 3/8] KVM: x86: Add APIC_LVTx() macro.
- From: Jue Wang <juew@xxxxxxxxxx>
- [PATCH v5 2/8] KVM: x86: Fill apic_lvt_mask with enums / explicit entries.
- From: Jue Wang <juew@xxxxxxxxxx>
- [PATCH v5 1/8] KVM: x86: Make APIC_VERSION capture only the magic 0x14UL.
- From: Jue Wang <juew@xxxxxxxxxx>
- [PATCH v5 0/8] KVM: x86: Add CMCI and UCNA emulation
- From: Jue Wang <juew@xxxxxxxxxx>
- Re: [PATCH kvmtool 00/24] Virtio v1 support
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 126/144] KVM: selftests: Convert kvm_binary_stats_test away from vCPU IDs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 05/19] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/1] s390x: add migration test for storage keys
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 126/144] KVM: selftests: Convert kvm_binary_stats_test away from vCPU IDs
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] lib: s390x: better smp interrupt checks
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v2 11/19] KVM: arm64: Move vcpu ON_UNSUPPORTED_CPU flag to the state flag set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 12/19] KVM: arm64: Move vcpu WFIT flag to the state flag set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/19] KVM: arm64: Convert vcpu sysregs_loaded_on_cpu to a state flag
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/19] KVM: arm64: Move vcpu SVE/SME flags to the state flag set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 15/19] KVM: arm64: Warn when PENDING_EXCEPTION and INCREMENT_PC are set together
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/19] KVM: arm64: Kill unused vcpu flags field
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 18/19] KVM: arm64: Document why pause cannot be turned into a flag
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 19/19] KVM: arm64: Move the handling of !FP outside of the fast path
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 16/19] KVM: arm64: Add build-time sanity checks for flags
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 17/19] KVM: arm64: Reduce the size of the vcpu flag members
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v2 04/19] KVM: arm64: Move FP state ownership from flag to a tristate
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/19] KVM/arm64: Refactoring the vcpu flags
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/19] KVM: arm64: Drop FP_FOREIGN_STATE from the hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/19] KVM: arm64: Move vcpu configuration flags into their own set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/19] KVM: arm64: Move vcpu debug/SPE/TRBE flags to the input flag set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/19] KVM: arm64: Add three sets of flags to the vcpu state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/19] KVM: arm64: Always start with clearing SVE flag on load
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/19] KVM: arm64: Move vcpu PC/Exception flags to the input flag set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/19] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/19] KVM: arm64: Always start with clearing SME flag on load
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/1] s390x: add migration test for storage keys
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] x86/tests: Add tests for AMD SEV-ES #VC handling Add KUnit based tests to validate Linux's VC handling for instructions cpuid and wbinvd. These tests: 1. install a kretprobe on the #VC handler (sev_es_ghcb_hv_call, to access GHCB before/after the resulting VMGEXIT). 2. trigger an NAE by executing either cpuid or wbinvd. 3. check that the kretprobe was hit with the right exit_code available in GHCB.
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [RFC PATCH] KVM: x86/speculation/taa: Export TAA_NO to guest when host is not affected
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Add three sets of flags to the vcpu state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 13/18] vfio/mdev: Consolidate all the device_api sysfs into the core code
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] Fix up test failures induced by !enable_pmu
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 08/18] KVM: arm64: Move vcpu PC/Exception flags to the input flag set
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- RE: [PATCH] vfio: de-extern-ify function prototypes
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH 2/3] RISC-V: KVM: Add extensible system instruction emulation framework
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 1/3] RISC-V: KVM: Factor-out instruction emulation into separate sources
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 3/3] RISC-V: KVM: Add extensible CSR emulation framework
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 0/3] Improve instruction and CSR emulation in KVM RISC-V
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v1 00/18] VFIO ccw/mdev rework
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH vfio 1/2] vfio/mlx5: Protect mlx5vf_disable_fds() upon close device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/3] x86: Skip running test when pmu is disabled
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [RFC V1 PATCH 0/3] selftests: KVM: sev: selftests for fd-based approach of supporting private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH] vfio: de-extern-ify function prototypes
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] vfio/type1: Simplify bus_type determination
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] Fix up test failures induced by !enable_pmu
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/3] x86: Skip running test when pmu is disabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 6/6] KVM: SEV-ES: reuse advance_sev_es_emulated_ins for OUT too
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: de-underscorify __emulator_pio_in
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: x86: wean fast IN from emulator_pio_in
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: x86: wean in-kernel PIO from vcpu->arch.pio*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: move all vcpu->arch.pio* setup in emulator_pio_in_out
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: inline kernel_pio into its sole caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Mark olpc_dcon BROKEN [Was: [PATCH v6 5/5] fbdev: Make registered_fb[] private to fbmem.c]
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Add three sets of flags to the vcpu state
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Mark olpc_dcon BROKEN [Was: [PATCH v6 5/5] fbdev: Make registered_fb[] private to fbmem.c]
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- [Bug 216098] Assertion Failure in kvm selftest mmu_role_test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] vfio: de-extern-ify function prototypes
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 048/144] KVM: selftests: Rename 'struct vcpu' to 'struct kvm_vcpu'
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 5.19, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Guest migration between different Ryzen CPU generations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 0/5] Fix some races between sysfb device registration and drivers probe
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 5.19, take #1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Guest migration between different Ryzen CPU generations
- From: mike tancsa <mike@xxxxxxxxxx>
- Re: Guest migration between different Ryzen CPU generations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: selftests: Add MONITOR/MWAIT quirk test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 5.19, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] fbdev: Make registered_fb[] private to fbmem.c
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH kvmtool 00/24] Virtio v1 support
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool 17/24] virtio/pci: Delete MSI routes
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool 00/24] Virtio v1 support
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] virtio/vsock: experimental zerocopy receive
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/8] virtio/vsock: add transport zerocopy callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/8] af_vsock: add zerocopy receive logic
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/8] vhost/vsock: rework packet allocation logic
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v6 5/5] fbdev: Make registered_fb[] private to fbmem.c
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 2/2] KVM: x86: notify user space about guest entering s2idle
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- [PATCH 0/2] x86: notify hypervisor/VMM about guest entering s2idle
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH] vfio: de-extern-ify function prototypes
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v6 05/38] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [RFC PATCH v2 0/8] virtio/vsock: experimental zerocopy receive
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [Sean Christopherson] [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/8] af_vsock: add zerocopy receive logic
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] Fix up test failures induced by !enable_pmu
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [RFC PATCH v2 4/8] virtio/vsock: add transport zerocopy callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86: Skip perf related tests when pmu is disabled
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86: Skip running test when pmu is disabled
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: Remove perf enable bit from default config
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [RFC PATCH v2 2/8] vhost/vsock: rework packet allocation logic
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/8] virtio/vsock: rework packet allocation logic
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: x86: SVM: fix avic_kick_target_vcpus_fast
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] vfio: de-extern-ify function prototypes
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Add three sets of flags to the vcpu state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/3] s390x: Test TEID values in storage key test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/8] Move npt test cases and NPT code improvements
- From: "Shukla, Manali" <mashukla@xxxxxxx>
- Re: [PATCH v2 048/144] KVM: selftests: Rename 'struct vcpu' to 'struct kvm_vcpu'
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [RFC 2/3] firmware: Add ARM SCMI Virtio backend implementation
- From: Neeraj Upadhyay <quic_neeraju@xxxxxxxxxxx>
- [RFC 3/3] vhost/scmi: Add Host kernel accelerator for Virtio SCMI
- From: Neeraj Upadhyay <quic_neeraju@xxxxxxxxxxx>
- [RFC 1/3] dt-bindings: arm: Add document for SCMI Virtio backend device
- From: Neeraj Upadhyay <quic_neeraju@xxxxxxxxxxx>
- [RFC 0/3] SCMI Vhost and Virtio backend implementation
- From: Neeraj Upadhyay <quic_neeraju@xxxxxxxxxxx>
- Re: [PATCH 3/8] vfio/mdev: simplify mdev_type handling
- From: Christoph Hellwig <hch@xxxxxx>
- RE: [PATCH 8/8] vfio/mdev: remove mtype_get_parent_dev
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 7/8] vfio/mdev: remove mdev_parent_dev
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 6/8] vfio/mdev: unexport mdev_bus_type
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 5/8] vfio/mdev: remove mdev_from_dev
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 4/8] vfio/mdev: remove mdev_{create,remove}_sysfs_files
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 2/8] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 1/8] vfio/mdev: make mdev.h standalone includable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 5/5] KVM: selftests: Add MONITOR/MWAIT quirk test
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [Bug 216098] Assertion Failure in kvm selftest mmu_role_test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 07/18] KVM: arm64: Move vcpu configuration flags into their own set
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [Bug 216098] New: Assertion Failure in kvm selftest mmu_role_test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 06/18] KVM: arm64: Add three sets of flags to the vcpu state
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [GIT PULL] KVM/riscv fixes for 5.19, take #1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH] virtio: Directly use ida_alloc_range()/ida_free()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH] vdpa: make get_vq_group and set_group_asid optional
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH] RISC-V: fix typos in comments
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH] vfio: de-extern-ify function prototypes
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 05/18] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH] virtio: Directly use ida_alloc_range()/ida_free()
- From: tomorrow Wang (王德明) <wangdeming@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with Linus' tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 10/10] nVMX: Add subtest to verify VMXON succeeds/#UDs on good/bad CR0/CR4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 08/10] nVMX: Wrap VMXON in ASM_TRY(), a.k.a. in exception fixup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 09/10] nVMX: Simplify test_vmxon() by returning directly on failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 07/10] nVMX: Check result of VMXON in INIT/SIPI tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 06/10] nVMX: Check the results of VMXON/VMXOFF in feature control test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 05/10] x86: Provide result of RDMSR from "safe" variant
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 04/10] x86: Use "safe" helpers to implement unsafe CRs accessors
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 03/10] x86: Use "safe" terminology instead of "checking"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 02/10] x86: Replace spaces with tables in processor.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 01/10] x86: Use BIT() to define architectural bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 00/10] x86: nVMX: Add VMXON #UD test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2 2/2] vfio: Replace the iommu notifier with a device list
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: x86/mmu: Set memory encryption "value", not "mask", in shadow PDPTRs
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH 5/5] KVM: selftests: Add MONITOR/MWAIT quirk test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: selftests: Mostly fix comically broken Hyper-V Features test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: selftests: Use exception fixup for #UD/#GP Hyper-V MSR/hcall tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: selftests: Add x86-64 support for exception fixup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86: Add a quirk for KVM's "MONITOR/MWAIT are NOPs!" behavior
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86: Quirk "MWAIT never faults" behavior
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: always allow host-initiated writes to PMU MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PATCH v6 2/4] x86/tests: Add tests for AMD SEV-ES #VC handling Add KUnit based tests to validate Linux's VC handling for instructions cpuid and wbinvd. These tests: 1. install a kretprobe on the #VC handler (sev_es_ghcb_hv_call, to access GHCB before/after the resulting VMGEXIT). 2. trigger an NAE by executing either cpuid or wbinvd. 3. check that the kretprobe was hit with the right exit_code available in GHCB.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 041/144] KVM: selftests: Use vm_create_without_vcpus() in hardware_disable_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 038/144] KVM: selftests: Push vm_adjust_num_guest_pages() into "w/o vCPUs" helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH] virtio: Directly use ida_alloc_range()/ida_free()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH] vfio: de-extern-ify function prototypes
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 59/89] KVM: arm64: Do not support MTE for protected VMs
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCHv6] KVM: x86: Use current rather than snapshotted TSC frequency if it is constant
- From: Anton Romanov <romanton@xxxxxxxxxx>
- Re: [PATCH 3/8] vfio/mdev: simplify mdev_type handling
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/3] s390x: Test effect of storage keys on some more instructions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/4] More skey instr. emulation test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/3] s390x: Test TEID values in storage key test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 3/3] s390x: Test effect of storage keys on diag 308
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 59/89] KVM: arm64: Do not support MTE for protected VMs
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v4 00/11] KVM: selftests: Add nested support to dirty_log_perf_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/3] s390x: Test TEID values in storage key test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] KVM: Trivial cleanups
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 6/6] KVM: X86/SVM: Use root_level in svm_load_mmu_pgd()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 15/18] KVM: arm64: Warn when PENDING_EXCEPTION and INCREMENT_PC are set together
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 5.19-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 093/144] KVM: selftests: Track kvm_vcpu object in tsc_scaling_sync
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 045/144] KVM: selftests: Make vm_create() a wrapper that specifies VM_MODE_DEFAULT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/18] KVM: arm64: Move vcpu debug/SPE/TRBE flags to the input flag set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 048/144] KVM: selftests: Rename 'struct vcpu' to 'struct kvm_vcpu'
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/8] virtio/vsock: experimental zerocopy receive
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/4] x86/tests: Add tests for AMD SEV-ES #VC handling Add KUnit based tests to validate Linux's VC handling for instructions cpuid and wbinvd. These tests: 1. install a kretprobe on the #VC handler (sev_es_ghcb_hv_call, to access GHCB before/after the resulting VMGEXIT). 2. trigger an NAE by executing either cpuid or wbinvd. 3. check that the kretprobe was hit with the right exit_code available in GHCB.
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH 06/18] KVM: arm64: Add three sets of flags to the vcpu state
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 049/144] KVM: selftests: Return the created vCPU from vm_vcpu_add()
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 048/144] KVM: selftests: Rename 'struct vcpu' to 'struct kvm_vcpu'
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 5.19-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 09/18] KVM: arm64: Move vcpu debug/SPE/TRBE flags to the input flag set
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 15/18] KVM: arm64: Warn when PENDING_EXCEPTION and INCREMENT_PC are set together
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 045/144] KVM: selftests: Make vm_create() a wrapper that specifies VM_MODE_DEFAULT
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: preserve interrupt shadow across SMM entries
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 041/144] KVM: selftests: Use vm_create_without_vcpus() in hardware_disable_test
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 038/144] KVM: selftests: Push vm_adjust_num_guest_pages() into "w/o vCPUs" helper
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v6 2/4] x86/tests: Add tests for AMD SEV-ES #VC handling Add KUnit based tests to validate Linux's VC handling for instructions cpuid and wbinvd. These tests: 1. install a kretprobe on the #VC handler (sev_es_ghcb_hv_call, to access GHCB before/after the resulting VMGEXIT). 2. trigger an NAE by executing either cpuid or wbinvd. 3. check that the kretprobe was hit with the right exit_code available in GHCB.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] vfio/type1: Simplify bus_type determination
- From: Robin Murphy <robin.murphy@xxxxxxx>
- [PATCH 2/2] vfio: Use device_iommu_capable()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/1] s390x: add migration test for storage keys
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v19 11/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on queue probe/remove
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/3] s390x: Fix sclp facility bit numbers
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/3] s390x: lib: SOP facility query function
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/2] s390x: Avoid gcc 12 warnings
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] KVM: x86: SVM: fix avic_kick_target_vcpus_fast
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 10/21] vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/1] s390x: add migration test for storage keys
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/1] s390x: add migration test for storage keys
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [RFC v2 13/15] vfio/iommufd: Implement the iommufd backend
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 11/15] backends/iommufd: Introduce the iommufd object
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 08/15] vfio/ccw: Use vfio_[attach/detach]_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: x86/mmu: Set memory encryption "value", not "mask", in shadow PDPTRs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC v2 14/15] vfio/iommufd: Add IOAS_COPY_DMA support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 10/15] vfio/container-base: Introduce VFIOContainer reset callback
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 09/15] vfio/container-base: Introduce [attach/detach]_device container callbacks
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 07/15] vfio/ap: Use vfio_[attach/detach]_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 15/15] vfio/as: Allow the selection of a given iommu backend
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 12/15] util/char_dev: Add open_cdev()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 05/15] vfio/container: Introduce vfio_[attach/detach]_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 04/15] vfio: Add base container
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 06/15] vfio/platform: Use vfio_[attach/detach]_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 02/15] linux-headers: Import latest vfio.h and iommufd.h
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 01/15] scripts/update-linux-headers: Add iommufd.h
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 00/15] vfio: Adopt iommufd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/2] s390x: Avoid gcc 12 warnings
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/2] s390x: Introduce symbol for lowcore and use it
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/2] s390x: Fix gcc 12 warning about array bounds
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] KVM: x86: Emulator _regs fixes and cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 5/6] KVM: x86: de-underscorify __emulator_pio_in
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/6] KVM: x86: inline kernel_pio into its sole caller
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/6] KVM: SEV-ES: reuse advance_sev_es_emulated_ins for OUT too
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 0/6] KVM: x86: vcpu->arch.pio* cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v11 13/19] KVM: s390: pv: destroy the configuration before its memory
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH 4/6] KVM: x86: wean fast IN from emulator_pio_in
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/6] KVM: x86: move all vcpu->arch.pio* setup in emulator_pio_in_out
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/6] KVM: x86: wean in-kernel PIO from vcpu->arch.pio*
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v11 11/19] s390/mm: KVM: pv: when tearing down, try to destroy protected pages
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v11 10/19] KVM: s390: pv: add mmu_notifier
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH] vdpa: Use device_iommu_capable()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v2 2/2] vfio: Replace the iommu notifier with a device list
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v6 05/38] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 8/8] vfio/pci: Add the support for PCI D3cold state
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH RFC 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: preserve interrupt shadow across SMM entries
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v6 03/38] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 2/4] x86/tests: Add tests for AMD SEV-ES #VC handling Add KUnit based tests to validate Linux's VC handling for instructions cpuid and wbinvd. These tests: 1. install a kretprobe on the #VC handler (sev_es_ghcb_hv_call, to access GHCB before/after the resulting VMGEXIT). 2. trigger an NAE by executing either cpuid or wbinvd. 3. check that the kretprobe was hit with the right exit_code available in GHCB.
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- RE: [PATCH 3/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 0/7] Virtual NMI feature
- From: "Shukla, Santosh" <santosh.shukla@xxxxxxx>
- RE: [PATCH 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v6 03/38] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 59/89] KVM: arm64: Do not support MTE for protected VMs
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH 05/18] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 20/21] KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH] virtio: Directly use ida_alloc_range()/ida_free()
- From: Deming Wang <wangdeming@xxxxxxxxxx>
- Re: [PATCH v9 21/21] MAINTAINERS: additional files related kvm s390 pci passthrough
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH] virtio: Directly use ida_alloc_range()/ida_free()
- From: Deming Wang <wangdeming@xxxxxxxxxx>
- Re: [PATCH v2 2/2] vfio: Replace the iommu notifier with a device list
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v9 10/21] vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 05/18] KVM: arm64: Add helpers to manipulate vcpu flags among a set
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [PATCH v2 2/2] vfio: Replace the iommu notifier with a device list
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 33/89] KVM: arm64: Handle guest stage-2 page-tables entirely at EL2
- From: "Huang, Shaoqin" <shaoqin.huang@xxxxxxxxx>
- Re: [RFC PATCH v4 11/36] i386/tdx: Initialize TDX before creating TD vcpus
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH 1/1] KVM: x86/mmu: Set memory encryption "value", not "mask", in shadow PDPTRs
- From: Yuan Yao <yuan.yao@xxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: MMU: Fix VM entry failure and OOPS for shdaow page table
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 89/89] Documentation: KVM: Add some documentation for Protected KVM on arm64
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 02/15] KVM: nVMX: Account for KVM reserved CR4 bits in consistency checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: MMU: Fix VM entry failure and OOPS for shdaow page table
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH v5 09/15] KVM: nVMX: Drop nested_vmx_pmu_refresh()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: VMX: Move MSR_IA32_FEAT_CTL.LOCKED check into "is valid" helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 00/15] KVM: nVMX: VMX MSR quirk+fixes, CR4 fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/2] vfio: Replace the iommu notifier with a device list
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 07/15] KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 10/15] KVM: nVMX: Add a quirk for KVM tweaks to VMX MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 03/15] KVM: nVMX: Inject #UD if VMXON is attempted with incompatible CR0/CR4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: arm64: Replace vgic_v3_uaccess_read_pending with vgic_uaccess_read_pending
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v5 06/15] KVM: nVMX: Keep KVM updates to BNDCFGS ctrl bits across MSR write
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 12/15] KVM: nVMX: Extend VMX MSRs quirk to CR0/4 fixed1 bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/2] Remove the VFIO_IOMMU_NOTIFY_DMA_UNMAP notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 14/15] KVM: selftests: Extend VMX MSRs test to cover CR4_FIXED1 (and its quirks)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 13/15] KVM: selftests: Add test to verify KVM's VMX MSRs quirk for controls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 15/15] KVM: selftests: Verify VMX MSRs can be restored to KVM-supported values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 01/15] KVM: x86: Split kvm_is_valid_cr4() and export only the non-vendor bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: VMX: Let userspace set IA32_FEAT_CTL at will
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 8/8] vfio/pci: Add the support for PCI D3cold state
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH 1/3] KVM: VMX: Allow userspace to set all supported FEATURE_CONTROL bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: MMU: Fix VM entry failure and OOPS for shdaow page table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Verify userspace can stuff IA32_FEATURE_CONTROL at will
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 11/15] KVM: nVMX: Set UMIP bit CR4_FIXED1 MSR when emulating UMIP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 04/15] KVM: nVMX: Rename handle_vm{on,off}() to handle_vmx{on,off}()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 08/15] KVM: nVMX: Keep KVM updates to PERF_GLOBAL_CTRL ctrl bits across MSR write
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: preserve interrupt shadow across SMM entries
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 4/5] Revert "fbdev: Prevent probing generic drivers if a FB is already registered"
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v6 1/5] firmware: sysfb: Make sysfb_create_simplefb() return a pdev pointer
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v6 2/5] firmware: sysfb: Add sysfb_disable() helper function
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v6 0/5] Fix some races between sysfb device registration and drivers probe
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v6 5/5] fbdev: Make registered_fb[] private to fbmem.c
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH v6 3/5] fbdev: Disable sysfb device registration when removing conflicting FBs
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 32/34] s390/gmap: voluntarily schedule during key setting
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 36/38] s390/gmap: voluntarily schedule during key setting
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 48/51] s390/gmap: voluntarily schedule during key setting
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 57/60] s390/gmap: voluntarily schedule during key setting
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.18 65/68] s390/gmap: voluntarily schedule during key setting
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH kvmtool 23/24] virtio: Add support for modern virtio-mmio
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 21/24] virtio: Add support for modern virtio-pci
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 22/24] virtio: Move MMIO transport to mmio-legacy
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 19/24] virtio/pci: Make doorbell offset dynamic
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 24/24] virtio/pci: Initialize all vectors to VIRTIO_MSI_NO_VECTOR
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 20/24] virtio: Move PCI transport to pci-legacy
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 17/24] virtio/pci: Delete MSI routes
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 15/24] virtio/blk: Implement VIRTIO_F_ANY_LAYOUT feature
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 18/24] virtio: Extract init_vq() for PCI and MMIO
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 16/24] virtio/pci: Factor MSI route creation
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 14/24] virtio/console: Add VIRTIO_F_ANY_LAYOUT feature
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 13/24] virtio/net: Implement VIRTIO_F_ANY_LAYOUT feature
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 12/24] virtio/net: Prepare for modern virtio
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 10/24] Add memcpy_fromiovec_safe
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 11/24] virtio/net: Offload vnet header endianness conversion to tap
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 07/24] virtio: Fix device-specific config endianness
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 09/24] virtio: Remove set_guest_features() device op
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 08/24] virtio/console: Remove unused callback
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 06/24] virtio: Add config access helpers
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 05/24] virtio: Support modern virtqueue addresses
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 04/24] virtio: Factor virtqueue initialization
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 03/24] virtio/vsock: Remove redundant state tracking
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 01/24] virtio: Add NEEDS_RESET to the status mask
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 02/24] virtio: Remove redundant test
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- [PATCH kvmtool 00/24] Virtio v1 support
- From: Jean-Philippe Brucker <jean-philippe.brucker@xxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] lib: s390x: better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [GIT PULL 00/15] KVM: s390: pv dump and selftest changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Bug 216091] KVM nested virtualization does not support VMX fields that should always be supported
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 000/144] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: (subset) [PATCH v2 0/3] KVM: arm64: Fix userspace access to HW pending state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: fix tsc scaling cache logic
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: preserve interrupt shadow across SMM entries
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Make hyperv_clock selftest more stable
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: preserve interrupt shadow across SMM entries
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Check every prev_roots in __kvm_mmu_free_obsolete_roots()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Check every prev_roots in __kvm_mmu_free_obsolete_roots()
- From: "Huang, Shaoqin" <shaoqin.huang@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: MMU: Fix VM entry failure and OOPS for shdaow page table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] lib: s390x: better smp interrupt checks
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] lib: s390x: better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v11 18/19] KVM: s390: pv: avoid export before import if possible
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] lib: s390x: better smp interrupt checks
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool 2/4] virtio/mmio: access header members normally
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: (subset) [PATCH 00/23] Update Documentation/ cross-references
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: ioregionfd with io_uring IORING_OP_URING_CMD
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [PATCH 00/18] KVM/arm64: Refactoring the vcpu flags
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] s390x: skey.c: rework the interrupt handler
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: ioregionfd with io_uring IORING_OP_URING_CMD
- From: Elena <elena.ufimtseva@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: nSVM: implement nested VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 2/3] KVM: arm64: Replace vgic_v3_uaccess_read_pending with vgic_uaccess_read_pending
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 5/7] KVM: SVM: Add VNMI support in inject_nmi
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: arm64: Don't read a HW interrupt pending state in user context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: arm64: Warn if accessing timer pending state outside of vcpu context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: arm64: Fix userspace access to HW pending state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: SVM: Add VNMI bit definition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] Simplify vfio_iommu_type1 attach/detach routine
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/7] x86/cpu: Add CPUID feature bit for VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 31/38] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v19 11/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on queue probe/remove
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] Simplify vfio_iommu_type1 attach/detach routine
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio: Replace the iommu notifier with a device list
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v4 11/36] i386/tdx: Initialize TDX before creating TD vcpus
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Replace vgic_v3_uaccess_read_pending with vgic_uaccess_read_pending
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] lib: s390x: better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool 2/4] virtio/mmio: access header members normally
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/8] virtio/vsock: experimental zerocopy receive
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v6 26/38] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 25/38] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 22/38] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 21/38] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] lib: s390x: better smp interrupt checks
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v6 20/38] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 18/38] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 17/38] KVM: x86: hyper-v: L2 TLB flush
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 1/4] x86/tests: Add tests for AMD SEV-ES #VC handling
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- Re: [PATCH v6 15/38] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 14/38] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 11/38] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 05/38] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 03/38] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v6 02/38] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: SVM: fix nested PAUSE filtering when L0 intercepts PAUSE
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Make hyperv_clock selftest more stable
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Make hyperv_clock selftest more stable
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86: inhibit APICv/AVIC when the guest and/or host changes either apic id or the apic base from their default values.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: MMU: Fix VM entry failure and OOPS for shdaow page table
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/5] Simplify vfio_iommu_type1 attach/detach routine
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH 1/1] KVM: MMU: Fix VM entry failure and OOPS for shdaow page table
- From: Yuan Yao <yuan.yao@xxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 2/7] KVM: x86: inhibit APICv/AVIC when the guest and/or host changes either apic id or the apic base from their default values.
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/8] vfio/mdev: simplify mdev_type handling
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 3/8] vfio/mdev: simplify mdev_type handling
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 2/8] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 2/2] vfio: Replace the iommu notifier with a device list
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 03/18] KVM: arm64: Drop FP_FOREIGN_STATE from the hypervisor code
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [Bug 216091] New: KVM nested virtualization does not support VMX fields that should always be supported
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 59/89] KVM: arm64: Do not support MTE for protected VMs
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/2] vfio: Replace the iommu notifier with a device list
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 0/2] Remove the VFIO_IOMMU_NOTIFY_DMA_UNMAP notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 59/89] KVM: arm64: Do not support MTE for protected VMs
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 8/8] vfio/mdev: remove mtype_get_parent_dev
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 7/8] vfio/mdev: remove mdev_parent_dev
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 6/8] vfio/mdev: unexport mdev_bus_type
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 5/8] vfio/mdev: remove mdev_from_dev
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 4/8] vfio/mdev: remove mdev_{create,remove}_sysfs_files
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 3/8] vfio/mdev: simplify mdev_type handling
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/8] vfio/mdev: make mdev.h standalone includable
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KVM: x86/MMU: Zap non-leaf SPTEs when disabling dirty logging
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v6 00/17] Introducing AMD x2AVIC and hybrid-AVIC modes
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 0/7] Virtual NMI feature
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v5 4/4] KVM: arm64/mmu: count KVM s2 mmu usage in secondary pagetable stats
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- [PATCH v5 3/4] KVM: x86/mmu: count KVM mmu usage in secondary pagetable stats.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- [PATCH v5 2/4] KVM: mmu: add a helper to account memory used by KVM MMU.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- [PATCH v5 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- [PATCH v5 0/4] KVM: mm: count KVM mmu usage in memory stats
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 5.16 07/28] x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v1 02/18] vfio/ccw: Fix FSM state if mdev probe fails
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 01/18] vfio/ccw: Remove UUID from s390 debug log
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v9 00/21] KVM: s390: enable zPCI for interpretive execution
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 5/8] s390x/pci: enable adapter event notification for interpreted devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 8/8] s390x/s390-virtio-ccw: add zpcii-disable machine property
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 3/8] s390x/pci: enable for load/store intepretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 6/8] s390x/pci: let intercept devices have separate PCI groups
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 2/8] s390x/pci: add routine to get host function handle from CLP info
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 7/8] s390x/pci: reflect proper maxstbl for groups of interpreted devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 1/8] Update linux headers
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 0/8] s390x/pci: zPCI interpretation support
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v7 4/8] s390x/pci: don't fence interpreted devices without MSI-X
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 20/21] KVM: s390: add KVM_S390_ZPCI_OP to manage guest zPCI devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 21/21] MAINTAINERS: additional files related kvm s390 pci passthrough
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 19/21] vfio-pci/zdev: different maxstbl for interpreted devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 17/21] vfio-pci/zdev: add open/close device hooks
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 18/21] vfio-pci/zdev: add function handle to clp base capability
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 13/21] KVM: s390: pci: enable host forwarding of Adapter Event Notifications
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 16/21] KVM: s390: pci: add routines to start/stop interpretive execution
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 15/21] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 14/21] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 12/21] KVM: s390: pci: do initial setup for AEN interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 11/21] KVM: s390: pci: add basic kvm_zdev structure
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 10/21] vfio/pci: introduce CONFIG_VFIO_PCI_ZDEV_KVM
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 09/21] s390/pci: stash dtsm and maxstbl
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 05/21] s390/airq: pass more TPI info to airq handlers
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 08/21] s390/pci: stash associated GISA designation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 07/21] s390/pci: externalize the SIC operation controls and routine
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 06/21] s390/airq: allow for airq structure that uses an input vector
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 04/21] s390/sclp: detect the AISI facility
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 03/21] s390/sclp: detect the AENI facility
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 02/21] s390/sclp: detect the AISII facility
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 01/21] s390/sclp: detect the zPCI load/store interpretation facility
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v9 00/21] KVM: s390: enable zPCI for interpretive execution
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/8] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v1 14/18] vfio/mdev: Add mdev available instance checking to the core
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH v1 13/18] vfio/mdev: Consolidate all the device_api sysfs into the core code
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 3/8] vfio/mdev: simplify mdev_type handling
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 2/8] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 2/5] iommu: Ensure device has the same iommu_ops as the domain
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/5] iommu: Ensure device has the same iommu_ops as the domain
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH] KVM: SVM: fix tsc scaling cache logic
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 5/7] KVM: x86: disable preemption while updating apicv inhibition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 7/7] KVM: x86: SVM: there is no need for preempt safe wrappers for avic_vcpu_load/put
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 6/7] KVM: x86: disable preemption around the call to kvm_arch_vcpu_{un|}blocking
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 4/7] KVM: x86: SVM: fix avic_kick_target_vcpus_fast
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/7] KVM: x86: inhibit APICv/AVIC when the guest and/or host changes either apic id or the apic base from their default values.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 3/7] KVM: x86: SVM: remove avic's broken code that updated APIC ID
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: document AVIC/APICv inhibit reasons
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/7] KVM: x86: AVIC/APICv patch queue
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 4/4] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 3/4] selftests: kvm/x86: Add testing for masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 1/2] drm/aperture: Split conflicting platform driver removal
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 2/4] selftests: kvm/x86: Add flags when creating a pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 1/4] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 0/4] kvm: x86/pmu: Introduce and test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 2/2] vfio/pci: Remove console drivers
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v19 17/20] s390/vfio-ap: handle config changed and scan complete notification
- From: "Jason J. Herne" <jjherne@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] iommu: Ensure device has the same iommu_ops as the domain
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 00/23] Update Documentation/ cross-references
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Check every prev_roots in __kvm_mmu_free_obsolete_roots()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/5] iommu: Ensure device has the same iommu_ops as the domain
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH] entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]