Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v6 57/64] KVM: arm64: nv: Map VNCR-capable registers to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 38/64] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 5.17, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 29/64] KVM: arm64: nv: Forward debug traps to the nested guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 12/64] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 25/64] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 17/64] KVM: arm64: nv: Emulate PSTATE.M for a guest hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 16/64] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 20/64] KVM: arm64: nv: Trap CPACR_EL1 access in virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 22/64] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 18/64] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 14/64] KVM: arm64: nv: Handle SPSR_EL2 specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 28/64] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 27/64] KVM: arm64: nv: Allow a sysreg to be hidden from userspace only
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 23/64] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP,FPEN} settings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 15/64] KVM: arm64: nv: Handle HCR_EL2.E2H specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 21/64] KVM: arm64: nv: Handle PSCI call via smc from the guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 11/64] KVM: arm64: nv: Handle trapped ERET from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 24/64] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 19/64] KVM: arm64: nv: Trap SPSR_EL1, ELR_EL1 and VBAR_EL1 from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 10/64] KVM: arm64: nv: Inject HVC exceptions to the virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 13/64] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 26/64] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 09/64] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 08/64] KVM: arm64: nv: Reset VMPIDR_EL2 and VPIDR_EL2 to sane values
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 04/64] KVM: arm64: nv: Allow userspace to set PSR_MODE_EL2x
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 07/64] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 02/64] KVM: arm64: nv: Introduce nested virtualization VCPU feature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 06/64] KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 VCPU state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 05/64] KVM: arm64: nv: Add EL2 system registers to vcpu context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 03/64] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 01/64] arm64: Add ARM64_HAS_NESTED_VIRT cpufeature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 00/64] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 5.17, take #1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Parallel CPU bringup for x86_64
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/4] s390x: uv-guest: Add attestation tests
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3] vhost: cache avail index in vhost_enable_notify()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/4] s390x: uv-guest: remove duplicated checks
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/4] s390x: lib: Add QUI getter
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 23/26] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 22/26] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- [PATCH 22/22] KVM: SVM: Use kvm-x86-ops.h to fill svm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 21/22] KVM: SVM: Rename hook implementations to conform to kvm_x86_ops' names
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 20/22] KVM: SVM: Rename SEV implemenations to conform to kvm_x86_ops hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 19/22] KVM: x86: Use more verbose names for mem encrypt kvm_x86_ops hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/22] KVM: x86: Allow different macros for APICv, CVM, and Hyper-V kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 18/22] KVM: SVM: Rename AVIC helpers to use "avic" prefix instead of "svm"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 17/22] KVM: SVM: Remove unused MAX_INST_SIZE #define
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/22] KVM: SVM: Rename svm_flush_tlb() to svm_flush_tlb_current()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/22] KVM: x86: Move get_cs_db_l_bits() helper to SVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/22] KVM: VMX: Use kvm-x86-ops.h to fill vmx_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/22] KVM: VMX: Rename VMX functions to conform to kvm_x86_ops names
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/22] KVM: x86: Use static_call() for copy/move encryption context ioctls()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/22] KVM: x86: Unexport kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/22] KVM: x86: Uninline and export hv_track_root_tdp()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/22] KVM: nVMX: Refactor PMU refresh to avoid referencing kvm_x86_ops.pmu_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/22] KVM: xen: Use static_call() for invoking kvm_x86_ops hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/22] KVM: VMX: Call vmx_get_cpl() directly in handle_dr()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/22] KVM: x86: Use static_call() for .vcpu_deliver_sipi_vector()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/22] KVM: x86: Rename kvm_x86_ops pointers to align w/ preferred vendor names
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/22] KVM: x86: Drop export for .tlb_flush_current() static_call key
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/22] KVM: x86: Move delivery of non-APICv interrupt into vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/22] KVM: x86: Fill *_x86_ops via kvm-x86-ops.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/5] vfio/pci: fix memory leak during D3hot to D0 tranistion
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86: Define wrtsc(tsc) as wrmsr(MSR_IA32_TSC, tsc)
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86: tsc_adjust: Use report_skip when skipping test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: tsc_adjust: Remove flaky timing test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v5 17/69] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 12/30] s390/pci: get SHM information from list pci
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] kvm: selftests: aarch64: fix some vgic related comments
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Chris Mason <clm@xxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Chris Mason <clm@xxxxxx>
- [kvm-unit-tests PATCH 4/4] s390x: uv-guest: Add attestation tests
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 2/4] s390x: lib: Add QUI getter
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/4] s390x: uv-guest: remove duplicated checks
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/4] s390x: Attestation tests
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/30] s390/pci: get SHM information from list pci
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 36/69] KVM: arm64: nv: Filter out unsupported features from ID regs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 08/69] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 08/69] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] vhost: Make use of the helper macro kthread_run()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: eventfd: Fix false positive RCU usage warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 16/69] KVM: arm64: nv: Handle trapped ERET from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 38/69] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 67/69] KVM: arm64: nv: Enable ARMv8.4-NV support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm:queue 305/328] arch/x86/kvm/x86.c:4345:32: warning: cast to pointer from integer of different size
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: KVM call minutes for 2022-01-25
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v5 14/69] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 13/30] s390/pci: return status from zpci_refresh_trans
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/30] s390/pci: get SHM information from list pci
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v3 05/10] x86/sev: Setup code to park APs in the AP Jump Table
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 06/10] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 10/10] x86/kexec/64: Support kexec under SEV-ES with AP Jump Table Blob
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 08/10] x86/sev: Add MMIO handling support to boot/compressed/ code
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 09/10] x86/sev: Handle CLFLUSH MMIO events
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 07/10] x86/sev: Use AP Jump Table blob to stop CPU
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 04/10] x86/sev: Cache AP Jump Table Address
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 03/10] x86/sev: Set GHCB data structure version
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 02/10] x86/sev: Save and print negotiated GHCB protocol version
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 01/10] x86/kexec/64: Disable kexec when SEV-ES is active
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v2 07/30] s390/pci: externalize the SIC operation controls and routine
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 08/12] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH] vhost: Make use of the helper macro kthread_run()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [kvm:queue 305/328] arch/x86/kvm/x86.c:4345:32: warning: cast to pointer from integer of different size
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm:queue 305/328] arch/x86/kvm/x86.c:4345:32: warning: cast to pointer from integer of different size
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 5/5] kvm: selftests: aarch64: use a tighter assert in vgic_poke_irq()
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 4/5] kvm: selftests: aarch64: fix some vgic related comments
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 2/5] kvm: selftests: aarch64: pass vgic_irq guest args as a pointer
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 1/5] kvm: selftests: aarch64: fix assert in gicv3_access_reg
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/26] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2] KVM: eventfd: Fix false positive RCU usage warning
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: export supported_xcr0 via UAPI
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- Re: [RFC PATCH v4 14/26] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 04/26] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 5/5] kvm: selftests: aarch64: use a tighter assert in vgic_poke_irq()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 4/5] kvm: selftests: aarch64: fix some vgic related comments
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 3/5] kvm: selftests: aarch64: fix the failure check in kvm_set_gsi_routing_irqchip_check
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 2/5] kvm: selftests: aarch64: pass vgic_irq guest args as a pointer
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 1/5] kvm: selftests: aarch64: fix assert in gicv3_access_reg
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 0/5] kvm: selftests: aarch64: some fixes for vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH] vhost: Make use of the helper macro kthread_run()
- From: Yin Xiujiang <yinxiujiang@xxxxxxxxxx>
- [kvm:queue 305/328] arch/x86/kvm/x86.c:4345:32: warning: cast to pointer from integer of different size
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Chris Mason <clm@xxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Boris Burkov <boris@xxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: Implement dirty quota-based throttling of vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 14/69] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 14/69] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot] memory leak in kvm_vcpu_ioctl_set_cpuid2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [syzbot] memory leak in kvm_vcpu_ioctl_set_cpuid2
- From: syzbot <syzbot+ead0473557070d5432cd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Boris Burkov <boris@xxxxxx>
- Re: [PATCH 2/2] kvm: selftests: aarch64: fix some vgic related comments
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v8 35/40] x86/sev: use firmware-validated CPUID for SEV-SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/3] x86: Add test coverage for nested_vmx_reflect_vmexit() testing
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: orphan section warnings while building v5.17-rc1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: skip host CPUID call for hypervisor leaves
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Update vCPU's runtime CPUID on write to MSR_IA32_XSS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Keep MSR_IA32_XSS unchanged for INIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Keep MSR_IA32_XSS unchanged for INIT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: orphan section warnings while building v5.17-rc1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: orphan section warnings while building v5.17-rc1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM call minutes for 2022-01-25
- From: Mirela Grujic <mirela.grujic@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Forcibly leave nested virt when SMM state is toggled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 12/69] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 12/69] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Don't skip L2's VMCALL in SMM test for SVM guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Check .flags in kvm_cpuid_check_equal() too
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Don't skip L2's VMCALL in SMM test for SVM guest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 3/3] selftests: kvm: check dynamic bits against KVM_X86_XCOMP_GUEST_SUPP
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/3] selftests: kvm: move vm_xsave_req_perm call to amx_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: export supported_xcr0 via UAPI
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] kvm: selftests: aarch64: fix some vgic related comments
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 1/2] kvm: selftests: aarch64: fix assert in gicv3_access_reg
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 07/12] x86/sev: Setup code to park APs in the AP Jump Table
- From: Joerg Roedel <jroedel@xxxxxxx>
- [PATCH] KVM: x86: Check .flags in kvm_cpuid_check_equal() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Forcibly leave nested virt when SMM state is toggled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 0/3] KVM: x86/pmu: Fix out-of-date AMD amd_event_mapping[]
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Use a prefix for the STANDALONE environment variable
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 13/30] s390/pci: return status from zpci_refresh_trans
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/30] s390/pci: get SHM information from list pci
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/30] s390/pci: externalize the SIC operation controls and routine
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 03/12] x86/sev: Save and print negotiated GHCB protocol version
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v2 20/30] KVM: s390: pci: provide routines for enabling/disabling IOAT assist
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Forcibly leave nested virt when SMM state is toggled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 26/30] vfio-pci/zdev: wire up zPCI adapter interrupt forwarding support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Use a prefix for the STANDALONE environment variable
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [RFC PATCH v4 03/26] KVM: arm64: Introduce struct id_reg_info
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH] KVM: x86: Keep MSR_IA32_XSS unchanged for INIT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: Clean up {Host,MMU}-writable documentation and validation
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 5/5] KVM: x86/mmu: Consolidate comments about {Host,MMU}-writable
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86/mmu: Rename DEFAULT_SPTE_MMU_WRITEABLE to DEFAULT_SPTE_MMU_WRITABLE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86/mmu: Move is_writable_pte() to spte.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86/mmu: Check SPTE writable invariants when setting leaf SPTEs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86/mmu: Move SPTE writable invariant checks to a helper function
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86/mmu: Clean up {Host,MMU}-writable documentation and validation
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Don't skip L2's VMCALL in SMM test for SVM guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Forcibly leave nested virt when SMM state is toggled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 4/4] x86: Add test coverage for nested_vmx_reflect_vmexit() testing
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 3/4] x86: Add a helper to allow tests to signal completion without a vmcall()
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/4] x86: Add support for running a nested guest multiple times in one test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/4] Add additional testing for routing L2 exceptions
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/4] x86: Make exception_mnemonic() visible to the tests
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [syzbot] WARNING in free_loaded_vmcs (3)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 12/12] KVM: Expose KVM_MEM_PRIVATE
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 34/40] x86/sev: add SEV-SNP feature detection/setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: KVM call minutes for 2022-01-25
- From: Philippe Mathieu-Daudé <f4bug@xxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- KVM call for agenda for 2022-02-08
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: KVM call minutes for 2022-01-25
- From: Juan Quintela <quintela@xxxxxxxxxx>
- KVM call minutes for 2022-01-25
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v1] vhost: cache avail index in vhost_enable_notify()
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH 00/19] KVM: x86: Bulk removal of unused function parameters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 16/19] KVM: x86: Remove unused "vcpu" of kvm_arch_tsc_has_attr()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 15/19] KVM: x86/emulate: Remove unused "ctxt" of task_switch_{16, 32}()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 09/19] KVM: x86/svm: Remove unused "svm" of sev_es_prepare_guest_switch()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 11/19] KVM: x86/svm: Remove unused "vector" of sev_vcpu_deliver_sipi_vector()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 07/19] KVM: x86/svm: Remove unused "vcpu" of nested_svm_check_tlb_ctl()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: SVM: Drop stale comment from svm_hv_vmcb_dirty_nested_enlightenments()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for real
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM64: Guest performance improvement during dirty
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v2 19/30] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 01/11] KVM: Capture VM start
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/11] KVM: Capture VM start
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 15/30] KVM: s390: pci: do initial setup for AEN interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guests
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/9] KVM: SVM: Fix and clean up "can emulate" mess
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 20/30] KVM: s390: pci: provide routines for enabling/disabling IOAT assist
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 25/30] vfio-pci/zdev: wire up zPCI interpretive execution support
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH v6 7/7] KVM: SVM: Increase supported GHCB protocol version
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 5/7] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 6/7] KVM: SVM: Add support for Hypervisor Feature support MSR protocol
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v2 26/30] vfio-pci/zdev: wire up zPCI adapter interrupt forwarding support
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v6 1/7] KVM: SVM: Get rid of set_ghcb_msr() and *ghcb_msr_bits() functions
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 4/7] KVM: SVM: Set "released" on INIT-SIPI iff SEV-ES vCPU was in AP reset hold
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 3/7] KVM: SVM: Move kvm_emulate_ap_reset_hold() to AMD specific code
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 0/7] KVM: SVM: Add initial GHCB protocol version 2 support
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 2/7] KVM: SVM: Add helper to generate GHCB MSR verson info, and drop macro
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: "Lazar, Lijo" <lijo.lazar@xxxxxxx>
- Re: [PATCH v2 20/30] KVM: s390: pci: provide routines for enabling/disabling IOAT assist
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: selftests: Add vgic initialization for dirty log perf test for ARM
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: arm64: Add fast path to handle permission relaxation during dirty logging
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: arm64: Use read/write spin lock for MMU protection
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM64: Guest performance improvement during dirty
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests v1 2/8] s390x: Add test for PFMF low-address protection
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v2 25/30] vfio-pci/zdev: wire up zPCI interpretive execution support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: Build regressions/improvements in v5.17-rc1
- From: "D, Lakshmi Sowjanya" <lakshmi.sowjanya.d@xxxxxxxxx>
- Re: [PATCH kvm-unit-tests v1 1/8] s390x: Add more tests for MSCH
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Matthias Schiffer <matthias.schiffer@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 19/30] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 26/30] vfio-pci/zdev: wire up zPCI adapter interrupt forwarding support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/30] KVM: s390: pci: do initial setup for AEN interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH RESEND v2] KVM: LAPIC: Enable timer posted-interrupt when mwait/hlt is advertised
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH RESEND v2] KVM: VMX: Dont' send posted IRQ if vCPU == this vCPU and vCPU is IN_GUEST_MODE
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests v1 1/8] s390x: Add more tests for MSCH
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH v2] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: KVM call for agenda for 2022-01-25
- From: Philippe Mathieu-Daudé <f4bug@xxxxxxxxx>
- Re: KVM call for agenda for 2022-01-25
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v1] vhost: cache avail index in vhost_enable_notify()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/19] KVM: Remove unused "kvm" of kvm_make_vcpu_request()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 19/19] KVM: Remove unused "flags" of kvm_pv_kick_cpu_op()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 17/19] KVM: x86: Remove unused "vcpu" of kvm_scale_tsc()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 14/19] KVM: x86/emulate: Remove unused "ctxt" of setup_syscalls_segments()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 13/19] KVM: x86/ioapic: Remove unused "addr" and "length" of ioapic_read_indirect()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 16/19] KVM: x86: Remove unused "vcpu" of kvm_arch_tsc_has_attr()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 15/19] KVM: x86/emulate: Remove unused "ctxt" of task_switch_{16, 32}()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 12/19] KVM: x86/i8259: Remove unused "addr" of elcr_ioport_{read,write}()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 11/19] KVM: x86/svm: Remove unused "vector" of sev_vcpu_deliver_sipi_vector()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 10/19] KVM: x86/sev: Remove unused "kvm" of sev_unbind_asid()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 08/19] KVM: x86: Remove unused "vcpu" of kvm_after_interrupt()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 09/19] KVM: x86/svm: Remove unused "svm" of sev_es_prepare_guest_switch()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 06/19] KVM: x86/svm: Remove unused "vcpu" of svm_check_exit_valid()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 07/19] KVM: x86/svm: Remove unused "vcpu" of nested_svm_check_tlb_ctl()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 05/19] KVM: x86/mmu_audit: Remove unused "level" of audit_spte_after_sync()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 02/19] KVM: x86/mmu: Remove unused "kvm" of __rmap_write_protect()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 03/19] KVM: x86/mmu: Remove unused "vcpu" of reset_{tdp,ept}_shadow_zero_bits_mask()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 04/19] KVM: x86/tdp_mmu: Remove unused "kvm" of kvm_tdp_mmu_get_root()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 01/19] KVM: x86/mmu: Remove unused "kvm" of kvm_mmu_unlink_parents()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 00/19] KVM: x86: Bulk removal of unused function parameters
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH] KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH] x86: add additional EPT bit definitions
- From: Ayush Ranjan <ayushranjan@xxxxxxxxxx>
- Re: [PATCH] gvisor: add some missing definitions to vmx.h
- From: Ayush Ranjan <ayushranjan@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Remove vmcs_config.order
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v2 20/44] i386/tdx: Parse tdx metadata and store the result into TdxGuestState
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v2 20/44] i386/tdx: Parse tdx metadata and store the result into TdxGuestState
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/26] KVM: arm64: Make CPU ID registers writable by userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH] KVM: VMX: Remove vmcs_config.order
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Felix Kuehling <felix.kuehling@xxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: James Turner <linuxkernel.foss@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
- [PATCH] KVM: vfio: Constify static kvm_device_ops
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH v5 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v2 5/5] vfio/pci: add the support for PCI D3cold state
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 4/5] vfio/pci: Invalidate mmaps and block the access in D3hot power state
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 1/5] vfio/pci: register vfio-pci driver with runtime PM framework
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 3/5] vfio/pci: fix memory leak during D3hot to D0 tranistion
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 2/5] vfio/pci: virtualize PME related registers bits and initialize to zero
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 0/5] vfio/pci: Enable runtime power management support
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v4 23/26] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
- Re: [PATCH] x86: add additional EPT bit definitions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH v4 22/26] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/26] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 17/30] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH] gvisor: add some missing definitions to vmx.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH v4 14/26] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 04/26] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v5 8/8] KVM: VMX: Resize PID-ponter table on demand for IPI virtualization
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v4 03/26] KVM: arm64: Introduce struct id_reg_info
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/26] KVM: arm64: Make CPU ID registers writable by userspace
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86/ioapic: use APIC ID map instead of hard-coded CPU index
- From: "Kaya, Metin" <metikaya@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86/hyperv_clock: print sequence field of reference TSC page
- From: "Kaya, Metin" <metikaya@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86/hyperv_clock: handle non-consecutive APIC IDs
- From: "Kaya, Metin" <metikaya@xxxxxxxxxx>
- [syzbot] WARNING in free_loaded_vmcs (3)
- From: syzbot <syzbot+8112db3ab20e70d50c31@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 17/30] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 18/30] KVM: s390: pci: provide routines for enabling/disabling interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/30] s390/pci: stash associated GISA designation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v17] qapi: introduce 'x-query-x86-cpuid' QMP command.
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 18/30] KVM: s390: pci: provide routines for enabling/disabling interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 17/30] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: "Lazar, Lijo" <Lijo.Lazar@xxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Align incw instruction to avoid split lock
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Re-enable access_tracking_perf_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/7] x86/debug: Test OUT instead of RDMSR for single-step #DB emulation test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 08/30] s390/pci: stash associated GISA designation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kernel v5] KVM: PPC: Merge powerpc's debugfs entry content into generic entry
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: remove async parameter of hva_to_pfn_remapped()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Zero host's SYSENTER_ESP iff SYSENTER is NOT used
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Zero host's SYSENTER_ESP iff SYSENTER is NOT used
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 02/12] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v1] vhost: cache avail index in vhost_enable_notify()
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: Move CPUID.(EAX=0x12,ECX=1) mangling to __kvm_update_cpuid_runtime()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: Partially allow KVM_SET_CPUID{,2} follow-up
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v4 2/5] KVM: x86: Move CPUID.(EAX=0x12,ECX=1) mangling to __kvm_update_cpuid_runtime()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] gvisor: add some missing definitions to vmx.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 06/54] x86/kvm: replace bitmap_weight with bitmap_empty where appropriate
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- KVM call for agenda for 2022-01-25
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- RE: [PATCH v6 04/21] kvm: x86: Exclude unpermitted xfeatures at KVM_GET_SUPPORTED_CPUID
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- RE: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH v2 20/44] i386/tdx: Parse tdx metadata and store the result into TdxGuestState
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Align incw instruction to avoid split lock
- From: Junming Liu <junming.liu@xxxxxxxxx>
- [PATCH] KVM: remove async parameter of hva_to_pfn_remapped()
- From: Xianting Tian <xianting.tian@xxxxxxxxxxxxxxxxx>
- [PATCH] gvisor: add some missing definitions to vmx.h
- From: Ayush Ranjan <ayushranjan@xxxxxxxxxx>
- [PATCH] x86: add additional EPT bit definitions
- From: Ayush Ranjan <ayushranjan@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- [PATCH v5 3/3] KVM: selftests: Verify disabling PMU virtualization via KVM_CAP_CONFIG_PMU
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v5 2/3] KVM: selftests: Allow creation of selftest VM without vcpus
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v5 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v5 0/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH 06/54] x86/kvm: replace bitmap_weight with bitmap_empty where appropriate
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v6 04/21] kvm: x86: Exclude unpermitted xfeatures at KVM_GET_SUPPORTED_CPUID
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v4 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v3] KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH AUTOSEL 4.14 4/4] vhost/test: fix memory leak of vhost virtqueues
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 4/4] vhost/test: fix memory leak of vhost virtqueues
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 8/9] vhost/test: fix memory leak of vhost virtqueues
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.4 3/3] vhost/test: fix memory leak of vhost virtqueues
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 5/5] vhost/test: fix memory leak of vhost virtqueues
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 7/8] vhost/test: fix memory leak of vhost virtqueues
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 13/16] vdpa: clean up get_config_size ret value handling
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 12/16] vhost/test: fix memory leak of vhost virtqueues
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 15/19] vhost/test: fix memory leak of vhost virtqueues
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 16/19] vdpa: clean up get_config_size ret value handling
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: James Turner <linuxkernel.foss@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: nSVM: skip eax alignment check for non-SVM instructions
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: x86: nSVM: skip eax alignment check for non-SVM instructions
- From: Denis Valeev <lemniscattaden@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: vgic-v3: Restrict SEIS workaround to known broken systems
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: vgic-v3: Restrict SEIS workaround to known broken systems
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] KVM: arm64: vgic-v3: Restrict SEIS workaround to known broken systems
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Zero host's SYSENTER_ESP iff SYSENTER is NOT used
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 2/2] target/i386: Add lbr-fmt vPMU option to support guest LBR
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v5 1/2] qdev-properties: Add a new macro with bitmask check for uint64_t property
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v5 0/2] Enable legacy LBR support for guest
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v4 2/5] KVM: x86: Move CPUID.(EAX=0x12,ECX=1) mangling to __kvm_update_cpuid_runtime()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [GIT PULL] Second batch of KVM changes for Linux 5.17
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: "Lazar, Lijo" <Lijo.Lazar@xxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: James Turner <linuxkernel.foss@xxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: VMX: Zero host's SYSENTER_ESP iff SYSENTER is NOT used
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/8] x86: Always use legacy xAPIC to get APIC ID during TSS setup
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [kvm-unit-tests PATCH 8/8] x86: apic: Make xAPIC and I/O APIC pointers static
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 7/8] x86: apic: Track APIC ops on a per-cpu basis
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 6/8] x86: apic: Replace spaces with tabs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 5/8] x86: Add proper helpers for per-cpu reads/writes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 4/8] x86: desc: Replace spaces with tabs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/8] x86: smp: Replace spaces with tabs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/8] x86: nVMX: Load actual GS.base for both guest and host
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/8] x86: Always use legacy xAPIC to get APIC ID during TSS setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/8] x86: APIC bug fix and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 3/3] KVM: selftests: Verify disabling PMU virtualization via KVM_CAP_CONFIG_PMU
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v4 2/3] KVM: selftests: Allow creation of selftest VM without vcpus
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v4 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v4 0/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- Re: [PATCH v3 0/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v3 3/3] KVM: selftests: Verify disabling PMU virtualization via KVM_CAP_CONFIG_PMU
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v3 2/3] KVM: selftests: Allow creation of selftest VM without vcpus
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v3 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v3 0/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/3] x86: Add test coverage for nested_vmx_reflect_vmexit() testing
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH] KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 0/6] x86/xen: Add in-kernel Xen event channel delivery
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 2/5] KVM: x86: Move CPUID.(EAX=0x12,ECX=1) mangling to __kvm_update_cpuid_runtime()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/3] x86: Add test coverage for nested_vmx_reflect_vmexit() testing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/3] x86: Add support for running a nested guest multiple times in one test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/3] x86: Make exception_mnemonic() visible to the tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] Second batch of KVM changes for Linux 5.17
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] KVM: SVM: Pin SEV pages in MMU during sev_launch_update_data()
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- [PATCH v17] qapi: introduce 'x-query-x86-cpuid' QMP command.
- From: Vladimir Sementsov-Ogievskiy <vsementsov@xxxxxxxxxxxxx>
- Re: [PATCH v16] qapi: introduce 'x-query-x86-cpuid' QMP command.
- From: Vladimir Sementsov-Ogievskiy <vsementsov@xxxxxxxxxxxxx>
- Re: [RFC PATCH 6/6] KVM: SVM: Pin SEV pages in MMU during sev_launch_update_data()
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 3/3] x86: Add test coverage for nested_vmx_reflect_vmexit() testing
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/3] x86: Add support for running a nested guest multiple times in one test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/3] x86: Make exception_mnemonic() visible to the tests
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/3] Add additional testing for routing L2 exceptions
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v4 02/12] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Steven Price <steven.price@xxxxxxx>
- Re: [kvm-unit-tests PATCH] vmx: Fix EPT accessed and dirty flag test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Sync the states size with the XCR0/IA32_XSS at any time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH] vmx: Fix EPT accessed and dirty flag test
- From: Cathy Avery <cavery@xxxxxxxxxx>
- [PATCH v2] vhost: cache avail index in vhost_enable_notify()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH kvm-unit-tests v1 6/8] s390x: Add more tests for STSCH
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH kvm-unit-tests v1 3/8] s390x: Add sck tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH kvm-unit-tests v1 8/8] s390x: Add EPSW test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH kvm-unit-tests v1 4/8] s390x: Add tests for STCRW
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH kvm-unit-tests v1 7/8] s390x: Add tests for TSCH
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH kvm-unit-tests v1 1/8] s390x: Add more tests for MSCH
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH kvm-unit-tests v1 2/8] s390x: Add test for PFMF low-address protection
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH kvm-unit-tests v1 0/8] s390x: Extend instruction interception tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH kvm-unit-tests v1 5/8] s390x: Add more tests for SSCH
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 04/10] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 4/5] KVM: selftests: Rename 'get_cpuid_test' to 'cpuid_test'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 5/5] KVM: selftests: Test KVM_SET_CPUID2 after KVM_RUN
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 3/5] KVM: x86: Partially allow KVM_SET_CPUID{,2} after KVM_RUN
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 2/5] KVM: x86: Move CPUID.(EAX=0x12,ECX=1) mangling to __kvm_update_cpuid_runtime()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 1/5] KVM: x86: Do runtime CPUID update before updating vcpu->arch.cpuid_entries
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 0/5] KVM: x86: Partially allow KVM_SET_CPUID{,2} after KVM_RUN for CPU hotplug
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH v1 04/10] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Use a prefix for the STANDALONE environment variable
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v5 36/69] KVM: arm64: nv: Filter out unsupported features from ID regs
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: skip host CPUID call for hypervisor leaves
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH v1 04/10] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] KVM: SVM: Fix and clean up "can emulate" mess
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 1/3] Provide VM capability to disable PMU virtualization for individual VMs
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- [PATCH v2] KVM: x86: Sync the states size with the XCR0/IA32_XSS at any time
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC PATCH 6/6] KVM: SVM: Pin SEV pages in MMU during sev_launch_update_data()
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: James Turner <linuxkernel.foss@xxxxxxxxxxxxxxxxxxxxxx>
- Re: linux-next: Fixes tag needs some work in the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- RE: linux-next: Fixes tag needs some work in the kvm-fixes tree
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- [PATCH v2 3/3] selftests: Verify disabling PMU via KVM_CAP_CONFIG_PMU
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v2 2/3] selftests: introduce function to create test VM without vcpus.
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v2 1/3] Provide VM capability to disable PMU virtualization for individual VMs
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v2 0/3] Provide VM capability to disable PMU virtualization for individual VMs
- From: David Dunn <daviddunn@xxxxxxxxxx>
- linux-next: Fixes tag needs some work in the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 01/11] KVM: Capture VM start
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH V2 06/10] selftests: landlock: Add the uapi headers include variable
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [kvm-unit-tests PATCH] Use a prefix for the STANDALONE environment variable
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH] KVM: x86: skip host CPUID call for hypervisor leaves
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] kvm: selftests: aarch64: fix some vgic related comments
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 1/2] kvm: selftests: aarch64: fix assert in gicv3_access_reg
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 0/2] kvm: selftests: aarch64: some fixes for vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Andrew Cooper <amc96@xxxxxxxx>
- Re: [PATCH v2] KVM: VMX: Dont' send posted IRQ if vCPU == this vCPU and vCPU is IN_GUEST_MODE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] docs: kvm: fix WARNINGs from api.rst
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Add support for ppc64le
- From: Fabiano Rosas <farosas@xxxxxxxxxxxxx>
- [PATCH 0/2] KVM: selftests: Add powerpc support
- From: Fabiano Rosas <farosas@xxxxxxxxxxxxx>
- [PATCH 1/2] KVM: PPC: Book3S HV: Stop returning internal values to userspace
- From: Fabiano Rosas <farosas@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] KVM: SVM: Fix and clean up "can emulate" mess
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v1] vhost: cache avail index in vhost_enable_notify()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 3/9] KVM: SVM: Don't intercept #GP for SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 8/9] KVM: SVM: Don't apply SEV+SMAP workaround on code fetch or PT access
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 19/69] KVM: arm64: nv: Handle SPSR_EL2 specially
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests 01/13] x86/efi: Allow specifying AMD SEV/SEV-ES guest launch policy
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH 6/6] KVM: SVM: Pin SEV pages in MMU during sev_launch_update_data()
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH 7/9] KVM: SVM: Inject #UD on attempted emulation for SEV guest w/o insn buffer
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guests
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [RFC PATCH v1 04/10] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v5 18/69] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v1] vhost: cache avail index in vhost_enable_notify()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2] KVM: Move VM's worker kthreads back to the original cgroups before exiting.
- From: Michal Koutný <mkoutny@xxxxxxxx>
- Re: [PATCH 5/9] KVM: x86: Pass emulation type to can_emulate_instruction()
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 4/9] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 3/9] KVM: SVM: Don't intercept #GP for SEV guests
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 2/9] Revert "KVM: SVM: avoid infinite loop on NPF from bad address"
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 1/9] KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v5 14/69] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests 13/13] x86: AMD SEV-ES: Handle string IO for IOIO #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 12/13] x86: AMD SEV-ES: Handle IOIO #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 11/13] x86: AMD SEV-ES: Handle MSR #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 10/13] x86: AMD SEV-ES: Handle RDTSC/RDTSCP #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 09/13] x86: AMD SEV-ES: Handle CPUID #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 08/13] lib/x86: Move xsave helpers to lib/
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 07/13] x86: AMD SEV-ES: Handle WBINVD #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 06/13] x86: AMD SEV-ES: Prepare for #VC processing
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 04/13] lib: x86: Import insn decoder from Linux
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 05/13] x86: AMD SEV-ES: Pull related GHCB definitions and helpers from Linux
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 03/13] x86: Move svm.h to lib/x86/
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 02/13] x86: AMD SEV-ES: Setup #VC exception handler for AMD SEV-ES
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 01/13] x86/efi: Allow specifying AMD SEV/SEV-ES guest launch policy
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests 00/13] Add #VC exception handling for AMD SEV-ES
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v8 32/40] x86/compressed: use firmware-validated CPUID for SEV-SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [DROP][PATCH] KVM: x86/xcr0: Don't make XFEATURE_MASK_SSE a mandatory bit setting
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v5.17-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v5 17/69] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v2] selftests: kvm/x86: Check if cpuid_d_0_ebx follows XCR0 value change
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 1/2] platform: make platform_get_irq_optional() optional
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: [PATCH] docs: kvm: fix WARNINGs from api.rst
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: linux-next: manual merge of the kvm-fixes tree with Linus' tree
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC PATCH v1 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [DROP][PATCH] KVM: x86: Fix the #GP(0) and #UD conditions for XSETBV emulation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 21/30] KVM: s390: pci: handle refresh of PCI translations
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH] selftests: kvm/x86: Check if cpuid_d_0_ebx follows XCR0 value change
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 2/2] KVM: x86: Fix wrong privilege check for code segment in __load_segment_descriptor()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH 1/2] KVM: x86/emulator: Defer not-present segment check in __load_segment_descriptor()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH 0/2] KVM: x86/emulator: Fix wrong checks when loading code segment in emulator
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [DROP][PATCH] KVM: x86: Fix the #GP(0) and #UD conditions for XSETBV emulation
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/2] x86/emulator: Add some tests for ljmp instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] x86/emulator: Add some tests for lret instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] x86/emulator: Add some tests for loading segment descriptor in emulator
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [DROP][PATCH] KVM: x86: Fix the #GP(0) and #UD conditions for XSETBV emulation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v1 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH] i386: Set MCG_STATUS_RIPV bit for mce SRAR error
- From: luofei <luofei@xxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [DROP][PATCH] KVM: x86: Fix the #GP(0) and #UD conditions for XSETBV emulation
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH] docs: kvm: fix WARNINGs from api.rst
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- RE: linux-next: build warning after merge of the kvm tree
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v5 4/8] KVM: VMX: dump_vmcs() reports tertiary_exec_control field as well
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [RFC PATCH 6/6] KVM: SVM: Pin SEV pages in MMU during sev_launch_update_data()
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: linux-next: build warning after merge of the kvm tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Andrew Cooper <amc96@xxxxxxxx>
- Re: [PATCH 1/3] Provide VM capability to disable PMU virtualization for individual VMs
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 1/3] Provide VM capability to disable PMU virtualization for individual VMs
- From: David Dunn <daviddunn@xxxxxxxxxx>
- Re: [PATCH V2 10/10] selftests: vm: remove dependecy from internal kernel macros
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH 0/2] kvm selftest cleanup
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- Re: [PATCH V2 09/10] selftests: vm: Add the uapi headers include variable
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH 1/3] Provide VM capability to disable PMU virtualization for individual VMs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 9/9] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/9] KVM: SVM: Inject #UD on attempted emulation for SEV guest w/o insn buffer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/9] KVM: SVM: Don't apply SEV+SMAP workaround on code fetch or PT access
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/9] KVM: x86: Pass emulation type to can_emulate_instruction()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/9] KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/9] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/9] KVM: SVM: Don't intercept #GP for SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/9] Revert "KVM: SVM: avoid infinite loop on NPF from bad address"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/9] KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/9] KVM: SVM: Fix and clean up "can emulate" mess
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 4/8] KVM: VMX: dump_vmcs() reports tertiary_exec_control field as well
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 8/8] KVM: VMX: Resize PID-ponter table on demand for IPI virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 7/7] x86/debug: Explicitly write DR6 in the H/W watchpoint + DR6.BS sub-test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/4] x86: Add a test framework for nested_vmx_reflect_vmexit() testing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Re-enable access_tracking_perf_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [kvm-unit-tests PATCH 7/7] x86/debug: Explicitly write DR6 in the H/W watchpoint + DR6.BS sub-test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 6/7] x86/debug: Add single-step #DB + STI/MOVSS blocking tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 5/7] x86: Overhaul definitions for DR6 and DR7 bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 4/7] x86/debug: Run single-step #DB tests in usermode (and kernel mode)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]