Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v1 5/8] iommu/amd: Use iommu_attach/detach_device()
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v5 07/14] PCI: Add driver dma ownership management
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/14] driver core: platform: Add driver dma ownership management
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86/efi: Allow specifying AMD SEV/SEV-ES guest launch policy to run
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH v3 19/30] KVM: s390: pci: provide routines for enabling/disabling interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 04/14] driver core: platform: Add driver dma ownership management
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 0/5] kvm: x86: better handling of optional kvm_x86_ops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 3/5] KVM: x86: warn on incorrectly NULL static calls
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 5/8] iommu/amd: Use iommu_attach/detach_device()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 4/5] KVM: x86: make several APIC virtualization callbacks optional
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 2/5] KVM: x86: remove KVM_X86_OP_NULL and mark optional kvm_x86_ops
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 1/5] KVM: x86: use static_call_cond for optional callbacks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 5/5] KVM: x86: allow defining return-0 static calls
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 07/14] PCI: Add driver dma ownership management
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 18/30] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/8] iommu: Extend iommu_at[de]tach_device() for multi-device groups
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 17/30] KVM: s390: pci: enable host forwarding of Adapter Event Notifications
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: SEV: Allow SEV intra-host migration of VM with mirrors
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 07/14] PCI: Add driver dma ownership management
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/8] iommu: Add iommu_group_replace_domain()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86/pmu: Don't truncate the PerfEvtSeln MSR when creating a perf event
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] x86 UEFI: Fix broken build for UEFI
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 07/14] PCI: Add driver dma ownership management
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 06/64] KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 VCPU state
- From: Miguel Luis <miguel.luis@xxxxxxxxxx>
- Re: [PATCH v1 1/8] iommu: Add iommu_group_replace_domain()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- [kvm-unit-tests PATCH] lib/devicetree: Support 64 bit addresses for the initrd
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: Call for GSoC and Outreachy project ideas for summer 2022
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v1 3/8] iommu: Extend iommu_at[de]tach_device() for multi-device groups
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v1 5/8] iommu/amd: Use iommu_attach/detach_device()
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [kvm-unit-tests BUG] x86: debug.c compilation error with --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH V2 02/11] perf/x86: Add support for TSC as a perf event clock
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] x86 UEFI: Fix broken build for UEFI
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH V2 03/11] perf/x86: Add support for TSC in nanoseconds as a perf event clock
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 08/11] perf intel-pt: Add support for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 05/11] perf tools: Add API probes for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 09/11] perf intel-pt: Use CLOCK_PERF_HW_CLOCK_NS by default
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 06/11] perf tools: Add new clock IDs to "perf time to TSC" test
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 11/11] perf intel-pt: Add documentation for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 07/11] perf tools: Add perf_read_tsc_conv_for_clockid()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 10/11] perf intel-pt: Add config variables for timing parameters
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 01/11] perf/x86: Fix native_perf_sched_clock_from_tsc() with __sched_clock_offset
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 04/11] perf tools: Add new perf clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH V2 00/11] perf intel-pt: Add perf event clocks to better support VM tracing
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v2 1/2] platform: make platform_get_irq_optional() optional
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] platform: make platform_get_irq_optional() optional
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: [PATCH v2 1/2] platform: make platform_get_irq_optional() optional
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v5 07/14] PCI: Add driver dma ownership management
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/14] driver core: Add dma_cleanup callback in bus_type
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/14] driver core: Add dma_cleanup callback in bus_type
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/14] driver core: platform: Add driver dma ownership management
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 1/1] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: David Edmondson <david.edmondson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/4] s390x: topology: Check the Perform Topology Function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] platform: make platform_get_irq_optional() optional
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] platform: make platform_get_irq_optional() optional
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: Call for GSoC and Outreachy project ideas for summer 2022
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH v5 23/27] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 26/27] KVM: arm64: Add kunit test for trap initialization
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 24/27] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 25/27] KVM: arm64: Trap disabled features of ID_AA64ISAR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 27/27] KVM: arm64: selftests: Introduce id_reg_test
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 21/27] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 08/27] KVM: arm64: Make ID_AA64MMFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 20/27] KVM: arm64: Introduce framework to trap disabled features
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 15/27] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 14/27] KVM: arm64: Make ID registers without id_reg_info writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 22/27] KVM: arm64: Trap disabled features of ID_AA64PFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 13/27] KVM: arm64: Make MVFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 17/27] KVM: arm64: Add kunit test for ID register validation
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 18/27] KVM: arm64: Use vcpu->arch cptr_el2 to track value of cptr_el2 for VHE
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 11/27] KVM: arm64: Make ID_AA64DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 05/27] KVM: arm64: Make ID_AA64PFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 06/27] KVM: arm64: Make ID_AA64ISAR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 16/27] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_CONFIGURABLE capability
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 07/27] KVM: arm64: Make ID_AA64ISAR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 19/27] KVM: arm64: Use vcpu->arch.mdcr_el2 to track value of mdcr_el2
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 09/27] KVM: arm64: Make ID_AA64MMFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 10/27] KVM: arm64: Hide IMPLEMENTATION DEFINED PMU support for the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 12/27] KVM: arm64: Make ID_DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 04/27] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 02/27] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 03/27] KVM: arm64: Introduce struct id_reg_info
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 00/27] KVM: arm64: Make CPU ID registers writable by userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 01/27] KVM: arm64: Introduce a validation function for an ID register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: Set environment variable `KVM` makes build fail
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PULL 18/38] hw/arm/virt: Honor highmem setting when computing the memory map
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PULL 18/38] hw/arm/virt: Honor highmem setting when computing the memory map
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxx>
- Re: [PULL 18/38] hw/arm/virt: Honor highmem setting when computing the memory map
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PULL 18/38] hw/arm/virt: Honor highmem setting when computing the memory map
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Set environment variable `KVM` makes build fail
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] x86/pmu: Set appropriate expectations for reference cycles
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: Set environment variable `KVM` makes build fail
- From: Zhouyi Zhou <zhouzhouyi@xxxxxxxxx>
- Set environment variable `KVM` makes build fail
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PULL 18/38] hw/arm/virt: Honor highmem setting when computing the memory map
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxx>
- [PATCH v2] target/arm: Support PSCI 1.1 and SMCCC 1.0
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86/efi: Allow specifying AMD SEV/SEV-ES guest launch policy to run
- From: Marc Orr <marcorr@xxxxxxxxxx>
- [PATCH] target/arm: Support PSCI 1.1 and SMCCC 1.0
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86/pmu: Use AMD64_RAW_EVENT_MASK for PERF_TYPE_RAW
- From: David Dunn <daviddunn@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86/pmu: Don't truncate the PerfEvtSeln MSR when creating a perf event
- From: David Dunn <daviddunn@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 10/10] x86: AMD SEV-ES: Handle string IO for IOIO #VC
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests] pmu: fix conditions for emulation test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 09/10] x86: AMD SEV-ES: Handle IOIO #VC
- From: Marc Orr <marcorr@xxxxxxxxxx>
- [syzbot] kernel BUG in vhost_get_vq_desc
- From: syzbot <syzbot+3140b17cb44a7b174008@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 1/8] KVM: eventfd: Fix false positive RCU usage warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 08/10] x86: AMD SEV-ES: Handle MSR #VC
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 07/10] x86: AMD SEV-ES: Handle CPUID #VC
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 06/10] lib/x86: Move xsave helpers to lib/
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 05/10] x86: AMD SEV-ES: Prepare for #VC processing
- From: Marc Orr <marcorr@xxxxxxxxxx>
- [PATCH v2 1/2] platform: make platform_get_irq_optional() optional
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: [kvm-unit-tests PATCH v2 04/10] x86: AMD SEV-ES: Pull related GHCB definitions and helpers from Linux
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/10] lib: x86: Import insn decoder from Linux
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 01/10] x86: AMD SEV-ES: Setup #VC exception handler for AMD SEV-ES
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v3 1/1] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Bug 199727] CPU freezes in KVM guests during high IO load on host
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] KVM: x86/pmu: Fix reserved bits for AMD PerfEvtSeln register
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: Don't actually set a request when evicting vCPUs for GFN cache invd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 199727] CPU freezes in KVM guests during high IO load on host
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 04/12] mm/shmem: Support memfile_notifier
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v4 01/12] mm/shmem: Introduce F_SEAL_INACCESSIBLE
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Allow SEV intra-host migration of VM with mirrors
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v2] KVM: SEV: Allow SEV intra-host migration of VM with mirrors
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH 12/12] KVM: x86: do not unload MMU roots on all role changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 01/10] s390/uaccess: Add copy_from/to_user_key functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 00/10] KVM: s390: Do storage key checking
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 07/10] KVM: s390: Rename existing vcpu memop functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 09/10] KVM: s390: Update api documentation for memop ioctl
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 03/10] KVM: s390: handle_tprot: Honor storage keys
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 04/10] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 10/10] KVM: s390: selftests: Test memops with storage keys
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 08/10] KVM: s390: Add capability for storage key extension of MEM_OP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 11/12] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: fix hardlockup due to LAPIC hrtimer period drift
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 10/12] KVM: MMU: load new PGD after the shadow MMU is initialized
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/12] KVM: MMU: load new PGD after the shadow MMU is initialized
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 07/12] KVM: x86: use struct kvm_mmu_root_info for mmu->root
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/12] KVM: MMU: look for a cached PGD when going from 32-bit to 64-bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2] selftests: kvm: Remove absent target file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: SVM: fix race between interrupt delivery and AVIC inhibition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2] selftests: kvm: Remove absent target file
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: SVM: fix race between interrupt delivery and AVIC inhibition
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC v2 0/4] vfio/hisilicon: add acc live migration driver
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 5.17, take #3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: SVM: fix race between interrupt delivery and AVIC inhibition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fixes for kvm/queue
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 06/12] KVM: MMU: rename kvm_mmu_reload
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: SVM: set IRR in svm_deliver_interrupt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: SVM: extract avic_ring_doorbell
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 05/64] KVM: arm64: nv: Add EL2 system registers to vcpu context
- From: Miguel Luis <miguel.luis@xxxxxxxxxx>
- Re: [PATCH 07/49] KVM: x86: replace bitmap_weight with bitmap_empty where appropriate
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fixes for kvm/queue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 06/12] KVM: MMU: rename kvm_mmu_reload
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 4/6] KVM: X86: Introduce role.level_promoted
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH 09/12] KVM: MMU: look for a cached PGD when going from 32-bit to 64-bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 05/12] KVM: MMU: avoid NULL-pointer dereference on page freeing bugs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 04/12] KVM: MMU: WARN if PAE roots linger after kvm_mmu_unload
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 5.17, take #3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/3] KVM: SVM: fix race between interrupt delivery and AVIC inhibition
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/3] KVM: SVM: extract avic_ring_doorbell
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/3] KVM: SVM: fix race between interrupt delivery and AVIC inhibition
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 10/15] vfio: Remove migration protocol v1 documentation
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH 2/3] KVM: SVM: set IRR in svm_deliver_interrupt
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 09/12] KVM: MMU: look for a cached PGD when going from 32-bit to 64-bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 06/12] KVM: MMU: rename kvm_mmu_reload
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v3 09/10] KVM: s390: Update api documentation for memop ioctl
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 12/12] KVM: x86: do not unload MMU roots on all role changes
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [PATCH v3 1/1] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH v2 1/1] x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fixes for kvm/queue
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [PATCH] x86 UEFI: Fix broken build for UEFI
- From: "Duan, Zhenzhong" <zhenzhong.duan@xxxxxxxxx>
- [PATCH] Disable KVM_HC_CLOCK_PAIRING if tsc is in always catchup mode
- From: Anton Romanov <romanton@xxxxxxxxxx>
- Re: [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/12] KVM: MMU: look for a cached PGD when going from 32-bit to 64-bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/12] KVM: MMU: look for a cached PGD when going from 32-bit to 64-bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 06/12] KVM: MMU: rename kvm_mmu_reload
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 05/12] KVM: MMU: avoid NULL-pointer dereference on page freeing bugs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6] KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v5] KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 04/12] KVM: MMU: WARN if PAE roots linger after kvm_mmu_unload
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/49] KVM: x86: replace bitmap_weight with bitmap_empty where appropriate
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 02/12] KVM: MMU: move MMU role accessors to header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/12] KVM: x86: host-initiated EFER.LME write affects the MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix rmap allocation for very large memslots
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: David Dunn <daviddunn@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH V2] selftests: kvm: Remove absent target file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] selftests: kvm: Remove absent target file
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH V2] selftests: kvm: Remove absent target file
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- [PATCH] selftest: KVM: Remove absent target file
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests BUG] x86: debug.c compilation error with --target-efi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: x86: Reconsider the current approach of vPMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 5/6] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 8/8] KVM: x86: Report deprecated x87 features in supported CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] x86/emulator: Add some tests for far jmp instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 3/6] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 5/6] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 1/8] KVM: eventfd: Fix false positive RCU usage warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 2/6] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 8/8] KVM: x86: Report deprecated x87 features in supported CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 1/6] KVM: eventfd: Fix false positive RCU usage warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/3] x86/emulator: Rename test_ljmp() as test_far_jmp()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/3] x86/emulator: Add some tests for far ret instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/23] KVM: MMU: pass uses_nx directly to reset_shadow_zero_bits_mask
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 6/6] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 4/6] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.16 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.4 1/2] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.4 2/2] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] x86 UEFI: Fix broken build for UEFI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH RFC 12/39] KVM: x86/xen: store virq when assigning evtchn
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [kvm-unit-tests PATCH RFC 4/4] Rename --target-efi to --efi-payload
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 3/4] configure: Make the --target option available to all architectures
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 0/4] configure changes and rename --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 2/4] configure: Restrict --target-efi to x86_64
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 1/4] configure: Fix whitespaces for the --gen-se-header help text
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- RE: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v3 09/10] KVM: s390: Update api documentation for memop ioctl
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v3 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH RFC 15/39] KVM: x86/xen: handle PV spinlocks slowpath
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Distinguish EVENTSEL bitmasks for uniform event creation and filtering
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 4/5] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH] KVM: arm64: Simplify the CPUHP logic
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [Bug 199727] CPU freezes in KVM guests during high IO load on host
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH RFC 15/39] KVM: x86/xen: handle PV spinlocks slowpath
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH RFC 12/39] KVM: x86/xen: store virq when assigning evtchn
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: KVM: x86: Reconsider the current approach of vPMU
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [kvm-unit-tests BUG] x86: debug.c compilation error with --target-efi
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: x86/pmu: Distinguish EVENTSEL bitmasks for uniform event creation and filtering
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 14/30] vfio/pci: re-introduce CONFIG_VFIO_PCI_ZDEV
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 03/23] KVM: MMU: remove valid from extended role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Fix emulation in writing cr8
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH RFC] KVM: x86: hyper-v: Avoid writing to TSC page without an active vCPU
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH] x86 UEFI: Fix broken build for UEFI
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH] KVM: s390: MAINTAINERS: promote Claudio Imbrenda
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] x86/emulator: Add some tests for far jmp instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] x86/emulator: Rename test_ljmp() as test_far_jmp()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH v3] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] x86/emulator: Add some tests for far ret instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/2] x86/emulator: Add some tests for loading segment descriptor in emulator
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH] KVM: x86/mmu: make apf token non-zero to fix bug
- From: Liang Zhang <zhangliang5@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] x86/emulator: Add some tests for lret instruction emulation
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 04/26] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/26] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v3] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- [PATCH v0 08/15] KVM: x86/xen: intercept EVTCHNOP_send from guests
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 02/15] KVM: x86/xen: Use gfn_to_pfn_cache for runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 09/15] KVM: x86/xen: handle PV IPI vcpu yield
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 15/15] KVM: x86/xen: handle PV spinlocks slowpath
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 0/2] Enable legacy LBR support for guest
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 07/23] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v0 11/15] KVM: x86/xen: handle PV timers oneshot mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 04/15] KVM: x86/xen: Use gfn_to_pfn_cache for vcpu_info
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 03/15] KVM: x86: Use gfn_to_pfn_cache for pv_time
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 10/15] KVM: x86/xen: Add KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 14/15] KVM: x86/xen: Advertise and document KVM_XEN_HVM_CONFIG_EVTCHN_SEND
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 06/15] KVM: x86/xen: Make kvm_xen_set_evtchn() reusable from other places
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 07/15] KVM: x86/xen: Support direct injection of event channel events
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 01/15] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 00/15] KVM: Add Xen event channel acceleration
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 12/15] KVM: x86/xen: Kernel acceleration for XENVER_version
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 05/15] KVM: x86/xen: Use gfn_to_pfn_cache for vcpu_time_info
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v0 13/15] KVM: x86/xen: Support per-vCPU event channel upcall via local APIC
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 01/23] KVM: MMU: pass uses_nx directly to reset_shadow_zero_bits_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/23] KVM: MMU: constify uses of struct kvm_mmu_role_regs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/23] KVM: MMU: remove valid from extended role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/23] KVM: MMU: nested EPT cannot be used in SMM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/23] KVM: MMU: MMU role refactoring
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/2] x86/emulator: Add some tests for ljmp instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] x86/emulator: Add some tests for lret instruction emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: KVM: x86: Reconsider the current approach of vPMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 5/5] KVM: Do compatibility checks on hotplugged CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: nVMX: Add a quirk for KVM tweaks to VMX control MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/5] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/5] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH MANUALSEL 5.4 1/2] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 6/6] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.4 2/2] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 4/6] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 3/6] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 5/6] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 2/6] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 1/6] KVM: eventfd: Fix false positive RCU usage warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 8/8] KVM: x86: Report deprecated x87 features in supported CPUID
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH MANUALSEL 5.15 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 3/8] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 1/8] KVM: eventfd: Fix false positive RCU usage warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 7/8] KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 8/8] KVM: x86: Report deprecated x87 features in supported CPUID
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 1/8] KVM: eventfd: Fix false positive RCU usage warning
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 2/8] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 6/8] KVM: SVM: Explicitly require DECODEASSISTS to enable SEV support
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 5/8] KVM: SVM: Don't kill SEV guest if SMAP erratum triggers in usermode
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.16 4/8] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix emulation in writing cr8
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v10 45/45] virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 44/45] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 42/45] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 43/45] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 40/45] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 33/45] x86/boot: Add a pointer to Confidential Computing blob in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 29/45] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 39/45] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 32/45] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 35/45] x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 36/45] x86/compressed: Export and rename add_identity_map()
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 38/45] x86/sev: Add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 41/45] x86/sev: Register SEV-SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 37/45] x86/compressed/64: Add identity mapping for Confidential Computing blob
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 34/45] x86/compressed: Add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 30/45] KVM: x86: Move lookup of indexed CPUID leafs to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 31/45] x86/sev: Move MSR-based VMGEXITs for CPUID to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 28/45] x86/compressed/acpi: Move EFI kexec handling into common code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 25/45] x86/compressed/acpi: Move EFI system table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 23/45] x86/head/64: Re-enable stack protection
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 26/45] x86/compressed/acpi: Move EFI config table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 27/45] x86/compressed/acpi: Move EFI vendor table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 24/45] x86/compressed/acpi: Move EFI detection to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 22/45] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 21/45] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 19/45] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 18/45] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 20/45] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 16/45] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 14/45] x86/sev: Check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 17/45] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 15/45] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 13/45] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 12/45] x86/sev: Check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 09/45] x86/mm: Extend cc_attr to include AMD SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 02/45] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 06/45] x86/boot: Use MSR read/write helpers instead of inline assembly
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 04/45] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 07/45] x86/compressed/64: Detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 11/45] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 05/45] x86/boot: Introduce helpers for MSR reads/writes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 01/45] KVM: SVM: Define sev_features and vmpl field in the VMSA
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 10/45] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 08/45] x86/sev: Detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v10 03/45] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v3 1/5] KVM: x86: Move check_processor_compatibility from init ops to runtime ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 32/64] KVM: arm64: nv: Filter out unsupported features from ID regs
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v5 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v6 3/3] KVM: selftests: Verify disabling PMU virtualization via KVM_CAP_CONFIG_PMU
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v6 2/3] KVM: selftests: Allow creation of selftest VM without vcpus
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v6 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH v6 0/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: David Dunn <daviddunn@xxxxxxxxxx>
- [PATCH kvm-unit-tests] vmexit: add test toggling CR0.WP and CR4.PGE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 04/10] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 01/10] s390/uaccess: Add copy_from/to_user_key functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 07/10] KVM: s390: Rename existing vcpu memop functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 08/10] KVM: s390: Add capability for storage key extension of MEM_OP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 05/10] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 10/10] KVM: s390: selftests: Test memops with storage keys
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 02/10] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 09/10] KVM: s390: Update api documentation for memop ioctl
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 03/10] KVM: s390: handle_tprot: Honor storage keys
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 00/10] KVM: s390: Do storage key checking
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH 03/12] KVM: x86: do not deliver asynchronous page faults if CR0.PG=0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/12] KVM: MMU: look for a cached PGD when going from 32-bit to 64-bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/12] KVM: x86: use struct kvm_mmu_root_info for mmu->root
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/12] KVM: x86: do not unload MMU roots on all role changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/12] KVM: MMU: remove kvm_mmu_calc_root_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/12] KVM: MMU: load new PGD after the shadow MMU is initialized
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/12] KVM: MMU: rename kvm_mmu_reload
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/12] KVM: MMU: do not consult levels when freeing roots
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/12] KVM: MMU: avoid NULL-pointer dereference on page freeing bugs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/12] KVM: MMU: move MMU role accessors to header
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/12] KVM: MMU: WARN if PAE roots linger after kvm_mmu_unload
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/12] KVM: x86: host-initiated EFER.LME write affects the MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 00/12] KVM: MMU: do not unload MMU roots on all role changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 31/64] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH v2 10/10] x86: AMD SEV-ES: Handle string IO for IOIO #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 09/10] x86: AMD SEV-ES: Handle IOIO #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 08/10] x86: AMD SEV-ES: Handle MSR #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 03/10] lib: x86: Import insn decoder from Linux
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 07/10] x86: AMD SEV-ES: Handle CPUID #VC
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 06/10] lib/x86: Move xsave helpers to lib/
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 05/10] x86: AMD SEV-ES: Prepare for #VC processing
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 04/10] x86: AMD SEV-ES: Pull related GHCB definitions and helpers from Linux
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 01/10] x86: AMD SEV-ES: Setup #VC exception handler for AMD SEV-ES
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 02/10] x86: Move svm.h to lib/x86/
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2 00/10] Add #VC exception handling for AMD SEV-ES
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- [kvm-unit-tests PATCH v2] x86/efi: Allow specifying AMD SEV/SEV-ES guest launch policy to run
- From: Varad Gautam <varad.gautam@xxxxxxxx>
- Re: [PATCH v6 30/64] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v5] KVM: SVM: Allow AVIC support on system w/ physical APIC ID > 255
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 1/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- [PATCH v3 0/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH v9 02/43] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: Call for GSoC and Outreachy project ideas for summer 2022
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] perf/x86: Fix native_perf_sched_clock_from_tsc() with __sched_clock_offset
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH 02/11] perf/x86: Add support for TSC as a perf event clock
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v2] vfio/pci: fix memory leak during D3hot to D0 transition
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: KVM: x86: Reconsider the current approach of vPMU
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/11] perf/x86: Add support for TSC as a perf event clock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 03/11] perf/x86: Add support for TSC in nanoseconds as a perf event clock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 01/11] perf/x86: Fix native_perf_sched_clock_from_tsc() with __sched_clock_offset
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 06/23] KVM: MMU: load new PGD once nested two-dimensional paging is initialized
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 29/64] KVM: arm64: nv: Forward debug traps to the nested guest
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/4] s390x: topology: Check the Perform Topology Function
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH 01/11] perf/x86: Fix native_perf_sched_clock_from_tsc() with __sched_clock_offset
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 02/11] perf/x86: Add support for TSC as a perf event clock
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 04/11] perf tools: Add new perf clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 05/11] perf tools: Add API probes for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 03/11] perf/x86: Add support for TSC in nanoseconds as a perf event clock
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH kvm-unit-tests v2] arm64: Fix compiling with ancient compiler
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2] perf/amd: Implement erratum #1292 workaround for F19h M00-0Fh
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Stop exposing unknown AMX Tile Palettes and accelerator units
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v5 0/2] Enable legacy LBR support for guest
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 11/11] perf intel-pt: Add documentation for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 06/11] perf tools: Add new clock IDs to "perf time to TSC" test
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 09/11] perf intel-pt: Use CLOCK_PERF_HW_CLOCK_NS by default
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 08/11] perf intel-pt: Add support for new clock IDs
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 07/11] perf tools: Add perf_read_tsc_conv_for_clockid()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 10/11] perf intel-pt: Add config variables for timing parameters
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 00/11] perf intel-pt: Add perf event clocks to better support VM tracing
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- KVM: x86: Reconsider the current approach of vPMU
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 2/5] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 3/5] KVM: Provide more information in kernel log if hardware enabling fails
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 4/5] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 5/5] KVM: Do compatibility checks on hotplugged CPUs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 1/5] KVM: x86: Move check_processor_compatibility from init ops to runtime ops
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v3 0/5] Improve KVM's interaction with CPU hotplug
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH] KVM: x86: Fix emulation in writing cr8
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 23/26] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH] KVM: x86: Yield to IPI target vCPU only if it is busy
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: one question about your patch "vhost: log dirty page correctly"
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: nVMX: Add a quirk for KVM tweaks to VMX control MSRs
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: Do compatibility checks on hotplugged CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 12/15] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V7 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: fix memory leak during D3hot to D0 transition
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [no subject]
- Re: [PATCH v4 00/12] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 04/12] mm/shmem: Support memfile_notifier
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 02/12] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 24/30] vfio-pci/zdev: wire up group notifier
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 0/5] kvm: selftests: aarch64: some fixes for vgic_irq
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 0/6] KVM: arm64: Emulate the OS Lock
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Drop unused param from kvm_psci_version()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM64: Guest performance improvement during dirty
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: vgic: Read HW interrupt pending state from the HW
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- [PATCH v2 0/1] KVM: s390: pv: make use of ultravisor AIV support
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- [PATCH v5 1/1] x86/test: Add a test for AMD SEV-ES #VC handling
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v5 0/1] x86/test: Add a test for AMD SEV-ES #VC handling
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v6 28/64] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v9 30/43] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
- From: Borislav Petkov <bp@xxxxxxxxx>
- KVM call for agenda for 2022-02-22
- From: Juan Quintela <quintela@xxxxxxxxxx>
- KVM call minutes for 2022-02-08
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v9 33/43] x86/compressed: Add SEV-SNP feature detection/setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- warning in kvm_hv_invalidate_tsc_page due to writes to guest memory from VM ioctl context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/4] s390x: uv-guest: remove duplicated checks
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v9 30/43] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 27/64] KVM: arm64: nv: Allow a sysreg to be hidden from userspace only
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 02/11] KVM: s390: Honor storage keys when accessing guest memory
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] KVM: SVM: implement force_intercept_exceptions_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: x86: add force_intercept_exceptions_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC v4 4/8] hisi_acc_vfio_pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 02/11] KVM: s390: Honor storage keys when accessing guest memory
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v9 33/43] x86/compressed: Add SEV-SNP feature detection/setup
- From: Michael Roth <michael.roth@xxxxxxx>
- [RFC v4 6/8] crypto: hisilicon/qm: Add helper to retrieve the PF qm data
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 7/8] hisi_acc_vfio_pci: Add support for VFIO live migration
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 8/8] hisi_acc_vfio_pci: Use its own PCI reset_done error handler
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 5/8] hisi_acc_vfio_pci: Restrict access to VF dev BAR2 migration region
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 4/8] hisi_acc_vfio_pci: add new vfio_pci driver for HiSilicon ACC devices
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 2/8] crypto: hisilicon/qm: Move few definitions to common header
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 0/8] vfio/hisilicon: add ACC live migration driver
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 3/8] hisi_acc_qm: Move PCI device IDs to common header
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC v4 1/8] crypto: hisilicon/qm: Move the QM header to include/linux
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 4/4] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/4] s390x: stsi: Define vm_is_kvm to be used in different tests
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 3/4] s390x: topology: Check the Perform Topology Function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/4] S390x: CPU Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/4] s390x: lib: Add SCLP toplogy nested level
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] s390/uaccess: Add copy_from/to_user_key functions
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH 3/7] svm: NMI is an "exception" and not interrupt in x86 land
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 2/7] svm: Fix reg_corruption test, to avoid timer interrupt firing in later tests.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 5/7] svm: add SVM_BARE_VMRUN
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2] KVM: X86: Introduce vfio_intr_stat per-vm debugfs file
- From: Yuan ZhaoXiong <yuanzhaoxiong@xxxxxxxxx>
- [PATCH] KVM: arm64: vgic: Read HW interrupt pending state from the HW
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RESEND 00/30] My patch queue
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 6/7] svm: add tests for LBR virtualization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 0/7] My set of KVM unit tests + fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 04/11] KVM: s390: selftests: Test TEST PROTECTION emulation
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH 1/7] pmu_lbr: few fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 4/7] svm: intercept shutdown in all svm tests by default
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH RESEND 07/30] KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control them
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 7/7] svm: add tests for case when L1 intercepts various hardware interrupts (an interrupt, SMI, NMI), but lets L2 control either EFLAG.IF or GIF
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 01/11] s390/uaccess: Add copy_from/to_user_key functions
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH RFC 15/39] KVM: x86/xen: handle PV spinlocks slowpath
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RESEND 00/30] My patch queue
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND 07/30] KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control them
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v5 02/14] driver core: Add dma_cleanup callback in bus_type
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND 07/30] KVM: x86: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control them
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Oliver Upton <oupton@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]