Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH 2/3] KVM: x86/pmu: Don't pre-set the pmu->global_ctrl when refreshing
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v4 09/15] KVM: SVM: Refresh AVIC configuration when changing APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86/pmu: Ignore pmu->global_ctrl check if vPMU doesn't support global_ctrl
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 3/3] KVM: x86/pmu: Drop redundant-clumsy-asymmetric PERFCTR_CORE MSRs handling
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v4 08/15] KVM: x86: Deactivate APICv on vCPU with APIC disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 08/15] KVM: x86: Deactivate APICv on vCPU with APIC disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 03/15] KVM: SVM: Detect X2APIC virtualization (x2AVIC) support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v1] vdpa: Do not count the pages that were already pinned in the vhost-vDPA
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 00/19] Control VQ support in vDPA
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v1] vdpa: Do not count the pages that were already pinned in the vhost-vDPA
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [PATCH v4 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Update KVM RISC-V entry to cover selftests support
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: riscv: Remove unneeded semicolon
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: riscv: Remove unneeded semicolon
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v2 7/7] RISC-V: KVM: Cleanup stale TLB entries when host CPU changes
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] RISC-V: KVM: Add remote HFENCE functions based on VCPU requests
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/7] RISC-V: KVM: Reduce KVM_MAX_VCPUS value
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] RISC-V: KVM: Add Sv57x4 mode support for G-stage
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/7] RISC-V: KVM: Introduce range based local HFENCE functions
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] RISC-V: KVM: Treat SBI HFENCE calls as NOPs
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] RISC-V: KVM: Use G-stage name for hypervisor page table
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [v2 PATCH] RISC-V: KVM: Introduce ISA extension register
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: riscv: Remove unneeded semicolon
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/8] Move npt test cases and NPT code improvements
- From: "Shukla, Manali" <mashukla@xxxxxxx>
- Re: [PATCH v2 00/19] Control VQ support in vDPA
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 5.4] KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH] KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH V1 mlx5-next 3/4] vfio/mlx5: Refactor to enable VFs migration in parallel
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 mlx5-next 4/4] vfio/mlx5: Run the SAVE state command in an async mode
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 mlx5-next 2/4] vfio/mlx5: Manage the VF attach/detach callback from the PF
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 mlx5-next 1/4] net/mlx5: Expose mlx5_sriov_blocking_notifier_register / unregister APIs
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 mlx5-next 0/4] Improve mlx5 live migration driver
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH mlx5-next 3/5] vfio/mlx5: Manage the VF attach/detach callback from the PF
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH mlx5-next 1/5] vfio/mlx5: Reorganize the VF is migratable code
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 4/4] RISC-V: KVM: Support sstc extension
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- [PATCH v2] KVM: VMX: Print VM-instruction error when it may be helpful
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v4 10/15] KVM: SVM: Introduce helper functions to (de)activate AVIC and x2AVIC
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 11/15] KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 15/15] KVM: SVM: Add AVIC doorbell tracepoint
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 14/15] KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 09/15] KVM: SVM: Refresh AVIC configuration when changing APIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 07/15] KVM: SVM: Adding support for configuring x2APIC MSRs interception
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 05/15] KVM: SVM: Update avic_kick_target_vcpus to support 32-bit APIC ID
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 13/15] KVM: x86: Warning APICv inconsistency only when vcpu APIC mode is valid
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 12/15] KVM: SVM: Introduce hybrid-AVIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 04/15] KVM: SVM: Update max number of vCPUs supported for x2AVIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 02/15] KVM: x86: lapic: Rename [GET/SET]_APIC_DEST_FIELD to [GET/SET]_XAPIC_DEST_FIELD
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 06/15] KVM: SVM: Do not support updating APIC ID when in x2APIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 08/15] KVM: x86: Deactivate APICv on vCPU with APIC disabled
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 03/15] KVM: SVM: Detect X2APIC virtualization (x2AVIC) support
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 00/15] Introducing AMD x2AVIC and hybrid-AVIC modes
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v4 01/15] x86/cpufeatures: Introduce x2AVIC CPUID bit
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v2 15/19] vhost-vdpa: support ASID based IOTLB API
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v4 03/20] KVM: x86/mmu: Derive shadow MMU page role from parent
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v4 20/20] KVM: x86/mmu: Extend Eager Page Splitting to nested MMUs
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v4 02/20] KVM: x86/mmu: Use a bool for direct
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v4 01/20] KVM: x86/mmu: Optimize MMU page cache lookup for all direct SPs
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: Causing VMEXITs when kprobes are hit in the guest VM
- From: Arnabjyoti Kalita <akalita@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v11 08/16] KVM: x86/pmu: Refactor code to support guest Arch LBR
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 0/8] Remove vfio_group from the struct file facing VFIO API
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 003/128] KVM: selftests: Unconditionally compile KVM selftests with -Werror
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v6 017/104] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v6 011/104] KVM: TDX: Initialize TDX module when loading kvm_intel.ko
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 2/2] vfio/pci: Remove vfio_device_get_from_dev()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 20/23] lib: Avoid external dependency in libelf
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 21/23] x86: Move x86_64-specific EFI CFLAGS to x86_64 Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 23/23] arm64: Add an efi/run script
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 18/23] arm64: Change gnu-efi imported file to use defined types
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 19/23] arm64: Use code from the gnu-efi when booting with EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 22/23] arm64: Add support for efi in Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 17/23] arm64: Copy code from GNU-EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 15/23] arm64: Add a new type of memory type flag MR_F_RESERVED
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 16/23] arm/arm64: Add a setup sequence for systems that boot through EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 14/23] lib: Avoid ms_abi for calls related to EFI on arm64
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 06/23] arm/arm64: Add support for discovering the UART through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 12/23] arm/arm64: mmu_disable: Clean and invalidate before disabling
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 02/23] lib: Ensure all struct definition for ACPI tables are packed
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 00/23] EFI and ACPI support for arm64
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 09/23] lib/printf: Support for precision modifier in printing strings
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 08/23] arm/arm64: Add support for cpu initialization through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 05/23] arm/arm64: Add support for setting up the PSCI conduit through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 13/23] arm/arm64: Rename etext to _etext
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 11/23] lib/efi: Add support for getting the cmdline
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 04/23] lib: Extend the definition of the ACPI table FADT
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 07/23] arm/arm64: Add support for timer initialization through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 10/23] lib/printf: Add support for printing wide strings
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v2 01/23] lib: Move acpi header and implementation to lib
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [RFC PATCH kvmtool 0/3] Add Sstc extension support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v4 15/20] KVM: x86/mmu: Cache the access bits of shadowed translations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH kvmtool 0/5] ARM: Implement PSCI SYSTEM_SUSPEND
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 5.18-rc6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 5.18-rc6
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/3] s390x: Test TEID values in storage key test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] s390x: Fix sclp facility bit numbers
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] s390x: Test effect of storage keys on some more instructions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v6 17/21] vfio-pci/zdev: add function handle to clp base capability
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v6 14/21] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v6 16/21] vfio-pci/zdev: add open/close device hooks
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: X86: correct trace_kvm_pv_tlb_flush stats
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v3] x86/speculation, KVM: only IBPB for switch_mm_always_ibpb on vCPU load
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v4 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 1/2] Pull in MEMOP changes in linux-headers
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v6 14/21] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v11 16/16] KVM: x86/cpuid: Advertise Arch LBR feature in CPUID
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 15/16] KVM: x86: Add Arch LBR data MSR access interface
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 14/16] KVM: x86/vmx: Flip Arch LBREn bit on guest state change
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 13/16] KVM: x86/vmx: Clear Arch LBREn bit before inject #DB to guest
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 08/16] KVM: x86/pmu: Refactor code to support guest Arch LBR
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH kvmtool 0/3] Add Sstc extension support
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v11 07/16] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 06/16] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 21/23] x86: Move x86_64-specific EFI CFLAGS to x86_64 Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 23/23] arm64: Add an efi/run script
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 22/23] arm64: Add support for efi in Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 20/23] lib: Avoid external dependency in libelf
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 19/23] arm64: Use code from the gnu-efi when booting with EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 04/23] lib: Extend the definition of the ACPI table FADT
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 07/23] arm/arm64: Add support for timer initialization through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 16/23] arm/arm64: Add a setup sequence for systems that boot through EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 18/23] arm64: Change GNU-EFI imported file to use defined types
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 17/23] arm64: Copy code from GNU-EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 01/23] lib: Move acpi header and implementation to lib
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 05/23] arm/arm64: Add support for setting up the PSCI conduit through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 02/23] lib: Ensure all struct definition for ACPI tables are packed
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 13/23] arm/arm64: Rename etext to _etext
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 15/23] arm64: Add a new type of memory type flag MR_F_RESERVED
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 12/23] arm/arm64: mmu_disable: Clean and invalidate before disabling
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 06/23] arm/arm64: Add support for discovering the UART through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH 08/23] arm/arm64: Add support for cpu initialization through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [RFC PATCH v6 011/104] KVM: TDX: Initialize TDX module when loading kvm_intel.ko
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v6 025/104] KVM: TDX: initialize VM with TDX specific parameters
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 kvmtool 0/5] Fix few small issues in virtio code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH kvmtool 0/5] ARM: Implement PSCI SYSTEM_SUSPEND
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH kvmtool 0/3] Add Sstc extension support
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v10 01/19] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v10 02/19] KVM: s390: pv: handle secure storage violations for protected guests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- RE: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] KVM: LAPIC: Narrow down the timer fastpath to tscdeadline timer
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH] KVM: selftests: riscv: Remove unneeded semicolon
- From: Jiapeng Chong <jiapeng.chong@xxxxxxxxxxxxxxxxx>
- [PATCH v9 2/3] s390x: KVM: guest support for topology function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v9 3/3] s390x: KVM: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v9 1/3] s390x: KVM: ipte lock for SCA access should be contained in KVM
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v9 0/3] s390x: KVM: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] s390x/pci: reflect proper maxstbl for groups of interpreted devices
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH v6 017/104] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] x86: The return type of the function could be void
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 7/7] RISC-V: KVM: Cleanup stale TLB entries when host CPU changes
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] RISC-V: KVM: Add remote HFENCE functions based on VCPU requests
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] KVM: PKS Virtualization support
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- [PATCH RESEND] KVM: powerpc: remove extraneous asterisk from rm_host_ipi_action comment
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v2 4/7] RISC-V: KVM: Introduce range based local HFENCE functions
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v6 025/104] KVM: TDX: initialize VM with TDX specific parameters
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- Re: Causing VMEXITs when kprobes are hit in the guest VM
- From: Arnabjyoti Kalita <akalita@xxxxxxxxxxxxxxxxx>
- [PATCH] x86: The return type of the function could be void
- From: Li kunyu <kunyu@xxxxxxxxxxxx>
- RE: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH v11 06/16] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 02/16] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 12/16] KVM: nVMX: Add necessary Arch LBR settings for nested VM
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 10/16] KVM: x86: Add XSAVE Support for Architectural LBR
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 14/16] KVM: x86/vmx: Flip Arch LBREn bit on guest state change
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 04/16] KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 05/16] KVM: x86: Add Arch LBR MSRs to msrs_to_save_all list
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 15/16] KVM: x86: Add Arch LBR data MSR access interface
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 11/16] KVM: x86/vmx: Check Arch LBR config when return perf capabilities
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 13/16] KVM: x86/vmx: Clear Arch LBREn bit before inject #DB to guest
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 16/16] KVM: x86/cpuid: Advertise Arch LBR feature in CPUID
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 07/16] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 03/16] KVM: x86: Report XSS as an MSR to be saved if there are supported features
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 09/16] KVM: x86: Refine the matching and clearing logic for supported_xss
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 08/16] KVM: x86/pmu: Refactor code to support guest Arch LBR
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 01/16] perf/x86/intel: Fix the comment about guest LBR support on KVM
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v11 00/16] Introduce Architectural LBR for vPMU
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- RE: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v6 0/3] Introduce Notify VM exit
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 4/6] vfio: Fully lock struct vfio_group::container
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 5/6] vfio: Simplify the life cycle of the group FD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 0/6] Fully lock the container members of struct vfio_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/6] vfio: Change struct vfio_group::opened from an atomic to bool
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 6/6] vfio: Change struct vfio_group::container_users to a non-atomic int
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 3/6] vfio: Split up vfio_group_get_device_fd()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 1/6] vfio: Add missing locking for struct vfio_group::kvm
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH v4 2/7] vfio/ccw: Remove mdev from struct channel_program
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 1/7] vfio: Make vfio_(un)register_notifier accept a vfio_device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 6/7] vfio: Remove dead code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 0/7] Make the rest of the VFIO driver interface use vfio_device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 4/7] vfio/mdev: Pass in a struct vfio_device * to vfio_dma_rw()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 7/7] vfio: Remove calls to vfio_group_add_container_user()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 5/7] drm/i915/gvt: Change from vfio_group_(un)pin_pages to vfio_(un)pin_pages
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 3/7] vfio/mdev: Pass in a struct vfio_device * to vfio_pin/unpin_pages()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 13/20] KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 11/20] KVM: x86/mmu: Allow for NULL vcpu pointer in __kvm_mmu_get_shadow_page()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 2/2] vfio/pci: Remove vfio_device_get_from_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 0/2] Remove vfio_device_get_from_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 08/20] KVM: x86/mmu: Pass memory caches to allocate SPs separately
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 07/20] KVM: x86/mmu: Move guest PT write-protection to account_shadowed()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 06/20] KVM: x86/mmu: Rename shadow MMU functions that deal with shadow pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 05/20] KVM: x86/mmu: Consolidate shadow page allocation and initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 04/20] KVM: x86/mmu: Decompose kvm_mmu_get_page() into separate functions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 03/20] KVM: x86/mmu: Derive shadow MMU page role from parent
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Make the rest of the VFIO driver interface use vfio_device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 10/11] KVM: selftests: Test disabling NX hugepages on a VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 06/11] KVM: selftests: Add NX huge pages test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/7] Make the rest of the VFIO driver interface use vfio_device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 05/11] KVM: selftests: Read binary stat data in lib
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v6 104/104] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 069/104] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 088/104] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 103/104] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 095/104] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 020/104] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 054/104] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 021/104] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 019/104] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 063/104] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 087/104] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 052/104] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 068/104] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 100/104] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 024/104] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 067/104] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 089/104] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 092/104] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 006/104] KVM: TDX: Detect CPU feature on kernel module initialization
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 066/104] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 056/104] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 044/104] KVM: x86/mmu: Focibly use TDP MMU for TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 065/104] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 025/104] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 064/104] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 055/104] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 005/104] x86/virt/vmx/tdx: export platform_has_tdx
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 086/104] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 091/104] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 102/104] Documentation/virtual/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 051/104] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 057/104] KVM: x86/mmu: steal software usable git to record if GFN is for shared or not
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 073/104] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 046/104] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 060/104] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 074/104] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 079/104] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 039/104] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 072/104] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 043/104] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 038/104] KVM: x86/mmu: Track shadow MMIO value/mask on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 075/104] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 076/104] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 036/104] KVM: x86/mmu: Explicitly check for MMIO spte in fast page fault
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 059/104] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 041/104] KVM: x86/mmu: Zap only leaf SPTEs for deleted/moved memslot for private mmu
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 034/104] KVM: x86/mmu: Add address conversion functions for TDX shared bits
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 080/104] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 058/104] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 050/104] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 040/104] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 035/104] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 061/104] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 042/104] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 081/104] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 101/104] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 096/104] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 097/104] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 045/104] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 047/104] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 084/104] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 099/104] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 093/104] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 048/104] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 049/104] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 094/104] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 098/104] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 082/104] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 062/104] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 083/104] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 078/104] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 085/104] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 090/104] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 077/104] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 007/104] KVM: Enable hardware before doing arch VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 071/104] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 070/104] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 008/104] KVM: x86: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 014/104] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 030/104] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 004/104] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 010/104] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 028/104] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 017/104] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 029/104] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 011/104] KVM: TDX: Initialize TDX module when loading kvm_intel.ko
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 027/104] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 053/104] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 016/104] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 012/104] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 013/104] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 031/104] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 015/104] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 003/104] KVM: Refactor CPU compatibility check on module initialiization
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 026/104] KVM: TDX: Make KVM_CAP_SET_IDENTITY_MAP_ADDR unsupported for TDX
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 018/104] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 023/104] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 022/104] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 032/104] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 033/104] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 001/104] KVM: x86: Move check_processor_compatibility from init ops to runtime ops
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 000/104] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 009/104] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v6 002/104] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v3 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v7 05/11] KVM: selftests: Read binary stat data in lib
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 03/11] KVM: selftests: Read binary stats desc in lib
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 02/19] KVM: s390: pv: handle secure storage violations for protected guests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v7 03/11] KVM: selftests: Read binary stats desc in lib
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC] KVM: x86/mmu: Remove KVM memory shrinker
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: unify VMX instruction error reporting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86: Function missing integer return value
- From: Li kunyu <kunyu@xxxxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v10 01/19] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 000/128] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 003/128] KVM: selftests: Unconditionally compile KVM selftests with -Werror
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH] x86: Function missing integer return value
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] x86: Function missing integer return value
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] selftests: KVM: aarch64: Let hypercalls use UAPI *_BIT_COUNT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 0/3] s390x: Test effect of storage keys on some instructions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v6 13/21] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] s390x: Test TEID values in storage key test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] s390x: More storage key instruction
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] s390x: Test effect of storage keys on some more instructions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] s390x: Fix sclp facility bit numbers
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v6 12/21] KVM: s390: pci: enable host forwarding of Adapter Event Notifications
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v3 8/8] vfio/pci: Add the support for PCI D3cold state
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: aarch64: Let hypercalls use UAPI *_BIT_COUNT
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] s390x: migration: don't run tests when facilities are not there
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] s390x: migration: don't run tests when facilities are not there
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH] x86: Function missing integer return value
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH] x86: Function missing integer return value
- From: Li kunyu <kunyu@xxxxxxxxxxxx>
- RE: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [kvm-unit-tests PATCH v1] s390x: migration: don't run tests when facilities are not there
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/21] KVM: s390: pci: do initial setup for AEN interpretation
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH v2] vringh: Fix loop descriptors check in the indirect cases
- From: Xie Yongji <xieyongji@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH RFC 04/10] intel_iommu: Second Stage Access Dirty bit support
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH RFC 04/10] intel_iommu: Second Stage Access Dirty bit support
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH RFC 15/19] iommu/arm-smmu-v3: Add set_dirty_tracking_range() support
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 6/8] vfio: Invoke runtime PM API for IOCTL request
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH] vringh: Fix maximum number check for indirect descriptors
- From: Yongji Xie <xieyongji@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] vfio/pci: Enable runtime PM for vfio_pci_core based drivers
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH] vringh: Fix maximum number check for indirect descriptors
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: correct trace_kvm_pv_tlb_flush stats
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] vringh: Fix maximum number check for indirect descriptors
- From: Yongji Xie <xieyongji@xxxxxxxxxxxxx>
- Re: [PATCH] vringh: Fix maximum number check for indirect descriptors
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH] vfio: Delete container_q
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC 04/10] intel_iommu: Second Stage Access Dirty bit support
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH] vringh: Fix maximum number check for indirect descriptors
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 08/14] KVM: SVM: Update AVIC settings when changing APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- RE: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 03/14] KVM: SVM: Detect X2APIC virtualization (x2AVIC) support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set
- From: Petr Mladek <pmladek@xxxxxxxx>
- RE: [PATCH RFC 15/19] iommu/arm-smmu-v3: Add set_dirty_tracking_range() support
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH mlx5-next 0/5] Improve mlx5 live migration driver
- From: Leon Romanovsky <leonro@xxxxxxxxxx>
- linux-next: manual merge of the kvm-arm tree with the kvm tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/14] KVM: SVM: Detect X2APIC virtualization (x2AVIC) support
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v3 11/14] KVM: SVM: Introduce hybrid-AVIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v3 08/14] KVM: SVM: Update AVIC settings when changing APIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- PING: [PATCH] KVM: HWPoison: Fix memory address&size during remap
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH] entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH] KVM: X86: correct trace_kvm_pv_tlb_flush stats
- From: Jon Kohler <jon@xxxxxxxxxxx>
- [kvm-unit-tests PATCH] arm64: Check for dynamic relocs with readelf
- From: Bill Wendling <morbo@xxxxxxxxxx>
- [PATCH] KVM: VMX: unify VMX instruction error reporting
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 099/128] KVM: selftests: Convert steal_time away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 128/128] KVM: selftests: Drop DEFAULT_GUEST_PHY_PAGES, open code the magic number
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 127/128] KVM: selftests: Trust that MAXPHYADDR > memslot0 in vmx_apic_access_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 126/128] KVM: selftests: Move per-VM/per-vCPU nr pages calculation to __vm_create()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 125/128] KVM: selftests: Drop @num_percpu_pages from __vm_create_with_vcpus()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 124/128] KVM: selftests: Drop @slot0_mem_pages from __vm_create_with_vcpus()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 123/128] KVM: selftests: Open code and drop 'struct kvm_vm' accessors
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 122/128] KVM: selftests: Remove vcpu_state() helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 093/128] KVM: selftests: Return created vcpu from vm_vcpu_add_default()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 098/128] KVM: selftests: Add VM creation helper that "returns" vCPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 103/128] KVM: selftests: Convert xapic_ipi_test away from *_VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 105/128] KVM: selftests: Convert s390's "resets" test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 107/128] KVM: selftests: Convert s390x/diag318_test_handler away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 109/128] KVM: selftests: Use vm_create() in tsc_scaling_sync
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 108/128] KVM: selftests: Convert tprot away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 094/128] KVM: selftests: Rename vm_vcpu_add* helpers to better show relationships
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 090/128] KVM: selftests: Make arm64's guest_get_vcpuid() declaration arm64-only
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 091/128] KVM: selftests: Move vm_is_unrestricted_guest() to x86-64
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 083/128] KVM: selftests: Convert set_memory_region_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 111/128] KVM: selftests: Drop vm_create_default* helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 104/128] KVM: selftests: Convert sync_regs_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 121/128] KVM: selftests: Drop vcpu_get(), rename vcpu_find() => vcpu_exists()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 079/128] KVM: selftests: Convert vmx_invalid_nested_guest_state away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 086/128] KVM: selftests: Convert xapic_state_test away from hardcoded vCPU ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 077/128] KVM: selftests: Convert cpuid_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 097/128] KVM: selftests: Convert hardware_disable_test to pass around vCPU objects
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 092/128] KVM: selftests: Add "arch" to common utils that have arch implementations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 119/128] KVM: selftests: Require vCPU output array when creating VM with vCPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 115/128] KVM: selftests: Convert get-reg-list away from its "VCPU_ID"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 088/128] KVM: selftests: Convert fix_hypercall_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 085/128] KVM: selftests: Track kvm_vcpu object in tsc_scaling_sync
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 113/128] KVM: selftests: Convert kvm_page_table_test away from reliance on vcpu_id
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 087/128] KVM: selftests: Convert debug-exceptions away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 116/128] KVM: selftests: Stop hardcoding vCPU IDs in vcpu_width_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 114/128] KVM: selftests: Convert kvm_binary_stats_test away from vCPU IDs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 095/128] KVM: selftests: Convert set_boot_cpu_id away from global VCPU_IDs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 112/128] KVM: selftests: Drop @vcpuids param from VM creators
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 110/128] KVM: selftests: Use vm_create_with_vcpus() in max_guest_memory_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 117/128] KVM: selftests: Stop conflating vCPU index and ID in perf tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 102/128] KVM: selftests: Convert vgic_init away from vm_create_default_with_vcpus()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 118/128] KVM: selftests: Remove vcpu_get() usage from dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 101/128] KVM: selftests: Fix typo in vgic_init test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 100/128] KVM: selftests: Convert arch_timer away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 081/128] KVM: selftests: Convert xen_shinfo_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 078/128] KVM: selftests: Convert userspace_io_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 089/128] KVM: selftests: Convert vgic_irq away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 084/128] KVM: selftests: Convert system_counter_offset_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 082/128] KVM: selftests: Convert dirty_log_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 106/128] KVM: selftests: Convert memop away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 080/128] KVM: selftests: Convert xen_vmcall_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 096/128] KVM: selftests: Convert psci_cpu_on_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 076/128] KVM: selftests: Convert cr4_cpuid_sync_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 074/128] KVM: selftests: Add proper helper for advancing RIP in debug_regs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 075/128] KVM: selftests: Convert amx_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 072/128] KVM: selftests: Convert emulator_error_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 073/128] KVM: selftests: Convert debug_regs away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 071/128] KVM: selftests: Convert evmcs_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 070/128] KVM: selftests: Convert hyperv_clock away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 068/128] KVM: selftests: Convert hyperv_svm_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 027/128] KVM: selftests: Split get/set device_attr helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 065/128] KVM: selftests: Convert vmx_exception_with_invalid_guest_state away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 031/128] KVM: selftests: Use vm_create_without_vcpus() in set_boot_cpu_id
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 066/128] KVM: selftests: Convert tsc_msrs_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 061/128] KVM: selftests: Convert vmx_dirty_log_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 064/128] KVM: selftests: Convert userspace_msr_exit_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 069/128] KVM: selftests: Convert hyperv_features away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 023/128] KVM: selftests: Move KVM_CREATE_DEVICE_TEST code to separate helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 067/128] KVM: selftests: Convert kvm_clock_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 014/128] KVM: selftests: Make vm_ioctl() a wrapper to pretty print ioctl name
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 063/128] KVM: selftests: Convert vmx_apic_access_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 062/128] KVM: selftests: Convert vmx_close_while_nested_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 015/128] KVM: sefltests: Use vm_ioctl() and __vm_ioctl() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 013/128] KVM: selftests: Add vcpu_get() to retrieve and assert on vCPU existence
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 012/128] KVM: selftests: Remove vcpu_get_fd()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 055/128] KVM: selftests: Convert sync_regs_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 050/128] KVM: selftests: Convert pmu_event_filter_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 016/128] KVM: selftests: Make kvm_ioctl() a wrapper to pretty print ioctl name
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 007/128] KVM: selftests: Drop @mode from common vm_create() helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 011/128] KVM: selftests: Use vcpu_access_device_attr() in arm64 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 051/128] KVM: selftests: Convert smm_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 060/128] KVM: selftests: Convert set_sregs_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 053/128] KVM: selftests: Convert svm_int_ctl_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 052/128] KVM: selftests: Convert state_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 054/128] KVM: selftests: Convert svm_vmcall_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 059/128] KVM: selftests: Convert vmx_nested_tsc_scaling_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 056/128] KVM: selftests: Convert hyperv_cpuid away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 057/128] KVM: selftests: Convert kvm_pv_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 058/128] KVM: selftests: Convert platform_info_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 048/128] KVM: selftests: Convert vmx_tsc_adjust_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 047/128] KVM: selftests: Convert vmx_set_nested_state_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 049/128] KVM: selftests: Convert mmu_role_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 009/128] KVM: sefltests: Use vcpu_ioctl() and __vcpu_ioctl() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH 046/128] KVM: selftests: Convert vmx_pmu_msrs_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 045/128] KVM: selftests: Convert vmx_preemption_timer_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 043/128] KVM: selftests: Convert rseq_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 044/128] KVM: selftests: Convert xss_msr_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 042/128] KVM: selftests: Convert memslot_perf_test away from VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 039/128] KVM: selftests: Rename vcpu.state => vcpu.run
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 041/128] KVM: selftests: Return the created vCPU from vm_vcpu_add()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 040/128] KVM: selftests: Rename 'struct vcpu' to 'struct kvm_vcpu'
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 038/128] KVM: selftests: Rename xAPIC state test's vcpu struct
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 037/128] KVM: selftests: Make vm_create() a wrapper that specifies VM_MODE_DEFAULT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 036/128] KVM: selftests: Rename vm_create_without_vcpus() => vm_create()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 021/128] KVM: selftests: Use KVM_IOCTL_ERROR() for one-off arm64 ioctls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 033/128] KVM: selftests: Use vm_create_without_vcpus() in hardware_disable_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 028/128] KVM: selftests: Add a VM backpointer to 'struct vcpu'
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 022/128] KVM: selftests: Drop @test param from kvm_create_device()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 024/128] KVM: selftests: Multiplex return code and fd in __kvm_create_device()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 034/128] KVM: selftests: Use vm_create_without_vcpus() in psci_cpu_on_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 032/128] KVM: selftests: Use vm_create_without_vcpus() in dirty_log_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 026/128] KVM: selftests: Drop 'int' return from asserting *_has_device_attr()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 030/128] KVM: selftests: Push vm_adjust_num_guest_pages() into "w/o vCPUs" helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 020/128] KVM: selftests: Get rid of kvm_util_internal.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 035/128] KVM: selftests: Rename vm_create() => vm_create_barebones(), drop param
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 029/128] KVM: selftests: Add vm_create_*() variants to expose/return 'struct vcpu'
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 025/128] KVM: selftests: Rename KVM_HAS_DEVICE_ATTR helpers for consistency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 018/128] KVM: selftests: Use __KVM_SYSCALL_ERROR() to handle non-KVM syscall errors
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 019/128] KVM: selftests: Make x86-64's register dump helpers static
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 017/128] KVM: selftests: Use kvm_ioctl() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 010/128] KVM: selftests: Add __vcpu_run() helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 001/128] KVM: selftests: Fix buggy-but-benign check in test_v3_new_redist_regions()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 008/128] KVM: selftests: Split vcpu_set_nested_state() into two helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 003/128] KVM: selftests: Unconditionally compile KVM selftests with -Werror
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 006/128] KVM: selftests: Make vcpu_ioctl() a wrapper to pretty print ioctl name
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 000/128] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 004/128] KVM: selftests: Always open VM file descriptors with O_RDWR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 005/128] KVM: selftests: Add another underscore to inner ioctl() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 002/128] KVM: selftests: Drop stale declarations from kvm_util_base.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH mlx5-next 0/5] Improve mlx5 live migration driver
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: correct trace_kvm_pv_tlb_flush stats
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] vfio/pci: Remove vfio_device_get_from_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH mlx5-next 0/5] Improve mlx5 live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH mlx5-next 3/5] vfio/mlx5: Manage the VF attach/detach callback from the PF
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 2/2] vfio/pci: Remove vfio_device_get_from_dev()
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH mlx5-next 0/5] Improve mlx5 live migration driver
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH mlx5-next 1/5] vfio/mlx5: Reorganize the VF is migratable code
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC 04/10] intel_iommu: Second Stage Access Dirty bit support
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH] selftests: KVM: aarch64: Let hypercalls use UAPI *_BIT_COUNT
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v3 8/8] vfio/pci: Add the support for PCI D3cold state
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 6/8] vfio: Invoke runtime PM API for IOCTL request
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 5/8] vfio/pci: Enable runtime PM for vfio_pci_core based drivers
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 0/2] Remove vfio_device_get_from_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 3/8] vfio: Change vfio_external_user_iommu_id() to vfio_file_iommu_group()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 7/8] kvm/vfio: Remove vfio_group from kvm
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 2/8] kvm/vfio: Store the struct file in the kvm_vfio_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 8/8] vfio/pci: Use the struct file as the handle not the vfio_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 6/8] vfio: Change vfio_group_set_kvm() to vfio_file_set_kvm()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 5/8] vfio: Change vfio_external_check_extension() to vfio_file_enforced_coherent()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 4/8] vfio: Remove vfio_external_group_match_file()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 1/8] kvm/vfio: Move KVM_DEV_VFIO_GROUP_* ioctls into functions
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 0/8] Remove vfio_group from the struct file facing VFIO API
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Fix build error on claim of vmx_get_pid_table_order()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Do not create SPTEs for GFNs that exceed host.MAXPHYADDR
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 2/2] vfio/pci: Remove vfio_device_get_from_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 1/2] vfio/pci: Have all VFIO PCI drivers store the vfio_pci_core_device in drvdata
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 0/2] Remove vfio_device_get_from_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Remove vfio_device_get_from_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] selftests: KVM: aarch64: Let hypercalls use UAPI *_BIT_COUNT
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH] KVM: X86: correct trace_kvm_pv_tlb_flush stats
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH] entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH] entry/kvm: Exit to user mode when TIF_NOTIFY_SIGNAL is set
- From: Seth Forshee <sforshee@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] Make the rest of the VFIO driver interface use vfio_device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: Seth Forshee <sforshee@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: Implement dirty quota-based throttling of vcpus
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: arm64: vgic: Do not ignore vgic_its_restore_cte failures
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: arm64: vgic: Add more checks when restoring ITS tables
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: arm64: vgic: Check that new ITEs could be saved in guest memory
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- RE: [PATCH v2] vfio/pci: Remove vfio_device_get_from_dev()
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Do not create SPTEs for GFNs that exceed host.MAXPHYADDR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: Seth Forshee <sforshee@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v5 7/9] s390x/pci: enable adapter event notification for interpreted devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: Core2 and v5.18-rc5 troubles
- From: Zdenek Kaspar <zkaspar82@xxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Remove vfio_device_get_from_dev()
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH mlx5-next 2/5] net/mlx5: Expose mlx5_sriov_blocking_notifier_register / unregister APIs
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: Seth Forshee <sforshee@xxxxxxxxxxxxxxxx>
- Re: [PATCH mlx5-next 0/5] Improve mlx5 live migration driver
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 2/3] s390x: Test effect of storage keys on some instructions
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 1/3] s390x: Give name to return value of tprot()
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v7 2/3] s390x: Test effect of storage keys on some instructions
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/12] KVM: SVM: Fix soft int/ex re-injection
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 08/12] KVM: SVM: Update AVIC settings when changing APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 14/14] KVM: SVM: Add AVIC doorbell tracepoint
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 12/14] kvm/x86: Warning APICv inconsistency only when vcpu APIC mode is valid
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 13/14] KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 11/14] KVM: SVM: Introduce hybrid-AVIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 08/14] KVM: SVM: Update AVIC settings when changing APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 07/14] KVM: SVM: Adding support for configuring x2APIC MSRs interception
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 03/14] KVM: SVM: Detect X2APIC virtualization (x2AVIC) support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Do not create SPTEs for GFNs that exceed host.MAXPHYADDR
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 00/12] KVM: arm64: PSCI SYSTEM_SUSPEND support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 0/9] KVM: arm64: Add support for hypercall services selection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 08/12] KVM: SVM: Update AVIC settings when changing APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 08/12] KVM: SVM: Update AVIC settings when changing APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 4/8] vfio/pci: Add support for setting driver data inside core layer
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 5/6] s390x: uv-guest: add share bit test
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 4/6] s390x: uv-guest: Remove double report_prefix_pop
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 6/6] s390x: Add attestation tests
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH] vringh: Fix maximum number check for indirect descriptors
- From: Xie Yongji <xieyongji@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/2] s390x: KVM: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH kernel] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE platform dependent
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- [PATCH v3 06/14] KVM: SVM: Do not support updating APIC ID when in x2APIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 13/14] KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 12/14] kvm/x86: Warning APICv inconsistency only when vcpu APIC mode is valid
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 10/14] KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 09/14] KVM: SVM: Introduce helper functions to (de)activate AVIC and x2AVIC
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 08/14] KVM: SVM: Update AVIC settings when changing APIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 07/14] KVM: SVM: Adding support for configuring x2APIC MSRs interception
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 11/14] KVM: SVM: Introduce hybrid-AVIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 14/14] KVM: SVM: Add AVIC doorbell tracepoint
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 05/14] KVM: SVM: Update avic_kick_target_vcpus to support 32-bit APIC ID
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 00/14] Introducing AMD x2AVIC and hybrid-AVIC modes
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 04/14] KVM: SVM: Update max number of vCPUs supported for x2AVIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 02/14] KVM: x86: lapic: Rename [GET/SET]_APIC_DEST_FIELD to [GET/SET]_XAPIC_DEST_FIELD
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 03/14] KVM: SVM: Detect X2APIC virtualization (x2AVIC) support
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 01/14] x86/cpufeatures: Introduce x2AVIC CPUID bit
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v7 01/38] KVM: arm64: Introduce a validation function for an ID register
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [RFC PATCH 09/17] KVM: arm64: Tear down unlinked page tables in parallel walk
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH] KVM: VMX: Fix build error on claim of vmx_get_pid_table_order()
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [PATCH v7 0/9] KVM: arm64: Add support for hypercall services selection
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: vgic-v3: Consistently populate ID_AA64PFR0_EL1.GIC
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 12/12] selftests: KVM: Test SYSTEM_SUSPEND PSCI call
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 07/12] KVM: arm64: Implement PSCI SYSTEM_SUSPEND
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 08/12] selftests: KVM: Rename psci_cpu_on_test to psci_test
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 11/12] selftests: KVM: Refactor psci_test to make it amenable to new tests
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 10/12] selftests: KVM: Use KVM_SET_MP_STATE to power off vCPU in psci_test
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 09/12] selftests: KVM: Create helper for making SMCCC calls
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 04/12] KVM: arm64: Rename the KVM_REQ_SLEEP handler
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 06/12] KVM: arm64: Add support for userspace to suspend a vCPU
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 05/12] KVM: arm64: Return a value from check_vcpu_requests()
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 03/12] KVM: arm64: Track vCPU power state using MP state values
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 02/12] KVM: arm64: Dedupe vCPU power off helpers
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 01/12] KVM: arm64: Don't depend on fallthrough to hide SYSTEM_RESET2
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v6 00/12] KVM: arm64: PSCI SYSTEM_SUSPEND support
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 5/7] RISC-V: KVM: Reduce KVM_MAX_VCPUS value
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/7] RISC-V: KVM: Treat SBI HFENCE calls as NOPs
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] RISC-V: KVM: Add Sv57x4 mode support for G-stage
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] RISC-V: KVM: Use G-stage name for hypervisor page table
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] entry/kvm: Make vCPU tasks exit to userspace when a livepatch is pending
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] KVM: x86/svm: Account for family 17h event renumberings in amd_pmc_perf_hw_id
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 4/8] vfio/pci: Add support for setting driver data inside core layer
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: Core2 and v5.18-rc5 troubles
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC] KVM: x86/mmu: Remove KVM memory shrinker
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH] KVM: arm64: vgic-v3: Consistently populate ID_AA64PFR0_EL1.GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 0/9] KVM: arm64: Add support for hypercall services selection
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: Core2 and v5.18-rc5 troubles
- From: Zdenek Kaspar <zkaspar82@xxxxxxxxx>
- Re: Causing VMEXITs when kprobes are hit in the guest VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 0/9] KVM: arm64: Add support for hypercall services selection
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Do not create SPTEs for GFNs that exceed host.MAXPHYADDR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: arm64: vgic: Undo work in failed ITS restores
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v7 0/9] KVM: arm64: Add support for hypercall services selection
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v3 00/12] KVM: SVM: Fix soft int/ex re-injection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 10/11] KVM: selftests: Test disabling NX hugepages on a VM
- From: Ben Gardon <bgardon@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]