Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v6 14/64] KVM: arm64: nv: Handle SPSR_EL2 specially
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 13/64] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 12/64] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvmtool 3/5] virtio/net: Warn if virtio_net is implicitly enabled
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH kvmtool 1/5] virtio: Sanitize config accesses
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH kvmtool 4/5] Makefile: Mark stack as not executable
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH kvmtool 2/5] virtio: Check for overflows in QUEUE_NOTIFY and QUEUE_SEL
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH kvmtool 5/5] mmio: Sanitize addr and len
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH V6 mlx5-next 07/15] vfio: Have the core code decode the VFIO_DEVICE_FEATURE ioctl
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 07/15] vfio: Have the core code decode the VFIO_DEVICE_FEATURE ioctl
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH kvmtool 5/5] mmio: Sanitize addr and len
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH kvmtool 4/5] Makefile: Mark stack as not executable
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH kvmtool 3/5] virtio/net: Warn if virtio_net is implicitly enabled
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH kvmtool 2/5] virtio: Check for overflows in QUEUE_NOTIFY and QUEUE_SEL
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH kvmtool 1/5] virtio: Sanitize config accesses
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v3 3/3] KVM: SVM: Extend host physical APIC ID field to support more than 8-bit
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] GIC ITS tests
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v6 07/64] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] KVM: SVM: nSVM: Implement Enlightened MSR-Bitmap for Hyper-V-on-KVM and fix it for KVM-on-Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 01/64] arm64: Add ARM64_HAS_NESTED_VIRT cpufeature
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/26] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 04/26] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 03/26] KVM: arm64: Introduce struct id_reg_info
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/26] KVM: arm64: Make CPU ID registers writable by userspace
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH RESEND v2] KVM: LAPIC: Enable timer posted-interrupt when mwait/hlt is advertised
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: SVM: nSVM: Implement Enlightened MSR-Bitmap for Hyper-V-on-KVM and fix it for KVM-on-Hyper-V
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/8] KVM: x86: Hyper-V hypercall fix and cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/5] perf/core: Address filter fixes / changes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] GIC ITS tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v3 6/9] x86/smpboot: Support parallel startup of secondary CPUs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v9 02/43] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 3/3] KVM: SVM: Extend host physical APIC ID field to support more than 8-bit
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v3 6/9] x86/smpboot: Support parallel startup of secondary CPUs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 6/9] x86/smpboot: Support parallel startup of secondary CPUs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 3/3] KVM: x86/pmu: Setup the {inte|amd}_event_mapping[] when hardware_setup
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 2/3] perf: x86/core: Add interface to query perfmon_event_map[] directly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 1/3] KVM: x86/pmu: Replace pmu->available_event_types with a new BITMAP
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: Clean up {Host,MMU}-writable documentation and validation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 09/15] vfio: Extend the device migration protocol with RUNNING_P2P
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RESEND v2] KVM: VMX: Dont' send posted IRQ if vCPU == this vCPU and vCPU is IN_GUEST_MODE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND v2] KVM: LAPIC: Enable timer posted-interrupt when mwait/hlt is advertised
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 09/15] vfio: Extend the device migration protocol with RUNNING_P2P
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: fix memory leak during D3hot to D0 transition
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: SVM: Refactor AVIC hardware setup logic into helper function
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v3 6/9] x86/smpboot: Support parallel startup of secondary CPUs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 6/9] x86/smpboot: Support parallel startup of secondary CPUs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 6/6] RISC-V: KVM: Implement SBI HSM suspend call
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 5/6] RISC-V: KVM: Add common kvm_riscv_vcpu_wfi() function
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 4/6] RISC-V: Add SBI HSM suspend related defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 3/6] RISC-V: KVM: Implement SBI v0.3 SRST extension
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 1/6] RISC-V: KVM: Upgrade SBI spec version to v0.3
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 2/6] RISC-V: KVM: Add common kvm_riscv_vcpu_sbi_system_reset() function
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 0/6] KVM RISC-V SBI v0.3 support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH] MIPS: KVM: fix vz.c kernel-doc notation
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [BUG] vhost: two possible deadlocks involving locking and waiting
- From: Jia-Ju Bai <baijiaju1990@xxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: selftests: Add support for ppc64le
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86: Use __try_cmpxchg_user() to emulate atomic accesses
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: x86: Bail to userspace if emulation of atomic user access faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] x86/uaccess: Implement macros for CMPXCHG on user addresses
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] Kconfig: Add option for asm goto w/ tied outputs to workaround clang-13 bug
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] x86: uaccess CMPXCHG + KVM bug fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 07/15] vfio: Have the core code decode the VFIO_DEVICE_FEATURE ioctl
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V6 mlx5-next 07/15] vfio: Have the core code decode the VFIO_DEVICE_FEATURE ioctl
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: fix memory leak during D3hot to D0 transition
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 4/9] s390x/pci: enable for load/store intepretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/9] s390x/pci: enable adapter event notification for interpreted devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] RISC-V: KVM: Fix SBI implementation version
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH 09/22] KVM: x86: Uninline and export hv_track_root_tdp()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/5] vfio/pci: fix memory leak during D3hot to D0 tranistion
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 6/9] s390x/pci: enable adapter event notification for interpreted devices
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 4/9] s390x/pci: enable for load/store intepretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] kvm: Move KVM_GET_XSAVE2 IOCTL definition at the end of kvm.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 6/9] x86/smpboot: Support parallel startup of secondary CPUs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/5] lib: s390x: smp: guarantee that boot CPU has index 0
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/5] lib: s390x: smp: add functions to work with CPU indexes
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: s390: index kvm->arch.idle_mask by vcpu_idx
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 1/1] KVM: s390: index kvm->arch.idle_mask by vcpu_idx
- From: Petr Tesařík <ptesarik@xxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: s390: index kvm->arch.idle_mask by vcpu_idx
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/5] vfio/pci: fix memory leak during D3hot to D0 tranistion
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [PATCH v2] vfio/pci: fix memory leak during D3hot to D0 transition
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: s390: index kvm->arch.idle_mask by vcpu_idx
- From: Petr Tesařík <ptesarik@xxxxxxx>
- Re: [PATCH v2 4/9] s390x/pci: enable for load/store intepretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH 5/5] perf/core: Allow kernel address filter when not filtering the kernel
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 4/5] perf/x86/intel/pt: Fix address filter config for 32-bit kernel
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 3/5] perf/core: Fix address filter parser for multiple filters
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 2/5] x86: Share definition of __is_canonical_address()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 1/5] perf/x86/intel/pt: Relax address filter validation
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 0/5] perf/core: Address filter fixes / changes
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH] kvm: Move KVM_GET_XSAVE2 IOCTL definition at the end of kvm.h
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH -next] RISC-V: KVM: remove unneeded semicolon
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: Jim Turner <linuxkernel.foss@xxxxxxxxxxxxxxxxxxxxxx>
- Re: Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests 02/13] x86: AMD SEV-ES: Setup #VC exception handler for AMD SEV-ES
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [kvm-unit-tests 01/13] x86/efi: Allow specifying AMD SEV/SEV-ES guest launch policy
- From: Marc Orr <marcorr@xxxxxxxxxx>
- [PATCH V6 mlx5-next 15/15] vfio: Extend the device migration protocol with PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 14/15] vfio/mlx5: Use its own PCI reset_done error handler
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 13/15] vfio/pci: Expose vfio_pci_core_aer_err_detected()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 12/15] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 09/15] vfio: Extend the device migration protocol with RUNNING_P2P
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 11/15] vfio/mlx5: Expose migration commands over mlx5 device
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 10/15] vfio: Remove migration protocol v1
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 08/15] vfio: Define device migration protocol v2
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 05/15] net/mlx5: Expose APIs to get/put the mlx5 core device
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 07/15] vfio: Have the core code decode the VFIO_DEVICE_FEATURE ioctl
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 06/15] net/mlx5: Introduce migration bits and structures
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 04/15] PCI/IOV: Add pci_iov_get_pf_drvdata() to allow VF reaching the drvdata of a PF
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 03/15] net/mlx5: Disable SRIOV before PF removal
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 02/15] net/mlx5: Reuse exported virtfn index function call
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 01/15] PCI/IOV: Add pci_iov_vf_id() to get VF index
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V6 mlx5-next 00/15] Add mlx5 live migration driver and v2 migration protocol
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] MIPS: KVM: fix vz.c kernel-doc notation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] x86/smpboot: Support parallel startup of secondary CPUs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/9] Parallel CPU bringup for x86_64
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [PATCH] kvm: Move KVM_GET_XSAVE2 IOCTL definition at the end of kvm.h
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/9] Parallel CPU bringup for x86_64
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix rmap allocation for very large memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Parallel CPU bringup for x86_64
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Fix rmap allocation for very large memslots
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 5/5] s390x: skrf: avoid hardcoded CPU addresses
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 4/5] s390x: firq: avoid hardcoded CPU addresses
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 3/5] s390x: smp: avoid hardcoded CPU addresses
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/5] lib: s390x: smp: guarantee that boot CPU has index 0
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/5] s390x: smp: avoid hardcoded CPU addresses
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/5] lib: s390x: smp: add functions to work with CPU indexes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 5.17-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v9 43/43] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 41/43] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 42/43] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 39/43] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 40/43] x86/sev: Register SEV-SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 38/43] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 37/43] x86/sev: Add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 35/43] x86/compressed: Export and rename add_identity_map()
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 36/43] x86/compressed/64: Add identity mapping for Confidential Computing blob
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 34/43] x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 19/43] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 25/43] x86/compressed/acpi: Move EFI system table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 26/43] x86/compressed/acpi: Move EFI config table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 27/43] x86/compressed/acpi: Move EFI vendor table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 30/43] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 32/43] x86/boot: Add a pointer to Confidential Computing blob in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 33/43] x86/compressed: Add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 31/43] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 29/43] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 28/43] x86/compressed/acpi: Move EFI kexec handling into common code
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 24/43] x86/compressed/acpi: Move EFI detection to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 22/43] x86/sev: Move MSR-based VMGEXITs for CPUID to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 23/43] KVM: x86: Move lookup of indexed CPUID leafs to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 21/43] x86/head/64: Re-enable stack protection
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 20/43] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 17/43] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 16/43] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 18/43] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 15/43] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 14/43] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 13/43] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 10/43] x86/sev: Check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 11/43] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 12/43] x86/sev: Check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 06/43] x86/sev: Detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 07/43] x86/mm: Extend cc_attr to include AMD SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 08/43] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 09/43] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 05/43] x86/compressed/64: Detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 03/43] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 04/43] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 02/43] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 01/43] KVM: SVM: Define sev_features and vmpl field in the VMSA
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v9 00/43] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v4 00/12] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Steven Price <steven.price@xxxxxxx>
- Call for GSoC and Outreachy project ideas for summer 2022
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] kvm: Move KVM_GET_XSAVE2 IOCTL definition at the end of kvm.h
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Define wrtsc(tsc) as wrmsr(MSR_IA32_TSC, tsc)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 5.17-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 52/64] KVM: arm64: nv: Allow userspace to request KVM_ARM_VCPU_NESTED_VIRT
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 43/64] KVM: arm64: nv: arch_timer: Support hyp timer emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 46/64] KVM: arm64: nv: Nested GICv3 Support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 59/64] KVM: arm64: Add ARMv8.4 Enhanced Nested Virt cpufeature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 33/64] KVM: arm64: nv: Hide RAS from nested guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 49/64] KVM: arm64: nv: vgic: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 30/64] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 35/64] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 41/64] KVM: arm64: nv: Trap and emulate TLBI instructions from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 34/64] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 42/64] KVM: arm64: nv: Fold guest's HCR_EL2 configuration into the host's
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 63/64] KVM: arm64: nv: Fast-track 'InHost' exception returns
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 56/64] KVM: arm64: nv: Add include containing the VNCR_EL2 offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 32/64] KVM: arm64: nv: Filter out unsupported features from ID regs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 36/64] KVM: arm64: nv: Handle shadow stage 2 page faults
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 44/64] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 47/64] KVM: arm64: nv: Don't load the GICv4 context on entering a nested guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 37/64] KVM: arm64: nv: Restrict S2 RD/WR permissions to match the guest's
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 39/64] KVM: arm64: nv: Set a handler for the system instruction traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 55/64] KVM: arm64: nv: Tag shadow S2 entries with nested level
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 31/64] KVM: arm64: nv: Only toggle cache for virtual EL2 when SCTLR_EL2 changes
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 54/64] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 50/64] KVM: arm64: nv: Implement maintenance interrupt forwarding
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 64/64] KVM: arm64: nv: Fast-track EL1 TLBIs for VHE guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 53/64] KVM: arm64: nv: Add handling of ARMv8.4-TTL TLB invalidation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 60/64] KVM: arm64: nv: Sync nested timer state with ARMv8.4
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 40/64] KVM: arm64: nv: Trap and emulate AT instructions from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 62/64] KVM: arm64: nv: Enable ARMv8.4-NV support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 61/64] KVM: arm64: nv: Allocate VNCR page when required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 45/64] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 51/64] KVM: arm64: nv: Add nested GICv3 tracepoints
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 58/64] KVM: arm64: nv: Move nested vgic state into the sysreg file
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 48/64] KVM: arm64: nv: vgic: Emulate the HW bit in software
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 57/64] KVM: arm64: nv: Map VNCR-capable registers to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 38/64] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 5.17, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v6 29/64] KVM: arm64: nv: Forward debug traps to the nested guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 12/64] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 25/64] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 17/64] KVM: arm64: nv: Emulate PSTATE.M for a guest hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 16/64] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 20/64] KVM: arm64: nv: Trap CPACR_EL1 access in virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 22/64] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 18/64] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 14/64] KVM: arm64: nv: Handle SPSR_EL2 specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 28/64] KVM: arm64: nv: Emulate EL12 register accesses from the virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 27/64] KVM: arm64: nv: Allow a sysreg to be hidden from userspace only
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 23/64] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP,FPEN} settings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 15/64] KVM: arm64: nv: Handle HCR_EL2.E2H specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 21/64] KVM: arm64: nv: Handle PSCI call via smc from the guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 11/64] KVM: arm64: nv: Handle trapped ERET from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 24/64] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 19/64] KVM: arm64: nv: Trap SPSR_EL1, ELR_EL1 and VBAR_EL1 from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 10/64] KVM: arm64: nv: Inject HVC exceptions to the virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 13/64] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 26/64] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 09/64] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 08/64] KVM: arm64: nv: Reset VMPIDR_EL2 and VPIDR_EL2 to sane values
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 04/64] KVM: arm64: nv: Allow userspace to set PSR_MODE_EL2x
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 07/64] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 02/64] KVM: arm64: nv: Introduce nested virtualization VCPU feature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 06/64] KVM: arm64: nv: Add nested virt VCPU primitives for vEL2 VCPU state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 05/64] KVM: arm64: nv: Add EL2 system registers to vcpu context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 03/64] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 01/64] arm64: Add ARM64_HAS_NESTED_VIRT cpufeature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v6 00/64] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 5.17, take #1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Parallel CPU bringup for x86_64
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/4] s390x: uv-guest: Add attestation tests
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3] vhost: cache avail index in vhost_enable_notify()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/4] s390x: uv-guest: remove duplicated checks
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/4] s390x: lib: Add QUI getter
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 23/26] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 22/26] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- [PATCH 22/22] KVM: SVM: Use kvm-x86-ops.h to fill svm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 21/22] KVM: SVM: Rename hook implementations to conform to kvm_x86_ops' names
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 20/22] KVM: SVM: Rename SEV implemenations to conform to kvm_x86_ops hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 19/22] KVM: x86: Use more verbose names for mem encrypt kvm_x86_ops hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/22] KVM: x86: Allow different macros for APICv, CVM, and Hyper-V kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 18/22] KVM: SVM: Rename AVIC helpers to use "avic" prefix instead of "svm"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 17/22] KVM: SVM: Remove unused MAX_INST_SIZE #define
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/22] KVM: SVM: Rename svm_flush_tlb() to svm_flush_tlb_current()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/22] KVM: x86: Move get_cs_db_l_bits() helper to SVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/22] KVM: VMX: Use kvm-x86-ops.h to fill vmx_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/22] KVM: VMX: Rename VMX functions to conform to kvm_x86_ops names
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/22] KVM: x86: Use static_call() for copy/move encryption context ioctls()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/22] KVM: x86: Unexport kvm_x86_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/22] KVM: x86: Uninline and export hv_track_root_tdp()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/22] KVM: nVMX: Refactor PMU refresh to avoid referencing kvm_x86_ops.pmu_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/22] KVM: xen: Use static_call() for invoking kvm_x86_ops hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/22] KVM: VMX: Call vmx_get_cpl() directly in handle_dr()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/22] KVM: x86: Use static_call() for .vcpu_deliver_sipi_vector()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/22] KVM: x86: Rename kvm_x86_ops pointers to align w/ preferred vendor names
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/22] KVM: x86: Drop export for .tlb_flush_current() static_call key
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/22] KVM: x86: Move delivery of non-APICv interrupt into vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/22] KVM: x86: Drop unnecessary and confusing KVM_X86_OP_NULL macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/22] KVM: x86: Fill *_x86_ops via kvm-x86-ops.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/5] vfio/pci: fix memory leak during D3hot to D0 tranistion
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86: Define wrtsc(tsc) as wrmsr(MSR_IA32_TSC, tsc)
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86: tsc_adjust: Use report_skip when skipping test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: tsc_adjust: Remove flaky timing test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v5 17/69] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Why do we need KVM_REQ_GET_NESTED_STATE_PAGES after all
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 12/30] s390/pci: get SHM information from list pci
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] kvm: selftests: aarch64: fix some vgic related comments
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Chris Mason <clm@xxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Chris Mason <clm@xxxxxx>
- [kvm-unit-tests PATCH 4/4] s390x: uv-guest: Add attestation tests
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 2/4] s390x: lib: Add QUI getter
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/4] s390x: uv-guest: remove duplicated checks
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/4] s390x: uv-host: Add attestation test
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/4] s390x: Attestation tests
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/30] s390/pci: get SHM information from list pci
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 36/69] KVM: arm64: nv: Filter out unsupported features from ID regs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 08/69] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 08/69] KVM: arm64: nv: Reset VCPU to EL2 registers if VCPU nested virt is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] vhost: Make use of the helper macro kthread_run()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: eventfd: Fix false positive RCU usage warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 16/69] KVM: arm64: nv: Handle trapped ERET from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 38/69] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 67/69] KVM: arm64: nv: Enable ARMv8.4-NV support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm:queue 305/328] arch/x86/kvm/x86.c:4345:32: warning: cast to pointer from integer of different size
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: KVM call minutes for 2022-01-25
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v5 14/69] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 13/30] s390/pci: return status from zpci_refresh_trans
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/30] s390/pci: get SHM information from list pci
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v3 05/10] x86/sev: Setup code to park APs in the AP Jump Table
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 06/10] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 10/10] x86/kexec/64: Support kexec under SEV-ES with AP Jump Table Blob
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 08/10] x86/sev: Add MMIO handling support to boot/compressed/ code
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 09/10] x86/sev: Handle CLFLUSH MMIO events
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 07/10] x86/sev: Use AP Jump Table blob to stop CPU
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 04/10] x86/sev: Cache AP Jump Table Address
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 03/10] x86/sev: Set GHCB data structure version
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 02/10] x86/sev: Save and print negotiated GHCB protocol version
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v3 01/10] x86/kexec/64: Disable kexec when SEV-ES is active
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v2 07/30] s390/pci: externalize the SIC operation controls and routine
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 08/12] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH] vhost: Make use of the helper macro kthread_run()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [kvm:queue 305/328] arch/x86/kvm/x86.c:4345:32: warning: cast to pointer from integer of different size
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm:queue 305/328] arch/x86/kvm/x86.c:4345:32: warning: cast to pointer from integer of different size
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 5/5] kvm: selftests: aarch64: use a tighter assert in vgic_poke_irq()
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 4/5] kvm: selftests: aarch64: fix some vgic related comments
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 2/5] kvm: selftests: aarch64: pass vgic_irq guest args as a pointer
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 1/5] kvm: selftests: aarch64: fix assert in gicv3_access_reg
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/26] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2] KVM: eventfd: Fix false positive RCU usage warning
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: export supported_xcr0 via UAPI
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- Re: [RFC PATCH v4 14/26] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 04/26] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 5/5] kvm: selftests: aarch64: use a tighter assert in vgic_poke_irq()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 4/5] kvm: selftests: aarch64: fix some vgic related comments
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 3/5] kvm: selftests: aarch64: fix the failure check in kvm_set_gsi_routing_irqchip_check
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 2/5] kvm: selftests: aarch64: pass vgic_irq guest args as a pointer
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 1/5] kvm: selftests: aarch64: fix assert in gicv3_access_reg
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2 0/5] kvm: selftests: aarch64: some fixes for vgic_irq
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH] vhost: Make use of the helper macro kthread_run()
- From: Yin Xiujiang <yinxiujiang@xxxxxxxxxx>
- [kvm:queue 305/328] arch/x86/kvm/x86.c:4345:32: warning: cast to pointer from integer of different size
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Chris Mason <clm@xxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Boris Burkov <boris@xxxxxx>
- Re: [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: Implement dirty quota-based throttling of vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 14/69] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 14/69] KVM: arm64: nv: Support virtual EL2 exceptions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot] memory leak in kvm_vcpu_ioctl_set_cpuid2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [syzbot] memory leak in kvm_vcpu_ioctl_set_cpuid2
- From: syzbot <syzbot+ead0473557070d5432cd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: use set_page_dirty rather than SetPageDirty
- From: Boris Burkov <boris@xxxxxx>
- Re: [PATCH 2/2] kvm: selftests: aarch64: fix some vgic related comments
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v8 35/40] x86/sev: use firmware-validated CPUID for SEV-SNP guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/3] x86: Add test coverage for nested_vmx_reflect_vmexit() testing
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: orphan section warnings while building v5.17-rc1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: skip host CPUID call for hypervisor leaves
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Update vCPU's runtime CPUID on write to MSR_IA32_XSS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Keep MSR_IA32_XSS unchanged for INIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: XSS and XCR0 fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Keep MSR_IA32_XSS unchanged for INIT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: orphan section warnings while building v5.17-rc1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: orphan section warnings while building v5.17-rc1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Sync the states size with the XCR0/IA32_XSS at, any time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM call minutes for 2022-01-25
- From: Mirela Grujic <mirela.grujic@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Forcibly leave nested virt when SMM state is toggled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 12/69] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 12/69] KVM: arm64: nv: Handle HCR_EL2.NV system register traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Don't skip L2's VMCALL in SMM test for SVM guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Check .flags in kvm_cpuid_check_equal() too
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Don't skip L2's VMCALL in SMM test for SVM guest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 3/3] selftests: kvm: check dynamic bits against KVM_X86_XCOMP_GUEST_SUPP
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: add system attribute to retrieve full set of supported xsave states
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/3] selftests: kvm: move vm_xsave_req_perm call to amx_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: export supported_xcr0 via UAPI
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] kvm: selftests: aarch64: fix some vgic related comments
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 1/2] kvm: selftests: aarch64: fix assert in gicv3_access_reg
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH v2 07/12] x86/sev: Setup code to park APs in the AP Jump Table
- From: Joerg Roedel <jroedel@xxxxxxx>
- [PATCH] KVM: x86: Check .flags in kvm_cpuid_check_equal() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Forcibly leave nested virt when SMM state is toggled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvm/queue v2 0/3] KVM: x86/pmu: Fix out-of-date AMD amd_event_mapping[]
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Use a prefix for the STANDALONE environment variable
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 13/30] s390/pci: return status from zpci_refresh_trans
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/30] s390/pci: get SHM information from list pci
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/30] s390/pci: externalize the SIC operation controls and routine
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 03/12] x86/sev: Save and print negotiated GHCB protocol version
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v2 20/30] KVM: s390: pci: provide routines for enabling/disabling IOAT assist
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Forcibly leave nested virt when SMM state is toggled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 26/30] vfio-pci/zdev: wire up zPCI adapter interrupt forwarding support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] Use a prefix for the STANDALONE environment variable
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [RFC PATCH v4 03/26] KVM: arm64: Introduce struct id_reg_info
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH] KVM: x86: Keep MSR_IA32_XSS unchanged for INIT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: Clean up {Host,MMU}-writable documentation and validation
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 5/5] KVM: x86/mmu: Consolidate comments about {Host,MMU}-writable
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86/mmu: Rename DEFAULT_SPTE_MMU_WRITEABLE to DEFAULT_SPTE_MMU_WRITABLE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86/mmu: Move is_writable_pte() to spte.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86/mmu: Check SPTE writable invariants when setting leaf SPTEs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86/mmu: Move SPTE writable invariant checks to a helper function
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86/mmu: Clean up {Host,MMU}-writable documentation and validation
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Don't skip L2's VMCALL in SMM test for SVM guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: nVMX: WARN on any attempt to allocate shadow VMCS for vmcs02
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Forcibly leave nested virt when SMM state is toggled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 4/4] x86: Add test coverage for nested_vmx_reflect_vmexit() testing
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 3/4] x86: Add a helper to allow tests to signal completion without a vmcall()
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/4] x86: Add support for running a nested guest multiple times in one test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/4] Add additional testing for routing L2 exceptions
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/4] x86: Make exception_mnemonic() visible to the tests
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [syzbot] WARNING in free_loaded_vmcs (3)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 12/12] KVM: Expose KVM_MEM_PRIVATE
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 34/40] x86/sev: add SEV-SNP feature detection/setup
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: KVM call minutes for 2022-01-25
- From: Philippe Mathieu-Daudé <f4bug@xxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: SVM: Implement demand page pinning
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- KVM call for agenda for 2022-02-08
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: KVM call minutes for 2022-01-25
- From: Juan Quintela <quintela@xxxxxxxxxx>
- KVM call minutes for 2022-01-25
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v1] vhost: cache avail index in vhost_enable_notify()
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH 00/19] KVM: x86: Bulk removal of unused function parameters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 16/19] KVM: x86: Remove unused "vcpu" of kvm_arch_tsc_has_attr()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 15/19] KVM: x86/emulate: Remove unused "ctxt" of task_switch_{16, 32}()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 09/19] KVM: x86/svm: Remove unused "svm" of sev_es_prepare_guest_switch()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 11/19] KVM: x86/svm: Remove unused "vector" of sev_vcpu_deliver_sipi_vector()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 07/19] KVM: x86/svm: Remove unused "vcpu" of nested_svm_check_tlb_ctl()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: SVM: Drop stale comment from svm_hv_vmcb_dirty_nested_enlightenments()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: SVM: hyper-v: Enable Enlightened MSR-Bitmap support for real
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM64: Guest performance improvement during dirty
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v2 19/30] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 01/11] KVM: Capture VM start
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/11] KVM: Capture VM start
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 15/30] KVM: s390: pci: do initial setup for AEN interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] KVM: SVM: WARN if KVM attempts emulation on #UD or #GP for SEV guests
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/9] KVM: SVM: Fix and clean up "can emulate" mess
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 20/30] KVM: s390: pci: provide routines for enabling/disabling IOAT assist
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 25/30] vfio-pci/zdev: wire up zPCI interpretive execution support
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH v6 7/7] KVM: SVM: Increase supported GHCB protocol version
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 5/7] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 6/7] KVM: SVM: Add support for Hypervisor Feature support MSR protocol
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH v2 26/30] vfio-pci/zdev: wire up zPCI adapter interrupt forwarding support
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v6 1/7] KVM: SVM: Get rid of set_ghcb_msr() and *ghcb_msr_bits() functions
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 4/7] KVM: SVM: Set "released" on INIT-SIPI iff SEV-ES vCPU was in AP reset hold
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 3/7] KVM: SVM: Move kvm_emulate_ap_reset_hold() to AMD specific code
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 0/7] KVM: SVM: Add initial GHCB protocol version 2 support
- From: Joerg Roedel <joro@xxxxxxxxxx>
- [PATCH v6 2/7] KVM: SVM: Add helper to generate GHCB MSR verson info, and drop macro
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: "Lazar, Lijo" <lijo.lazar@xxxxxxx>
- Re: [PATCH v2 20/30] KVM: s390: pci: provide routines for enabling/disabling IOAT assist
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: selftests: Add vgic initialization for dirty log perf test for ARM
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: arm64: Add fast path to handle permission relaxation during dirty logging
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: arm64: Use read/write spin lock for MMU protection
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ARM64: Guest performance improvement during dirty
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests v1 2/8] s390x: Add test for PFMF low-address protection
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v2 25/30] vfio-pci/zdev: wire up zPCI interpretive execution support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: Build regressions/improvements in v5.17-rc1
- From: "D, Lakshmi Sowjanya" <lakshmi.sowjanya.d@xxxxxxxxx>
- Re: [PATCH kvm-unit-tests v1 1/8] s390x: Add more tests for MSCH
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Matthias Schiffer <matthias.schiffer@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 19/30] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 26/30] vfio-pci/zdev: wire up zPCI adapter interrupt forwarding support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/30] KVM: s390: pci: do initial setup for AEN interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH RESEND v2] KVM: LAPIC: Enable timer posted-interrupt when mwait/hlt is advertised
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH RESEND v2] KVM: VMX: Dont' send posted IRQ if vCPU == this vCPU and vCPU is IN_GUEST_MODE
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [RFC PATCH v1 06/10] KVM: s390: Add vm IOCTL for key checked guest absolute memory access
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests v1 1/8] s390x: Add more tests for MSCH
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH v2] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: KVM call for agenda for 2022-01-25
- From: Philippe Mathieu-Daudé <f4bug@xxxxxxxxx>
- Re: KVM call for agenda for 2022-01-25
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v1] vhost: cache avail index in vhost_enable_notify()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/19] KVM: Remove unused "kvm" of kvm_make_vcpu_request()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 19/19] KVM: Remove unused "flags" of kvm_pv_kick_cpu_op()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 17/19] KVM: x86: Remove unused "vcpu" of kvm_scale_tsc()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 14/19] KVM: x86/emulate: Remove unused "ctxt" of setup_syscalls_segments()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 13/19] KVM: x86/ioapic: Remove unused "addr" and "length" of ioapic_read_indirect()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 16/19] KVM: x86: Remove unused "vcpu" of kvm_arch_tsc_has_attr()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 15/19] KVM: x86/emulate: Remove unused "ctxt" of task_switch_{16, 32}()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 12/19] KVM: x86/i8259: Remove unused "addr" of elcr_ioport_{read,write}()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 11/19] KVM: x86/svm: Remove unused "vector" of sev_vcpu_deliver_sipi_vector()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 10/19] KVM: x86/sev: Remove unused "kvm" of sev_unbind_asid()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 08/19] KVM: x86: Remove unused "vcpu" of kvm_after_interrupt()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 09/19] KVM: x86/svm: Remove unused "svm" of sev_es_prepare_guest_switch()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 06/19] KVM: x86/svm: Remove unused "vcpu" of svm_check_exit_valid()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 07/19] KVM: x86/svm: Remove unused "vcpu" of nested_svm_check_tlb_ctl()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 05/19] KVM: x86/mmu_audit: Remove unused "level" of audit_spte_after_sync()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 02/19] KVM: x86/mmu: Remove unused "kvm" of __rmap_write_protect()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 03/19] KVM: x86/mmu: Remove unused "vcpu" of reset_{tdp,ept}_shadow_zero_bits_mask()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 04/19] KVM: x86/tdp_mmu: Remove unused "kvm" of kvm_tdp_mmu_get_root()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 01/19] KVM: x86/mmu: Remove unused "kvm" of kvm_mmu_unlink_parents()
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 00/19] KVM: x86: Bulk removal of unused function parameters
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH] KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH] x86: add additional EPT bit definitions
- From: Ayush Ranjan <ayushranjan@xxxxxxxxxx>
- Re: [PATCH] gvisor: add some missing definitions to vmx.h
- From: Ayush Ranjan <ayushranjan@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Remove vmcs_config.order
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v2 20/44] i386/tdx: Parse tdx metadata and store the result into TdxGuestState
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v2 20/44] i386/tdx: Parse tdx metadata and store the result into TdxGuestState
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/26] KVM: arm64: Make CPU ID registers writable by userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH] KVM: VMX: Remove vmcs_config.order
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: KVM/arm64: Guest ABI changes do not appear rollback-safe
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- RE: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Felix Kuehling <felix.kuehling@xxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH] vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: James Turner <linuxkernel.foss@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
- [PATCH] KVM: vfio: Constify static kvm_device_ops
- From: Rikard Falkeborn <rikard.falkeborn@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH v5 1/3] KVM: x86: Provide per VM capability for disabling PMU virtualization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v2 5/5] vfio/pci: add the support for PCI D3cold state
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 4/5] vfio/pci: Invalidate mmaps and block the access in D3hot power state
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 1/5] vfio/pci: register vfio-pci driver with runtime PM framework
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 3/5] vfio/pci: fix memory leak during D3hot to D0 tranistion
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 2/5] vfio/pci: virtualize PME related registers bits and initialize to zero
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [RFC PATCH v2 0/5] vfio/pci: Enable runtime power management support
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC] vfio: Revise and update the migration uAPI description
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v4 23/26] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH RESEND] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
- Re: [PATCH] x86: add additional EPT bit definitions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH v4 22/26] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/26] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 17/30] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH] gvisor: add some missing definitions to vmx.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Build regressions/improvements in v5.17-rc1
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH v4 14/26] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 04/26] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v5 8/8] KVM: VMX: Resize PID-ponter table on demand for IPI virtualization
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v4 03/26] KVM: arm64: Introduce struct id_reg_info
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures for vcpu->arch.guest_supported_xcr0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 02/26] KVM: arm64: Save ID registers' sanitized value per guest
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 01/26] KVM: arm64: Introduce a validation function for an ID register
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v4 00/26] KVM: arm64: Make CPU ID registers writable by userspace
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86/ioapic: use APIC ID map instead of hard-coded CPU index
- From: "Kaya, Metin" <metikaya@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86/hyperv_clock: print sequence field of reference TSC page
- From: "Kaya, Metin" <metikaya@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86/hyperv_clock: handle non-consecutive APIC IDs
- From: "Kaya, Metin" <metikaya@xxxxxxxxxx>
- [syzbot] WARNING in free_loaded_vmcs (3)
- From: syzbot <syzbot+8112db3ab20e70d50c31@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 17/30] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 18/30] KVM: s390: pci: provide routines for enabling/disabling interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/30] s390/pci: stash associated GISA designation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: Use memcmp in kvm_cpuid_check_equal()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v17] qapi: introduce 'x-query-x86-cpuid' QMP command.
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH] driver core: platform: Rename platform_get_irq_optional() to platform_get_irq_silent()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/cpuid: Exclude unpermitted xfeatures sizes at KVM_GET_SUPPORTED_CPUID
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 18/30] KVM: s390: pci: provide routines for enabling/disabling interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 17/30] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [REGRESSION] Too-low frequency limit for AMD GPU PCI-passed-through to Windows VM
- From: "Lazar, Lijo" <Lijo.Lazar@xxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Align incw instruction to avoid split lock
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]