Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v3 6/9] x86/smpboot: Support parallel startup of secondary CPUs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3 1/9] x86/apic/x2apic: Fix parallel handling of cluster_mask
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3 0/9] Parallel CPU bringup for x86_64
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3 5/9] x86/smpboot: Split up native_cpu_up into separate phases and document them
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3 9/9] x86/smpboot: Serialize topology updates for secondary bringup
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3 4/9] x86/smpboot: Reference count on smpboot_setup_warm_reset_vector()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3 7/9] x86/smpboot: Send INIT/SIPI/SIPI to secondary CPUs in parallel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH v5 1/1] KVM: s390: Clarify SIGP orders versus STOP/RESTART
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH v5 1/1] KVM: s390: Clarify SIGP orders versus STOP/RESTART
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] KVM: s390: Clarify SIGP orders versus STOP/RESTART
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] KVM: s390: Clarify SIGP orders versus STOP/RESTART
- From: David Hildenbrand <david@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with the kvm tree
- Re: [PATCH v4 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v5 1/1] KVM: s390: Clarify SIGP orders versus STOP/RESTART
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v3 04/18] driver core: platform: Add driver dma ownership management
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [bug report] KVM: Dynamically allocate "new" memslots from the get-go
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 3/7] cpu/hotplug: Add dynamic parallel bringup states before CPUHP_BRINGUP_CPU
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH-for-7.0] target/i386/kvm: Replace use of __u32 type
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH-for-6.2? v2 0/3] misc: Spell QEMU all caps
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kernel v3] KVM: PPC: Merge powerpc's debugfs entry content into generic entry
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 00/17] Introduce VDUSE - vDPA Device in Userspace
- From: Liuxiangdong <liuxiangdong5@xxxxxxxxxx>
- RE: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [patch 4/6] x86/fpu: Add guest support to xfd_enable_feature()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [patch 4/6] x86/fpu: Add guest support to xfd_enable_feature()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [patch 6/6] x86/fpu: Provide kvm_sync_guest_vmexit_xfd_state()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH 2/9] lib/bitmap: implement bitmap_{empty,full} with bitmap_weight_eq()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 11/12] s390x/pci: use dtsm provided from vfio capabilities for interpreted devices
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 07/12] s390x/pci: enable for load/store intepretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] s390x/pci: zPCI interpretation support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [PATCH 09/19] kvm: x86: Prepare reallocation check
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [patch 6/6] x86/fpu: Provide kvm_sync_guest_vmexit_xfd_state()
- From: "Liu, Jing2" <jing2.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/12] s390x/pci: don't fence interpreted devices without MSI-X
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [patch 4/6] x86/fpu: Add guest support to xfd_enable_feature()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: Move VM's worker kthreads back to the original cgroups before exiting.
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- RE: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- [PATCH kernel v3] KVM: PPC: Merge powerpc's debugfs entry content into generic entry
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- [PATCH 3/4] KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/4] KVM: x86/mmu: Use common iterator for walking invalid TDP MMU roots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/4] KVM: x86/mmu: Move "invalid" check out of kvm_tdp_mmu_get_root()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/4] KVM: x86/mmu: Use common TDP MMU zap helper for MMU notifier unmap hook
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/4] KVM: x86/mmu: Zap invalid TDP MMU roots when unmapping
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Don't advance iterator after restart due to yielding
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH 10/28] KVM: x86/mmu: Allow yielding when zapping GFNs for defunct TDP MMU root
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 10/28] KVM: x86/mmu: Allow yielding when zapping GFNs for defunct TDP MMU root
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 15/28] KVM: x86/mmu: Take TDP MMU roots off list when invalidating all roots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC] KVM: x86/mmu: fix UAF in paging_update_accessed_dirty_bits
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
- Re: [PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v2 1/7] x86/apic/x2apic: Fix parallel handling of cluster_mask
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [RFC PATCH] KVM: x86: add kvm per-vCPU exits disable capability
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH v2 3/7] cpu/hotplug: Add dynamic parallel bringup states before CPUHP_BRINGUP_CPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: zap invalid roots in kvm_tdp_mmu_zap_all
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/9] lib/bitmap: implement bitmap_{empty,full} with bitmap_weight_eq()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v3] selftests: KVM: avoid failures due to reserved HyperTransport region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH] KVM: x86: add kvm per-vCPU exits disable capability
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 22/32] KVM: s390: pci: provide routines for enabling/disabling IOAT assist
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- RE: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 24/32] KVM: s390: intercept the rpcit instruction
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 23/32] KVM: s390: pci: handle refresh of PCI translations
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH 22/32] KVM: s390: pci: provide routines for enabling/disabling IOAT assist
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: Move VM's worker kthreads back to the original cgroups before exiting.
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: The vcpu won't be wakened for a long time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v4 5/6] selftests: KVM: Add OSLSR_EL1 to the list of blessed regs
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v4 4/6] KVM: arm64: Emulate the OS Lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v4 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v4 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v4 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v4 0/6] KVM: arm64: Emulate the OS Lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH] KVM: Move VM's worker kthreads back to the original cgroups before exiting.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/7] x86/apic/x2apic: Fix parallel handling of cluster_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 24/32] KVM: s390: intercept the rpcit instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 23/32] KVM: s390: pci: handle refresh of PCI translations
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/18] driver core: platform: Add driver dma ownership management
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [Bug 215317] Unable to launch QEMU Linux guest VM - "Guest has not initialized the display (yet)"
- From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH 27/32] vfio-pci/zdev: wire up zPCI interpretive execution support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH] vfio: Update/Clarify migration uAPI, add NDMA state
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: Move VM's worker kthreads back to the original cgroups before exiting.
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- RE: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: Move VM's worker kthreads back to the original cgroups before exiting.
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH] selftests: KVM: Fix non-x86 compiling
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH kvmtool RESENT] arm/pci: update interrupt-map only for legacy interrupts
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 kvmtool] Makefile: Calculate the correct kvmtool version
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v11 kvmtool 0/8] KVMTOOL RISC-V Support
- From: Will Deacon <will@xxxxxxxxxx>
- RE: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3] selftests: KVM: avoid failures due to reserved HyperTransport region
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 30/32] vfio-pci/zdev: add DTSM to clp group capability
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- RE: [PATCH 09/19] kvm: x86: Prepare reallocation check
- From: "Liu, Jing2" <jing2.liu@xxxxxxxxx>
- [PATCH 5/5] KVM: nVMX: Allow VMREAD when Enlightened VMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 4/5] KVM: nVMX: Implement evmcs_field_offset() suitable for handle_vmread()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 3/5] KVM: nVMX: Rename vmcs_to_field_offset{,_table} to vmcs12_field_offset{,_table}
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 2/5] KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 1/5] KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 0/5] KVM: nVMX: Fix Windows 11 + WSL2 + Enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 3/7] cpu/hotplug: Add dynamic parallel bringup states before CPUHP_BRINGUP_CPU
- From: Mark Rutland <mark.rutland@xxxxxxx>
- The vcpu won't be wakened for a long time
- From: "Longpeng (Mike, Cloud Infrastructure Service Product Dept.)" <longpeng2@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] arm64: debug: add migration tests for debug state
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [patch 0/6] x86/fpu: Preparatory changes for guest AMX support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [patch 4/6] x86/fpu: Add guest support to xfd_enable_feature()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v2 0/7] Parallel CPU bringup for x86_64
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 6/7] x86/smpboot: Support parallel startup of secondary CPUs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 4/7] x86/smpboot: Reference count on smpboot_setup_warm_reset_vector()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 5/7] x86/smpboot: Split up native_cpu_up into separate phases and document them
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 2/7] cpu/hotplug: Move idle_thread_get() to <linux/smpboot.h>
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 1/7] x86/apic/x2apic: Fix parallel handling of cluster_mask
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 7/7] x86/smpboot: Send INIT/SIPI/SIPI to secondary CPUs in parallel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 3/7] cpu/hotplug: Add dynamic parallel bringup states before CPUHP_BRINGUP_CPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/4] Add additional testing for routing L2 exceptions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Remove invalid clwb test code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/4] arm: Timer fixes
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Increase timeout for vmx_vmcs_shadow_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH] vfio: Update/Clarify migration uAPI, add NDMA state
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 0/9] MTTCG sanity tests for ARM
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 0/9] MTTCG sanity tests for ARM
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Don't advance iterator after restart due to yielding
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 3/9] Makefile: add GNU global tags support
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 09/11] x86/boot: Support parallel startup of secondary CPUs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [patch 0/6] x86/fpu: Preparatory changes for guest AMX support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- Re: [patch 1/6] x86/fpu: Extend fpu_xstate_prctl() with guest permissions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [patch 4/6] x86/fpu: Add guest support to xfd_enable_feature()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 09/19] kvm: x86: Prepare reallocation check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 30/32] vfio-pci/zdev: add DTSM to clp group capability
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 28/32] vfio-pci/zdev: wire up zPCI adapter interrupt forwarding support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 29/32] vfio-pci/zdev: wire up zPCI IOAT assist support
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 21/32] KVM: s390: pci: provide routines for enabling/disabling interrupt forwarding
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Add test to verify TRIPLE_FAULT on invalid L2 guest state
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 13/32] KVM: s390: pci: add basic kvm_zdev structure
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 20/32] KVM: s390: pci: provide routines for enabling/disabling interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: VMX: Fix stale docs for kvm-intel.emulate_invalid_guest_state
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: nVMX: Synthesize TRIPLE_FAULT for L2 if emulation is required
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/4] KVM: VMX: Always clear vmx->fail on emulation_required
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [Bug 215317] Unable to launch QEMU Linux guest VM - "Guest has not initialized the display (yet)"
- From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
- Re: [Bug 215317] New: Unable to launch QEMU Linux guest VM - "Guest has not initialized the display (yet)"
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/1] s390x: KVM: CPU Topology
- From: Alexandra Winter <wintera@xxxxxxxxxxxxx>
- RE: [patch 0/6] x86/fpu: Preparatory changes for guest AMX support
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 09/19] kvm: x86: Prepare reallocation check
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [patch 0/6] x86/fpu: Preparatory changes for guest AMX support
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [patch 0/6] x86/fpu: Preparatory changes for guest AMX support
- From: "Liu, Jing2" <jing2.liu@xxxxxxxxxxxxxxx>
- RE: [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [patch 4/6] x86/fpu: Add guest support to xfd_enable_feature()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [patch 1/6] x86/fpu: Extend fpu_xstate_prctl() with guest permissions
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] KVM: Move VM's worker kthreads back to the original cgroups before exiting.
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Bug 215317] Unable to launch QEMU Linux guest VM - "Guest has not initialized the display (yet)"
- From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
- [PATCH] KVM: x86/mmu: Don't advance iterator after restart due to yielding
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH] KVM: x86: add kvm per-vCPU exits disable capability
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix dangling page reference in TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [patch 6/6] x86/fpu: Provide kvm_sync_guest_vmexit_xfd_state()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [patch 5/6] x86/fpu: Provide fpu_update_guest_xcr0/xfd()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [patch 4/6] x86/fpu: Add guest support to xfd_enable_feature()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [patch 3/6] x86/fpu: Make XFD initialization in __fpstate_reset() a function argument
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [patch 2/6] x86/fpu: Prepare guest FPU for dynamically enabled FPU features
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [patch 1/6] x86/fpu: Extend fpu_xstate_prctl() with guest permissions
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [patch 0/6] x86/fpu: Preparatory changes for guest AMX support
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Add test coverage for the routing logic when exceptions occur in L2
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/4] x86: Add test coverage for nested_vmx_reflect_vmexit() testing
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/4] x86: Add a test framework for nested_vmx_reflect_vmexit() testing
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/4] x86: Align L2's stacks
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/4] x86: Fix a #GP from occurring in usermode library's exception handlers
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/4] Add additional testing for routing L2 exceptions
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [RFC 0/6] Sparse HART id support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v8 05/40] x86/sev: Save the negotiated GHCB version
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH 01/19] x86/fpu: Extend prctl() with guest permissions
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [RFC 0/6] Sparse HART id support
- From: Rob Herring <robh@xxxxxxxxxx>
- [PATCH v1 13/13] KVM: selftests: Add an option to disable MANUAL_PROTECT_ENABLE and INITIALLY_SET
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 12/13] KVM: x86/mmu: Add tracepoint for splitting huge pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 11/13] KVM: x86/mmu: Split huge pages during CLEAR_DIRTY_LOG
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 10/13] KVM: Push MMU locking down into kvm_arch_mmu_enable_log_dirty_pt_masked
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 09/13] KVM: x86/mmu: Split huge pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 08/13] KVM: x86/mmu: Refactor TDP MMU child page initialization
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 07/13] KVM: x86/mmu: Derive page role from parent
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 06/13] KVM: x86/mmu: Refactor tdp_mmu iterators to take kvm_mmu_page root
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 05/13] KVM: x86/mmu: Move restore_acc_track_spte to spte.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 04/13] KVM: x86/mmu: Factor out logic to atomically install a new page table
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 03/13] KVM: x86/mmu: Automatically update iter->old_spte if cmpxchg fails
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 02/13] KVM: x86/mmu: Rename __rmap_write_protect to rmap_write_protect
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 01/13] KVM: x86/mmu: Rename rmap_write_protect to kvm_vcpu_write_protect_gfn
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v1 00/13] KVM: x86/mmu: Eager Page Splitting for the TDP MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [GIT PULL] vhost: cleanups and fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH v8 02/40] x86/sev: detect/setup SEV/SME features earlier in boot
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH v3] vfio: Documentation for the migration region
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC 0/6] Sparse HART id support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH] Revert "KVM: VMX: Save HOST_CR3 in vmx_prepare_switch_to_guest()"
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC 3/6] RISC-V: Use __cpu_up_stack/task_pointer only for spinwait method
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC 5/6] RISC-V: Move spinwait booting method to its own config
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- [RFC PATCH v5 1/1] KVM: s390: Clarify SIGP orders versus STOP/RESTART
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [RFC PATCH v5 0/1] s390x: Improvements to SIGP handling [KVM]
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [RFC 1/6] RISC-V: Avoid using per cpu array for ordered booting
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC PATCH] vfio: Update/Clarify migration uAPI, add NDMA state
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix dangling page reference in TDP MMU
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Increase timeout for vmx_vmcs_shadow_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 02/19] x86/fpu: Prepare KVM for dynamically enabled states
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix dangling page reference in TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Venu Busireddy <venu.busireddy@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix dangling page reference in TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with the tip tree
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with the tip tree
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Michael Roth <michael.roth@xxxxxxx>
- linux-next: manual merge of the kvm tree with the tip tree
- [PATCH 1/4] KVM: SVM: Define sev_features and vmpl field in the VMSA
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 3/4] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 4/4] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 2/4] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH 0/4] Create multiple save area for SEV guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [next-20211210] Build break powerpc/kvm: unknown member wait
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 17/15] KVM: X86: Ensure pae_root to be reconstructed for shadow paging if the guest PDPTEs is changed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Inject #UD on "unsupported" hypercall if patching fails
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix dangling page reference in TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: x86: zap invalid roots in kvm_tdp_mmu_zap_all
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v5 1/1] s390x: KVM: accept STSI for CPU topology information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] s390x: KVM: accept STSI for CPU topology information
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/12] target/riscv: Support virtual time context synchronization
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH v2 10/12] target/riscv: Add kvm_riscv_get/put_regs_timer
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH 13/32] KVM: s390: pci: add basic kvm_zdev structure
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix dangling page reference in TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 08/32] s390/pci: stash associated GISA designation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 05/32] s390/airq: pass more TPI info to airq handlers
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 2/4] KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 9/9] x86/kvm: remove unused ack_notifier callbacks
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 8/9] KVM: downgrade two BUG_ONs to WARN_ON_ONCE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 7/9] KVM: selftests: Avoid KVM_SET_CPUID2 after KVM_RUN in hyperv_features test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 6/9] KVM: x86: Forbid KVM_SET_CPUID{,2} after KVM_RUN
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 5/9] KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 4/9] KVM: SEV: do not take kvm->lock when destroying
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.15 3/9] KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 1/1] s390x: KVM: accept STSI for CPU topology information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.4 2/2] KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 4/4] KVM: downgrade two BUG_ONs to WARN_ON_ONCE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.10 3/4] KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 3/9] KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 4/9] KVM: SEV: do not take kvm->lock when destroying
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.4 2/2] KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 9/9] x86/kvm: remove unused ack_notifier callbacks
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 4/4] KVM: downgrade two BUG_ONs to WARN_ON_ONCE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 3/4] KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.10 2/4] KVM: VMX: clear vmx_x86_ops.sync_pir_to_irr if APICv is disabled
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 7/9] KVM: selftests: Avoid KVM_SET_CPUID2 after KVM_RUN in hyperv_features test
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 8/9] KVM: downgrade two BUG_ONs to WARN_ON_ONCE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 6/9] KVM: x86: Forbid KVM_SET_CPUID{,2} after KVM_RUN
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.15 5/9] KVM: selftests: Make sure kvm_create_max_vcpus test won't hit RLIMIT_NOFILE
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix dangling page reference in TDP MMU
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control EFLAGS.IF
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 04/18] driver core: platform: Add driver dma ownership management
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control EFLAGS.IF
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control EFLAGS.IF
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC 5/6] RISC-V: Move spinwait booting method to its own config
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC 3/6] RISC-V: Use __cpu_up_stack/task_pointer only for spinwait method
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC 3/6] RISC-V: Use __cpu_up_stack/task_pointer only for spinwait method
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC 2/6] RISC-V: Do not print the SBI version during HSM extension boot print
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC 1/6] RISC-V: Avoid using per cpu array for ordered booting
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 02/19] x86/fpu: Prepare KVM for dynamically enabled states
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 02/19] x86/fpu: Prepare KVM for dynamically enabled states
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] KVM: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control EFLAGS.IF
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 3/3] KVM: SVM: Extend host physical APIC ID field to support more than 8-bit
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 2/3] x86/apic: Add helper function to get maximum physical APIC ID
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 1/3] KVM: SVM: Refactor AVIC hardware setup logic into helper function
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH v3 0/3] svm: avic: Allow AVIC support on system w/ physical APIC ID > 255
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- [PATCH 2/2] KVM: x86: zap invalid roots in kvm_tdp_mmu_zap_all
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: allow kvm_tdp_mmu_zap_invalidated_roots with write-locked mmu_lock
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: Fix dangling page reference in TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 5/5] KVM: SVM: allow AVIC to co-exist with a nested guest running
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 4/5] KVM: x86: don't touch irr_pending in kvm_apic_update_apicv when inhibiting it
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 3/5] KVM: SVM: fix race between interrupt delivery and AVIC inhibition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 2/5] KVM: SVM: allow to force AVIC to be enabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 1/5] KVM: nSVM: deal with L1 hypervisor that intercepts interrupts but lets L2 control EFLAGS.IF
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 0/5] RFC: KVM: SVM: Allow L1's AVIC to co-exist with nesting
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: SVM: Extend host physical APIC ID field to support more than 8-bit
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v2 3/3] KVM: SVM: Extend host physical APIC ID field to support more than 8-bit
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] s390x: KVM: accept STSI for CPU topology information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] s390x: KVM: accept STSI for CPU topology information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 09/19] kvm: x86: Prepare reallocation check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 02/19] x86/fpu: Prepare KVM for dynamically enabled states
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1.1 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: Neeraj Upadhyay <quic_neeraju@xxxxxxxxxxx>
- Re: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1.1 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: "Liu, Jing2" <jing2.liu@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 10/12] target/riscv: Add kvm_riscv_get/put_regs_timer
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 12/12] target/riscv: Support virtual time context synchronization
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 11/12] target/riscv: Implement virtual time adjusting with vm state changing
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 08/12] target/riscv: Handle KVM_EXIT_RISCV_SBI exit
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 07/12] target/riscv: Support setting external interrupt by KVM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 06/12] target/riscv: Support start kernel directly by KVM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 05/12] target/riscv: Implement kvm_arch_put_registers
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 04/12] target/riscv: Implement kvm_arch_get_registers
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 03/12] target/riscv: Implement function kvm_arch_init_vcpu
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v11 kvmtool 0/8] KVMTOOL RISC-V Support
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH kvmtool] Makefile: 'lvm version' works incorrect. Because CFLAGS can not get sub-make variable $(KVMTOOLS_VERSION)
- From: "haibiao.xiao" <haibiao.xiao@xxxxxxxxx>
- [Bug 215317] New: Unable to launch QEMU Linux guest VM - "Guest has not initialized the display (yet)"
- From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v3 04/18] driver core: platform: Add driver dma ownership management
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] vhost: cleanups and fixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [GIT PULL] vhost: cleanups and fixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: Yang Zhong <yang.zhong@xxxxxxxxx>
- [PATCH] vfio/iommu_type1: replace kfree with kvfree
- From: Jiacheng Shi <billsjc@xxxxxxxxxxx>
- Re: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 00/19] AMX Support in KVM
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 2/2] kvm/msi: do explicit commit when adding msi routes
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH 1/2] kvm-irqchip: introduce new API to support route change
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH 0/2] kvm/msi: do explicit commit when adding msi routes
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- Re: [PATCH v11 kvmtool 0/8] KVMTOOL RISC-V Support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [next-20211210] Build break powerpc/kvm: unknown member wait
- From: Sachin Sant <sachinp@xxxxxxxxxxxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [PATCH 17/15] KVM: X86: Ensure pae_root to be reconstructed for shadow paging if the guest PDPTEs is changed
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v11 kvmtool 0/8] KVMTOOL RISC-V Support
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 17/15] KVM: X86: Ensure pae_root to be reconstructed for shadow paging if the guest PDPTEs is changed
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- RE: [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: x86/svm: Add module param to control PMU virtualization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM RISC-V 64-bit selftests support
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- RE: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: VM_BUG_ON in vmx_prepare_switch_to_guest->__get_current_cr3_fast at kvm/queue
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- RE: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/svm: Add module param to control PMU virtualization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: VM_BUG_ON in vmx_prepare_switch_to_guest->__get_current_cr3_fast at kvm/queue
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 0/6] x86/xen: Add in-kernel Xen event channel delivery
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: VM_BUG_ON in vmx_prepare_switch_to_guest->__get_current_cr3_fast at kvm/queue
- From: Lai Jiangshan <laijs@xxxxxxxxxxxxxxxxx>
- [PATCH] Revert "KVM: VMX: Save HOST_CR3 in vmx_prepare_switch_to_guest()"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] Revert "KVM: X86: Update mmu->pdptrs only when it is changed"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: VM_BUG_ON in vmx_prepare_switch_to_guest->__get_current_cr3_fast at kvm/queue
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: VM_BUG_ON in vmx_prepare_switch_to_guest->__get_current_cr3_fast at kvm/queue
- From: Lai Jiangshan <laijs@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 14/19] x86/fpu: Prepare for KVM XFD_ERR handling
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 12/19] x86/fpu: Prepare KVM for bringing XFD state back in-sync
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: Potential bug in TDP MMU
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 5.16-rc5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 08/19] x86/fpu: Move xfd_update_state() to xstate.c and export symbol
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Inject #UD on "unsupported" hypercall if patching fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 05/19] x86/fpu: Move xfd initialization out of __fpstate_reset() to the callers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH] KVM: x86: Inject #UD on "unsupported" hypercall if patching fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 39/40] virt: sevguest: Add support to derive key
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Rewording of Setting IA32_XFD[18] (Re: Thoughts of AMX KVM support based on latest kernel)
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 19/19] kvm: x86: Add AMX CPUIDs support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 15/32] KVM: s390: pci: enable host forwarding of Adapter Event Notifications
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 17/15] KVM: X86: Ensure pae_root to be reconstructed for shadow paging if the guest PDPTEs is changed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 17/15] KVM: X86: Ensure pae_root to be reconstructed for shadow paging if the guest PDPTEs is changed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: x86/svm: Add module param to control PMU virtualization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 13/32] KVM: s390: pci: add basic kvm_zdev structure
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 11/32] s390/pci: add helper function to find device by handle
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 08/32] s390/pci: stash associated GISA designation
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH kvm-next] selftests/kvm: remove unneeded variable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- VM_BUG_ON in vmx_prepare_switch_to_guest->__get_current_cr3_fast at kvm/queue
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Retry page fault if MMU reload is pending and root has no sp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] arm64: debug: add a migration test for single-step state
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] arm64: debug: add a migration test for watchpoint state
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] arm64: debug: add a migration test for breakpoint state
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] arm64: debug: add migration tests for debug state
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH RFC 08/10] kvm: selftests: introduce ucall implementation based on halt instructions
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 07/10] kvm: selftests: add ucall_shared ops for PIO
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 06/10] kvm: selftests: add ucall interfaces based around shared memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 05/10] kvm: s390: selftests: use ucall_ops to define default ucall implementation
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 04/10] kvm: arm64: selftests: use ucall_ops to define default ucall implementation
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 03/10] kvm: selftests: introduce ucall_ops for test/arch-specific ucall implementations
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 02/10] kvm: selftests: move ucall declarations into ucall_common.h
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 01/10] kvm: selftests: move base kvm_util.h declarations to kvm_util_base.h
- From: Michael Roth <michael.roth@xxxxxxx>
- [RFC PATCH 00/10] KVM: selftests: Add support for test-selectable ucall implementations
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 10/10] kvm: selftests: add ucall_test to test various ucall functionality
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC 09/10] kvm: selftests: add GUEST_SHARED_* macros for shared ucall implementations
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH v6 1/6] KVM: Warn if mark_page_dirty() is called without an active vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v6 5/6] KVM: x86: Fix wall clock writes in Xen shared_info not to mark page dirty
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v6 0/6] x86/xen: Add in-kernel Xen event channel delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v6 3/6] KVM: x86/xen: Maintain valid mapping of Xen shared_info page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v6 4/6] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v6 2/6] KVM: Reinstate gfn_to_pfn_cache with invalidation support
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v6 6/6] KVM: x86: First attempt at converting nested virtual APIC page to gpc
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 18/19] kvm: x86: AMX XCR0 support for guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 16/19] kvm: x86: Introduce KVM_{G|S}ET_XSAVE2 ioctl
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 15/19] kvm: x86: Save and restore guest XFD_ERR properly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 14/19] x86/fpu: Prepare for KVM XFD_ERR handling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Retry page fault if MMU reload is pending and root has no sp
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/19] kvm: x86: Emulate WRMSR of guest IA32_XFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Retry page fault if MMU reload is pending and root has no sp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 06/40] x86/sev: Check SEV-SNP features support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 07/40] x86/sev: Add a helper for the PVALIDATE instruction
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 08/40] x86/sev: Check the vmpl level
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 10/40] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 03/40] x86/mm: Extend cc_attr to include AMD SEV-SNP
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 34/40] x86/sev: add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 32/40] x86/compressed: use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 35/40] x86/sev: use firmware-validated CPUID for SEV-SNP guests
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 36/40] x86/sev: Provide support for SNP guest request NAEs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 39/40] virt: sevguest: Add support to derive key
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 40/40] virt: sevguest: Add support to get extended report
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 37/40] x86/sev: Register SNP guest request platform device
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 38/40] virt: Add SEV-SNP guest driver
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 33/40] x86/compressed/64: add identity mapping for Confidential Computing blob
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 11/40] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 31/40] x86/compressed: add SEV-SNP feature detection/setup
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 25/40] x86/compressed/acpi: move EFI config table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 29/40] x86/compressed/64: add support for SEV-SNP CPUID table in #VC handlers
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 30/40] x86/boot: add a pointer to Confidential Computing blob in bootparams
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 12/40] x86/sev: Add helper for validating pages in early enc attribute changes
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 26/40] x86/compressed/acpi: move EFI vendor table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 28/40] KVM: SEV: Add documentation for SEV-SNP CPUID Enforcement
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 27/40] x86/boot: Add Confidential Computing type to setup_data
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 18/40] KVM: SVM: Create a separate mapping for the GHCB save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 21/40] x86/head: re-enable stack protection for 32/64-bit builds
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 23/40] KVM: x86: move lookup of indexed CPUID leafs to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 24/40] x86/compressed/acpi: move EFI system table lookup to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 20/40] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 22/40] x86/sev: move MSR-based VMGEXITs for CPUID to helper
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 19/40] KVM: SVM: Update the SEV-ES save area mapping
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 14/40] x86/kernel: Validate rom memory before accessing when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 13/40] x86/kernel: Make the bss.decrypted section shared in RMP table
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 17/40] KVM: SVM: Create a separate mapping for the SEV-ES save area
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 16/40] KVM: SVM: Define sev_features and vmpl field in the VMSA
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 15/40] x86/mm: Add support to validate memory when changing C-bit
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 04/40] x86/sev: Define the Linux specific guest termination reasons
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH 07/19] kvm: x86: Propagate fpstate reallocation error to userspace
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v8 09/40] x86/compressed: Add helper for validating pages in the decompression stage
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 05/40] x86/sev: Save the negotiated GHCB version
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 00/40] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 02/40] x86/sev: detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [PATCH v8 01/40] x86/compressed/64: detect/setup SEV/SME features earlier in boot
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [kvm-unit-tests PATCH v9 0/9] MTTCG sanity tests for ARM
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 5.16-rc5
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 5.16-rc5
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 07/14] x86/clear_page: add clear_page_uncached()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH 19/32] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v11 17/17] KVM: x86/pmu: Expose CPUIDs feature bits PDCM, DS, DTES64
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 16/17] KVM: x86/cpuid: Refactor host/guest CPU model consistency check
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 13/17] KVM: x86/pmu: Move pmc_speculative_in_use() to arch/x86/kvm/pmu.h
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 14/17] KVM: x86/pmu: Disable guest PEBS temporarily in two rare situations
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 15/17] KVM: x86/pmu: Add kvm_pmu_cap to optimize perf_get_x86_pmu_capability
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 12/17] KVM: x86: Set PEBS_UNAVAIL in IA32_MISC_ENABLE when PEBS is enabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 11/17] KVM: x86/pmu: Add PEBS_DATA_CFG MSR emulation to support adaptive PEBS
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 10/17] KVM: x86/pmu: Add IA32_DS_AREA MSR emulation to support guest DS
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 06/17] x86/perf/core: Add pebs_capable to store valid PEBS_COUNTER_MASK value
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 07/17] KVM: x86/pmu: Add IA32_PEBS_ENABLE MSR emulation for extended PEBS
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 09/17] KVM: x86/pmu: Adjust precise_ip to emulate Ice Lake guest PDIR counter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 08/17] KVM: x86/pmu: Reprogram PEBS event to emulate guest PEBS counter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 04/17] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 05/17] KVM: x86/pmu: Introduce the ctrl_mask value for fixed counter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 03/17] perf/x86/core: Pass "struct kvm_pmu *" to determine the guest values
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 02/17] perf/x86/intel: Handle guest PEBS overflow PMI for KVM guest
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 01/17] perf/x86/intel: Add EPT-Friendly PEBS for Ice Lake Server
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v11 00/17] KVM: x86/pmu: Add *basic* support to enable guest PEBS via DS
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 19/32] KVM: s390: mechanism to enable guest zPCI Interpretation
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: never clear irr_pending in kvm_apic_update_apicv
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: never clear irr_pending in kvm_apic_update_apicv
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: never clear irr_pending in kvm_apic_update_apicv
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86: Retry page fault if MMU reload is pending and root has no sp
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: never clear irr_pending in kvm_apic_update_apicv
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86: never clear irr_pending in kvm_apic_update_apicv
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: SVM: fix races in the AVIC incomplete IPI delivery to vCPUs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvmtool] Makefile: 'lvm version' works incorrect. Because CFLAGS can not get sub-make variable $(KVMTOOLS_VERSION)
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH 14/32] KVM: s390: pci: do initial setup for AEN interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] KVM: X86: Add and use shadow page with level promoted or acting as pae_root
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/pmu: Setup pmc->eventsel for fixed PMCs
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v1 12/12] target/riscv: Support virtual time context synchronization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 12/12] target/riscv: Support virtual time context synchronization
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 11/12] target/riscv: Implement virtual time adjusting with vm state changing
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 10/12] target/riscv: Add kvm_riscv_get/put_regs_timer
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 09/12] target/riscv: Add host cpu type
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 08/12] target/riscv: Handle KVM_EXIT_RISCV_SBI exit
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 07/12] target/riscv: Support setting external interrupt by KVM
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 06/12] target/riscv: Support start kernel directly by KVM
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 05/12] target/riscv: Implement kvm_arch_put_registers
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 04/12] target/riscv: Implement kvm_arch_get_registers
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 03/12] target/riscv: Implement function kvm_arch_init_vcpu
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 02/12] target/riscv: Add target/riscv/kvm.c to place the public kvm interface
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 01/12] update-linux-headers: Add asm-riscv/kvm.h
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- [PATCH v2 00/12] Add riscv kvm accel support
- From: Yifei Jiang <jiangyifei@xxxxxxxxxx>
- RE: [PATCH v1 12/12] target/riscv: Support virtual time context synchronization
- From: Jiangyifei <jiangyifei@xxxxxxxxxx>
- RE: [PATCH v1 10/12] target/riscv: Add kvm_riscv_get/put_regs_timer
- From: Jiangyifei <jiangyifei@xxxxxxxxxx>
- RE: [PATCH v1 08/12] target/riscv: Handle KVM_EXIT_RISCV_SBI exit
- From: Jiangyifei <jiangyifei@xxxxxxxxxx>
- RE: [PATCH v1 07/12] target/riscv: Support setting external interrupt by KVM
- From: Jiangyifei <jiangyifei@xxxxxxxxxx>
- RE: [PATCH v1 06/12] target/riscv: Support start kernel directly by KVM
- From: Jiangyifei <jiangyifei@xxxxxxxxxx>
- RE: [PATCH v1 05/12] target/riscv: Implement kvm_arch_put_registers
- From: Jiangyifei <jiangyifei@xxxxxxxxxx>
- RE: [PATCH v1 04/12] target/riscv: Implement kvm_arch_get_registers
- From: Jiangyifei <jiangyifei@xxxxxxxxxx>
- RE: [PATCH v1 03/12] target/riscv: Implement function kvm_arch_init_vcpu
- From: Jiangyifei <jiangyifei@xxxxxxxxxx>
- Re: [RFC PATCH v2 34/44] target/i386/tdx: set reboot action to shutdown when tdx
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 14/32] KVM: s390: pci: do initial setup for AEN interpretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/12] KVM: X86: Fix when shadow_root_level=5 && guest root_level<4
- From: Lai Jiangshan <laijs@xxxxxxxxxxxxxxxxx>
- [RFC PATCH 6/6] KVM: X86: Use level_promoted and pae_root shadow page for 32bit guests
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 5/6] KVM: X86: Alloc pae_root shadow page
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 4/6] KVM: X86: Introduce role.level_promoted
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 3/6] KVM: X86: Add arguement gfn and role to kvm_mmu_alloc_page()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 2/6] KVM: X86: Walk shadow page starting with shadow_root_level
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 1/6] KVM: X86: Check root_level only in fast_pgd_switch()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 0/6] KVM: X86: Add and use shadow page with level promoted or acting as pae_root
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] KVM: x86: avoid out of bounds indices for fixed performance counters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: avoid out of bounds indices for fixed performance counters
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- RE: [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 12/32] s390/pci: get SHM information from list pci
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH 14/32] KVM: s390: pci: do initial setup for AEN interpretation
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/14] x86/clear_page: add clear_page_uncached()
- From: Yu Xu <xuyu@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/14] x86/clear_page: add clear_page_uncached()
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH v1.1 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: Neeraj Upadhyay <quic_neeraju@xxxxxxxxxxx>
- Re: [PATCH v2] KVM: LAPIC: Per vCPU control over kvm_can_post_timer_interrupt
- From: Aili Yao <yaoaili126@xxxxxxxxx>
- [PATCH v2 kvmtool] Makefile: Calculate the correct kvmtool version
- From: "haibiao.xiao" <haibiao.xiao@xxxxxxxxx>
- Re: [PATCH kvmtool] Makefile: 'lvm version' works incorrect. Because CFLAGS can not get sub-make variable $(KVMTOOLS_VERSION)
- From: "haibiao.xiao" <haibiao.xiao@xxxxxxxxx>
- [PATCH kvm-next] selftests/kvm: remove unneeded variable
- Re: [RFC PATCH] vfio: Update/Clarify migration uAPI, add NDMA state
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 04/18] driver core: platform: Add driver dma ownership management
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: x86/pmu: Add pmc->intr to refactor kvm_perf_overflow{_intr}()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 2/3 v2] nSVM: Test MBZ bits in nested CR3 (nCR3)
- From: Krish Sadhukhan <krish.sadhukhan@xxxxxxxxxx>
- [PATCH 3/3 v2] nSVM: Use VCPU's implemented physical bit width to genereate MBZ mask for CR3
- From: Krish Sadhukhan <krish.sadhukhan@xxxxxxxxxx>
- [PATCH 1/3 v2] nSVM: Check MBZ bits in nested CR3 (nCR3) on VMRUN of nested guests
- From: Krish Sadhukhan <krish.sadhukhan@xxxxxxxxxx>
- [PATCH 0/3 v2] KVM: nSVM: Test MBZ bits in nested CR3 (nCR3)
- From: Krish Sadhukhan <krish.sadhukhan@xxxxxxxxxx>
- Re: [PATCH v3] vfio: Documentation for the migration region
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3] vfio: Documentation for the migration region
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [RFC PATCH] vfio: Update/Clarify migration uAPI, add NDMA state
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3] selftests: KVM: avoid failures due to reserved HyperTransport region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 17/15] KVM: X86: Ensure pae_root to be reconstructed for shadow paging if the guest PDPTEs is changed
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3] selftests: KVM: avoid failures due to reserved HyperTransport region
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] selftests: KVM: avoid failures due to reserved HyperTransport region
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 2/4] intel_iommu: Support IR-only mode without DMA translation
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 1/4] target/i386: Fix sanity check on max APIC ID / X2APIC enablement
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 4/4] intel_iommu: Fix irqchip / X2APIC configuration checks
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 3/4] intel_iommu: Only allow interrupt remapping to be enabled if it's supported
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- linux-next: manual merge of the kvm tree with the perf tree
- Re: [PATCH v2] selftests: KVM: avoid failures due to reserved HyperTransport region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] x86: Add test coverage for the routing logic when exceptions occur in L2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] selftests: KVM: avoid failures due to reserved HyperTransport region
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] selftests: sev_migrate_tests: Add mirror command tests
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 14/32] KVM: s390: pci: do initial setup for AEN interpretation
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 14/32] KVM: s390: pci: do initial setup for AEN interpretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/3] x86: Align L2's stacks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] x86: Fix a #GP from occurring in usermode's exception handlers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 14/32] KVM: s390: pci: do initial setup for AEN interpretation
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] KVM: x86/pmu: Count two basic events for emulated instructions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86/pmu: Refactoring find_arch_event() to pmc_perf_hw_id()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v1.1 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH] KVM: x86: avoid out of bounds indices for fixed performance counters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/pmu: Setup pmc->eventsel for fixed PMCs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 00/12] KVM: x86/xen: Add in-kernel Xen event channel delivery
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Always set kvm_run->if_flag
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/pmu: Setup pmc->eventsel for fixed PMCs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/pmu: Setup pmc->eventsel for fixed PMCs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 00/12] KVM: x86/xen: Add in-kernel Xen event channel delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/12] KVM: x86/xen: Add in-kernel Xen event channel delivery
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 08/12] KVM: Reinstate gfn_to_pfn_cache with invalidation support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: Neeraj Upadhyay <quic_neeraju@xxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Always set kvm_run->if_flag
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Always set kvm_run->if_flag
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86: Add test coverage for the routing logic when exceptions occur in L2
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86: Align L2's stacks
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: Fix a #GP from occurring in usermode's exception handlers
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] Add additional testing for routing L2 exceptions
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 2/3] selftests: sev_migrate_tests: Fix sev_ioctl()
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH 12/32] s390/pci: get SHM information from list pci
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH V0.1 2/3] selftests: sev_migrate_tests: Fix sev_ioctl()
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Always set kvm_run->if_flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: LAPIC: Per vCPU control over kvm_can_post_timer_interrupt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Always set kvm_run->if_flag
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v5 06/12] KVM: powerpc: Use Makefile.kvm for common files
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 03/12] KVM: s390: Use Makefile.kvm for common files
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: Raise #GP when clearing CR0_PG in 64 bit mode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Always set kvm_run->if_flag
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Always set kvm_run->if_flag
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 11/11] x86/kvm: Silence per-cpu pr_info noise about KVM clocks and steal time
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 03/11] rcu: Add mutex for rcu boost kthread spawning and affinity setting
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Always set kvm_run->if_flag
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 1/1] s390x: KVM: accept STSI for CPU topology information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/26] KVM: x86: Halt and APICv overhaul
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH kvmtool] Makefile: 'lvm version' works incorrect. Because CFLAGS can not get sub-make variable $(KVMTOOLS_VERSION)
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v5 1/1] s390x: KVM: accept STSI for CPU topology information
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 13/32] KVM: s390: pci: add basic kvm_zdev structure
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH v2] KVM: x86: Always set kvm_run->if_flag
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH 09/11] x86/boot: Support parallel startup of secondary CPUs
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 08/11] x86/tsc: Avoid synchronizing TSCs with multiple CPUs in parallel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Rep string I/O WARN removal and test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 12/32] s390/pci: get SHM information from list pci
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/26] KVM: x86: Halt and APICv overhaul
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 08/11] x86/tsc: Avoid synchronizing TSCs with multiple CPUs in parallel
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC v16 1/9] iommu: Introduce attach/detach_pasid_table API
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: SVM: fix races in the AVIC incomplete IPI delivery to vCPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: SVM: fix AVIC race of host->guest IPI delivery vs AVIC inhibition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: SVM: fix AVIC race of host->guest IPI delivery vs AVIC inhibition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 11/32] s390/pci: add helper function to find device by handle
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] KVM: SVM: fix AVIC race of host->guest IPI delivery vs AVIC inhibition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 10/32] s390/pci: stash dtsm and maxstbl
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 09/32] s390/pci: export some routines related to RPCIT processing
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH 09/11] x86/boot: Support parallel startup of secondary CPUs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 01/11] x86/apic/x2apic: Fix parallel handling of cluster_mask
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 08/11] x86/tsc: Avoid synchronizing TSCs with multiple CPUs in parallel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 10/11] x86/smp: Bring up secondary CPUs in parallel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 11/11] x86/kvm: Silence per-cpu pr_info noise about KVM clocks and steal time
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 04/11] cpu/hotplug: Add dynamic parallel bringup states before CPUHP_BRINGUP_CPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 07/11] cpu/hotplug: Move idle_thread_get() to <linux/smpboot.h>
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 02/11] rcu: Kill rnp->ofl_seq and use only rcu_state.ofl_lock for exclusion
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 06/11] x86/smpboot: Split up native_cpu_up into separate phases
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]