Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH] KVM: s390x: add debug statement for diag 318 CPNC data
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [RFC] KVM: x86: SVM: don't expose PV_SEND_IPI feature with AVIC
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Re: [RFC] KVM: x86: SVM: don't expose PV_SEND_IPI feature with AVIC
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390x: add debug statement for diag 318 CPNC data
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v2 7/7] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 2/7] KVM: x86: Fix WARNING that macros should not use a trailing semicolon
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 6/7] KVM: x86: Introduce definitions to support static calls for kvm_pmu_ops
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 5/7] KVM: x86: Move .pmu_ops to kvm_x86_init_ops and tagged as __initdata
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 4/7] KVM: x86: Copy kvm_pmu_ops by value to eliminate layer of indirection
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 3/7] KVM: x86: Move kvm_ops_static_call_update() to x86.c
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 1/7] KVM: x86: Export kvm_pmu_is_valid_msr() for nVMX
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 0/7] Use static_call for kvm_pmu_ops
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC] KVM: x86: SVM: don't expose PV_SEND_IPI feature with AVIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC] KVM: x86: SVM: don't expose PV_SEND_IPI feature with AVIC
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC] KVM: x86: SVM: don't expose PV_SEND_IPI feature with AVIC
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V10 05/18] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
- From: Liuxiangdong <liuxiangdong5@xxxxxxxxxx>
- [RFC] KVM: x86: SVM: don't expose PV_SEND_IPI feature with AVIC
- From: Kele Huang <huangkele@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Introduce definitions to support static calls for kvm_pmu_ops
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Copy kvm_pmu_ops by value to eliminate layer of indirection
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Copy kvm_pmu_ops by value to eliminate layer of indirection
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v4] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/2] KVM: s390: Extend the USER_SIGP capability
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- RE: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH V10 05/18] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH V10 05/18] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
- From: Liuxiangdong <liuxiangdong5@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v2 04/28] KVM: arm64: Keep consistency of ID registers between vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: There is a null-ptr-deref bug in kvm_dirty_ring_get in virt/kvm/dirty_ring.c
- From: butt3rflyh4ck <butterflyhuangxx@xxxxxxxxx>
- Re: [PATCH V10 05/18] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH V10 05/18] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
- From: Liuxiangdong <liuxiangdong5@xxxxxxxxxx>
- Re: [PATCH V10 05/18] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V10 05/18] KVM: x86/pmu: Set MSR_IA32_MISC_ENABLE_EMON bit when vPMU is enabled
- From: Liuxiangdong <liuxiangdong5@xxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] riscv: kvm: fix non-kernel-doc comment block
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] KVM: mips: Use kvm_get_vcpu() instead of open-coded access
- From: Philippe Mathieu-Daudé <f4bug@xxxxxxxxx>
- Re: [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PULL 07/20] migration/dirtyrate: implement dirty-ring dirtyrate calculation
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 5/5] RISC-V: KVM: Add SBI HSM extension in KVM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v4 4/5] RISC-V: KVM: Add v0.1 replacement SBI extensions defined in v02
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v4 3/5] RISC-V: KVM: Add SBI v0.2 base extension
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] RISC-V: KVM: Reorganize SBI code by moving SBI v0.1 to its own file
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] RISC-V: KVM: Mark the existing SBI implementation as v01
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] RISC-V: KVM: Mark the existing SBI implementation as v01
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] RISC-V: KVM: Mark the existing SBI implementation as v01
- From: Heinrich Schuchardt <xypron.glpk@xxxxxx>
- Re: [PATCH] KVM: move struct kvm_vcpu * array to the bottom of struct kvm
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v4 5/5] RISC-V: KVM: Add SBI HSM extension in KVM
- From: Atish Patra <atish.patra@xxxxxxx>
- [PATCH v4 4/5] RISC-V: KVM: Add v0.1 replacement SBI extensions defined in v02
- From: Atish Patra <atish.patra@xxxxxxx>
- [PATCH v4 3/5] RISC-V: KVM: Add SBI v0.2 base extension
- From: Atish Patra <atish.patra@xxxxxxx>
- [PATCH v4 2/5] RISC-V: KVM: Reorganize SBI code by moving SBI v0.1 to its own file
- From: Atish Patra <atish.patra@xxxxxxx>
- [PATCH v4 1/5] RISC-V: KVM: Mark the existing SBI implementation as v01
- From: Atish Patra <atish.patra@xxxxxxx>
- [PATCH v4 0/5] Add SBI v0.2 support for KVM
- From: Atish Patra <atish.patra@xxxxxxx>
- Re: [PATCH V11 4/5] selftest: KVM: Add open sev dev helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] kvm: x86: Convert return type of *is_valid_rdpmc_ecx() to bool
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86: Use kvm_get_vcpu() instead of open-coded access
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: Convert the kvm->vcpus array to a xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/5] KVM: s390: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/5] KVM: mips: Use kvm_get_vcpu() instead of open-coded access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/5] KVM: Move wiping of the kvm->vcpus array to common code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/5] KVM: Turn the vcpu array into an xarray
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/7] x86 UEFI: Refactor set up process
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: move struct kvm_vcpu * array to the bottom of struct kvm
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: RFC: KVM: x86/mmu: Eager Page Splitting
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Introduce definitions to support static calls for kvm_pmu_ops
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/4] KVM: nVMX: Don't use Enlightened MSR Bitmap for L3
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 1/4] KVM: nVMX: Don't use Enlightened MSR Bitmap for L3
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Copy kvm_pmu_ops by value to eliminate layer of indirection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Copy kvm_pmu_ops by value to eliminate layer of indirection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: move struct kvm_vcpu * array to the bottom of struct kvm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: nVMX: Track whether changes in L0 require MSR bitmap for L2 to be rebuilt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v17 14/15] s390/ap: notify drivers on config changed and scan complete callbacks
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] KVM: nVMX: Implement Enlightened MSR Bitmap feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: nVMX: Track whether changes in L0 require MSR bitmap for L2 to be rebuilt
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 1/4] KVM: nVMX: Don't use Enlightened MSR Bitmap for L3
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: 答复: [PATCH] KVM: x86: disable pv eoi if guest gives a wrong address
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- 答复: [PATCH] KVM: x86: disable pv eoi if guest gives a wrong address
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- [PATCH v2 2/2] KVM: x86: Make sure KVM_CPUID_FEATURES really are KVM_CPUID_FEATURES
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: x86: Add helper to consolidate core logic of SET_CPUID{2} flows
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: x86: Correct adjustment of KVM_CPUID_FEATURES
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Make sure KVM_CPUID_FEATURES really are KVM_CPUID_FEATURES
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable pv eoi if guest gives a wrong address
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: RFC: KVM: x86/mmu: Eager Page Splitting
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] vdpa: Avoid duplicate call to vp_vdpa get_status
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] vdpa: Mark vdpa_config_ops.get_vq_notification as optional
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v17 14/15] s390/ap: notify drivers on config changed and scan complete callbacks
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH] KVM: x86: check steal time address when enable steal time
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v2 18/28] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH] KVM: move struct kvm_vcpu * array to the bottom of struct kvm
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH] vdpa: Avoid duplicate call to vp_vdpa get_status
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH] vdpa: Mark vdpa_config_ops.get_vq_notification as optional
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH] KVM: x86: disable pv eoi if guest gives a wrong address
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v3 4/4] KVM: nVMX: Implement Enlightened MSR Bitmap feature
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: nVMX: Track whether changes in L0 require MSR bitmap for L2 to be rebuilt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/4] KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/4] KVM: nVMX: Don't use Enlightened MSR Bitmap for L3
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: x86: Convert return type of *is_valid_rdpmc_ecx() to bool
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V11 3/5] KVM: SEV: Add support for SEV-ES intra host migration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V11 2/5] KVM: SEV: Add support for SEV intra host migration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RFC: KVM: x86/mmu: Eager Page Splitting
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] kvm: x86: Convert return type of *is_valid_rdpmc_ecx() to bool
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH V11 2/5] KVM: SEV: Add support for SEV intra host migration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PROBLEM] Frequently get "irq 31: nobody cared" when passing through 2x GPUs that share same pci switch via vfio
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PULL 07/20] migration/dirtyrate: implement dirty-ring dirtyrate calculation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PULL 04/20] migration/dirtyrate: introduce struct and adjust DirtyRateStat
- From: Eric Blake <eblake@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Make sure KVM_CPUID_FEATURES really are KVM_CPUID_FEATURES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/5 V11] KVM: SEV: Refactor out sev_es_state struct
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] vdpa: Avoid duplicate call to vp_vdpa get_status
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH] vdpa: Mark vdpa_config_ops.get_vq_notification as optional
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- RE: [PATCH] KVM: x86: Make sure KVM_CPUID_FEATURES really are KVM_CPUID_FEATURES
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- [PATCH RESEND] KVM: x86: Make sure KVM_CPUID_FEATURES really are KVM_CPUID_FEATURES
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Make sure KVM_CPUID_FEATURES really are KVM_CPUID_FEATURES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Make sure KVM_CPUID_FEATURES really are KVM_CPUID_FEATURES
- From: Paul Durrant <paul@xxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86/xen: Maintain valid mapping of Xen shared_info page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/8] KVM: arm64: Setup base for hypercall firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v3 1/7] nitro_enclaves: Enable Arm64 support
- From: "Paraschiv, Andra-Irina" <andraprs@xxxxxxxxxx>
- Re: [RFC PATCH 6/8] tools: Import the firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [RFC PATCH 3/8] KVM: arm64: Add standard secure service calls firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH 2/2] KVM: RISC-V: Use common KVM implementation of MMU memory caches
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: RISC-V: Unmap stage2 mapping when deleting/moving a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: RISC-V: MMU bug fix and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 18/28] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v2 04/28] KVM: arm64: Keep consistency of ID registers between vCPUs
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH v2 01/28] KVM: arm64: Add has_reset_once flag for vcpu
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Boris Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 2/2] KVM: s390: Extend the USER_SIGP capability
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v17 14/15] s390/ap: notify drivers on config changed and scan complete callbacks
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v17 11/15] s390/ap: driver callback to indicate resource in use
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [RFC PATCH v2 2/2] KVM: s390: Extend the USER_SIGP capability
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/2] KVM: s390: Extend the USER_SIGP capability
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/16] perf: Ensure perf_guest_cbs aren't reloaded between !NULL check and deref
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: Move INVPCID type check from vmx and svm to the common kvm_handle_invpcid()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 06/16] KVM: selftests: add library for creating/interacting with SEV guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v17 14/15] s390/ap: notify drivers on config changed and scan complete callbacks
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [v4][PATCH 1/2] KVM: x86: don't print when fail to read/write pv eoi memory
- From: Li RongQing <lirongqing@xxxxxxxxx>
- [v4][PATCH 2/2] KVM: Clear pv eoi pending bit only when it is set
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: [v3][PATCH 2/2] KVM: Clear pv eoi pending bit only when it is set
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v17 11/15] s390/ap: driver callback to indicate resource in use
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [v3][PATCH 2/2] KVM: Clear pv eoi pending bit only when it is set
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: [v3][PATCH 1/2] KVM: x86: don't print when fail to read/write pv eoi memory
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [v3][PATCH 1/2] KVM: x86: don't print when fail to read/write pv eoi memory
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: [PATCH v3 01/16] perf: Ensure perf_guest_cbs aren't reloaded between !NULL check and deref
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC PATCH v3 0/5] x86/kvm: Virtual suspend time injection support
- From: Hikaru Nishida <hikalium@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/2] KVM: s390: Extend the USER_SIGP capability
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- 答复: [PATCH][v2] KVM: Clear pv eoi pending bit only when it is set
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [RFC 06/16] KVM: selftests: add library for creating/interacting with SEV guests
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: Move INVPCID type check from vmx and svm to the common kvm_handle_invpcid()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v3 0/2] Add wrapper to read GPR of INVPCID, INVVPID, and INVEPT
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2] kvm: mmu: Use fast PF path for access tracking of huge pages when possible
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- [PATCH v5.5 30/30] KVM: Dynamically allocate "new" memslots from the get-go
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 29/30] KVM: Wait 'til the bitter end to initialize the "new" memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 28/30] KVM: Optimize overlapping memslots check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 27/30] KVM: Optimize gfn lookup in kvm_zap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 26/30] KVM: Keep memslots in tree-based structures instead of array-based ones
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 25/30] KVM: s390: Introduce kvm_s390_get_gfn_end()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 24/30] KVM: Use interval tree to do fast hva lookup in memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 23/30] KVM: Resolve memslot ID via a hash table instead of via a static array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 20/30] KVM: x86: Use nr_memslot_pages to avoid traversing the memslots array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 22/30] KVM: Move WARN on invalid memslot index to update_memslots()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 21/30] KVM: Integrate gfn_to_memslot_approx() into search_memslots()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 18/30] KVM: Don't make a full copy of the old memslot in __kvm_set_memory_region()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 19/30] KVM: x86: Don't call kvm_mmu_change_mmu_pages() if the count hasn't changed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 17/30] KVM: s390: Skip gfn/size sanity checks on memslot DELETE or FLAGS_ONLY
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 16/30] KVM: x86: Don't assume old/new memslots are non-NULL at memslot commit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 15/30] KVM: Use prepare/commit hooks to handle generic memslot metadata updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 14/30] KVM: Stop passing kvm_userspace_memory_region to arch memslot hooks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 13/30] KVM: RISC-V: Use "new" memslot instead of userspace memory region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 12/30] KVM: x86: Use "new" memslot instead of userspace memory region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 11/30] KVM: s390: Use "new" memslot instead of userspace memory region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 10/30] KVM: PPC: Avoid referencing userspace memory region in memslot updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 09/30] KVM: MIPS: Drop pr_debug from memslot commit to avoid using "mem"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 08/30] KVM: arm64: Use "new" memslot instead of userspace memory region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 07/30] KVM: Let/force architectures to deal with arch specific memslot data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 06/30] KVM: Use "new" memslot's address space ID instead of dedicated param
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 05/30] KVM: Resync only arch fields when slots_arch_lock gets reacquired
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 04/30] KVM: Open code kvm_delete_memslot() into its only caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 03/30] KVM: Require total number of memslot pages to fit in an unsigned long
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 02/30] KVM: Disallow user memslot with size that exceeds "unsigned long"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 01/30] KVM: Ensure local memslot copies operate on up-to-date arch-specific data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5.5 00/30] KVM: Scalable memslots implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 6/8] tools: Import the firmware registers
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [RFC PATCH 3/8] KVM: arm64: Add standard secure service calls firmware register
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: Move INVPCID type check from vmx and svm to the common kvm_handle_invpcid()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/2] Add wrapper to read GPR of INVPCID, INVVPID, and INVEPT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: VMX: Add a wrapper to read index of GPR for INVPCID, INVVPID, and INVEPT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 2/8] KVM: arm64: Setup base for hypercall firmware registers
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [GIT PULL] vhost,virtio,vhost: fixes,features
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] kvm: mmu: Use fast PF path for access tracking of huge pages when possible
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v3 2/2] KVM: Move INVPCID type check from vmx and svm to the common kvm_handle_invpcid()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v3 1/2] KVM: VMX: Add a wrapper to read index of GPR for INVPCID, INVVPID, and INVEPT
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v3 0/2] Add wrapper to read GPR of INVPCID, INVVPID, and INVEPT
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [GIT PULL] vhost,virtio,vhost: fixes,features
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5 0/6] optimize the downtime for vfio migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v5.16-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 2/2] KVM: Move INVPCID type check from vmx and svm to the common kvm_handle_invpcid()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- [GIT PULL] VFIO updates for v5.16-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: Move INVPCID type check from vmx and svm to the common kvm_handle_invpcid()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: Move INVPCID type check from vmx and svm to the common kvm_handle_invpcid()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: VMX: Add a wrapper to read index of GPR for INVPCID, INVVPID, and INVEPT
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 0/2] Add wrapper to read GPR of INVPCID, INVVPID, and INVEPT
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 7/7] nSVM: use vmcb_ctrl_area_cached instead of vmcb_control_area in struct svm_nested_state
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 4/7] nSVM: use vmcb_save_area_cached in nested_vmcb_valid_sregs()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 3/7] nSVM: rename nested_load_control_from_vmcb12 in nested_copy_vmcb_control_to_cache
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 2/7] nSVM: introduce smv->nested.save to cache save area fields
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Properly dereference rcu-protected TDP MMU sptep iterator
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Properly dereference rcu-protected TDP MMU sptep iterator
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v1] nested.c: replace spaces with tabs
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 05/12] x86/sev: Use GHCB protocol version 2 if supported
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 01/13] KVM: x86: Cache total page count to avoid traversing the memslot array
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] KVM: nVMX: Enlightened MSR Bitmap feature for Hyper-V on KVM
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH][v2] KVM: Clear pv eoi pending bit only when it is set
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v5 01/13] KVM: x86: Cache total page count to avoid traversing the memslot array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 03/12] x86/sev: Save and print negotiated GHCB protocol version
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5 6/7] nSVM: introduce struct vmcb_ctrl_area_cached
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v5 2/7] nSVM: introduce smv->nested.save to cache save area fields
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v5 5/7] nSVM: use svm->nested.save to load vmcb12 registers and avoid TOC/TOU races
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v5 7/7] nSVM: use vmcb_ctrl_area_cached instead of vmcb_control_area in struct svm_nested_state
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v5 1/7] KVM: nSVM: move nested_vmcb_check_cr3_cr4 logic in nested_vmcb_valid_sregs
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v5 4/7] nSVM: use vmcb_save_area_cached in nested_vmcb_valid_sregs()
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v5 3/7] nSVM: rename nested_load_control_from_vmcb12 in nested_copy_vmcb_control_to_cache
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v5 0/7] KVM: nSVM: avoid TOC/TOU race when checking vmcb12
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 0/7] KVM: nSVM: avoid TOC/TOU race when checking vmcb12
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC 02/20] vfio: Add device class for /dev/vfio/devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
- From: Yao Yuan <yaoyuan0329os@xxxxxxxxx>
- Re: [PATCH v5 01/13] KVM: x86: Cache total page count to avoid traversing the memslot array
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 6/7] nSVM: introduce struct vmcb_ctrl_area_cached
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v4 7/7] nSVM: use vmcb_ctrl_area_cached instead of vmcb_control_area in struct svm_nested_state
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v4 3/7] nSVM: rename nested_load_control_from_vmcb12 in nested_copy_vmcb_control_to_cache
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v4 5/7] nSVM: use svm->nested.save to load vmcb12 registers and avoid TOC/TOU races
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v4 4/7] nSVM: use vmcb_save_area_cached in nested_vmcb_valid_sregs()
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v4 1/7] KVM: nSVM: move nested_vmcb_check_cr3_cr4 logic in nested_vmcb_valid_sregs
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v4 2/7] nSVM: introduce smv->nested.save to cache save area fields
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH v4 0/7] KVM: nSVM: avoid TOC/TOU race when checking vmcb12
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: x86: inhibit APICv when KVM_GUESTDBG_BLOCKIRQ active
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Two minor fixes to apic code
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v5 6/6] vfio: defer to commit kvm irq routing when enable msi/msix
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v5 5/6] Revert "vfio: Avoid disabling and enabling vectors repeatedly in VFIO migration"
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v5 4/6] kvm: irqchip: extract kvm_irqchip_add_deferred_msi_route
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v5 0/6] optimize the downtime for vfio migration
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v5 3/6] vfio: simplify the failure path in vfio_msi_enable
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v5 2/6] vfio: move re-enabling INTX out of the common helper
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v5 1/6] vfio: simplify the conditional statements in vfio_msi_enable
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 6/7] s390x: virtio tests setup
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/7] s390x: css: registering IRQ
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 6/7] s390x: virtio tests setup
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/7] virtio: implement the virtio_add_inbuf routine
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/7] s390x: virtio: CCW transport implementation
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/7] s390x: virtio: CCW transport implementation
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/7] arm: virtio: move VIRTIO transport initialization inside virtio-mmio
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH V9 7/9] vhost: introduce vDPA-based backend
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/7] s390x: css: add callback for emnumeration
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 2/3] KVM: x86: Introduce definitions to support static calls for kvm_pmu_ops
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 1/3] KVM: x86: Copy kvm_pmu_ops by value to eliminate layer of indirection
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 0/3] Use static_call for kvm_pmu_ops
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/7] arm: virtio: move VIRTIO transport initialization inside virtio-mmio
- From: Thomas Huth <thuth@xxxxxxxxxx>
- RE: [PATCH v4 6/6] vfio: defer to commit kvm irq routing when enable msi/msix
- From: "Longpeng (Mike, Cloud Infrastructure Service Product Dept.)" <longpeng2@xxxxxxxxxx>
- [PATCH] RISC-V: KVM:Remove unneeded semicolon
- Re: [PATCH v5 3/4] docs: (further further) remove non-reference uses of single backticks
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v5 2/4] docs: (further) remove non-reference uses of single backticks
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [RFC PATCH v2 21/28] KVM: arm64: Introduce framework to trap disabled features
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 22/28] KVM: arm64: Trap disabled features of ID_AA64PFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 25/28] KVM: arm64: Trap disabled features of ID_AA64MMFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 26/28] KVM: arm64: Trap disabled features of ID_AA64ISAR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 27/28] KVM: arm64: Activate trapping of disabled CPU features for the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 28/28] KVM: arm64: selftests: Introduce id_reg_test
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 23/28] KVM: arm64: Trap disabled features of ID_AA64PFR1_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 24/28] KVM: arm64: Trap disabled features of ID_AA64DFR0_EL1
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 20/28] KVM: arm64: Use vcpu->arch.mdcr_el2 to track value of mdcr_el2
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 19/28] KVM: arm64: Use vcpu->arch cptr_el2 to track value of cptr_el2 for VHE
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 18/28] KVM: arm64: Introduce KVM_CAP_ARM_ID_REG_WRITABLE capability
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 17/28] KVM: arm64: Add consistency checking for frac fields of ID registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 16/28] KVM: arm64: Make ID registers without id_reg_info writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 13/28] KVM: arm64: Make ID_DFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 15/28] KVM: arm64: Make MVFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 14/28] KVM: arm64: Make ID_MMFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 12/28] KVM: arm64: Make ID_DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 11/28] KVM: arm64: Make ID_AA64DFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 10/28] KVM: arm64: Hide IMPLEMENTATION DEFINED PMU support for the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 09/28] KVM: arm64: Make ID_AA64MMFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 08/28] KVM: arm64: Make ID_AA64ISAR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 07/28] KVM: arm64: Make ID_AA64ISAR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 06/28] KVM: arm64: Make ID_AA64PFR1_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 05/28] KVM: arm64: Make ID_AA64PFR0_EL1 writable
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 04/28] KVM: arm64: Keep consistency of ID registers between vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 03/28] KVM: arm64: Introduce struct id_reg_info
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 02/28] KVM: arm64: Save ID registers' sanitized value per vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 01/28] KVM: arm64: Add has_reset_once flag for vcpu
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH v2 00/28] KVM: arm64: Make CPU ID registers writable by userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v1 3/5] KVM: x86: nVMX: VMCS12 field's read/write respects field existence bitmap
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Fix kvm_map_gfn()/kvm_unmap_gfn() to take a kvm as their names imply
- From: kernel test robot <lkp@xxxxxxxxx>
- [kvm-unit-tests PATCH v2] x86: Look up the PTEs rather than assuming them
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] nitro_enclaves: Fix implicit type conversion
- From: "Paraschiv, Andra-Irina" <andraprs@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [RFC PATCH v2 2/2] KVM: s390: Extend the USER_SIGP capability
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [RFC PATCH v2 0/2] s390x: Improvements to SIGP handling [KVM]
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [RFC PATCH v2 1/2] Capability/IOCTL/Documentation
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v17 00/15] s390/vfio-ap: dynamic configuration support
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Add a wrapper for reading INVPCID/INVEPT/INVVPID type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 4/4] docs/sphinx: change default role to "any"
- From: John Snow <jsnow@xxxxxxxxxx>
- [PATCH v5 3/4] docs: (further further) remove non-reference uses of single backticks
- From: John Snow <jsnow@xxxxxxxxxx>
- [PATCH v5 2/4] docs: (further) remove non-reference uses of single backticks
- From: John Snow <jsnow@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 1/4] docs: remove non-reference uses of single backticks
- From: John Snow <jsnow@xxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5 0/4] docs/sphinx: change default `role` to "any"
- From: John Snow <jsnow@xxxxxxxxxx>
- Re: [GIT PULL] First batch of KVM changes for Linux 5.16
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Brijesh Singh <brijesh.singh@xxxxxxx>
- Re: [PATCH v2 01/12] kexec: Allow architecture code to opt-out at runtime
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] KVM: VMX: Add a wrapper for reading INVPCID/INVEPT/INVVPID type
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] kvm: mmu: Use fast PF path for access tracking of huge pages when possible
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv for 5.16 take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 01/12] kexec: Allow architecture code to opt-out at runtime
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 01/12] kexec: Allow architecture code to opt-out at runtime
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH v6 15/42] x86/sev: Remove do_early_exception() forward declarations
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] First batch of KVM changes for Linux 5.16
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 14/42] x86/sev: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 13/42] x86/compressed: Register GHCB memory when SEV-SNP is active
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] kexec: Allow architecture code to opt-out at runtime
- From: Joerg Roedel <jroedel@xxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V9 7/9] vhost: introduce vDPA-based backend
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PULL 00/20] Migration 20211031 patches
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Update powerpc KVM entry
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: SVM: add migration support for nested TSC scaling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [RFC 02/20] vfio: Add device class for /dev/vfio/devices
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 6/6] selftests: KVM: Test OS lock behavior
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 5/6] selftests: KVM: Add OSLSR_EL1 to the list of blessed regs
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: arm64: Emulate the OS Lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: arm64: Allow guest to set the OSLK bit
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: arm64: Correctly treat writes to OSLSR_EL1 as undefined
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 0/6] KVM: arm64: Emulate the OS lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 3/4] KVM: x86: Use different callback if msr access comes from the emulator
- From: Hou Wenlong <houwenlong93@xxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] KVM: x86: Exit to userspace if RDMSR/WRMSR emulation returns X86EMUL_IO_NEEDED
- From: Hou Wenlong <houwenlong93@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] KVM: x86: Add an emulation type to handle completion of user exits
- From: Hou Wenlong <houwenlong93@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] KVM: x86: Handle 32-bit wrap of EIP for EMULTYPE_SKIP with flat code seg
- From: Hou Wenlong <houwenlong93@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] KVM: x86: some fixes about msr access emulation
- From: Hou Wenlong <houwenlong93@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH V9 7/9] vhost: introduce vDPA-based backend
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH] kvm: mmu: Use fast PF path for access tracking of huge pages when possible
- From: Junaid Shahid <junaids@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: Fix kvm_map_gfn()/kvm_unmap_gfn() to take a kvm as their names imply
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86/xen: Maintain valid mapping of Xen shared_info page
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [RFC PATCH 8/8] selftests: KVM: aarch64: Introduce hypercall ABI test
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 7/8] tools: Import ARM SMCCC definitions
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 6/8] tools: Import the firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 5/8] KVM: arm64: Add vendor hypervisor service calls firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 4/8] KVM: arm64: Add standard hypervisor service calls firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 3/8] KVM: arm64: Add standard secure service calls firmware register
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 2/8] KVM: arm64: Setup base for hypercall firmware registers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 1/8] KVM: arm64: Factor out firmware register handling from psci.c
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 0/8] KVM: arm64: Add support for hypercall services selection
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 0/7] x86_64 UEFI set up process refactor and scripts fixes
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- Re: [PATCH v5 01/13] KVM: x86: Cache total page count to avoid traversing the memslot array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 00/12] virtio-mem: Expose device memory via multiple memslots
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PULL 12/20] virtio-mem: Implement replay_discarded RamDiscardManager callback
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 20/20] migration/dirtyrate: implement dirty-bitmap dirtyrate calculation
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 19/20] memory: introduce total_dirty_pages to stat dirty pages
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 18/20] migration/ram: Handle RAMBlocks with a RamDiscardManager on background snapshots
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 17/20] migration/ram: Factor out populating pages readable in ram_block_populate_pages()
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 16/20] migration: Simplify alignment and alignment checks
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 15/20] migration/postcopy: Handle RAMBlocks with a RamDiscardManager on the destination
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 13/20] migration/ram: Handle RAMBlocks with a RamDiscardManager on the migration source
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 14/20] virtio-mem: Drop precopy notifier
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 11/20] memory: Introduce replay_discarded callback for RamDiscardManager
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 10/20] dump-guest-memory: Block live migration
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 09/20] migration: Add migrate_add_blocker_internal()
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 08/20] migration: Make migration blocker work for snapshots too
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 07/20] migration/dirtyrate: implement dirty-ring dirtyrate calculation
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 06/20] migration/dirtyrate: move init step of calculation to main thread
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 05/20] migration/dirtyrate: adjust order of registering thread
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 04/20] migration/dirtyrate: introduce struct and adjust DirtyRateStat
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 03/20] memory: make global_dirty_tracking a bitmask
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 02/20] KVM: introduce dirty_pages and kvm_dirty_ring_enabled
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 01/20] migration/rdma: Fix out of order wrid
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 00/20] Migration 20211031 patches
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v2 01/12] kexec: Allow architecture code to opt-out at runtime
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 5/6] KVM: x86/xen: Maintain valid mapping of Xen shared_inf=
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86/xen: Maintain valid mapping of Xen shared_inf=
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 1/6] KVM: x86/xen: Fix get_attr of KVM_XEN_ATTR_TYPE_SHARED_INFO
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 4/6] KVM: Fix kvm_map_gfn()/kvm_unmap_gfn() to take a kvm as their names imply
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 5/6] KVM: x86/xen: Maintain valid mapping of Xen shared_info page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 3/6] KVM: x86/xen: Use sizeof_field() instead of open-coding it
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 0/6] KVM: x86/xen: Add in-kernel Xen event channel delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 6/6] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 2/6] KVM: selftests: Add event channel upcall support to xen_shinfo_test
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 02/16] KVM: selftests: add hooks for managing encrypted guest memory
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [RFC 01/16] KVM: selftests: move vm_phy_pages_alloc() earlier in file
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Look up the PTE rather than assuming it
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: VMX: fix instruction skipping when handling UD exception
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: SVM: add module param to control LBR virtualization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: SVM: add module param to control LBR virtualization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 01/12] kexec: Allow architecture code to opt-out at runtime
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: selftests: test KVM_GUESTDBG_BLOCKIRQ
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Look up the PTE rather than assuming it
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: x86/xen: Maintain valid mapping of Xen shared_inf=
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V9 7/9] vhost: introduce vDPA-based backend
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] KVM: x86: Fix recording of guest steal time / preempted status
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 6/6] KVM: x86: SVM: implement nested vGIF
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 5/6] KVM: x86: nSVM: support PAUSE filter threshold and count when cpu_pm=on
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: x86: nSVM: implement nested VMLOAD/VMSAVE
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: x86: nSVM: implement nested LBR virtualization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: x86: nSVM: correctly virtualize LBR msrs when L2 is running
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: x86: SVM: add module param to control LBR virtualization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 0/6] nSVM optional features
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: SVM: add migration support for nested TSC scaling
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 2/3] gdbstub: implement NOIRQ support for single step on KVM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: use KVM_{GET|SET}_SREGS2 when supported.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: qemu patches for few KVM features I developed
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC 02/20] vfio: Add device class for /dev/vfio/devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [GIT PULL] KVM/riscv for 5.16 take #2
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: x86: Add checks for reserved-to-zero Hyper-V hypercall fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86: Reject fixeds-size Hyper-V hypercalls with non-zero "var_cnt"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Improve exception safe wrappers in emulate.c
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH v2 4/8] KVM: x86: Add a helper to get the sparse VP_SET for IPIs and TLB flushes
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: x86: Refactor kvm_hv_flush_tlb() to reduce indentation
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 2/8] KVM: x86: Get the number of Hyper-V sparse banks from the VARHEAD field
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: x86: Don't bother reading sparse banks that end up being ignored
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Ignore sparse banks size for an "all CPUs", non-sparse IPI req
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [GIT PULL 00/17] KVM: s390: Fixes and Features for 5.16
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 0/7] x86_64 UEFI set up process refactor and scripts fixes
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PROBLEM] Frequently get "irq 31: nobody cared" when passing through 2x GPUs that share same pci switch via vfio
- From: Matthew Ruffell <matthew.ruffell@xxxxxxxxxxxxx>
- Re: [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 43/43] KVM: VMX: Don't do full kick when handling posted interrupt wakeup
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 42/43] KVM: VMX: Fold fallback path into triggering posted IRQ helper
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 41/43] KVM: VMX: Pass desired vector instead of bool for triggering posted IRQ
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 40/43] KVM: VMX: Wake vCPU when delivering posted IRQ even if vCPU == this vCPU
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 39/43] KVM: VMX: Don't do full kick when triggering posted interrupt "fails"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 0/7] x86_64 UEFI set up process refactor and scripts fixes
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 5/7] x86 UEFI: Exit QEMU with return code
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 5.15 (rc8 or final)
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 38/43] KVM: Drop defunct kvm_arch_vcpu_(un)blocking() hooks
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 37/43] KVM: SVM: Unconditionally mark AVIC as running on vCPU load (with APICv)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 0/7] x86_64 UEFI set up process refactor and scripts fixes
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 6/7] scripts: Generalize EFI check
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v2 36/43] KVM: SVM: Don't bother checking for "running" AVIC when kicking for IPIs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [GIT PULL 17/17] KVM: s390: add debug statement for diag 318 CPNC data
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 15/17] KVM: s390: Fix handle_sske page fault handling
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 16/17] KVM: s390: pv: properly handle page flags for protected guests
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 13/17] KVM: s390: Simplify SIGP Set Arch handling
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 14/17] KVM: s390: Add a routine for setting userspace CPU state
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 12/17] KVM: s390: pv: avoid stalls when making pages secure
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 11/17] KVM: s390: pv: avoid stalls for kvm_s390_pv_init_vm
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 10/17] KVM: s390: pv: avoid double free of sida page
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 09/17] KVM: s390: pv: add macros for UVC CC values
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 08/17] s390/mm: optimize reset_guest_reference_bit()
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 07/17] s390/mm: optimize set_guest_storage_key()
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 03/17] s390/mm: validate VMA in PGSTE manipulation functions
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 05/17] s390/uv: fully validate the VMA before calling follow_page()
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 06/17] s390/mm: no need for pte_alloc_map_lock() if we know the pmd is present
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 04/17] s390/mm: fix VMA and page table handling code in storage key handling functions
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 02/17] s390/gmap: don't unconditionally call pte_unmap_unlock() in __gmap_zap()
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 01/17] s390/gmap: validate VMA in __gmap_zap()
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [GIT PULL 00/17] KVM: s390: Fixes and Features for 5.16
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 5/7] x86 UEFI: Exit QEMU with return code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 0/7] x86_64 UEFI set up process refactor and scripts fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 6/7] scripts: Generalize EFI check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 5.15 (rc8 or final)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 5.16
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 7/7] x86 UEFI: Make run_tests.sh (mostly) work under UEFI
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 6/7] scripts: Generalize EFI check
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 5/7] x86 UEFI: Exit QEMU with return code
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 4/7] x86 UEFI: Set UEFI OVMF as readonly
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 3/7] x86 UEFI: Convert x86 test cases to PIC
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/7] x86 UEFI: Refactor set up process
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/7] x86 UEFI: Remove mixed_mode
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/7] x86_64 UEFI set up process refactor and scripts fixes
- From: Zixuan Wang <zxwang42@xxxxxxxxx>
- [PATCH 5/5] KVM: x86/xen: Add KVM_IRQ_ROUTING_XEN_EVTCHN and event channel delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/5] KVM: Fix kvm_map_gfn()/kvm_unmap_gfn() to take a kvm as their names imply
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 4/5] KVM: x86/xen: Reinstate mapping of Xen shared_info page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/5] KVM: selftests: Add event channel upcall support to xen_shinfo_test
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/5] KVM: x86/xen: Use sizeof_field() instead of open-coding it
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH -next] RISC-V: KVM: fix boolreturn.cocci warnings
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
- From: Lai Jiangshan <jiangshanlai+lkml@xxxxxxxxx>
- Re: [PATCH v5 13/13] KVM: Optimize overlapping memslots check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 8/8] KVM: x86: Add checks for reserved-to-zero Hyper-V hypercall fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/8] KVM: x86: Refactor kvm_hv_flush_tlb() to reduce indentation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/8] KVM: x86: Reject fixeds-size Hyper-V hypercalls with non-zero "var_cnt"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/8] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/8] KVM: x86: Don't bother reading sparse banks that end up being ignored
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/8] KVM: x86: Add a helper to get the sparse VP_SET for IPIs and TLB flushes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/8] KVM: x86: Get the number of Hyper-V sparse banks from the VARHEAD field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86: Ignore sparse banks size for an "all CPUs", non-sparse IPI req
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/8] KVM: x86: Hyper-V hypercall fix and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Look up the PTE rather than assuming it
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Look up the PTE rather than assuming it
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Look up the PTE rather than assuming it
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v1 3/5] KVM: x86: nVMX: VMCS12 field's read/write respects field existence bitmap
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: fix code indentation issues
- From: Carlos Llamas <cmllamas@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 13/13] KVM: Optimize overlapping memslots check
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 10/20] iommu/iommufd: Add IOMMU_DEVICE_GET_INFO
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC 20/20] Doc: Add documentation for /dev/iommu
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Allow the guest to change the OS Lock status
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: VMX: fix instruction skipping when handling UD exception
- From: Hou Wenlong <houwenlong93@xxxxxxxxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [RFC 02/20] vfio: Add device class for /dev/vfio/devices
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- [GIT PULL] KVM/arm64 updates for 5.16
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [RFC 20/20] Doc: Add documentation for /dev/iommu
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
- From: Lai Jiangshan <jiangshanlai+lkml@xxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Allow the guest to change the OS Lock status
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Raise KVM's reported debug architecture to v8.2
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Stash OSLSR_EL1 in the cpu context
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: Fixes for the exposed debug architecture
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 11/13] KVM: Keep memslots in tree-based structures instead of array-based ones
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [EXTERNAL] [PATCH] KVM: x86/xen: Fix runstate updates to be atomic when preempting vCPU
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 0/4] Move vfio_ccw to the new mdev API
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 13/13] KVM: Optimize overlapping memslots check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] virtio: last minute fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Take srcu lock in post_kvm_run_save()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 35/43] KVM: SVM: Signal AVIC doorbell iff vCPU is in guest mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 34/43] KVM: x86: Remove defunct pre_block/post_block kvm_x86_ops hooks
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 33/43] KVM: x86: Unexport LAPIC's switch_to_{hv,sw}_timer() helpers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 32/43] KVM: VMX: Move preemption timer <=> hrtimer dance to common x86
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/3] RISC-V: Enable KVM in RV64 and RV32 defconfigs as a module
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 21/43] KVM: VMX: Clean up PI pre/post-block WARNs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 31/43] KVM: Move x86 VMX's posted interrupt list_head to vcpu_vmx
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 30/43] KVM: Drop unused kvm_vcpu.pre_pcpu field
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 29/43] KVM: VMX: Handle PI wakeup shenanigans during vcpu_put/load
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver for mlx5 devices
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v6 11/42] x86/sev: Check the vmpl level
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/3] RISC-V: KVM: Few assorted changes
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [syzbot] BUG: spinlock bad magic in synchronize_srcu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: s390: gaccess: Cleanup access to guest frames
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 22/43] KVM: VMX: Drop unnecessary PI logic to handle impossible conditions
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: s390: gaccess: Cleanup access to guest frames
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Take srcu lock in post_kvm_run_save()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Take srcu lock in post_kvm_run_save()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] RISC-V: KVM: Few assorted changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: s390: gaccess: Refactor gpa and length calculation
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2] KVM: s390: gaccess: Refactor access address range check
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 3/3] KVM: s390: gaccess: Cleanup access to guest frames
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2 0/3] KVM: s390: Some gaccess cleanup
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 23/37] KVM: nVMX: Add helper to handle TLB flushes on nested VM-Enter/VM-Exit
- From: Lai Jiangshan <jiangshanlai+lkml@xxxxxxxxx>
- Re: [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 28/43] KVM: VMX: Remove vCPU from PI wakeup list before updating PID.NV
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Protect set_hv_tscchange_cb() against getting preempted
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 27/43] KVM: VMX: Move Posted Interrupt ndst computation out of write loop
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 5/5] arm64/fpsimd: Document the use of TIF_FOREIGN_FPSTATE by KVM
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 4/5] KVM: arm64: Stop mapping current thread_info at EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/5] KVM: arm64: Introduce flag shadowing TIF_FOREIGN_FPSTATE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 2/5] KVM: arm64: Get rid of host SVE tracking/saving
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/5] KVM: arm64: Rework FPSIMD/SVE tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 1/5] KVM: arm64: Reorder vcpu flag definitions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 26/43] KVM: VMX: Read Posted Interrupt "control" exactly once per loop iteration
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]