Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH V2 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: fix wrong VIR 37 when MSO is used
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/2] s390x: sie: ensure guests are aligned to 2GB
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/2] s390x: spec_ex-sie: refactor to use snippet API
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/2] s390x: Align SIE tests to 2GB
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] KVM changes for Linux 6.7 merge window
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH V2 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: fix wrong VIR 37 when MSO is used
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 10/17] KVM: Implement KVM_CAP_USERFAULT_ON_MISSING by atomizing __gfn_to_pfn_memslot() calls
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v5 10/17] KVM: Implement KVM_CAP_USERFAULT_ON_MISSING by atomizing __gfn_to_pfn_memslot() calls
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 18/25] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 14/25] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 11/25] KVM: x86: Report XSS as to-be-saved if there are supported features
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 10/25] KVM: x86: Add kvm_msr_{read,write}() helpers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 09/25] KVM: x86: Rework cpuid_get_supported_xcr0() to operate on vCPU data
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 3/3] virt/kvm: copy userspace-array safely
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH 2/3] arch/s390/kvm: copy userspace-array safely
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH 1/3] arch/x86/kvm: copy user-array with overflow-check
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- [PATCH 0/3] Use new wrappers to copy userspace arrays
- From: Philipp Stanner <pstanner@xxxxxxxxxx>
- Re: [PATCH 7/9] x86/sev-es: Include XSS value in GHCB CPUID request
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v7 04/11] KVM: pfncache: base offset check on khva rather than gpa
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH 6/9] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 5/9] KVM: SVM: Save shadow stack host state on VMRUN
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 9/9] KVM: SVM: Add CET features to supported_xss
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 8/9] KVM: SVM: Use KVM-governed features to track SHSTK
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 4/9] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/9] KVM: x86: SVM: Emulate reads and writes to shadow stack MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v7 05/11] KVM: pfncache: allow a cache to be activated with a fixed (userspace) HVA
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH 2/9] KVM: x86: SVM: Update dump_vmcb with shadow stack save area additions
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v7 02/11] KVM: pfncache: add a mark-dirty helper
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [Patch 1/2] KVM: x86/pmu: Add Intel CPUID-hinted TopDown slots event
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM changes for Linux 6.7 merge window
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 01/11] KVM: pfncache: add a map helper function
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [RFC PATCH v1 8/8] KVM: selftests: x86: Add KVM forced emulation prefix capability
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [RFC PATCH v1 7/8] KVM: selftests: x86: Support vcpu run in user mode
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [RFC PATCH v1 6/8] KVM: selftests: x86: Allow user to access user-mode address and I/O address space
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [RFC PATCH v1 5/8] KVM: selftests: x86: Prepare setup for user mode support
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [RFC PATCH v1 4/8] KVM : selftests : Adapt selftest cases to kernel canonical linear address
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [RFC PATCH v1 3/8] KVM: selftests: Add virt_arch_ucall_prealloc() arch specific implementation
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [RFC PATCH v1 2/8] KVM: selftests: x86: Support guest running on canonical linear-address organization
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [RFC PATCH v1 1/8] KVM: selftests: x86: Fix bug in addr_arch_gva2gpa()
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [RFC PATCH v1 0/8] KVM: seftests: Support guest user mode execution and running
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v13 15/35] fs: Export anon_inode_getfile_secure() for use by KVM
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [PATCH v5] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Paul Durrant <paul@xxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/2] KVM: documentation update to halt polling
- From: Parshuram Sangle <parshuram.sangle@xxxxxxxxx>
- [PATCH 1/2] KVM: enable halt polling shrink parameter by default
- From: Parshuram Sangle <parshuram.sangle@xxxxxxxxx>
- [PATCH 0/2] KVM: enable halt poll shrink parameter
- From: Parshuram Sangle <parshuram.sangle@xxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/1] KVM: s390: vsie: fix wrong VIR 37 when MSO is used
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 12/35] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 22/35] KVM: Allow arch code to track number of memslot address spaces per VM
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 12/35] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 21/35] KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 20/35] KVM: x86/mmu: Handle page fault for private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v5 11/17] KVM: x86: Enable KVM_CAP_USERFAULT_ON_MISSING
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v13 18/35] KVM: x86: "Reset" vcpu->run->exit_reason early in KVM_RUN
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v5 07/14] x86/sev: Move and reorganize sev guest request api
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v13 12/35] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 11/35] KVM: Drop .on_unlock() mmu_notifier hook
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 10/35] KVM: Add a dedicated mmu_notifier flag for reclaiming freed memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH net] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: Shigeru Yoshida <syoshida@xxxxxxxxxx>
- Re: [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH v3 4/4] KVM: riscv: selftests: Add Svadu Extension to get-reg-list testt
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [PATCH v3 3/4] RISC-V: KVM: Add Svadu Extension Support for Guest/VM
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v13 12/35] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 13/35] KVM: Introduce per-page memory attributes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 13/35] KVM: Introduce per-page memory attributes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: 回复: Re: [kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- 回复: Re: [kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: 何琼 <heqiong1557@xxxxxxxxxxxxxx>
- Re: [PATCH v13 12/35] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 11/14] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 12/14] x86/kvmclock: Skip kvmclock when Secure TSC is available
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH net] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 08/14] x86/mm: Add generic guest initialization hook
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 08/14] x86/mm: Add generic guest initialization hook
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 07/14] x86/sev: Move and reorganize sev guest request api
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 05/14] virt: sev-guest: Add vmpck_id to snp_guest_dev struct
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v4] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 04/14] virt: sev-guest: Add SNP guest request structure
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 01/14] virt: sev-guest: Use AES GCM crypto library
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- The VFIO/IOMMU/PCI MC at LPC 2023 - See you soon!
- From: Krzysztof Wilczyński <kw@xxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v13 13/35] KVM: Introduce per-page memory attributes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [GIT PULL] Please pull IOMMUFD subsystem changes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: TDISP enablement
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [Patch 1/2] KVM: x86/pmu: Add Intel CPUID-hinted TopDown slots event
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86/bugs: Add asm helpers for executing VERW
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.7-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 11/17] KVM: x86: Enable KVM_CAP_USERFAULT_ON_MISSING
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v5 10/17] KVM: Implement KVM_CAP_USERFAULT_ON_MISSING by atomizing __gfn_to_pfn_memslot() calls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 10/17] KVM: Implement KVM_CAP_USERFAULT_ON_MISSING by atomizing __gfn_to_pfn_memslot() calls
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 10/17] KVM: Implement KVM_CAP_USERFAULT_ON_MISSING by atomizing __gfn_to_pfn_memslot() calls
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v6 23/25] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 10/17] KVM: Implement KVM_CAP_USERFAULT_ON_MISSING by atomizing __gfn_to_pfn_memslot() calls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 10/17] KVM: Implement KVM_CAP_USERFAULT_ON_MISSING by atomizing __gfn_to_pfn_memslot() calls
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v6 10/25] KVM: x86: Add kvm_msr_{read,write}() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 11/25] KVM: x86: Report XSS as to-be-saved if there are supported features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 vfio 1/3] pds/vfio: Fix spinlock bad magic BUG
- From: Brett Creeley <bcreeley@xxxxxxx>
- [PATCH v4] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Paul Durrant <paul@xxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 14/25] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 12/25] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 18/25] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 03/35] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 09/25] KVM: x86: Rework cpuid_get_supported_xcr0() to operate on vCPU data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] target/i386/kvm: call kvm_put_vcpu_events() before kvm_put_nested_state()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch 1/2] KVM: x86/pmu: Add Intel CPUID-hinted TopDown slots event
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 07/35] KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 05/35] KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests Patch v2 1/5] x86: pmu: Remove duplicate code in pmu_init()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v13 04/35] KVM: WARN if there are dangling MMU invalidations at VM destruction
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 02/35] KVM: Assert that mmu_invalidate_in_progress *never* goes negative
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v13 01/35] KVM: Tweak kvm_hva_range and hva_handler_t to allow reusing for gfn ranges
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: Question: In a certain scenario, enabling GICv4/v4.1 may cause Guest hang when restarting the Guest
- From: Kunkun Jiang <jiangkunkun@xxxxxxxxxx>
- RE: [RFC PATCH 06/12] iommu: Add mmu_notifier to sva domain
- From: "Zhang, Tina" <tina.zhang@xxxxxxxxx>
- [PATCH 1/1] s390/cio: make sch->lock a spinlock (is a pointer)
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: TDISP enablement
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH v3] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Paul Durrant <paul@xxxxxxx>
- Re: [PATCH v2] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: TDISP enablement
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v6 25/25] KVM: nVMX: Enable CET support for nested guest
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/6] KVM: x86/pmu: Clean up emulated PMC event handling
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 25/25] KVM: nVMX: Enable CET support for nested guest
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v6 01/25] x86/fpu/xstate: Manually check and add XFEATURE_CET_USER xstate bit
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: 何琼 <heqiong1557@xxxxxxxxxxxxxx>
- Re: TDISP enablement
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: TDISP enablement
- From: Lukas Wunner <lukas@xxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] KVM: x86: User mutex guards to eliminate __kvm_x86_vendor_init()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH net-XXX] vhost-vdpa: fix use after free in vhost_vdpa_probe()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH net-XXX] vhost-vdpa: fix use after free in vhost_vdpa_probe()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v6 24/25] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: Different behavior with vfio-pci between 6.4.8->6.5.5
- From: Juhani Rautiainen <jrauti@xxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [Patch 1/2] KVM: x86/pmu: Add Intel CPUID-hinted TopDown slots event
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Yibo Huang <ybhuang@xxxxxxxxxxxxx>
- Re: [Patch 1/2] KVM: x86/pmu: Add Intel CPUID-hinted TopDown slots event
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: linux-next: manual merge of the kvm-riscv tree with the risc-v tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: linux-next: manual merge of the kvm-arm tree with the arm64 tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 25/25] KVM: nVMX: Enable CET support for nested guest
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] target/i386/kvm: call kvm_put_vcpu_events() before kvm_put_nested_state()
- From: Eiichi Tsukata <eiichi.tsukata@xxxxxxxxxxx>
- Re: [Patch 1/2] KVM: x86/pmu: Add Intel CPUID-hinted TopDown slots event
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/11] KVM: xen: allow shared_info to be mapped by fixed HVA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 05/11] KVM: pfncache: allow a cache to be activated with a fixed (userspace) HVA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: TDISP enablement
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v7 04/11] KVM: pfncache: base offset check on khva rather than gpa
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 03/11] KVM: pfncache: add a helper to get the gpa
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 02/11] KVM: pfncache: add a mark-dirty helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/11] KVM: pfncache: add a map helper function
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- TDISP enablement
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [GIT PULL] KVM/arm64 updates for 6.7
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch 1/2] KVM: x86/pmu: Add Intel CPUID-hinted TopDown slots event
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v6 25/25] KVM: nVMX: Enable CET support for nested guest
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 24/25] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 23/25] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 22/25] KVM: VMX: Set host constant supervisor states to VMCS fields
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 21/25] KVM: VMX: Set up interception for CET MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 20/25] KVM: x86: Save and reload SSP to/from SMRAM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 18/25] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [GIT PULL] VFIO updates for v6.7-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 17/25] KVM: VMX: Introduce CET VMCS fields and control bits
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 16/25] KVM: x86: Report KVM supported CET MSRs as to-be-saved
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 15/25] KVM: x86: Add fault checks for guest CR4.CET setting
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 14/25] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 12/25] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 13/25] KVM: x86: Initialize kvm_caps.supported_xss
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 11/25] KVM: x86: Report XSS as to-be-saved if there are supported features
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 10/25] KVM: x86: Add kvm_msr_{read,write}() helpers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 09/25] KVM: x86: Rework cpuid_get_supported_xcr0() to operate on vCPU data
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 08/25] x86/fpu/xstate: WARN if normal fpstate contains kernel dynamic xfeatures
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 07/25] x86/fpu/xstate: Tweak guest fpstate to support kernel dynamic xfeatures
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 05/25] x86/fpu/xstate: Remove kernel dynamic xfeatures from kernel default_features
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 04/25] x86/fpu/xstate: Introduce kernel dynamic xfeature set
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 03/25] x86/fpu/xstate: Add CET supervisor mode state support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 02/25] x86/fpu/xstate: Fix guest fpstate allocation size calculation
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 01/25] x86/fpu/xstate: Manually check and add XFEATURE_CET_USER xstate bit
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH v13 13/35] KVM: Introduce per-page memory attributes
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Different behavior with vfio-pci between 6.4.8->6.5.5
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Different behavior with vfio-pci between 6.4.8->6.5.5
- From: Juhani Rautiainen <jrauti@xxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [GIT PULL] KVM: x86: SVM changes for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 0/6] KVM: allow mapping non-refcounted pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM: x86: Xen changes for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM: x86: Misc changes for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM: x86: MMU changes for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM: x86: APIC changes for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM: x86: Documentation updates for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL 0/2] KVM: s390: Changes for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] LoongArch KVM changes for v6.7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: Add missing fput() on error path
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Add missing fput() on error path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] Please pull IOMMUFD subsystem changes
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: About patch bdedff263132 - KVM: x86: Route pending NMIs
- From: Prasad Pandit <ppandit@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [PATCH v2] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: Paul Durrant <paul@xxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] lib: s390x: sclp: Add compat handling for HMC ASCII consoles
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/3] lib: s390x: hw: rework do_detect_host so we don't need allocation
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/3] s390x: Improve console handling
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/3] lib: s390x: sclp: Add line mode input handling
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/3] lib: s390x: hw: rework do_detect_host so we don't need allocation
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/3] lib: s390x: sclp: Add compat handling for HMC ASCII consoles
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- RE: [PATCH] KVM: x86: replace do_div with div64_ul
- From: David Laight <David.Laight@xxxxxxxxxx>
- [kvm-unit-tests Patch v2 5/5] x86: pmu: Add asserts to warn inconsistent fixed events and counters
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- [kvm-unit-tests Patch v2 4/5] x86: pmu: Support validation for Intel PMU fixed counter 3
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- [kvm-unit-tests Patch v2 3/5] x86: pmu: Enlarge cnt array length to 64 in check_counters_many()
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- [kvm-unit-tests Patch v2 2/5] x86: pmu: Improve loop() to force to generate llc/branch misses
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- [kvm-unit-tests Patch v2 1/5] x86: pmu: Remove duplicate code in pmu_init()
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- [kvm-unit-tests Patch v2 0/5] Fix PMU test failures on Sapphire Rapids
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH V2 vfio 6/9] virtio-pci: Introduce APIs to execute legacy IO admin commands
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [Patch 2/2] KVM: x86/pmu: Support PMU fixed counter 3
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- [Patch 1/2] KVM: x86/pmu: Add Intel CPUID-hinted TopDown slots event
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- [Patch 0/2] Enable topdown slots event in vPMU
- From: Dapeng Mi <dapeng1.mi@xxxxxxxxxxxxxxx>
- [PATCH] KVM: Add missing fput() on error path
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH V2 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH V2 vfio 6/9] virtio-pci: Introduce APIs to execute legacy IO admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH V2 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V2 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH V2 vfio 6/9] virtio-pci: Introduce APIs to execute legacy IO admin commands
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] KVM: SVM,VMX: Use %rip-relative addressing to access kvm_rebooting
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- RE: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v3 vfio 1/3] pds/vfio: Fix spinlock bad magic BUG
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 vfio 3/3] pds/vfio: Fix possible sleep while in atomic context
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v9 0/6] KVM: allow mapping non-refcounted pages
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- RE: [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH guest_memfd] KVM: selftests: Add a memory region subtest to validate invalid flags
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] tools: Makefile fixes for sysreg generation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 2/2] KVM: VMX: Cleanup VMX misc information defines and usages
- From: "Xin Li (Intel)" <xin@xxxxxxxxx>
- [PATCH v3 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Xin Li (Intel)" <xin@xxxxxxxxx>
- Re: [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V2 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/kvm/async_pf: Use separate percpu variable to track the enabling of asyncpf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 12/35] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 13/35] KVM: Introduce per-page memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 12/14] x86/kvmclock: Skip kvmclock when Secure TSC is available
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 11/14] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 08/14] x86/mm: Add generic guest initialization hook
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 07/14] x86/sev: Move and reorganize sev guest request api
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 05/14] virt: sev-guest: Add vmpck_id to snp_guest_dev struct
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v13 03/35] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v13 03/35] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v18 2/2] Documentation: add debugfs description for vfio
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH v5 04/14] virt: sev-guest: Add SNP guest request structure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH v5 01/14] virt: sev-guest: Use AES GCM crypto library
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] KVM: x86: User mutex guards to eliminate __kvm_x86_vendor_init()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: selftests: Add arch_timer_edge_cases selftest
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v13 00/35] KVM: guest_memfd() and per-page attributes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: User mutex guards to eliminate __kvm_x86_vendor_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 23/35] KVM: x86: Add support for "protected VMs" that can utilize private memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 22/35] KVM: Allow arch code to track number of memslot address spaces per VM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 18/35] KVM: x86: "Reset" vcpu->run->exit_reason early in KVM_RUN
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 15/35] fs: Export anon_inode_getfile_secure() for use by KVM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 14/35] mm: Add AS_UNMOVABLE to mark mapping as completely unmovable
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 08/14] x86/mm: Add generic guest initialization hook
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 12/35] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 11/35] KVM: Drop .on_unlock() mmu_notifier hook
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 05/14] virt: sev-guest: Add vmpck_id to snp_guest_dev struct
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v13 10/35] KVM: Add a dedicated mmu_notifier flag for reclaiming freed memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: User mutex guards to eliminate __kvm_x86_vendor_init()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 03/35] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 03/35] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 07/35] KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: selftests: Avoid using forced target for generating arm64 headers
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v13 05/35] KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 04/35] KVM: WARN if there are dangling MMU invalidations at VM destruction
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 03/35] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 02/35] KVM: Assert that mmu_invalidate_in_progress *never* goes negative
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: User mutex guards to eliminate __kvm_x86_vendor_init()
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v5 05/14] virt: sev-guest: Add vmpck_id to snp_guest_dev struct
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: replace do_div with div64_ul
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 13/35] KVM: Introduce per-page memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: User mutex guards to eliminate __kvm_x86_vendor_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 06/10] s390x: topology: Refine stsi header test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 07/10] s390x: topology: Rename topology_core to topology_cpu
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 08/10] s390x: topology: Rewrite topology list test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 05/10] s390x: topology: Make some report messages unique
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 00/10] s390x: topology: Fixes and extension
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 02/10] s390x: topology: Fix report message
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 03/10] s390x: topology: Use function parameter in stsi_get_sysib
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 10/10] s390x: topology: Add complex topology test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 04/10] s390x: topology: Fix parsing loop
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 09/10] scripts: Implement multiline strings for extra_params
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 01/10] s390x: topology: Introduce enums for polarization & cpu type
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V2 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: Parav Pandit <parav@xxxxxxxxxx>
- [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH V2 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: About patch bdedff263132 - KVM: x86: Route pending NMIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 1/5] x86/paravirt: move some functions and defines to alternative
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v4 0/5] x86/paravirt: Get rid of paravirt patching
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH] KVM: x86: User mutex guards to eliminate __kvm_x86_vendor_init()
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 1/5] x86/paravirt: move some functions and defines to alternative
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v7 00/11] KVM: xen: update shared_info and vcpu_info handling
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: add -MP to CFLAGS
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [PATCH] KVM: selftests: add -MP to CFLAGS
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: add -MP to CFLAGS
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [GIT PULL 1/2] KVM: s390: add stat counter for shadow gmap events
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 2/2] KVM: s390: add tracepoint in gmap notifier
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 0/2] KVM: s390: Changes for 6.7
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v13 13/35] KVM: Introduce per-page memory attributes
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 00/10] s390x: topology: Fixes and extension
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v18 2/2] Documentation: add debugfs description for vfio
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- Re: [PATCH v18 1/2] vfio/migration: Add debugfs to live migration driver
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- [PATCH v5 14/14] x86/sev: Enable Secure TSC for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 13/14] x86/tsc: Mark Secure TSC as reliable clocksource
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 12/14] x86/kvmclock: Skip kvmclock when Secure TSC is available
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 11/14] x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 10/14] x86/sev: Change TSC MSR behavior for Secure TSC enabled guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 09/14] x86/sev: Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 07/14] x86/sev: Move and reorganize sev guest request api
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 08/14] x86/mm: Add generic guest initialization hook
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 06/14] x86/sev: Cache the secrets page address
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 05/14] virt: sev-guest: Add vmpck_id to snp_guest_dev struct
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 04/14] virt: sev-guest: Add SNP guest request structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 03/14] virt: sev-guest: Replace dev_dbg with pr_debug
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 02/14] virt: sev-guest: Move mutex to SNP guest device structure
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 01/14] virt: sev-guest: Use AES GCM crypto library
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [PATCH v5 00/14] Add Secure TSC support for SNP guests
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- [Bug 217558] In KVM guest with VF of X710 NIC passthrough, the mac address of VF is inconsistent with it in host
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 217558] In KVM guest with VF of X710 NIC passthrough, the mac address of VF is inconsistent with it in host
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 1/2] x86/kvm/async_pf: Use separate percpu variable to track the enabling of asyncpf
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 1/2] x86/kvm/async_pf: Use separate percpu variable to track the enabling of asyncpf
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests Patch 0/5] Fix PMU test failures on Sapphire Rapids
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- RE: [PATCH] KVM: selftests: add -MP to CFLAGS
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH V2 vfio 3/9] virtio-pci: Introduce admin command sending function
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V2 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: cleanup unused variables
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 7/9] vfio/pci: Expose vfio_pci_core_setup_barmap()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 6/9] virtio-pci: Introduce APIs to execute legacy IO admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 4/9] virtio-pci: Introduce admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 8/9] vfio/pci: Expose vfio_pci_iowrite/read##size()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 3/9] virtio-pci: Introduce admin command sending function
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 1/9] virtio: Define feature bit for administration virtqueue
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 0/9] Introduce a vfio driver over virtio devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: cleanup unused variables
- From: José Pekkarinen <jose.pekkarinen@xxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: improve accuracy of Xen timers
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] KVM: x86: replace do_div with div64_ul
- From: José Pekkarinen <jose.pekkarinen@xxxxxxxxxxx>
- [PATCH] KVM: x86: cleanup unused variables
- From: José Pekkarinen <jose.pekkarinen@xxxxxxxxxxx>
- [PATCH] KVM: selftests: add -MP to CFLAGS
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] Add class property to configure KVM device node to use
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- [PATCH v18 2/2] Documentation: add debugfs description for vfio
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v18 1/2] vfio/migration: Add debugfs to live migration driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- [PATCH v18 0/2] add debugfs to migration driver
- From: Longfang Liu <liulongfang@xxxxxxxxxx>
- Re: This list is being migrated to the new vger infra (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- This list is being migrated to the new vger infra (no action required)
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 vfio 3/3] pds/vfio: Fix possible sleep while in atomic context
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v3 vfio 2/3] pds/vfio: Fix mutex lock->magic != lock warning
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v3 vfio 1/3] pds/vfio: Fix spinlock bad magic BUG
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v3 vfio 0/3] pds/vfio: Fixes for locking bugs
- From: Brett Creeley <brett.creeley@xxxxxxx>
- Re: [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 6/6] KVM: x86/pmu: Track emulated counter events instead of previous counter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: PMU change for 6.7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: SVM changes for 6.7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: Xen changes for 6.7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: Misc changes for 6.7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: APIC changes for 6.7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: MMU changes for 6.7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: Documentation updates for 6.7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86 pull requests for 6.7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 22/35] KVM: Allow arch code to track number of memslot address spaces per VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 29/35] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 28/35] KVM: selftests: Add helpers to do KVM_HC_MAP_GPA_RANGE hypercalls (x86)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 34/35] KVM: selftests: Add basic selftest for guest_memfd()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 35/35] KVM: selftests: Test KVM exit behavior for private memory/access
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 32/35] KVM: selftests: Add KVM_SET_USER_MEMORY_REGION2 helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 33/35] KVM: selftests: Expand set_memory_region_test to validate guest_memfd()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 25/35] KVM: selftests: Convert lib's mem regions to KVM_SET_USER_MEMORY_REGION2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 30/35] KVM: selftests: Add GUEST_SYNC[1-6] macros for synchronizing more data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 31/35] KVM: selftests: Add x86-only selftest for private memory conversions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 27/35] KVM: selftests: Add helpers to convert guest memory b/w private and shared
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 26/35] KVM: selftests: Add support for creating private memslots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 23/35] KVM: x86: Add support for "protected VMs" that can utilize private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 24/35] KVM: selftests: Drop unused kvm_userspace_memory_region_find() helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 20/35] KVM: x86/mmu: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 21/35] KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 18/35] KVM: x86: "Reset" vcpu->run->exit_reason early in KVM_RUN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 19/35] KVM: x86: Disallow hugepages when memory attributes are mixed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 17/35] KVM: Add transparent hugepage support for dedicated guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 15/35] fs: Export anon_inode_getfile_secure() for use by KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 16/35] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 13/35] KVM: Introduce per-page memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 12/35] KVM: Prepare for handling only shared mappings in mmu_notifier events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 11/35] KVM: Drop .on_unlock() mmu_notifier hook
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 14/35] mm: Add AS_UNMOVABLE to mark mapping as completely unmovable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 09/35] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 10/35] KVM: Add a dedicated mmu_notifier flag for reclaiming freed memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 08/35] KVM: Introduce KVM_SET_USER_MEMORY_REGION2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 05/35] KVM: PPC: Drop dead code related to KVM_ARCH_WANT_MMU_NOTIFIER
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 06/35] KVM: PPC: Return '1' unconditionally for KVM_CAP_SYNC_MMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 07/35] KVM: Convert KVM_ARCH_WANT_MMU_NOTIFIER to CONFIG_KVM_GENERIC_MMU_NOTIFIER
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 04/35] KVM: WARN if there are dangling MMU invalidations at VM destruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 03/35] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 02/35] KVM: Assert that mmu_invalidate_in_progress *never* goes negative
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 01/35] KVM: Tweak kvm_hva_range and hva_handler_t to allow reusing for gfn ranges
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 00/35] KVM: guest_memfd() and per-page attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Xin Li <xin@xxxxxxxxx>
- [PATCH 3/3] KVM: Aggressively drop and reacquire mmu_lock during CLEAR_DIRTY_LOG
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86/mmu: Check for leaf SPTE when clearing dirty bit in the TDP MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86/mmu: Fix off-by-1 when splitting huge pages during CLEAR
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 0/3] KVM: Performance and correctness fixes for CLEAR_DIRTY_LOG
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [RFC PATCH V3 23/26] vfio/pci: Support emulated interrupts
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 24/26] vfio/pci: Add core IMS support
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 25/26] vfio/pci: Add accessor for IMS index
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 26/26] vfio/pci: Support IMS cookie modification
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 21/26] vfio/pci: Replace backend specific calls with callbacks
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 22/26] vfio/pci: Introduce backend specific context initializer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 18/26] vfio/pci: Preserve per-interrupt contexts
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 20/26] vfio/pci: Separate frontend and backend code during interrupt enable/disable
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 16/26] vfio/pci: Split interrupt context initialization
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 12/26] vfio/pci: Provide interrupt context to generic ops
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 19/26] vfio/pci: Store Linux IRQ number in per-interrupt context
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 17/26] vfio/pci: Make vfio_pci_set_irqs_ioctl() available
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 15/26] vfio/pci: Move generic code to frontend
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 14/26] vfio/pci: Let interrupt management backend interpret interrupt index
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 13/26] vfio/pci: Provide interrupt context to vfio_msi_enable() and vfio_msi_disable()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 10/26] vfio/pci: Move IRQ type to generic interrupt context
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 09/26] vfio/pci: Move per-interrupt contexts to generic interrupt struct
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 05/26] vfio/pci: Split PCI interrupt management into front and backend
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 11/26] vfio/pci: Provide interrupt context to irq_is() and is_irq_none()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 07/26] vfio/pci: Move interrupt eventfd to interrupt context
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 04/26] vfio/pci: Make core interrupt callbacks accessible to all virtual devices
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 08/26] vfio/pci: Move mutex acquisition into function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 06/26] vfio/pci: Separate MSI and MSI-X handling
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 02/26] vfio/pci: Move PCI specific check from wrapper to PCI function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 03/26] vfio/pci: Use unsigned int instead of unsigned
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH V3 01/26] PCI/MSI: Provide stubs for IMS functions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Add tracepoint for MMIO accesses where ISV==0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 00/10] s390x: topology: Fixes and extension
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [RFC PATCH] KVM: x86/xen: don't use broken get_kvmclock_ns() for Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v4 0/6] Delay VERW
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Delay VERW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 0/6] Delay VERW
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86/bugs: Add asm helpers for executing VERW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Delay VERW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 0/6] Delay VERW
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] Delay VERW
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v4 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- [PATCH v4 2/6] x86/entry_64: Add VERW just before userspace transition
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- [PATCH v4 1/6] x86/bugs: Add asm helpers for executing VERW
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- [PATCH v4 5/6] KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- [PATCH v4 4/6] x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- [PATCH v4 0/6] Delay VERW
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- [PATCH v4 3/6] x86/entry_32: Add VERW just before userspace transition
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] x86/bugs: Add asm helpers for executing VERW
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] x86/bugs: Add asm helpers for executing VERW
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v2 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 08/10] s390x: topology: Rewrite topology list test
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [RFC PATCH] KVM: x86/xen: don't use broken get_kvmclock_ns() for Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] x86/bugs: Add asm helpers for executing VERW
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH net-XXX] vhost-vdpa: fix use after free in vhost_vdpa_probe()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH net-XXX] vhost-vdpa: fix use after free in vhost_vdpa_probe()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v3 13/28] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v3 13/28] hw/xen: automatically assign device index to block devices
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 13/28] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests Patch 2/5] x86: pmu: Change the minimum value of llc_misses event to 0
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [syzbot] [net?] KMSAN: uninit-value in virtio_transport_recv_pkt
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Add tracepoint for MMIO accesses where ISV==0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 27/28] hw/xen: use qemu_create_nic_bus_devices() to instantiate Xen NICs
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 26/28] hw/i386/pc: use qemu_get_nic_info() and pci_init_nic_devices()
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 25/28] hw/pci: add pci_init_nic_devices(), pci_init_nic_in_slot()
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 24/28] net: add qemu_create_nic_bus_devices()
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 23/28] net: report list of available models according to platform
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 22/28] net: add qemu_{configure,create}_nic_device(), qemu_find_nic_info()
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 21/28] xen-platform: unplug AHCI disks
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 13/28] hw/xen: automatically assign device index to block devices
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH net] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [syzbot] [net?] KMSAN: uninit-value in virtio_transport_recv_pkt
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH v3 13/28] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 20/28] net: do not delete nics in net_cleanup()
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 19/28] hw/xen: update Xen PV NIC to XenDevice model
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 18/28] hw/xen: only remove peers of PCI NICs on unplug
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [syzbot] [net?] KMSAN: uninit-value in virtio_transport_recv_pkt
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [syzbot] [net?] KMSAN: uninit-value in virtio_transport_recv_pkt
- From: syzbot <syzbot+0c8ce1da0ac31abbadcd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Add tracepoint for MMIO accesses where ISV==0
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v3 17/28] hw/xen: add support for Xen primary console in emulated mode
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 14/28] hw/xen: add get_frontend_path() method to XenDeviceClass
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 13/28] hw/xen: automatically assign device index to block devices
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 08/28] i386/xen: Ignore VCPU_SSHOTTMR_future flag in set_singleshot_timer()
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 07/28] hw/xen: use correct default protocol for xen-block on x86
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 06/28] hw/xen: take iothread mutex in xen_evtchn_reset_op()
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 05/28] hw/xen: fix XenStore watch delivery to guest
- From: "Durrant, Paul" <xadimgnik@xxxxxxxxx>
- Re: [PATCH] target/i386/kvm: Refine VMX controls setting for backward compatibility
- From: Ewan Hai <ewanhai-oc@xxxxxxxxxxx>
- Re: [PATCH 1/2] iommu: Introduce a rb_tree for looking up device
- From: "Huang, Jiaqing" <jiaqing.huang@xxxxxxxxx>
- Re: [PATCH 2/2] iommu/vt-d: Adopt new helper for looking up pci device
- From: "Huang, Jiaqing" <jiaqing.huang@xxxxxxxxx>
- Re: [PATCH v3 3/5] KVM: selftests: Generate sysreg-defs.h and add to include path
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 0/2] tools: Makefile fixes for sysreg generation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Avoid using forced target for generating arm64 headers
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: Run user level code in guest in a new KVM selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] tools headers arm64: Fix references to top srcdir in Makefile
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 08/13] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/6] x86/entry_64: Add VERW just before userspace transition
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 2/6] x86/entry_64: Add VERW just before userspace transition
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/13] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH] target/i386/monitor: synchronize cpu before printing lapic state
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/6] x86/entry_64: Add VERW just before userspace transition
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/13] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] KVM: arm64: Add tracepoint for MMIO accesses where ISV==0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/13] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v3 2/6] x86/entry_64: Add VERW just before userspace transition
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/6] x86/entry_64: Add VERW just before userspace transition
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- [PATCH v3 3/3] s390/vfio-ap: improve reaction to response code 07 from PQAP(AQIC) command
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 1/3] s390/vfio-ap: unpin pages on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 0/3] a couple of corrections to the IRQ enablement function
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v8 0/8] Add Intel VT-d nested translation (part 1/2)
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 00/10] iommufd: Add nesting infrastructure (part 1/2)
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 3/3] s390/vfio-ap: improve reaction to response code 07 from PQAP(AQIC) command
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Run user level code in guest in a new KVM selftest
- From: Xin Li <xin@xxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Xin Li <xin@xxxxxxxxx>
- [PATCH v2 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Xin Li (Intel)" <xin@xxxxxxxxx>
- [PATCH v2 2/2] KVM: VMX: Cleanup VMX misc information defines and usages
- From: "Xin Li (Intel)" <xin@xxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] target/i386/monitor: synchronize cpu before printing lapic state
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v3 28/28] docs: update Xen-on-KVM documentation
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] x86/entry_64: Add VERW just before userspace transition
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- RE: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] target/i386/monitor: synchronize cpu before printing lapic state
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH net] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: Shigeru Yoshida <syoshida@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu: Fix overflow test condition
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu: Fix overflow test condition
- From: Matthias Rosenfelder <matthias.rosenfelder@xxxxxx>
- Re: [PATCH v2 1/3] s390/vfio-ap: unpin pages on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v8 7/8] iommu/vt-d: Add nested domain allocation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 3/3] s390/vfio-ap: improve reaction to response code 07 from PQAP(AQIC) command
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/6] x86/bugs: Add asm helpers for executing VERW
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH v3 1/6] x86/bugs: Add asm helpers for executing VERW
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]