Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 1/3] arm64: Add a capability for FEAT_BBM level 2
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH] vhost-vdpa: filter VIRTIO_F_RING_PACKED feature
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] KVM: Clean up kvm_vm_ioctl_create_vcpu()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v2 09/16] KVM: arm64: Document the page table walker actions based on the callback's return value
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/6] lib: s390x: introduce bitfield for PSW mask
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v8 31/33] x86/fred: BUG() when ERETU with %rsp not equal to that when the ring 3 event was just delivered
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 30/33] x86/fred: allow dynamic stack frame size
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v1 3/6] KVM: VMX: Add new ops in kvm_x86_ops for LASS violation check
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] s390/uv: Update query for secret-UVCs
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool 1/8] Sync-up headers with Linux-6.4-rc1
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 29/33] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v2 8/8] riscv: Fix guest RAM alloc size computation for RV32
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 7/8] riscv: Add Ssaia extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 6/8] riscv: Add Zicboz extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 5/8] riscv: Add zbb extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 4/8] riscv: Sort the ISA extension array alphabetically
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 3/8] riscv: Allow disabling SBI extensions for Guest
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/8] riscv: Allow setting custom mvendorid, marchid, and mimpid
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 1/8] Sync-up headers with Linux-6.4-rc5
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 0/8] RISC-V SBI enable/disable, Zbb, Zicboz, and Ssaia support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: filter VIRTIO_F_RING_PACKED feature
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 5/6] s390/uv: replace scnprintf with sysfs_emit
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v8 26/33] x86/fred: allow single-step trap and NMI when starting a new thread
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 26/33] x86/fred: allow single-step trap and NMI when starting a new thread
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool 1/8] Sync-up headers with Linux-6.4-rc1
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v8 24/33] x86/fred: disallow the swapgs instruction when FRED is enabled
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 21/33] x86/fred: FRED initialization code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool 1/8] Sync-up headers with Linux-6.4-rc1
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] s390/uvdevice: Add 'Lock Secret Store' UVC
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: filter VIRTIO_F_RING_PACKED feature
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 3/6] s390/uvdevice: Add 'List Secrets' UVC
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v5 4/4] x86: Add test case for INVVPID with LAM
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v8 20/33] x86/fred: FRED entry/exit and dispatch code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] s390/uvdevice: Add 'Add Secret' UVC
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v12 12/31] LoongArch: KVM: Implement vcpu interrupt operations
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v12 10/31] LoongArch: KVM: Implement vcpu ENABLE_CAP ioctl interface
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v12 11/31] LoongArch: KVM: Implement fpu related operations for vcpu
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v12 15/31] LoongArch: KVM: Implement vcpu status description
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v12 09/31] LoongArch: KVM: Implement vcpu get, vcpu set registers
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH] KVM: Clean up kvm_vm_ioctl_create_vcpu()
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 08/31] LoongArch: KVM: Implement vcpu handle exit interface
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: filter VIRTIO_F_RING_PACKED feature
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: filter VIRTIO_F_RING_PACKED feature
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v1 3/6] KVM: VMX: Add new ops in kvm_x86_ops for LASS violation check
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v12 07/31] LoongArch: KVM: Implement vcpu run interface
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v12 06/31] LoongArch: KVM: Implement vcpu create and destroy interface
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v12 05/31] LoongArch: KVM: Add vcpu related header files
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: filter VIRTIO_F_RING_PACKED feature
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 1/6] s390/uvdevice: Add info IOCTL
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool v3 0/2] Fix virtio/rng handling in low entropy situations
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool 0/2] Fix builds with clang
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v12 04/31] LoongArch: KVM: Implement VM related functions
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v12 02/31] LoongArch: KVM: Implement kvm module related interface
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v12 01/31] LoongArch: KVM: Add kvm related header files
- From: "bibo, mao" <maobibo@xxxxxxxxxxx>
- Re: [PATCH v8 21/33] x86/fred: FRED initialization code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool 1/8] Sync-up headers with Linux-6.4-rc1
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v8 02/33] x86/fred: make unions for the cs and ss fields in struct pt_regs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 09/33] x86/cpu: add X86_CR4_FRED macro
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 05/33] x86/traps: add external_interrupt() to dispatch external interrupts
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH] KVM: Clean up kvm_vm_ioctl_create_vcpu()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v10 00/59] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
- From: Eric Auger <eauger@xxxxxxxxxx>
- [PATCH] vhost-vdpa: filter VIRTIO_F_RING_PACKED feature
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 4/6] s390x: lib: don't forward PSW when handling exception in SIE
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 5/6] s390x: lib: sie: don't reenter SIE on pgm int
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/6] lib: s390x: introduce bitfield for PSW mask
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v12 01/31] LoongArch: KVM: Add kvm related header files
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Use "standard" mmu_notifier hook for APIC page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 6/6] s390x: add a test for SIE without MSO/MSL
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/15] Introduce Architectural LBR for vPMU
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 5/6] s390x: lib: sie: don't reenter SIE on pgm int
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] vfio/fsl: Create Kconfig sub-menu
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio/platform: Cleanup Kconfig
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio/pci: Cleanup Kconfig
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 4/6] s390x: lib: don't forward PSW when handling exception in SIE
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/6] s390x: sie: switch to home space mode before entering SIE
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v8 04/33] x86/traps: add install_system_interrupt_handler()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/6] s390x: add function to set DAT mode for all interrupts
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v8 03/33] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 03/33] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 03/33] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH net] virtio/vsock: fix sock refcnt bug on owner set failure
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH v2 1/6] KVM: PPC: Use getters and setters for vcpu register state
- From: Jordan Niethe <jpn@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 4/6] KVM: PPC: Add helper library for Guest State Buffers
- From: Jordan Niethe <jpn@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 5/6] KVM: PPC: Add support for nested PAPR guests
- From: Jordan Niethe <jpn@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 3/6] KVM: PPC: Add vr getters and setters
- From: Jordan Niethe <jpn@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 6/6] docs: powerpc: Document nested KVM on POWER
- From: Jordan Niethe <jpn@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 2/6] KVM: PPC: Add fpr getters and setters
- From: Jordan Niethe <jpn@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 0/6] KVM: PPC: Nested PAPR guests
- From: Jordan Niethe <jpn@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [PATCH v12 01/31] LoongArch: KVM: Add kvm related header files
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: "Gao,Shiyuan" <gaoshiyuan@xxxxxxxxx>
- Re: [PATCH v1 3/6] KVM: VMX: Add new ops in kvm_x86_ops for LASS violation check
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: "Gao,Shiyuan" <gaoshiyuan@xxxxxxxxx>
- Re: [PATCH v1 3/6] KVM: VMX: Add new ops in kvm_x86_ops for LASS violation check
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [Bug 217516] FAIL: TSC reference precision test when do hyperv_clock test of kvm unit test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v14 111/113] RFC: KVM: x86, TDX: Add check for setting CPUID
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v11 19/20] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v1 2/6] KVM: x86: Virtualize CR4.LASS
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [PATCH v1 0/6] LASS KVM virtualization support
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Remove KVM MMU write lock when accessing indirect_shadow_pages
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 1/2] vgaarb: various coding style and comments fix
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v2 2/2] vgaarb: introduce is_boot_device callback function to vga_client_register
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v2 1/2] vgaarb: various coding style and comments fix
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [PATCH v5 0/2] KVM: arm64: PMU: Correct the handling of PMUSERENR_EL0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v11 20/20] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 13/20] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 12/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 14/20] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 17/20] x86/kexec: Flush cache of TDX private memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 15/20] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 16/20] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 10/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 19/20] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 09/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 08/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 07/20] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 06/20] x86/virt/tdx: Handle SEAMCALL running out of entropy error
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 05/20] x86/virt/tdx: Add SEAMCALL infrastructure
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 04/20] x86/cpu: Detect TDX partial write machine check erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 03/20] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v11 00/20] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.4-rc5
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] KVM fixes for Linux 6.4-rc5
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Skip break phase when we have FEAT_BBM level 2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: x86: Retry APIC optimized map recalc if vCPU is added/enabled
- From: Michal Luczaj <mhal@xxxxxxx>
- [RFC PATCH v4 17/17] test/vsock: io_uring rx/tx tests
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 15/17] test/vsock: MSG_ZEROCOPY flag tests
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 09/17] vsock: enable SOCK_SUPPORT_ZC bit
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 06/17] vsock: check error queue to set EPOLLERR
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 13/17] net/sock: enable setting SO_ZEROCOPY for PF_VSOCK
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 16/17] test/vsock: MSG_ZEROCOPY support for vsock_perf
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 14/17] docs: net: description of MSG_ZEROCOPY for AF_VSOCK
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 12/17] vsock/loopback: support MSG_ZEROCOPY for transport
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 08/17] vsock: check for MSG_ZEROCOPY support on send
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 05/17] vsock/virtio: MSG_ZEROCOPY flag support
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 11/17] vsock/virtio: support MSG_ZEROCOPY for transport
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 10/17] vhost/vsock: support MSG_ZEROCOPY for transport
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 03/17] vsock/virtio: support to send non-linear skb
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 00/17] vsock: MSG_ZEROCOPY flag support
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 07/17] vsock: read from socket's error queue
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 01/17] vsock/virtio: read data from non-linear skb
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 02/17] vhost/vsock: read data from non-linear skb
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 04/17] vsock/virtio: non-linear skb handling for tap
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v8 01/33] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH v8 01/33] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: KVM: x86: Fixes for 6.4
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.4, take #3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIC PULL] KVM/arm64 fixes for 6.4, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v14 111/113] RFC: KVM: x86, TDX: Add check for setting CPUID
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v4 03/16] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH v8 02/33] x86/fred: make unions for the cs and ss fields in struct pt_regs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Use per guest ID register for ID_AA64PFR1_EL1.MTE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v5 2/2] KVM: arm64: PMU: Don't overwrite PMUSERENR with vcpu loaded
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v5 1/2] KVM: arm64: PMU: Restore the host's PMUSERENR_EL0
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v5 0/2] KVM: arm64: PMU: Correct the handling of PMUSERENR_EL0
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2] KVM: MAINTAINERS: note that linux-kvm.org isn't current
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v14 111/113] RFC: KVM: x86, TDX: Add check for setting CPUID
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- [PATCH v7 12/12] KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 08/12] KVM: x86/pmu: Advertise PERFCTR_CORE iff the min nr of counters is met
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 09/12] KVM: x86/pmu: Constrain the num of guest counters with kvm_pmu_cap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 10/12] KVM: x86/cpuid: Add a KVM-only leaf to redirect AMD PerfMonV2 flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 11/12] KVM: x86/svm/pmu: Add AMD PerfMonV2 support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 01/12] KVM: x86/pmu: Rename global_ovf_ctrl_mask to global_status_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 07/12] KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 06/12] KVM: x86: Explicitly zero cpuid "0xa" leaf when PMU is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 02/12] KVM: x86/pmu: Move reprogram_counters() to pmu.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 04/12] KVM: x86/pmu: Move handling PERF_GLOBAL_CTRL and friends to common x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 05/12] KVM: x86/pmu: Provide Intel PMU's pmc_is_enabled() as generic x86 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 03/12] KVM: x86/pmu: Reject userspace attempts to set reserved GLOBAL_STATUS bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 00/12] KVM: x86: Add AMD Guest PerfMonV2 PMU support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: MAINTAINERS: note that linux-kvm.org isn't current
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: VMX: Fixes for faults on ENCLS emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- Re: [PATCH v3 0/3] KVM: x86: Out-of-bounds access in kvm_recalculate_phys_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Grab memslot for correct address space in NX recovery worker
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fastpath accounting fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: vNMI pending bit is V_NMI_PENDING_MASK not V_NMI_BLOCKING_MASK
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- KVM: x86: Fixes for 6.4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is out-of-bounds
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v11 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v3 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 2/3] KVM: x86: Retry APIC optimized map recalc if vCPU is added/enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 1/3] KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is out-of-bounds
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 0/3] KVM: x86: Out-of-bounds access in kvm_recalculate_phys_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 03/10] KVM: x86/pmu: Make part of the Intel v2 PMU MSRs handling x86 generic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v11 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: "Jitindar Singh, Suraj" <surajjs@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Use per guest ID register for ID_AA64PFR1_EL1.MTE
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Update id_reg limit value based on per vcpu flags
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 0/3] RE: Support writable CPU ID registers from userspace [v11]
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Move non per vcpu flag checks out of kvm_arm_update_id_reg()
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH] KVM: x86/pmu: Rename global_ovf_ctrl_mask to global_status_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 vfio 2/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- [PATCH v10 vfio 2/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v10 vfio 5/7] vfio/pds: Add support for dirty page tracking
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v10 vfio 6/7] vfio/pds: Add support for firmware recovery
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v10 vfio 7/7] vfio/pds: Add Kconfig and documentation
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v10 vfio 4/7] vfio/pds: Add VFIO live migration support
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v10 vfio 3/7] vfio/pds: register with the pds_core PF
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v10 vfio 1/7] vfio: Commonize combine_ranges for use in other VFIO drivers
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v10 vfio 0/7] pds_vfio driver
- From: Brett Creeley <brett.creeley@xxxxxxx>
- Re: [PATCH v6 02/10] KVM: x86/pmu: Return #GP if user sets the GLOBAL_STATUS reserved bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] vfio/platform: Cleanup Kconfig
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 1/3] vfio/pci: Cleanup Kconfig
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 3/3] vfio/fsl: Create Kconfig sub-menu
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 0/3] vfio: Cleanup Kconfigs
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdef
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v4 02/16] KVM: x86: Set vCPU exit reason to KVM_EXIT_UNKNOWN at the start of KVM_RUN
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v11 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: "Jitindar Singh, Suraj" <surajjs@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PULL v2 02/16] block/file-posix: introduce helper functions for sysfs attributes
- From: Sam Li <faithilikerun@xxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PULL v2 02/16] block/file-posix: introduce helper functions for sysfs attributes
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdef
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PULL v2 02/16] block/file-posix: introduce helper functions for sysfs attributes
- From: Sam Li <faithilikerun@xxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: kernel test robot <lkp@xxxxxxxxx>
- KVM Forum BoF on I/O + secure virtualization
- From: "Giani, Dhaval" <Dhaval.Giani@xxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v11 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Clear possible conflict aborts
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Skip break phase when we have FEAT_BBM level 2
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 1/3] arm64: Add a capability for FEAT_BBM level 2
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 0/3] Relax break-before-make use with FEAT_BBM
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v4 16/16] KVM: selftests: Handle memory fault exits in demand_paging_test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 15/16] KVM: selftests: Add memslot_flags parameter to memstress_create_vm()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 14/16] KVM: selftests: Use EPOLL in userfaultfd_util reader threads and signal errors via TEST_ASSERT
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 13/16] KVM: selftests: Allow many vCPUs and reader threads per UFFD in demand paging test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 09/16] KVM: Introduce KVM_CAP_NOWAIT_ON_FAULT without implementation
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 08/16] KVM: x86: Annotate -EFAULTs from kvm_handle_error_pfn()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 10/16] KVM: x86: Implement KVM_CAP_NOWAIT_ON_FAULT
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 12/16] KVM: selftests: Report per-vcpu demand paging rate from demand paging test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 11/16] KVM: arm64: Implement KVM_CAP_NOWAIT_ON_FAULT
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 07/16] KVM: Simplify error handling in __gfn_to_pfn_memslot()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 06/16] KVM: Annotate -EFAULTs from kvm_vcpu_read_guest_page()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 00/16] Improve scalability of KVM + userfaultfd live migration via annotated memory faults.
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 04/16] KVM: Add docstrings to __kvm_write_guest_page() and __kvm_read_guest_page()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 01/16] KVM: Allow hva_pfn_fast() to resolve read-only faults.
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 03/16] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 02/16] KVM: x86: Set vCPU exit reason to KVM_EXIT_UNKNOWN at the start of KVM_RUN
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v4 05/16] KVM: Annotate -EFAULTs from kvm_vcpu_write_guest_page()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v2 12/16] KVM: arm64: Retry shared page table walks outside of fault handler
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 15/16] KVM: arm64: Provide option to pass page walker flag for huge page splits
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 11/16] KVM: arm64: Use KVM_PGTABLE_WALK_SHARED flag instead of KVM_PGTABLE_WALK_HANDLE_FAULT
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 13/16] KVM: arm64: Run clear-dirty-log under MMU read lock
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 14/16] KVM: arm64: Pass page walker flags from callers of stage 2 split walker
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 16/16] KVM: arm64: Split huge pages during clear-dirty-log under MMU read lock
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 10/16] KVM: arm64: Return -ENOENT if PTE is not valid in stage2_attr_walker
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 09/16] KVM: arm64: Document the page table walker actions based on the callback's return value
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 08/16] KMV: arm64: Pass page table walker flags to stage2_apply_range_*()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 07/16] KVM: mmu: Move mmu lock/unlock to arch code for clear dirty log
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 06/16] KVM: arm64: Correct the kvm_pgtable_stage2_flush() documentation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 03/16] KVM: selftests: Pass the count of read and write accesses from guest to host
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 04/16] KVM: selftests: Print read-write progress by vCPUs in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 05/16] KVM: selftests: Allow independent execution of vCPUs in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 02/16] KVM: selftests: Add optional delay between consecutive clear-dirty-log calls
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 01/16] KVM: selftests: Clear dirty logs in user defined chunks sizes in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 00/16] Use MMU read lock for clear-dirty-log
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdef
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- [PATCH v12 24/24] docs: vfio: Add vfio device cdev description
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 20/24] vfio: Only check group->type for noiommu test
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 22/24] vfio: Remove vfio_device_is_noiommu()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 23/24] vfio: Compile vfio_group infrastructure optionally
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 19/24] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 18/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 16/24] vfio: Move vfio_device_group_unregister() to be the first operation in unregister
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 17/24] vfio: Add cdev for vfio_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 15/24] vfio-iommufd: Add detach_ioas support for emulated VFIO devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 10/24] vfio-iommufd: Move noiommu compat validation out of vfio_iommufd_bind()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 14/24] iommufd/device: Add iommufd_access_detach() API
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 13/24] vfio-iommufd: Add detach_ioas support for physical VFIO devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 12/24] vfio: Record devid in vfio_device_file
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 11/24] vfio-iommufd: Split bind/attach into two steps
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 08/24] vfio: Add cdev_device_open_cnt to vfio_group
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 00/24] Add vfio_device cdev for iommufd support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 09/24] vfio: Make vfio_df_open() single open for device cdev path
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 06/24] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 04/24] kvm/vfio: Prepare for accepting vfio device fd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 02/24] vfio: Refine vfio file kAPIs for KVM
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 05/24] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 01/24] vfio: Allocate per device file structure
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v12 03/24] vfio: Accept vfio device file in the KVM facing kAPI
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 9/9] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 7/9] vfio: Add helper to search vfio_device in a dev_set
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 4/9] iommufd: Add iommufd_ctx_has_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 5/9] iommufd: Add helper to retrieve iommufd_ctx and devid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 6/9] vfio: Mark cdev usage in vfio_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 3/9] iommufd: Reserve all negative IDs in the iommufd xarray
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 2/9] vfio/pci: Move the existing hot reset logic to be a helper
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 0/9] Enhance vfio PCI hot reset for vfio cdev device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 1/9] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [Bug 217516] FAIL: TSC reference precision test when do hyperv_clock test of kvm unit test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2] vhost/vdpa: Add MSI translation tables to iommu for software-managed MSI
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH][next] KVM: s390: selftests: Fix spelling mistake "initally" -> "initially"
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 04/13] arm64/arch_timer: Provide noinstr sched_clock_read() functions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH][next] KVM: s390: selftests: Fix spelling mistake "initally" -> "initially"
- From: "Colin King (gmail)" <colin.i.king@xxxxxxxxx>
- Re: [PATCH][next] KVM: s390: selftests: Fix spelling mistake "initally" -> "initially"
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH][next] KVM: s390: selftests: Fix spelling mistake "initally" -> "initially"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 0/2] KVM: x86: Report actual nent from KVM_GET_CPUID2
- From: Takahiro Itazuri <itazur@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/2] Fixing infinite loop on SCLP READ SCP INFO error
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/9] s390x: uv-host: Fixups and extensions part 1
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH] kvm: limit the maximum CPUID.0xA.edx[0..4] to 3
- From: Shiyuan Gao <gaoshiyuan@xxxxxxxxx>
- [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Gao Shiyuan <gaoshiyuan@xxxxxxxxx>
- Re: [RFC PATCH 4/5] KVM: TDX: Implement moving private pages between 2 TDs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- [PATCH v4 1/1] vringh: IOMEM support
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [PATCH v4 0/1] Introduce a vringh accessor for IO memory
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: VMX: Clean up of vmx_set_cr4()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Remove redundant check for MSR_IA32_DS_AREA set handler
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: VMX: UMIP emulation related cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Refactor stable TSC check to use TEST_REQUIRE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] selftests/kvm: Fixes for demand paging test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] selftests/kvm: touch all pages of args on each memstress iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH][next] KVM: selftests: Fix spelling mistake "miliseconds" -> "milliseconds"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SVM: Remove TSS reloading code after VMEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add comment on try_cmpxchg64 usage in tdp_mmu_set_spte_atomic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Assert on @mmu in the __kvm_mmu_invalidate_addr()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/2] KVM: x86: Report actual nent from KVM_GET_CPUID2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/8] KVM: x86: Clean up MSR PAT handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Fix poll command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Protect vcpu->pid dereference via debugfs with RCU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Don't kfree(NULL) on kzalloc() failure in kvm_assign_ioeventfd_idx()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: SVM: Invoke trace_kvm_exit() for fastpath VM-Exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: Account fastpath-only VM-Exits in vCPU stats
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: Fastpath accounting fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86/mmu: Trigger APIC-access page reload iff vendor code cares
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Use standard mmu_notifier invalidate hooks for APIC access page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: VMX: Retry APIC-access page reload if invalidation is in-progress
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: Use "standard" mmu_notifier hook for APIC page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Suraj Jitindar Singh <sjitindarsingh@xxxxxxxxx>
- [PATCH] KVM: x86/mmu: Grab memslot for correct address space in NX recovery worker
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- [PATCH v11 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 0/5] Support writable CPU ID registers from userspace
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v6 05/10] KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 0/6] LASS KVM virtualization support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [ANNOUNCE] KVM Microconference at LPC 2023
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net] virtio/vsock: fix sock refcnt bug on owner set failure
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/22] Improve scalability of KVM + userfaultfd live migration via annotated memory faults.
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [ANNOUNCE] KVM Microconference at LPC 2023
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 05/22] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 03/34] s390: Use pt_frag_refcount for pagetables
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/22] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 05/22] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] selftests/kvm: Allow specify physical cpu list in demand paging test
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH] selftests/kvm: Allow specify physical cpu list in demand paging test
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: selftests: Print summary stats of memory latency distribution
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: selftests: Provide generic way to read system counter
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: vNMI pending bit is V_NMI_PENDING_MASK not V_NMI_BLOCKING_MASK
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: SVM: vNMI pending bit is V_NMI_PENDING_MASK not V_NMI_BLOCKING_MASK
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: vNMI pending bit is V_NMI_PENDING_MASK not V_NMI_BLOCKING_MASK
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 2/2] s390x: sclp: Implement extended-length-SCCB facility
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/2] s390x: sclp: Implement extended-length-SCCB facility
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/2] Fixing infinite loop on SCLP READ SCP INFO error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/2] s390x: sclp: treat system as single processor when read_info is NULL
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PULL 1/8] block: add blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 8/8] qapi: add '@fdset' feature for BlockdevOptionsVirtioBlkVhostVdpa
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 7/8] block/blkio: use qemu_open() to support fd passing for virtio-blk
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 6/8] block: remove bdrv_co_io_plug() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 4/8] block/io_uring: convert to blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 5/8] block/linux-aio: convert to blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 3/8] block/blkio: convert to blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 2/8] block/nvme: convert to blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 0/8] Block patches
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PATCH v1 4/6] KVM: x86: Add emulator helper for LASS violation check
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 0/6] LASS KVM virtualization support
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 2/6] KVM: x86: Virtualize CR4.LASS
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 6/6] KVM: x86: Advertise LASS CPUID to user space
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 5/6] KVM: x86: LASS protection on KVM emulation
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 3/6] KVM: VMX: Add new ops in kvm_x86_ops for LASS violation check
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 1/6] KVM: x86: Consolidate flags for __linearize()
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 25/34] m68k: Convert various functions to use ptdescs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6] vfio/cdx: add support for CDX bus
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- RE: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3 03/34] s390: Use pt_frag_refcount for pagetables
- From: Gerald Schaefer <gerald.schaefer@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/2] s390x: sclp: consider monoprocessor on read_info error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [Bug 217516] FAIL: TSC reference precision test when do hyperv_clock test of kvm unit test
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 217516] New: FAIL: TSC reference precision test when do hyperv_clock test of kvm unit test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/17] arm64: Allow EL1 physical timer access when running VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/2] s390x: sclp: consider monoprocessor on read_info error
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3] KVM: selftests: Add new CFLAGS to generate dependency files
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Fabio Coatti <fabio.coatti@xxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH v3 25/34] m68k: Convert various functions to use ptdescs
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH net] virtio/vsock: fix sock refcnt bug on owner set failure
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/6] lib: s390x: introduce bitfield for PSW mask
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v3 25/34] m68k: Convert various functions to use ptdescs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/6] lib: s390x: introduce bitfield for PSW mask
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/6] s390x: Add support for running guests without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/6] s390x: add function to set DAT mode for all interrupts
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [kvm-unit-tests PATCH v3 4/6] s390x: lib: don't forward PSW when handling exception in SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/6] s390x: sie: switch to home space mode before entering SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 5/6] s390x: lib: sie: don't reenter SIE on pgm int
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 02/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [kvm-unit-tests PATCH v3 6/6] s390x: add a test for SIE without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/17] arm64: Allow EL1 physical timer access when running VHE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- RE: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v6 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: selftests: Print summary stats of memory latency distribution
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH -next v20 03/26] riscv: hwprobe: Add support for probing V in RISCV_HWPROBE_KEY_IMA_EXT_0
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 22/34] csky: Convert __pte_free_tlb() to use ptdescs
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 08/13] x86/vdso: Fix gettimeofday masking
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/13] x86/vdso: Fix gettimeofday masking
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] selftests/kvm: Allow specify physical cpu list in demand paging test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: selftests: Add tests for vcpu_array[0] races
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio/pci-core: Add capability for AtomicOp copleter support
- From: Robin Voetter <robin@xxxxxxxxxxxxx>
- [PATCH v3 34/34] mm: Remove pgtable_{pmd, pte}_page_{ctor, dtor}() wrappers
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 33/34] um: Convert {pmd, pte}_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 14/34] powerpc: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 15/34] x86: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 32/34] sparc: Convert pgtable_pte_page_{ctor, dtor}() to ptdesc equivalents
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 31/34] sparc64: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 29/34] riscv: Convert alloc_{pmd, pte}_late() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 28/34] openrisc: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 26/34] mips: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 27/34] nios2: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 25/34] m68k: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 24/34] loongarch: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 23/34] hexagon: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 22/34] csky: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 21/34] arm64: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 20/34] arm: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 19/34] pgalloc: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 18/34] mm: Remove page table members from struct page
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 17/34] s390: Convert various pgalloc functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 16/34] s390: Convert various gmap functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 13/34] mm: Create ptdesc equivalents for pgtable_{pte,pmd}_page_{ctor,dtor}
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 12/34] mm: Convert ptlock_free() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 11/34] mm: Convert pmd_ptlock_free() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 10/34] mm: Convert ptlock_init() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 09/34] mm: Convert pmd_ptlock_init() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 08/34] mm: Convert ptlock_ptr() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 07/34] mm: Convert ptlock_alloc() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 06/34] mm: Convert pmd_pgtable_page() to pmd_ptdesc()
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 05/34] mm: add utility functions for ptdesc
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 04/34] pgtable: Create struct ptdesc
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 02/34] s390: Use _pt_s390_gaddr for gmap address tracking
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 00/34] Split ptdesc from struct page
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 03/34] s390: Use pt_frag_refcount for pagetables
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH mm-unstable v2 05/10] kvm/arm64: add kvm_arch_test_clear_young()
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: selftests: Print summary stats of memory latency distribution
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: selftests: Provide generic way to read system counter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/6] arm: pmu: Add pmu-memaccess-reliability test
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/6] arm: pmu: Fix chain counter enable/disable sequences
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 6/6] arm: pmu-chain-promotion: Increase the count and margin values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/6] arm: pmu: pmu-chain-promotion: Improve debug messages
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/6] arm: pmu: Add extra DSB barriers in the mem_access loop
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/6] arm: pmu: pmu-chain-promotion: Introduce defines for count and margin values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/6] arm: pmu: Fix chain counter enable/disable sequences
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 5/6] arm: pmu: Add pmu-mem-access-reliability test
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/6] arm: pmu: Fix random failures of pmu-chain-promotion
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/6] arm: pmu: Add extra DSB barriers in the mem_access loop
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH mm-unstable v2 05/10] kvm/arm64: add kvm_arch_test_clear_young()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH net] virtio/vsock: fix sock refcnt bug on owner set failure
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH mm-unstable v2 02/10] mm/kvm: use mmu_notifier_ops->test_clear_young()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH mm-unstable v2 01/10] mm/kvm: add mmu_notifier_ops->test_clear_young()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PULL v2 02/16] block/file-posix: introduce helper functions for sysfs attributes
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Notes - 2023.05.31 - guest_memfd()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH RFC net-next v3 6/8] virtio/vsock: support dgrams
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: Deadlock due to EPT_VIOLATION
- From: Brian Rak <brak@xxxxxxxxx>
- Re: [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v6 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH RFC net-next v3 7/8] vsock: Add lockless sendmsg() support
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH RFC net-next v3 6/8] virtio/vsock: support dgrams
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Jon Kohler <jon@xxxxxxxxxxx>
- RE: [RFC PATCH V6 02/14] x86/sev: Add Check of #HV event in path
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH RFC net-next v3 1/8] vsock/dgram: generalize recvmsg and drop transport->dgram_dequeue
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [RFC PATCH V6 02/14] x86/sev: Add Check of #HV event in path
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4] vfio/pci: Propagate ACPI notifications to user-space via eventfd
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 08/13] x86/vdso: Fix gettimeofday masking
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Jon Kohler <jon@xxxxxxxxxxx>
- RE: [RFC PATCH V6 02/14] x86/sev: Add Check of #HV event in path
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/9] s390x: uv-host: Fixups and extensions part 1
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/7] lib: s390x: uv: Introduce UV validity function
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] s390/vfio-ap: Wire in the vfio_device_ops request callback
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio: ap: realize the VFIO_DEVICE_SET_IRQS ioctl
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- [PATCH v7] vfio/cdx: add support for CDX bus
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- Re: [PATCH v3 1/6] kvm: determine memory type from VMA
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [kvm-unit-tests PATCH v1] runtime: don't run pv-host tests when gen-se-header is unavailable
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/7] s390x: Add PV SIE intercepts and ipl tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests] arm/arm64: psci_cpu_on_test failures with tcg
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v1] runtime: don't run pv-host tests when gen-se-header is unavailable
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.4, take #3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH RFCv2 24/24] iommu/arm-smmu-v3: Advertise IOMMU_DOMAIN_F_ENFORCE_DIRTY
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [RFC PATCH V6 01/14] x86/sev: Add a #HV exception handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: arm64: Use TLBI range-based intructions for unmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 8/8] target/i386/intel-pt: Access MSR_IA32_RTIT_ADDRn based on guest CPUID configuration
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 7/8] target/i386/intel-pt: Define specific PT feature set for IceLake-server, Snowridge and SapphireRapids
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 5/8] target/i386/intel-pt: Rework/rename the default INTEL-PT feature set
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 3/8] target/i386/intel-pt: Introduce FeatureWordInfo for Intel PT CPUID leaf 0x14
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 2/8] target/i386/intel-pt: Fix INTEL_PT_ADDR_RANGES_NUM_MASK
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 1/8] target/i386: Print CPUID subleaf info for unsupported feature
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 0/8] i386: Make Intel PT configurable
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3] KVM: x86/pmu: Add documentation for fixed ctr on PMU filter
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- Re: [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 02/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/2] s390x: sclp: consider monoprocessor on read_info error
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 07/21] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH RFC net-next v3 8/8] tests: add vsock dgram tests
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 2/8] vsock: refactor transport lookup code
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 3/8] vsock: support multi-transport datagrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 5/8] virtio/vsock: add VIRTIO_VSOCK_F_DGRAM feature bit
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 4/8] vsock: make vsock bind reusable
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 1/8] vsock/dgram: generalize recvmsg and drop transport->dgram_dequeue
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 6/8] virtio/vsock: support dgrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 0/8] virtio/vsock: support datagrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 7/8] vsock: Add lockless sendmsg() support
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]