Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [Bug 217304] New: KVM does not handle NMI blocking correctly in nested virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 06/25] kvm/vfio: Accept vfio device file from userspace
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL] Please pull IOMMUFD subsystem changes
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [PATCH 2/3] KVM: x86: Don't update KVM PV feature CPUID during vCPU running
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 08/10] target/ppc: Restrict KVM-specific field from ArchCPU
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.3, part #3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/flat.lds: Silence warnings about empty loadable segments
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/flat.lds: Silence warnings about empty loadable segments
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: nvhe: Synchronise with page table walker on MMU update
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH][v2] x86/kvm: Don't check vCPU preempted if vCPU has dedicated pCPU and non-trap HLT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 10/25] vfio: Make vfio_device_open() single open for device cdev path
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/emulator: Test non-canonical memory access exceptions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/2] nSVM: Add helper to report fatal errors in guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 016/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH][next] KVM: selftests: Fix spelling mistake "KVM_HYPERCAL_EXIT_SMC" -> "KVM_HYPERCALL_EXIT_SMC"
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 0/4] x86: Add test cases for LAM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH][v2] x86/kvm: Don't check vCPU preempted if vCPU has dedicated pCPU and non-trap HLT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- [PATCH] KVM: arm64: vhe: Drop extra isb() on guest exit
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 09/25] vfio: Add cdev_device_open_cnt to vfio_group
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v9 08/25] vfio: Block device access via device fd until device is opened
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v7 4/5] KVM: x86: Untag address when LAM applicable
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [GIT PULL] Please pull IOMMUFD subsystem changes
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 2/5] KVM: x86: Virtualize CR3.LAM_{U48,U57}
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 0/6] KVM: MMU: performance tweaks for heavy CR0.WP users
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v9 07/25] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [RFC PATCH 0/7] x86/entry: Atomic statck switching for IST
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] Expose GPU memory as coherently CPU accessible
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 0/4] x86: Add test cases for LAM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [Bug 217307] windows guest entering boot loop when nested virtualization enabled and hyperv installed
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH 0/7] x86/entry: Atomic statck switching for IST
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- [Bug 217307] windows guest entering boot loop when nested virtualization enabled and hyperv installed
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 217307] windows guest entering boot loop when nested virtualization enabled and hyperv installed
- From: bugzilla-daemon@xxxxxxxxxx
- RE: [PATCH v9 06/25] kvm/vfio: Accept vfio device file from userspace
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [RFC PATCH 0/7] x86/entry: Atomic statck switching for IST
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/2] x86: nSVM: Add support for VNMI test
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [Bug 217307] New: windows guest entering boot loop when nested virtualization enabled and hyperv installed
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH 0/7] x86/entry: Atomic statck switching for IST
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- RE: The necessity of injecting a hardware exception reported in VMX IDT vectoring information
- From: "Yao, Yuan" <yuan.yao@xxxxxxxxx>
- Re: [RFC PATCH 0/7] x86/entry: Atomic statck switching for IST
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: SGX vs. XCR0 cleanups
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH][v2] x86/kvm: Don't check vCPU preempted if vCPU has dedicated pCPU and non-trap HLT
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 06/25] kvm/vfio: Accept vfio device file from userspace
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: VMX: Fixes for faults on ENCLS emulation
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 02/10] accel/kvm: Declare kvm_direct_msi_allowed in stubs
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH 01/10] sysemu/kvm: Remove unused headers
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 10/10] hw/s390x: Rename pv.c -> pv-kvm.c
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/2] nSVM: Add helper to report fatal errors in guest
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH 10/10] hw/s390x: Rename pv.c -> pv-kvm.c
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/emulator: Test non-canonical memory access exceptions
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [RESEND PATCH] kvm/selftests: Close opened file descriptor in stable_tsc_check_supported()
- From: Hao Ge <gehao@xxxxxxxxxx>
- Re: [PATCH 10/10] hw/s390x: Rename pv.c -> pv-kvm.c
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH][next] KVM: selftests: Fix spelling mistake "KVM_HYPERCAL_EXIT_SMC" -> "KVM_HYPERCALL_EXIT_SMC"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 4/4] s390x: add a test for SIE without MSO/MSL
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] hw/s390x: Rename pv.c -> pv-kvm.c
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: The necessity of injecting a hardware exception reported in VMX IDT vectoring information
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: The necessity of injecting a hardware exception reported in VMX IDT vectoring information
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH][v2] x86/kvm: Don't check vCPU preempted if vCPU has dedicated pCPU and non-trap HLT
- From: lirongqing@xxxxxxxxx
- RE: [PATCH] x86/kvm: refine condition for checking vCPU preempted
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/flat.lds: Silence warnings about empty loadable segments
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: SVM: small tweaks for sev_hardware_setup
- From: Aleksandr Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- RE: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: Refactor stats descriptor generation macros
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [Bug 217304] New: KVM does not handle NMI blocking correctly in nested virtualization
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 2/4] x86: Add test case for LAM_SUP
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 0/2] KVM: SVM: small tweaks for sev_hardware_setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Don't update KVM PV feature CPUID during vCPU running
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Disallow enable KVM_CAP_X86_DISABLE_EXITS capability after vCPUs have been created
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/2] x86/pmu: Add TSX testcase and fix force_emulation_prefix
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- linux-next: manual merge of the kvm-arm tree with the kvm tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/emulator: Test non-canonical memory access exceptions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RESEND PATCH] kvm/selftests: Close opened file descriptor in stable_tsc_check_supported()
- From: "gehao@xxxxxxxxxx" <gehao@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/5] x86: Add "safe" macros to wrap ASM_TRY()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/5] x86: Add macros to wrap ASM_TRY() for single instructions with output(s)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 5/5] x86: Move XSETBV and XGETBV "safe" helpers to processor.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/5] x86: Add macros to wrap ASM_TRY() for single instructions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 4/5] x86: Move invpcid_safe() to processor.h and convert to asm_safe()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/5] x86: Convert inputs-only "safe" instruction helpers to asm_safe()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH REBASED] KVM: x86: SVM: Fix one redefine issue about VMCB_AVIC_APIC_BAR_MASK
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 2/2] KVM: arm64: PMU: Ensure to trap PMU access from EL0 to EL2
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 0/6] KVM: MMU: performance tweaks for heavy CR0.WP users
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH REBASED] KVM: x86: SVM: Fix one redefine issue about VMCB_AVIC_APIC_BAR_MASK
- From: Xinghui Li <korantwork@xxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Disallow legacy LBRs if architectural LBRs are available
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: SGX vs. XCR0 cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: The necessity of injecting a hardware exception reported in VMX IDT vectoring information
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: PPC: Book3S HV: Injected interrupt SRR1
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] powerpc/kvm: Enable HV KVM guests to use prefixed instructions to access emulated MMIO
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [RESEND PATCH] kvm/selftests: Close opened file descriptor in stable_tsc_check_supported()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: selftests: Refactor stable TSC check to use TEST_REQUIRE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RESEND PATCH] kvm/selftests: Close opened file descriptor in stable_tsc_check_supported()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Zero out pmu->all_valid_pmc_idx each time it's refreshed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: set varaiable mitigate_smt_rsb storage-class-specifier to static
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v8 48/56] KVM: SVM: Add SNP-specific handling for memory attribute updates
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 2/2] KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: VMX: Fixes for faults on ENCLS emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests v3 10/13] powerpc: Add support for more interrupts including HV interrupts
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode in SGX handler
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL] x86: Fixes, cleanups, and new testcases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/syscall: Add suffix to "sysret" to silence an assembler warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/flat.lds: Silence warnings about empty loadable segments
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] x86/msr: Add tests for command MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/3] x86: Add testcases for x2APIC MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/2] x86: Fix goofs in FEP access configs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86/emulator: Segment load fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/2] x86: Fixes for rdpid test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] dt-bindings: cpufreq: add bindings for virtual kvm cpufreq
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH 0/2] target/arm: KVM Aarch32 spring cleaning
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v3 6/6] vfio/nvgpu: register device memory for poison handling
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [PATCH v3 2/6] vfio/nvgpu: expose GPU device memory as BAR1
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v3 3/6] mm: handle poisoning of pfn without struct pages
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Saravana Kannan <saravanak@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/2] nSVM: Add helper to report fatal errors in guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/2] x86: nSVM: Add support for VNMI test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/2] nSVM: vNMI testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCHv2] x86: nSVM: Add support for VNMI test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 09/10] target/riscv: Restrict KVM-specific fields from ArchCPU
- From: Daniel Henrique Barboza <dbarboza@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/6] vfio/nvgpu: register device memory for poison handling
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [WIP Patch v2 04/14] KVM: x86: Add KVM_CAP_X86_MEMORY_FAULT_EXIT and associated kvm_run field
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH 08/10] target/ppc: Restrict KVM-specific field from ArchCPU
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 4/4] s390x: add a test for SIE without MSO/MSL
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 6/9] x86/access: Try forced emulation for CR0.WP test as well
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v13 024/113] KVM: TDX: allocate/free TDX vcpu structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v13 020/113] KVM: TDX: initialize VM with TDX specific parameters
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 00/13] KVM: arm64: Userspace SMCCC call filtering
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Refresh CR0.WP prior to checking for emulated permission faults
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH 05/10] hw/arm/sbsa-ref: Include missing 'sysemu/kvm.h' header
- From: Leif Lindholm <quic_llindhol@xxxxxxxxxxx>
- Re: [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v13 016/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- RE: The necessity of injecting a hardware exception reported in VMX IDT vectoring information
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [PATCH v3 2/6] vfio/nvgpu: expose GPU device memory as BAR1
- From: <ankita@xxxxxxxxxx>
- [PATCH v3 1/6] kvm: determine memory type from VMA
- From: <ankita@xxxxxxxxxx>
- [PATCH v3 5/6] mm: Change ghes code to allow poison of non-struct PFN
- From: <ankita@xxxxxxxxxx>
- [PATCH v3 3/6] mm: handle poisoning of pfn without struct pages
- From: <ankita@xxxxxxxxxx>
- [PATCH v3 4/6] mm: Add poison error check in fixup_user_fault() for mapped PFN
- From: <ankita@xxxxxxxxxx>
- [PATCH v3 6/6] vfio/nvgpu: register device memory for poison handling
- From: <ankita@xxxxxxxxxx>
- [PATCH v3 0/6] Expose GPU memory as coherently CPU accessible
- From: <ankita@xxxxxxxxxx>
- Re: [PATCH v9 04/25] vfio: Accept vfio device file in the KVM facing kAPI
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 4/4] KVM: arm64: Enable writable for ID_AA64MMFR{0, 1, 2}_EL1
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v3 3/4] KVM: arm64: Enable writable for ID_AA64PFR0_EL1
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v3 2/4] KVM: arm64: Enable writable for ID_DFR0_EL1
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v3 1/4] KVM: arm64: Enable writable for ID_AA64DFR0_EL1
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v3 0/4] Enable writable for idregs DFR0,PFR0, MMFR{0,1,2}
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH 3/3] Update linux headers to v6.3rc5
- From: "David 'Digit' Turner" <digit@xxxxxxxxxx>
- Re: [PATCH v9 25/25] docs: vfio: Add vfio device cdev description
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Disable TDP MMU when running on Hyper-V
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [RFC PATCH 1/2] accel/kvm: Extract 'sysemu/kvm_irq.h' from 'sysemu/kvm.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 2/2] accel/kvm: Declare kvm_arch_irqchip_create() in 'sysemu/kvm_int.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH 0/2] accel/kvm: Extract 'sysemu/kvm_irq.h' from 'sysemu/kvm.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 2/2] accel/stubs: Build HAX/KVM/XEN stubs once
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 1/2] accel/stubs: Remove kvm_flush_coalesced_mmio_buffer() stub
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 0/2] accel/stubs: Build HAX/KVM/XEN stubs once
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.3, part #3
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [RFC PATCH 09/10] target/riscv: Restrict KVM-specific fields from ArchCPU
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 10/10] hw/s390x: Rename pv.c -> pv-kvm.c
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 08/10] target/ppc: Restrict KVM-specific field from ArchCPU
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 07/10] target/arm: Restrict KVM-specific fields from ArchCPU
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 06/10] target/arm: Reduce QMP header pressure by not including 'kvm_arm.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 05/10] hw/arm/sbsa-ref: Include missing 'sysemu/kvm.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 03/10] hw/intc/arm_gic: Un-inline GIC*/ITS class_name() helpers
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 04/10] hw/intc/arm_gic: Rename 'first_cpu' argument
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 00/10] accel/kvm: Spring cleaning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 01/10] sysemu/kvm: Remove unused headers
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 02/10] accel/kvm: Declare kvm_direct_msi_allowed in stubs
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v9 47/50] KVM: arm64: nv: Fast-track 'InHost' exception returns
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 45/50] KVM: arm64: nv: Allocate VNCR page when required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 46/50] KVM: arm64: nv: Enable ARMv8.4-NV support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 35/50] KVM: arm64: nv: Add handling of FEAT_TTL TLB invalidation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 43/50] KVM: arm64: nv: Fold GICv3 host trapping requirements into guest setup
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 50/50] KVM: arm64: nv: Accelerate EL0 timer read accesses when FEAT_ECV is on
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 48/50] KVM: arm64: nv: Fast-track EL1 TLBIs for VHE guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 38/50] KVM: arm64: nv: Add include containing the VNCR_EL2 offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 41/50] KVM: arm64: Add FEAT_NV2 cpu feature
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 49/50] KVM: arm64: nv: Use FEAT_ECV to trap access to EL0 timers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 36/50] KVM: arm64: nv: Invalidate TLBs based on shadow S2 TTL-like information
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 44/50] KVM: arm64: nv: Publish emulated timer interrupt state in the in-memory state
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 37/50] KVM: arm64: nv: Tag shadow S2 entries with nested level
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 42/50] KVM: arm64: nv: Sync nested timer state with FEAT_NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 40/50] KVM: arm64: nv: Move nested vgic state into the sysreg file
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 39/50] KVM: arm64: nv: Map VNCR-capable registers to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 33/50] KVM: arm64: nv: Deal with broken VGIC on maintenance interrupt delivery
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 28/50] KVM: arm64: nv: Nested GICv3 Support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 12/50] KVM: arm64: nv: Respect the virtual HCR_EL2.NV1 bit setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 11/50] KVM: arm64: nv: Respect virtual HCR_EL2.TVM and TRVM settings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 10/50] KVM: arm64: nv: Respect the virtual HCR_EL2.NV bit setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 20/50] KVM: arm64: nv: Set a handler for the system instruction traps
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 17/50] KVM: arm64: nv: Handle shadow stage 2 page faults
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 16/50] KVM: arm64: nv: Implement nested Stage-2 page table walk logic
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 27/50] KVM: arm64: nv: Load timer before the GIC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 13/50] KVM: arm64: nv: Forward debug traps to the nested guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 14/50] KVM: arm64: nv: Configure HCR_EL2 for nested virtualization
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 31/50] KVM: arm64: nv: vgic: Allow userland to set VGIC maintenance IRQ
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 18/50] KVM: arm64: nv: Restrict S2 RD/WR permissions to match the guest's
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 6/9] x86/access: Try forced emulation for CR0.WP test as well
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH v9 24/50] KVM: arm64: nv: Hide RAS from nested guests
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 15/50] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 21/50] KVM: arm64: nv: Trap and emulate AT instructions from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 32/50] KVM: arm64: nv: Implement maintenance interrupt forwarding
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 22/50] KVM: arm64: nv: Trap and emulate TLBI instructions from virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 19/50] KVM: arm64: nv: Unmap/flush shadow stage 2 page tables
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 26/50] KVM: arm64: nv: Forward timer traps to nested EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 29/50] KVM: arm64: nv: Don't load the GICv4 context on entering a nested guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 30/50] KVM: arm64: nv: vgic: Emulate the HW bit in software
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 34/50] KVM: arm64: nv: Allow userspace to request KVM_ARM_VCPU_NESTED_VIRT
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 25/50] KVM: arm64: nv: Add handling of EL2-specific timer registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 23/50] KVM: arm64: nv: Fold guest's HCR_EL2 configuration into the host's
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 07/50] KVM: arm64: nv: Trap CPACR_EL1 access in virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 00/50] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 09/50] KVM: arm64: nv: Respect virtual CPTR_EL2.{TFP,FPEN} settings
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 08/50] KVM: arm64: nv: Respect virtual HCR_EL2.TWX setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 02/50] KVM: arm64: nv: Handle virtual EL2 registers in vcpu_read/write_sys_reg()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 04/50] KVM: arm64: nv: Handle HCR_EL2.E2H specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 05/50] KVM: arm64: nv: Save/Restore vEL2 sysregs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 01/50] KVM: arm64: nv: Add non-VHE-EL2->EL1 translation helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 06/50] KVM: arm64: nv: Trap EL1 VM register accesses in virtual EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v9 03/50] KVM: arm64: nv: Handle SPSR_EL2 specially
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] target/arm: Initialize debug capabilities only once
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH] vfio/cdx: add support for CDX bus
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3 08/13] KVM: arm64: Add support for KVM_EXIT_HYPERCALL
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH RFC v8 47/56] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 09/14] accel: Allocate NVMM vCPU using g_try_FOO()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- RE: [PATCH v3 11/12] iommufd: Define IOMMUFD_INVALID_ID in uapi
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 02/12] vfio/pci: Only check ownership of opened devices in hot reset
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 11/12] iommufd: Define IOMMUFD_INVALID_ID in uapi
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: More cleanups for Hyper-V range flushing
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RESEND PATCH] kvm/selftests: Close opened file descriptor in stable_tsc_check_supported()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v9 16/25] iommufd/device: Add iommufd_access_detach() API
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Refresh CR0.WP prior to checking for emulated permission faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 6/9] x86/access: Try forced emulation for CR0.WP test as well
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 16/25] iommufd/device: Add iommufd_access_detach() API
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v9 16/25] iommufd/device: Add iommufd_access_detach() API
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v9 25/25] docs: vfio: Add vfio device cdev description
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 09/14] accel: Allocate NVMM vCPU using g_try_FOO()
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 25/25] docs: vfio: Add vfio device cdev description
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Refresh CR0.WP prior to checking for emulated permission faults
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1] s390x: Improve stack traces that contain an interrupt frame
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: The necessity of injecting a hardware exception reported in VMX IDT vectoring information
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 03/25] vfio: Remove vfio_file_is_group()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 08/13] KVM: arm64: Add support for KVM_EXIT_HYPERCALL
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 16/25] iommufd/device: Add iommufd_access_detach() API
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 10/12] vfio: Mark cdev usage in vfio_device
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 6/9] x86/access: Try forced emulation for CR0.WP test as well
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v3 11/12] iommufd: Define IOMMUFD_INVALID_ID in uapi
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 02/12] vfio/pci: Only check ownership of opened devices in hot reset
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/9] x86/access: Add forced emulation support
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH 14/14] accel: Rename HVF struct hvf_vcpu_state -> struct AccelvCPUState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 13/14] accel: Inline WHPX get_whpx_vcpu()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 07/14] accel: Rename struct hax_vcpu_state -> struct AccelvCPUState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 06/14] accel: Use a typedef for struct hax_vcpu_state
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 11/14] accel: Inline NVMM get_qemu_vcpu()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 10/14] accel: Rename NVMM struct qemu_vcpu -> struct AccelvCPUState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 12/14] accel: Rename WHPX struct whpx_vcpu -> struct AccelvCPUState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 09/14] accel: Allocate NVMM vCPU using g_try_FOO()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 05/14] accel: Rename 'hax_vcpu' as 'accel' in CPUState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 08/14] accel: Move HAX hThread to accelerator context
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 04/14] accel: Destroy HAX vCPU threads once done
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 02/14] accel: Remove unused hThread variable on TCG/WHPX
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 03/14] accel: Fix a leak on Windows HAX
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 01/14] accel: Document generic accelerator headers
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 00/14] accel: Share CPUState accel context (HAX/NVMM/WHPX/HVF)
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RESEND PATCH] kvm/selftests: Close opened file descriptor in stable_tsc_check_supported()
- From: Hao Ge <gehao@xxxxxxxxxx>
- [PATCH 0/2] target/arm: KVM Aarch32 spring cleaning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 1/2] target/arm: Remove KVM AArch32 CPU definitions
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 2/2] hw/arm/virt: Restrict Cortex-A7 check to TCG
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] target/arm: Check if debug is already initialized
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: SGX vs. XCR0 cleanups
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 09/12] vfio/pci: Accept device fd in VFIO_DEVICE_PCI_HOT_RESET ioctl
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- RE: [PATCH v3 11/12] iommufd: Define IOMMUFD_INVALID_ID in uapi
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- The necessity of injecting a hardware exception reported in VMX IDT vectoring information
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v3 08/12] vfio/pci: Renaming for accepting device fd in hot reset path
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 6/8] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- RE: [PATCH v3 06/12] vfio: Refine vfio file kAPIs for vfio PCI hot reset
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL v3 00/14] s390x: new maintainer, refactor linker scripts, tests for misalignments, execute-type instructions and vSIE epdx
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 12/14] s390x: spec_ex: Add test for misaligned load
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 14/14] s390x: sie: Test whether the epoch extension field is working as expected
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 13/14] MAINTAINERS: Add Nico as s390x Maintainer and make Thomas reviewer
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 11/14] s390x: Add tests for execute-type instructions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 10/14] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 09/14] s390x/spec_ex: Add test introducing odd address into PSW
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 05/14] s390x: use preprocessor for linker script generation
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 06/14] s390x: define a macro for the stack frame size
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 08/14] s390x/spec_ex: Use PSW macro
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 07/14] lib/linux/const.h: test for `__ASSEMBLER__` as well
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 04/14] s390x/Makefile: refactor CPPFLAGS
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 03/14] s390x/Makefile: fix `*.gbin` target dependencies
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 02/14] s390x/Makefile: simplify `%.hdr` target rules
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 00/14] s390x: new maintainer, refactor linker scripts, tests for misalignments, execute-type instructions and vSIE epdx
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v3 01/14] .gitignore: ignore `s390x/comm.key` file
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Vincent Guittot <vincent.guittot@xxxxxxxxxx>
- Re: [PATCH v3 06/12] vfio: Refine vfio file kAPIs for vfio PCI hot reset
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- RE: [PATCH v3 07/12] vfio: Accpet device file from vfio PCI hot reset path
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 07/12] vfio: Accpet device file from vfio PCI hot reset path
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/6] kvm: arm64: Add support for get_cur_cpufreq service
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- RE: [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/4] x86/access: Forced emulation support
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- RE: [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 08/13] KVM: arm64: Add support for KVM_EXIT_HYPERCALL
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: Add a catch-all entry for the kvm mailing list
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v13 030/113] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- [PATCH] target/arm: Check if debug is already initialized
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [RFC PATCH V4 14/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH] KVM: VMX: Get rid of hard-coded value around IA32_VMX_BASIC
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: SGX vs. XCR0 cleanups
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH RFC v8 47/56] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v8 47/56] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH 3/3] KVM: x86: Open code supported XCR0 calculation in kvm_vcpu_after_set_cpuid()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Don't adjust guest's CPUID.0x12.1 (allowed SGX enclave XFRM)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: VMX: Don't rely _only_ on CPUID to enforce XCR0 restrictions for ECREATE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: SGX vs. XCR0 cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 2/6] KVM: x86: Filter out XTILE_CFG if XTILE_DATA isn't permitted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 4/6] KVM: selftests: Rework dynamic XFeature helper to take mask, not bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 1/6] KVM: x86: Add a helper to handle filtering of unpermitted XCR0 features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 6/6] KVM: selftests: Add test to verify KVM's supported XCR0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 3/6] KVM: selftests: Move XGETBV and XSETBV helpers to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 5/6] KVM: selftests: Add all known XFEATURE masks to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 0/6] KVM: x86: Fix unpermitted XTILE CPUID reporting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: x86/mmu: Move filling of Hyper-V's TLB range struct into Hyper-V code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: Rename Hyper-V remote TLB hooks to match established scheme
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: More cleanups for Hyper-V range flushing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Refresh CR0.WP prior to checking for emulated permission faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Get rid of hard-coded value around IA32_VMX_BASIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/13] KVM: x86/mmu: Optimize clear dirty log
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH REBASED] KVM: x86: SVM: Fix one redefine issue about VMCB_AVIC_APIC_BAR_MASK
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/9] x86/access: Add forced emulation support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] x86: Set forced emulation access timeouts to 240
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] x86: Fix goofs in FEP access configs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/2] x86: Exclude forced emulation #PF access test from base "vmx" test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 16/25] iommufd/device: Add iommufd_access_detach() API
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 12/12] vfio/pci: Report dev_id in VFIO_DEVICE_GET_PCI_HOT_RESET_INFO
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [WIP Patch v2 04/14] KVM: x86: Add KVM_CAP_X86_MEMORY_FAULT_EXIT and associated kvm_run field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 04/12] vfio-iommufd: Add helper to retrieve iommufd_ctx and devid for vfio_device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: arm64: Create a fast stage-2 unmap path
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v2 2/7] KVM: arm64: Add FEAT_TLBIRANGE support
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: arm64: Create a fast stage-2 unmap path
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 08/12] vfio/pci: Renaming for accepting device fd in hot reset path
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: arm64: Create a fast stage-2 unmap path
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v3 11/12] iommufd: Define IOMMUFD_INVALID_ID in uapi
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v9 0/5] Add zoned storage emulation to virtio-blk driver
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v2 3/7] KVM: arm64: Implement __kvm_tlb_flush_range_vmid_ipa()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 6a53bda3aaf3de5edeea27d0b1d8781d067640b6
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [WIP Patch v2 04/14] KVM: x86: Add KVM_CAP_X86_MEMORY_FAULT_EXIT and associated kvm_run field
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v3 07/12] vfio: Accpet device file from vfio PCI hot reset path
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 9/9] nVMX: Add forced emulation variant of #PF access test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 024/113] KVM: TDX: allocate/free TDX vcpu structure
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [RFC PATCH 0/6] Improve VM DVFS and task placement behavior
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [WIP Patch v2 04/14] KVM: x86: Add KVM_CAP_X86_MEMORY_FAULT_EXIT and associated kvm_run field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM changes for 6.4-rc5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v13 020/113] KVM: TDX: initialize VM with TDX specific parameters
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: arm64: Create a fast stage-2 unmap path
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v8 vfio 0/7] pds_vfio driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v8 vfio 7/7] vfio/pds: Add Kconfig and documentation
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v8 vfio 6/7] vfio/pds: Add support for firmware recovery
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v8 vfio 4/7] vfio/pds: Add VFIO live migration support
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v8 vfio 2/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v8 vfio 5/7] vfio/pds: Add support for dirty page tracking
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v8 vfio 3/7] vfio/pds: register with the pds_core PF
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v8 vfio 1/7] vfio: Commonize combine_ranges for use in other VFIO drivers
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v8 vfio 0/7] pds_vfio driver
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [kvm-unit-tests PATCH v2 0/3] Improve stack pretty printing
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/7] KVM: arm64: Add FEAT_TLBIRANGE support
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/3] pretty_print_stacks: modify relative path calculation
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/3] pretty_print_stacks: support unknown line numbers
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/3] pretty_print_stacks: prevent invalid address arguments
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 5/9] x86/access: Add forced emulation support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/7] KVM: arm64: Implement __kvm_tlb_flush_range_vmid_ipa()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 2/7] KVM: arm64: Add FEAT_TLBIRANGE support
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6] virtio: add VIRTIO_F_NOTIFICATION_DATA feature support
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: arm64: Create a fast stage-2 unmap path
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [GIT PULL] KVM changes for 6.4-rc5
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] kvm: initialize all of the kvm_debugregs structure before sending it to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/7] x86/entry: Atomic statck switching for IST
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RESEND PATCH] selftest/vmx_nested_tsc_scaling_test: fix fp leak
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v4 2/9] RISC-V: Detect AIA CSRs from ISA string
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v3 05/12] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 9/9] nVMX: Add forced emulation variant of #PF access test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 8/9] x86: Mark the VPID invalidation nested VMX access tests nodefault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 7/9] x86: Drop VPID invl tests from nested reduced MAXPHYADDR access testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 6/9] x86/access: Try forced emulation for CR0.WP test as well
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 5/9] x86/access: Add forced emulation support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 4/9] x86/access: Use standard pass/fail reporting machinery
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 3/9] x86/access: Replace spaces with tabs in access_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/9] x86/access: CR0.WP toggling write to r/o data test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/9] x86: Use existing CR0.WP / CR4.SMEP bit definitions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/9] x86/access: CR0.WP=0/1 r/o tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/9] RISC-V: Detect AIA CSRs from ISA string
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/4] x86/access: Forced emulation support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 9/9] RISC-V: KVM: Implement guest external interrupt line management
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 8/9] RISC-V: KVM: Virtualize per-HART AIA CSRs
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 7/9] RISC-V: KVM: Use bitmap for irqs_pending and irqs_pending_mask
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] qemu-options: finesse the recommendations around -blockdev
- From: Kevin Wolf <kwolf@xxxxxxxxxx>
- Re: [PATCH v7 vfio 2/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH v3 02/12] vfio/pci: Only check ownership of opened devices in hot reset
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- RE: [PATCH v7 vfio 2/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: PMU: Restore the guest's EL0 event counting after migration
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v9 0/5] Add zoned storage emulation to virtio-blk driver
- From: Sam Li <faithilikerun@xxxxxxxxx>
- [PATCH v3 13/13] KVM: selftests: Add test for SMCCC filter
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 11/13] KVM: arm64: Let errors from SMCCC emulation to reach userspace
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 05/13] KVM: arm64: Start handling SMCs from EL1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 07/13] KVM: arm64: Use a maple tree to represent the SMCCC filter
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 04/13] KVM: arm64: Rename SMC/HVC call handler to reflect reality
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 12/13] KVM: selftests: Add a helper for SMCCC calls with SMC instruction
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 10/13] KVM: arm64: Return NOT_SUPPORTED to guest for unknown PSCI version
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 09/13] KVM: arm64: Introduce support for userspace SMCCC filtering
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 06/13] KVM: arm64: Refactor hvc filtering to support different actions
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 08/13] KVM: arm64: Add support for KVM_EXIT_HYPERCALL
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 01/13] KVM: x86: Redefine 'longmode' as a flag for KVM_EXIT_HYPERCALL
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 00/13] KVM: arm64: Userspace SMCCC call filtering
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 03/13] KVM: arm64: Add vm fd device attribute accessors
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 02/13] KVM: arm64: Add a helper to check if a VM has ran once
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- ping: Re: Nested virtualization not working with hyperv guest/windows 11
- From: Michał Zegan <webczat@xxxxxxxxxxx>
- [PATCH v4 9/9] RISC-V: KVM: Implement guest external interrupt line management
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 8/9] RISC-V: KVM: Virtualize per-HART AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 7/9] RISC-V: KVM: Use bitmap for irqs_pending and irqs_pending_mask
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 6/9] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 5/9] RISC-V: KVM: Implement subtype for CSR ONE_REG interface
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 2/9] RISC-V: Detect AIA CSRs from ISA string
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 4/9] RISC-V: KVM: Initial skeletal support for AIA
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 0/9] RISC-V KVM virtualize AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 1/9] RISC-V: Add AIA related CSR defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v4 3/9] RISC-V: KVM: Drop the _MASK suffix from hgatp.VMID mask defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/12] vfio-iommufd: Add helper to retrieve iommufd_ctx and devid for vfio_device
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- RE: [PATCH v3 02/12] vfio/pci: Only check ownership of opened devices in hot reset
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/5] s390x: ap: Add reset tests
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [GIT PULL vfio] Please pull vfio/iommufd changes
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 02/12] vfio/pci: Only check ownership of opened devices in hot reset
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v2 05/11] qemu-options: finesse the recommendations around -blockdev
- From: Michael Tokarev <mjt@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PULL 10/10] tests/avocado: Test Xen guest support under KVM
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v2 05/11] qemu-options: finesse the recommendations around -blockdev
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/cdx: add support for CDX bus
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- Re: [PATCH RFC v8 04/56] KVM: Add HVA range operator
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- RE: [PATCH v3 02/12] vfio/pci: Only check ownership of opened devices in hot reset
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v3 01/12] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v1 2/2] KVM: arm64: PMU: Ensure to trap PMU access from EL0 to EL2
- From: Mark Rutland <mark.rutland@xxxxxxx>
- RE: [PATCH v3 03/12] vfio/pci: Move the existing hot reset logic to be a helper
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 03/12] vfio/pci: Move the existing hot reset logic to be a helper
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 01/12] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v19 01/21] s390x/cpu topology: add s390 specifics to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v3 02/12] vfio/pci: Only check ownership of opened devices in hot reset
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v2 05/11] qemu-options: finesse the recommendations around -blockdev
- From: Kevin Wolf <kwolf@xxxxxxxxxx>
- Re: [PATCH v3 8/8] RISC-V: KVM: Implement guest external interrupt line management
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v3 7/8] RISC-V: KVM: Virtualize per-HART AIA CSRs
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 7/8] RISC-V: KVM: Virtualize per-HART AIA CSRs
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC PATCH V4 17/17] x86/sev: Remove restrict interrupt injection from SNP_FEATURES_IMPL_REQ
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v5 9/9] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 8/9] vdpa_sim: replace the spinlock with a mutex to protect the state
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 7/9] vdpa_sim: use kthread worker
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 5/9] vringh: support VA with iotlb
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 6/9] vdpa_sim: make devices agnostic for work management
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 4/9] vringh: define the stride used for translation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 3/9] vringh: replace kmap_atomic() with kmap_local_page()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 2/9] vhost-vdpa: use bind_mm/unbind_mm device callbacks
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 0/9] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 1/9] vdpa: add bind_mm/unbind_mm callbacks
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v7 1/5] KVM: x86: Virtualize CR4.LAM_SUP
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v7 0/5] Linear Address Masking (LAM) KVM Enabling
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v7 2/5] KVM: x86: Virtualize CR3.LAM_{U48,U57}
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v7 3/5] KVM: x86: Introduce untag_addr() in kvm_x86_ops
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v7 5/5] KVM: x86: Expose LAM feature to userspace VMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v7 4/5] KVM: x86: Untag address when LAM applicable
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v19 01/21] s390x/cpu topology: add s390 specifics to CPU topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/6] arm: pmu: Fix random failures of pmu-chain-promotion
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH] MAINTAINERS: Add a catch-all entry for the kvm mailing list
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 8/8] RISC-V: KVM: Implement guest external interrupt line management
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] KVM: SVM: small tweaks for sev_hardware_setup
- From: Alexander Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- [PATCH 2/2] KVM: SVM: add some info prints to SEV init
- From: Alexander Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- [PATCH 1/2] KVM: SVM: free sev_*asid_bitmap init if SEV init fails
- From: Alexander Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [PATCH v19 15/21] tests/avocado: s390x cpu topology polarisation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH V4 17/17] x86/sev: Remove restrict interrupt injection from SNP_FEATURES_IMPL_REQ
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v19 01/21] s390x/cpu topology: add s390 specifics to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v19 14/21] tests/avocado: s390x cpu topology core
- From: Cédric Le Goater <clg@xxxxxxxx>
- [PATCH 0/2] KVM: SVM: small tweaks for sev_hardware_setup
- From: Alexander Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v19 17/21] tests/avocado: s390x cpu topology test dedicated CPU
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v4 0/3] vsock: return errors other than -ENOMEM to socket
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [kvm-unit-tests PATCH] s390x: Use the right constraints in intercept.c
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x/snippets: Fix compilation with Clang 15
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/5] s390x: ap: Add reset tests
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v19 02/21] s390x/cpu topology: add topology entries on CPU hotplug
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 12/14] s390x: spec_ex: Add test for misaligned load
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 02/14] s390x/Makefile: simplify `%.hdr` target rules
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 09/14] s390x/spec_ex: Add test introducing odd address into PSW
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 11/14] s390x: Add tests for execute-type instructions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 08/14] s390x/spec_ex: Use PSW macro
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 13/14] MAINTAINERS: Add Nico as s390x Maintainer and make Thomas reviewer
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 04/14] s390x/Makefile: refactor CPPFLAGS
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 06/14] s390x: define a macro for the stack frame size
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 10/14] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 03/14] s390x/Makefile: fix `*.gbin` target dependencies
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 00/14] s390x: new maintainer, refactor linker scripts, tests for misalignments, execute-type instructions and vSIE epdx
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 07/14] lib/linux/const.h: test for `__ASSEMBLER__` as well
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 05/14] s390x: use preprocessor for linker script generation
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 01/14] .gitignore: ignore `s390x/comm.key` file
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL v2 14/14] s390x: sie: Test whether the epoch extension field is working as expected
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] tests/vm: use the default system python for NetBSD
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x/snippets: Fix compilation with Clang 15
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/12] Introduce new methods for verifying ownership in vfio PCI hot reset
- From: "Duan, Zhenzhong" <zhenzhong.duan@xxxxxxxxx>
- [PATCH v7 33/33] KVM: x86/vmx: refactor VMX_DO_EVENT_IRQOFF to generate FRED stack frames
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 32/33] x86/fred: disable FRED by default in its early stage
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 26/33] x86/fred: allow single-step trap and NMI when starting a new thread
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 28/33] x86/ia32: do not modify the DPL bits for a null selector
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 30/33] x86/fred: allow dynamic stack frame size
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 25/33] x86/fred: no ESPFIX needed when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 27/33] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 29/33] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 31/33] x86/fred: BUG() when ERETU with %rsp not equal to that when the ring 3 event was just delivered
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 24/33] x86/fred: disallow the swapgs instruction when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 23/33] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 22/33] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 19/33] x86/fred: add a machine check entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 21/33] x86/fred: FRED initialization code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 20/33] x86/fred: FRED entry/exit and dispatch code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 18/33] x86/fred: add a NMI entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 17/33] x86/fred: add a debug fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 16/33] x86/fred: add a page fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 15/33] x86/fred: reserve space for the FRED stack frame
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 14/33] x86/fred: header file with FRED definitions
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 08/33] x86/objtool: teach objtool about ERETU and ERETS
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 11/33] x86/fred: if CONFIG_X86_FRED is disabled, disable FRED support
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 04/33] x86/traps: add install_system_interrupt_handler()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 01/33] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 05/33] x86/traps: add external_interrupt() to dispatch external interrupts
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 07/33] x86/opcode: add ERETU, ERETS instructions to x86-opcode-map
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 06/33] x86/cpufeature: add the cpu feature bit for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 09/33] x86/cpu: add X86_CR4_FRED macro
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 13/33] x86/fred: header file for event types
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 12/33] x86/cpu: add MSR numbers for FRED configuration
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 02/33] x86/fred: make unions for the cs and ss fields in struct pt_regs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 00/33] x86: enable FRED for x86-64
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 10/33] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v7 03/33] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x: Use the right constraints in intercept.c
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH REBASED] KVM: x86: SVM: Fix one redefine issue about VMCB_AVIC_APIC_BAR_MASK
- From: Xinghui Li <korantwork@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x/snippets: Fix compilation with Clang 15
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] s390x: Use the right constraints in intercept.c
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [kvm-unit-tests PATCH] s390x/snippets: Fix compilation with Clang 15
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v1 0/2] KVM: arm64: PMU: Correct the handling of PMUSERENR_EL0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 2/3] s390x/spec_ex: Add test introducing odd address into PSW
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v19 15/21] tests/avocado: s390x cpu topology polarisation
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/3] s390x/spec_ex: Use PSW macro
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: linux-next: build warning after merge of the kvm-fixes tree
- From: Takahiro Itazuri <itazur@xxxxxxxxxx>
- Re: [PATCH v19 14/21] tests/avocado: s390x cpu topology core
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v19 17/21] tests/avocado: s390x cpu topology test dedicated CPU
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v19 06/21] s390x/cpu topology: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/3] s390x/spec_ex: Add test introducing odd address into PSW
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/3] s390x: Add misaligned instruction tests
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/3] s390x/spec_ex: Use PSW macro
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH REBASED] KVM: x86: SVM: Fix one redefine issue about VMCB_AVIC_APIC_BAR_MASK
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC PATCH v3 1/2] mm: restrictedmem: Allow userspace to specify mount for memfd_restricted
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v19 06/21] s390x/cpu topology: interception of PTF instruction
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v19 02/21] s390x/cpu topology: add topology entries on CPU hotplug
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [kvm-unit-tests v3 11/13] powerpc: Discover runtime load address dynamically
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests v3 10/13] powerpc: Add support for more interrupts including HV interrupts
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/4] x86/access: Forced emulation support
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- [PATCH] KVM: x86/pmu: Zero out pmu->all_valid_pmc_idx each time it's refreshed
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests v3 09/13] powerpc: Expand exception handler vector granularity
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests v3 08/13] powerpc/spapr_vpa: Add basic VPA tests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v19 01/21] s390x/cpu topology: add s390 specifics to CPU topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [kvm-unit-tests v3 07/13] powerpc/sprs: Specify SPRs with data rather than code
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/6] arm: pmu: Fix random failures of pmu-chain-promotion
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] x86: Allow setting of CR3 LAM bits if LAM supported
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] x86: Allow setting of CR3 LAM bits if LAM supported
- From: Chao Gao <chao.gao@xxxxxxxxx>
- linux-next: build warning after merge of the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- [PATCH v6 6/6] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v6 5/6] KVM: arm64: Reuse fields of sys_reg_desc for idreg
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v6 3/6] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v6 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v6 2/6] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v6 1/6] KVM: arm64: Move CPU ID feature registers emulation into a separate file
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v6 0/6] Support writable CPU ID registers from userspace
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- RE: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode in SGX handler
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [RESEND PATCH] selftest/vmx_nested_tsc_scaling_test: fix fp leak
- From: Hao Ge <gehao@xxxxxxxxxx>
- Re: [PATCH v3 4/8] RISC-V: KVM: Initial skeletal support for AIA
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- RE: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: "Liu, Jing2" <jing2.liu@xxxxxxxxx>
- Re: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 0/7] x86/entry: Atomic statck switching for IST
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- linux-next: manual merge of the kvm-arm tree with the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH] KVM: x86: set varaiable mitigate_smt_rsb storage-class-specifier to static
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [PATCH v3 6/8] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v3 5/8] RISC-V: KVM: Implement subtype for CSR ONE_REG interface
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/4] x86/access: Forced emulation support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/4] x86/access: Forced emulation support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/8] RISC-V: KVM: Initial skeletal support for AIA
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Use is_64_bit_mode() to check 64-bit mode
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [Patch v4 08/18] KVM: x86/mmu: Track unused mmu_shadowed_info_cache pages count via global counter
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v4 15/18] KVM: mmu: Add NUMA node support in struct kvm_mmu_memory_cache{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v4 16/18] KVM: x86/mmu: Allocate numa aware page tables during page fault
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v4 16/18] KVM: x86/mmu: Allocate numa aware page tables during page fault
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH V2 7/8] vfio/pci: Support dynamic MSI-x
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] vfio/cdx: add support for CDX bus
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 6/7] KVM: arm64: Break the table entries using TLBI range instructions
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v2 3/7] KVM: arm64: Implement __kvm_tlb_flush_range_vmid_ipa()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]