Linux KVM Virtualization
[Prev Page][Next Page]
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [RFC 10/12] vfio: Add cdev for vfio_device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] accel/kvm: Specify default IPA size for arm64
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- RE: [RFC 09/12] vfio: Make vfio_device_open() exclusive between group path and device cdev path
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 08/12] vfio: Add infrastructure for bind_iommufd and attach
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH kernel v2 0/3] KVM: SEV: Enable AMD SEV-ES DebugSwap
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] target/i386/kvm: fix two svm pmu virtualization bugs
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: Sanitize sev_platform_init() error messages
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v8 04/16] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 02/16] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2] crypto: ccp: Sanitize sev_platform_init() error messages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxxx>
- Re: [PATCH 2/7] KVM: arm64: PMU: Use reset_pmu_reg() for PMUSERENR_EL0 and PMCCFILTR_EL0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/7] KVM: arm64: PMU: Have reset_pmu_reg() to clear a register
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 6/6] KVM: VMX: Intercept reads to invalid and write-only x2APIC registers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: VMX: Always intercept accesses to unsupported "extended" x2APIC regs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: x86: Split out logic to generate "readable" APIC regs mask to helper
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: x86: Mark x2APIC DFR reg as non-existent for x2APIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Inject #GP on x2APIC WRMSR that sets reserved bits 63:32
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH V1 vfio 6/6] vfio/platform: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 5/6] vfio/fsl-mc: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 4/6] vfio/hisi: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 3/6] vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 2/6] vfio/mlx5: Allow loading of larger images than 512 MB
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 1/6] vfio/mlx5: Fix UBSAN note
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 0/6] Move to use cgroups for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v5 33/33] KVM: x86: Add helpers to recalc physical vs. logical optimized APIC maps
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 32/33] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 27/33] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 18/33] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 10/33] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 03/33] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH rcu 05/27] arch/riscv/kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH rcu 05/27] arch/riscv/kvm: Remove "select SRCU"
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH] vfio: platform: No need to check res again
- From: Angus Chen <angus.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86/msr: Add testcases for x2APIC MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86/apic: Refactor x2APIC reg helper to provide exact semantics
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86/msr: Skip built-in testcases if user provides custom MSR+value to test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] x86: Add testcases for x2APIC MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/6] KVM: VMX: Intercept reads to invalid and write-only x2APIC registers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/6] KVM: VMX: Always intercept accesses to unsupported "extended" x2APIC regs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/6] KVM: x86: Split out logic to generate "readable" APIC regs mask to helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/6] KVM: x86: Mark x2APIC DFR reg as non-existent for x2APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/6] KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/6] KVM: x86: Inject #GP on x2APIC WRMSR that sets reserved bits 63:32
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/6] KVM: x86: x2APIC reserved bits/regs fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH net-next v9] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH v8 14/16] x86/virt/tdx: Initialize all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 4/6] KVM: x86: Explicitly state lockdep condition of msr_filter update
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 2/6] KVM: x86: Optimize kvm->lock and SRCU interaction (KVM_X86_SET_MSR_FILTER)
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 5/6] KVM: x86: Remove unnecessary initialization in kvm_vm_ioctl_set_msr_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 1/6] KVM: x86: Optimize kvm->lock and SRCU interaction (KVM_SET_PMU_EVENT_FILTER)
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 0/6] kvm->lock vs. SRCU sync optimizations
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 6/6] KVM: x86: Simplify msr_io()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 3/6] KVM: x86: Simplify msr_filter update
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [RFC PATCH v2 32/32] x86/fred: disable FRED by default in its early stage
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 32/32] x86/fred: disable FRED by default in its early stage
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC 04/14] KVM: x86/MMU: Expose functions for paging_tmpl.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v8 09/16] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] KVM: selftests: Fix build of rseq test
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC 00/14] KVM: x86/MMU: Formalize the Shadow MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v8 03/16] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 01/16] x86/tdx: Define TDX supported page sizes as macros
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 3/5] target/i386: Add a couple of feature bits in 8000_0008_EBX
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 0/5] target/i386: Update AMD EPYC CPU Models
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 1/5] target/i386: allow versioned CPUs to specify new cache_info
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 2/5] target/i386: Add new EPYC CPU versions with updated cache_info
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 5/5] target/i386: Add missing feature bits in EPYC-Milan model
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 4/5] target/i386: Add feature bits for CPUID_Fn80000021_EAX
- From: Babu Moger <babu.moger@xxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v8 04/16] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 02/16] x86/virt/tdx: Detect TDX during kernel boot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/8] iommu: Remove iommu_map_atomic()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 8/8] iommu/s390: Push the gfp parameter to the kmem_cache_alloc()'s
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 6/8] iommu/intel: Add a gfp parameter to alloc_pgtable_page()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 5/8] iommufd: Use GFP_KERNEL_ACCOUNT for iommu_map()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 7/8] iommu/intel: Support the gfp argument to the map_pages op
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 3/8] iommu: Add a gfp parameter to iommu_map_sg()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 0/8] Let iommufd charge IOPTE allocations to the memory cgroup
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 4/8] iommu/dma: Use the gfp parameter in __iommu_dma_alloc_noncontiguous()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd v3 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 4/9] iommufd: Convert to msi_device_has_isolated_msi()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 3/9] vfio/type1: Convert to iommu_group_has_isolated_msi()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v7 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v7 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [RFC PATCH v2 29/32] x86/ia32: do not modify the DPL bits for a null selector
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 25/32] x86/fred: disallow the swapgs instruction when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 32/32] x86/fred: disable FRED by default in its early stage
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 28/32] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 30/32] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 26/32] x86/fred: no ESPFIX needed when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 31/32] x86/fred: allow dynamic stack frame size
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 27/32] x86/fred: allow single-step trap and NMI when starting a new thread
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 24/32] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 22/32] x86/fred: FRED initialization code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 02/32] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 15/32] x86/fred: make unions for the cs and ss fields in struct pt_regs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 10/32] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 16/32] x86/fred: reserve space for the FRED stack frame
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 01/32] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [RFC PATCH v2 12/32] x86/cpu: add MSR numbers for FRED configuration
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 13/32] x86/fred: header file for event types
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 09/32] x86/cpu: add X86_CR4_FRED macro
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 19/32] x86/fred: add a NMI entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 03/32] x86/traps: add install_system_interrupt_handler()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 20/32] x86/fred: add a machine check entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 00/32] x86: enable FRED for x86-64
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 11/32] x86/fred: if CONFIG_X86_FRED is disabled, disable FRED support
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 05/32] x86/traps: add exc_raise_irq() for VMX IRQ reinjection
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 17/32] x86/fred: add a page fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 18/32] x86/fred: add a debug fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 04/32] x86/traps: add external_interrupt() to dispatch external interrupts
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 06/32] x86/cpufeature: add the cpu feature bit for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 07/32] x86/opcode: add ERETU, ERETS instructions to x86-opcode-map
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 14/32] x86/fred: header file with FRED definitions
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 08/32] x86/objtool: teach objtool about ERETU and ERETS
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH][resend] KVM: x86: fire timer when it is migrated and expired, and in oneshot mode
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: [PATCH] kvm: x86/mmu: Remove FNAME(is_self_change_mapping)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [Bug 216891] The interface for creating SR-IOV VF doesn't exist
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216891] New: The interface for creating SR-IOV VF doesn't exist
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v5 30/33] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 25/33] KVM: SVM: Always update local APIC on writes to logical dest register
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 29/33] KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 23/33] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 33/33] KVM: x86: Add helpers to recalc physical vs. logical optimized APIC maps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 24/33] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 31/33] KVM: x86: Track required APICv inhibits with variable, not callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 26/33] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 21/33] KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 27/33] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 28/33] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 32/33] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 22/33] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 20/33] KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 19/33] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 18/33] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 17/33] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 16/33] KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 07/33] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 06/33] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 14/33] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 15/33] KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 08/33] KVM: x86: Handle APICv updates for APIC "mode" changes via request
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 10/33] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 13/33] KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 11/33] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 12/33] KVM: SVM: Compute dest based on sender's x2APIC status for AVIC kick
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 05/33] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 09/33] KVM: x86: Move APIC access page helper to common x86 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 01/33] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 04/33] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 03/33] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 00/33] KVM: x86: AVIC and local APIC fixes+cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 02/33] KVM: x86: Purge "highest ISR" cache when updating APICv state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 1/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: selftests: Add XCR0 Test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: selftests: Add XCR0 Test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH] Documentation: kvm: clarify SRCU locking order
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH v2] KVM: x86: Replace cpu_dirty_logging_count with nr_memslots_dirty_logging
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH iommufd v3 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 1/9] irq: Add msi_device_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 6/9] irq: Rename IRQ_DOMAIN_MSI_REMAP to IRQ_DOMAIN_ISOLATED_MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 4/9] iommufd: Convert to msi_device_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 3/9] vfio/type1: Convert to iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 5/9] irq: Remove unused irq_domain_check_msi_remap() code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v3 8/9] irq/s390: Add arch_is_isolated_msi() for s390
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH] KVM: x86: Replace 0-length arrays with flexible arrays
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Replace cpu_dirty_logging_count with nr_memslots_dirty_logging
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Replace cpu_dirty_logging_count with nr_memslots_dirty_logging
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL 4/4] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.2, take #1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH rcu 06/27] arch/s390/kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v14 02/11] s390x/cpu topology: add topology entries on CPU hotplug
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 11/11] docs/s390x/cpu topology: document s390x cpu topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 01/11] s390x/cpu topology: adding s390 specificities to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 06/11] s390x/cpu topology: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 10/11] qapi/s390/cpu topology: POLARITY_CHANGE qapi event
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 00/11] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 05/11] s390x/cpu topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 07/11] target/s390x/cpu topology: activating CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v14 04/11] s390x/sclp: reporting the maximum nested topology entries
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v5] KVM: MMU: Make the definition of 'INVALID_GPA' common
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL 4/4] s390x: add CMM test during migration
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL 2/4] s390x: use the new PSW and PSW_WITH_CUR_MASK macros
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 0/4] s390x: storage key and CMM concurrent tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 3/4] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 1/4] lib: s390x: add PSW and PSW_WITH_CUR_MASK macros
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 4/4] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] s390x: Fix integer literal in skey.c
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH] kvm: x86/mmu: Rename SPTE_TDP_AD_ENABLED_MASK to SPTE_TDP_AD_ENABLED
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH] kvm: x86/mmu: Don't clear write flooding for direct SP
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 4/7] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 6/7] kvm: x86/mmu: Remove FNAME(invlpg)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 5/7] kvm: x86/mmu: Move the code out of FNAME(sync_page)'s loop body into mmu.c
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 3/7] kvm: x86/mmu: Use kvm_mmu_invalidate_gva() in nested_ept_invalidate_addr()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 7/7] kvm: x86/mmu: Remove @no_dirty_log from FNAME(prefetch_gpte)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 2/7] kvm: x86/mmu: Use kvm_mmu_invalidate_gva() in kvm_mmu_invpcid_gva()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 1/7] kvm: x86/mmu: Use KVM_MMU_ROOT_XXX for kvm_mmu_invalidate_gva()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH rcu 06/27] arch/s390/kvm: Remove "select SRCU"
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH] vhost-test: remove meaningless debug info
- From: liming.wu@xxxxxxxxxxxxxxx
- Re: [syzbot] kernel BUG in vhost_vsock_handle_tx_kick
- From: syzbot <syzbot+30b72abaa17c07fe39dd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [GIT PULL v2] virtio,vhost,vdpa: fixes, cleanups
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 09/27] drm/i915/gvt: Protect gfn hash table with dedicated mutex
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH rcu 03/27] arch/mips/kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH rcu 05/27] arch/riscv/kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH rcu 01/27] arch/x86: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH rcu 06/27] arch/s390/kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH iommufd v2 8/9] irq/s390: Add arch_is_isolated_msi() for s390
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 07/12] vfio: Block device access via device fd until device is opened
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH] vhost/vsock: check length in rx header
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 PATCH 0/4] Execute hypercalls according to host cpu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 0/4] Qemu SEV reduced-phys-bits fixes
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [kvm-unit-tests PATCH v1] s390x: Fix integer literal in skey.c
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1] s390x: Fix integer literal in skey.c
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: selftests: Test the PMU event "Instructions retired"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86/pmu: Prevent the PMU from counting disallowed events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: selftests: Add XCR0 Test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: selftests: Add XFEATURE masks to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: Clear all supported AVX-512 xfeatures if they are not all set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: Clear all supported AVX-512 xfeatures if they are not all set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Ignore host accesses to higher version PMU features MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v2 0/1] vfio/type1: Fix vfio-pci pass-through of ISM devices
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [RFC 00/12] Add vfio_device cdev for iommufd support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH] ci/cirrus-ci-macos: Update to the latest macOS version
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [syzbot] kernel BUG in vhost_vsock_handle_tx_kick
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [syzbot] kernel BUG in vhost_vsock_handle_tx_kick
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [syzbot] kernel BUG in vhost_vsock_handle_tx_kick
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [PATCH] KVM: use unified srcu interface function
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 12/14] KVM: selftests: Use wildcards to find library source files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC] Improving userfaultfd scalability for live migration
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [RFC] Improving userfaultfd scalability for live migration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 19/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v4 00/13] Add Hyper-v extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [syzbot] kernel BUG in vhost_vsock_handle_tx_kick
- From: syzbot <syzbot+30b72abaa17c07fe39dd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 216867] KVM instruction emulation breaks LOCK instruction atomicity when CMPXCHG fails
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216867] KVM instruction emulation breaks LOCK instruction atomicity when CMPXCHG fails
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216867] KVM instruction emulation breaks LOCK instruction atomicity when CMPXCHG fails
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [Bug 216867] KVM instruction emulation breaks LOCK instruction atomicity when CMPXCHG fails
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 216867] New: KVM instruction emulation breaks LOCK instruction atomicity when CMPXCHG fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/27] drm/i915/gvt: Protect gfn hash table with dedicated mutex
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 vfio 3/7] vfio/pds: Add VFIO live migration support
- From: Shannon Nelson <shannon.nelson@xxxxxxx>
- [PATCH v2] Convert backwards goto with a while loop
- From: Shachar Raindel <shacharr@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [RFC PATCH v2 vfio 1/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Shannon Nelson <shannon.nelson@xxxxxxx>
- Re: [PATCH v8 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V7 3/7] vfio/type1: track locked_vm per dma
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V7 4/7] vfio/type1: restore locked_vm
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] Convert backwards goto into a while loop
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] Documentation: kvm: clarify SRCU locking order
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [GIT PULL v2] virtio,vhost,vdpa: fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V7 4/7] vfio/type1: restore locked_vm
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V7 3/7] vfio/type1: track locked_vm per dma
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] Documentation: KVM: Update AMD memory encryption link
- From: Wyes Karny <wyes.karny@xxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC PATCH v2 vfio 3/7] vfio/pds: Add VFIO live migration support
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [RFC PATCH v2 vfio 1/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2 2/3] KVM: arm64: Document the behaviour of S1PTW faults on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: arm64: Convert FSC_* over to ESR_ELx_FSC_*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: arm64: Fix handling of S1PTW S2 fault on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 000/108] KVM TDX basic feature support
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: nv: Avoid block mapping if max_map_size is smaller than block size.
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- RE: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH vfio 2/6] vfio/mlx5: Allow loading of larger images than 512 MB
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: Major Saheb <majosaheb@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: supervisor write access in kernel mode in __pv_queued_spin_unlock_slowpath
- From: Hyeonggon Yoo <42.hyeyoo@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Shawn Michaels <shawn_michaels@xxxxxx>
- [PATCH 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 0/1] vfio/type1: Fix vfio-pci pass-through of ISM devices
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [kvm:queue 65/153] arch/x86/kvm/cpuid.c:704:9: error: implicit declaration of function 'kvm_cpu_cap_init_scattered'; did you mean 'kvm_cpu_cap_init_kvm_defined'?
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: supervisor write access in kernel mode in __pv_queued_spin_unlock_slowpath
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- supervisor write access in kernel mode in __pv_queued_spin_unlock_slowpath
- From: Hyeonggon Yoo <42.hyeyoo@xxxxxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Alexander Graf <agraf@xxxxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Alexander Graf <agraf@xxxxxxxxx>
- Re: [RFC] Catch dwmw2's deadlock
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Alexander Graf <agraf@xxxxxxxxx>
- [PATCH v2 6/6] KVM: selftests: Add XCR0 Test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 5/6] KVM: selftests: Add XFEATURE masks to common code
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: selftests: Hoist XGETBV and XSETBV to make them more accessible
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: x86: Clear all supported AMX xfeatures if they are not all set
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: x86: Clear all supported AVX-512 xfeatures if they are not all set
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 0/6] Clean up the supported xfeatures
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC] Catch dwmw2's deadlock
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Catch dwmw2's deadlock
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 05/64] KVM: x86: Add 'update_mem_attr' x86 op
- From: Borislav Petkov <bp@xxxxxxxxx>
- checkpoint/restore: Adding more "Getters" to the KVM API
- From: scalingtree <scalingtree@xxxxxxxxx>
- [PATCH 7/7] KVM: selftests: aarch64: vPMU register test for unimplemented counters
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 6/7] KVM: selftests: aarch64: vPMU register test for implemented counters
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 5/7] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 4/7] tools: arm64: Import perf_event.h
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 3/7] KVM: arm64: PMU: Preserve vCPU's PMCR_EL0.N value on vCPU reset
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 2/7] KVM: arm64: PMU: Use reset_pmu_reg() for PMUSERENR_EL0 and PMCCFILTR_EL0
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 1/7] KVM: arm64: PMU: Have reset_pmu_reg() to clear a register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [Bug 216867] New: KVM instruction emulation breaks LOCK instruction atomicity when CMPXCHG fails
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v2 0/2] Fix check in amx_test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Assert that XSAVE supports both XTILE{CFG,DATA}
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 4/9] KVM: Add module param to make page tables NUMA aware
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 2/9] KVM: x86/mmu: Remove zapped_obsolete_pages from struct kvm_arch{}
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH 2/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_pmu_event_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH 0/2] Fix deadlocks in kvm_vm_ioctl_set_msr_filter() and
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: nSVM: clarify recalc_intercepts() wrt CR8
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.2-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC 09/14] KVM: x86/MMU: Only make pages available on Shadow MMU fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 7/9] KVM: x86/mmu: Allocate page table's pages on NUMA node of the underlying pages
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: nv: Avoid block mapping if max_map_size is smaller than block size.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 6.2-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: nv: only emulate timers that have not yet fired
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2] KVM: move KVM_CAP_DEVICE_CTRL to the generic check
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1] KVM: destruct kvm_io_device while unregistering it from kvm_io_bus
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH vfio 2/6] vfio/mlx5: Allow loading of larger images than 512 MB
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 4/6] vfio/hisi: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 5/6] vfio/fsl-mc: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 6/6] vfio/platform: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 0/6] Move to use cgroups for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 1/6] vfio/mlx5: Fix UBSAN note
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 3/6] vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- RE: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: mlevitsk@xxxxxxxxxx
- RE: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- RE: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- [RESEND PATCH v2] KVM: use unified srcu interface function
- From: flyingpeng(彭浩) <flyingpeng@xxxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [Patch v3 9/9] KVM: x86/mmu: Reduce default cache size in KVM from 40 to PT64_ROOT_MAX_LEVEL
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 7/9] KVM: x86/mmu: Allocate page table's pages on NUMA node of the underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH] Convert backwards goto into a while loop
- From: Shachar Raindel <shacharr@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v8 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v8 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [V4 PATCH 4/4] KVM: selftests: x86: Invoke kvm hypercall as per host cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 3/4] KVM: sefltests: x86: Replace is_*cpu with is_host_*cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 2/4] KVM: selftests: x86: Add variables to store cpu type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 1/4] KVM: selftests: x86: use this_cpu_* helpers
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 0/4] Execute hypercalls according to host cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- RE: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v1 10/12] virtio-mem: Fix typo in virito_mem_intersect_memory_section() function name
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 10/12] virtio-mem: Fix typo in virito_mem_intersect_memory_section() function name
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 10/12] virtio-mem: Fix typo in virito_mem_intersect_memory_section() function name
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: fix deadlock for KVM_XEN_EVTCHN_RESET
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Remove the second definition of pr_fmt in hyperv.c
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] Documentation: kvm: clarify SRCU locking order
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: fix deadlock for KVM_XEN_EVTCHN_RESET
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: restore special vmmcall code layout needed by the harness
- From: mlevitsk@xxxxxxxxxx
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 19/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 09/27] drm/i915/gvt: Protect gfn hash table with dedicated mutex
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Add XCR0 Test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Add XCR0 Test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: selftests: Hoist XGETBV and XSETBV to make them more accessible
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 0/3] Clean up AMX cpuid bits XTILE_CFG and XTILE_DATA
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH] KVM: x86: Remove the second definition of pr_fmt in hyperv.c
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [Patch v4 02/13] KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 0/3] Clean up AMX cpuid bits XTILE_CFG and XTILE_DATA
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [Patch v3 9/9] KVM: x86/mmu: Reduce default cache size in KVM from 40 to PT64_ROOT_MAX_LEVEL
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 7/9] KVM: x86/mmu: Allocate page table's pages on NUMA node of the underlying pages
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Add XCR0 Test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 0/3] Clean up AMX cpuid bits XTILE_CFG and XTILE_DATA
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: Hoist XGETBV and XSETBV to make them more accessible
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: use unified srcu interface function
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 3/7] x86/cpu: Make X86_FEATURE_LFENCE_RDTSC a scattered feature bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 6/9] caif_virtio: convert to new unified vringh APIs
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 0/6] Introduce a vringh accessor for IO memory
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 5/9] tools/virtio: convert to use new unified vringh APIs
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 3/9] tools/virtio: convert to new vringh user APIs
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 1/9] vringh: fix a typo in comments for vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- VFIO-PCI stopped working on pc64le
- From: Timothy Pearson <tpearson@xxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH 3/6] KVM: x86/xen: Fix SRCU/RCU usage in readers of evtchn_ports
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/6] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 6/6] KVM: x86/xen: Documentation updates and clarifications
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 5/6] KVM: x86/xen: Add KVM_XEN_INVALID_GPA and KVM_XEN_INVALID_GFN to uapi
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/6] KVM: x86/xen: Use kvm_read_guest_virt() instead of open-coding it badly
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 4/6] KVM: x86/xen: Simplify eventfd IOCTLs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix SRCU/RCU usage in readers of evtchn_ports
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Ignore host accesses to higher version PMU features MSRs
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 3/3] KVM: x86: Fix a typo about msrs_to_save_all[] in kvm_init_msr_list()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 1/3] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 0/3] KVM: x86/pmu: Fix accesses to PMU MSRs in two corner cases
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- RE: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [kvm-unit-tests PATCH RESEND 2/2] x86/pmu: Wrap the written counter value with gp_counter_width
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH V2 1/2] x86/pmu: Add Intel Guest Transactional (commited) cycles testcase
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] x86/pmu: Add TSX testcase and fix force_emulation_prefix
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]