Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 6/9] RISC-V: Export sbi_get_mvendorid() and friends
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 5/9] RISC-V: KVM: Move sbi related struct and functions to kvm_vcpu_sbi.h
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/9] RISC-V: KVM: Remove redundant includes of asm/kvm_vcpu_timer.h
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3] vhost_vdpa: fix the crash in unmap a large memory
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v2 03/11] vfio: Set device->group in helper function
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: selftests: AMX test fix and cleanups
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [PATCH v5 13/19] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: selftest: Move XFD CPUID checking out of __vm_xsave_require_permission()
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v10 034/108] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 1/2] x86/cpu, kvm: Use CPU capabilities for CPUID[0x80000021].EAX
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: fix an incorrect comment in kvm_mmu_new_pgd()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 4/4] KVM: selftests: Do kvm_cpu_has() checks before creating VM+vCPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/4] KVM: selftests: Disallow "get supported CPUID" before REQ_XCOMP_GUEST_PERM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/4] KVM: selftests: Move XFD CPUID checking out of __vm_xsave_require_permission()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/4] KVM: selftests: Move __vm_xsave_require_permission() below CPUID helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/4] KVM: selftests: AMX test fix and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] vfio/iova_bitmap: refactor iova_bitmap_set() to better handle page boundaries
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2] KVM: x86/mmu: fix an incorrect comment in kvm_mmu_new_pgd()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix an incorrect comment in kvm_mmu_new_pgd
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 8/9] RISC-V: KVM: Add ONE_REG interface for mvendorid, marchid, and mimpid
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 7/9] RISC-V: KVM: Save mvendorid, marchid, and mimpid when creating VCPU
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] RISC-V: Export sbi_get_mvendorid() and friends
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 5/9] RISC-V: KVM: Move sbi related struct and functions to kvm_vcpu_sbi.h
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 4/9] RISC-V: KVM: Use switch-case in kvm_riscv_vcpu_set/get_reg()
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 3/9] RISC-V: KVM: Remove redundant includes of asm/csr.h
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 2/9] RISC-V: KVM: Remove redundant includes of asm/kvm_vcpu_timer.h
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 1/9] RISC-V: KVM: Fix reg_val check in kvm_riscv_vcpu_set_reg_config()
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 11/19] iommufd: IOCTLs for the io_pagetable
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v3 2/2] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH] vfio/iova_bitmap: refactor iova_bitmap_set() to better handle page boundaries
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH] vfio/iova_bitmap: refactor iova_bitmap_set() to better handle page boundaries
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 14/19] iommufd: Add kAPI toward external drivers for kernel access
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 0/8] x86: KVM: Advertise CPUID of new Intel platform instructions to user space
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: Mark KVM_SET_MEMORY_REGION and KVM_SET_MEMORY_ALIAS as obsoleted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 11/19] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 11/19] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix an incorrect comment in kvm_mmu_new_pgd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: Nvidia GPU PCI passthrough and kernel commit #5f33887a36824f1e906863460535be5d841a4364
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [RFC PATCH v3 2/2] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/2] s390x: add a library for CMM-related functions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftest: Move XFD CPUID checking out of __vm_xsave_require_permission()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 9/9] RISC-V: KVM: Add ONE_REG interface to enable/disable SBI extensions
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 8/9] RISC-V: KVM: Add ONE_REG interface for mvendorid, marchid, and mimpid
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 7/9] RISC-V: KVM: Save mvendorid, marchid, and mimpid when creating VCPU
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 6/9] RISC-V: Export sbi_get_mvendorid() and friends
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 4/9] RISC-V: KVM: Use switch-case in kvm_riscv_vcpu_set/get_reg()
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 5/9] RISC-V: KVM: Move sbi related struct and functions to kvm_vcpu_sbi.h
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 3/9] RISC-V: KVM: Remove redundant includes of asm/csr.h
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 2/9] RISC-V: KVM: Remove redundant includes of asm/kvm_vcpu_timer.h
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 1/9] RISC-V: KVM: Fix reg_val check in kvm_riscv_vcpu_set_reg_config()
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 0/9] RISC-V KVM ONE_REG interface for SBI
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 14/19] iommufd: Add kAPI toward external drivers for kernel access
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v1 1/1] lib: s390x: add smp_cpu_setup_cur_psw_mask
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [bug report] KVM: x86: allow L1 to not intercept triple fault
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v1 1/1] lib: s390x: add smp_cpu_setup_cur_psw_mask
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/19] iommufd: Add kAPI toward external drivers for physical devices
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/2] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/2] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/iova_bitmap: refactor iova_bitmap_set() to better handle page boundaries
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 13/19] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v1 1/1] lib: s390x: add smp_cpu_setup_cur_psw_mask
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH linux-next] KVM: SVM: remove redundant ret variable
- From: <zhang.songyi@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v5 13/19] iommufd: Add kAPI toward external drivers for physical devices
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v2] vhost_vdpa: fix the crash in unmap a large memory
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: "Wang, Zhi A" <zhi.a.wang@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC v2 07/11] vfio: Swap order of vfio_device_container_register() and open_device()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC v2 06/11] vfio: Move device open/close code to be helpfers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC v2 05/11] vfio: Make vfio_device_open() group agnostic
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC v2 04/11] vfio: Wrap group codes to be helpers for __vfio_register_dev() and unregister
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC v2 03/11] vfio: Set device->group in helper function
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v5 11/19] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- RE: [RFC v2 10/11] vfio: Refactor dma APIs for emulated devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [RFC v2 09/11] vfio: Wrap vfio group module init/clean code into helpers
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v2 07/11] vfio: Swap order of vfio_device_container_register() and open_device()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v2 06/11] vfio: Move device open/close code to be helpfers
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] s390/mm: Use pmd_pgtable_page() helper in __gmap_segment_gaddr()
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- RE: [RFC v2 05/11] vfio: Make vfio_device_open() group agnostic
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v2 04/11] vfio: Wrap group codes to be helpers for __vfio_register_dev() and unregister
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v2 03/11] vfio: Set device->group in helper function
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v2 02/11] vfio: Move the sanity check of the group to vfio_create_group()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC v2 01/11] vfio: Simplify vfio_create_group()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] s390/mm: Use pmd_pgtable_page() helper in __gmap_segment_gaddr()
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH] s390/mm: Use pmd_pgtable_page() helper in __gmap_segment_gaddr()
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH] s390/mm: Use pmd_pgtable_page() helper in __gmap_segment_gaddr()
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- RE: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] s390/mm: Use pmd_pgtable_page() helper in __gmap_segment_gaddr()
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [bug report] KVM: x86: allow L1 to not intercept triple fault
- From: Dan Carpenter <error27@xxxxxxxxx>
- [RFC PATCH v3 1/2] KVM: x86/mmu: plumb struct kvm all the way to pte_list_remove()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [RFC PATCH v3 2/2] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [RFC PATCH v3 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v5 13/19] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v2] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: fix an incorrect comment in kvm_mmu_new_pgd
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v5 13/19] iommufd: Add kAPI toward external drivers for physical devices
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v5 11/19] iommufd: IOCTLs for the io_pagetable
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.1-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v5 12/19] iommufd: Add a HW pagetable object
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Simplify kvm_arch_prepare_memory_region()
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH v1 1/2] KVM: x86/xen: Reconcile fast and slow paths for runstate update
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v1 0/2] KVM: x86/xen: Runstate cleanups on top of kvm/queue
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v1 2/2] KVM: x86/xen: Allow XEN_RUNSTATE_UPDATE flag behaviour to be configured
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Exit run-loop immediately if xfer_to_guest fails
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: use vma_lookup() instead of find_vma_intersection()
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v9 00/10] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 6.1-rc7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: "chenxiang (M)" <chenxiang66@xxxxxxxxxxxxx>
- Re: [patch 00/10] genirq/msi: Treewide cleanup of pointless linux/msi.h includes
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- Re: Nvidia GPU PCI passthrough and kernel commit #5f33887a36824f1e906863460535be5d841a4364
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] vfio/iova_bitmap: refactor iova_bitmap_set() to better handle page boundaries
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Christophe de Dinechin <dinechin@xxxxxxxxxx>
- [PATCH V2 10/12] vDPA/ifcvf: allocate the adapter in dev_add()
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 12/12] vDPA/ifcvf: implement features provisioning
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 02/12] vDPA/ifcvf: decouple config space ops from the adapter
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 06/12] vDPA/ifcvf: decouple vq irq requester from the adapter
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 11/12] vDPA/ifcvf: retire ifcvf_private_to_vf
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 09/12] vDPA/ifcvf: manage ifcvf_hw in the mgmt_dev
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 05/12] vDPA/ifcvf: decouple config IRQ releaser from the adapter
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 07/12] vDPA/ifcvf: decouple config/dev IRQ requester and vectors allocator from the adapter
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 04/12] vDPA/ifcvf: decouple vq IRQ releasers from the adapter
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 08/12] vDPA/ifcvf: ifcvf_request_irq works on ifcvf_hw
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 03/12] vDPA/ifcvf: alloc the mgmt_dev before the adapter
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 01/12] vDPA/ifcvf: decouple hw features manipulators from the adapter
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH V2 00/12] ifcvf/vDPA implement features provisioning
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH v3] KVM: x86/xen: add support for 32-bit guests in SCHEDOP_poll
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] s390x: add a library for CMM-related functions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/2] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v1 2/2] vfio/iova_bitmap: Fix PAGE_SIZE unaligned bitmaps
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/2] s390x: add CMM test during migration
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/2] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/2] s390x: add CMM test during migration
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] s390x: add a library for CMM-related functions
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH v5 3/8] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 6/8] KVM: x86: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 4/8] x86: KVM: Advertise AMX-FP16 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 8/8] KVM: x86: Advertise PREFETCHIT0/1 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 7/8] KVM: x86: Advertise AVX-NE-CONVERT CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 5/8] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 2/8] KVM: x86: Update KVM-only leaf handling to allow for 100% KVM-only leafs
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 1/8] KVM: x86: Add BUILD_BUG_ON() to detect bad usage of "scattered" flags
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v5 0/8] x86: KVM: Advertise CPUID of new Intel platform instructions to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [GIT PULL 15/15] KVM: s390: remove unused gisa_clear_ipm_gisc() function
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 14/15] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 13/15] KVM: s390: pv: module parameter to fence asynchronous destroy
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 12/15] KVM: s390: pv: support for Destroy fast UVC
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 11/15] KVM: s390: pv: avoid export before import if possible
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 10/15] KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 08/15] KVM: s390: pv: asynchronous destroy for reboot
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 09/15] KVM: s390: pv: api documentation for asynchronous destroy
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 07/15] s390/mm: fix virtual-physical address confusion for swiotlb
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 06/15] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 05/15] KVM: s390: pv: sort out physical vs virtual pointers usage
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 02/15] s390/entry: sort out physical vs virtual pointers usage in sie64a
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 04/15] KVM: s390: sida: sort out physical vs virtual pointers usage
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 03/15] KVM: s390: sort out physical vs virtual pointers usage
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 00/15] KVM: s390: Updates for 6.2
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 01/15] s390/mm: gmap: sort out physical vs virtual pointers usage
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] vfio/iova_bitmap: Fix PAGE_SIZE unaligned bitmaps
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 2/5] driver core: make struct class.devnode() take a const *
- From: Sumit Semwal <sumit.semwal@xxxxxxxxxx>
- Broken link on Virtio page
- From: Sandro Bonazzola <sbonazzo@xxxxxxxxxx>
- Re: [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: x86/xen: add support for 32-bit guests in SCHEDOP_poll
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] driver core: make struct class.devnode() take a const *
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v3 1/3] KVM: x86/pmu: Disable guest PEBS on hybird cpu due to heterogeneity
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v1 2/2] vfio/iova_bitmap: Fix PAGE_SIZE unaligned bitmaps
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH] lib: x86: Use portable format macros for uint32_t
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: x86/pmu: Disable guest PEBS on hybird cpu due to heterogeneity
- From: Kunkun Jiang <jiangkunkun@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/5] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [iommufd 0/2] Make mdev driver dma_unmap callback tolerant to unmaps come before device open
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [GIT PULL 1/1] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 0/1] s390 fixes for 6.1-rc7/8
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC v2 11/11] vfio: Move vfio group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v5 06/19] iommufd: File descriptor, context, kconfig and makefiles
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3] vhost_vdpa: fix the crash in unmap a large memory
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [PATCH v3] vhost_vdpa: fix the crash in unmap a large memory
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH v2 12/15] KVM: x86/vmx: Disable Arch LBREn bit in #DB and warm reset
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 11/15] KVM: x86: Add XSAVE Support for Architectural LBR
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 13/15] KVM: x86/vmx: Save/Restore guest Arch LBR Ctrl msr at SMM entry/exit
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 15/15] KVM: x86/cpuid: Advertise Arch LBR feature in CPUID
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 10/15] KVM: x86/vmx: Check Arch LBR config when return perf capabilities
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 09/15] KVM: x86: Refine the matching and clearing logic for supported_xss
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 07/15] KVM: VMX: Support passthrough of architectural LBRs
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 08/15] KVM: x86: Add Arch LBR MSRs to msrs_to_save_all list
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 14/15] KVM: x86: Add Arch LBR data MSR access interface
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 00/15] Introduce Architectural LBR for vPMU
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 04/15] KVM: PMU: disable LBR handling if architectural LBR is available
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 03/15] KVM: x86: Refresh CPUID on writes to MSR_IA32_XSS
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 05/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v2 02/15] KVM: x86: Report XSS as an MSR to be saved if there are supported features
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [iommufd 0/2] Make mdev driver dma_unmap callback tolerant to unmaps come before device open
- From: Zhenyu Wang <zhenyuw@xxxxxxxxxxxxxxx>
- Re: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: Zhenyu Wang <zhenyuw@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 106/108] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH] s390/mm: Use pmd_pgtable_page() helper in __gmap_segment_gaddr()
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH] KVM: selftest: Move XFD CPUID checking out of __vm_xsave_require_permission()
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- [PATCH v3] vhost_vdpa: fix the crash in unmap a large memory
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [PATCH v7 18/20] x86/virt/tdx: Initialize all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2] vhost_vdpa: fix the crash in unmap a large memory
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [PATCH v7 16/20] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v7 16/20] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v7 16/20] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 17/20] x86/virt/tdx: Configure global KeyID on all packages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 15/20] x86/virt/tdx: Reserve TDX module global KeyID
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 17/20] x86/virt/tdx: Configure global KeyID on all packages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/5] s390x: Add a linker script to assembly snippets
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v1 2/2] vfio/iova_bitmap: Fix PAGE_SIZE unaligned bitmaps
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [PATCH V1 vfio 09/14] vfio/mlx5: Introduce SW headers for migration states
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 01/14] net/mlx5: Introduce ifc bits for pre_copy
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 14/14] vfio/mlx5: Enable MIGRATION_PRE_COPY flag
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 13/14] vfio/mlx5: Fallback to STOP_COPY upon specific PRE_COPY error
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 10/14] vfio/mlx5: Introduce vfio precopy ioctl implementation
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 00/14] Add migration PRE_COPY support for mlx5 driver
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 07/14] vfio/mlx5: Refactor to use queue based data chunks
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 03/14] vfio/mlx5: Enforce a single SAVE command at a time
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 08/14] vfio/mlx5: Introduce device transitions of PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 06/14] vfio/mlx5: Refactor migration file state
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 04/14] vfio/mlx5: Refactor PD usage
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 02/14] vfio: Extend the device migration protocol with PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 05/14] vfio/mlx5: Refactor MKEY usage
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 12/14] vfio/mlx5: Introduce multiple loads
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 11/14] vfio/mlx5: Consider temporary end of stream as part of PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH for 8.0 v8 12/12] vdpa: always start CVQ in SVQ mode if possible
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 11/12] vdpa: add shadow_data to vhost_vdpa
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 10/12] vdpa: store x-svq parameter in VhostVDPAState
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 09/12] vdpa: add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 06/12] vdpa: extract vhost_vdpa_svq_allocate_iova_tree
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 07/12] vdpa: move SVQ vring features check to net/
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 08/12] vdpa: allocate SVQ array unconditionally
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 05/12] vdpa: add vhost_vdpa_net_valid_svq_features
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 01/12] vdpa: use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 03/12] vhost: allocate SVQ device file descriptors at device start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 02/12] vhost: set SVQ device call handler at SVQ start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 00/12] ASID support in vhost-vdpa net
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 04/12] vhost: move iova_tree set to vhost_svq_start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] arm/arm64: mmu: Rename mmu_get_pte() -> follow_pte()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] arm/arm64: mmu: Teach virt_to_pte_phys() about block descriptors
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] arm/arm64: teach virt_to_pte_phys() about block descriptors
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Arseniy Krasnov <oxffffaa@xxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v2 11/11] vfio: Move vfio group specific code into group.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Arseniy Krasnov <oxffffaa@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/5] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [External] Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [RFC v2 03/11] vfio: Set device->group in helper function
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC v2 03/11] vfio: Set device->group in helper function
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/cpu, kvm: Use CPU capabilities for CPUID[0x80000021].EAX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/cpu, kvm: Use CPU capabilities for CPUID[0x80000021].EAX
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] lib: x86: Use portable format macros for uint32_t
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 11/11] vfio: Move vfio group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 07/11] vfio: Swap order of vfio_device_container_register() and open_device()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 10/11] vfio: Refactor dma APIs for emulated devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 05/11] vfio: Make vfio_device_open() group agnostic
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 00/11] Move group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 09/11] vfio: Wrap vfio group module init/clean code into helpers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 03/11] vfio: Set device->group in helper function
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 01/11] vfio: Simplify vfio_create_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 06/11] vfio: Move device open/close code to be helpfers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 04/11] vfio: Wrap group codes to be helpers for __vfio_register_dev() and unregister
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 02/11] vfio: Move the sanity check of the group to vfio_create_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 11/27] x86/pmu: Update rdpmc testcase to cover #GP path
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v1] KVM: s390: GISA: sort out physical vs virtual pointers usage
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 11/27] x86/pmu: Update rdpmc testcase to cover #GP path
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 12/20] x86/virt/tdx: Create TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 06/17] Use memfd for hugetlbfs when allocating guest ram
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool v1 06/17] Use memfd for hugetlbfs when allocating guest ram
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [iommufd 0/2] Make mdev driver dma_unmap callback tolerant to unmaps come before device open
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v9 00/10] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [Bug 216737] Call trace happens on guest after running pt vmx tool
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216737] Call trace happens on guest after running pt vmx tool
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216737] New: Call trace happens on guest after running pt vmx tool
- From: bugzilla-daemon@xxxxxxxxxx
- RE: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [iommufd 0/2] Make mdev driver dma_unmap callback tolerant to unmaps come before device open
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- RE: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [RFC 00/10] Move group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 10/10] vfio: Move vfio group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 09/10] vfio: Refactor dma APIs for emulated devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: Nvidia GPU PCI passthrough and kernel commit #5f33887a36824f1e906863460535be5d841a4364
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 18/20] x86/virt/tdx: Initialize all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] KVM: always declare prototype for kvm_arch_irqchip_in_kernel
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH v2] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: x86/xen: add support for 32-bit guests in SCHEDOP_poll
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 17/20] x86/virt/tdx: Configure global KeyID on all packages
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 2/2] x86/cpu, kvm: Support AMD Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v2 1/2] x86/cpu, kvm: Use CPU capabilities for CPUID[0x80000021].EAX
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v2 0/2] x86/cpu, kvm: Support AMD Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v7 16/20] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v7 15/20] x86/virt/tdx: Reserve TDX module global KeyID
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 12/20] x86/virt/tdx: Create TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 00/10] Move group specific code into group.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 10/10] vfio: Move vfio group specific code into group.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Make number of event channels defines less magical
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 03/17] Rename parameter in mmap_anon_or_hugetlbfs()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 01/17] Initialize the return value in kvm__for_each_mem_bank()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 01/19] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 09/10] vfio: Refactor dma APIs for emulated devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH kvmtool v1 03/17] Rename parameter in mmap_anon_or_hugetlbfs()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] s390x: add a library for CMM-related functions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/xen: Only do in-kernel acceleration of hypercalls for guest CPL0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86/xen: Validate port number in SCHEDOP_poll
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 036/144] KVM: selftest: Add proper helpers for x86-specific save/restore ioctls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 01/17] Initialize the return value in kvm__for_each_mem_bank()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [RFC 10/10] vfio: Move vfio group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 01/10] vfio: Simplify vfio_create_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 05/10] vfio: Move device open/close code to be helpfers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 06/10] vfio: Swap order of vfio_device_container_register() and open_device()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 02/10] vfio: Move the sanity check of the group to vfio_create_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 03/10] vfio: Wrap group codes to be helpers for __vfio_register_dev() and unregister
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 08/10] vfio: Wrap vfio group module init/clean code into helpers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 07/10] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 04/10] vfio: Make vfio_device_open() group agnostic
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 09/10] vfio: Refactor dma APIs for emulated devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 00/10] Move group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 100/108] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC 8/9] RISC-V: KVM: Implement perf support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [iommufd 0/2] Make mdev driver dma_unmap callback tolerant to unmaps come before device open
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/5] s390x: snippets: Fix SET_PSW_NEW_ADDR macro
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/5] s390x: Clear first stack frame and end backtrace early
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/5] lib: s390x: sie: Set guest memory pointer
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/5] lib: s390x: Handle debug prints for SIE exceptions correctly
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/5] s390x: Add a linker script to assembly snippets
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/11] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 00/11] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 11/27] lib: Add random number generator
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] s390x: add a library for CMM-related functions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- [PATCH 2/5] driver core: make struct class.devnode() take a const *
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 07/20] x86/virt/tdx: Do TDX module global initialization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH 2/4] hisi_acc_vfio_pci: Introduce support for PRE_COPY state transitions
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH 3/4] hisi_acc_vfio_pci: Move the dev compatibility tests for early check
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH 4/4] hisi_acc_vfio_pci: Enable PRE_COPY flag
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH 0/4] hisi_acc_vfio_pci: Add PRE_COPY migration feature support
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH 1/4] hisi_acc_vfio_pci: Add support for precopy IOCTL
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/5] s390x: Clear first stack frame and end backtrace early
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/5] s390x: snippets: Fix SET_PSW_NEW_ADDR macro
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/5] lib: s390x: sie: Set guest memory pointer
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 011/108] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 11/27] lib: Add random number generator
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH linux-next] KVM: x86: remove redundant ret variable
- From: <zhang.songyi@xxxxxxxxxx>
- Re: [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvm-unit-tests PATCH 4/5] s390x: Clear first stack frame and end backtrace early
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 5/5] lib: s390x: Handle debug prints for SIE exceptions correctly
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/5] lib: s390x: sie: Set guest memory pointer
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 2/5] s390x: snippets: Fix SET_PSW_NEW_ADDR macro
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/5] s390x: Snippet fixes
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/5] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/platform: Remove the ACPI buffer memory to fix memory leak
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- RE: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v5 01/19] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 15/16] KVM: arm64: PMU: Simplify vcpu computation on perf overflow notification
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 14/16] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: selftests: Have perf_test_util signal when to stop vCPUs
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 00/11] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 036/144] KVM: selftest: Add proper helpers for x86-specific save/restore ioctls
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- RE: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- [Bug 216725] VMXON with CR0 bit 5 cleared should #GP, got '6'
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC 8/9] RISC-V: KVM: Implement perf support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 2/3] KVM: x86/xen: Only do in-kernel acceleration of hypercalls for guest CPL0
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/3] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/3] KVM: x86/xen: Validate port number in SCHEDOP_poll
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Make number of event channels defines less magical
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 7/9] RISC-V: KVM: Implement trap & emulate for hpmcounters
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Make number of event channels defines less magical
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] inconsistent lock state in sync_info_debugfs_show
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 07/20] x86/virt/tdx: Do TDX module global initialization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 27/27] x86: ipi_stress: add optional SVM support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 26/27] svm: move test_guest_func to test context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 25/27] svm: move nested vcpu to test context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v1 02/16] vfio/ccw: simplify the cp_get_orb interface
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 15/27] svm: move some svm support functions into lib/x86/svm_lib.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 19/27] svm: rewerite vm entry macros
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 20/27] svm: move v2 tests run into test_run
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 24/27] svm: use svm_test_context in v2 tests
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 22/27] svm: introduce svm_vcpu
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v1 01/16] vfio/ccw: cleanup some of the mdev commentary
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 16/27] svm: move setup_svm() to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 13/27] svm: remove get_npt_pte extern
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 18/27] svm: move vmcb_ident to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 17/27] svm: correctly skip if NPT not supported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 23/27] svm: introduce struct svm_test_context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 21/27] svm: cleanup the default_prepare
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 12/27] x86: add IPI stress test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 14/27] svm: move svm spec definitions to lib/x86/svm.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 11/27] lib: Add random number generator
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 07/27] x86: Add test for #SMI during interrupt window
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/2] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 08/27] x86: Add a simple test for SYSENTER instruction.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/2] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 03/27] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 04/27] svm: remove nop after stgi/clgi
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 09/27] svm: add simple nested shutdown test.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 10/27] SVM: add two tests for exitintinto on exception
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 05/27] svm: make svm_intr_intercept_mix_if/gif test a bit more robust
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 06/27] svm: use apic_start_timer/apic_stop_timer instead of open coding it
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 02/27] x86: introduce sti_nop() and sti_nop_cli()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 01/27] x86: replace irq_{enable|disable}() with sti()/cli()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 00/27] kvm-unit-tests: set of fixes and new tests
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: x86: Hyper-V invariant TSC control feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3] virtio_console: Introduce an ID allocator for virtual console numbers
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH for-next] KVM: Push dirty information unconditionally to backup bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [PATCH] vfio/platform: Remove the ACPI buffer memory to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- [Bug 216725] VMXON with CR0 bit 5 cleared should #GP, got '6'
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]