Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [Bug 216725] New: VMXON with CR0 bit 5 cleared should #GP, got '6'
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH 1/1] Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v1 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] KVM: selftests: Define and use a custom static assert in lib headers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 4/9] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 1/9] RISC-V: Define a helper function to probe number of hardware counters
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 5/6] KVM: selftests: Make vCPU exit reason test assertion common.
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 0/6] Add Hyper-v extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v1 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 13/16] vfio/ccw: allocate/populate the guest idal
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 06/16] vfio/ccw: simplify CCW chain fetch routines
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 16/16] vfio/ccw: remove old IDA format restrictions
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 08/16] vfio/ccw: pass page count to page_array struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 09/16] vfio/ccw: populate page_array struct inline
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 12/16] vfio/ccw: calculate number of IDAWs regardless of format
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 15/16] vfio/ccw: don't group contiguous pages on 2K IDAWs
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 02/16] vfio/ccw: simplify the cp_get_orb interface
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 11/16] vfio/ccw: discard second fmt-1 IDAW
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 04/16] vfio/ccw: move where IDA flag is set in ORB
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 00/16] vfio/ccw: channel program cleanup
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 14/16] vfio/ccw: handle a guest Format-1 IDAL
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 01/16] vfio/ccw: cleanup some of the mdev commentary
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 03/16] vfio/ccw: allow non-zero storage keys
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] target/i386/kvm: get and put AMD pmu registers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 02/13] KVM: nSVM: don't call nested_sync_control_from_vmcb02 on each VM exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 10/13] KVM: SVM: Add VNMI support in inject_nmi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/2] vfio/ccw: sort out physical vs virtual pointers usage
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 0/2] s390/vfio-ccw: addressing fixes
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 2/2] vfio/ccw: identify CCW data addresses as physical
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 8/9] KVM: selftests: add svm part to triple_fault_test
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 7/9] KVM: x86: allow L1 to not intercept triple fault
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 6/9] kvm: selftests: add svm nested shutdown test
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 5/9] KVM: selftests: move idt_entry to header
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 4/9] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 3/9] KVM: x86: add kvm_leave_nested
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 2/9] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 1/9] KVM: x86: nSVM: leave nested mode on vCPU free
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: Greg Kurz <groug@xxxxxxxx>
- Re: [PATCH v4 4/6] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH 3/3] target/i386/kvm: get and put AMD pmu registers
- From: Liang Yan <lyan@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: Liang Yan <lyan@xxxxxxxxxxxxxxxx>
- Re: [PATCH 09/13] KVM: SVM: allow NMI window with vNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH -next] RISC-V: KVM: optimize kvm_arch_hardware_enable()
- From: chenlifu <chenlifu@xxxxxxxxxx>
- Re: [PATCH 07/13] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 4.19 00/34] Intel RETBleed mitigations for 4.19.
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] KVM: s390: remove unused gisa_clear_ipm_gisc() function
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] Dirty quota-based throttling of vcpus
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 04/13] KVM: nSVM: clean up copying of int_ctl fields back to vmcb01/vmcb12
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 02/13] KVM: nSVM: don't call nested_sync_control_from_vmcb02 on each VM exit
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH -next] RISC-V: KVM: optimize kvm_arch_hardware_enable()
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: KVM 6.2 state
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: KVM 6.2 state
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace. #forregzbot
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: Avoid re-reading kvm->max_halt_poll_ns during halt-polling
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] kvm: fix two svm pmu virtualization bugs
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH 0/3] kvm: fix two svm pmu virtualization bugs
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- [PATCH -next] RISC-V: KVM: optimize kvm_arch_hardware_enable()
- From: Chen Lifu <chenlifu@xxxxxxxxxx>
- [PATCH v7 17/20] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 19/20] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 15/20] x86/virt/tdx: Reserve TDX module global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 18/20] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 20/20] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 16/20] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 12/20] x86/virt/tdx: Create TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 07/20] x86/virt/tdx: Do TDX module global initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 08/20] x86/virt/tdx: Do logical-cpu scope TDX module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 00/20] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [RFC PATCH 1/1] Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- [RFC PATCH 0/1] QEMU: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [syzbot] inconsistent lock state in sync_info_debugfs_show
- From: syzbot <syzbot+007bfe0f3330f6e1e7d1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: Using __weak instead of __attribute__((weak)).
- From: Mukesh Kumar Chaurasiya <mchauras.linux@xxxxxxxxx>
- Re: [PATCH V5] virt: sev: Prevent IV reuse in SNP guest driver
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v4 12/16] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] kvm: introduce a helper before creating the 1st vcpu
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 3/3] target/i386/kvm: get and put AMD pmu registers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 0/3] kvm: fix two svm pmu virtualization bugs
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [PATCH 4/4] KVM: x86/xen: Add runstate tests for 32-bit mode and crossing page boundary
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- RE: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- RE: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/4] MAINTAINERS: Add KVM x86/xen maintainer list
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 4/4] KVM: x86/xen: Add runstate tests for 32-bit mode and crossing page boundary
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/2] KVM: Add missing arch for KVM_CREATE_DEVICE and KVM_{SET,GET}_DEVICE_ATTR
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH 1/2] KVM: Mark KVM_SET_MEMORY_REGION and KVM_SET_MEMORY_ALIAS as obsoleted
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v4 12/16] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 11/16] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: Access @flags as a 32-bit value in __vmx_vcpu_run()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 5/9] perf tools: Use dedicated non-atomic clear/set bit helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/9] KVM: selftests: Add rdmsr_from_l2() implementation in Hyper-V eVMCS test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/9] KVM: selftests: Remove unused "vcpu" param to fix build error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/9] KVM: arm64: selftests: Enable single-step without a "full" ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/9] tools: Take @bit as an "unsigned long" in {clear,set}_bit() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/9] tools: Drop conflicting non-atomic test_and_{clear,set}_bit() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 9/9] tools: KVM: selftests: Convert clear/set_bit() to actual atomics
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/9] KVM: selftests: Use non-atomic clear/set bit helpers in KVM tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/9] tools: Drop "atomic_" prefix from atomic test_and_set_bit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/9] tools: Make {clear,set}_bit() atomic for reals
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH] KVM: VMX: Access @flags as a 32-bit value in __vmx_vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Build access_tracking_perf_test for arm64
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Have perf_test_util signal when to stop vCPUs
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 0/2] KVM: selftests: Enable access_tracking_perf_test for arm64
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 06/19] iommufd: File descriptor, context, kconfig and makefiles
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: KVM 6.2 state
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 2/3] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 3/3] KVM: arm64: Reject shared table walks in the hyp code
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 1/3] KVM: arm64: Take a pointer to walker data in kvm_dereference_pteref()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- KVM 6.2 state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm, vmx: don't use "unsigned long" in vmx_vcpu_enter_exit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: account allocation in generic version of kvm_arch_alloc_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: avoid memslot check in NX hugepage recovery if it cannot succeed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 4/6] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] kvm, vmx: don't use "unsigned long" in vmx_vcpu_enter_exit()
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v5 06/19] iommufd: File descriptor, context, kconfig and makefiles
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v2] KVM: x86: avoid memslot check in NX hugepage recovery if it cannot succeed
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 3/6] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: remove unused gisa_clear_ipm_gisc() function
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] x86: KVM: Advertise CPUID of new Intel platform instructions to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] KVM: s390: remove unused gisa_clear_ipm_gisc() function
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH v4 6/6] x86: KVM: Advertise PREFETCHIT0/1 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 4/6] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 5/6] x86: KVM: Advertise AVX-NE-CONVERT CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 3/6] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/6] x86: KVM: Advertise AMX-FP16 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/6] x86: KVM: Advertise CPUID of new Intel platform instructions to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v3 11/11] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH v2] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: keep track of running ioctls
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v5 05/19] iommufd: Document overview of iommufd
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v7 3/4] KVM: arm64: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v7 2/4] KVM: x86: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v3] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: Avoid re-reading kvm->max_halt_poll_ns during halt-polling
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3 1/3] accel: introduce accelerator blocker API
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] KVM: Cap vcpu->halt_poll_ns before halting rather than after
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [PATCH v3 1/3] accel: introduce accelerator blocker API
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v4 07/16] KVM: arm64: PMU: Add counter_index_to_*reg() helpers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH] vfio/mdev: fix possible memory leak in module init funcs
- From: ruanjinjie <ruanjinjie@xxxxxxxxxx>
- RE: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v5 10/19] iommufd: Data structure to provide IOVA to PFN mapping
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: disabling halt polling broken? (was Re: [PATCH 00/14] KVM: Halt-polling fixes, cleanups and a new stat)
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [PATCH v5 08/19] iommufd: PFN handling for iopt_pages
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v5 08/19] iommufd: PFN handling for iopt_pages
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 10/11] vfio: Make vfio_container optionally compiled
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 08/11] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- RE: [PATCH v3 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: x86: avoid memslot check in NX hugepage recovery if it cannot be true
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vmx: use mov instead of lea in __vmx_vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [External] Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [GIT PULL] KVM: selftests: Early pile of updates for 6.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] KVM: selftests: Early pile of updates for 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Sagi Shahar <sagis@xxxxxxxxxx>
- Re: VMX HOST_RIP target alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH v3 4/9] KVM: s390: selftest: memop: Replace macros by functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 9/9] KVM: s390: selftest: memop: Fix wrong address being used in test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 8/9] KVM: s390: selftest: memop: Fix typo
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 6/9] KVM: s390: selftest: memop: Add cmpxchg tests
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 3/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 7/9] KVM: s390: selftest: memop: Add bad address test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH Part2 v6 39/49] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- VMX HOST_RIP target alignment
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH v7 3/4] KVM: arm64: Dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] vmx: use mov instead of lea in __vmx_vcpu_run()
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH v3 11/11] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] kvm: account allocation in generic version of kvm_arch_alloc_vm()
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH 06/13] KVM: SVM: Add VNMI bit definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 39/49] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 06/13] KVM: SVM: Add VNMI bit definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 076/108] KVM: TDX: handle vcpu migration over logical processor
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH Part2 v6 39/49] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH 12/13] KVM: nSVM: emulate VMEXIT_INVALID case for nested VNMI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 04/13] KVM: nSVM: clean up copying of int_ctl fields back to vmcb01/vmcb12
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 072/108] KVM: TDX: restore user ret MSRs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 071/108] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 02/13] KVM: nSVM: don't call nested_sync_control_from_vmcb02 on each VM exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: keep track of running ioctls
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 045/108] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 2/2] kvm: sev: If ccp is busy, report throttled to guest
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2 1/2] kvm: sev: Add SEV-SNP guest request throttling
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [RFC PATCH v4 7/8] bus/cdx: add cdx-MSI domain with gic-its domain as parent
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v2 0/2] kvm: sev: Add SNP guest request throttling
- From: Dionna Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 07/13] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 041/108] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v3] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Greg Edwards <gedwards@xxxxxxx>
- Re: [V4 PATCH 2/3] KVM: selftests: Add arch specific initialization
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [V4 PATCH 1/3] KVM: selftests: move common startup logic to kvm_util.c
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH 09/13] KVM: SVM: allow NMI window with vNMI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: avoid memslot check in NX hugepage recovery if it cannot be true
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 034/108] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 033/108] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v10 032/108] KVM: x86/mmu: Make sync_page not use hard-coded 0 as the initial SPTE value
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 031/108] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 015/108] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH] KVM: x86: avoid memslot check in NX hugepage recovery if it cannot be true
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 06/13] KVM: SVM: Add VNMI bit definition
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 06/13] KVM: SVM: Add VNMI bit definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/10] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] KVM: Cap vcpu->halt_poll_ns before halting rather than after
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH 06/13] KVM: SVM: Add VNMI bit definition
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 10/13] KVM: SVM: Add VNMI support in inject_nmi
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 13/13] KVM: SVM: Enable VNMI feature
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 11/13] KVM: nSVM: implement nested VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 12/13] KVM: nSVM: emulate VMEXIT_INVALID case for nested VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 08/13] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 07/13] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 02/13] KVM: nSVM: don't call nested_sync_control_from_vmcb02 on each VM exit
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 05/13] x86/cpu: Add CPUID feature bit for VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 09/13] KVM: SVM: allow NMI window with vNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 06/13] KVM: SVM: Add VNMI bit definition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 00/13] SVM: vNMI (with my fixes)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 03/13] KVM: nSVM: rename nested_sync_control_from_vmcb02 to nested_sync_int_ctl_from_vmcb02
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 01/13] KVM: nSVM: don't sync back tlb_ctl on nested VM exit
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 04/13] KVM: nSVM: clean up copying of int_ctl fields back to vmcb01/vmcb12
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH V5] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [GIT PULL] KVM: selftests: Early pile of updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM: selftests: Early pile of updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM: selftests: Early pile of updates for 6.2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL] x86: Fixes, cleanups, and new sub-tests
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Cleanup VMFUNC handling in KVM.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 00/10] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH 4.19 34/34] x86/speculation: Add RSB VM Exit protections
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 33/34] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 32/34] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 19/34] x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 30/34] x86/bugs: Add Cannon lake to RETBleed affected CPU list
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 29/34] x86/cpu/amd: Enumerate BTC_NO
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 27/34] x86/speculation: Fill RSB on vmexit for IBRS
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 22/34] x86/speculation: Fix SPEC_CTRL write on SMT state change
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 20/34] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 26/34] KVM: VMX: Fix IBRS handling after vmexit
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 31/34] x86/speculation: Disable RRSBA behavior
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 24/34] x86/speculation: Remove x86_spec_ctrl_mask
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 25/34] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 28/34] x86/common: Stamp out the stepping madness
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 18/34] intel_idle: Disable IBRS during long idle
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 23/34] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 21/34] x86/speculation: Fix firmware entry SPEC_CTRL handling
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 16/34] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 17/34] x86/bugs: Report Intel retbleed vulnerability
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 13/34] x86/entry: Add kernel IBRS implementation
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 15/34] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 14/34] x86/bugs: Optimize SPEC_CTRL MSR writes
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 12/34] x86/entry: Remove skip_r11rcx
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 11/34] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 10/34] x86/bugs: Add AMD retbleed= boot parameter
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 09/34] x86/bugs: Report AMD retbleed vulnerability
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 08/34] x86/cpufeatures: Move RETPOLINE flags to word 11
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 04/34] x86/cpufeature: Fix various quality problems in the <asm/cpu_device_hd.h> header
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 06/34] x86/cpu: Add consistent CPU match macros
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 02/34] Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 03/34] x86/cpufeature: Add facility to check for min microcode revisions
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 01/34] Revert "x86/speculation: Add RSB VM Exit protections"
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 00/34] Intel RETBleed mitigations for 4.19.
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 07/34] x86/cpu: Add a steppings field to struct x86_cpu_id
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- [PATCH 4.19 05/34] x86/devicetable: Move x86 specific macro out of generic code
- From: Suleiman Souhlal <suleiman@xxxxxxxxxx>
- Re: [PATCH v1] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH for 8.0 v7 10/10] vdpa: Always start CVQ in SVQ mode if possible
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH for 8.0 v7 10/10] vdpa: Always start CVQ in SVQ mode if possible
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v4 06/16] KVM: arm64: PMU: Only narrow counters that are not 64bit wide
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH for 8.0 v7 10/10] vdpa: Always start CVQ in SVQ mode if possible
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v4 05/16] KVM: arm64: PMU: Narrow the overflow checking when required
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH for 8.0 v7 09/10] vdpa: Add shadow_data to vhost_vdpa
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH for 8.0 v7 08/10] vdpa: Store x-svq parameter in VhostVDPAState
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH for 8.0 v7 07/10] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH for 8.0 v7 06/10] vdpa: Allocate SVQ unconditionally
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH for 8.0 v7 05/10] vdpa: move SVQ vring features check to net/
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH for 8.0 v7 01/10] vdpa: Use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- RE: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [GIT PULL] KVM: selftests: Early pile of updates for 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 06/11] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 2/3] KVM: Avoid re-reading kvm->max_halt_poll_ns during halt-polling
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 1/3] KVM: Cap vcpu->halt_poll_ns before halting rather than after
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 0/3] KVM: Restore original behavior of kvm.halt_poll_ns
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: HORIGUCHI NAOYA(堀口 直也) <naoya.horiguchi@xxxxxxx>
- Re: [PATCH v3 06/11] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 03/11] vfio: Rename vfio_device_assign/unassign_container()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 01/11] vfio: Move vfio_device driver open/close code to a function
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 00/11] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 06/11] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 09/11] vfio: Move container related MODULE_ALIAS statements into container.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 08/11] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 05/11] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 10/11] vfio: Make vfio_container optionally compiled
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 11/11] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 02/11] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 03/19] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpufeatures: Add support for cpuid leaf 80000021/EAX (FeatureExt2Eax)
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5 18/19] iommufd: Add additional invariant assertions
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 10/19] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 19/19] iommufd: Add a selftest
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 13/19] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 00/19] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 05/19] iommufd: Document overview of iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 11/19] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 01/19] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 06/19] iommufd: File descriptor, context, kconfig and makefiles
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 04/19] scripts/kernel-doc: support EXPORT_SYMBOL_NS_GPL() with -export
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 02/19] iommu: Add device-centric DMA ownership interfaces
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 12/19] iommufd: Add a HW pagetable object
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 16/19] iommufd: Add kernel support for testing iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 14/19] iommufd: Add kAPI toward external drivers for kernel access
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 17/19] iommufd: Add some fault injection points
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 09/19] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v5 08/19] iommufd: PFN handling for iopt_pages
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Greg Edwards <gedwards@xxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpufeatures: Add support for cpuid leaf 80000021/EAX (FeatureExt2Eax)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH V5] virt: sev: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [V4 PATCH 0/3] Minor improvements to the selftest setup logic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V5] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [V4 PATCH 2/3] KVM: selftests: Add arch specific initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 PATCH 3/3] KVM: selftests: Add arch specific post vm creation hook
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 PATCH 1/3] KVM: selftests: move common startup logic to kvm_util.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Borislav Petkov <bp@xxxxxxx>
- Re: disabling halt polling broken? (was Re: [PATCH 00/14] KVM: Halt-polling fixes, cleanups and a new stat)
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCHv5 0/8] Virtual NMI feature
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 1/2] KVM: arm64: Take a pointer to walker data in kvm_dereference_pteref()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 0/2] KVM: arm64: Fixes for parallel faults series
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v9 00/10] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCHv5 0/8] Virtual NMI feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 13/44] KVM: x86: Serialize vendor module initialization (hardware setup)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCHv5 0/8] Virtual NMI feature
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCH for 8.0 v7 10/10] vdpa: Always start CVQ in SVQ mode if possible
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 07/10] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 08/10] vdpa: Store x-svq parameter in VhostVDPAState
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 09/10] vdpa: Add shadow_data to vhost_vdpa
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 05/10] vdpa: move SVQ vring features check to net/
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 06/10] vdpa: Allocate SVQ unconditionally
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 04/10] vdpa: add vhost_vdpa_net_valid_svq_features
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 02/10] vhost: set SVQ device call handler at SVQ start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 01/10] vdpa: Use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 03/10] vhost: Allocate SVQ device file descriptors at device start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v7 00/10] ASID support in vhost-vdpa net
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH v11 09/11] s390x/cpu topology: add topology machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH 1/3] x86/cpufeatures: Add support for cpuid leaf 80000021/EAX (FeatureExt2Eax)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 045/108] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 08/11] s390x/cpu topology: add topology_capable QEMU capability
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/paravirt: use common macro for creating simple asm paravirt functions
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v2] x86/paravirt: use common macro for creating simple asm paravirt functions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v10 045/108] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v11 03/11] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v10 041/108] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCHv5 0/8] Virtual NMI feature
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH linux-next] KVM: x86: Replace IS_ERR() with IS_ERR_VALUE()
- From: <ye.xingchen@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 02/16] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCHv5 0/8] Virtual NMI feature
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- Re: [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: HORIGUCHI NAOYA(堀口 直也) <naoya.horiguchi@xxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Bug report: QEMU/KVM: INIT-SIPI-SIPI while CPU is in SMM fails smp boot
- From: Eiichi Tsukata <eiichi.tsukata@xxxxxxxxxxx>
- Re: [PATCH v6 09/10] vdpa: Add listener_shadow_vq to vhost_vdpa
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 077/108] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- RE: [PATCH v4 09/17] iommufd: Data structure to provide IOVA to PFN mapping
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 1/7] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 13/44] KVM: x86: Serialize vendor module initialization (hardware setup)
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: kvm-unit-tests: inconsistent test result between run_tests.sh and standalone test
- From: Guoqing Jiang <guoqing.jiang@xxxxxxxxx>
- Re: [PATCH v4 09/17] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v4 09/17] iommufd: Data structure to provide IOVA to PFN mapping
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpufeatures: Add support for cpuid leaf 80000021/EAX (FeatureExt2Eax)
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [RFC PATCH 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH v2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 33/44] KVM: x86: Do VMX/SVM support checks directly in vendor code
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [patch 09/10] vfio/fsl-mc: Remove linux/msi.h include
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [V4 PATCH 3/3] KVM: selftests: Add arch specific post vm creation hook
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 1/3] KVM: selftests: move common startup logic to kvm_util.c
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 0/3] Minor improvements to the selftest setup logic
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 2/3] KVM: selftests: Add arch specific initialization
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH V4] virt: sev: Prevent IV reuse in SNP guest driver
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [V3 PATCH 1/4] KVM: selftests: move common startup logic to kvm_util.c
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [V3 PATCH 2/4] KVM: selftests: Add arch specific initialization
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [V3 PATCH 3/4] KVM: selftests: Add arch specific post vm creation hook
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [patch 09/10] vfio/fsl-mc: Remove linux/msi.h include
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] kernel BUG in workingset_activation (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] kernel BUG in workingset_activation (2)
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH kvmtool v1 02/17] Make mmap_hugetlbfs() static
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH linux-next] KVM: replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH linux-next] KVM: replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: Collect memory access latency samples
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Print summary stats of memory latency distribution
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 1/3] KVM: selftests: Allocate additional space for latency samples
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 0/3] Calculate memory access latency stats
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH linux-next] KVM: replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: Use a separate function for hyp stage-1 walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v4 03/17] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 1/7] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 1/7] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v4 09/17] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 0/9] nSVM: Security and correctness fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 08/17] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 03/17] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v3 1/7] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v11 09/11] s390x/cpu topology: add topology machine property
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v11 08/11] s390x/cpu topology: add topology_capable QEMU capability
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: Use a separate function for hyp stage-1 walks
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Erdem Aktas <erdemaktas@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 01/17] Initialize the return value in kvm__for_each_mem_bank()
- From: Andre Przywara <andre.przywara@xxxxxxx>
- RE: IRQ affinity from VFIO API interface
- From: "Gupta, Nipun" <Nipun.Gupta@xxxxxxx>
- Re: [PATCH v6 09/10] vdpa: Add listener_shadow_vq to vhost_vdpa
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v11 03/11] s390x/cpu topology: core_id sets s390x CPU topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- [PATCH kvmtool v1 17/17] Pass the memory file descriptor and offset when registering ram
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 13/17] Remove struct fields and code used for alignment
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 16/17] Factor out set_user_memory_region code
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 15/17] Remove no-longer unused macro
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 06/17] Use memfd for hugetlbfs when allocating guest ram
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 14/17] Replace kvm_arch_delete_ram with kvm_delete_ram
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 12/17] Use new function to align memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 04/17] Add hostmem va to debug print
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 11/17] Add a function that allocates aligned memory if specified
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 09/17] Allocate pvtime memory with memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 03/17] Rename parameter in mmap_anon_or_hugetlbfs()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 07/17] Make blk_size a parameter and pass it to mmap_hugetlbfs()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 05/17] Factor out getting the hugetlb block size
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 10/17] Allocate vesa memory with memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 02/17] Make mmap_hugetlbfs() static
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 00/17] Use memfd for guest vm memory allocation
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH kvmtool v1 01/17] Initialize the return value in kvm__for_each_mem_bank()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vmx: Do not skip segment attributes if unusable bit is set
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: kvm-unit-tests: inconsistent test result between run_tests.sh and standalone test
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH/RFC] virtio_test: A module for testing virtio via userspace
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 10/44] KVM: VMX: Clean up eVMCS enabling if KVM initialization fails
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]