Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [GIT PULL v2] virtio,vhost,vdpa: fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V7 4/7] vfio/type1: restore locked_vm
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V7 3/7] vfio/type1: track locked_vm per dma
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] Documentation: KVM: Update AMD memory encryption link
- From: Wyes Karny <wyes.karny@xxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC PATCH v2 vfio 3/7] vfio/pds: Add VFIO live migration support
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [RFC PATCH v2 vfio 1/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2 2/3] KVM: arm64: Document the behaviour of S1PTW faults on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: arm64: Convert FSC_* over to ESR_ELx_FSC_*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: arm64: Fix handling of S1PTW S2 fault on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 000/108] KVM TDX basic feature support
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: nv: Avoid block mapping if max_map_size is smaller than block size.
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- RE: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH vfio 2/6] vfio/mlx5: Allow loading of larger images than 512 MB
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: Major Saheb <majosaheb@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: supervisor write access in kernel mode in __pv_queued_spin_unlock_slowpath
- From: Hyeonggon Yoo <42.hyeyoo@xxxxxxxxx>
- Re: [PATCH 2/2] vfio/pci: Remove console drivers
- From: Shawn Michaels <shawn_michaels@xxxxxx>
- [PATCH 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH 0/1] vfio/type1: Fix vfio-pci pass-through of ISM devices
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [kvm:queue 65/153] arch/x86/kvm/cpuid.c:704:9: error: implicit declaration of function 'kvm_cpu_cap_init_scattered'; did you mean 'kvm_cpu_cap_init_kvm_defined'?
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: supervisor write access in kernel mode in __pv_queued_spin_unlock_slowpath
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- supervisor write access in kernel mode in __pv_queued_spin_unlock_slowpath
- From: Hyeonggon Yoo <42.hyeyoo@xxxxxxxxx>
- Re: [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Alexander Graf <agraf@xxxxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Alexander Graf <agraf@xxxxxxxxx>
- Re: [RFC] Catch dwmw2's deadlock
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Alexander Graf <agraf@xxxxxxxxx>
- [PATCH v2 6/6] KVM: selftests: Add XCR0 Test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 5/6] KVM: selftests: Add XFEATURE masks to common code
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: selftests: Hoist XGETBV and XSETBV to make them more accessible
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: x86: Clear all supported AMX xfeatures if they are not all set
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: x86: Clear all supported AVX-512 xfeatures if they are not all set
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 0/6] Clean up the supported xfeatures
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- qemu-system-i386: Could not install MSR_CORE_THREAD_COUNT handler: Success
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [RFC] Catch dwmw2's deadlock
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [RFC] Catch dwmw2's deadlock
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 05/64] KVM: x86: Add 'update_mem_attr' x86 op
- From: Borislav Petkov <bp@xxxxxxxxx>
- checkpoint/restore: Adding more "Getters" to the KVM API
- From: scalingtree <scalingtree@xxxxxxxxx>
- [PATCH 7/7] KVM: selftests: aarch64: vPMU register test for unimplemented counters
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 6/7] KVM: selftests: aarch64: vPMU register test for implemented counters
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 5/7] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 4/7] tools: arm64: Import perf_event.h
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 3/7] KVM: arm64: PMU: Preserve vCPU's PMCR_EL0.N value on vCPU reset
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 2/7] KVM: arm64: PMU: Use reset_pmu_reg() for PMUSERENR_EL0 and PMCCFILTR_EL0
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 1/7] KVM: arm64: PMU: Have reset_pmu_reg() to clear a register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [Bug 216867] New: KVM instruction emulation breaks LOCK instruction atomicity when CMPXCHG fails
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v2 0/2] Fix check in amx_test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Assert that XSAVE supports both XTILE{CFG,DATA}
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 4/9] KVM: Add module param to make page tables NUMA aware
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 2/9] KVM: x86/mmu: Remove zapped_obsolete_pages from struct kvm_arch{}
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH 2/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_pmu_event_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH 0/2] Fix deadlocks in kvm_vm_ioctl_set_msr_filter() and
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: nSVM: clarify recalc_intercepts() wrt CR8
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.2-rc2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC 09/14] KVM: x86/MMU: Only make pages available on Shadow MMU fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 7/9] KVM: x86/mmu: Allocate page table's pages on NUMA node of the underlying pages
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: nv: Avoid block mapping if max_map_size is smaller than block size.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 6.2-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: nv: only emulate timers that have not yet fired
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2] KVM: move KVM_CAP_DEVICE_CTRL to the generic check
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v1] KVM: destruct kvm_io_device while unregistering it from kvm_io_bus
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH vfio 2/6] vfio/mlx5: Allow loading of larger images than 512 MB
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 4/6] vfio/hisi: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 5/6] vfio/fsl-mc: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 6/6] vfio/platform: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 0/6] Move to use cgroups for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 1/6] vfio/mlx5: Fix UBSAN note
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH vfio 3/6] vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- RE: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: mlevitsk@xxxxxxxxxx
- RE: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- RE: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- [RESEND PATCH v2] KVM: use unified srcu interface function
- From: flyingpeng(彭浩) <flyingpeng@xxxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [Patch v3 9/9] KVM: x86/mmu: Reduce default cache size in KVM from 40 to PT64_ROOT_MAX_LEVEL
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 7/9] KVM: x86/mmu: Allocate page table's pages on NUMA node of the underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH] Convert backwards goto into a while loop
- From: Shachar Raindel <shacharr@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v8 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v8 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [V4 PATCH 4/4] KVM: selftests: x86: Invoke kvm hypercall as per host cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 3/4] KVM: sefltests: x86: Replace is_*cpu with is_host_*cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 2/4] KVM: selftests: x86: Add variables to store cpu type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 1/4] KVM: selftests: x86: use this_cpu_* helpers
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V4 PATCH 0/4] Execute hypercalls according to host cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- RE: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v1 10/12] virtio-mem: Fix typo in virito_mem_intersect_memory_section() function name
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 10/12] virtio-mem: Fix typo in virito_mem_intersect_memory_section() function name
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v1 10/12] virtio-mem: Fix typo in virito_mem_intersect_memory_section() function name
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: fix deadlock for KVM_XEN_EVTCHN_RESET
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Remove the second definition of pr_fmt in hyperv.c
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] Documentation: kvm: clarify SRCU locking order
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: fix deadlock for KVM_XEN_EVTCHN_RESET
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: restore special vmmcall code layout needed by the harness
- From: mlevitsk@xxxxxxxxxx
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 19/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 09/27] drm/i915/gvt: Protect gfn hash table with dedicated mutex
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Add XCR0 Test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Add XCR0 Test
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: selftests: Assert that XSAVE supports XTILE in amx_test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: selftests: Hoist XGETBV and XSETBV to make them more accessible
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 0/3] Clean up AMX cpuid bits XTILE_CFG and XTILE_DATA
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH] KVM: x86: Remove the second definition of pr_fmt in hyperv.c
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [Patch v4 02/13] KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 0/3] Clean up AMX cpuid bits XTILE_CFG and XTILE_DATA
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [Patch v3 9/9] KVM: x86/mmu: Reduce default cache size in KVM from 40 to PT64_ROOT_MAX_LEVEL
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 7/9] KVM: x86/mmu: Allocate page table's pages on NUMA node of the underlying pages
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Add XCR0 Test
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 0/3] Clean up AMX cpuid bits XTILE_CFG and XTILE_DATA
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: Hoist XGETBV and XSETBV to make them more accessible
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Clear XTILE_CFG if XTILE_DATA is clear
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 00/50] KVM: Rework kvm_init() and hardware enabling
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: use unified srcu interface function
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 3/7] x86/cpu: Make X86_FEATURE_LFENCE_RDTSC a scattered feature bit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 6/9] caif_virtio: convert to new unified vringh APIs
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 0/6] Introduce a vringh accessor for IO memory
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 5/9] tools/virtio: convert to use new unified vringh APIs
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 3/9] tools/virtio: convert to new vringh user APIs
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [RFC PATCH 1/9] vringh: fix a typo in comments for vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- VFIO-PCI stopped working on pc64le
- From: Timothy Pearson <tpearson@xxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH 3/6] KVM: x86/xen: Fix SRCU/RCU usage in readers of evtchn_ports
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/6] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 6/6] KVM: x86/xen: Documentation updates and clarifications
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 5/6] KVM: x86/xen: Add KVM_XEN_INVALID_GPA and KVM_XEN_INVALID_GFN to uapi
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/6] KVM: x86/xen: Use kvm_read_guest_virt() instead of open-coding it badly
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 4/6] KVM: x86/xen: Simplify eventfd IOCTLs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix SRCU/RCU usage in readers of evtchn_ports
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Ignore host accesses to higher version PMU features MSRs
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 3/3] KVM: x86: Fix a typo about msrs_to_save_all[] in kvm_init_msr_list()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 1/3] KVM: x86: Omit PMU MSRs from KVM_GET_MSR_INDEX_LIST if !enable_pmu
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 0/3] KVM: x86/pmu: Fix accesses to PMU MSRs in two corner cases
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- RE: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [kvm-unit-tests PATCH RESEND 2/2] x86/pmu: Wrap the written counter value with gp_counter_width
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH V2 1/2] x86/pmu: Add Intel Guest Transactional (commited) cycles testcase
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] x86/pmu: Add TSX testcase and fix force_emulation_prefix
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- [PATCH v2] KVM: use unified srcu interface function
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [PATCH v2 15/15] KVM: x86/cpuid: Advertise Arch LBR feature in CPUID
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 05/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 10/15] KVM: x86/vmx: Check Arch LBR config when return perf capabilities
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 12/15] KVM: x86/vmx: Disable Arch LBREn bit in #DB and warm reset
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 5.15 0/2] Fix kvm selftest build failures in linux-5.15.y
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v5 0/7] KVM: x86: Hyper-V invariant TSC control feature
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix SRCU/RCU usage in readers of evtchn_ports
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] kvm: x86/mmu: Warn on linking when sp->unsync_children
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 12/14] KVM: selftests: Use wildcards to find library source files
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/14] KVM: selftests: Include lib.mk before consuming $(CC)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 09/14] KVM: selftests: Explicitly disable builtins for mem*() overrides
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] KVM: x86/xen: Simplify eventfd IOCTLs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86/xen: Fix SRCU/RCU usage in readers of evtchn_ports
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: Slade Watkins <srw@xxxxxxxxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [V3 PATCH 0/2] Execute hypercalls from guests according to cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [V3 PATCH 0/2] Execute hypercalls from guests according to cpu
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: TDP MMU fixes for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Zero out valid_bank_mask for "all" case in Hyper-V IPI test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Sanity check inputs to kvm_handle_memory_failure()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Simplify kvm_apic_hw_enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: hyper-v: Fix 'using uninitialized value' Coverity warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: Remove stale comment about KVM_REQ_UNHALT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] Prevent zero period event from being repeatedly released
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5.15 0/2] Fix kvm selftest build failures in linux-5.15.y
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: use unified srcu interface function
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] vfio_iommu_type1: increase the validity check of function parameters
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH] vfio_iommu_type1: increase the validity check of function parameters
- From: Li kunyu <kunyu@xxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [V3 PATCH 1/2] KVM: selftests: x86: Cache the cpu vendor type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 23/27] KVM: x86/mmu: Bug the VM if write-tracking is used but not enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 24/27] KVM: x86/mmu: Drop @slot param from exported/external page-track APIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 19/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 22/27] KVM: x86/mmu: Assert that correct locks are held for page write-tracking
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 27/27] drm/i915/gvt: Drop final dependencies on KVM internal details
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 18/27] KVM: x86/mmu: Move KVM-only page-track declarations to internal header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 21/27] KVM: x86/mmu: Rename page-track APIs to reflect the new reality
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 17/27] KVM: x86: Remove the unused page-track hook track_flush_slot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 25/27] KVM: x86/mmu: Handle KVM bookkeeping in page-track APIs, not callers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 20/27] KVM: x86/mmu: Drop infrastructure for multiple page-track modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/27] KVM: x86: Add a new page-track hook to handle memslot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/27] drm/i915/gvt: switch from ->track_flush_slot() to ->track_remove_region()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/27] KVM: x86: Reject memslot MOVE operations if KVMGT is attached
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/27] drm/i915/gvt: Don't bother removing write-protection on to-be-deleted slot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/27] KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hook
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/27] drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/27] drm/i915/gvt: Protect gfn hash table with dedicated mutex
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/27] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/27] drm/i915/gvt: Use an "unsigned long" to iterate over memslot gfns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/27] drm/i915/gvt: Don't rely on KVM's gfn_to_pfn() to query possible 2M GTT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/27] KVM: x86/mmu: Don't bounce through page-track mechanism for guest PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/27] drm/i915/gvt: Hoist acquisition of vgpu_lock out to kvmgt_page_track_write()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/27] drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/27] drm/i915/gvt: Verify VFIO-pinned page is THP when shadowing 2M gtt entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/27] KVM: x86/mmu: Factor out helper to get max mapping size of a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [V3 PATCH 2/2] KVM: selftests: x86: Add native hypercall support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [V3 PATCH 1/2] KVM: selftests: x86: Cache the cpu vendor type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [V3 PATCH 7/8] KVM: selftests: private_mem_test: Add support for SEV VMs
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 6/8] KVM: selftests: Refactor private_mem_test
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 8/8] KVM: selftests: Add private mem test for SEV VMs
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 5/8] KVM: selftests: Enable pagetable mapping for SEV VMs
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 4/8] KVM: selftests: Split SEV VM creation logic
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 3/8] KVM: selftests: x86: Support changing gpa encryption masks
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 2/8] KVM: selftests: Support mapping pagetables to guest virtual memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 1/8] KVM: selftests: private_mem: Use native hypercall
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 0/8] KVM: selftests: SEV: selftests for fd-based private memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [PATCH 5.15 2/2] KVM: selftests: Fix build regression by using accessor function
- From: Tyler Hicks <code@xxxxxxxxxxx>
- [PATCH 5.15 1/2] tools/include: Add _RET_IP_ and math definitions to kernel.h
- From: Tyler Hicks <code@xxxxxxxxxxx>
- [PATCH 5.15 0/2] Fix kvm selftest build failures in linux-5.15.y
- From: Tyler Hicks <code@xxxxxxxxxxx>
- [V3 PATCH 2/2] KVM: selftests: x86: Add native hypercall support
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 1/2] KVM: selftests: x86: Cache the cpu vendor type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 0/2] Execute hypercalls from guests according to cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v2 04/13] riscv: hwcap: make ISA extension ids can be used in asm
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH V5 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- [RFC PATCH 0/2] Use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- [RFC PATCH 2/2] KVM: x86/xen: Simplify eventfd IOCTLs
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] arm/psci: Add PSCI_CPU_OFF testscase to arm/psci testsuite
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] of: overlay: Fix trivial typo
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 12/15] KVM: x86/vmx: Disable Arch LBREn bit in #DB and warm reset
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 05/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 10/15] KVM: x86/vmx: Check Arch LBR config when return perf capabilities
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 15/15] KVM: x86/cpuid: Advertise Arch LBR feature in CPUID
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 05/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] MIPS: remove support for trap and emulate KVM
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v8 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v8 3/7] kvm: x86/pmu: prepare the pmu event filter for masked events
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v8 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC PATCH 1/6] vdpa: add bind_mm callback
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [GIT PULL] KVM/RISC-V changes for Linux 6.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 9/9] KVM: x86/mmu: Reduce default cache size in KVM from 40 to PT64_ROOT_MAX_LEVEL
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 7/9] KVM: x86/mmu: Allocate page table's pages on NUMA node of the underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 4/9] KVM: Add module param to make page tables NUMA aware
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 3/9] KVM: x86/mmu: Shrink split_shadow_page_cache via KVM MMU shrinker
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 2/9] KVM: x86/mmu: Remove zapped_obsolete_pages from struct kvm_arch{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 0/9] NUMA aware page table's pages allocation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 03/14] KVM: x86/MMU: Move the Shadow MMU implementation to shadow_mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 12/14] KVM: x86/MMU: Remove unneeded exports from shadow_mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 11/14] KVM: x86/MMU: Factor Shadow MMU wrprot / clear dirty ops out of mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 10/14] KVM: x86/MMU: Fix naming on prepare / commit zap page functions
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 13/14] KVM: x86/MMU: Wrap uses of kvm_handle_gfn_range in mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 14/14] KVM: x86/MMU: Add kvm_shadow_mmu_ to the last few functions in shadow_mmu.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 09/14] KVM: x86/MMU: Only make pages available on Shadow MMU fault
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 08/14] KVM: x86/MMU: Clean up naming of exported Shadow MMU functions
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 06/14] KVM: x86/MMU: Clean up Shadow MMU exports
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 07/14] KVM: x86/MMU: Cleanup shrinker interface with Shadow MMU
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 05/14] KVM: x86/MMU: Move paging_tmpl.h includes to shadow_mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 04/14] KVM: x86/MMU: Expose functions for paging_tmpl.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 02/14] KVM: x86/MMU: Expose functions for the Shadow MMU
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 01/14] KVM: x86/MMU: Add shadow_mmu.(c|h)
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 00/14] KVM: x86/MMU: Formalize the Shadow MMU
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH V5 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [syzbot] INFO: trying to register non-static key in __timer_delete_sync
- From: syzbot <syzbot+1e164be619b690a43d79@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/11] SVM: vNMI (with my fixes)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] MIPS: remove support for trap and emulate KVM
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH 1/1] kvm selftests: Add conditional KVM_CAP_DIRTY_LOG_RING_ACQ_REL define kernel sources
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: Major Saheb <majosaheb@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Fix trivial typo
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 3/3] of: overlay: Fix trivial typo
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v2] KVM: VMX: Use tabs instead of spaces for indentation
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- [PATCH v2] KVM: VMX: Fix indentation coding style issue
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- Re: [PATCH v9 06/12] vdpa: request iova_range only once
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 1/1] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 1/1] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 0/1] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH v2] MIPS: remove support for trap and emulate KVM
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/12] vdpa: request iova_range only once
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [RFC 06/12] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RFC 01/12] vfio: Allocate per device file structure
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Cindy Lu <lulu@xxxxxxxxxx>
- RE: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [RFC 07/12] vfio: Block device access via device fd until device is opened
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 06/12] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- RE: [RFC 01/12] vfio: Allocate per device file structure
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH 2/3] KVM: x86: Fix trivial typo
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH 3/3] of: overlay: Fix trivial typo
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH 1/3] scripts/spelling.txt: Add permitted
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH 0/3] spelling: Fix some trivial typos
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- Re: [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH V7 7/7] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 6/7] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 1/7] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 5/7] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 3/7] vfio/type1: track locked_vm per dma
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 4/7] vfio/type1: restore locked_vm
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 0/7] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: Fix handling of S1PTW S2 fault on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Convert FSC_* over to ESR_ELx_FSC_*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 13/16] vfio/ccw: allocate/populate the guest idal
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/16] vfio/ccw: read only one Format-1 IDAW
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v2 04/16] vfio/ccw: move where IDA flag is set in ORB
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 09/16] vfio/ccw: populate page_array struct inline
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 06/16] vfio/ccw: simplify CCW chain fetch routines
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 03/16] vfio/ccw: allow non-zero storage keys
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 10/16] vfio/ccw: refactor the idaw counter
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 12/16] vfio/ccw: calculate number of IDAWs regardless of format
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 01/16] vfio/ccw: cleanup some of the mdev commentary
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 15/16] vfio/ccw: don't group contiguous pages on 2K IDAWs
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 11/16] vfio/ccw: read only one Format-1 IDAW
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 13/16] vfio/ccw: allocate/populate the guest idal
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 16/16] vfio/ccw: remove old IDA format restrictions
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 14/16] vfio/ccw: handle a guest Format-1 IDAL
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 02/16] vfio/ccw: simplify the cp_get_orb interface
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 08/16] vfio/ccw: pass page count to page_array struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH 1/1] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 00/16] vfio/ccw: channel program cleanup
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH 0/1] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v8 7/7] selftests: kvm/x86: Test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 6/7] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 5/7] selftests: kvm/x86: Add flags when creating a pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 3/7] kvm: x86/pmu: prepare the pmu event filter for masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 0/7] Introduce and test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 2/7] kvm: x86/pmu: Remove impossible events from the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [PATCH] KVM: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Sanity check inputs to kvm_handle_memory_failure()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 0/3] accel: Silent few -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [GIT PULL] KVM/RISC-V changes for Linux 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] softmmu: Silent -Wmissing-field-initializers warning
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 2/3] accel/kvm: Silent -Wmissing-field-initializers warning
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 1/3] tcg: Silent -Wmissing-field-initializers warning
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 0/3] accel: Silent few -Wmissing-field-initializers warning
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH 3/3] softmmu: Silent -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 2/3] accel/kvm: Silent -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 0/3] accel: Silent few -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 1/3] tcg: Silent -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] s390/vfio_ap: increase max wait time for reset verification
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/2] arm/psci: Add PSCI_CPU_OFF testscase to arm/psci testsuite
- From: Nikita Venkatesh <Nikita.Venkatesh@xxxxxxx>
- [kvm-unit-tests PATCH v3] arm: Add PSCI CPU_OFF test
- From: Nikita Venkatesh <Nikita.Venkatesh@xxxxxxx>
- [kvm-unit-tests PATCH v3 1/2] arm/psci: Test that CPU 1 has been successfully brought online
- From: Nikita Venkatesh <Nikita.Venkatesh@xxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 5/7] s390/vfio_ap: fix handling of error response codes
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] s390/vfio_ap: verify ZAPQ completion after return of response code zero
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] s390/vfio_ap: use TAPQ to verify reset in progress completes
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v6 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] dump: Include missing "cpu.h" header for tswap32/tswap64() declarations
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 00/11] SVM: vNMI (with my fixes)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/1] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 18/32] x86/fred: add a debug fault entry stub for FRED
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- Re: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: use unified srcu interface function
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH 30/32] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 31/32] x86/fred: allow dynamic stack frame size
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 26/32] x86/fred: no ESPFIX needed when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 28/32] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 27/32] x86/fred: allow single-step trap and NMI when starting a new thread
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 32/32] x86/fred: disable FRED by default in its early stage
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 29/32] x86/ia32: do not modify the DPL bits for a null selector
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 24/32] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 25/32] x86/fred: disallow the swapgs instruction when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 13/32] x86/fred: header file for event types
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 15/32] x86/fred: make unions for the cs and ss fields in struct pt_regs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 17/32] x86/fred: add a page fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 18/32] x86/fred: add a debug fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 08/32] x86/objtool: teach objtool about ERETU and ERETS
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 04/32] x86/traps: add external_interrupt() to dispatch external interrupts
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 16/32] x86/fred: reserve space for the FRED stack frame
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 05/32] x86/traps: add exc_raise_irq() for VMX IRQ reinjection
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 07/32] x86/opcode: add ERETU, ERETS instructions to x86-opcode-map
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 19/32] x86/fred: add a NMI entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 12/32] x86/cpu: add MSR numbers for FRED configuration
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 11/32] x86/fred: if CONFIG_X86_FRED is disabled, disable FRED support
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 09/32] x86/cpu: add X86_CR4_FRED macro
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 20/32] x86/fred: add a machine check entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 10/32] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 06/32] x86/cpufeature: add the cpu feature bit for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 03/32] x86/traps: add install_system_interrupt_handler()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 02/32] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Xin Li <xin3.li@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]