Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [linux-stable-rc:linux-5.15.y 2855/9999] arch/x86/kvm/hyperv.c:2185:5: warning: stack frame size (1036) exceeds limit (1024) in 'kvm_hv_hypercall'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH v4 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 7/9] KVM: s390: selftest: memop: Add bad address test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 6/9] KVM: s390: selftest: memop: Add cmpxchg tests
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 4/9] KVM: s390: selftest: memop: Replace macros by functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 3/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 9/9] KVM: s390: selftest: memop: Fix wrong address being used in test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 8/9] KVM: s390: selftest: memop: Fix typo
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/4] lib: add function to request migration
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V1 0/2] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 6/7] s390/vfio_ap: increase max wait time for reset verification
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 5/7] s390/vfio_ap: fix handling of error response codes
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 4/7] s390/vfio_ap: verify ZAPQ completion after return of response code zero
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 2/7] s390/vfio_ap: check TAPQ response code when waiting for queue reset
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 1/7] s390/vfio-ap: verify reset complete in separate function
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 3/7] s390/vfio_ap: use TAPQ to verify reset in progress completes
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 0/7] improve AP queue reset processing
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/4] lib: add function to request migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH iommufd v2 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [PATCH] kvm: x86/mmu: Remove FNAME(is_self_change_mapping)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 3/4] hw/ppc/spapr: Reduce "vof.h" inclusion
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 2/4] hw/ppc/vof: Do not include the full "cpu.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 1/4] target/ppc/kvm: Add missing "cpu.h" and "exec/hwaddr.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 0/4] ppc: Clean up few headers to make them target agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/14] KVM: selftests: Define literal to asm constraint in aarch64 as unsigned long
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 07/14] KVM: selftests: Use proper function prototypes in probing code
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 05/14] KVM: selftests: Fix a typo in x86-64's kvm_get_cpu_address_width()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 03/14] KVM: selftests: Fix divide-by-zero bug in memslot_perf_test
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: Use the common definition - 'GPA_INVALID' for X86
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH] kvm: kvm_main: Remove unnecessary (void*) conversions
- From: Li kunyu <kunyu@xxxxxxxxxxxx>
- Re: [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH V2 00/12] ifcvf/vDPA implement features provisioning
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- [PATCH v2 4/4] KVM: selftests: Test KVM's handling of VMX's sec exec MSR on KVM_SET_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/4] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/4] KVM: nVMX: Don't stuff secondary execution control if it's not supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/4] KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: VMX: Handle NMI VM-Exits in noinstr region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] x86/entry: KVM: Use dedicated VMX NMI entry for 32-bit kernels too
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] KVM: VMX: Always inline to_vmx() and to_kvm_vmx()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] KVM: VMX: Always inline eVMCS read/write helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: VMX: Allow VM-Fail path of VMREAD helper to be instrumented
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: Make vmx_get_exit_qual() and vmx_get_intr_info() noinstr-friendly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] KVM: VMX: Handle NMI VM-Exits in noinstr section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: Use the common definition - 'GPA_INVALID' for X86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: linux-next: build warning after merge of the kvm tree
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- linux-next: build warning after merge of the kvm tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86/mmu: TDP MMU fixes for 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86/mmu: Re-check under lock that TDP MMU SP hugepage is disallowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86/mmu: Don't attempt to map leaf if target TDP MMU SPTE is frozen
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86/mmu: Map TDP MMU leaf SPTE iff target level is reached
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/14] KVM: selftests: Enable RSEQ test for RISC-V
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/14] KVM: selftests: Use wildcards to find targets and test source files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/14] KVM: selftests: Use proper function prototypes in probing code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/14] KVM: selftests: Probe -no-pie with actual CFLAGS used to compile
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/14] KVM: selftests: Explicitly disable builtins for mem*() overrides
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/14] KVM: selftests: Use wildcards to find library source files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/14] KVM: selftests: Include lib.mk before consuming $(CC)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/14] KVM: selftests: Use pattern matching in .gitignore
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/14] KVM: selftests: Fix divide-by-zero bug in memslot_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/14] KVM: selftests: Delete dead code in x86_64/vmx_tsc_adjust_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/14] KVM: selftests: Fix a typo in x86-64's kvm_get_cpu_address_width()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/14] KVM: selftests: Clang fixes, Makefile cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/14] KVM: selftests: Define literal to asm constraint in aarch64 as unsigned long
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [GIT PULL] First batch of KVM changes for Linux 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- RE: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 17/37] KVM: Move struct kvm_gfn_range to kvm_types.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- RE: [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH iommufd v2 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 8/9] irq/s390: Add arch_is_isolated_msi() for s390
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 1/9] irq: Add msi_device_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 6/9] irq: Rename IRQ_DOMAIN_MSI_REMAP to IRQ_DOMAIN_ISOLATED_MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 4/9] iommufd: Convert to msi_device_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 3/9] vfio/type1: Convert to iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 5/9] irq: Remove unused irq_domain_check_msi_remap() code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [Patch v4 13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 09/13] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 10/13] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 12/13] KVM: selftests: Make vCPU exit reason test assertion common.
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 08/13] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 11/13] KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 04/13] KVM: selftests: Rename 'msr->available' to 'msr->fault_exepected' in hyperv_features test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 07/13] KVM: selftests: Test Hyper-V invariant TSC control
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 06/13] KVM: selftests: Test that values written to Hyper-V MSRs are preserved
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 03/13] KVM: x86: Hyper-V invariant TSC control
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 05/13] KVM: selftests: Convert hyperv_features test to using KVM_X86_CPU_FEATURE()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 02/13] KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 01/13] x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 00/13] Add Hyper-v extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [GIT PULL] Please pull IOMMUFD subsystem changes
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- RE: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH vfio 0/7] pds vfio driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] First batch of KVM changes for Linux 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [Patch v3 12/13] KVM: selftests: Make vCPU exit reason test assertion common.
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [GIT PULL] First batch of KVM changes for Linux 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/2] kvm: x86/mmu: Remove useless shadow_host_writable_mask
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 0/2] Fix "Instructions Retired" from incorrectly counting
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/1] virtio/vsock: Make vsock virtio packet buff size configurable
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.2
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH RFC 4/8] KVM: x86/pmu: Add Intel CPUID-hinted Topdown Slots event
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 6/8] KVM: x86/pmu: properly use INTEL_PMC_FIXED_RDPMC_BASE macro
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 8/8] KVM: x86/pmu: Add MSR_PERF_METRICS MSR emulation to enable Topdown
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 7/8] KVM: x86/pmu: Use flex *event arrays to implement grouped events
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 5/8] KVM: x86/pmu: Add kernel-defined slots event to enable Fixed Counter3
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 3/8] perf: x86/core: Snyc PERF_METRICS bit together with fixed counter3
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 2/8] perf: x86/core: Expose the available number of the Topdown metrics
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 0/8] KVM: x86/pmu: Enable Fixed Counter3 and Topdown Perf Metrics
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/4] s390x: use migrate_once() in migration tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/4] powerpc: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 4/4] arm: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/4] s390x: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/4] lib: add function to request migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/4] lib: add function to request migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Major Saheb <majosaheb@xxxxxxxxx>
- Re: [PATCH v13 2/7] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] kvm: x86/mmu: Warn on linking when sp->unsync_children
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v13 1/7] s390x/cpu topology: Creating CPU topology device
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH V2] kvm: Remove the unused macro KVM_MMU_READ_[UN]LOCK()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Found a memory leak in kvm module
- From: 柳菁峰 <liujingfeng@xxxxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: "Rao, Lei" <lei.rao@xxxxxxxxx>
- Re: [RFC PATCH vfio 0/7] pds vfio driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: "Rao, Lei" <lei.rao@xxxxxxxxx>
- Re: [RFC PATCH vfio 0/7] pds vfio driver
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [Patch v3 13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 9/9] x86/kvm/vmx: Initialize SPEC_CTRL MASK for BHI
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 7/9] kvm/x86: Add MSR_VIRTUAL_MITIGATION_ENUM/CTRL emulation
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 8/9] x86/kvm/vmx: Initialize SPEC_CTRL MASK for RRSBA
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 3/9] KVM: x86: Add a kvm-only leaf for BHI_CTRL
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 1/9] x86/speculation: Introduce Intel SPEC_CTRL BHI related definition
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 4/9] x86/kvm/vmx: Virtualize Intel IA32_SPEC_CTRL
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 2/9] KVM: x86: Add a kvm-only leaf for RRSBA_CTRL
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 0/9] Intel SPEC CTRL virtualization support
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [Patch v3 12/13] KVM: selftests: Make vCPU exit reason test assertion common.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v3 13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: x86/MMU: Move gfn_to_rmap() to rmap.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: x86/MMU: Move rmap_add() to rmap.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: x86/MMU: Factor rmap operations out of mmu.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86/MMU: Move rmap zap operations to rmap.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86/MMU: Move pte_list operations to rmap.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 12/13] KVM: selftests: Make vCPU exit reason test assertion common.
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Fix a typo in the vcpu_msrs_set assert
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: selftests: Fix a typo in the vcpu_msrs_set assert
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Test the PMU event "Instructions retired"
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86/pmu: Prevent the PMU from counting disallowed events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 0/2] Fix "Instructions Retired" from incorrectly counting
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 1/1] virtio/vsock: Make vsock virtio packet buff size configurable
- From: Carlos Llamas <cmllamas@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- RE: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: "Li, Yadong" <yadong.li@xxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 2/2] arm/psci: Add PSCI_CPU_OFF testscase to arm/psci testsuite
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 1/2] arm/psci: Test that CPU 1 has been successfully brought online
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/4] s390x: use migrate_once() in migration tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 2/7] s390x/cpu topology: reporting the CPU topology to the guest
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] lib: add function to request migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v13 1/7] s390x/cpu topology: Creating CPU topology device
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v13 1/7] s390x/cpu topology: Creating CPU topology device
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/4] arm: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/4] s390x: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/4] lib: add function to request migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/4] lib: add function to request migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/4] powerpc: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/4] powerpc: use migrate_once() in migration tests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 4/4] arm: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests v2 PATCH] s390x: sie: Test whether the epoch extension field is working as expected
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH iommufd 2/9] vfio/type1: Check that every device supports IOMMU_CAP_INTR_REMAP
- From: Robin Murphy <robin.murphy@xxxxxxx>
- [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/3] s390x: add library for skey-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: set EXITING_GUEST_MODE as soon as vCPU exits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm: x86/mmu: Remove duplicated "be split" in spte.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm: Remove the unused macro KVM_MMU_READ_LOCK()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 7/8] target/i386/intel-pt: Define specific PT feature set for IceLake-server and Snowridge
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v8 14/16] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 16/16] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 09/16] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 04/16] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 03/16] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 01/16] x86/tdx: Define TDX supported page sizes as macros
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 02/16] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 00/16] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH v3 9/9] KVM: x86: LAM: Expose LAM CPUID to user space VMM
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 7/9] KVM: x86: When judging setting CR3 valid or not, consider LAM bits
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 4/9] KVM: x86: MMU: Commets update
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH kernel v2 3/3] x86/sev: Do not handle #VC for DR7 read/write
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel v2 1/3] x86/amd: Cache values in percpu variables
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel v2 0/3] KVM: SEV: Enable AMD SEV-ES DebugSwap
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 6/9] RISC-V: Export sbi_get_mvendorid() and friends
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [PATCH] KVM: X86: Use the common definition - 'GPA_INVALID' for X86
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- RE: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH kernel 2/3] KVM: SEV: Enable DebugSwap
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 6/7] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 5/7] KVM: arm64: selftests: Don't identity map the ucall MMIO hole
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 3/7] KVM: selftests: Mark correct page as mapped in virt_map()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 2/7] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 1/7] KVM: selftests: Fix build due to ucall_uninit() removal
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: use unified srcu interface function
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: hyper-v: Fix 'using uninitialized value' Coverity warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH iommufd 2/9] vfio/type1: Check that every device supports IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v2 0/2] NUMA aware page table allocation
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [RFC PATCH v2 13/15] KVM: x86/tdp_mmu: TDX: Implement merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 11/15] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 15/15] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 12/15] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 14/15] KVM: x86/mmu: Make kvm fault handelr aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 10/15] KVM: x86/tdp_mmu: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 02/15] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 05/15] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 04/15] KVM: TDX: Pass size to tdx_measure_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 03/15] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 08/15] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 09/15] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 06/15] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 01/15] KVM: TDP_MMU: Go to next level if smaller private mapping exists
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 07/15] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 00/15] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [Patch v2 1/2] KVM: x86/mmu: Allocate page table pages on TDP splits during dirty log enable on the underlying page's numa node
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH V1 1/8] vfio: delete interfaces to update vaddr
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] samples: vfio-mdev: Fix missing pci_disable_device() in mdpy_fb_probe()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/2] vfio/mlx5: fix error code in mlx5vf_precopy_ioctl()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 32/32] KVM: x86: Track required APICv inhibits with variable, not callback
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 29/32] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 26/32] KVM: SVM: Always update local APIC on writes to logical dest register
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 25/32] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 23/32] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 20/32] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 18/32] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 15/32] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [V1 PATCH 4/6] KVM: selftests: x86: Execute VMs with private memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v4 10/32] KVM: x86: Move APIC access page helper to common x86 code
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 07/32] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 06/32] KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 08/32] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 09/32] KVM: x86: Handle APICv updates for APIC "mode" changes via request
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 05/32] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH iommufd 2/9] vfio/type1: Check that every device supports IOMMU_CAP_INTR_REMAP
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 02/32] KVM: x86: Purge "highest ISR" cache when updating APICv state
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 01/32] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH iommufd 6/9] irq: Rename MSI_REMAP to SECURE_MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 8/9] irq/s390: Add arch_is_secure_msi() for s390
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 3/9] vfio/type1: Convert to msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_SECURE_MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 5/9] irq: Remove unused irq_domain_check_msi_remap() code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 2/9] vfio/type1: Check that every device supports IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V1 2/8] vfio/type1: dma owner permission
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH V1 1/8] vfio: delete interfaces to update vaddr
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [RFC PATCH 36/37] KVM: x86/mmu: Move is_tdp_mmu_page() to mmu_internal.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 37/37] KVM: MMU: Move the TDP MMU to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 35/37] KVM: x86/mmu: Move tdp_mmu_max_gfn_exclusive() to tdp_pgtable.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 34/37] KVM: MMU: Move the TDP iterator to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 29/37] KVM: x86/mmu: Collapse kvm_flush_remote_tlbs_with_{range,address}() together
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 30/37] KVM: x86/mmu: Rename kvm_flush_remote_tlbs_with_address()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 32/37] KVM: Allow range-based TLB invalidation from common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 31/37] KVM: x86/MMU: Use gfn_t in kvm_flush_remote_tlbs_range()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 28/37] KVM: MMU: Stub out tracepoints on non-x86 architectures
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 27/37] KVM: MMU: Move mmu_page_header_cache to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 26/37] KVM: Move page table cache to struct kvm_vcpu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 25/37] KVM: x86/mmu: Pass root role to kvm_tdp_mmu_get_vcpu_root_hpa()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 21/37] KVM: Introduce CONFIG_HAVE_TDP_MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 24/37] KVM: x86/mmu: Move kvm_mmu_hugepage_adjust() up to fault handler
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 19/37] KVM: x86/mmu: Add arch hooks for NX Huge Pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 22/37] KVM: x86: Select HAVE_TDP_MMU if X86_64
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 18/37] KVM: x86/mmu: Add common API for creating TDP PTEs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 17/37] KVM: Move struct kvm_gfn_range to kvm_types.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 16/37] KVM: x86/mmu: Abstract away TDP MMU root lookup
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 13/37] KVM: MMU: Move sptep_to_sp() to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 14/37] KVM: MMU: Introduce common macros for TDP page tables
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 12/37] KVM: x86/mmu: Use PG_LEVEL_{PTE,PMD,PUD} in the TDP MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 15/37] KVM: x86/mmu: Add a common API for inspecting/modifying TDP PTEs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 08/37] KVM: selftests: Stop assuming stats are contiguous in kvm_binary_stats_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 11/37] KVM: MMU: Move RET_PF_* into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 07/37] mm: Introduce architecture-neutral PG_LEVEL macros
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 09/37] KVM: Move page size stats into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 05/37] KVM: x86/mmu: Unify TDP MMU and Shadow MMU root refcounts
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 03/37] KVM: MMU: Move tdp_ptep_t into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH V1 1/8] vfio: delete interfaces to update vaddr
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Major Saheb <majosaheb@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Major Saheb <majosaheb@xxxxxxxxx>
- Re: [RFC] Improving userfaultfd scalability for live migration
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH V1 7/8] vfio: change dma owner
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH V1 7/8] vfio: change dma owner
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V1 7/8] vfio: change dma owner
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [kvm-unit-tests v2 PATCH] s390x: sie: Test whether the epoch extension field is working as expected
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH V1 7/8] vfio: change dma owner
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] vfio/mlx5: fix error code in mlx5vf_precopy_ioctl()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH 2/2] vfio/mlx5: error pointer dereference in error handling
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x: sie: Test whether the epoch extension field is working as expected
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/3] x86/cpu: Process all CPUID dependencies after identifying CPU info
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/2] vfio/mlx5: error pointer dereference in error handling
- From: Dan Carpenter <error27@xxxxxxxxx>
- [PATCH 1/2] vfio/mlx5: fix error code in mlx5vf_precopy_ioctl()
- From: Dan Carpenter <error27@xxxxxxxxx>
- Re: [PATCH-for-8.0 v2 2/4] gdbstub: Use vaddr type for generic insert/remove_breakpoint() API
- From: Fabiano Rosas <farosas@xxxxxxx>
- [PATCH-for-8.0 v2 2/4] gdbstub: Use vaddr type for generic insert/remove_breakpoint() API
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 v2 4/4] target/sparc/sysemu: Remove pointless CONFIG_USER_ONLY guard
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 v2 3/4] target/cpu: Restrict cpu_get_phys_page_debug() handlers to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 v2 1/4] cputlb: Restrict SavedIOTLB to system emulation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 v2 0/4] target/cpu: System/User cleanups around hwaddr/vaddr
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v2 06/11] KVM: SVM: add wrappers to enable/disable IRET interception
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: nSVM: implement support for nested VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- Re: [PATCH v2 06/11] KVM: SVM: add wrappers to enable/disable IRET interception
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH kernel 3/3] x86/sev: Do not handle #VC for DR7 read/write
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH kernel 1/3] x86/amd/dr_addr_mask: Cache values in percpu variables
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v2] KVM: x86: hyper-v: Fix 'using uninitialized value' Coverity warning
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2] KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race
- From: Adamos Ttofari <attofari@xxxxxxxxx>
- [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v13 7/7] docs/s390x: document s390x cpu topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v13 6/7] s390x/cpu_topology: activating CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v13 1/7] s390x/cpu topology: Creating CPU topology device
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v13 3/7] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v13 5/7] s390x/cpu_topology: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v13 2/7] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH V1 8/8] vfio/type1: change dma owner
- From: Dan Carpenter <error27@xxxxxxxxx>
- Re: [PATCH v1] drivers/vhost/vhost: fix overflow checks in vhost_overflow
- From: Daniil Tatianin <d-tatianin@xxxxxxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH kernel 3/3] x86/sev: Do not handle #VC for DR7 read/write
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH v3 7/8] target/i386/intel-pt: Define specific PT feature set for IceLake-server and Snowridge
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 8/8] target/i386/intel-pt: Access MSR_IA32_RTIT_ADDRn based on guest CPUID configuration
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 5/8] target/i386/intel-pt: Rework/rename the default INTEL-PT feature set
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 3/8] target/i386/intel-pt: Introduce FeatureWordInfo for Intel PT CPUID leaf 0x14
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 2/8] target/i386/intel-pt: Fix INTEL_PT_ADDR_RANGES_NUM_MASK
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 1/8] target/i386: Print CPUID subleaf info for unsupported feature
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 0/8] Make Intel PT configurable
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH kernel 1/3] x86/amd/dr_addr_mask: Cache values in percpu variables
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [RFC] Improving userfaultfd scalability for live migration
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2] samples: vfio-mdev: Fix missing pci_disable_device() in mdpy_fb_probe()
- From: Shang XiaoJing <shangxiaojing@xxxxxxxxxx>
- [PATCH] KVM: use unified srcu interface function
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [RFC 8/9] RISC-V: KVM: Implement perf support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] samples: vfio-mdev: Fix missing pci_disable_device() in mdpy_fb_probe()
- From: shangxiaojing <shangxiaojing@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH vfio 3/7] vfio/pds: Add VFIO live migration support
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [RFC PATCH vfio 3/7] vfio/pds: Add VFIO live migration support
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH V1 1/8] vfio: delete interfaces to update vaddr
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86/MMU: Move pte_list operations to rmap.c
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] samples: vfio-mdev: Fix missing pci_disable_device() in mdpy_fb_probe()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 4/4] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 3/4] KVM: arm64: selftests: Align VA space allocator with TTBR0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 1/4] KVM: selftests: Fix build due to ucall_uninit() removal
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 0/4] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH vfio 3/7] vfio/pds: Add VFIO live migration support
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH] MAINTAINERS: adjust entry after renaming the vmx hyperv files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: set EXITING_GUEST_MODE as soon as vCPU exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kernel 3/3] x86/sev: Do not handle #VC for DR7 read/write
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH kernel 3/3] x86/sev: Do not handle #VC for DR7 read/write
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH kernel 1/3] x86/amd/dr_addr_mask: Cache values in percpu variables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Avoid ternary operator by directly referring to counters->type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests] x86/pmu: Add Intel Guest Transactional (commited) cycles testcase
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH vfio 3/7] vfio/pds: Add VFIO live migration support
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH V1 8/8] vfio/type1: change dma owner
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH V1 7/8] vfio: change dma owner
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Prevent zero period event from being repeatedly released
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC 8/9] RISC-V: KVM: Implement perf support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: ioapic: Fix level-triggered EOI and userspace IOAPIC reconfigure race
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests] x86/pmu: Add Intel Guest Transactional (commited) cycles testcase
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH kvmtool v1 25/32] Allocate guest memory as restricted if needed
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH V1 2/8] vfio/type1: dma owner permission
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH V1 0/8] vfio virtual address update redo
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH V1 1/8] vfio: delete interfaces to update vaddr
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]