Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH V1 vfio 00/14] Add migration PRE_COPY support for mlx5 driver
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 07/14] vfio/mlx5: Refactor to use queue based data chunks
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 03/14] vfio/mlx5: Enforce a single SAVE command at a time
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 08/14] vfio/mlx5: Introduce device transitions of PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 06/14] vfio/mlx5: Refactor migration file state
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 04/14] vfio/mlx5: Refactor PD usage
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 02/14] vfio: Extend the device migration protocol with PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 05/14] vfio/mlx5: Refactor MKEY usage
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 12/14] vfio/mlx5: Introduce multiple loads
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 11/14] vfio/mlx5: Consider temporary end of stream as part of PRE_COPY
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH for 8.0 v8 12/12] vdpa: always start CVQ in SVQ mode if possible
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 11/12] vdpa: add shadow_data to vhost_vdpa
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 10/12] vdpa: store x-svq parameter in VhostVDPAState
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 09/12] vdpa: add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 06/12] vdpa: extract vhost_vdpa_svq_allocate_iova_tree
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 07/12] vdpa: move SVQ vring features check to net/
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 08/12] vdpa: allocate SVQ array unconditionally
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 05/12] vdpa: add vhost_vdpa_net_valid_svq_features
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 01/12] vdpa: use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 03/12] vhost: allocate SVQ device file descriptors at device start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 02/12] vhost: set SVQ device call handler at SVQ start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 00/12] ASID support in vhost-vdpa net
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH for 8.0 v8 04/12] vhost: move iova_tree set to vhost_svq_start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] arm/arm64: mmu: Rename mmu_get_pte() -> follow_pte()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] arm/arm64: mmu: Teach virt_to_pte_phys() about block descriptors
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] arm/arm64: teach virt_to_pte_phys() about block descriptors
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Arseniy Krasnov <oxffffaa@xxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC v2 11/11] vfio: Move vfio group specific code into group.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Arseniy Krasnov <oxffffaa@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/5] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [External] Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [RFC v2 03/11] vfio: Set device->group in helper function
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC v2 03/11] vfio: Set device->group in helper function
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/cpu, kvm: Use CPU capabilities for CPUID[0x80000021].EAX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] x86/cpu, kvm: Use CPU capabilities for CPUID[0x80000021].EAX
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] lib: x86: Use portable format macros for uint32_t
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [RFC v2 08/11] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 11/11] vfio: Move vfio group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 07/11] vfio: Swap order of vfio_device_container_register() and open_device()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 10/11] vfio: Refactor dma APIs for emulated devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 05/11] vfio: Make vfio_device_open() group agnostic
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 00/11] Move group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 09/11] vfio: Wrap vfio group module init/clean code into helpers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 03/11] vfio: Set device->group in helper function
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 01/11] vfio: Simplify vfio_create_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 06/11] vfio: Move device open/close code to be helpfers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 04/11] vfio: Wrap group codes to be helpers for __vfio_register_dev() and unregister
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC v2 02/11] vfio: Move the sanity check of the group to vfio_create_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 11/27] x86/pmu: Update rdpmc testcase to cover #GP path
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v1] KVM: s390: GISA: sort out physical vs virtual pointers usage
- From: Michael Mueller <mimu@xxxxxxxxxxxxx>
- Re: [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 11/27] x86/pmu: Update rdpmc testcase to cover #GP path
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 12/20] x86/virt/tdx: Create TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH kvmtool v1 08/17] Use memfd for all guest ram allocations
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 06/17] Use memfd for hugetlbfs when allocating guest ram
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/8] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool v1 06/17] Use memfd for hugetlbfs when allocating guest ram
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [iommufd 0/2] Make mdev driver dma_unmap callback tolerant to unmaps come before device open
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v9 00/10] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [Bug 216737] Call trace happens on guest after running pt vmx tool
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216737] Call trace happens on guest after running pt vmx tool
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 216737] New: Call trace happens on guest after running pt vmx tool
- From: bugzilla-daemon@xxxxxxxxxx
- RE: [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [iommufd 0/2] Make mdev driver dma_unmap callback tolerant to unmaps come before device open
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH v4] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- RE: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [RFC 00/10] Move group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 10/10] vfio: Move vfio group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 09/10] vfio: Refactor dma APIs for emulated devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: Nvidia GPU PCI passthrough and kernel commit #5f33887a36824f1e906863460535be5d841a4364
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 18/20] x86/virt/tdx: Initialize all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] KVM: always declare prototype for kvm_arch_irqchip_in_kernel
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH v2] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: x86/xen: add support for 32-bit guests in SCHEDOP_poll
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 17/20] x86/virt/tdx: Configure global KeyID on all packages
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 2/2] x86/cpu, kvm: Support AMD Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v2 1/2] x86/cpu, kvm: Use CPU capabilities for CPUID[0x80000021].EAX
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v2 0/2] x86/cpu, kvm: Support AMD Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v7 16/20] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v7 15/20] x86/virt/tdx: Reserve TDX module global KeyID
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH] KVM: x86/mmu: replace BUG() with KVM_BUG() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 12/20] x86/virt/tdx: Create TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 00/10] Move group specific code into group.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 10/10] vfio: Move vfio group specific code into group.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Make number of event channels defines less magical
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 03/17] Rename parameter in mmap_anon_or_hugetlbfs()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 01/17] Initialize the return value in kvm__for_each_mem_bank()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 01/19] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 09/10] vfio: Refactor dma APIs for emulated devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH kvmtool v1 03/17] Rename parameter in mmap_anon_or_hugetlbfs()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] s390x: add a library for CMM-related functions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/xen: Only do in-kernel acceleration of hypercalls for guest CPL0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86/xen: Validate port number in SCHEDOP_poll
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 036/144] KVM: selftest: Add proper helpers for x86-specific save/restore ioctls
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvmtool v1 01/17] Initialize the return value in kvm__for_each_mem_bank()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [RFC 10/10] vfio: Move vfio group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 01/10] vfio: Simplify vfio_create_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 05/10] vfio: Move device open/close code to be helpfers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 06/10] vfio: Swap order of vfio_device_container_register() and open_device()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 02/10] vfio: Move the sanity check of the group to vfio_create_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 03/10] vfio: Wrap group codes to be helpers for __vfio_register_dev() and unregister
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 08/10] vfio: Wrap vfio group module init/clean code into helpers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 07/10] vfio: Refactor vfio_device_first_open() and _last_close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 04/10] vfio: Make vfio_device_open() group agnostic
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 09/10] vfio: Refactor dma APIs for emulated devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 00/10] Move group specific code into group.c
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 100/108] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC 8/9] RISC-V: KVM: Implement perf support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [iommufd 1/2] i915/gvt: Move kvmgt_protect_table_init() and gvt_cache_init() into init
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [iommufd 0/2] Make mdev driver dma_unmap callback tolerant to unmaps come before device open
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [iommufd 2/2] vfio/ap: validate iova during dma_unmap and trigger irq disable
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/5] s390x: snippets: Fix SET_PSW_NEW_ADDR macro
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/5] s390x: Clear first stack frame and end backtrace early
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/5] lib: s390x: sie: Set guest memory pointer
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/5] lib: s390x: Handle debug prints for SIE exceptions correctly
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/5] s390x: Add a linker script to assembly snippets
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/11] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 00/11] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 11/27] lib: Add random number generator
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] s390x: add a library for CMM-related functions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- [PATCH 2/5] driver core: make struct class.devnode() take a const *
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 07/20] x86/virt/tdx: Do TDX module global initialization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH 2/4] hisi_acc_vfio_pci: Introduce support for PRE_COPY state transitions
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH 3/4] hisi_acc_vfio_pci: Move the dev compatibility tests for early check
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH 4/4] hisi_acc_vfio_pci: Enable PRE_COPY flag
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH 0/4] hisi_acc_vfio_pci: Add PRE_COPY migration feature support
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH 1/4] hisi_acc_vfio_pci: Add support for precopy IOCTL
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/5] s390x: Clear first stack frame and end backtrace early
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/5] s390x: snippets: Fix SET_PSW_NEW_ADDR macro
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/5] lib: s390x: sie: Set guest memory pointer
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 011/108] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 11/27] lib: Add random number generator
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH linux-next] KVM: x86: remove redundant ret variable
- From: <zhang.songyi@xxxxxxxxxx>
- Re: [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvm-unit-tests PATCH 4/5] s390x: Clear first stack frame and end backtrace early
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 5/5] lib: s390x: Handle debug prints for SIE exceptions correctly
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/5] lib: s390x: sie: Set guest memory pointer
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 2/5] s390x: snippets: Fix SET_PSW_NEW_ADDR macro
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/5] s390x: Snippet fixes
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/5] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/platform: Remove the ACPI buffer memory to fix memory leak
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- RE: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v5 01/19] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 15/16] KVM: arm64: PMU: Simplify vcpu computation on perf overflow notification
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 14/16] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 13/16] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: selftests: Have perf_test_util signal when to stop vCPUs
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 00/11] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 036/144] KVM: selftest: Add proper helpers for x86-specific save/restore ioctls
- From: "Wang, Lei" <lei4.wang@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- RE: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2] vfio/pci: Verify each MSI vector to avoid invalid MSI vectors
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- [Bug 216725] VMXON with CR0 bit 5 cleared should #GP, got '6'
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC 8/9] RISC-V: KVM: Implement perf support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 2/3] KVM: x86/xen: Only do in-kernel acceleration of hypercalls for guest CPL0
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/3] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/3] KVM: x86/xen: Validate port number in SCHEDOP_poll
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Make number of event channels defines less magical
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 7/9] RISC-V: KVM: Implement trap & emulate for hpmcounters
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Make number of event channels defines less magical
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] inconsistent lock state in sync_info_debugfs_show
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 07/20] x86/virt/tdx: Do TDX module global initialization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 27/27] x86: ipi_stress: add optional SVM support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 26/27] svm: move test_guest_func to test context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 25/27] svm: move nested vcpu to test context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v1 02/16] vfio/ccw: simplify the cp_get_orb interface
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 15/27] svm: move some svm support functions into lib/x86/svm_lib.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 19/27] svm: rewerite vm entry macros
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 20/27] svm: move v2 tests run into test_run
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 24/27] svm: use svm_test_context in v2 tests
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 22/27] svm: introduce svm_vcpu
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v1 01/16] vfio/ccw: cleanup some of the mdev commentary
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 16/27] svm: move setup_svm() to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 13/27] svm: remove get_npt_pte extern
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 18/27] svm: move vmcb_ident to svm_lib.c
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 17/27] svm: correctly skip if NPT not supported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 23/27] svm: introduce struct svm_test_context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 21/27] svm: cleanup the default_prepare
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 12/27] x86: add IPI stress test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 14/27] svm: move svm spec definitions to lib/x86/svm.h
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 11/27] lib: Add random number generator
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 07/27] x86: Add test for #SMI during interrupt window
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/2] s390x: add a library for CMM-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/2] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 08/27] x86: Add a simple test for SYSENTER instruction.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/2] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 03/27] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 04/27] svm: remove nop after stgi/clgi
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 09/27] svm: add simple nested shutdown test.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 10/27] SVM: add two tests for exitintinto on exception
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 05/27] svm: make svm_intr_intercept_mix_if/gif test a bit more robust
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 06/27] svm: use apic_start_timer/apic_stop_timer instead of open coding it
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 02/27] x86: introduce sti_nop() and sti_nop_cli()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 01/27] x86: replace irq_{enable|disable}() with sti()/cli()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 00/27] kvm-unit-tests: set of fixes and new tests
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 4/6] KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: x86: Hyper-V invariant TSC control feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3] virtio_console: Introduce an ID allocator for virtual console numbers
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH for-next] KVM: Push dirty information unconditionally to backup bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [PATCH] vfio/platform: Remove the ACPI buffer memory to fix memory leak
- From: Hanjun Guo <guohanjun@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- [Bug 216725] VMXON with CR0 bit 5 cleared should #GP, got '6'
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [V1 PATCH 1/6] KVM: x86: Add support for testing private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [Bug 216725] New: VMXON with CR0 bit 5 cleared should #GP, got '6'
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC PATCH 1/1] Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v1 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] KVM: selftests: Define and use a custom static assert in lib headers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 4/9] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 1/9] RISC-V: Define a helper function to probe number of hardware counters
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 5/6] KVM: selftests: Make vCPU exit reason test assertion common.
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 4/6] KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 2/6] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 1/6] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v2 0/6] Add Hyper-v extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v1 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 13/16] vfio/ccw: allocate/populate the guest idal
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 06/16] vfio/ccw: simplify CCW chain fetch routines
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 16/16] vfio/ccw: remove old IDA format restrictions
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 08/16] vfio/ccw: pass page count to page_array struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 09/16] vfio/ccw: populate page_array struct inline
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 12/16] vfio/ccw: calculate number of IDAWs regardless of format
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 15/16] vfio/ccw: don't group contiguous pages on 2K IDAWs
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 02/16] vfio/ccw: simplify the cp_get_orb interface
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 11/16] vfio/ccw: discard second fmt-1 IDAW
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 04/16] vfio/ccw: move where IDA flag is set in ORB
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 00/16] vfio/ccw: channel program cleanup
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 14/16] vfio/ccw: handle a guest Format-1 IDAL
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 01/16] vfio/ccw: cleanup some of the mdev commentary
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1 03/16] vfio/ccw: allow non-zero storage keys
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] target/i386/kvm: get and put AMD pmu registers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 02/13] KVM: nSVM: don't call nested_sync_control_from_vmcb02 on each VM exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/13] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 10/13] KVM: SVM: Add VNMI support in inject_nmi
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/2] vfio/ccw: sort out physical vs virtual pointers usage
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 0/2] s390/vfio-ccw: addressing fixes
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 2/2] vfio/ccw: identify CCW data addresses as physical
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 8/9] KVM: selftests: add svm part to triple_fault_test
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 7/9] KVM: x86: allow L1 to not intercept triple fault
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 6/9] kvm: selftests: add svm nested shutdown test
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 5/9] KVM: selftests: move idt_entry to header
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 4/9] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 3/9] KVM: x86: add kvm_leave_nested
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 2/9] KVM: x86: nSVM: harden svm_free_nested against freeing vmcb02 while still in use
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v2 1/9] KVM: x86: nSVM: leave nested mode on vCPU free
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: Greg Kurz <groug@xxxxxxxx>
- Re: [PATCH v4 4/6] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 04/11] s390x/cpu topology: reporting the CPU topology to the guest
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH 3/3] target/i386/kvm: get and put AMD pmu registers
- From: Liang Yan <lyan@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/16] KVM: Store gfn_to_pfn_cache length as an immutable property
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: Liang Yan <lyan@xxxxxxxxxxxxxxxx>
- Re: [PATCH 09/13] KVM: SVM: allow NMI window with vNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH -next] RISC-V: KVM: optimize kvm_arch_hardware_enable()
- From: chenlifu <chenlifu@xxxxxxxxxx>
- Re: [PATCH 07/13] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 4.19 00/34] Intel RETBleed mitigations for 4.19.
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] KVM: s390: remove unused gisa_clear_ipm_gisc() function
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/1] Dirty quota-based throttling of vcpus
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 04/13] KVM: nSVM: clean up copying of int_ctl fields back to vmcb01/vmcb12
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 02/13] KVM: nSVM: don't call nested_sync_control_from_vmcb02 on each VM exit
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH -next] RISC-V: KVM: optimize kvm_arch_hardware_enable()
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: KVM 6.2 state
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: KVM 6.2 state
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace. #forregzbot
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: Avoid re-reading kvm->max_halt_poll_ns during halt-polling
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] kvm: fix two svm pmu virtualization bugs
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH 0/3] kvm: fix two svm pmu virtualization bugs
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- [PATCH -next] RISC-V: KVM: optimize kvm_arch_hardware_enable()
- From: Chen Lifu <chenlifu@xxxxxxxxxx>
- [PATCH v7 17/20] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 14/20] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 19/20] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 15/20] x86/virt/tdx: Reserve TDX module global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 18/20] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 20/20] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 16/20] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 13/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 12/20] x86/virt/tdx: Create TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 09/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 10/20] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 06/20] x86/virt/tdx: Shut down TDX module in case of error
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 05/20] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 02/20] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 04/20] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 07/20] x86/virt/tdx: Do TDX module global initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 08/20] x86/virt/tdx: Do logical-cpu scope TDX module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 03/20] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 00/20] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v7 01/20] x86/tdx: Define TDX supported page sizes as macros
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [RFC PATCH 1/1] Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- [RFC PATCH 0/1] QEMU: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [syzbot] inconsistent lock state in sync_info_debugfs_show
- From: syzbot <syzbot+007bfe0f3330f6e1e7d1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: Using __weak instead of __attribute__((weak)).
- From: Mukesh Kumar Chaurasiya <mchauras.linux@xxxxxxxxx>
- Re: [PATCH V5] virt: sev: Prevent IV reuse in SNP guest driver
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v4 12/16] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] kvm: introduce a helper before creating the 1st vcpu
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 3/3] target/i386/kvm: get and put AMD pmu registers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 0/3] kvm: fix two svm pmu virtualization bugs
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [PATCH 4/4] KVM: x86/xen: Add runstate tests for 32-bit mode and crossing page boundary
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- RE: [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- RE: [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- [PATCH 2/4] KVM: x86/xen: Compatibility fixes for shared runstate area
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/4] KVM: Update gfn_to_pfn_cache khva when it moves within the same page
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 1/4] MAINTAINERS: Add KVM x86/xen maintainer list
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 4/4] KVM: x86/xen: Add runstate tests for 32-bit mode and crossing page boundary
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 2/2] KVM: Add missing arch for KVM_CREATE_DEVICE and KVM_{SET,GET}_DEVICE_ATTR
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH 1/2] KVM: Mark KVM_SET_MEMORY_REGION and KVM_SET_MEMORY_ALIAS as obsoleted
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v4 12/16] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 11/16] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: Access @flags as a 32-bit value in __vmx_vcpu_run()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH 5/9] perf tools: Use dedicated non-atomic clear/set bit helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/9] KVM: selftests: Add rdmsr_from_l2() implementation in Hyper-V eVMCS test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/9] KVM: selftests: Remove unused "vcpu" param to fix build error
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/9] KVM: arm64: selftests: Enable single-step without a "full" ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/9] tools: Take @bit as an "unsigned long" in {clear,set}_bit() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/9] tools: Drop conflicting non-atomic test_and_{clear,set}_bit() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 9/9] tools: KVM: selftests: Convert clear/set_bit() to actual atomics
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/9] KVM: selftests: Use non-atomic clear/set bit helpers in KVM tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 8/9] tools: Drop "atomic_" prefix from atomic test_and_set_bit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/9] tools: Make {clear,set}_bit() atomic for reals
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH] KVM: VMX: Access @flags as a 32-bit value in __vmx_vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Build access_tracking_perf_test for arm64
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Have perf_test_util signal when to stop vCPUs
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 0/2] KVM: selftests: Enable access_tracking_perf_test for arm64
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 06/19] iommufd: File descriptor, context, kconfig and makefiles
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: KVM 6.2 state
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v4 0/3] KVM: arm64: Fixes for parallel faults series
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 2/3] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 3/3] KVM: arm64: Reject shared table walks in the hyp code
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v4 1/3] KVM: arm64: Take a pointer to walker data in kvm_dereference_pteref()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- KVM 6.2 state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm, vmx: don't use "unsigned long" in vmx_vcpu_enter_exit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: account allocation in generic version of kvm_arch_alloc_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: avoid memslot check in NX hugepage recovery if it cannot succeed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 4/6] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] kvm, vmx: don't use "unsigned long" in vmx_vcpu_enter_exit()
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v5 06/19] iommufd: File descriptor, context, kconfig and makefiles
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [PATCH v2] KVM: x86: avoid memslot check in NX hugepage recovery if it cannot succeed
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 3/6] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: remove unused gisa_clear_ipm_gisc() function
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/6] x86: KVM: Advertise CPUID of new Intel platform instructions to user space
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH] KVM: s390: remove unused gisa_clear_ipm_gisc() function
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH v4 6/6] x86: KVM: Advertise PREFETCHIT0/1 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 4/6] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 5/6] x86: KVM: Advertise AVX-NE-CONVERT CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 3/6] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 2/6] x86: KVM: Advertise AMX-FP16 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 1/6] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v4 0/6] x86: KVM: Advertise CPUID of new Intel platform instructions to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v3 11/11] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: Don't acquire RCU read lock for exclusive table walks
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- [PATCH v2] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: keep track of running ioctls
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v5 07/19] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v5 05/19] iommufd: Document overview of iommufd
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v7 3/4] KVM: arm64: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v7 2/4] KVM: x86: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v3] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] KVM: Obey kvm.halt_poll_ns in VMs not using KVM_CAP_HALT_POLL
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: Avoid re-reading kvm->max_halt_poll_ns during halt-polling
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3 1/3] accel: introduce accelerator blocker API
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [RFC PATCH 1/3] KVM: Cap vcpu->halt_poll_ns before halting rather than after
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: [PATCH v3 1/3] accel: introduce accelerator blocker API
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v4 07/16] KVM: arm64: PMU: Add counter_index_to_*reg() helpers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: simplify kvm_tdp_mmu_map flow when guest has to retry
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH] vfio/mdev: fix possible memory leak in module init funcs
- From: ruanjinjie <ruanjinjie@xxxxxxxxxx>
- RE: [PATCH v5 15/19] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v5 10/19] iommufd: Data structure to provide IOVA to PFN mapping
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]