Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v10 059/108] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 060/108] KVM: Add functions to set GFN to private or shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 100/108] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 101/108] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 058/108] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 061/108] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 057/108] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 055/108] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 054/108] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 053/108] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 040/108] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 033/108] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 025/108] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 023/108] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 050/108] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 052/108] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 037/108] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 027/108] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 038/108] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 034/108] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 039/108] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 045/108] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 051/108] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 044/108] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 042/108] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 022/108] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 043/108] KVM: x86/mmu: Require TDP MMU for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 048/108] KVM: x86/tdp_mmu: Make handle_changed_spte() return value
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 036/108] KVM: TDX: Enable mmio spte caching always for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 031/108] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 041/108] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 015/108] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 030/108] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 032/108] KVM: x86/mmu: Make sync_page not use hard-coded 0 as the initial SPTE value
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 029/108] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 011/108] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 018/108] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 017/108] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 014/108] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 024/108] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 026/108] KVM: TDX: Use private memory for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 019/108] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 028/108] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 008/108] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 012/108] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 010/108] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 020/108] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 013/108] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 009/108] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 007/108] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 006/108] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 003/108] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 002/108] KVM: x86: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 001/108] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 000/108] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 004/108] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH 00/15] Introduce Architectural LBR for vPMU
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: selftests: Delete dead ucall code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v3 00/15] IOMMUFD Generic interface
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 5/7] KVM: SVM: adjust register allocation for __svm_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 0/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/7] KVM: VMX: remove regs argument of __vmx_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/7] KVM: SVM: extract VMCB accessors to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 7/7] x86, KVM: remove unnecessary argument to x86_virt_spec_ctrl and callers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/7] KVM: VMX: more cleanups to __vmx_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 4/7] KVM: SVM: replace argument of __svm_vcpu_run with vcpu_svm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/10] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KVM: selftests: create -r argument to specify random seed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v1 3/7] vfio/ccw: move private initialization to callback
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/15] iommufd: Overview documentation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v1 3/7] vfio/ccw: move private initialization to callback
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 9/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 2/7] vfio/ccw: remove private->sch
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v1 1/7] vfio/ccw: create a parent struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/7] vfio/ccw: create a parent struct
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- KVM call for agenda for 2022-11-01
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/4] arm: pmu: Fixes for bare metal
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/4] arm: pmu: Fixes for bare metal
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH RESEND v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/4] arm: pmu: Fixes for bare metal
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 12/14] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/14] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/14] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/14] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 08/14] KVM: arm64: PMU: Simplify setting a counter to a specific value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/14] KVM: arm64: PMU: Distinguish between 64bit counter and 64bit overflow
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/14] KVM: arm64: PMU: Only narrow counters that are not 64bit wide
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/14] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/14] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/14] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/14] KVM: arm64: PMU: Add counter_index_to_*reg() helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/14] KVM: arm64: PMU: Narrow the overflow checking when required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/14] arm64: Add ID_DFR0_EL1.PerfMon values for PMUv3p7 and IMP_DEF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/14] KVM: arm64: PMU: Always advertise the CHAIN event
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/14] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND v4 23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: Redefine pKVM memory transitions in terms of source/target
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()
- From: Eiichi Tsukata <eiichi.tsukata@xxxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 06/25] KVM: arm64: Implement do_donate() helper for donating memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: Redefine pKVM memory transitions in terms of source/target
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 1/2] KVM: arm64: Clean out the odd handling of completer_addr
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/2] KVM: arm64: Redefine pKVM memory transitions in terms of source/target
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 0/2] KVM: arm64: pKVM memory transitions cleanup
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 06/25] KVM: arm64: Implement do_donate() helper for donating memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v6 19/21] x86/virt/tdx: Initialize all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 18/21] x86/virt/tdx: Configure global KeyID on all packages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: selftests: Copy KVM PFERR masks into selftests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: selftest: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 05/25] KVM: arm64: Unify identifiers used to distinguish host and hypervisor
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 04/25] KVM: arm64: Fix-up hyp stage-1 refcounts for all pages mapped at EL2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: VMX: Use tabs instead of spaces for indentation
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- [PATCH] KVM: VMX: Fix indentation coding style issue
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- [Bug 216349] Kernel panics in VMs running on an Intel N5105 on Proxmox
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: selftests: Delete dead ucall code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/8] KVM: selftests: Explicitly require instructions bytes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/15] KVM: arm64: Parallel stage-2 fault handling
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: selftests: Rename emulator_error_test to smaller_maxphyaddr_emulation_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: vmx: Fix indentation coding style issue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: vmenter: Use tabs instead of spaces for indentation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/svm/pmu: Add AMD PerfMonV2 support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/15] KVM: arm64: Use an opaque type for pteps
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v3 15/15] KVM: arm64: Handle stage-2 faults in parallel
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 14/15] KVM: arm64: Make table->block changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 13/15] KVM: arm64: Make leaf->leaf PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 12/15] KVM: arm64: Make block->table PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 11/15] KVM: arm64: Split init and set for table PTE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 10/15] KVM: arm64: Atomically update stage 2 leaf attributes in parallel walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 07/15] KVM: arm64: Use an opaque type for pteps
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 05/15] KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 09/15] KVM: arm64: Free removed stage-2 tables in RCU callback
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 04/15] KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 03/15] KVM: arm64: Pass mm_ops through the visitor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 02/15] KVM: arm64: Stash observed pte value in visitor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 01/15] KVM: arm64: Combine visitor arguments into a context structure
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 00/15] KVM: arm64: Parallel stage-2 fault handling
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: x86/pmu: Make part of the Intel v2 PMU MSRs handling x86 generic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: x86/pmu: Make part of the Intel v2 PMU MSRs handling x86 generic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 0/7] Introduce and test masked events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 7/7] selftests: kvm/x86: Test masked events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4.14 30/34] x86/bugs: Add Cannon lake to RETBleed affected CPU list
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 21/34] x86/speculation: Fix firmware entry SPEC_CTRL handling
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH v8 1/4] KVM: selftests: implement random number generator for guest code
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4.14 32/34] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH v8 4/4] KVM: selftests: randomize page access order
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4.14 22/34] x86/speculation: Fix SPEC_CTRL write on SMT state change
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 26/34] KVM: VMX: Fix IBRS handling after vmexit
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 17/34] entel_idle: Disable IBRS during long idle
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH v8 3/4] KVM: selftests: randomize which pages are written vs read
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v8 2/4] KVM: selftests: create -r argument to specify random seed
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4.14 33/34] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 34/34] x86/speculation: Add RSB VM Exit protections
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 29/34] x86/cpu/amd: Enumerate BTC_NO
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 28/34] x86/common: Stamp out the stepping madness
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH v8 0/4] KVM: selftests: randomize memory access of dirty_log_perf_test
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4.14 24/34] x86/speculation: Remove x86_spec_ctrl_mask
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 25/34] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 27/34] x86/speculation: Fill RSB on vmexit for IBRS
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 31/34] x86/speculation: Disable RRSBA behavior
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 23/34] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 18/34] x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 19/34] x86/speculation: Add LFENCE to RSB fill sequence
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 20/34] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 15/34] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 14/34] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 16/34] x86/bugs: Report Intel retbleed vulnerability
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 13/34] x86/bugs: Optimize SPEC_CTRL MSR writes
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 12/34] x86/entry: Add kernel IBRS implementation
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 11/34] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 10/34] x86/bugs: Add AMD retbleed= boot parameter
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 09/34] x86/bugs: Report AMD retbleed vulnerability
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 04/34] x86/devicetable: Move x86 specific macro out of generic code
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 07/34] x86/entry: Remove skip_r11rcx
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 08/34] x86/cpufeatures: Move RETPOLINE flags to word 11
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 01/34] Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 06/34] x86/cpu: Add a steppings field to struct x86_cpu_id
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 03/34] x86/cpufeature: Fix various quality problems in the <asm/cpu_device_hd.h> header
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 02/34] x86/cpufeature: Add facility to check for min microcode revisions
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 05/34] x86/cpu: Add consistent CPU match macros
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 00/34] Retbleed & PBRSB Mitigations
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 1/7] vfio/ccw: create a parent struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 2/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v7 3/3] KVM: selftests: randomize page access order
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 2/2] virt: sev: Allow for retrying SNP extended requests
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/10] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/10] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/10] KVM: x86: move SMM entry to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/10] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/10] KVM: x86: do not define SMM-related constants if SMM disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/10] KVM: x86: start moving SMM-related functions to new files
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/10] KVM: zero output of KVM_GET_VCPU_EVENTS before filling in the struct
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/10] KVM: x86: move SMM exit to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 0/10] KVM: x86: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/10] KVM: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/10] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 06/16] KVM: Store immutable gfn_to_pfn_cache properties
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/16] KVM: x86: Remove unused argument in gpc_unmap_khva()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/16] KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_check()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/16] KVM: Skip unnecessary "unmap" if gpc is already valid during refresh
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/16] KVM: selftests: Mark "guest_saw_irq" as volatile in xen_shinfo_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/16] KVM: Drop KVM's API to allow temprorarily unmapping gfn=>pfn cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/16] KVM: Reject attempts to consume or refresh inactive gfn_to_pfn_cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/16] KVM: selftests: Add tests in xen_shinfo_test to detect lock races
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/16] KVM: Store gfn_to_pfn_cache length at activation time
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/16] KVM: Initialize gfn_to_pfn_cache locks in dedicated helper
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/16] KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_refresh()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/16] KVM: Do not partially reinitialize gfn=>pfn cache during activation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/16] KVM: Clean up hva_to_pfn_retry()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/16] KVM: Drop @gpa from exported gfn=>pfn cache check() and refresh() helpers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/16] KVM: Shorten gfn_to_pfn_cache function names
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V3 2/2] virt: sev: Allow for retrying SNP extended requests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V3 0/2] Fix security issue in SNP guest AES-GCM usage
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 9/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 20/25] KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 18/21] x86/virt/tdx: Configure global KeyID on all packages
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 19/21] x86/virt/tdx: Initialize all TDMRs
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- RE: [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- RE: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3 9/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 2/2] qtests/arm: add some mte tests
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH] KVM: SVM: Name and check reserved fields with structs offset
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Do not return host topology information from KVM_GET_SUPPORTED_CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCHv5 8/8] KVM: SVM: Enable VNMI feature
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 6/8] KVM: nSVM: implement nested VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 7/8] KVM: nSVM: emulate VMEXIT_INVALID case for nested VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCHv5 5/8] KVM: SVM: Add VNMI support in inject_nmi
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 4/8] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 3/8] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 2/8] KVM: SVM: Add VNMI bit definition
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 1/8] x86/cpu: Add CPUID feature bit for VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 0/8] Virtual NMI feature
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH kernel v2 0/3] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 2/2] qtests/arm: add some mte tests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 18/18] KVM: selftests/kvm_create_max_vcpus: check KVM_MAX_VCPUS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 12/18] KVM: selftests/rseq_test: name the migration thread and some cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 09/18] KVM: selftests/steal_time: vcpu related code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 00/21] TDX host kernel support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 00/21] TDX host kernel support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 20/21] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 19/21] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 09/21] x86/virt/tdx: Do logical-cpu scope TDX module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 06/21] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 17/21] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 10/21] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 05/21] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 11/21] x86/virt/tdx: Sanity check all TDX memory ranges are convertible memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 08/21] x86/virt/tdx: Do TDX module global initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 07/21] x86/virt/tdx: Shut down TDX module in case of error
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v6 15/21] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 13/21] x86/virt/tdx: Create TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 14/21] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 18/21] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 04/21] x86/virt/tdx: Use all boot-time system memory as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 03/21] x86/virt/tdx: Disable TDX if X2APIC is not enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 02/21] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 00/21] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 0/4] kvm/mm: Allow GUP to respond to non fatal signals
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 4/4] kvm: x86: Allow to respond to generic signals during slow PF
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 3/4] kvm: Add interruptible flag to __gfn_to_pfn_memslot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/4] kvm: Add KVM_PFN_ERR_SIGPENDING
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/kvm: Fix state restore in em_rsm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 45/46] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 44/46] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 36/46] KVM: selftests: Drop helpers to read/write page table entries
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] x86/kvm: Fix state restore in em_rsm
- From: "Christian A. Ehrhardt" <lk@xxxxxxx>
- Re: [PATCH v12 34/46] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v7 0/3] KVM: selftests: randomize memory access of dirty_log_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/3] KVM: selftests: randomize page access order
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] vfio: Decrement open_count before close_device()
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- Re: Hyper-V VTLs, permission bitmaps and userspace exits (was Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 9/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [kvm-unit-tests PATCH] x86/pmu: Disable inlining of measure()
- From: Bill Wendling <isanbard@xxxxxxxxx>
- Hyper-V VTLs, permission bitmaps and userspace exits (was Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3] KVM: nVMX: Advertise ENCLS_EXITING to L1 iff SGX is fully supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] WARNING in vcpu_enter_guest (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Increase timeout for vmx_vmcs_shadow_test to 10 mins
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] target/i386: Set maximum APIC ID to KVM prior to vCPU creation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 1/2] arm/kvm: add support for MTE
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v3 2/2] qtests/arm: add some mte tests
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v3 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/15] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [syzbot] riscv/fixes build error
- From: syzbot <syzbot+9d8dc6c2d48bbc419bb4@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] WARNING in vcpu_enter_guest (2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v4 0/1] KVM: s390: pv: fix clock comparator late after suspend/resume
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH] vfio: Decrement open_count before close_device()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- [kvm-unit-tests PATCH] x86: Increase timeout for vmx_vmcs_shadow_test to 10 mins
- From: Po-Hsu Lin <po-hsu.lin@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH V1] vfio: Add an option to get migration data size
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH v3] KVM: nVMX: Advertise ENCLS_EXITING to L1 iff SGX is fully supported
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH] KVM: x86: fire timer when it is migrated and expired, and in oneshot mode
- From: Li RongQing <lirongqing@xxxxxxxxx>
- Re: [PATCH v3 04/15] iommufd: Overview documentation
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86: KVM: Enable AVX-VNNI-INT8 CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- RE: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v6 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v6 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- [syzbot] WARNING in vcpu_enter_guest (2)
- From: syzbot <syzbot+dbef12497aa912c8e7ba@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Rafael Mendonca <rafaelmendsr@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/pmu: Disable inlining of measure()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH] vfio: Decrement open_count before close_device()
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v1 2/2] vfio/iova_bitmap: Fix PAGE_SIZE unaligned bitmaps
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v1 1/2] vfio/iova_bitmap: Explicitly include linux/slab.h
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v1 0/2] vfio/iova_bitmap: bug fixes
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH] x86/pmu: Disable inlining of measure()
- From: Bill Wendling <morbo@xxxxxxxxxx>
- [PATCH 08/10] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 07/10] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 09/10] vfio: Make vfio_container optionally compiled
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 02/10] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 03/10] vfio: Rename vfio_device_assign/unassign_container()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 01/10] vfio: Move vfio_device driver open/close code to a function
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 05/10] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 04/15] iommufd: Overview documentation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 06/15] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 15/15] iommufd: Add a selftest
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 02/15] iommu: Add device-centric DMA ownership interfaces
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 08/15] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 11/15] iommufd: Add a HW pagetable object
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 09/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 07/15] iommufd: PFN handling for iopt_pages
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 13/15] iommufd: Add kAPI toward external drivers for kernel access
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 01/15] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 03/15] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 00/15] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: disable halt polling when powersave governor is used
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Do not expose the host value of CPUID.8000001EH
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix the initial value of mcg_cap
- From: Tony Luck <tony.luck@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio: Add an option to get migration data size
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL 00/22] s390x: tests and fixes for PV, timing
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: x86: forcibly leave nested mode on vCPU reset
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] vfio: Add an option to get migration data size
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH RESEND v4 15/23] KVM: x86: smm: check for failures on smm entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 22/23] KVM: x86: SVM: don't save SVM state to SMRAM when VM is not long mode capable
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 17/23] KVM: x86: smm: use smram structs in the common code
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 19/23] KVM: x86: smm: use smram struct for 64 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 18/23] KVM: x86: smm: use smram struct for 32 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 21/23] KVM: x86: SVM: use smram structs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 20/23] KVM: svm: drop explicit return value of kvm_vcpu_map
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 14/23] KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 13/23] KVM: x86: emulator: update the emulation mode after CR0 write
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 12/23] KVM: x86: emulator: update the emulation mode after rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 09/23] bug: introduce ASSERT_STRUCT_OFFSET
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 05/23] KVM: allow compiling out SMM support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 06/23] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 07/23] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 03/23] KVM: x86: move SMM exit to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 01/23] KVM: x86: start moving SMM-related functions to new files
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 04/23] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH RESEND v4 02/23] KVM: x86: move SMM entry to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 17/23] KVM: x86: smm: use smram structs in the common code
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 13/23] KVM: x86: emulator: update the emulation mode after CR0 write
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 15/23] KVM: x86: smm: check for failures on smm entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 14/23] KVM: x86: smm: number of GPRs in the SMRAM image depends on the image format
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 08/23] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 07/23] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 10/23] KVM: x86: emulator: em_sysexit should update ctxt->mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 09/23] bug: introduce ASSERT_STRUCT_OFFSET
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 11/23] KVM: x86: emulator: introduce emulator_recalc_and_set_mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 06/23] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 12/23] KVM: x86: emulator: update the emulation mode after rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 00/23] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 05/23] KVM: allow compiling out SMM support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 03/23] KVM: x86: move SMM exit to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 04/23] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 01/23] KVM: x86: start moving SMM-related functions to new files
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v4 02/23] KVM: x86: move SMM entry to a new file
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [v2] KVM: s390: pv: fix external interruption loop not always detected
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 22/22] lib: s390x: sie: Properly populate SCA
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 21/22] lib: s390x: Enable reusability of VMs that were in PV mode
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 18/22] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 20/22] lib: s390x: Use a new asce for each PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 19/22] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 13/22] s390x: uv-host: Fence against being run as a PV guest
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 14/22] s390x: uv-host: Fix init storage origin and length check
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 17/22] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 15/22] lib: s390x: terminate if PGM interrupt in interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 16/22] s390x: uv-host: fix allocation of UV memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 12/22] s390x: uv-host: Remove duplicated +
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 05/22] s390x: add exittime tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 11/22] s390x: uv-host: Add a set secure config parameters test function
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 10/22] s390x: uv-host: Add access exception test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 07/22] s390x: uv-host: Add access checks for donated memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 09/22] s390x: uv-host: Test uv immediate parameter
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 04/22] s390x: add migration TOD clock test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 03/22] lib/s390x: move TOD clock related functions to library
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 06/22] s390x: do not enable PV dump support by default
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 08/22] s390x: uv-host: Add uninitialized UV tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 01/22] s390x: Add specification exception test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 02/22] s390x: Test specification exceptions during transaction
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 00/22] s390x: tests and fixes for PV, timing
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [v2 0/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [v2 1/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/4] KVM: use signals to abort enter_guest/blocking and retry
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: introduce memory transaction semaphore
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
- From: Yujie Liu <yujie.liu@xxxxxxxxx>
- Re: [GIT PULL] KVM patches for Linux 6.1-rc2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 1/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v2 0/1] KVM: s390: vsie: clarifications on setting the APCB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [v2 1/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 10/13] x86/pmu: Update testcases to cover Intel Arch PMU Version 1
- From: Sandipan Das <sandipan.das@xxxxxxx>
- Re: [v2 1/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [v1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v2 1/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [v2 0/1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [v1] KVM: s390: VSIE: sort out virtual/physical address in pin_guest_page
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/6] KVM: selftests: memslot_perf_test: aarch64 cleanup/fixes
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: API to block and resume all running vcpus in a vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH] Add Hyperv extended hypercall support in KVM
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]