Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v2 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v2 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v2 9/9] KVM: x86: LAM: Expose LAM CPUID to user space VMM
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v2 4/9] [Trivial] KVM: x86: MMU: Commets update
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v2 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v2 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v2 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v2 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v2 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 07/10] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v10 0/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 05/10] vdpa: move SVQ vring features check to net/
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v6 00/10] ASID support in vhost-vdpa net
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v6 01/10] vdpa: Use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v6 00/10] ASID support in vhost-vdpa net
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH vfio 06/13] vfio/mlx5: Refactor total_length name and usage
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH 5/5] s390/uaccess: add cmpxchg_user_key()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 04/11] virtio/vsock: add transport zerocopy callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v10 014/108] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 5/5] s390/uaccess: add cmpxchg_user_key()
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v3 0/6] KVM: selftests: memslot_perf_test: aarch64 cleanup/fixes
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v10 7/7] KVM: selftests: Automate choosing dirty ring size in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v10 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v10 6/7] KVM: selftests: Clear dirty ring states between two modes in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v10 5/7] KVM: selftests: Use host page size to map ring buffer in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v10 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v10 2/7] KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v10 1/7] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v10 0/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: Redefine pKVM memory transitions in terms of source/target
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: Clean out the odd handling of completer_addr
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH vfio 05/13] vfio/mlx5: Enforce a single SAVE command at a time
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH] KVM: Add system call KVM_VERIFY_MSI to verify MSI vector
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: Make Hyper-V guest OS ID common
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v4 04/17] iommufd: Document overview of iommufd
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 1/2] vfio-ccw: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- Re: [RESEND PATCH 2/6] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] vfio/ccw: identify CCW data addresses as physical
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: fix potential memory leak during the release
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Use TAP in some more KVM selftests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 32/44] KVM: x86: Unify pr_fmt to use module name for all KVM modules
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 37/44] KVM: Rename and move CPUHP_AP_KVM_STARTING to ONLINE section
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 11/11] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 10/11] vfio: Make vfio_container optionally compiled
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [RESEND PATCH 6/6] x86/traps: remove unused NMI entry exc_nmi_noist()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RESEND PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RESEND PATCH 4/6] x86/traps: add external_interrupt() to dispatch external interrupts
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RESEND PATCH 3/6] x86/traps: add install_system_interrupt_handler()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RESEND PATCH 2/6] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RESEND PATCH 1/6] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RESEND PATCH 0/6] x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v6 10/10] vdpa: Always start CVQ in SVQ mode
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- [PATCH 5/6] KVM: x86/VMX: add kvm_vmx_reinject_nmi_irq() for NMI/IRQ reinjection
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH 6/6] x86/traps: remove unused NMI entry exc_nmi_noist()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH 3/6] x86/traps: add install_system_interrupt_handler()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH 4/6] x86/traps: add external_interrupt() to dispatch external interrupts
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH 2/6] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH 1/6] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH 0/6] x86/traps,VMX: implement software based NMI/IRQ dispatch for VMX NMI/IRQ reinjection
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [PATCH v6 09/10] vdpa: Add listener_shadow_vq to vhost_vdpa
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v6 07/10] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v6 05/10] vdpa: move SVQ vring features check to net/
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 04/14] KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- RE: [PATCH v2 09/11] vfio: Move container related MODULE_ALIAS statements into container.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 08/11] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v5 03/14] KVM: arm64: Pass mm_ops through the visitor context
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v5 04/14] KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 04/10] vdpa: add vhost_vdpa_net_valid_svq_features
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v6 03/10] vhost: Allocate SVQ device file descriptors at device start
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v6 02/10] vhost: set SVQ device call handler at SVQ start
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 03/14] KVM: arm64: Pass mm_ops through the visitor context
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 01/10] vdpa: Use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 02/14] KVM: arm64: Stash observed pte value in visitor context
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v6 3/3] vfio/pci: Check the device set open count on reset
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v6 3/3] vfio/pci: Check the device set open count on reset
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: avoid accidentally go to shadow path for 0 count tdp root
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v5 01/14] KVM: arm64: Combine visitor arguments into a context structure
- From: Gavin Shan <gshan@xxxxxxxxxx>
- RE: [PATCH v2 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v6 3/3] vfio/pci: Check the device set open count on reset
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v2 06/11] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RE: [PATCH v2 05/11] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v6 2/3] vfio: Export the device set open count
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: do not prepare new memslot for KVM_MR_DELETE
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v6 1/3] vfio: Fix container device registration life cycle
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v2 00/11] Connect VFIO to IOMMUFD
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 1/2] vfio-ccw: sort out physical vs virtual pointers usage
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- linux-next: manual merge of the tip tree with the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: fix potential memory leak during the release
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH v3 1/7] x86: KVM: Move existing x86 CPUID leaf [CPUID_7_1_EAX] to kvm-only leaf
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 3/7] x86: KVM: Advertise AMX-FP16 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 7/7] x86: KVM: Advertise PREFETCHIT0/1 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 4/7] x86: KVM: Advertise AVX-IFMA CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [RFC PATCH 2/3] KVM: arm64: Allow userspace to trap SMCCC sub-ranges
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 2/7] x86: KVM: Advertise CMPccXADD CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 6/7] x86: KVM: Advertise AVX-NE-CONVERT CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 5/7] x86: KVM: Advertise AVX-VNNI-INT8 CPUID to user space
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [PATCH v3 0/7] x86: KVM: Advertise CPUID of new Intel platform
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- [RFC PATCH 3/3] KVM: selftests: Test user hypercalls
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] KVM: do not prepare new memslot for KVM_MR_DELETE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: x86/mmu: Register page-tracker on first shadow root allocation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86/mmu: Use page-track only for... page tracking
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: do not prepare new memslot for KVM_MR_DELETE
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v6 1/3] vfio: Fix container device registration life cycle
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v6 3/3] vfio/pci: Check the device set open count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v6 0/3] vfio/pci: Check the device set open count on reset
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- [PATCH v6 2/3] vfio: Export the device set open count
- From: Anthony DeRossi <ajderossi@xxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH 3/3] KVM: SVM: Make module params and other variables read-only after init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: Mark vendor module param read-only after init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: VMX: Make module params and other variables read-only after init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: SVM: Make MSR permission bitmap offsets read-only after init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: move memslot invalidation later than possible failures
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 38/44] KVM: Disable CPU hotplug during hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: x86: Remove unnecessary export of kvm_cpu_has_pending_timer()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: nVMX: Fix another case where KVM overrides VMX MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Test KVM's handling of VMX's sec exec MSR on KVM_SET_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Nested AVIC design (was:Re: [RFC PATCH v3 04/19] KVM: x86: mmu: allow to enable write tracking externally)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 01/14] KVM: arm64: Combine visitor arguments into a context structure
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] KVM: move memslot invalidation later than possible failures
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 01/14] KVM: arm64: Combine visitor arguments into a context structure
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 15/17] iommufd: Add a selftest
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v3 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 11/14] KVM: arm64: Make block->table PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 10/14] KVM: arm64: Split init and set for table PTE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 09/14] KVM: arm64: Atomically update stage 2 leaf attributes in parallel walks
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 05/14] KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 01/14] KVM: arm64: Combine visitor arguments into a context structure
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 09/14] KVM: arm64: Atomically update stage 2 leaf attributes in parallel walks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 11/14] KVM: arm64: Make block->table PTE changes parallel-aware
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 09/14] KVM: arm64: Atomically update stage 2 leaf attributes in parallel walks
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 12/14] KVM: arm64: Make leaf->leaf PTE changes parallel-aware
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 10/14] KVM: arm64: Split init and set for table PTE
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 5/5] s390/uaccess: add cmpxchg_user_key()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v5 07/14] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 06/14] KVM: arm64: Use an opaque type for pteps
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 05/14] KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 04/14] KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 03/14] KVM: arm64: Pass mm_ops through the visitor context
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 02/14] KVM: arm64: Stash observed pte value in visitor context
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 01/14] KVM: arm64: Combine visitor arguments into a context structure
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 1/2] vfio-ccw: sort out physical vs virtual pointers usage
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/8] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 14/17] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 12/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 15/17] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 13/17] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 11/17] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 10/17] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 09/17] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 04/17] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 03/17] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 05/17] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 08/17] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 07/17] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 06/17] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 02/17] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 1/2] vfio-ccw: sort out physical vs virtual pointers usage
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH 2/2] vfio/ccw: identify CCW data addresses as physical
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH 0/2] s390/vfio-ccw: addressing fixes
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: Make Hyper-V guest OS ID common
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 7/7] selftests: kvm/x86: Test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v7 6/7] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v7 5/7] selftests: kvm/x86: Add flags when creating a pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v7 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v7 3/7] kvm: x86/pmu: prepare the pmu event filter for masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v7 2/7] kvm: x86/pmu: Remove impossible events from the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v7 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v7 0/7] Introduce and test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v1 0/2] vfio/iova_bitmap: bug fixes
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v2 10/11] vfio: Make vfio_container optionally compiled
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [RFC PATCH 0/3] Use TAP in some more KVM selftests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] arm64: paravirt: remove conduit check in has_pv_steal_clock
- From: Will Deacon <will@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 2/2] KVM: x86/mmu: Split huge pages mapped by the TDP MMU on fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 1/2] KVM: selftests: Introduce a selftest to measure execution performance
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 0/2] KVM: Split huge pages mapped by the TDP MMU on fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: Make Hyper-V guest OS ID common
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH vfio 11/13] vfio/mlx5: Introduce multiple loads
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vfio 10/13] vfio/mlx5: Introduce SW headers for migration states
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH vfio 06/13] vfio/mlx5: Refactor total_length name and usage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vfio 05/13] vfio/mlx5: Enforce a single SAVE command at a time
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: fix potential memory leak during the release
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v6 0/7] Introduce and test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH] KVM: svm/avic: Drop "struct kvm_x86_ops" for avic_hardware_setup()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL 0/2] s390 fixes for 6.1-rc5
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 10/11] vfio: Make vfio_container optionally compiled
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH vfio 02/13] vfio/mlx5: Fix a typo in mlx5vf_cmd_load_vhca_state()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vfio 01/13] vfio: Add an option to get migration data size
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 00/11] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 03/11] KVM: SVM: adjust register allocation for __svm_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 2/3] vfio: Export the device set open count
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 10/11] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 07/11] KVM: SVM: do not allocate struct svm_cpu_data dynamically
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 07/11] KVM: SVM: do not allocate struct svm_cpu_data dynamically
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 09/11] KVM: SVM: restore host save area from assembly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] s390/uaccess: add cmpxchg_user_key()
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH] vhost-vdpa: fix potential memory leak during the release
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 08/11] KVM: SVM: move guest vmsave/vmload back to assembly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 06/11] KVM: SVM: remove dead field from struct svm_cpu_data
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 05/11] KVM: SVM: remove unused field from struct vcpu_svm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/11] KVM: SVM: retrieve VMCB from assembly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/11] KVM: SVM: adjust register allocation for __svm_vcpu_run
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 02/11] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/11] KVM: x86: use a separate asm-offsets.c file
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 09/11] KVM: SVM: restore host save area from assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/11] KVM: SVM: retrieve VMCB from assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/11] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/11] x86, KVM: remove unnecessary argument to x86_virt_spec_ctrl and callers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/11] KVM: SVM: move guest vmsave/vmload back to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/11] KVM: SVM: adjust register allocation for __svm_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/11] KVM: SVM: remove dead field from struct svm_cpu_data
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/11] KVM: SVM: fixes for vmentry code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/11] KVM: SVM: do not allocate struct svm_cpu_data dynamically
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/11] KVM: x86: use a separate asm-offsets.c file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/11] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/11] KVM: SVM: remove unused field from struct vcpu_svm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/svm/pmu: Add AMD PerfMonV2 support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: Make Hyper-V guest OS ID common
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: selftests: Move hypercall() to hyper.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH -next] vfio/mlx5: use module_pci_driver
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- [PATCH v2] x86/paravirt: use common macro for creating simple asm paravirt functions
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [RFC 4/9] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- Re: [PATCH v10 060/108] KVM: Add functions to set GFN to private or shared
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 00/11] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v10 036/108] KVM: TDX: Enable mmio spte caching always for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: svm/avic: Drop "struct kvm_x86_ops" for avic_hardware_setup()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v10 034/108] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 0/7] Introduce and test masked events
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v10 032/108] KVM: x86/mmu: Make sync_page not use hard-coded 0 as the initial SPTE value
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 033/108] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 2/8] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 2/2] vhost: fix range used in translate_desc()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v2 0/2] vhost: fix ranges when call vhost_iotlb_itree_first()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v2 1/2] vringh: fix range used in iotlb_translate()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] vhost: fix range used in translate_desc()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/svm/pmu: Add AMD PerfMonV2 support
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH -next] vfio/mlx5: use module_pci_driver
- From: ruanjinjie <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1] MAINTAINERS: Update entries from the Nitro Enclaves section
- From: "Paraschiv, Andra-Irina" <andraprs@xxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86: remove exit_int_info warning in svm_handle_exit
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 4/8] KVM: SVM: retrieve VMCB from assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- RE: [PATCH v2 00/11] Connect VFIO to IOMMUFD
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH -next] vfio/mlx5: use module_pci_driver
- From: ruanjinjie <ruanjinjie@xxxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: VMX: Do not trap VMFUNC instructions for L1 guests.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v2 2/2] KVM: nVMX: Simplify the setting of SECONDARY_EXEC_ENABLE_VMFUNC for nested.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v2 0/2] Cleanup VMFUNC handling in KVM.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v3 3/3] perf/x86/intel: Expose EPT-friendly PEBS for SPR and future models
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v3 2/3] KVM: x86/pmu: Add PRIR++ and PDist support for SPR and later models
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v3 0/3] KVM: x86/pmu: Enable guest PEBS for SPR and later models
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v3 1/3] KVM: x86/pmu: Disable guest PEBS on hybird cpu due to heterogeneity
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 2/2] vhost: fix range used in translate_desc()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- Re: [PATCH vfio 01/13] vfio: Add an option to get migration data size
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v1] MAINTAINERS: Update entries from the Nitro Enclaves section
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] x86/paravirt: use common macro for creating simple asm paravirt functions
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH] KVM: move memslot invalidation later than possible failures
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH] KVM: Add system call KVM_VERIFY_MSI to verify MSI vector
- From: "chenxiang (M)" <chenxiang66@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/paravirt: use common macro for creating simple asm paravirt functions
- From: "Srivatsa S. Bhat" <srivatsa@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool] hw/i8042: Fix value uninitialized in kbd_io()
- From: hbuxiaofei <hbuxiaofei@xxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH v5 3/3] vfio/pci: Check the device set open count on reset
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v5 2/3] vfio: Export the device set open count
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v5 1/3] vfio: Fix container device registration life cycle
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2] vhost/vsock: Fix error handling in vhost_vsock_init()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 2/2] vhost: fix range used in translate_desc()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 1/2] vringh: fix range used in iotlb_translate()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/3] vfio: Fix container device registration life cycle
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 1/3] vfio: Fix container device registration life cycle
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 10/11] vfio: Make vfio_container optionally compiled
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 4/8] KVM: SVM: retrieve VMCB from assembly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 3/3] vfio/pci: Check the device set open count on reset
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 26/27] x86/pmu: Update testcases to cover AMD PMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/3] vfio: Fix container device registration life cycle
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v5 2/3] vfio: Export the device set open count
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v5 1/3] vfio: Fix container device registration life cycle
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 2/3] vfio: Export the device set open count
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/speculation: Support Automatic IBRS under virtualization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 3/3] x86/speculation: Support Automatic IBRS under virtualization
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH v2 10/11] vfio: Make vfio_container optionally compiled
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: SVM: adjust register allocation for __svm_vcpu_run
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/8] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1] MAINTAINERS: Update entries from the Nitro Enclaves section
- From: "Paraschiv, Andra-Irina" <andraprs@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 0/8] KVM: SVM: fixes for vmentry code
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1] MAINTAINERS: Update entries from the Nitro Enclaves section
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1] MAINTAINERS: Update entries from the Nitro Enclaves section
- From: "Paraschiv, Andra-Irina" <andraprs@xxxxxxxxxx>
- [PATCH v1] MAINTAINERS: Update entries from the Nitro Enclaves section
- From: Andra Paraschiv <andraprs@xxxxxxxxxx>
- Re: [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: Make Hyper-V guest OS ID common
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v4 12/17] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: selftests: Move hypercall() to hyper.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH kvmtool] hw/i8042: Fix value uninitialized in kbd_io()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool v2] pci: Disable writes to Status register
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool 0/6] RISC-V Svinval, Zihintpause, anad Zicbom support
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] KVM: move memslot invalidation later than possible failures
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 4/17] iommufd: Document overview of iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v6 10/10] vdpa: Always start CVQ in SVQ mode
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 08/10] vdpa: Store x-svq parameter in VhostVDPAState
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 07/10] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 09/10] vdpa: Add listener_shadow_vq to vhost_vdpa
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 06/10] vdpa: Allocate SVQ unconditionally
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 04/10] vdpa: add vhost_vdpa_net_valid_svq_features
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 05/10] vdpa: move SVQ vring features check to net/
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 00/10] ASID support in vhost-vdpa net
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 01/10] vdpa: Use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 03/10] vhost: Allocate SVQ device file descriptors at device start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 02/10] vhost: set SVQ device call handler at SVQ start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH v4 10/17] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 3/3] kvm: Atomic memslot updates
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Call for FOSDEM presentations on QEMU, KVM, and rust-vmm
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [PATCH kvmtool 0/6] RISC-V Svinval, Zihintpause, anad Zicbom support
- From: Will Deacon <will@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v1] s390/vfio-ap: GISA: sort out physical vs virtual pointers usage
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/11] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 7/8] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 8/8] x86, KVM: remove unnecessary argument to x86_virt_spec_ctrl and callers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 4/8] KVM: SVM: retrieve VMCB from assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 6/8] KVM: SVM: restore host save area from assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86: use a separate asm-offsets.c file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 5/8] KVM: SVM: move guest vmsave/vmload to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 3/8] KVM: SVM: adjust register allocation for __svm_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 0/8] KVM: SVM: fixes for vmentry code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 2/8] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 12/17] iommufd: Add kAPI toward external drivers for physical devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 15/17] iommufd: Add a selftest
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 10/17] iommufd: IOCTLs for the io_pagetable
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v1] KVM: s390: GISA: sort out physical vs virtual pointers usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: Add system call KVM_VERIFY_MSI to verify MSI vector
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 16/17] iommufd: Add some fault injection points
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Exit run-loop immediately if xfer_to_guest fails
- From: Andreas Schwab <schwab@xxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH] RISC-V: KVM: Exit run-loop immediately if xfer_to_guest fails
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 031/108] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: Do not trap VMFUNC instructions for L1 guests.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH 1/2] vringh: fix range used in iotlb_translate()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 0/2] vhost: fix ranges when call vhost_iotlb_itree_first()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 2/2] vhost: fix range used in translate_desc()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2] vhost/vsock: Fix error handling in vhost_vsock_init()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Do not trap VMFUNC instructions for L1 guests.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v2] vhost/vsock: Fix error handling in vhost_vsock_init()
- From: Yuan Can <yuancan@xxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Fix error handling in vhost_vsock_init()
- From: Yuan Can <yuancan@xxxxxxxxxx>
- Re: S390 testing for IOMMUFD
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 26/27] x86/pmu: Update testcases to cover AMD PMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Fix error handling in vhost_vsock_init()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 00/11] Connect VFIO to IOMMUFD
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v10 015/108] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] vhost/vsock: Fix error handling in vhost_vsock_init()
- From: Yuan Can <yuancan@xxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH] KVM: move memslot invalidation later than possible failures
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: SVM: extract VMCB accessors to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] x86/speculation: Support Automatic IBRS
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH] vfio/pci: Add system call KVM_VERIFY_MSI to verify every MSI vector
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- [PATCH] KVM: Add system call KVM_VERIFY_MSI to verify MSI vector
- From: chenxiang <chenxiang66@xxxxxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v4 16/17] iommufd: Add some fault injection points
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v4 15/17] iommufd: Add a selftest
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v9 7/7] KVM: selftests: Automate choosing dirty ring size in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v9 6/7] KVM: selftests: Clear dirty ring states between two modes in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v9 5/7] KVM: selftests: Use host page size to map ring buffer in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v9 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v9 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v9 2/7] KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v9 1/7] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v9 0/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v3] KVM: x86: Keep the lock order consistent
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [PATCH v4 04/17] iommufd: Document overview of iommufd
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: selftests: Move hypercall() to hyper.h
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: Make Hyper-V guest OS ID common
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- S390 testing for IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 0/3] Use TAP in some more KVM selftests
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v4 15/17] iommufd: Add a selftest
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 02/11] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 04/11] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 08/11] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 00/11] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 10/11] vfio: Make vfio_container optionally compiled
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 01/11] vfio: Move vfio_device driver open/close code to a function
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 05/11] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 11/11] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 09/11] vfio: Move container related MODULE_ALIAS statements into container.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 07/11] vfio-iommufd: Support iommufd for physical VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 03/11] vfio: Rename vfio_device_assign/unassign_container()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 06/11] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 13/17] iommufd: Add kAPI toward external drivers for kernel access
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 11/17] iommufd: Add a HW pagetable object
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 17/17] iommufd: Add additional invariant assertions
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 07/17] iommufd: PFN handling for iopt_pages
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 06/17] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 02/17] iommu: Add device-centric DMA ownership interfaces
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 09/17] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 16/17] iommufd: Add some fault injection points
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 14/17] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 00/17] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 10/17] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 08/17] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 03/17] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 12/17] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 05/17] iommufd: File descriptor, context, kconfig and makefiles
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 04/17] iommufd: Document overview of iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v4 01/17] iommu: Add IOMMU_CAP_ENFORCE_CACHE_COHERENCY
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- RE: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/3] x86/speculation: Support Automatic IBRS
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 0/3] x86/speculation: Support Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 3/3] x86/speculation: Support Automatic IBRS under virtualization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/3] x86/speculation: Support Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 2/3] x86/speculation: Support Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [PATCH 3/3] x86/speculation: Support Automatic IBRS under virtualization
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v5 14/14] KVM: arm64: Handle stage-2 faults in parallel
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 13/14] KVM: arm64: Make table->block changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 11/14] KVM: arm64: Make block->table PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 12/14] KVM: arm64: Make leaf->leaf PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 2/5] x86/cpuid: refactor setup_clear_cpu_cap()/clear_cpu_cap()
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5 07/14] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 09/14] KVM: arm64: Atomically update stage 2 leaf attributes in parallel walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 08/14] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 10/14] KVM: arm64: Split init and set for table PTE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 06/14] KVM: arm64: Use an opaque type for pteps
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 05/14] KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 04/14] KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 03/14] KVM: arm64: Pass mm_ops through the visitor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 02/14] KVM: arm64: Stash observed pte value in visitor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 01/14] KVM: arm64: Combine visitor arguments into a context structure
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 00/14] KVM: arm64: Parallel stage-2 fault handling
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v3 01/11] virtio/vsock: rework packet allocation logic
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 01/11] virtio/vsock: rework packet allocation logic
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Do not recover dirty-tracked NX Huge Pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 2/4] KVM: selftests: create -r argument to specify random seed
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [RFC] vhost: Clear the pending messages on vhost_init_device_iotlb()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v2 2/5] x86/cpuid: refactor setup_clear_cpu_cap()/clear_cpu_cap()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 27/44] KVM: Drop kvm_arch_{init,exit}() hooks
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 30/44] KVM: Drop kvm_arch_check_processor_compat() hook
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 7/8] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: selftests: Make Hyper-V guest OS ID common
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 6/6] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: SVM: extract VMCB accessors to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 7/8] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 3/3] KVM: x86/pmu: Limit the maximum number of supported AMD GP counters
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: selftests: Move hypercall() to hyper.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Punit Agrawal <punit.agrawal@xxxxxxxxxxxxx>
- [PATCH v10 2/4] KVM: selftests: create -r argument to specify random seed
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v10 4/4] KVM: selftests: randomize page access order
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v10 0/4] randomize memory access of dirty_log_perf_test
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 09/44] KVM: Drop arch hardware (un)setup hooks
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v10 3/4] KVM: selftests: randomize which pages are written vs read
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 25/44] KVM: s390: Do s390 specific init without bouncing through kvm_init()
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v10 1/4] KVM: selftests: implement random number generator for guest code
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 26/44] KVM: s390: Mark __kvm_s390_init() and its descendants as __init
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 2/4] KVM: selftests: create -r argument to specify random seed
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: SVM: extract VMCB accessors to a new file
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 1/4] KVM: selftests: implement random number generator for guest code
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [v2 3/6] KVM: arm64: Support pvlock preempted via shared structure
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [v2 2/6] KVM: arm64: Add SMCCC paravirtualised lock calls
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: x86/pmu: Stop adding speculative Intel GP PMCs that don't exist yet
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [v2 1/6] KVM: arm64: Document PV-lock interface
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [v2 3/6] KVM: arm64: Support pvlock preempted via shared structure
- From: Punit Agrawal <punit.agrawal@xxxxxxxxxxxxx>
- Re: [PATCH 06/44] KVM: s390: Move hardware setup/unsetup to init/exit
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 04/44] KVM: Teardown VFIO ops earlier in kvm_exit()
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [v2 2/6] KVM: arm64: Add SMCCC paravirtualised lock calls
- From: Punit Agrawal <punit.agrawal@xxxxxxxxxxxxx>
- Re: [PATCH 05/44] KVM: s390: Unwind kvm_arch_init() piece-by-piece() if a step fails
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [v2 1/6] KVM: arm64: Document PV-lock interface
- From: Punit Agrawal <punit.agrawal@xxxxxxxxxxxxx>
- Re: [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 00/27] x86/pmu: Test case optimization, fixes and additions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: SVM: extract VMCB accessors to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Do not trap VMFUNC instructions for L1 guests.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH linux-next] KVM: x86: Replace IS_ERR() with IS_ERR_VALUE()
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 2/8] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 8/8] Documentation: document the ABI changes for KVM_CAP_ARM_MTE
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Do not trap VMFUNC instructions for L1 guests.
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 7/8] KVM: arm64: permit all VM_MTE_ALLOWED mappings with MTE enabled
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH V2] KVM: SVM: Only dump VSMA to klog for debugging
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 6/8] KVM: arm64: unify the tests for VMAs in memslots when MTE is enabled
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v5 5/8] arm64: mte: Lock a page for MTE tag initialisation
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v5 3/8] KVM: arm64: Simplify the sanitise_mte_tags() logic
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 2/8] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: SVM: extract VMCB accessors to a new file
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/8] KVM: SVM: move guest vmsave/vmload to assembly
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH V2] KVM: SVM: Only dump VSMA to klog for debugging
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] tools/kvm_stat: update exit reasons for vmx/svm/aarch64/userspace
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/8] KVM: SVM: move guest vmsave/vmload to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 4/8] KVM: SVM: move guest vmsave/vmload to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/8] KVM: SVM: fixes for vmentry code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 4/8] KVM: SVM: move guest vmsave/vmload to assembly
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 4/8] KVM: SVM: move guest vmsave/vmload to assembly
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH 7/8] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/8] KVM: SVM: replace regs argument of __svm_vcpu_run with vcpu_svm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 0/8] KVM: SVM: fixes for vmentry code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/8] KVM: SVM: restore host save area from assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/8] KVM: SVM: extract VMCB accessors to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/8] KVM: SVM: adjust register allocation for __svm_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 8/8] x86, KVM: remove unnecessary argument to x86_virt_spec_ctrl and callers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 5/8] KVM: SVM: retrieve VMCB from assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 4/8] KVM: SVM: move guest vmsave/vmload to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] tools/kvm_stat: update exit reasons for vmx/svm/aarch64/userspace
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- Re: [PATCH v3 03/15] interval-tree: Add a utility to iterate over spans in an interval tree
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v3 00/15] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/15] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] tools/kvm_stat: fix attack vector with user controlled FUSE mounts
- From: Matthias Gerstner <matthias.gerstner@xxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] s390/mm: fix virtual-physical address confusion for swiotlb
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool 0/6] RISC-V Svinval, Zihintpause, anad Zicbom support
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] s390/mm: fix virtual-physical address confusion for swiotlb
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH v2 1/1] s390/mm: fix virtual-physical address confusion for swiotlb
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH v2 0/1] s390/mm: fix virtual-physical address confusion for swiotlb
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v1] s390/mm: fix virtual-physical address confusion for swiotlb
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [External] Re: [v2 0/6] KVM: arm64: implement vcpu_is_preempted check
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] x86/paravirt: use common macro for creating simple asm paravirt functions
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v1] s390/mm: fix virtual-physical address confusion for swiotlb
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- [PATCH v1] s390/mm: fix virtual-physical address confusion for swiotlb
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v8 8/8] s390x/s390-virtio-ccw: add zpcii-disable machine property
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v8 8/8] s390x/s390-virtio-ccw: add zpcii-disable machine property
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v11 01/11] s390x: Register TYPE_S390_CCW_MACHINE properties as class properties
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL 1/2] KVM: s390: pv: don't allow userspace to set the clock under PV
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 2/2] KVM: s390: pci: Fix allocation size of aift kzdev elements
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 0/2] s390 fixes for 6.1-rc5
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH 4/4] vDPA/ifcvf: implement features provisioning
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH 3/4] vDPA/ifcvf: allocate ifcvf_adapter in dev_add()
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH 2/4] vDPA/ifcvf: IRQ interfaces work on ifcvf_hw
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH 1/4] vDPA/ifcvf: ifcvf base layer interfaces work on struct ifcvf_hw
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- [PATCH 0/4] ifcvf/vDPA implement features provisioning
- From: Zhu Lingshan <lingshan.zhu@xxxxxxxxx>
- Re: KVM vs AMD: Re: [PATCH v3 48/59] x86/retbleed: Add SKL return thunk
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 3/7] KVM: Support dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: VMX: Do not trap VMFUNC instructions for L1 guests.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v3 10/14] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 13/14] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 14/14] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]