Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v13 45/48] KVM: selftests: Introduce rdmsr_from_l2() and use it for MSR-Bitmap tests
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v13 41/48] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 45/48] KVM: selftests: Introduce rdmsr_from_l2() and use it for MSR-Bitmap tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 8/15] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 3/9] RISC-V: KVM: Define a probe function for SBI extension data structures
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [RFC 8/9] RISC-V: KVM: Implement perf support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 44/48] KVM: selftests: Stuff RAX/RCX with 'safe' values in vmmcall()/vmcall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v13 47/48] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 44/48] KVM: selftests: Stuff RAX/RCX with 'safe' values in vmmcall()/vmcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 48/48] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 45/48] KVM: selftests: Introduce rdmsr_from_l2() and use it for MSR-Bitmap tests
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 46/48] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 43/48] KVM: selftests: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 40/48] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 37/48] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 41/48] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 42/48] KVM: selftests: Create a vendor independent helper to allocate Hyper-V specific test pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 39/48] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 36/48] KVM: selftests: Drop helpers to read/write page table entries
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 35/48] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 34/48] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 38/48] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 32/48] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 29/48] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 26/48] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 27/48] KVM: x86: Make kvm_hv_get_assist_page() return 0/-errno
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 33/48] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 31/48] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 30/48] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 28/48] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 25/48] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 23/48] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 22/48] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 20/48] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 18/48] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 21/48] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 24/48] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 19/48] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 14/48] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 17/48] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 16/48] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 15/48] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 12/48] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 13/48] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 10/48] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 04/48] x86/hyperv: KVM: Rename "hv_enlightenments" to "hv_vmcb_enlightenments"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 03/48] KVM: SVM: Add a proper field for Hyper-V VMCB enlightenments
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 07/48] KVM: x86: Move clearing of TLB_FLUSH_CURRENT to kvm_vcpu_flush_tlb_all()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 08/48] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 05/48] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 11/48] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 09/48] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 02/48] KVM: selftests: Move "struct hv_enlightenments" to x86_64/svm.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 06/48] KVM: VMX: Rename "vmx/evmcs.{ch}" to "vmx/hyperv.{ch}"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v13 01/48] x86/hyperv: Move VMCB enlightenment definitions to hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 03/10] vfio: Rename vfio_device_assign/unassign_container()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 02/10] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 7/9] RISC-V: KVM: Implement trap & emulate for hpmcounters
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] vfio: Move vfio_device driver open/close code to a function
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 6/9] RISC-V: KVM: Add SBI PMU extension support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [GIT PULL] KVM changes for 6.1-rc4
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC 5/9] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 4/7] vfio/ccw: move private to mdev lifecycle
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 09/10] vfio: Make vfio_container optionally compiled
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 4/9] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/10] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 1/9] RISC-V: Define a helper function to probe number of hardware counters
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 05/10] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 02/10] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 01/10] vfio: Move vfio_device driver open/close code to a function
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- RE: [PATCH] KVM: replace ternary operator with min()
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH kernel v2] swiotlb: Half the size if allocation failed
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [V3 PATCH 4/4] KVM: selftests: x86: Precompute the cpu type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v10 060/108] KVM: Add functions to set GFN to private or shared
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH v1 7/7] vfio: Remove vfio_free_device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 6/7] vfio/ccw: replace vfio_init_device with _alloc_
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 5/7] vfio/ccw: remove release completion
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 4/7] vfio/ccw: move private to mdev lifecycle
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- RE: [PATCH v2] vfio-pci: Accept a non-zero open_count on reset
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH 09/10] vfio: Make vfio_container optionally compiled
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 08/10] vfio-iommufd: Support iommufd for emulated VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [KVM] e923b0537d: kernel-selftests.kvm.rseq_test.fail
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- RE: [PATCH 07/10] vfio-iommufd: Support iommufd for physical VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 06/10] vfio-iommufd: Allow iommufd to be used in place of a container fd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 05/10] vfio: Use IOMMU_CAP_ENFORCE_CACHE_COHERENCY for vfio_file_enforced_coherent()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 03/10] vfio: Rename vfio_device_assign/unassign_container()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 02/10] vfio: Move vfio_device_assign_container() into vfio_device_first_open()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 01/10] vfio: Move vfio_device driver open/close code to a function
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] KVM: replace DEFINE_SIMPLE_ATTRIBUTE with DEFINE_DEBUGFS_ATTRIBUTE
- From: Bo Liu <liubo03@xxxxxxxxxx>
- [PATCH] KVM: replace ternary operator with min()
- From: Bo Liu <liubo03@xxxxxxxxxx>
- [PATCH] RISC-V: KVM: use vma_lookup() instead of find_vma_intersection()
- From: Bo Liu <liubo03@xxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: cuigaosheng <cuigaosheng1@xxxxxxxxxx>
- [PATCH v2] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [RESEND PATCH v3] KVM: VMX: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- iommufd branch into linux-next
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: "Jayaramappa, Srilakshmi" <sjayaram@xxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 5/9] KVM: arm64: Improve no-running-vcpu report for dirty ring
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 4/5] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH kernel v2] swiotlb: Half the size if allocation failed
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v7 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 1/5] KVM: selftests: Add missing break between -e and -g option in dirty_log_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 10/10] KVM: selftests: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: "Jayaramappa, Srilakshmi" <sjayaram@xxxxxxxxxx>
- Re: [PATCH v3 06/10] KVM: selftests: Copy KVM PFERR masks into selftests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 04/10] KVM: selftests: Move flds instruction emulation failure handling to header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 03/10] KVM: selftests: Delete dead ucall code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 02/10] KVM: selftests: Explicitly require instructions bytes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 09/10] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 10/10] KVM: selftests: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 08/10] KVM: selftests: Provide error code as a KVM_ASM_SAFE() output
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 09/10] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 04/10] KVM: selftests: Move flds instruction emulation failure handling to header
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 07/10] KVM: selftests: Avoid JMP in non-faulting path of KVM_ASM_SAFE()
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 05/10] KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 06/10] KVM: selftests: Copy KVM PFERR masks into selftests
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 02/10] KVM: selftests: Explicitly require instructions bytes
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 00/10] KVM: selftests: Fix and clean up emulator_error_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 03/10] KVM: selftests: Delete dead ucall code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 01/10] KVM: selftests: Rename emulator_error_test to smaller_maxphyaddr_emulation_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v7 0/5] dirty_log_perf_test vCPU pinning
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v7 4/5] KVM: selftests: Add atoi_positive() and atoi_non_negative() for input validation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v7 2/5] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v7 1/5] KVM: selftests: Add missing break between -e and -g option in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v7 3/5] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: VMX: remove regs argument of __vmx_vcpu_run
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: (subset) [PATCH v7 0/9] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 05/15] KVM: nVMX: Let userspace set nVMX MSR to any _host_ supported value
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/4] KVM: selftests: create -r argument to specify random seed
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v3 8/15] iommufd: Algorithms for PFN storage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] vdpa: Allocate SVQ unconditionally
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5 2/6] vdpa: Allocate SVQ unconditionally
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v5 2/6] vdpa: Allocate SVQ unconditionally
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 2/6] vdpa: Allocate SVQ unconditionally
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v10 014/108] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH] KVM: x86: fix undefined behavior in bit shift for __feature_bit
- From: Gaosheng Cui <cuigaosheng1@xxxxxxxxxx>
- Re: [PATCH v5 6/6] vdpa: Always start CVQ in SVQ mode
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 010/108] KVM: TDX: Add TDX "architectural" error codes
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 3/9] KVM: Check KVM_CAP_DIRTY_LOG_{RING, RING_ACQ_REL} prior to enabling them
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 5/9] KVM: arm64: Improve no-running-vcpu report for dirty ring
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 6/6] vdpa: Always start CVQ in SVQ mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5 2/6] vdpa: Allocate SVQ unconditionally
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH kernel v2] swiotlb: Half the size if allocation failed
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [RESEND PATCH v2] kvm: x86: Keep the lock order consistent
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [PATCH 4.14 00/34] Retbleed & PBRSB Mitigations
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v10 107/108] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH v7 3/9] KVM: Check KVM_CAP_DIRTY_LOG_{RING, RING_ACQ_REL} prior to enabling them
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 9/9] KVM: selftests: Automate choosing dirty ring size in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 8/9] KVM: selftests: Clear dirty ring states between two modes in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 7/9] KVM: selftests: Use host page size to map ring buffer in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 4/9] KVM: Support dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 2/9] KVM: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 5/9] KVM: arm64: Improve no-running-vcpu report for dirty ring
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 6/9] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 1/9] KVM: x86: Introduce KVM_REQ_DIRTY_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v7 0/9] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH RESEND v4 23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v10 090/108] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 097/108] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 096/108] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 087/108] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 093/108] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 099/108] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 092/108] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 095/108] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 094/108] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 108/108] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 091/108] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 089/108] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 088/108] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 082/108] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 085/108] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 080/108] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 084/108] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 083/108] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 081/108] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 107/108] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 086/108] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 106/108] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 079/108] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 078/108] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 077/108] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 076/108] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 075/108] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 070/108] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 072/108] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 071/108] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 073/108] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 074/108] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 069/108] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 103/108] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 068/108] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 064/108] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 065/108] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 102/108] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 066/108] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 067/108] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 063/108] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 059/108] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 060/108] KVM: Add functions to set GFN to private or shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 100/108] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 101/108] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 058/108] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 061/108] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 057/108] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 055/108] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 054/108] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 053/108] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 040/108] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 035/108] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 033/108] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 025/108] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 023/108] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 050/108] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 052/108] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 037/108] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 027/108] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 038/108] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 034/108] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 039/108] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 045/108] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 051/108] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 049/108] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 044/108] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 042/108] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 022/108] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 043/108] KVM: x86/mmu: Require TDP MMU for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 048/108] KVM: x86/tdp_mmu: Make handle_changed_spte() return value
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 036/108] KVM: TDX: Enable mmio spte caching always for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 031/108] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 041/108] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 015/108] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 030/108] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 032/108] KVM: x86/mmu: Make sync_page not use hard-coded 0 as the initial SPTE value
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 029/108] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 011/108] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 018/108] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 017/108] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 014/108] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 024/108] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 026/108] KVM: TDX: Use private memory for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 019/108] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 028/108] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 008/108] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 012/108] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 010/108] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 020/108] KVM: Support KVM_CAP_MAX_VCPUS for KVM_ENABLE_CAP
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 013/108] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 009/108] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 007/108] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 006/108] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 003/108] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 002/108] KVM: x86: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 001/108] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 000/108] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v10 004/108] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH 00/15] Introduce Architectural LBR for vPMU
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v3 10/15] iommufd: IOCTLs for the io_pagetable
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 12/15] iommufd: Add kAPI toward external drivers for physical devices
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/15] iommufd: File descriptor, context, kconfig and makefiles
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: selftests: Delete dead ucall code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v3 00/15] IOMMUFD Generic interface
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 00/10] Connect VFIO to IOMMUFD
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 5/7] KVM: SVM: adjust register allocation for __svm_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 0/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/7] KVM: VMX: remove regs argument of __vmx_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/7] KVM: SVM: move MSR_IA32_SPEC_CTRL save/restore to assembly
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 3/7] KVM: SVM: extract VMCB accessors to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 7/7] x86, KVM: remove unnecessary argument to x86_virt_spec_ctrl and callers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 2/7] KVM: VMX: more cleanups to __vmx_vcpu_run
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 4/7] KVM: SVM: replace argument of __svm_vcpu_run with vcpu_svm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/10] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 2/4] KVM: selftests: create -r argument to specify random seed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v1 3/7] vfio/ccw: move private initialization to callback
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/15] iommufd: Overview documentation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v1 3/7] vfio/ccw: move private initialization to callback
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 9/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 10/10] iommufd: Allow iommufd to supply /dev/vfio/vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 2/7] vfio/ccw: remove private->sch
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 04/10] vfio: Move storage of allow_unsafe_interrupts to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v1 1/7] vfio/ccw: create a parent struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/7] vfio/ccw: create a parent struct
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- KVM call for agenda for 2022-11-01
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/4] arm: pmu: Fixes for bare metal
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/4] arm: pmu: Fixes for bare metal
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH RESEND v4 16/23] KVM: x86: smm: add structs for KVM's smram layout
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: x86: Fix a stall when KVM_SET_MSRS is called on the pmu counters
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/4] arm: pmu: Fixes for bare metal
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] MAINTAINERS: new kvmarm mailing list
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 12/14] KVM: arm64: PMU: Allow ID_DFR0_EL1.PerfMon to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/14] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/14] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/14] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/14] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 08/14] KVM: arm64: PMU: Simplify setting a counter to a specific value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/14] KVM: arm64: PMU: Distinguish between 64bit counter and 64bit overflow
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/14] KVM: arm64: PMU: Only narrow counters that are not 64bit wide
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/14] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/14] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/14] KVM: arm64: PMU: Do not let AArch32 change the counters' top 32 bits
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/14] KVM: arm64: PMU: Add counter_index_to_*reg() helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/14] KVM: arm64: PMU: Narrow the overflow checking when required
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/14] arm64: Add ID_DFR0_EL1.PerfMon values for PMUv3p7 and IMP_DEF
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/14] KVM: arm64: PMU: Always advertise the CHAIN event
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/14] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND v4 23/23] KVM: x86: smm: preserve interrupt shadow in SMRAM
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: Redefine pKVM memory transitions in terms of source/target
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()
- From: Eiichi Tsukata <eiichi.tsukata@xxxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 06/25] KVM: arm64: Implement do_donate() helper for donating memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: Redefine pKVM memory transitions in terms of source/target
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v3 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 1/2] KVM: arm64: Clean out the odd handling of completer_addr
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 2/2] KVM: arm64: Redefine pKVM memory transitions in terms of source/target
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 0/2] KVM: arm64: pKVM memory transitions cleanup
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 06/25] KVM: arm64: Implement do_donate() helper for donating memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v6 19/21] x86/virt/tdx: Initialize all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 18/21] x86/virt/tdx: Configure global KeyID on all packages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: selftests: Copy KVM PFERR masks into selftests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: selftest: Add a test for KVM_CAP_EXIT_ON_EMULATION_FAILURE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 05/25] KVM: arm64: Unify identifiers used to distinguish host and hypervisor
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 04/25] KVM: arm64: Fix-up hyp stage-1 refcounts for all pages mapped at EL2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: selftests: Expect #PF(RSVD) when TDP is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 02/25] KVM: arm64: Allow attaching of non-coalescable pages to a hyp pool
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: VMX: Use tabs instead of spaces for indentation
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- [PATCH] KVM: VMX: Fix indentation coding style issue
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- [Bug 216349] Kernel panics in VMs running on an Intel N5105 on Proxmox
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2 5/8] KVM: x86/mmu: Use BIT{,_ULL}() for PFERR masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: selftests: Delete dead ucall code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/8] KVM: selftests: Explicitly require instructions bytes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/15] KVM: arm64: Parallel stage-2 fault handling
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: selftests: Rename emulator_error_test to smaller_maxphyaddr_emulation_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: vmx: Fix indentation coding style issue
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] kvm: vmenter: Use tabs instead of spaces for indentation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/svm/pmu: Add AMD PerfMonV2 support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/15] KVM: arm64: Use an opaque type for pteps
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v3 15/15] KVM: arm64: Handle stage-2 faults in parallel
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 14/15] KVM: arm64: Make table->block changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 13/15] KVM: arm64: Make leaf->leaf PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 12/15] KVM: arm64: Make block->table PTE changes parallel-aware
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 11/15] KVM: arm64: Split init and set for table PTE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 10/15] KVM: arm64: Atomically update stage 2 leaf attributes in parallel walks
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 07/15] KVM: arm64: Use an opaque type for pteps
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 05/15] KVM: arm64: Add a helper to tear down unlinked stage-2 subtrees
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 09/15] KVM: arm64: Free removed stage-2 tables in RCU callback
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 06/15] KVM: arm64: Tear down unlinked stage-2 subtree after break-before-make
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 08/15] KVM: arm64: Protect stage-2 traversal with RCU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 04/15] KVM: arm64: Don't pass kvm_pgtable through kvm_pgtable_walk_data
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 03/15] KVM: arm64: Pass mm_ops through the visitor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 02/15] KVM: arm64: Stash observed pte value in visitor context
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 01/15] KVM: arm64: Combine visitor arguments into a context structure
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 00/15] KVM: arm64: Parallel stage-2 fault handling
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: x86/pmu: Make part of the Intel v2 PMU MSRs handling x86 generic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: x86/pmu: Make part of the Intel v2 PMU MSRs handling x86 generic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 0/7] Introduce and test masked events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 7/7] selftests: kvm/x86: Test masked events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4.14 30/34] x86/bugs: Add Cannon lake to RETBleed affected CPU list
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 21/34] x86/speculation: Fix firmware entry SPEC_CTRL handling
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH v8 1/4] KVM: selftests: implement random number generator for guest code
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4.14 32/34] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH v8 4/4] KVM: selftests: randomize page access order
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4.14 22/34] x86/speculation: Fix SPEC_CTRL write on SMT state change
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 26/34] KVM: VMX: Fix IBRS handling after vmexit
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 17/34] entel_idle: Disable IBRS during long idle
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH v8 3/4] KVM: selftests: randomize which pages are written vs read
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v8 2/4] KVM: selftests: create -r argument to specify random seed
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4.14 33/34] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 34/34] x86/speculation: Add RSB VM Exit protections
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 29/34] x86/cpu/amd: Enumerate BTC_NO
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 28/34] x86/common: Stamp out the stepping madness
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH v8 0/4] KVM: selftests: randomize memory access of dirty_log_perf_test
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH 4.14 24/34] x86/speculation: Remove x86_spec_ctrl_mask
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 25/34] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 27/34] x86/speculation: Fill RSB on vmexit for IBRS
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 31/34] x86/speculation: Disable RRSBA behavior
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 23/34] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 18/34] x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 19/34] x86/speculation: Add LFENCE to RSB fill sequence
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 20/34] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 15/34] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 14/34] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 16/34] x86/bugs: Report Intel retbleed vulnerability
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 13/34] x86/bugs: Optimize SPEC_CTRL MSR writes
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 12/34] x86/entry: Add kernel IBRS implementation
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 11/34] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 10/34] x86/bugs: Add AMD retbleed= boot parameter
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 09/34] x86/bugs: Report AMD retbleed vulnerability
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 04/34] x86/devicetable: Move x86 specific macro out of generic code
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 07/34] x86/entry: Remove skip_r11rcx
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 08/34] x86/cpufeatures: Move RETPOLINE flags to word 11
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 01/34] Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 06/34] x86/cpu: Add a steppings field to struct x86_cpu_id
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 03/34] x86/cpufeature: Fix various quality problems in the <asm/cpu_device_hd.h> header
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 02/34] x86/cpufeature: Add facility to check for min microcode revisions
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 05/34] x86/cpu: Add consistent CPU match macros
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [PATCH 4.14 00/34] Retbleed & PBRSB Mitigations
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 1/7] vfio/ccw: create a parent struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH 2/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 1/2] KVM: Keep track of the number of memslots with dirty logging enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86/mmu: Do not recover NX Huge Pages when dirty logging is enabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v7 1/3] KVM: selftests: implement random number generation for guest code
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v7 3/3] KVM: selftests: randomize page access order
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 2/2] virt: sev: Allow for retrying SNP extended requests
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/10] KVM: x86: do not define KVM_REQ_SMI if SMM disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/10] KVM: x86: compile out vendor-specific code if SMM is disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/10] KVM: x86: move SMM entry to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/10] KVM: x86: remove SMRAM address space if SMM is not supported
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/10] KVM: x86: do not define SMM-related constants if SMM disabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/10] KVM: x86: start moving SMM-related functions to new files
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/10] KVM: zero output of KVM_GET_VCPU_EVENTS before filling in the struct
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/10] KVM: x86: move SMM exit to a new file
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 0/10] KVM: x86: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/10] KVM: allow compiling out SMM support
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/10] KVM: x86: do not go through ctxt->ops when emulating rsm
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RESEND v4 00/23] SMM emulation and interrupt shadow fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 06/16] KVM: Store immutable gfn_to_pfn_cache properties
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/16] KVM: x86: Remove unused argument in gpc_unmap_khva()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/16] KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_check()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/16] KVM: Skip unnecessary "unmap" if gpc is already valid during refresh
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/16] KVM: selftests: Mark "guest_saw_irq" as volatile in xen_shinfo_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/16] KVM: Drop KVM's API to allow temprorarily unmapping gfn=>pfn cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/16] KVM: Reject attempts to consume or refresh inactive gfn_to_pfn_cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/16] KVM: selftests: Add tests in xen_shinfo_test to detect lock races
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/16] KVM: x86: set gfn-to-pfn cache length consistently with VM word size
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/16] KVM: Store gfn_to_pfn_cache length at activation time
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/16] KVM: Initialize gfn_to_pfn_cache locks in dedicated helper
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/16] KVM: Use gfn_to_pfn_cache's immutable "kvm" in kvm_gpc_refresh()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/16] KVM: Do not partially reinitialize gfn=>pfn cache during activation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/16] KVM: Clean up hva_to_pfn_retry()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/16] KVM: Drop @gpa from exported gfn=>pfn cache check() and refresh() helpers
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/16] KVM: Shorten gfn_to_pfn_cache function names
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 12/21] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V2] virt: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V3 2/2] virt: sev: Allow for retrying SNP extended requests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V3 0/2] Fix security issue in SNP guest AES-GCM usage
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V3 1/2] virt: sev: Prevent IV reuse in SNP guest driver
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3 14/15] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 9/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 20/25] KVM: arm64: Return guest memory from EL2 via dedicated teardown memcache
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 18/21] x86/virt/tdx: Configure global KeyID on all packages
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 19/21] x86/virt/tdx: Initialize all TDMRs
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- RE: [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v1 00/18] KVM selftests code consolidation and cleanup
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 14/16] svm: rewerite vm entry macros
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- RE: [PATCH v6 5/5] KVM: selftests: Allowing running dirty_log_perf_test on specific CPUs
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3 9/15] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 03/16] KVM: x86: Always use non-compat vcpu_runstate_info size for gfn=>pfn cache
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 16/16] add IPI loss stress test
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH] KVM: vmx/nested: avoid blindly setting SECONDARY_EXEC_ENCLS_EXITING when sgx is enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 2/2] qtests/arm: add some mte tests
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/16] x86: add few helper functions for apic local timer
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/16] x86: make irq_enable avoid the interrupt shadow
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v10 7/9] s390x/cpu topology: add max_threads machine class attribute
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH] KVM: SVM: Name and check reserved fields with structs offset
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Do not return host topology information from KVM_GET_SUPPORTED_CPUID
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCHv5 8/8] KVM: SVM: Enable VNMI feature
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 6/8] KVM: nSVM: implement nested VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 7/8] KVM: nSVM: emulate VMEXIT_INVALID case for nested VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCHv5 5/8] KVM: SVM: Add VNMI support in inject_nmi
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 4/8] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 3/8] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 2/8] KVM: SVM: Add VNMI bit definition
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 1/8] x86/cpu: Add CPUID feature bit for VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv5 0/8] Virtual NMI feature
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- Re: [PATCH v6 3/8] KVM: Add support for using dirty ring in conjunction with bitmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v12 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v10 3/9] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v10 2/9] s390x/cpu topology: reporting the CPU topology to the guest
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v10 1/9] s390x/cpu topology: core_id sets s390x CPU topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH kernel v2 0/3] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH v6 01/21] x86/tdx: Use enum to define page level of TDX supported page sizes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 2/2] qtests/arm: add some mte tests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH kernel] x86/swiotlb/amd: Half the size if allocation failed
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 1/6] x86: KVM: Enable CMPccXADD CPUID and expose it to guest
- From: Jiaxi Chen <jiaxi.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 18/18] KVM: selftests/kvm_create_max_vcpus: check KVM_MAX_VCPUS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 12/18] KVM: selftests/rseq_test: name the migration thread and some cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 09/18] KVM: selftests/steal_time: vcpu related code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 05/18] KVM: selftests/hardware_disable_test: code consolidation and cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 03/18] KVM: selftests/kvm_util: helper functions for vcpus and threads
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 00/21] TDX host kernel support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v1 01/18] KVM: selftests/kvm_util: use array of pointers to maintain vcpus in kvm_vm
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 00/21] TDX host kernel support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 21/21] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v6 20/21] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]