Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 2/2] KVM: VMX: Execute IBPB on emulated VM-exit when guest has IBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 0/3] kvm/mm: Allow GUP to respond to non fatal signals
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v5 3/7] KVM: x86: Allow to use bitmap in ring-based dirty page tracking
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: "pawan.kumar.gupta@xxxxxxxxxxxxxxx" <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 4/4] KVM: selftests: Run dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC V3 PATCH 6/6] sefltests: kvm: x86: Add selftest for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC V3 PATCH 5/6] selftests: kvm: x86: Execute VMs with private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 7da9fed0474b4cd46055dd92d55c42faf32c19ac
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC V3 PATCH 3/6] selftests: kvm: ucall: Allow querying ucall pool gpa
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 3/4] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] Allow the group FD to remain open when unplugging a device
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 4/4] KVM: selftests: Run dirty_log_perf_test on specific CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCHv4 0/8] Virtual NMI feature
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 8/8] KVM: selftests: Add simple sev vm testing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 6/8] KVM: selftests: add library for creating/interacting with SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio: Add vfio_file_is_group()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [V4 3/8] KVM: selftests: add hooks for managing encrypted guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5.4 1/1] KVM: SEV: add cache flush to solve SEV cache incoherency issues
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [V4 1/8] KVM: selftests: move vm_phy_pages_alloc() earlier in file
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 4/8] KVM: selftests: handle encryption bits in page tables
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: HvExtCallQueryCapabilities and HvExtCallGetBootZeroedMemory implementation in KVM for Windows guest
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v4 4/4] KVM: selftests: Run dirty_log_perf_test on specific CPUs
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v4 3/4] KVM: selftests: Add atoi_paranoid() to catch errors missed by atoi()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v4 2/4] KVM: selftests: Put command line options in alphabetical order in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v4 1/4] KVM: selftests: Add missing break between 'e' and 'g' option in dirty_log_perf_test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v4 0/4] dirty_log_perf_test CPU pinning
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: Windows-11 22H2 upgrade problems
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v2 00/13] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Inject #GP, not #UD, if "generic" VMXON CR0/CR4 check fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] lib/vmalloc: Treat virt_to_pte_phys() as returning a physical address
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH 0/3] Allow the group FD to remain open when unplugging a device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 3/3] vfio: Make the group FD disassociate from the iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/3] vfio: Hold a reference to the iommu_group in kvm for SPAPR
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 1/3] vfio: Add vfio_file_is_group()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SVM: Replace kmap_atomic() with kmap_local_page()
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] lib/vmalloc: Treat virt_to_pte_phys() as returning a physical address
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] lib/vmalloc: Treat virt_to_pte_phys() as returning a physical address
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/2] s390x: Add exit time test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] lib/s390x: time: add wrapper for stckf
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/2] s390x: add exittime tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] arm/arm64: mmu cleanups and fixes
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 3/3] arm/arm64: mmu: Rename mmu_get_pte() -> follow_pte()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 2/3] arm/arm64: mmu: Teach virt_to_pte_phys() about block descriptors
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvm-unit-tests PATCH 1/3] lib/vmalloc: Treat virt_to_pte_phys() as returning a physical address
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/2] s390x: add migration TOD clock test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/2] lib/s390x: move TOD clock related functions to library
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: HvExtCallQueryCapabilities and HvExtCallGetBootZeroedMemory implementation in KVM for Windows guest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 67ae4f7434cee86ee318d46fb10b8a9840ad2e81
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH v2] vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2] vsock: replace virtio_vsock_pkt with sk_buff
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Windows-11 22H2 upgrade problems
- From: ToddAndMargo <ToddAndMargo@xxxxxxxx>
- Re: [PATCH v2] vsock: replace virtio_vsock_pkt with sk_buff
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v2] vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxx>
- [PATCH 08/12] KVM: selftests: Convert vmx_pmu_caps_test to use X86_PROPERTY_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/12] KVM: selftests: Refactor kvm_cpuid_has() to prep for X86_PROPERTY_* support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/12] KVM: selftests: Use X86_PROPERTY_MAX_KVM_LEAF in CPUID test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/12] KVM: selftest: Drop helpers for getting specific KVM supported CPUID entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/12] KVM: selftest: Add PMU feature framework, use in PMU event filter test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/12] KVM: selftests: Add kvm_cpu_*() support for X86_PROPERTY_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/12] KVM: selftests: Add dedicated helpers for getting x86 Family and Model
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/12] KVM: selftests: Convert AMX test to use X86_PROPRETY_XXX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/12] KVM: selftests: Add and use KVM helpers for x86 Family and Model
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/12] KVM: selftests: Add X86_PROPERTY_* framework to retrieve CPUID values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/12] KVM: selftests: Refactor X86_FEATURE_* framework to prep for X86_PROPERTY_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/12] KVM: selftests: Add X86_FEATURE_PAE and use it calc "fallback" MAXPHYADDR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/12] KVM: selftests: Add X86_PROPERTY_* magic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: selftests: Play nice with huge pages when getting PTEs/GPAs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] KVM: selftests: Use virt_get_pte() when getting PTE pointer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/7] KVM: selftests: Use vm_get_page_table_entry() in addr_arch_gva2gpa()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] KVM: selftests: Verify parent PTE is PRESENT when getting child PTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] KVM: selftests: Remove useless shifts when creating guest page tables
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: selftests: Drop helpers to read/write page table entries
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: selftests: Drop reserved bit checks from PTE accessor
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7]KVM: selftests: Clean up x86 page walker utilities
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 7/7] KVM: selftests: Add ucall pool based implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 6/7] KVM: selftest: Drop now-unnecessary ucall_uninit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 5/7] KVM: selftests: Make arm64's MMIO ucall multi-VM friendly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 4/7] tools: Add atomic_test_and_set_bit()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 3/7] KVM: selftests: Automatically do init_ucall() for non-barebones VMs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 2/7] KVM: selftests: Consolidate boilerplate code in get_ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 1/7] KVM: selftests: Consolidate common code for populating ucall struct
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v6 0/7] KVM: selftests: Implement ucall "pool" (for SEV)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Daniel Sneddon <daniel.sneddon@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Inject #GP, not #UD, if "generic" VMXON CR0/CR4 check fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: nVMX: Inject #GP, not #UD, if "generic" VMXON CR0/CR4 check fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SVM: Replace kmap_atomic() with kmap_local_page()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 7/8] KVM: x86: Handle PERF_CAPABILITIES in common x86's kvm_get_msr_feature()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 8/8] KVM: x86: Directly query supported PERF_CAPABILITIES for WRMSR checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 6/8] KVM: x86: Init vcpu->arch.perf_capabilities in common x86 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 5/8] KVM: x86: Track supported PERF_CAPABILITIES in kvm_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 4/8] KVM: VMX: Ignore guest CPUID for host userspace writes to DEBUGCTL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 3/8] KVM: VMX: Fold vmx_supported_debugctl() into vcpu_supported_debugctl()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 1/8] perf/x86/core: Zero @lbr instead of returning -1 in x86_perf_get_lbr() stub
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 2/8] KVM: VMX: Advertise PMU LBRs if and only if perf supports LBRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 0/8] KVM: x86: Intel LBR related perf cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] First batch of KVM changes for Linux 6.1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [kvm-unit-tests PATCH] nVMX: Expect #GP on VMXON with "generic" invalid CR0/CR4 bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 9/9] nVMX: Move #NM test to generic exception test framework
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 8/9] x86: nSVM: Move part of #NM test to exception test framework
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 7/9] x86: nSVM: Move #OF test to exception test framework
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 6/9] x86: nSVM: Move #BP test to exception test framework
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 5/9] x86: nSVM: Add an exception test framework and tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 4/9] nVMX: Drop one-off INT3=>#BP test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/9] nVMX: Move #OF test to generic exceptions test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/9] x86: Move helpers to generate misc exceptions to processor.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/9] nVMX: Add "nop" after setting EFLAGS.TF to guarantee single-step #DB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/9] x86: n{VMX,SVM} exception tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: fix some comment typos
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: remove obsolete kvm_mmu_gva_to_gpa_fetch()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: use helper macro SPTE_ENT_PER_PAGE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 13/13] x86/pmu: Update testcases to cover AMD PMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 12/13] x86/pmu: Add assignment framework for Intel-specific HW resources
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 10/13] x86/pmu: Update testcases to cover Intel Arch PMU Version 1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 09/13] x86/pmu: Report SKIP when testing Intel LBR on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 08/13] x86/pmu: Add PDCM check before accessing PERF_CAP register
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 07/13] x86/pmu: Pop up FW prefix to avoid out-of-context propagation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 05/13] x86: create pmu group for quick pmu-scope testing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 04/13] x86/pmu: Add tests for Intel Processor Event Based Sampling (PEBS)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 04/13] x86/pmu: Add tests for Intel Processor Event Based Sampling (PEBS)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 03/13] x86/pmu: Reset the expected count of the fixed counter 0 when i386
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/2] x86/pmu: Add AMD Guest PerfMonV2 testcases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] x86/speculation: Mitigate eIBRS PBRSB predictions with WRMSR
- From: Suraj Jitindar Singh <surajjs@xxxxxxxxxx>
- [RFC PATCH] KVM: optionally commit write on ioeventfd write
- From: Thanos Makatos <thanos.makatos@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/2] x86/pmu: Update rdpmc testcase to cover #GP and emulation path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 4/4] x86: nSVM: Move part of #NM test to exception test framework
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] x86: nSVM: Add an exception test framework and tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/4] x86: nSVM: Add testing for routing L2 exceptions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 67ae4f7434cee86ee318d46fb10b8a9840ad2e81
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: linux-next: Fixes tag needs some work in the vfio tree
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- High pings when using SR-IOV w\ macvtap & virtio
- From: kvmuser99 <kvmuser99@xxxxxxxxxxxxxx>
- Re: [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Add tests for Guest Processor Event Based Sampling (PEBS)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests RFC PATCH 5/5] x86/efi: Update README with standalone instructions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests RFC PATCH 3/5] x86/efi: Update unittests.cfg to build standalones
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests RFC PATCH 2/5] x86/efi: Fix efi runner scripts for standalone
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests RFC PATCH 1/5] efi: Compile standalone binaries for EFI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: s390: pv: don't allow userspace to set the clock under PV
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: s390: remove now unused function kvm_s390_set_tod_clock
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v3 1/2] KVM: s390: pv: don't allow userspace to set the clock under PV
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH v3 2/2] KVM: s390: remove now unused function kvm_s390_set_tod_clock
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH v3 0/2] KVM: s390: pv: fix clock comparator late after suspend/resume
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/1] KVM: s390: pv: don't allow userspace to set the clock under PV
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL 02/28] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/1] KVM: s390: pv: don't allow userspace to set the clock under PV
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL 02/28] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests GIT PULL 02/28] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 0/8] KVM: x86: gfn_to_pfn_cache cleanups and a fix
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 1/8] KVM: x86: Add initializer for gfn_to_pfn_cache
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 4/8] KVM: x86: Store immutable gfn_to_pfn_cache properties
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 3/8] KVM: x86: Remove unused argument in gpc_unmap_khva()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 2/8] KVM: x86: Shorten gfn_to_pfn_cache function names
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 8/8] KVM: x86: Fix NULL pointer dereference in kvm_xen_set_evtchn_fast()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 5/8] KVM: x86: Clean up kvm_gpc_check()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 7/8] KVM: x86: Clean up kvm_gpc_refresh(), kvm_gpc_unmap()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 6/8] KVM: x86: Clean up hva_to_pfn_retry()
- From: Michal Luczaj <mhal@xxxxxxx>
- [v2] KVM: s390: pv: fix external interruption loop not always detected
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: Finish removing MPX from arch/x86?
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] Add TCG & KVM support for MSR_CORE_THREAD_COUNT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5.4 00/37] IBRS support // Retbleed mitigations
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC v2 13/15] vfio/iommufd: Implement the iommufd backend
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: selftests: Use TAP interface in the kvm_binary_stats_test
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v1 3/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v5 7/7] KVM: selftests: Automate choosing dirty ring size in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v5 6/7] KVM: selftests: Clear dirty ring states between two modes in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v5 5/7] KVM: selftests: Use host page size to map ring buffer in dirty_log_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v5 4/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v5 3/7] KVM: x86: Allow to use bitmap in ring-based dirty page tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v5 1/7] KVM: x86: Introduce KVM_REQ_RING_SOFT_FULL
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v5 2/7] KVM: x86: Move declaration of kvm_cpu_dirty_log_size() to kvm_dirty_ring.h
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v5 0/7] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- RE: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- [PATCH 2/3] i386: kvm: Add support for MSR filtering
- From: Alexander Graf <agraf@xxxxxxxxx>
- [PATCH 0/3] Add TCG & KVM support for MSR_CORE_THREAD_COUNT
- From: Alexander Graf <agraf@xxxxxxxxx>
- [PATCH 1/3] x86: Implement MSR_CORE_THREAD_COUNT MSR
- From: Alexander Graf <agraf@xxxxxxxxx>
- [PATCH 3/3] KVM: x86: Implement MSR_CORE_THREAD_COUNT MSR
- From: Alexander Graf <agraf@xxxxxxxxx>
- Re: arm64 build failure on kvm/next
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- HvExtCallQueryCapabilities and HvExtCallGetBootZeroedMemory implementation in KVM for Windows guest
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: Finish removing MPX from arch/x86?
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: Finish removing MPX from arch/x86?
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- arm64 build failure on kvm/next
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 0/4] KVM: selftests: Fix and clean up emulator_error_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [V2 PATCH 3/8] KVM: selftests: Add arch specific post vm load setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: The root cause of failure of access_tracking_perf_test in a nested guest
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 3/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: Finish removing MPX from arch/x86?
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Finish removing MPX from arch/x86?
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v14 1/6] KVM: s390: pv: asynchronous destroy for reboot
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: selftests: Fix and clean up emulator_error_test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Follow a strict lifetime for struct iommu_group
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v8 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- [PATCH] KVM: SVM: Fix reserved fields of struct sev_es_save_area
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [PATCH v14 6/6] KVM: s390: pv: module parameter to fence asynchronous destroy
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v14 5/6] KVM: s390: pv: support for Destroy fast UVC
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v14 4/6] KVM: s390: pv: avoid export before import if possible
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v14 3/6] KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v14 2/6] KVM: s390: pv: api documentation for asynchronous destroy
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v14 1/6] KVM: s390: pv: asynchronous destroy for reboot
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PULL 43/54] gdbstub: move sstep flags probing into AccelClass
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PULL 46/54] accel/kvm: move kvm_update_guest_debug to inline stub
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PULL 44/54] gdbstub: move breakpoint logic to accel ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PULL 45/54] gdbstub: move guest debug support check to ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v11 32/46] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 41/46] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 42/46] KVM: selftests: Create a vendor independent helper to allocate Hyper-V specific test pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 46/46] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 31/46] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 28/46] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 17/46] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 20/46] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 40/46] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 45/46] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 37/46] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 44/46] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 35/46] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 43/46] KVM: selftests: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 30/46] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 33/46] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 36/46] KVM: selftests: Drop helpers to read/write page table entries
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 38/46] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 39/46] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 34/46] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 24/46] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 23/46] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 22/46] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 11/46] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 16/46] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 19/46] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 26/46] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 18/46] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 27/46] KVM: x86: Make kvm_hv_get_assist_page() return 0/-errno
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 21/46] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 25/46] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 29/46] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 14/46] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 15/46] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 07/46] KVM: x86: Move clearing of TLB_FLUSH_CURRENT to kvm_vcpu_flush_tlb_all()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 09/46] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 12/46] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 13/46] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 06/46] KVM: VMX: Rename "vmx/evmcs.{ch}" to "vmx/hyperv.{ch}"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 10/46] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 08/46] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 05/46] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 04/46] x86/hyperv: KVM: Rename "hv_enlightenments" to "hv_vmcb_enlightenments"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 03/46] KVM: SVM: Add a proper field for Hyper-V VMCB enlightenments
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 02/46] KVM: selftests: Move "struct hv_enlightenments" to x86_64/svm.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 01/46] x86/hyperv: Move VMCB enlightenment definitions to hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v11 00/46] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH kvmtool v2] virtio-net: Fix vq->use_event_idx flag check
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: BALATON Zoltan <balaton@xxxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 13/15] gdbstub: move breakpoint logic to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [PATCH v3 14/15] gdbstub: move guest debug support check to ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [PATCH v3 12/15] gdbstub: move sstep flags probing into AccelClass
- From: Mads Ynddal <mads@xxxxxxxxx>
- [RFC PATCH 0/3] Use TAP in some more KVM selftests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: x86: Use TAP interface in the tsc_msrs_test
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: x86: Use TAP interface in the sync_regs test
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [PATCH 1/3] KVM: selftests: Use TAP interface in the kvm_binary_stats_test
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v1 8/9] KVM: s390: selftest: memop: Fix typo
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v1 4/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v1 3/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [RFC v2 13/15] vfio/iommufd: Implement the iommufd backend
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v5 10/30] KVM: Add arch hooks when VM is added/deleted
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [V2 PATCH 3/8] KVM: selftests: Add arch specific post vm load setup
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 0/4] KVM: selftests: Fix and clean up emulator_error_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] mips/malta: pass RNG seed to to kernel via env var
- From: Philippe Mathieu-Daudé <f4bug@xxxxxxxxx>
- Re: [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v9 000/105] KVM TDX basic feature support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH RFC 1/3] KVM + perf: Rename *_intel_pt_intr() for generic usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 10/10] KVM: x86/mmu: Rename __direct_map() to direct_map()
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 09/10] KVM: x86/mmu: Stop needlessly making MMU pages available for TDP MMU faults
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 08/10] KVM: x86/mmu: Split out TDP MMU page fault handling
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 07/10] KVM: x86/mmu: Initialize fault.{gfn,slot} earlier for direct MMUs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 05/10] KVM: x86/mmu: Avoid memslot lookup during KVM_PFN_ERR_HWPOISON handling
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: Guest IA32_SPEC_CTRL on AMD hosts without X86_FEATURE_V_SPEC_CTRL
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 03/10] KVM: x86/mmu: Grab mmu_invalidate_seq in kvm_faultin_pfn()
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 02/10] KVM: x86/mmu: Move TDP MMU VM init/uninit behind tdp_mmu_enabled
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3 01/10] KVM: x86/mmu: Change tdp_mmu to a read-only parameter
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: Guest IA32_SPEC_CTRL on AMD hosts without X86_FEATURE_V_SPEC_CTRL
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v9 000/105] KVM TDX basic feature support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v4 0/5] KVM: x86: Intel LBR related perf cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 30/39] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 30/39] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V2 PATCH 3/8] KVM: selftests: Add arch specific post vm load setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 2/4] vfio: Move vfio_spapr_iommu_eeh_ioctl into vfio_iommu_spapr_tce.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 0/4] Simplify the module and kconfig structure in vfio
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 1/4] vfio/pci: Move all the SPAPR PCI specific logic to vfio_pci_core.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v2 3/4] vfio: Remove CONFIG_VFIO_SPAPR_EEH
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- [PATCH 5.4 33/37] x86/bugs: Add Cannon lake to RETBleed affected CPU list
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 29/37] KVM: VMX: Fix IBRS handling after vmexit
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 37/37] x86/speculation: Add RSB VM Exit protections
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 32/37] x86/cpu/amd: Enumerate BTC_NO
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 28/37] KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 36/37] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 34/37] x86/speculation: Disable RRSBA behavior
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 35/37] x86/speculation: Use DECLARE_PER_CPU for x86_spec_ctrl_current
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 31/37] x86/common: Stamp out the stepping madness
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 30/37] x86/speculation: Fill RSB on vmexit for IBRS
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 26/37] KVM: VMX: Flatten __vmx_vcpu_run()
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 27/37] KVM: VMX: Convert launched argument to flags
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 20/37] x86/speculation: Fix firmware entry SPEC_CTRL handling
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 24/37] KVM/VMX: Use TEST %REG,%REG instead of CMP $0,%REG in vmenter.S
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 23/37] x86/speculation: Remove x86_spec_ctrl_mask
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 21/37] x86/speculation: Fix SPEC_CTRL write on SMT state change
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 22/37] x86/speculation: Use cached host SPEC_CTRL value for guest entry/exit
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 19/37] x86/speculation: Fix RSB filling with CONFIG_RETPOLINE=n
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 25/37] KVM/nVMX: Use __vmx_vcpu_run in nested_vmx_check_vmentry_hw
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 18/37] x86/speculation: Change FILL_RETURN_BUFFER to work with objtool
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 17/37] intel_idle: Disable IBRS during long idle
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 16/37] x86/bugs: Report Intel retbleed vulnerability
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 15/37] x86/bugs: Split spectre_v2_select_mitigation() and spectre_v2_user_select_mitigation()
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 14/37] x86/speculation: Add spectre_v2=ibrs option to support Kernel IBRS
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 13/37] x86/bugs: Optimize SPEC_CTRL MSR writes
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 12/37] x86/entry: Add kernel IBRS implementation
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 11/37] x86/entry: Remove skip_r11rcx
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 10/37] x86/bugs: Keep a per-CPU IA32_SPEC_CTRL value
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 09/37] x86/bugs: Add AMD retbleed= boot parameter
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 08/37] x86/bugs: Report AMD retbleed vulnerability
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 07/37] x86/cpufeatures: Move RETPOLINE flags to word 11
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 06/37] x86/kvm/vmx: Make noinstr clean
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 05/37] x86/cpu: Add a steppings field to struct x86_cpu_id
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 04/37] x86/cpu: Add consistent CPU match macros
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 03/37] x86/devicetable: Move x86 specific macro out of generic code
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 02/37] Revert "x86/cpu: Add a steppings field to struct x86_cpu_id"
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 01/37] Revert "x86/speculation: Add RSB VM Exit protections"
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- [PATCH 5.4 00/37] IBRS support // Retbleed mitigations
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- Re: [PATCH v10 30/39] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC v3 6/7] virtio: in order support for virtio_ring
- From: Guo Zhi <qtxuning1999@xxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: Nested AVIC design (was:Re: [RFC PATCH v3 04/19] KVM: x86: mmu: allow to enable write tracking externally)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/4] x86: nSVM: Add testing for routing L2 exceptions
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/4] x86: nSVM: Add testing for routing L2 exceptions
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH] KVM: VMX: Resume guest immediately when injecting #GP on ECREATE
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH AUTOSEL 5.19 22/29] KVM: s390: Pass initialized arg even if unused
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Keith Busch <kbusch@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 updates for 6.1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [GIT PULL] KVM/riscv changes for 6.1
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/3] riscv: kvm: use generic entry for TIF_NOTIFY_RESUME and misc
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH] selftests/kvm: Avoid for loop initialization using vcpu->id in xapic_state_test
- From: Gautam Menghani <gautammenghani201@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Advertise new kvmarm mailing list
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: arm64: Advertise new kvmarm mailing list
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v9 000/105] KVM TDX basic feature support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 8/9] KVM: s390: selftest: memop: Fix typo
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [kvm-unit-tests PATCH 9/9] x86/apic: Add test to verify aliased xAPIC IDs both receive IPI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 8/9] x86/apic: Add test for logical mode IPI delivery (cluster and flat)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 5/9] x86/apic: Restore APIC to original state after every sub-test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 6/9] x86/apic: Enable IRQs on vCPU0 for all tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 7/9] x86/apic: Run tests that modify APIC ID and/or APIC_BASE after other tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/9] x86/apic: Replaces spaces with tabs to fix indentation in apic.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/9] x86/apic: Add test config to allow running apic tests against SVM's AVIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 4/9] x86/apic: Assert that vCPU0's APIC is enabled at the start of the test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/9] x86/apic: Add helpers to query current APIC state, e.g. xAPIC vs. x2APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/9] x86/apic: Cleanups and new tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 32/32] KVM: x86: Track required APICv inhibits with variable, not callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 22/32] KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 26/32] KVM: SVM: Always update local APIC on writes to logical dest register
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 25/32] KVM: SVM: Inhibit AVIC if vCPUs are aliased in logical mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 30/32] KVM: SVM: Ignore writes to Remote Read Data on AVIC write traps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 29/32] KVM: SVM: Handle multiple logical targets in AVIC kick fastpath
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 18/32] KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 16/32] KVM: SVM: Document that vCPU ID == APIC ID in AVIC kick fastpatch
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 20/32] KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 23/32] KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 21/32] KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 28/32] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 17/32] KVM: SVM: Add helper to perform final AVIC "kick" of single vCPU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 15/32] Revert "KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 09/32] KVM: x86: Handle APICv updates for APIC "mode" changes via request
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 05/32] KVM: x86: Don't inhibit APICv/AVIC on xAPIC ID "change" if APIC is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 07/32] KVM: x86: Don't inhibit APICv/AVIC if xAPIC ID mismatch is due to 32-bit ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 02/32] KVM: x86: Purge "highest ISR" cache when updating APICv state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 12/32] KVM: SVM: Replace "avic_mode" enum with "x2avic_enabled" boolean
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 08/32] KVM: SVM: Don't put/load AVIC when setting virtual APIC mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 04/32] KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 10/32] KVM: x86: Move APIC access page helper to common x86 code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 13/32] KVM: SVM: Compute dest based on sender's x2APIC status for AVIC kick
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 06/32] KVM: x86: Track xAPIC ID only on userspace SET, _after_ vAPIC is updated
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 14/32] KVM: SVM: Fix x2APIC Logical ID calculation for avic_kick_target_vcpus_fast
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 01/32] KVM: x86: Blindly get current x2APIC reg value on "nodecode write" traps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 00/32] KVM: x86: AVIC and local APIC fixes+cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- [PATCH v5 7/7] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 0/7] KVM: x86: Apply NX mitigation more precisely
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 2/7] KVM: x86/mmu: Rename NX huge pages fields/functions for consistency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 5/7] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 4/7] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 3/7] KVM: x86/mmu: Properly account NX huge page workaround for nonpaging MMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 1/7] KVM: x86/mmu: Tag disallowed NX huge pages even if they're not tracked
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 6/7] KVM: x86/mmu: Add helper to convert SPTE value to its shadow page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: VMX: Resume guest immediately when injecting #GP on ECREATE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86: Handle all known exceptions with ASM_TRY()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] nVMX: Use ASM_TRY() for VMREAD and VMWRITE page fault tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] nVMX: Fix VMREAD/VMWRITE #PF tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] nVMX: Dedup the bulk of the VMREAD/VMWRITE #PF tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: x86: Exempt pending triple fault from event injection sanity check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] Simplify some of the locking in vfio_group
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: simplify the mdev interface v8
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH 2/6] KVM: x86: Mask off reserved bits in CPUID.80000006H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- [PATCH v1 6/9] KVM: s390: selftest: memop: Add bad address test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 5/9] KVM: s390: selftest: memop: Replace macros by functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 9/9] KVM: s390: selftest: memop: Fix wrong address being used in test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 7/9] KVM: s390: selftest: memop: Add cmpxchg tests
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 8/9] KVM: s390: selftest: memop: Fix typo
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 3/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 4/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 1/9] s390/uaccess: Add storage key checked cmpxchg access to user space
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 2/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v1 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] KVM: x86: Mask off reserved bits in CPUID.80000001H
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- Re: [PATCH 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/4] vfio: Fold vfio_virqfd.ko into vfio.ko
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: Guest IA32_SPEC_CTRL on AMD hosts without X86_FEATURE_V_SPEC_CTRL
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] First batch of KVM changes for Linux 6.1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] Final set of (mostly selftests) KVM patches for Linux 6.0
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] virtio: fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [GIT PULL] virtio: fixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v3] hyperv: fix SynIC SINT assertion failure on guest reset
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH 3/4] i386/sev: Update checks and information related to reduced-phys-bits
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 4/4] i386/cpu: Update how the EBX register of CPUID 0x8000001F is set
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 2/4] qemu-options.hx: Update the reduced-phys-bits documentation
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 0/4] Qemu SEV reduced-phys-bits fixes
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 1/4] qapi, i386/sev: Change the reduced-phys-bits value from 5 to 1
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v14 5/6] KVM: s390: pv: support for Destroy fast UVC
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 3/6] KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 4/6] KVM: s390: pv: avoid export before import if possible
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 6/6] KVM: s390: pv: module parameter to fence asynchronous destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 1/6] KVM: s390: pv: asynchronous destroy for reboot
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 2/6] KVM: s390: pv: api documentation for asynchronous destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v14 0/6] KVM: s390: pv: implement lazy destroy for reboot
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [KVM] 7055fb1131: WARNING:at_arch/x86/kvm/x86.c:#inject_pending_event[kvm]
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Commit 'iomap: add support for dma aligned direct-io' causes qemu/KVM boot failures
- From: Thorsten Leemhuis <regressions@xxxxxxxxxxxxx>
- [PATCH v9 104/105] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 103/105] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 105/105] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 101/105] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 100/105] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 102/105] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 098/105] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 099/105] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 097/105] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 094/105] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 093/105] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 095/105] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 096/105] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 092/105] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 091/105] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 060/105] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 062/105] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 090/105] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 058/105] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 089/105] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 061/105] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 087/105] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 086/105] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 059/105] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 057/105] KVM: Add functions to set GFN to private or shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 070/105] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 088/105] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 056/105] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 053/105] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 055/105] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 054/105] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 080/105] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 051/105] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 050/105] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 085/105] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 046/105] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 073/105] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 074/105] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 067/105] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 079/105] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 077/105] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 082/105] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 068/105] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 049/105] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 081/105] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 047/105] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 072/105] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 084/105] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 083/105] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 078/105] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 048/105] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 052/105] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 069/105] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 066/105] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 044/105] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 076/105] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 043/105] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 045/105] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 042/105] KVM: x86/mmu: Require TDP MMU for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 038/105] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 024/105] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 040/105] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 025/105] KVM: TDX: Use private memory for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 029/105] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 030/105] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 037/105] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 033/105] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_{value, mask}
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 026/105] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 034/105] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 065/105] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 039/105] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 075/105] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 027/105] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 064/105] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 035/105] KVM: TDX: Enable mmio spte caching always for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 028/105] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 023/105] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 063/105] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 031/105] KVM: x86/mmu: Make sync_page not use hard-coded 0 as the initial SPTE value
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 032/105] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 041/105] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 036/105] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 071/105] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 011/105] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 022/105] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 018/105] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 006/105] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 008/105] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 020/105] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 007/105] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 019/105] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 021/105] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 012/105] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 004/105] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 005/105] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 010/105] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 016/105] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 001/105] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 002/105] KVM: x86: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 003/105] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 009/105] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 014/105] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 015/105] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCHv3 0/2] qemu direct io alignment fix
- From: Kevin Wolf <kwolf@xxxxxxxxxx>
- [PATCH v9 017/105] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 000/105] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v9 013/105] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v4 3/6] KVM: arm64: Enable ring-based dirty memory tracking
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH 2/2] vfio: Change vfio_group->group_rwsem to a mutex
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v8 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH 1/2] vfio: Remove the vfio_group->users and users_comp
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: x86/mmu: Bug the VM if KVM attempts to double count an NX huge page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v4 15/15] vfio: Add struct device to vfio_device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH] vhost/vsock: Use kvmalloc/kvfree for larger packets.
- From: Junichi Uekawa (上川純一) <uekawa@xxxxxxxxxxxx>
- Re: [PATCH v8 0/4] Enable notify VM exit
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]