Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [RFC PATCH v3 4/9] vmci/vsock: use 'target' in notify_poll_in callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 3/9] virtio/vsock: use 'target' in notify_poll_in callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 2/9] hv_sock: disable SO_RCVLOWAT support
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v8 033/103] KVM: x86/mmu: Track shadow MMIO value/mask on a per-VM basis
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] vfio/fsl-mc: Fix a typo in a comment
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v2 8/8] target/i386/intel-pt: Access MSR_IA32_RTIT_ADDRn based on guest CPUID configuration
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 7/8] target/i386/intel-pt: Define specific PT feature set for IceLake-server and Snowridge
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 5/8] target/i386/intel-pt: Rework/rename the default INTEL-PT feature set
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 2/8] target/i386/intel-pt: Fix INTEL_PT_ADDR_RANGES_NUM_MASK
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 3/8] target/i386/intel-pt: Introduce FeatureWordInfo for Intel PT CPUID leaf 0xD
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 1/8] target/i386: Print CPUID subleaf info for unsupported feature
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 0/8] Make Intel PT configurable
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 3/4] RISC-V: Prefer sstc extension if available
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 13/13] KVM: x86: remove struct kvm_arch.tdp_max_page_level
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v8 000/103] KVM TDX basic feature support
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH v3 3/3] KVM: x86: Print guest pgd in kvm_nested_vmenter()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 1/3] KVM: x86: Update trace function for nested VM entry to support VMX
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 0/3] Extend KVM trace_kvm_nested_vmrun() to support VMX
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 2/3] KVM: nVMX: Add tracepoint for nested vmenter
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [RFC PATCH 10/13] KVM: MMU: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 09/13] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 13/13] KVM: x86: remove struct kvm_arch.tdp_max_page_level
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 08/13] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 11/13] KVM: TDP_MMU: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 07/13] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 12/13] KVM: TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 06/13] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 05/13] KVM: TDX: Pass size to tdx_measure_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 00/13] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 02/13] KVM: TDP_MMU: Go to next level if smaller private mapping exists
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 04/13] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 03/13] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 01/13] KVM: Update lpage info when private/shared memory are mixed
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 103/103] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 102/103] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 101/103] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 097/103] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 099/103] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 100/103] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 098/103] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 096/103] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 094/103] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 095/103] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 093/103] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 070/103] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 092/103] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 049/103] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 069/103] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 091/103] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 089/103] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 047/103] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 090/103] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 088/103] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 048/103] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 087/103] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 046/103] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 045/103] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 068/103] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 044/103] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 066/103] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 065/103] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 086/103] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 042/103] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 043/103] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 084/103] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 083/103] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 082/103] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 067/103] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 040/103] KVM: x86/mmu: Require TDP MMU for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 064/103] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 041/103] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 085/103] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 039/103] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 081/103] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 038/103] KVM: x86/tdp_mmu: refactor kvm_tdp_mmu_map()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 037/103] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 060/103] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 080/103] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 079/103] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 078/103] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 036/103] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 058/103] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 062/103] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 077/103] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 063/103] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 035/103] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 034/103] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 076/103] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 032/103] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 033/103] KVM: x86/mmu: Track shadow MMIO value/mask on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 075/103] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 074/103] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 031/103] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 061/103] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 053/103] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 057/103] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 030/103] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 054/103] [MARKER] The start of TDX KVM patch series: KVM TDP MMU MapGPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 073/103] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 059/103] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 055/103] KVM: Add functions to track whether GFN is private or shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 072/103] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 029/103] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 027/103] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 071/103] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 028/103] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 052/103] KVM: x86/VMX: introduce vmx tlb_remote_flush and tlb_remote_flush_with_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 026/103] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 020/103] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 056/103] KVM: x86/mmu: Let vcpu re-try when faulting page type conflict
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 024/103] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 025/103] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 051/103] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 050/103] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 023/103] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 015/103] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 022/103] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 021/103] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 018/103] KVM: TDX: Stub in tdx.h with structs, accessors, and VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 019/103] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 013/103] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 017/103] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 014/103] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 016/103] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 012/103] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 011/103] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 010/103] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 004/103] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 009/103] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 007/103] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 002/103] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 008/103] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 006/103] KVM: Enable hardware before doing arch VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 000/103] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 005/103] KVM: x86: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 003/103] KVM: Refactor CPU compatibility check on module initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 001/103] KVM: x86: Move check_processor_compatibility from init ops to runtime ops
- From: isaku.yamahata@xxxxxxxxx
- [kvm-unit-tests PATCH v2 0/5] Test for illegal LEA & related fixes
- From: Michal Luczaj <mhal@xxxxxxx>
- [kvm-unit-tests PATCH v2 1/5] x86: emulator.c cleanup: Save and restore exception handlers
- From: Michal Luczaj <mhal@xxxxxxx>
- [kvm-unit-tests PATCH v2 5/5] x86: Test emulator's handling of LEA with /reg
- From: Michal Luczaj <mhal@xxxxxxx>
- [kvm-unit-tests PATCH v2 2/5] x86: emulator.c cleanup: Use ASM_TRY() for the UD_VECTOR cases
- From: Michal Luczaj <mhal@xxxxxxx>
- [kvm-unit-tests PATCH v2 3/5] x86: Introduce ASM_TRY_FEP() to handle exceptions thrown by FEP-triggered emulator
- From: Michal Luczaj <mhal@xxxxxxx>
- [kvm-unit-tests PATCH v2 4/5] x86: Dedup 32-bit vs. 64-bit ASM_TRY() by stealing kernel's __ASM_SEL()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] tools/perf: Fix typo in comments
- From: shaomin Deng <dengshaomin@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH] KVM: x86/mmu: rename trace function name for asynchronous page fault
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Stefan Hajnoczi <shajnocz@xxxxxxxxxx>
- [PATCH] vfio/fsl-mc: Fix a typo in a comment
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.0-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.18 1/6] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/4] x86: emulator.c cleanup: Use ASM_TRY for the UD_VECTOR cases
- From: "Michal Luczaj" <mhal@xxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Stefan Hajnoczi <shajnocz@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Stefan Hajnoczi <shajnocz@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Will Deacon <will@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Will Deacon <will@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/4] x86: emulator.c cleanup: Use ASM_TRY for the UD_VECTOR cases
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Add sanity check that MMIO SPTE mask doesn't overlap gen
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Make page tables for eager page splitting NUMA aware
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v3 3/8] KVM: x86/mmu: Rename NX huge pages fields/functions for consistency
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 4/8] KVM: x86/mmu: Properly account NX huge page workaround for nonpaging MMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 5/8] KVM: x86/mmu: Set disallowed_nx_huge_page in TDP MMU before setting SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 2/8] KVM: x86/mmu: Tag disallowed NX huge pages even if they're not tracked
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 7/8] KVM: x86/mmu: Add helper to convert SPTE value to its shadow page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 8/8] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 6/8] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 1/8] KVM: x86/mmu: Bug the VM if KVM attempts to double count an NX huge page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 0/8] KVM: x86: Apply NX mitigation more precisely
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 1/2] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: IOTLB support for vhost/vsock breaks crosvm on Android
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/4] x86: emulator.c cleanup: Use ASM_TRY for the UD_VECTOR cases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2] KVM: x86/mmu: Add sanity check that MMIO SPTE mask doesn't overlap gen
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/5] KVM: Rename kvm_irq_has_notifier()
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- [PATCH v2 4/5] KVM: irqfd: Rename resampler->notifier
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- [PATCH v2 3/5] KVM: irqfd: Postpone resamplefd notify for oneshot interrupts
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- [PATCH v2 2/5] KVM: x86: Add kvm_register_and_fire_irq_mask_notifier()
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- [PATCH v2 1/5] KVM: x86: Move irq mask notifiers from x86 to generic KVM
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- [PATCH v2 0/5] KVM: Fix oneshot interrupts forwarding
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [PATCH v3 4/6] KVM: Pass the name of the VM fd to kvm_create_vm_debugfs()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 5/6] KVM: Actually create debugfs in kvm_create_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/6] KVM: Shove vm stats_id init into kvm_create_vm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: Shove vcpu stats_id init into kvm_vcpu_init()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/6] KVM: Get an fd before creating the VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: Hoist debugfs_dentry init to kvm_create_vm_debugfs() (again)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 vfio 04/11] vfio: Move vfio.c to vfio_main.c
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/4] x86: emulator.c cleanup: Use ASM_TRY for the UD_VECTOR cases
- From: "Michal Luczaj" <mhal@xxxxxxx>
- Re: [PATCH v2 2/2] KVM: x86/xen: Stop Xen timer before changing the IRQ vector
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: x86/xen: Initialize Xen timer only once
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] kvm: x86: mmu: Always flush TLBs when enabling dirty logging
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- IOTLB support for vhost/vsock breaks crosvm on Android
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 01/14] mm: Add F_SEAL_AUTO_ALLOCATE seal to memfd
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 01/14] mm: Add F_SEAL_AUTO_ALLOCATE seal to memfd
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 1/3] KVM: x86: Add macros to track first...last VMX feature MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 2/3] KVM: x86: Generate set of VMX feature MSRs using first/last definitions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 3/3] KVM: x86: Disallow writes to immutable feature MSRs after KVM_RUN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 0/3] KVM: x86: Disallow writes to feature MSRs post-KVM_RUN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: vfio/pci - uAPI for WC
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v4 6/6] vdpa: Always start CVQ in SVQ mode
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v4 5/6] vdpa: Store x-svq parameter in VhostVDPAState
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v4 3/6] vdpa: Allocate SVQ unconditionally
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v4 4/6] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v4 2/6] vdpa: Use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v4 1/6] linux-headers: Update kernel headers
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v4 0/6] ASID support in vhost-vdpa net
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Test writing PERF_CAPABILITIES after KVM_RUN is rejected
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Reject writes to PERF_CAPABILITIES feature MSR after KVM_RUN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/4] RISC-V: Prefer sstc extension if available
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: vfio/pci - uAPI for WC
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH V3 vfio 04/11] vfio: Move vfio.c to vfio_main.c
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 8/9] KVM: arm64: PMU: Implement PMUv3p5 long counter support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/9] KVM: arm64: PMU: Align chained counter implementation with architecture pseudocode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 6/9] KVM: arm64: PMU: Move the ID_AA64DFR0_EL1.PMUver limit to VM creation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 4/9] KVM: arm64: PMU: Add counter_index_to_*reg() helpers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 5/9] KVM: arm64: PMU: Simplify setting a counter to a specific value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 7/9] KVM: arm64: PMU: Allow ID_AA64DFR0_EL1.PMUver to be set from userspace
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 9/9] KVM: arm64: PMU: Allow PMUv3p5 to be exposed to the guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/9] KVM: arm64: PMU: Fixing chained events, and PMUv3p5 support
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/9] KVM: arm64: PMU: Only narrow counters that are not 64bit wide
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/9] KVM: arm64: PMU: Distinguish between 64bit counter and 64bit overflow
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 05/14] mm/memfd: Introduce MFD_INACCESSIBLE flag
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix compile after merge
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] arm:Add PSCI_CPU_OFF testscase to arm/psci testsuite.
- From: Nikita Venkatesh <Nikita.Venkatesh@xxxxxxx>
- Re: [PATCH v7 04/14] mm/shmem: Support memfile_notifier
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v7 03/14] mm: Introduce memfile_notifier
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v7 02/14] selftests/memfd: Add tests for F_SEAL_AUTO_ALLOCATE
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] RISC-V: KVM: Fix compile after merge
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/4] x86: Extend ASM_TRY to handle #UD thrown by FEP-triggered emulator
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/4] x86: emulator.c cleanup: Use ASM_TRY for the UD_VECTOR cases
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: x86/mmu: MMIO caching bug fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: X86: Explicitly set the 'fault.async_page_fault' value in kvm_fixup_and_inject_pf_error().
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Bug the VM if an accelerated x2APIC trap occurs on a "bad" reg
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] arm: psci: Add psci-off functionality
- From: Nikita Venkatesh <Nikita.Venkatesh@xxxxxxx>
- Re: [RFC PATCH 1/1] kvm: Use a new spinlock to avoid atomic operations in kvm_get_dirty_log_protect
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] vhost-vdpa: Call ida_simple_remove() when failed
- From: Bo Liu <liubo03@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Reject writes to PERF_CAPABILITIES feature MSR after KVM_RUN
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Test writing PERF_CAPABILITIES after KVM_RUN is rejected
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 1/3] KVM: selftests: Test all possible "invalid" PERF_CAPABILITIES.LBR_FMT vals
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [RFC PATCH 1/1] kvm: Use a new spinlock to avoid atomic operations in kvm_get_dirty_log_protect
- From: Leonardo Bras <leobras@xxxxxxxxxx>
- Re: [PATCH] selftests: kvm/x86: test if it checks all the bits in the LBR_FMT bit-field
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v3] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: Re: PING: [PATCH] KVM: HWPoison: Fix memory address&size during remap
- From: zhenwei pi <pizhenwei@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] arm: pmu: Check for overflow in the low counter in chained counters tests
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/3] arm: pmu: Add missing isb()'s after sys register writing
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] arm: pmu: Fixes for bare metal
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] arm: pmu: Add missing isb()'s after sys register writing
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] arm: pmu: Check for overflow in the low counter in chained counters tests
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] arm: pmu: Reset the pmu registers before starting some tests
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v1 00/40] TDX QEMU support
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] KVM: x86: Bug the VM if an accelerated x2APIC trap occurs on a "bad" reg
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] selftests: kvm: Fix a compile error in selftests/kvm/rseq_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] selftests: kvm/x86: test if it checks all the bits in the LBR_FMT bit-field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH v6 037/104] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [GIT PULL] KVM changes for Linux 5.20 merge window
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 2/3] KVM: x86: Add kvm_irq_is_masked()
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] arm: pmu: Reset the pmu registers before starting some tests
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] arm: pmu: Check for overflow in the low counter in chained counters tests
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [bug report] KVM: x86: Do not block APIC write for non ICR registers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: revalidate steal time cache if MSR value changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/1] KVM: s390: pci: fix airq_iv_create sparse warning
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH 0/1] fix sparse warning in linux-next
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Add kvm_irq_is_masked()
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: revalidate steal time cache if MSR value changes
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v3 3/5] selftests: kvm/x86: Add testing for masked events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/5] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v3 1/5] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/5] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: revalidate steal time cache if MSR value changes
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v2 2/7] perf/x86/core: Remove unnecessary stubs provided for KVM-only helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvmtool 0/4] Makefile and virtio fixes
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2] KVM: X86: Explicitly set the 'fault.async_page_fault' value in kvm_fixup_and_inject_pf_error().
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: VMX: Simplify capability check when handling PERF_CAPABILITIES write
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Add vfio-platform support for ONESHOT irq forwarding?
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: Add vfio-platform support for ONESHOT irq forwarding?
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: do not report preemption if the steal time cache is stale
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] KVM: x86: do not report preemption if the steal time cache is stale
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: revalidate steal time cache if MSR value changes
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH Part2 v6 25/49] KVM: SVM: Disallow registering memory range from HugeTLB for SNP guest
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH] KVM: x86: revalidate steal time cache if MSR value changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC v2 00/10] Introduce an extensible static analyzer
- From: Marc-André Lureau <marcandre.lureau@xxxxxxxxxx>
- Re: [PATCH Part2 v6 21/49] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH Part2 v6 27/49] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v5 07/22] x86/virt/tdx: Implement SEAMCALL function
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCHv2 4/7] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: "Shukla, Santosh" <santosh.shukla@xxxxxxx>
- Re: [PATCH v2] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/3] arm: pmu: Add missing isb()'s after sys register writing
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 2/7] perf/x86/core: Remove unnecessary stubs provided for KVM-only helpers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] arm: pmu: Check for overflow in the low counter in chained counters tests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v3 6/7] vhost_net: Add NetClientInfo prepare callback
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v7 11/14] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/7] vhost_net: Add NetClientInfo prepare callback
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 7/7] vdpa: Always start CVQ in SVQ mode
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: VMX: Simplify capability check when handling PERF_CAPABILITIES write
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 4/7] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 4/7] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- [PATCH] selftests: kvm/x86: test if it checks all the bits in the LBR_FMT bit-field
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v7 07/14] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: PING: [PATCH] KVM: HWPoison: Fix memory address&size during remap
- From: Eiichi Tsukata <eiichi.tsukata@xxxxxxxxxxx>
- [bug report] KVM: x86: Do not block APIC write for non ICR registers
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC 1/5] vhost: reorder used descriptors in a batch
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 6/7] vhost_net: Add NetClientInfo prepare callback
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 7/7] vdpa: Always start CVQ in SVQ mode
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 4/7] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH v2] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH v2] KVM: X86: Explicitly set the 'fault.async_page_fault' value in kvm_fixup_and_inject_pf_error().
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] X86: Set up EPT before running vmx_pf_exception_test
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v1 08/40] i386/tdx: Adjust the supported CPUID based on TDX restrictions
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/mmu: Fully re-evaluate MMIO caching when SPTE masks change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/5] selftests: KVM/x86: Fix vcpu_{save,load}_state() by adding APIC state into kvm_x86_state
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86/mmu: Fully re-evaluate MMIO caching when SPTE masks change
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v2 3/3] KVM: SVM: Disable SEV-ES support if MMIO caching is disable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/3] KVM: x86/mmu: Fully re-evaluate MMIO caching when SPTE masks change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: x86: Tag kvm_mmu_x86_module_init() with __init
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: x86/mmu: MMIO caching bug fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add sanity check that MMIO SPTE mask doesn't overlap gen
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add sanity check that MMIO SPTE mask doesn't overlap gen
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 07/22] x86/virt/tdx: Implement SEAMCALL function
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/1] s390x: verify EQBS/SQBS is unavailable
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH] KVM: x86/mmu: Add sanity check that MMIO SPTE mask doesn't overlap gen
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86: Get vmcs12 pages before checking pending interrupts
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: nested/x86: update trace_kvm_nested_vmrun() to suppot VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/7] KVM: VMX: Simplify capability check when handling PERF_CAPABILITIES write
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/7] KVM: VMX: Adjust number of LBR records for PERF_CAPABILITIES at refresh
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/7] KVM: VMX: Use proper type-safe functions for vCPU => LBRs helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/7] KVM: VMX: Advertise PMU LBRs if and only if perf supports LBRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/7] perf/x86/core: Remove unnecessary stubs provided for KVM-only helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/7] perf/x86/core: Drop the unnecessary return value from x86_perf_get_lbr()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/7] KVM: x86: Intel PERF_CAPABILITIES fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/7] KVM: x86: Refresh PMU after writes to MSR_IA32_PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/5] selftests: KVM/x86: Fix vcpu_{save,load}_state() by adding APIC state into kvm_x86_state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Refresh PMU after writes to MSR_IA32_PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/5] selftests: KVM/x86: Fix vcpu_{save,load}_state() by adding APIC state into kvm_x86_state
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [GIT PULL] VFIO updates for v6.0-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86: Get vmcs12 pages before checking pending interrupts
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/3] arm: pmu: Check for overflow in the low counter in chained counters tests
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/3] arm: pmu: Reset the pmu registers before starting some tests
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/3] arm: pmu: Add missing isb()'s after sys register writing
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/3] arm: pmu: Fixes for bare metal
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/4] x86: emulator.c cleanup: Use ASM_TRY for the UD_VECTOR cases
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/4] x86: Extend ASM_TRY to handle #UD thrown by FEP-triggered emulator
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86: Get vmcs12 pages before checking pending interrupts
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v1 00/40] TDX QEMU support
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH v3 2/7] vdpa: Use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 4/7] vdpa: Add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH] selftests: kvm: Fix a compile error in selftests/kvm/rseq_test.c
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/4] x86: emulator.c cleanup: Use ASM_TRY for the UD_VECTOR cases
- From: Michal Luczaj <mhal@xxxxxxx>
- [kvm-unit-tests PATCH 1/4] x86: emulator.c cleanup: Save and restore exception handlers
- From: Michal Luczaj <mhal@xxxxxxx>
- [kvm-unit-tests PATCH 4/4] x86: Extend ASM_TRY to handle #UD thrown by FEP-triggered emulator
- From: Michal Luczaj <mhal@xxxxxxx>
- [kvm-unit-tests PATCH 3/4] x86: Test emulator's handling of LEA with /reg
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/1] s390x: verify EQBS/SQBS is unavailable
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v3 0/7] ASID support in vhost-vdpa net
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Test illegal LEA handling
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v2 7/7] vdpa: Always start CVQ in SVQ mode
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- [PATCH v3 5/7] vdpa: Store x-svq parameter in VhostVDPAState
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v3 1/7] linux-headers: Update kernel headers
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v3 7/7] vdpa: Always start CVQ in SVQ mode
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v3 6/7] vhost_net: Add NetClientInfo prepare callback
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v3 3/7] vdpa: Allocate SVQ unconditionally
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86: Get vmcs12 pages before checking pending interrupts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86: Get vmcs12 pages before checking pending interrupts
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 2/2] kvm: nVMX: add tracepoint for kvm:kvm_nested_vmrun
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.18 1/6] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: nested/x86: update trace_kvm_nested_vmrun() to suppot VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86: Get vmcs12 pages before checking pending interrupts
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH] selftests: kvm: Fix a compile error in selftests/kvm/rseq_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.18 1/6] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: kvmclock: Fix a non-prototype function declaration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 12/13] KVM: x86: SVM: don't save SVM state to SMRAM when VM is not long mode capable
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v7 11/14] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 13/13] KVM: x86: emulator/smm: preserve interrupt shadow in SMRAM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 11/13] KVM: x86: SVM: use smram structs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 10/13] KVM: x86: emulator/smm: use smram struct for 64 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 09/13] KVM: x86: emulator/smm: use smram struct for 32 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 08/13] KVM: x86: emulator/smm: use smram structs in the common code
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 07/13] KVM: x86: emulator/smm: add structs for KVM's smram layout
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 06/13] KVM: x86: emulator/smm: number of GPRs in the SMRAM image depends on the image format
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 05/13] KVM: x86: emulator: update the emulation mode after CR0 write
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 04/13] KVM: x86: emulator: update the emulation mode after rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 03/13] KVM: x86: emulator: introduce emulator_recalc_and_set_mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 02/13] KVM: x86: emulator: em_sysexit should update ctxt->mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 01/13] bug: introduce ASSERT_STRUCT_OFFSET
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v3 00/13] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Make page tables for eager page splitting NUMA aware
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 09/14] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Refresh PMU after writes to MSR_IA32_PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 28/40] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH] selftests: kvm: Fix a compile error in selftests/kvm/rseq_test.c
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] X86: Set up EPT before running vmx_pf_exception_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 07/22] x86/virt/tdx: Implement SEAMCALL function
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [RFC PATCH v3 9/9] vsock_test: POLLIN + SO_RCVLOWAT test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 8/9] vmci/vsock: check SO_RCVLOWAT before wake up reader
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 7/9] virtio/vsock: check SO_RCVLOWAT before wake up reader
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 6/9] vsock: add API call for data ready
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 5/9] vsock: pass sock_rcvlowat to notify_poll_in as target
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/1] s390x: verify EQBS/SQBS is unavailable
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/1] s390x: verify EQBS/SQBS is unavailable
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: kvm: Fix a compile error in selftests/kvm/rseq_test.c
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [RFC PATCH v3 4/9] vmci/vsock: use 'target' in notify_poll_in callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 3/9] virtio/vsock: use 'target' in notify_poll_in callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 2/9] hv_sock: disable SO_RCVLOWAT support
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [PATCH v9 25/40] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 18/40] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 36/40] KVM: selftests: Create a vendor independent helper to allocate Hyper-V specific test pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 22/40] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 21/40] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 20/40] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 26/40] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 24/40] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 37/40] KVM: selftests: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 35/40] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 40/40] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 34/40] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 33/40] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 23/40] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [PATCH v9 31/40] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 19/40] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 39/40] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 38/40] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 27/40] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 16/40] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 32/40] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 30/40] KVM: selftests: Export _vm_get_page_table_entry()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 29/40] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 28/40] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 17/40] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 15/40] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 11/40] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 12/40] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 14/40] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 13/40] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 10/40] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 09/40] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 07/40] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 06/40] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 08/40] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 02/40] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 03/40] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 01/40] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 05/40] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 04/40] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 00/40] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v8 33/39] KVM: selftests: nVMX: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: x86/svm/pmu: Rewrite get_gp_pmc_amd() for more counters scalability
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 1/2] KVM: x86/svm/pmu: Direct access pmu->gp_counter[] to implement amd_*_to_pmc()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 00/27] EFI and ACPI support for arm64
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [RFC v2 02/10] Drop unused static function return values
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: kvmclock: Fix a non-prototype function declaration
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC v2 02/10] Drop unused static function return values
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Refresh PMU after writes to MSR_IA32_PERF_CAPABILITIES
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 1/5] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC v2 02/10] Drop unused static function return values
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [RFC v2 02/10] Drop unused static function return values
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3] s390x: uv-host: Add access checks for donated memory
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [RFC v2 02/10] Drop unused static function return values
- From: "Richard W.M. Jones" <rjones@xxxxxxxxxx>
- Re: [RFC v2 02/10] Drop unused static function return values
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [RFC v2 02/10] Drop unused static function return values
- From: Alberto Faria <afaria@xxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC v2 02/10] Drop unused static function return values
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 09/14] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86: Get vmcs12 pages before checking pending interrupts
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v7 14/14] memfd_create.2: Describe MFD_INACCESSIBLE flag
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/14] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 11/14] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3] s390x: uv-host: Add access checks for donated memory
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/22] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] x86/fpu: Allow PKRU to be (once again) written by ptrace.
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v1 08/40] i386/tdx: Adjust the supported CPUID based on TDX restrictions
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3] s390x: uv-host: Add access checks for donated memory
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] vfio: Add the device features for the low power entry and exit
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2] s390x: verify EQBS/SQBS is unavailable
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] s390x: verify EQBS/SQBS is unavailable
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 07/22] x86/virt/tdx: Implement SEAMCALL function
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] X86: Set up EPT before running vmx_pf_exception_test
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v6 036/104] KVM: x86/mmu: Explicitly check for MMIO spte in fast page fault
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 1/5] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/mmu: Fully re-evaluate MMIO caching when SPTE masks change
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Test illegal LEA handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2] x86: Test illegal LEA handling
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH 5/5] selftests: KVM: Test if posted interrupt delivery race with migration
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 3/5] selftests: KVM: Introduce vcpu_run_interruptable()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 4/5] selftests: KVM: Add support for posted interrupt handling in L2
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 2/5] selftests: KVM/x86: Fix vcpu_{save,load}_state() by adding APIC state into kvm_x86_state
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86: Get vmcs12 pages before checking pending interrupts
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 0/5] Fix a race between posted interrupt delivery and migration in a nested VM
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/mmu: Fully re-evaluate MMIO caching when SPTE masks change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/mmu: Fully re-evaluate MMIO caching when SPTE masks change
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Move kvm_(un)register_irq_mask_notifier() to generic KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/mmu: Fully re-evaluate MMIO caching when SPTE masks change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] X86: Set up EPT before running vmx_pf_exception_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: do not shadow apic global definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 028/102] KVM: TDX: allocate/free TDX vcpu structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 022/102] KVM: TDX: create/destroy VM structure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Make page tables for eager page splitting NUMA aware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with the kvms390-fixes tree
- Re: [PATCH 3/3] KVM: irqfd: Postpone resamplefd notify for oneshot interrupts
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Make page tables for eager page splitting NUMA aware
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Make page tables for eager page splitting NUMA aware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM changes for Linux 5.20 merge window
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM changes for Linux 5.20 merge window
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 1/5] vfio: Add the device features for the low power entry and exit
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 1/5] vfio: Add the device features for the low power entry and exit
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v7 11/14] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/5] vfio: Add the device features for the low power entry and exit
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v6 036/104] KVM: x86/mmu: Explicitly check for MMIO spte in fast page fault
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Make page tables for eager page splitting NUMA aware
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v4 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] s390x: verify EQBS/SQBS is unavailable
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v4 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 24/26] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 26/26] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 23/26] KVM: nVMX: Always set required-1 bits of pinbased_ctls to PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 21/26] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 25/26] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 22/26] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 20/26] KVM: VMX: Adjust CR3/INVPLG interception for EPT=y at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 19/26] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 12/26] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 14/26] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 17/26] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 18/26] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 16/26] KVM: VMX: Extend VMX controls macro shenanigans
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 15/26] KVM: VMX: Don't toggle VM_ENTRY_IA32E_MODE for 32-bit kernels/KVM
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 13/26] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 11/26] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 07/26] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 10/26] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 09/26] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 08/26] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 00/26] KVM: VMX: Support updated eVMCSv1 revision + use vmcs_config for L1 VMX MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 05/26] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 06/26] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 04/26] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 03/26] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 02/26] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 01/26] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] s390x: smp: add tests for calls in wait state
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] vfio: Add the device features for the low power entry and exit
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] selftests: kvm: Fix a compile error in selftests/kvm/rseq_test.c
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: VMX: Adjust number of LBR records for PERF_CAPABILITIES at refresh
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1] s390x: verify EQBS/SQBS is unavailable
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [V2 07/11] KVM: selftests: Consolidate boilerplate code in get_ucall()
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [V2 06/11] KVM: selftests: Consolidate common code for popuplating
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [V2 09/11] KVM: selftests: Make ucall work with encrypted guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [V2 09/11] KVM: selftests: Make ucall work with encrypted guests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 1/5] vhost: reorder used descriptors in a batch
- From: Guo Zhi <qtxuning1999@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86/pmu: Reset the expected count of the fixed counter 0 when i386
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 1/5] vfio: Add the device features for the low power entry and exit
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 1/5] vhost: reorder used descriptors in a batch
- From: Guo Zhi <qtxuning1999@xxxxxxxxxxx>
- Re: [V2 09/11] KVM: selftests: Make ucall work with encrypted guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part2 v6 24/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v4 14/25] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH Part2 v6 26/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part2 v6 18/49] crypto: ccp: Provide APIs to query extended attestation report
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part2 v6 17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/3] s390x: smp: use an array for sigp calls
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: VMX: Adjust number of LBR records for PERF_CAPABILITIES at refresh
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: Guest reboot issues since QEMU 6.0 and Linux 5.11
- From: Fiona Ebner <f.ebner@xxxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: x86/pmu: Fix some corner cases including Intel PEBS
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v1 00/40] TDX QEMU support
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 00/27] EFI and ACPI support for arm64
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v1 01/40] *** HACK *** linux-headers: Update headers to pull in TDX API changes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 00/27] EFI and ACPI support for arm64
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [V2 06/11] KVM: selftests: Consolidate common code for popuplating
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [V2 02/11] KVM: selftests: sparsebit: add const where appropriate
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [V2 01/11] KVM: selftests: move vm_phy_pages_alloc() earlier in file
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [V2 07/11] KVM: selftests: Consolidate boilerplate code in get_ucall()
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v1 00/40] TDX QEMU support
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [V2 09/11] KVM: selftests: Make ucall work with encrypted guests
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v1 01/40] *** HACK *** linux-headers: Update headers to pull in TDX API changes
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [V2 07/11] KVM: selftests: Consolidate boilerplate code in get_ucall()
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/6] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 6/6] lib: s390x: sie: Properly populate SCA
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/6] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/6] lib: s390x: Use a new asce for each PV guest
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH v1 40/40] docs: Add TDX documentation
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 39/40] i386/tdx: Don't get/put guest state for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 37/40] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 38/40] i386/tdx: Skip kvm_put_apicbase() for TDs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 36/40] i386/tdx: Don't synchronize guest tsc for TDs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 35/40] hw/i386: add option to forcibly report edge trigger in acpi tables
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 34/40] hw/i386: add eoi_intercept_unsupported member to X86MachineState
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 32/40] i386/tdx: Disable PIC for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 26/40] headers: Add definitions from UEFI spec for volumes, resources, etc...
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 27/40] i386/tdx: Setup the TD HOB list
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 33/40] i386/tdx: Don't allow system reset for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 29/40] i386/tdx: Call KVM_TDX_INIT_VCPU to initialize TDX vcpu
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 31/40] i386/tdx: Disable SMM for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 30/40] i386/tdx: Finalize TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 24/40] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 22/40] i386/tdx: Skip BIOS shadowing setup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 28/40] i386/tdx: Add TDVF memory via KVM_TDX_INIT_MEM_REGION
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 25/40] i386/tdx: Track RAM entries for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 23/40] i386/tdx: Don't initialize pc.rom for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 08/40] i386/tdx: Adjust the supported CPUID based on TDX restrictions
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 14/40] i386/tdx: Initialize TDX before creating TD vcpus
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 19/40] i386/tdx: Set kvm_readonly_mem_enabled to false for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 16/40] i386/tdx: Wire CPU features up with attributes of TD guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 10/40] i386/tdx: Integrate tdx_caps->xfam_fixed0/1 into tdx_cpuid_lookup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 18/40] i386/tdx: Implement user specified tsc frequency
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 11/40] i386/tdx: Integrate tdx_caps->attrs_fixed0/1 to tdx_cpuid_lookup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 12/40] i386/kvm: Move architectural CPUID leaf generation to separate helper
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 06/40] i386/tdx: Get tdx_capabilities via KVM_TDX_CAPABILITIES
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 20/40] i386/tdvf: Introduce function to parse TDVF metadata
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 07/40] i386/tdx: Introduce is_tdx_vm() helper and cache tdx_guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 17/40] i386/tdx: Validate TD attributes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 09/40] i386/tdx: Update tdx_fixed0/1 bits by tdx_caps.cpuid_config[]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 13/40] KVM: Introduce kvm_arch_pre_create_vcpu()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 21/40] i386/tdx: Parse TDVF metadata for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 15/40] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 05/40] i386/tdx: Implement tdx_kvm_init() to initialize TDX VM context
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 04/40] target/i386: Introduce kvm_confidential_guest_init()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 03/40] target/i386: Implement mc->kvm_type() to get VM type
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 02/40] i386: Introduce tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 00/40] TDX QEMU support
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v1 01/40] *** HACK *** linux-headers: Update headers to pull in TDX API changes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC 3/5] vhost_test: batch used buffer
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/6] lib: s390x: sie: Improve validity handling and make it vm specific
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/6] s390x: Add a linker script to assembly snippets
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH] selftests: kvm: Fix a compile error in selftests/kvm/rseq_test.c
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/6] s390x: MAKEFILE: Use $< instead of pathsubst
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/6] s390x: snippets: asm: Add a macro to write an exception PSW
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]