Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH V2 vfio 04/11] vfio: Move vfio.c to vfio_main.c
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 02/11] net/mlx5: Query ADV_VIRTUALIZATION capabilities
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 03/11] vfio: Introduce DMA logging uAPIs
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 01/11] net/mlx5: Introduce ifc bits for page tracker
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V2 vfio 00/11] Add device DMA logging support for mlx5 driver
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH kernel] vfio/spapr_tce: Fix the comment
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH v2 0/9] KVM: x86/MMU: Optimize disabling dirty logging
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: 5.10.131-rc1 crash with int3: RIP 0010:xaddw_ax_dx+0x9/0x10 [kvm]
- From: Jinpu Wang <jinpu.wang@xxxxxxxxx>
- Re: [PATCH 13/19] KVM: arm64: vgic-v2: Consolidate userspace access for MMIO registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 15/19] KVM: arm64: vgic-v2: Add helper for legacy dist/cpuif base address setting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v12 00/18] KVM: s390: pv: implement lazy destroy for reboot
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 3/3] lib: s390x: better smp interrupt checks
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 15/19] KVM: arm64: vgic-v2: Add helper for legacy dist/cpuif base address setting
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH] KVM: selftests: Double check on the current CPU in rseq_test
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: amd: pmu: test performance counter on AMD
- From: SU Hang <darcysail@xxxxxxxxx>
- Re: [PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- [kvm-unit-tests PATCH] x86: amd: pmu: test performance counter on AMD
- From: SU Hang <darcysail@xxxxxxxxx>
- Re: [PATCH 14/19] KVM: arm64: vgic: Use {get, put}_user() instead of copy_{from.to}_user
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 13/19] KVM: arm64: vgic-v2: Consolidate userspace access for MMIO registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH v7 04/14] mm/shmem: Support memfile_notifier
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 12/19] KVM: arm64: vgic-v3: Consolidate userspace access for MMIO registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 4662b7adea50bb62e993a67f611f3be625d3df0d
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2] KVM: selftests: Use "a" and "d" to set EAX/EDX for wrmsr_safe()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: selftests: Fix wrmsr_safe()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 033/102] KVM: x86/mmu: Add address conversion functions for TDX shared bits
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: Regarding TSC scaling in a KVM environment
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] cover-letter: Simplify vfio_iommu_type1 attach/detach routine
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v7 04/14] mm/shmem: Support memfile_notifier
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: 5.10.131-rc1 crash with int3: RIP 0010:xaddw_ax_dx+0x9/0x10 [kvm]
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5.15 00/78] 5.15.55-rc1 review
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.15 00/78] 5.15.55-rc1 review
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 3/3] lib: s390x: better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/3] s390x: skey.c: rework the interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/3] lib: s390x: add functions to set and clear PSW bits
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/3] better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH] x86/kvm: fix FASTOP_SIZE when return thunks are enabled
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- Re: [PATCH 5.18 00/61] 5.18.12-rc1 review
- From: Thadeu Lima de Souza Cascardo <cascardo@xxxxxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86/mmu: Promote pages in-place when disabling dirty logging
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: selftests: Fix wrmsr_safe()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: Fix wrmsr_safe()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: Hyper-V invariant TSC control feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Hyper-V invariant TSC control
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Test Hyper-V invariant TSC control
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v8 02/12] s390x/cpu_topology: CPU topology objects and structures
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 5.18 00/61] 5.18.12-rc1 review
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 5.18 00/61] 5.18.12-rc1 review
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: mainline build failure due to fc02735b14ff ("KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS")
- From: Sudip Mukherjee <sudipm.mukherjee@xxxxxxxxx>
- Re: [PATCH 5.15 00/78] 5.15.55-rc1 review
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: 5.10.131-rc1 crash with int3: RIP 0010:xaddw_ax_dx+0x9/0x10 [kvm]
- From: Jinpu Wang <jinpu.wang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] lib: s390x: better smp interrupt checks
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] lib: s390x: better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 5.18 00/61] 5.18.12-rc1 review
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: 5.10.131-rc1 crash with int3: RIP 0010:xaddw_ax_dx+0x9/0x10 [kvm]
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5.15 00/78] 5.15.55-rc1 review
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: 5.10.131-rc1 crash with int3: RIP 0010:xaddw_ax_dx+0x9/0x10 [kvm]
- From: Jinpu Wang <jinpu.wang@xxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Add tests for Guest Processor Event Based Sampling (PEBS)
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 7/7] KVM: x86/pmu: Defer counter emulated overflow via pmc->stale_counter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 2/7] perf/x86/core: Completely disable guest PEBS via guest's global_ctrl
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 4/7] KVM: x86/pmu: Not to generate PEBS records for emulated instructions
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 3/7] KVM: x86/pmu: Avoid setting BIT_ULL(-1) to pmu->host_cross_mapped_mask
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 1/7] perf/x86/core: Update x86_pmu.pebs_capable for ICELAKE_{X,D}
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 6/7] KVM: x86/pmu: Defer reprogram_counter() to kvm_pmu_handle_event()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 5/7] KVM: x86/pmu: Avoid using PEBS perf_events for normal counters
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 0/7] KVM: x86/pmu: Fix some corner cases including Intel PEBS
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/3] lib: s390x: better smp interrupt checks
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: mainline build failure due to fc02735b14ff ("KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS")
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/3] s390x: skey.c: rework the interrupt handler
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/3] lib: s390x: add functions to set and clear PSW bits
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/4] s390x: smp: move sigp calls with invalid cpu address to array
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 3/4] s390x: smp: use an array for sigp calls
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 4/4] s390x: smp: add tests for calls in wait state
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/4] lib: s390x: add cleanup function for external interrupts
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/4] s390x: add tests for SIGP call orders in enabled wait
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: mainline build failure due to fc02735b14ff ("KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS")
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- mainline build failure due to fc02735b14ff ("KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS")
- From: "Sudip Mukherjee (Codethink)" <sudipm.mukherjee@xxxxxxxxx>
- Re: [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 5.18 00/61] 5.18.12-rc1 review
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- 5.10.131-rc1 crash with int3: RIP 0010:xaddw_ax_dx+0x9/0x10 [kvm]
- From: Jinpu Wang <jinpu.wang@xxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] lib: s390x: better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] lib: s390x: add functions to set and clear PSW bits
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] s390x: skey.c: rework the interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 033/102] KVM: x86/mmu: Add address conversion functions for TDX shared bits
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v7 035/102] KVM: x86/mmu: Explicitly check for MMIO spte in fast page fault
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 04/14] mm/shmem: Support memfile_notifier
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [kvm-unit-tests PATCH v3 25/27] arm64: Add support for efi in Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH v12 0/3] s390x: KVM: CPU Topology
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v12 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 25/27] arm64: Add support for efi in Makefile
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v12 2/3] KVM: s390: guest support for topology function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 035/102] KVM: x86/mmu: Explicitly check for MMIO spte in fast page fault
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v12 2/3] KVM: s390: guest support for topology function
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 04/14] mm/shmem: Support memfile_notifier
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 5.19, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 5.19, take #2
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [QUESTION] Exception print when enabling GICv4
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 11/19] KVM: arm64: vgic-v3: Use u32 to manage the line level from userspace
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Regarding TSC scaling in a KVM environment
- From: Arnabjyoti Kalita <akalita@xxxxxxxxxxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with Linus' tree
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with Linus' tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [QUESTION] Exception print when enabling GICv4
- From: "chenxiang (M)" <chenxiang66@xxxxxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv fixes for 5.19, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 10/19] KVM: arm64: vgic-v3: Convert userspace accessors over to FIELD_GET/FIELD_PREP
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [GIT PULL] KVM/riscv fixes for 5.19, take #2
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 09/19] KVM: arm64: vgic-v3: Make the userspace accessors use sysreg API
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 033/102] KVM: x86/mmu: Add address conversion functions for TDX shared bits
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v7 00/14] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 08/19] KVM: arm64: vgic-v3: Push user access into vgic_v3_cpu_sysregs_uaccess()
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 003/102] KVM: Refactor CPU compatibility check on module initialiization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 003/102] KVM: Refactor CPU compatibility check on module initialiization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 002/102] Partially revert "KVM: Pass kvm_init()'s opaque param to additional arch funcs"
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/5] KVM: Add gfp_custom flag in struct kvm_mmu_memory_cache
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] RISC-V: KVM: Add G-stage ioremap() and iounmap() functions
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH v7 032/102] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 5/5] RISC-V: KVM: Add support for Svpbmt inside Guest/VM
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] RISC-V: KVM: Use PAGE_KERNEL_IO in kvm_riscv_gstage_ioremap()
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- [PATCH v2] KVM, x86/mmu: Fix the comment around kvm_tdp_mmu_zap_leafs()
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Shrink pte_list_desc size when KVM is using TDP
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v7 030/102] KVM: TDX: Do TDX specific vcpu initialization
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86/mmu: Promote pages in-place when disabling dirty logging
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/4] KVM: mmu: add a helper to account memory used by KVM MMU.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH v6 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Shrink pte_list_desc size when KVM is using TDP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/4] KVM: x86/mmu: Shrink pte_list_desc size when KVM is using TDP
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH] KVM, x86/mmu: Fix the comment around kvm_tdp_mmu_zap_leafs()
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86/mmu: Defer "full" MMU setup until after vendor hardware_setup()
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 25/27] arm64: Add support for efi in Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH v7 030/102] KVM: TDX: Do TDX specific vcpu initialization
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH 00/12] Documentation: tdx: documentation fixes
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 08/12] Documentation: kvm: tdx-tdp-mmu: Properly format nested list for EPT state machine
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Fix a spelling mistake in comments
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: LAPIC: Fix a spelling mistake in comments
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 00/19] IOMMUFD Dirty Tracking
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 01/10] vfio: Make vfio_unpin_pages() return void
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v7 04/14] mm/shmem: Support memfile_notifier
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH] KVM, x86/mmu: Fix the comment around kvm_tdp_mmu_zap_leafs()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Add dedicated helper to get CPUID entry with significant index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: s390: Add facility 197 to the white list
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 29/49] KVM: X86: Keep the NPT and RMP page level in sync
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/8] Move npt test cases and NPT code improvements
- From: "Shukla, Manali" <mashukla@xxxxxxx>
- Re: [PATCH v2] KVM: x86: Add dedicated helper to get CPUID entry with significant index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- RE: Add vfio-platform support for ONESHOT irq forwarding?
- From: "Liu, Rong L" <rong.l.liu@xxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Send EOI to SynIC vectors on accelerated EOI-induced VM-Exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 02/12] s390x/cpu_topology: CPU topology objects and structures
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Add dedicated helper to get CPUID entry with significant index
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [QUESTION] Exception print when enabling GICv4
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH] vfio/mlx5: clean up overflow check
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v3 06/10] vfio/ap: Change saved_pfn to saved_iova
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- RE: [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH] KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/10] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/10] vfio: Make vfio_unpin_pages() return void
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH] KVM: nVMX: Always enable TSC scaling for L2 when it was enabled for L1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Send EOI to SynIC vectors on accelerated EOI-induced VM-Exits
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 25/27] arm64: Add support for efi in Makefile
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: WARN only once if KVM leaves a dangling userspace I/O request
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [QUESTION] Exception print when enabling GICv4
- From: "chenxiang (M)" <chenxiang66@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] KVM: x86: Send EOI to SynIC vectors on accelerated EOI-induced VM-Exits
- From: Wang Guangju <wangguangju@xxxxxxxxx>
- Re: [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 03/25] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 25/25] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 23/25] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 22/25] KVM: nVMX: Always set required-1 bits of pinbased_ctls to PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 21/25] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 20/25] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 19/25] KVM: VMX: Adjust CR3/INVPLG interception for EPT=y at runtime, not setup
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 18/25] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 17/25] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 16/25] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 14/25] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 13/25] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 12/25] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 10/25] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 08/25] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 07/25] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 05/25] KVM: nVMX: Support several new fields in eVMCSv1
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 03/25] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 04/25] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v12 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 07/13] KVM: selftests: aarch64: Construct DEFAULT_MAIR_EL1 using sysreg.h macros
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v4 06/13] KVM: selftests: Add vm_mem_region_get_src_fd library function
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH next 3/3] Documentation: kvm: extend KVM_S390_ZPCI_OP subheading underline
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v4 05/13] KVM: selftests: Add missing close and munmap in __vm_mem_region_delete
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v4 04/13] KVM: selftests: aarch64: Export _virt_pg_map with a pt_memslot arg
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH next 3/3] Documentation: kvm: extend KVM_S390_ZPCI_OP subheading underline
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH next 0/3] miscellaneous documentation fixes for linux-next
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v12 2/3] KVM: s390: guest support for topology function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/13] KVM: selftests: Add vm_alloc_page_table_in_memslot library function
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v4 02/13] KVM: selftests: aarch64: Add virt_get_pte_hva library function
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v12 2/3] KVM: s390: guest support for topology function
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v12 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- RE: [PATCH v5] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- Re: [PATCH v6 3/4] vhost-vdpa: uAPI to suspend the device
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v6 1/4] vdpa: Add suspend operation
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v7 029/102] KVM: TDX: allocate/free TDX vcpu structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v12 2/3] KVM: s390: guest support for topology function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 05/19] KVM: arm64: Consolidate sysreg userspace accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v12 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 025/102] KVM: TDX: initialize VM with TDX specific parameters
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 08/19] KVM: arm64: vgic-v3: Push user access into vgic_v3_cpu_sysregs_uaccess()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Add dedicated helper to get CPUID entry with significant index
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 022/102] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v7 053/102] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 08/19] KVM: arm64: vgic-v3: Push user access into vgic_v3_cpu_sysregs_uaccess()
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH] vfio/mlx5: clean up overflow check
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 07/19] KVM: arm64: vgic-v3: Simplify vgic_v3_has_cpu_sysregs_attr()
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 06/19] KVM: arm64: Get rid of reg_from/to_user()
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 10/12] Documentation: x86: Enclose TDX initialization code inside code block
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 11/12] Documentation: x86: Use literal code block for TDX dmesg output
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 053/102] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: Update PT MSR intercepts during filter change iff PT in host+guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH] KVM, x86/mmu: Fix the comment around kvm_tdp_mmu_zap_leafs()
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 049/102] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 046/102] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- [PATCH v3 3/3] KVM: x86/mmu: Fix typo and tweak comment for split_desc_cache capacity
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 2/3] KVM: x86/mmu: Expand quadrant comment for PG_LEVEL_4K shadow pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 1/3] KVM: x86/mmu: Add optimized helper to retrieve an SPTE's index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 0/3] KVM: x86/mmu: Cleanups from eager page splitting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: VMX: Update PT MSR intercepts during filter change iff PT in host+guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: x86/mmu: Drop the "p is for pointer" from rmap helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86/mmu: Use innermost rmap zap helper when recycling rmaps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86/mmu: Return a u64 (the old SPTE) from mmu_spte_clear_track_bits()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86/mmu: Remove underscores from __pte_list_remove()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86/mmu: Rename rmap zap helpers to better show relationships
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86: Clean up rmap zap helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] KVM: x86/MMU: Optimize disabling dirty logging
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 008/102] KVM: x86: Refactor KVM VMX module init/exit functions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 012/102] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 003/102] KVM: Refactor CPU compatibility check on module initialiization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 011/102] KVM: TDX: Initialize TDX module when loading kvm_intel.ko
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Fix fault-related bugs in LTR/LLDT emulation
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v7 013/102] KVM: TDX: Make TDX VM type supported
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v7 012/102] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v7 006/102] KVM: TDX: Detect CPU feature on kernel module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 011/102] KVM: TDX: Initialize TDX module when loading kvm_intel.ko
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v7 010/102] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v7 008/102] KVM: x86: Refactor KVM VMX module init/exit functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH v2 2/2] KVM: x86: update documentation for MSR filtering
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: x86: fix documentation for KVM_X86_SET_MSR_FILTER
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2 0/2] MSR Filtering documentation updates
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Add dedicated helper to get CPUID entry with significant index
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 006/102] KVM: TDX: Detect CPU feature on kernel module initialization
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH 3/3] KVM: x86: WARN only once if KVM leaves a dangling userspace I/O request
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Set error code to segment selector on LLDT/LTR non-canonical #GP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Mark TSS busy during LTR emulation _after_ all fault checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: Fix fault-related bugs in LTR/LLDT emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86: Tweak name of MONITOR/MWAIT #UD quirk to make it #UD specific
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: Provide valid inputs for MONITOR/MWAIT regs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: selftests: Test MONITOR and MWAIT, not just MONITOR for quirk
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: Fix goofs with MONITOR/MWAIT quirk
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [GIT PULL] VFIO fix for v5.19-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4 2/6] vfio: Add a new device feature for the power management
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v2 17/21] KVM: x86: Morph pending exceptions to pending VM-Exits at queue time
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 000/102] KVM TDX basic feature support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v7 043/102] KVM: x86/mmu: Focibly use TDP MMU for TDX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 036/102] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 15/27] arm/arm64: mmu_disable: Clean and invalidate before disabling
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- [GIT PULL] VFIO fix for v5.19-rc7
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v12 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: s390: Add facility 197 to the white list
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: s390: Add facility 197 to the white list
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] vfio: Add a new device feature for the power management
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 1/6] vfio/pci: Mask INTx during runtime suspend
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 4/4] s390x: add pgm spec interrupt loop test
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v12 2/3] KVM: s390: guest support for topology function
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH 1/1] KVM: s390: Add facility 197 to the white list
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] vfio: Increment the runtime PM usage count during IOCTL call
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH v4 2/6] vfio: Add a new device feature for the power management
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [PATCH 33/35] perf intel-pt: Add machine_pid and vcpu to auxtrace_error
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 28/35] perf intel-pt: Remove guest_machine_pid
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 26/35] perf tools: Handle injected guest kernel mmap event
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 27/35] perf tools: Add perf_event__is_guest()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 32/35] perf intel-pt: Determine guest thread from guest sideband
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 30/35] perf intel-pt: Track guest context switches
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 35/35] perf intel-pt: Add documentation for tracing guest machine user space
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 25/35] perf machine: Use realloc_array_as_needed() in machine__set_current_tid()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 31/35] perf intel-pt: Disable sync switch with guest sideband
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 34/35] perf intel-pt: Use guest pid/tid etc in guest samples
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 29/35] perf intel-pt: Add some more logging to intel_pt_walk_next_insn()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 24/35] perf inject: Add support for injecting guest sideband events
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 22/35] perf tools: Automatically use guest kcore_dir if present
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 23/35] perf tools: Add reallocarray_as_needed()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 17/35] perf auxtrace: Add machine_pid and vcpu to auxtrace_error
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 19/35] perf script python: intel-pt-events: Add machine_pid and vcpu
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 21/35] perf tools: Make has_kcore_dir() work also for guest kcore_dir
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 20/35] perf tools: Remove also guest kcore_dir with host kcore_dir
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 18/35] perf script python: Add machine_pid and vcpu
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 16/35] perf dlfilter: Add machine_pid and vcpu
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 13/35] perf tools: Add machine_pid and vcpu to perf_sample
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 15/35] perf script: Add machine_pid and vcpu
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 11/35] perf session: Create guest machines from id_index
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 12/35] perf tools: Add guest_cpu to hypervisor threads
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 14/35] perf tools: Use sample->machine_pid to find guest machine
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 10/35] perf tools: Add machine_pid and vcpu to id_index
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 09/35] perf buildid-cache: Do not require purge files to also be in the file system
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 08/35] perf buildid-cache: Add guestmount'd files to the build ID cache
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 07/35] perf script: Add --dump-unsorted-raw-trace option
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 06/35] perf tools: Add perf_event__synthesize_id_sample()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 05/35] perf tools: Factor out evsel__id_hdr_size()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 04/35] perf tools: Export perf_event__process_finished_round()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 03/35] perf ordered_events: Add ordered_events__last_flush_time()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 01/35] perf tools: Fix dso_id inode generation comparison
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 02/35] perf tools: Export dsos__for_each_with_build_id()
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- [PATCH 00/35] perf intel-pt: Add support for tracing virtual machine user space on the host
- From: Adrian Hunter <adrian.hunter@xxxxxxxxx>
- Re: [PATCH v4 1/6] vfio/pci: Mask INTx during runtime suspend
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- [PATCH v12 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v12 2/3] KVM: s390: guest support for topology function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v12 1/3] KVM: s390: Cleanup ipte lock access and SIIF facility checks
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v12 0/3] s390x: KVM: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v7 046/102] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/3] x86: Use report_skip to log messages when tests are skipped
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH 3/4] x86: Skip perf related tests when platform cannot support
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH 4/4] x86: Check platform pmu capabilities before run lbr tests
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/4] x86: Use report_skip to print messages when tests are skipped
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/4] x86: Use helpers to fetch supported perf capabilities
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/4] Fixup and cleanup to pmu test applications
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v7 036/102] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 044/102] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 043/102] KVM: x86/mmu: Focibly use TDP MMU for TDX
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] riscv: Fix missing PAGE_PFN_MASK
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix SRCU deadlock caused by kvm_riscv_check_vcpu_requests()
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix SRCU deadlock caused by kvm_riscv_check_vcpu_requests()
- From: Bin Meng <bmeng.cn@xxxxxxxxx>
- [Bug 216234] New: KVM guest memory is zeroed when nested guest's REP INS instruction encounters page fault
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] RISC-V: KVM: Fix SRCU deadlock caused by kvm_riscv_check_vcpu_requests()
- From: Heinrich Schuchardt <heinrich.schuchardt@xxxxxxxxxxxxx>
- Re: [PATCH] RISC-V: KVM: Fix SRCU deadlock caused by kvm_riscv_check_vcpu_requests()
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 3/7] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCHv2 3/7] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 5/7] KVM: SVM: Add VNMI support in inject_nmi
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: x86: emulator/smm: preserve interrupt shadow in SMRAM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 17/21] KVM: x86: Morph pending exceptions to pending VM-Exits at queue time
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: U-Boot S-mode payload does not boot with a multicore configuration in RISC-V QEMU/KVM
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH] RISC-V: KVM: Fix SRCU deadlock caused by kvm_riscv_check_vcpu_requests()
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: U-Boot S-mode payload does not boot with a multicore configuration in RISC-V QEMU/KVM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCHv2 7/7] KVM: SVM: Enable VNMI feature
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv2 6/7] KVM: nSVM: implement nested VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv2 5/7] KVM: SVM: Add VNMI support in inject_nmi
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv2 4/7] KVM: SVM: Report NMI not allowed when Guest busy handling VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv2 3/7] KVM: SVM: Add VNMI support in get/set_nmi_mask
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv2 2/7] KVM: SVM: Add VNMI bit definition
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv2 1/7] x86/cpu: Add CPUID feature bit for VNMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCHv2 0/7] Virtual NMI feature
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- Re: [PATCH kernel] KVM: PPC: Do not warn when userspace asked for too big TCE table
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- [PATCH v3 18/21] docs: virt: kvm: fix a title markup at api.rst
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- [PATCH v3 00/21] Update Documentation/ cross references and fix issues
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- Re: [PATCH 03/19] KVM: arm64: Introduce generic get_user/set_user helpers for system registers
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 05/19] KVM: arm64: Consolidate sysreg userspace accesses
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 14/14] vfio/mdev: add mdev available instance checking to the core
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 13/14] vfio/mdev: consolidate all the description sysfs into the core code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 12/14] vfio/mdev: consolidate all the available_instance sysfs into the core code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 11/14] vfio/mdev: consolidate all the name sysfs into the core code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 10/14] vfio/mdev: consolidate all the device_api sysfs into the core code
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 09/14] vfio/mdev: remove mtype_get_parent_dev
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 07/14] vfio/mdev: unexport mdev_bus_type
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 08/14] vfio/mdev: remove mdev_parent_dev
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 06/14] vfio/mdev: remove mdev_from_dev
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 04/14] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 05/14] vfio/mdev: simplify mdev_type handling
- From: Christoph Hellwig <hch@xxxxxx>
- simplify the mdev interface v6
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 02/14] drm/i915/gvt: simplify vgpu configuration management
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 03/14] vfio/mdev: make mdev.h standalone includable
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 01/14] drm/i915/gvt: fix a memory leak in intel_gvt_init_vgpu_types
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 08/12] Documentation: kvm: tdx-tdp-mmu: Properly format nested list for EPT state machine
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 01/12] Documentation: kvm: Pad bullet lists with blank line
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 03/12] Documentation: kvm: tdx: Add footnote markers
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 10/12] Documentation: x86: Enclose TDX initialization code inside code block
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 08/12] Documentation: kvm: tdx-tdp-mmu: Properly format nested list for EPT state machine
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 12/12] Documentation: kvm: Add TDX documentation to KVM table of contents
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 06/12] Documentation: kvm: tdx-tdp-mmu: Add blank line padding for lists
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 11/12] Documentation: x86: Use literal code block for TDX dmesg output
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 09/12] Documentation: kvm: tdx-tdp-mmu: Add blank line padding to lists in concurrent sections
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 04/12] Documentation: kvm: tdx: Use bullet list for public kvm trees
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 07/12] Documentation: kvm: tdx-tdp-mmu: Use literal code block for EPT violation diagrams
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 00/12] Documentation: tdx: documentation fixes
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 02/12] Documentation: kvm: tdx: Use appropriate subbullet marker
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 05/12] Documentation: kvm: tdx: title typofix
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [syzbot] INFO: rcu detected stall in dummy_timer (4)
- From: syzbot <syzbot+879882be5b42e60d4d98@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 0/3] SCMI Vhost and Virtio backend implementation
- From: Mike Tipton <quic_mdtipton@xxxxxxxxxxx>
- Re: [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Don't deflect MSRs to userspace that can't be filtered
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v3 5/5] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v3 4/5] selftests: kvm/x86: Add testing for inverted masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v3 2/5] selftests: kvm/x86: Add flags when creating a pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v3 1/5] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v3 0/5] kvm: x86/pmu: Introduce and test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v2 1/4] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v3 3/5] selftests: kvm/x86: Add testing for masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 2/2] kvm: nVMX: add tracepoint for kvm:kvm_nested_vmrun
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 0/2] Extend KVM trace_kvm_nested_vmrun() to support VMX
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 1/2] KVM: nested/x86: update trace_kvm_nested_vmrun() to suppot VMX
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: x86: Fix access to vcpu->arch.apic when the irqchip is not in kernel
- From: Jue Wang <juew@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: x86: Initialize nr_lvt_entries to a proper default value
- From: Jue Wang <juew@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: x86: Fix access to vcpu->arch.apic when the irqchip is not in kernel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: x86: Initialize nr_lvt_entries to a proper default value
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 09/10] vfio/ccw: Add kmap_local_page() for memcpy
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 04/10] vfio/ccw: Only pass in contiguous pages
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 03/10] vfio/ap: Pass in physical address of ind to ap_aqic()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 01/10] vfio: Make vfio_unpin_pages() return void
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 06/10] vfio/ap: Change saved_pfn to saved_iova
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 00/10] Update vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 05/10] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 07/10] vfio/ccw: Change pa_pfn list to pa_iova list
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 08/10] vfio: Rename user_iova of vfio_dma_rw()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 02/10] drm/i915/gvt: Replace roundup with DIV_ROUND_UP
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: arm64: support MTE in protected VMs
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: arm64: allow MTE in protected VMs if the tag storage is known
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: arm64: add a hypercall for disowning pages
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v2 2/3] KVM: arm64: disown unused reserved-memory regions
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [RFT][PATCH v2 0/9] Update vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFT][PATCH v2 0/9] Update vfio_pin/unpin_pages API
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v2 4/9] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v2 9/9] vfio: Replace phys_pfn with pages for vfio_pin_pages()
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v2 8/9] vfio/ccw: Add kmap_local_page() for memcpy
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v2 6/9] vfio/ccw: Change pa_pfn list to pa_iova list
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v2 3/9] vfio/ccw: Only pass in contiguous pages
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v2 3/9] vfio/ccw: Only pass in contiguous pages
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v2 0/9] Update vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 07/19] KVM: arm64: vgic-v3: Simplify vgic_v3_has_cpu_sysregs_attr()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 06/19] KVM: arm64: Get rid of reg_from/to_user()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 05/19] KVM: arm64: Consolidate sysreg userspace accesses
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 03/19] KVM: arm64: Introduce generic get_user/set_user helpers for system registers
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 3/6] vfio: Increment the runtime PM usage count during IOCTL call
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 2/6] vfio: Add a new device feature for the power management
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 00/24] KVM: arm64: Introduce pKVM shadow state at EL2
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [kvm-unit-tests PATCH v5 3/3] x86: Check platform vPMU capabilities before run lbr tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/3] x86: Use report_skip to log messages when tests are skipped
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/6] vfio/pci: Mask INTx during runtime suspend
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v7 036/102] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- UIO mmap on ARM/ARM64 cannot do unaligned access
- From: Joakim Tjernlund <Joakim.Tjernlund@xxxxxxxxxxxx>
- Re: [KVM] cf8e55fe50: kvm-unit-tests.msr.fail
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 07/25] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 25/25] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 04/25] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 16/25] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 20/25] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 18/25] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 08/25] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 22/25] KVM: nVMX: Always set required-1 bits of pinbased_ctls to PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 14/25] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 17/25] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 12/25] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 19/25] KVM: VMX: Adjust CR3/INVPLG interception for EPT=y at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 05/25] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 23/25] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 13/25] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 21/25] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 10/25] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 02/25] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 03/25] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 00/25] KVM: VMX: Support updated eVMCSv1 revision + use vmcs_config for L1 VMX MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 2/4] vhost-vdpa: introduce SUSPEND backend feature bit
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v6 4/4] vdpa_sim: Implement suspend vdpa op
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 3/4] vhost-vdpa: uAPI to suspend the device
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v6 3/4] vhost-vdpa: uAPI to suspend the device
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v6 2/4] vhost-vdpa: introduce SUSPEND backend feature bit
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v6 2/4] vhost-vdpa: introduce SUSPEND backend feature bit
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v9 00/21] KVM: s390: enable zPCI for interpretive execution
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/4] vdpa: Add suspend operation
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v6 1/4] vdpa: Add suspend operation
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v7 050/102] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: Kai Huang <kai.huang@xxxxxxxxx>
- RE: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 8/8] s390x: uv-host: Fix init storage origin and length check
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 7/8] s390x: uv-host: Fence against being run as a PV guest
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 088b9c375534d905a4d337c78db3b3bfbb52c4a0
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/8] s390x: uv-host: Test uv immediate parameter
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] vfio/pci: Add support for virtual PME
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH v4 3/6] vfio: Increment the runtime PM usage count during IOCTL call
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH v4 2/6] vfio: Add a new device feature for the power management
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [PATCH v4 1/6] vfio/pci: Mask INTx during runtime suspend
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/8] s390x: uv-host: Add uninitialized UV tests
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 3/3] x86: Check platform vPMU capabilities before run lbr tests
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/3] x86: Use report_skip to log messages when tests are skipped
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/3] x86: Skip perf related tests when platform cannot support
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [PATCH 04/19] KVM: arm64: Push checks for 64bit registers into the low-level accessors
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFT][PATCH v2 0/9] Update vfio_pin/unpin_pages API
- From: "Xu, Terrence" <terrence.xu@xxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH v11 39/40] virtio_net: support tx queue resize
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v11 38/40] virtio_net: support rx queue resize
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH 04/19] KVM: arm64: Push checks for 64bit registers into the low-level accessors
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 14/15] vfio/mdev: add mdev available instance checking to the core
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v7 036/102] KVM: x86/mmu: Allow non-zero value for non-present SPTE
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH v7 046/102] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 6/8] KVM: Handle page fault for private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] vdpa: Use device_iommu_capable()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v7 048/102] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 041/102] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 033/102] KVM: x86/mmu: Add address conversion functions for TDX shared bits
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 030/102] KVM: TDX: Do TDX specific vcpu initialization
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 032/102] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 101/102] Documentation/virtual/kvm: Document on Trust Domain Extensions(TDX)
- From: Kai Huang <kai.huang@xxxxxxxxx>
- 答复: [PATCH] KVM: x86: Add EOI_INDUCED exit handlers for Hyper-V SynIC vectors
- From: "Wang,Guangju" <wangguangju@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/2] x86: Check platform vPMU capabilities before run lbr tests
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/2] x86: Skip perf related tests when platform cannot support
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 216212] KVM does not handle nested guest enable PAE paging correctly when CR3 is not mapped in EPT
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 216212] New: KVM does not handle nested guest enable PAE paging correctly when CR3 is not mapped in EPT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] selftests/kvm: Add error messages before skipping tests in vm_xsave_req_perm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 15/15] vfio/mdev: remove an extra parent kobject reference
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3] KVM: VMX: Avoid a JMP over the RSB-stuffing sequence
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/2] vfio: Replace the DMA unmapping notifier with a callback
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] vfio/spapr_tce: Remove the unused parameters container
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: fix the wrong word
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 00/11] s390/vfio-ccw rework
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v3] KVM: VMX: Avoid a JMP over the RSB-stuffing sequence
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v6 3/4] KVM: x86/mmu: count KVM mmu usage in secondary pagetable stats.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 2/4] KVM: mmu: add a helper to account memory used by KVM MMU.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/4] mm: add NR_SECONDARY_PAGETABLE to count secondary page table uses.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/2] x86: Check platform vPMU capabilities before run lbr tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/2] x86: Skip perf related tests when platform cannot support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Replace UNMAPPED_GVA with INVALID_GPA for gva_to_gpa()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 6/8] KVM: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: selftests: Dump VM stats in binary stats test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: VMX: Move VM-exit RSB stuffing out of line
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFT][PATCH v2 1/9] vfio: Make vfio_unpin_pages() return void
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH] vfio/mlx5: clean up overflow check
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFT][PATCH v2 1/9] vfio: Make vfio_unpin_pages() return void
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: x86: Don't deflect MSRs to userspace that can't be filtered
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/20] Update Documentation/ cross-references
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: Add vfio-platform support for ONESHOT irq forwarding?
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 06/21] KVM: x86: Treat #DBs from the emulator as fault-like (code and DR7.GD=1)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 05/21] KVM: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFT][PATCH v2 1/9] vfio: Make vfio_unpin_pages() return void
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFT][PATCH v2 4/9] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Increase KVM_MAX_VCPUS to 4096
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFT][PATCH v2 9/9] vfio: Replace phys_pfn with pages for vfio_pin_pages()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH 2/2] KVM: x86: add KVM_VCPU_TSC_VALUE attribute
- From: Simon Veith <sveith@xxxxxxxxx>
- [PATCH 1/2] KVM: x86: add KVM clock time reference arg to kvm_write_tsc()
- From: Simon Veith <sveith@xxxxxxxxx>
- Re: [PATCH v2 06/28] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Add EOI_INDUCED exit handlers for Hyper-V SynIC vectors
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC v2 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v2 06/28] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH RFC v2 1/2] arm/kvm: add support for MTE
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH RFC v2 2/2] qtests/arm: add some mte tests
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [Bug 216212] KVM does not handle nested guest enable PAE paging correctly when CR3 is not mapped in EPT
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: Add vfio-platform support for ONESHOT irq forwarding?
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio: hisi_acc_vfio_pci: fix integer overflow check in hisi_acc_vf_resume_write()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH -fixes v2] riscv: Fix missing PAGE_PFN_MASK
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH 4/5] RISC-V: KVM: Use PAGE_KERNEL_IO in kvm_riscv_gstage_ioremap()
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH] vfio/mlx5: clean up overflow check
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 3/5] RISC-V: KVM: Add G-stage ioremap() and iounmap() functions
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 5/5] RISC-V: KVM: Add support for Svpbmt inside Guest/VM
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 1/5] KVM: Add gfp_custom flag in struct kvm_mmu_memory_cache
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 0/5] KVM RISC-V Svpbmt support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 2/5] riscv: Fix missing PAGE_PFN_MASK
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH] vdpa: Use device_iommu_capable()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 088b9c375534d905a4d337c78db3b3bfbb52c4a0
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- [PATCH v4 09/11] vfio/ccw: Create a CLOSE FSM event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 01/11] vfio/ccw: Remove UUID from s390 debug log
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 03/11] vfio/ccw: Do not change FSM state in subchannel event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 11/11] vfio/ccw: Move FSM open/close to MDEV open/close
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 02/11] vfio/ccw: Fix FSM state if mdev probe fails
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 08/11] vfio/ccw: Create an OPEN FSM Event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 04/11] vfio/ccw: Remove private->mdev
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 00/11] s390/vfio-ccw rework
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 06/11] vfio/ccw: Flatten MDEV device (un)register
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 10/11] vfio/ccw: Refactor vfio_ccw_mdev_reset
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 05/11] vfio/ccw: Pass enum to FSM event jumptable
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v4 07/11] vfio/ccw: Update trace data for not operational event
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH kernel] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains
- From: Alexey Kardashevskiy <aik@xxxxxxxxx>
- Re: [PATCH 15/15] vfio/mdev: remove an extra parent kobject reference
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 04/15] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 15/15] vfio/mdev: remove an extra parent kobject reference
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 00/11] s390/vfio-ccw rework
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/11] s390/vfio-ccw rework
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]