Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v6 00/17] Introducing AMD x2AVIC and hybrid-AVIC modes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 6/6] vfio: do not set FMODE_LSEEK flag
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH Part2 v6 47/49] *fix for stale per-cpu pointer due to cond_resched during ghcb mapping
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v6 15/17] KVM: SVM: Use target APIC ID to complete x2AVIC IRQs when possible
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH Part2 v6 47/49] *fix for stale per-cpu pointer due to cond_resched during ghcb mapping
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v10 2/3] KVM: s390: guest support for topology function
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/3] KVM: s390: ipte lock for SCA access should be contained in KVM
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v6 02/17] KVM: x86: lapic: Rename [GET/SET]_APIC_DEST_FIELD to [GET/SET]_XAPIC_DEST_FIELD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 01/17] x86/cpufeatures: Introduce x2AVIC CPUID bit
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH kvm-unit-tests] x86/msr: Add dedicated macros to handle MSRs that are 64-bit only
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: debugfs: expose pid of vcpu threads
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Enhance handling WRMSR ICR register in x2APIC mode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: selftests: Enhance handling WRMSR ICR register in x2APIC mode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: nVMX: clean up posted interrupt descriptor try_cmpxchg
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v10 2/3] KVM: s390: guest support for topology function
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/3] lib: s390x: add functions to set and clear PSW bits
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/3] s390x: skey.c: rework the interrupt handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/3] lib: s390x: better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/3] better smp interrupt checks
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 24/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH Part2 v6 26/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] vfio/type1: Simplify bus_type determination
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 3/13] vfio/mdev: simplify mdev_type handling
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Kirti Wankhede <kwankhede@xxxxxxxxxx>
- Re: [PATCH v5 06/22] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 05/22] x86/virt/tdx: Prevent hot-add driver managed memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 04/22] x86/virt/tdx: Prevent ACPI CPU hotplug and ACPI memory hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Yong Wu <yong.wu@xxxxxxxxxxxx>
- [PATCH v3 3/3] x86: Check platform vPMU capabilities before run lbr tests
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v3 1/3] x86: Don't overwrite bits 11 and 12 of MSR_IA32_MISC_ENABLE
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] Fix up test failures due to recent KVM changes
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v3 2/3] x86: Skip perf related tests when platform cannot support
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [PATCH V3] virtio: disable notification hardening by default
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v6 6/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH kvm-unit-tests] MAINTAINERS: Change drew's email address
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V3] virtio: disable notification hardening by default
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 5.19-rc4
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] meson.build: Require a recent version of libpng
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] accel: kvm: Fix memory leak in find_stats_descriptors
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: selftest: Enhance handling WRMSR ICR register in x2APIC mode
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V2] KVM: SEV: Init target VMCBs in sev_migrate_from
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] vringh: iterate on iotlb_translate to handle large translations
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v10 00/41] virtio pci support VIRTIO_F_RING_RESET
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 25/41] virtio_pci: struct virtio_pci_common_cfg add queue_notify_data
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 00/41] virtio pci support VIRTIO_F_RING_RESET
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v10 25/41] virtio_pci: struct virtio_pci_common_cfg add queue_notify_data
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v10 2/3] KVM: s390: guest support for topology function
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v10 1/3] KVM: s390: ipte lock for SCA access should be contained in KVM
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH V3] virtio: disable notification hardening by default
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH] accel: kvm: Fix memory leak in find_stats_descriptors
- From: Miaoqian Lin <linmq006@xxxxxxxxx>
- Re: [PATCH v10 2/3] KVM: s390: guest support for topology function
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- RE: [PATCH v3 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 1/3] KVM: s390: ipte lock for SCA access should be contained in KVM
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: selftest: Enhance handling WRMSR ICR register in x2APIC mode
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Yong Wu <yong.wu@xxxxxxxxxxxx>
- Re: [PATCH v2] KVM: selftest: Enhance handling WRMSR ICR register in x2APIC mode
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- linux-next: manual merge of the kvm tree with the kvm-fixes tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 6/8] KVM: Handle page fault for private memory
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH 0/5] Fix wrong gfn range of tlb flushing with range
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH 5/5] KVM: x86/mmu: Use 1 as the size of gfn range for tlb flushing in FNAME(invlpg)()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH 3/5] KVM: x86/mmu: Reduce gfn range of tlb flushing in tdp_mmu_map_handle_target_level()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH 2/5] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in kvm_set_pte_rmapp()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH 1/5] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in validate_direct_spte()
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH 4/5] KVM: x86/mmu: Fix wrong start gfn of tlb flushing with range
- From: "Hou Wenlong" <houwenlong.hwl@xxxxxxxxxxxx>
- [PATCH v10 41/41] virtio_net: support set_ringparam
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 39/41] virtio_net: support rx queue resize
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 40/41] virtio_net: support tx queue resize
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 36/41] virtio_net: set the default max ring size by find_vqs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 34/41] virtio_mmio: support the arg sizes of find_vqs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 35/41] virtio: add helper virtio_find_vqs_ctx_size()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 38/41] virtio_net: split free_unused_bufs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 37/41] virtio_net: get ringparam by virtqueue_get_vring_max_size()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 33/41] virtio_pci: support the arg sizes of find_vqs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 32/41] virtio: find_vqs() add arg sizes
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 31/41] virtio_pci: support VIRTIO_F_RING_RESET
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 30/41] virtio_pci: extract the logic of active vq for modern pci
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 29/41] virtio_pci: introduce helper to get/set queue reset
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 28/41] virtio_pci: update struct virtio_pci_common_cfg
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 27/41] virtio: allow to unbreak/break virtqueue individually
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 26/41] virtio: queue_reset: add VIRTIO_F_RING_RESET
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 25/41] virtio_pci: struct virtio_pci_common_cfg add queue_notify_data
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 24/41] virtio_ring: introduce virtqueue_resize()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 23/41] virtio_ring: packed: introduce virtqueue_resize_packed()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 22/41] virtio_ring: packed: introduce virtqueue_reinit_packed()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 21/41] virtio_ring: packed: extract the logic of vring init
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 20/41] virtio_ring: packed: extract the logic of attach vring
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 19/41] virtio_ring: packed: extract the logic of alloc state and extra
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 18/41] virtio_ring: packed: extract the logic of alloc queue
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 17/41] virtio_ring: packed: introduce vring_free_packed
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 08/41] virtio_ring: introduce virtqueue_init()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 09/41] virtio_ring: split: introduce vring_free_split()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 10/41] virtio_ring: split: extract the logic of alloc queue
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 16/41] virtio_ring: split: introduce virtqueue_resize_split()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 06/41] virtio_ring: extract the logic of freeing vring
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 13/41] virtio_ring: split: extract the logic of vring init
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 11/41] virtio_ring: split: extract the logic of alloc state and extra
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 14/41] virtio_ring: split: introduce virtqueue_reinit_split()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 12/41] virtio_ring: split: extract the logic of attach vring
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 15/41] virtio_ring: split: reserve vring_align, may_reduce_num
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 07/41] virtio_ring: split vring_virtqueue
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 02/41] virtio: add helper virtqueue_get_vring_max_size()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 05/41] virtio_ring: remove the arg vq of vring_alloc_desc_extra()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 00/41] virtio pci support VIRTIO_F_RING_RESET
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 04/41] virtio_ring: update the document of the virtqueue_detach_unused_buf for queue reset
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 03/41] virtio: struct virtio_config_ops add callbacks for queue_reset
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH v10 01/41] remoteproc: rename len of rpoc_vring to num
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: selftest: Enhance handling WRMSR ICR register in x2APIC mode
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [PATCH v3 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v5 06/22] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v5 05/22] x86/virt/tdx: Prevent hot-add driver managed memory
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Reorganize KVM/x86 maintainership
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 2/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Reorganize KVM/x86 maintainership
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH v5 04/22] x86/virt/tdx: Prevent ACPI CPU hotplug and ACPI memory hotplug
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 4/8] x86: Improve set_mmu_range() to implement npt
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v1 00/10] KVM: nVMX: Use vmcs_config for setting up nested VMX MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v1 02/10] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v1 01/10] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH RFC v1 03/10] KVM: VMX: Move CPU_BASED_{CR3_LOAD,CR3_STORE,INVLPG}_EXITING filtering out of setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 2/2] Documentation/x86: Explain guest XSTATE permission control
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v7 19/23] KVM: x86/mmu: Zap collapsible SPTEs in shadow MMU at all possible levels
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 00/23] KVM: Extend Eager Page Splitting to the shadow MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v7 20/23] KVM: x86/mmu: pull call to drop_large_spte() into __link_shadow_page()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: arm64: permit MAP_SHARED mappings with MTE enabled
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 7/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Michael Roth <michael.roth@xxxxxxx>
- RE: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 22/23] KVM: x86/mmu: Extend Eager Page Splitting to nested MMUs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- RE: [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH 2/4] kvm: Merge "atomic" and "write" in __gfn_to_pfn_memslot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 12/13] vfio/mdev: consolidate all the description sysfs into the core code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 11/13] vfio/mdev: consolidate all the available_instance sysfs into the core code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 10/13] vfio/mdev: consolidate all the name sysfs into the core code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/4] kvm: Merge "atomic" and "write" in __gfn_to_pfn_memslot()
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 9/13] vfio/mdev: consolidate all the device_api sysfs into the core code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH 3/13] vfio/mdev: simplify mdev_type handling
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH Part2 v6 04/49] x86/sev: set SYSCFG.MFMD
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH 2/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 08897940f458ee55416cf80ab13d2d8b9f20038e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] KVM: selftest: Enhance handling WRMSR ICR register in x2APIC mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] kvm: Merge "atomic" and "write" in __gfn_to_pfn_memslot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/4] kvm/x86: Allow to respond to generic signals during slow page faults
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 02/13] vfio/mdev: embedd struct mdev_parent in the parent data structure
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/4] kvm/x86: Allow to respond to generic signals during slow page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 4/5] vfio/iommu_type1: Clean up update_dirty_scope in detach_group()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 1/5] iommu: Return -EMEDIUMTYPE for incompatible domain and device/group
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 2/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH v3 0/5] Simplify vfio_iommu_type1 attach/detach routine
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v7 22/23] KVM: x86/mmu: Extend Eager Page Splitting to nested MMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] kvm: Merge "atomic" and "write" in __gfn_to_pfn_memslot()
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 1/13] vfio/mdev: make mdev.h standalone includable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 4/4] kvm/x86: Allow to respond to generic signals during slow page faults
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 3/4] kvm: Add new pfn error KVM_PFN_ERR_INTR
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 08/14] aspeed: Replace direct get_system_memory() calls
- From: Peter Delevoryas <pdel@xxxxxx>
- Re: [PATCH 12/14] aspeed: Make aspeed_board_init_flashes public
- From: Peter Delevoryas <pdel@xxxxxx>
- Re: [PATCH 06/14] aspeed: Add system-memory QOM link to SoC
- From: Peter Delevoryas <pdel@xxxxxx>
- Re: [PATCH 11/14] aspeed: Switch to create_unimplemented_device_in
- From: Peter Delevoryas <pdel@xxxxxx>
- Re: [PATCH 04/14] sysbus: Add sysbus_mmio_map_in
- From: Peter Delevoryas <pdel@xxxxxx>
- Re: [PATCH 1/3] KVM: arm64: add a hypercall for disowning pages
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Reorganize KVM/x86 maintainership
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 12/14] aspeed: Make aspeed_board_init_flashes public
- From: Cédric Le Goater <clg@xxxxxxxx>
- [PATCH V2] KVM: SEV: Init target VMCBs in sev_migrate_from
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v5 0/8] KVM: x86: Add CMCI and UCNA emulation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- [PATCH] KVM: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH v7 22/23] KVM: x86/mmu: Extend Eager Page Splitting to nested MMUs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v6 1/4] vdpa: Add suspend operation
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 3/4] vhost-vdpa: uAPI to suspend the device
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 4/4] vdpa_sim: Implement suspend vdpa op
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 0/4] Implement vdpasim suspend operation
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v6 2/4] vhost-vdpa: introduce SUSPEND backend feature bit
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH 08/14] aspeed: Replace direct get_system_memory() calls
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH 01/14] sysbus: Remove sysbus_mmio_unmap
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH kvm-unit-tests] MAINTAINERS: Change drew's email address
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 04/10] vfio/ccw: Remove private->mdev
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] MAINTAINERS: Reorganize KVM/x86 maintainership
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 2/4] kvm: Merge "atomic" and "write" in __gfn_to_pfn_memslot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests] MAINTAINERS: Change drew's email address
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 4/4] kvm/x86: Allow to respond to generic signals during slow page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 8/8] s390x/s390-virtio-ccw: add zpcii-disable machine property
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] kvm: Add new pfn error KVM_PFN_ERR_INTR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] MAINTAINERS: Reorganize KVM/x86 maintainership
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests] MAINTAINERS: Change drew's email address
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v7 8/8] s390x/s390-virtio-ccw: add zpcii-disable machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] vfio: check vfio_register_iommu_driver() return value
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: add a hypercall for disowning pages
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH kvm-unit-tests] MAINTAINERS: Change drew's email address
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 08/14] aspeed: Replace direct get_system_memory() calls
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH 11/14] aspeed: Switch to create_unimplemented_device_in
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH 06/14] aspeed: Add system-memory QOM link to SoC
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 5.19, take #2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 04/14] sysbus: Add sysbus_mmio_map_in
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH 02/14] sysbus: Remove sysbus_address_space
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH 01/14] sysbus: Remove sysbus_mmio_unmap
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Reorganize KVM/x86 maintainership
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [RFC] vfio: remove useless judgement
- From: lizhe.67@xxxxxxxxxxxxx
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Reorganize KVM/x86 maintainership
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: selftest: Enhance handling WRMSR ICR register in x2APIC mode
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v2] KVM: selftest: Enhance handling WRMSR ICR register in x2APIC mode
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 02/19] KVM: x86: inhibit APICv/AVIC when the guest and/or host changes apic id/base from the defaults.
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 01/22] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH] KVM: selftest: Enhance handling WRMSR ICR register in x2APIC mode
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [syzbot] WARNING: suspicious RCU usage (5)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [syzbot] WARNING: suspicious RCU usage (5)
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 5.19, take #2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot] WARNING: suspicious RCU usage (5)
- From: syzbot <syzbot+9cbc6bed3a22f1d37395@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: drop unexpected word 'and' in the comments
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/22] x86/virt/tdx: Detect TDX during kernel boot
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] vhost-vdpa: call vhost_vdpa_cleanup during the release
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH 2/3] KVM: arm64: disown unused reserved-memory regions
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: allow MTE in protected VMs if the tag storage is known
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: add a hypercall for disowning pages
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: support MTE in protected VMs
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] vfio: Use device_iommu_capable()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 03/22] cc_platform: Add new attribute to prevent ACPI memory hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- RE: [RFC PATCH v4 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [PATCH] KVM: VMX: Move VM-exit RSB stuffing out of line
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- [PATCH 4/4] kvm/x86: Allow to respond to generic signals during slow page faults
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH 3/4] kvm: Add new pfn error KVM_PFN_ERR_INTR
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH 0/4] kvm/mm: Allow GUP to respond to non fatal signals
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH 2/4] kvm: Merge "atomic" and "write" in __gfn_to_pfn_memslot()
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: Peter Xu <peterx@xxxxxxxxxx>
- RE: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- [linux-next:master] BUILD REGRESSION ac0ba5454ca85162c08dc429fef1999e077ca976
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH] KVM: SEV: Init target VMCBs in sev_migrate_from
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v7 22/23] KVM: x86/mmu: Extend Eager Page Splitting to nested MMUs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 21/23] KVM: Allow for different capacities in kvm_mmu_memory_cache structs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 23/23] KVM: x86/mmu: Avoid unnecessary flush on eager page split
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 20/23] KVM: x86/mmu: pull call to drop_large_spte() into __link_shadow_page()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 19/23] KVM: x86/mmu: Zap collapsible SPTEs in shadow MMU at all possible levels
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 16/23] KVM: x86/mmu: Update page stats in __rmap_add()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 14/23] KVM: x86/mmu: Pass const memslot to rmap_add()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 17/23] KVM: x86/mmu: Cache the access bits of shadowed translations
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 12/23] KVM: x86/mmu: Pass kvm pointer separately from vcpu to kvm_mmu_find_shadow_page()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 13/23] KVM: x86/mmu: Allow NULL @vcpu in kvm_mmu_find_shadow_page()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 18/23] KVM: x86/mmu: Extend make_huge_page_split_spte() for the shadow MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 07/23] KVM: x86/mmu: Consolidate shadow page allocation and initialization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 11/23] KVM: x86/mmu: Replace vcpu with kvm in kvm_mmu_alloc_shadow_page()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 09/23] KVM: x86/mmu: Move guest PT write-protection to account_shadowed()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 10/23] KVM: x86/mmu: Pass memory caches to allocate SPs separately
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 08/23] KVM: x86/mmu: Rename shadow MMU functions that deal with shadow pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 02/23] KVM: x86/mmu: Use a bool for direct
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 04/23] KVM: x86/mmu: Derive shadow MMU page role from parent
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 15/23] KVM: x86/mmu: Decouple rmap_add() and link_shadow_page() from kvm_vcpu
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 06/23] KVM: x86/mmu: Decompose kvm_mmu_get_page() into separate functions
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 05/23] KVM: x86/mmu: Always pass 0 for @quadrant when gptes are 8 bytes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 01/23] KVM: x86/mmu: Optimize MMU page cache lookup for all direct SPs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 00/23] KVM: Extend Eager Page Splitting to the shadow MMU
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v7 03/23] KVM: x86/mmu: Stop passing "direct" to mmu_alloc_root()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: call vhost_vdpa_cleanup during the release
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- RE: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- RE: [PATCH Part2 v6 10/49] x86/fault: Add support to dump RMP entry on fault
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- RE: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v6 20/22] KVM: x86/mmu: Refactor drop_large_spte()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 08/10] KVM: nVMX: Use sanitized required-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 09/10] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 10/10] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 07/10] KVM: VMX: Store required-1 VMX controls in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 06/10] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 05/10] KVM: VMX: Add missing VMENTRY controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 04/10] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 03/10] KVM: VMX: Move CPU_BASED_{CR3_LOAD,CR3_STORE,INVLPG}_EXITING filtering out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 02/10] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 01/10] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH RFC v1 00/10] KVM: nVMX: Use vmcs_config for setting up nested VMX MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 20/22] KVM: x86/mmu: Refactor drop_large_spte()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 19/19] vdpasim: control virtqueue support
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 4/8] x86: Improve set_mmu_range() to implement npt
- From: "Shukla, Manali" <mashukla@xxxxxxx>
- Re: [PATCH v7 8/8] s390x/s390-virtio-ccw: add zpcii-disable machine property
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/8] s390x/pci: enable for load/store intepretation
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v4] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH] vhost-vdpa: call vhost_vdpa_cleanup during the release
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- Re: [PATCH v2 19/19] vdpasim: control virtqueue support
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 10/49] x86/fault: Add support to dump RMP entry on fault
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH Part2 v6 10/49] x86/fault: Add support to dump RMP entry on fault
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v6 13/22] KVM: x86/mmu: Allow NULL @vcpu in kvm_mmu_find_shadow_page()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v2] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- RE: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v6 03/22] KVM: x86/mmu: Stop passing @direct to mmu_alloc_root()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 23/23] arm64: Add an efi/run script
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] KVM: s390: drop unexpected word 'and' in the comments
- From: Jiang Jian <jiangjian@xxxxxxxxxx>
- Re: [PATCH v6 03/22] KVM: x86/mmu: Stop passing @direct to mmu_alloc_root()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 2/3] drm: Implement DRM aperture helpers under video/
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 3/3] vfio/pci: Remove console drivers
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 1/3] MAINTAINERS: Broaden scope of simpledrm entry
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v3 0/3] Improve vfio-pci primary GPU assignment behavior
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v7 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 22/23] arm64: Add support for efi in Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 21/23] x86: Move x86_64-specific EFI CFLAGS to x86_64 Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [Bug 213781] KVM: x86/svm: The guest (#vcpu>1) can't boot up with QEMU "-overcommit cpu-pm=on"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [Bug 213781] KVM: x86/svm: The guest (#vcpu>1) can't boot up with QEMU "-overcommit cpu-pm=on"
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 213781] KVM: x86/svm: The guest (#vcpu>1) can't boot up with QEMU "-overcommit cpu-pm=on"
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v2 2/2] vfio: Use device_iommu_capable()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- [PATCH v2 1/2] vfio/type1: Simplify bus_type determination
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v5 03/22] cc_platform: Add new attribute to prevent ACPI memory hotplug
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [PATCH v5 18/22] x86/virt/tdx: Configure TDX module with TDMRs and global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 10/22] x86/virt/tdx: Do logical-cpu scope TDX module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 17/22] x86/virt/tdx: Reserve TDX module global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 13/22] x86/virt/tdx: Add placeholder to construct TDMRs based on memblock
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 21/22] x86/virt/tdx: Support kexec()
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 22/22] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 16/22] x86/virt/tdx: Set up reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 11/22] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 20/22] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 14/22] x86/virt/tdx: Create TDMRs to cover all memblock memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 15/22] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 12/22] x86/virt/tdx: Convert all memory regions in memblock to TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 19/22] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 06/22] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 07/22] x86/virt/tdx: Implement SEAMCALL function
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 04/22] x86/virt/tdx: Prevent ACPI CPU hotplug and ACPI memory hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 03/22] cc_platform: Add new attribute to prevent ACPI memory hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 08/22] x86/virt/tdx: Shut down TDX module in case of error
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 00/22] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 01/22] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 02/22] cc_platform: Add new attribute to prevent ACPI CPU hotplug
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 05/22] x86/virt/tdx: Prevent hot-add driver managed memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v5 09/22] x86/virt/tdx: Detect TDX module by doing module global initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 27/49] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [PATCH v2 19/19] vdpasim: control virtqueue support
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- [PATCH v2] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- RE: [PATCH] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] KVM: x86/xen: Update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH v7 8/8] s390x/s390-virtio-ccw: add zpcii-disable machine property
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH V3] virtio: disable notification hardening by default
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v7 3/8] s390x/pci: enable for load/store intepretation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Don't expose TSC scaling to L1 when on Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 3/5] vfio/iommu_type1: Remove the domain->ops comparison
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH V3] virtio: disable notification hardening by default
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V3] virtio: disable notification hardening by default
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [RFC PATCH v4 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: "Huang, Shaoqin" <shaoqin.huang@xxxxxxxxx>
- [PATCH v2 1/1] vfio: check vfio_register_iommu_driver() return value
- From: Bo Liu <liubo03@xxxxxxxxxx>
- Re: WARNING in kvm_arch_vcpu_ioctl_run (3)
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH Part2 v6 17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- RE: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- [PATCH V3] virtio: disable notification hardening by default
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RFT][PATCH v1 3/6] vfio: Pass in starting IOVA to vfio_pin/unpin_pages API
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH V2] virtio: disable notification hardening by default
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [RFC PATCH v4 2/7] KVM: x86: Move *_in_guest power management flags to vCPU scope
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v4 0/7] KVM: x86: add per-vCPU exits disable capability
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v4 5/7] KVM: x86: add vCPU scoped toggling for disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v4 1/7] KVM: x86: only allow exits disable before vCPUs created
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v4 7/7] KVM: selftests: Add tests for VM and vCPU cap KVM_CAP_X86_DISABLE_EXITS
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v4 4/7] KVM: x86: Let userspace re-enable previously disabled exits
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v4 3/7] KVM: x86: Reject disabling of MWAIT interception when not allowed
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- [RFC PATCH v4 6/7] KVM: x86: Add a new guest_debug flag forcing exit to userspace
- From: Kechen Lu <kechenl@xxxxxxxxxx>
- Re: [PATCH v2 2/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 23/23] arm64: Add an efi/run script
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 22/23] arm64: Add support for efi in Makefile
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 22/23] arm64: Add support for efi in Makefile
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 2/5] vfio/iommu_type1: Prefer to reuse domains vs match enforced cache coherency
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 21/23] x86: Move x86_64-specific EFI CFLAGS to x86_64 Makefile
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 20/23] lib: Avoid external dependency in libelf
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 19/23] arm64: Use code from the gnu-efi when booting with EFI
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH Part2 v6 18/49] crypto: ccp: Provide APIs to query extended attestation report
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH Part2 v6 17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 34d1d36073ea4d4c532e8c8345627a9702be799e
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH MANUALSEL 5.18 1/6] KVM: x86: do not report a vCPU as preempted outside instruction boundaries
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 3/3] KVM: selftests: Restrict test region to 48-bit physical addresses when using nested
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 1/3] KVM: x86: disable preemption while updating apicv inhibition
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.17 2/3] KVM: x86: disable preemption around the call to kvm_arch_vcpu_{un|}blocking
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 3/3] KVM: selftests: Restrict test region to 48-bit physical addresses when using nested
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 2/3] KVM: x86: disable preemption around the call to kvm_arch_vcpu_{un|}blocking
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH MANUALSEL 5.18 1/3] KVM: x86: disable preemption while updating apicv inhibition
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFT][PATCH v1 1/6] vfio/ap: Pass in physical address of ind to ap_aqic()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH v20 10/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on assign/unassign
- From: "Jason J. Herne" <jjherne@xxxxxxxxxxxxx>
- Re: [PATCH v20 20/20] MAINTAINERS: pick up all vfio_ap docs for VFIO AP maintainers
- From: "Jason J. Herne" <jjherne@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] vfio/type1: Simplify bus_type determination
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- RE: [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 17/23] arm64: Copy code from GNU-EFI
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v6 19/22] KVM: x86/mmu: Zap collapsible SPTEs in shadow MMU at all possible levels
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- RE: [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- RE: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: "Kalra, Ashish" <Ashish.Kalra@xxxxxxx>
- Re: [PATCH] vfio: check vfio_register_iommu_driver() return value
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 10/22] KVM: x86/mmu: Pass memory caches to allocate SPs separately
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 19/22] KVM: x86/mmu: Zap collapsible SPTEs in shadow MMU at all possible levels
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH RFC 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 10/22] KVM: x86/mmu: Pass memory caches to allocate SPs separately
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 15/23] arm64: Add a new type of memory type flag MR_F_RESERVED
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 13/23] arm/arm64: Rename etext to _etext
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH vfio 2/2] vfio: Split migration ops from main device ops
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: "Dr. David Alan Gilbert" <dgilbert@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 11/23] lib/efi: Add support for getting the cmdline
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 10/23] lib/printf: Add support for printing wide strings
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [kvm-unit-tests PATCH v2 06/23] arm/arm64: Add support for discovering the UART through ACPI
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 05/23] arm/arm64: Add support for setting up the PSCI conduit through ACPI
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH 04/11] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 09/11] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 01/11] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 08/11] KVM: VMX: Support TSC scaling with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 03/11] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 00/11] KVM: VMX: Support TscScaling and EnclsExitingBitmap whith eVMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH QEMU EXAMPLE] i386: Support Enlightened VMCS revisions
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 05/11] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 11/11] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 02/11] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 10/11] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 06/11] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 07/11] KVM: selftests: Switch to KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v20 19/20] s390/Docs: new doc describing lock usage by the vfio_ap device driver
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 15/20] s390/vfio-ap: implement in-use callback for vfio_ap driver
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 20/20] MAINTAINERS: pick up all vfio_ap docs for VFIO AP maintainers
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 18/20] s390/vfio-ap: update docs to include dynamic config support
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 14/20] s390/vfio-ap: reset queues after adapter/domain unassignment
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 16/20] s390/vfio-ap: sysfs attribute to display the guest's matrix
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 12/20] s390/vfio-ap: allow hot plug/unplug of AP devices when assigned/unassigned
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 13/20] s390/vfio-ap: hot plug/unplug of AP devices when probed/removed
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 17/20] s390/vfio-ap: handle config changed and scan complete notification
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 10/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on assign/unassign
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 11/20] s390/vfio-ap: prepare for dynamic update of guest's APCB on queue probe/remove
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 06/20] s390/vfio-ap: allow assignment of unavailable AP queues to mdev device
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 08/20] s390/vfio-ap: introduce new mutex to control access to the KVM pointer
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 09/20] s390/vfio-ap: use proper locking order when setting/clearing KVM pointer
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 04/20] s390/vfio-ap: introduce shadow APCB
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 02/20] s390/vfio-ap: move probe and remove callbacks to vfio_ap_ops.c
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 07/20] s390/vfio-ap: rename matrix_dev->lock mutex to matrix_dev->mdevs_lock
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 05/20] s390/vfio-ap: refresh guest's APCB by filtering AP resources assigned to mdev
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 03/20] s390/vfio-ap: manage link between queue struct and matrix mdev
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 01/20] s390/vfio-ap: use new AP bus interface to search for queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v20 00/20] s390/vfio-ap: dynamic configuration support
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/3] More skey instr. emulation test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/3] s390x: Rework TEID decoding and usage
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 19/19] vdpasim: control virtqueue support
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [kvm-unit-tests PATCH] Add test for #SMI during interrupt window
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 01/11] KVM: x86: emulator: em_sysexit should update ctxt->mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 07/11] KVM: x86: emulator/smm: add structs for KVM's smram layout
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 08/11] KVM: x86: emulator/smm: use smram struct for 32 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 10/11] KVM: x86: SVM: use smram structs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 11/11] KVM: x86: emulator/smm: preserve interrupt shadow in SMRAM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 06/11] KVM: x86: emulator/smm: number of GPRs in the SMRAM image depends on the image format
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 05/11] KVM: x86: emulator: update the emulation mode after CR0 write
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 02/11] KVM: x86: emulator: introduce update_emulation_mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 03/11] KVM: x86: emulator: remove assign_eip_near/far
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 09/11] KVM: x86: emulator/smm: use smram struct for 64 bit smram load/restore
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 04/11] KVM: x86: emulator: update the emulation mode after rsm
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH v2 00/11] SMM emulation and interrupt shadow fixes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: selftests: Consolidate ucall code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: selftests: Consolidate boilerplate code in get_ucall()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/3] s390x: Test TEID values in storage key test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 3/3] s390x: Test effect of storage keys on diag 308
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/3] s390x: Test effect of storage keys on some more instructions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/3] More skey instr. emulation test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] s390x: Rework TEID decoding and usage
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] s390x: lib: SOP facility query function
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] s390x: Fix sclp facility bit numbers
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v7 17/39] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 00/39] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 17/39] KVM: x86: hyper-v: L2 TLB flush
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 1/2] drm: Implement DRM aperture helpers under video/
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 1/2] drm: Implement DRM aperture helpers under video/
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH V2] virtio: disable notification hardening by default
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH V2] virtio: disable notification hardening by default
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH V2] virtio: disable notification hardening by default
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH Part2 v6 01/49] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC 1/4] mm/gup: Add FOLL_INTERRUPTIBLE
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] KVM: Fix a typo
- From: Zhang Jiaming <jiaming@xxxxxxxxxxxx>
- RE: [PATCH] KVM: x86/vmx: Suppress posted interrupt notification when CPU is in host
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vfio: check vfio_register_iommu_driver() return value
- From: Bo Liu <liubo03@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [External] [PATCH v9 9/9] KVM: VMX: enable IPI virtualization
- From: Shenming Lu <lushenming@xxxxxxxxxxxxx>
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 2/2] vfio/pci: Remove console drivers
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH v2 1/2] drm: Implement DRM aperture helpers under video/
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH] RISC-V: KVM: Improve ISA extension by using a bitmap
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH Part2 v6 48/49] *debug: warn and retry failed rmpupdates
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 49/49] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 47/49] *fix for stale per-cpu pointer due to cond_resched during ghcb mapping
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 45/49] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 46/49] ccp: add support to decrypt the page
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 44/49] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 43/49] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 42/49] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 41/49] KVM: SVM: Add support to handle the RMP nested page fault
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 40/49] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 33/49] KVM: x86: Update page-fault trace to log full 64-bit error code
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 39/49] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 37/49] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 38/49] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 36/49] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 35/49] KVM: SVM: Remove the long-lived GHCB host map
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 28/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 32/49] KVM: x86: Define RMP page fault error bits for #NPF
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 34/49] KVM: SVM: Do not use long-lived GHCB map while setting scratch area
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 30/49] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX and SNP
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 29/49] KVM: X86: Keep the NPT and RMP page level in sync
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 31/49] KVM: x86: Introduce kvm_mmu_get_tdp_walk() for SEV-SNP use
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 27/49] KVM: SVM: Mark the private vma unmerable for SEV-SNP guests
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 22/49] KVM: SVM: Add initial SEV-SNP support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 24/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 20/49] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 26/49] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 23/49] KVM: SVM: Add KVM_SNP_INIT command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 21/49] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 25/49] KVM: SVM: Disallow registering memory range from HugeTLB for SNP guest
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 19/49] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 18/49] crypto: ccp: Provide APIs to query extended attestation report
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 17/49] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 15/49] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 16/49] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 14/49] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 13/49] crypto:ccp: Provide APIs to issue SEV-SNP commands
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 12/49] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 08/49] x86/traps: Define RMP violation #PF error code
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 09/49] x86/fault: Add support to handle the RMP fault for user address
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 11/49] crypto:ccp: Define the SEV-SNP commands
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 10/49] x86/fault: Add support to dump RMP entry on fault
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 06/49] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 05/49] x86/sev: Add RMP entry lookup helpers
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 00/49] Add AMD Secure Nested Paging (SEV-SNP)
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 01/49] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 04/49] x86/sev: set SYSCFG.MFMD
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 03/49] x86/sev: Add the host SEV-SNP initialization support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- [PATCH Part2 v6 02/49] iommu/amd: Introduce function to check SEV-SNP support
- From: Ashish Kalra <Ashish.Kalra@xxxxxxx>
- Re: [Patch 1/1] vfio: Move "device->open_count--" out of group_rwsem in vfio_device_open()
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: "Limonciello, Mario" <mario.limonciello@xxxxxxx>
- Re: [PATCH 1/2] x86: notify hypervisor about guest entering s2idle state
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [RFT][PATCH v1 5/6] vfio/ccw: Add kmap_local_page() for memcpy
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFT][PATCH v1 6/6] vfio: Replace phys_pfn with phys_page for vfio_pin_pages()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/5] KVM: x86: Quirk "MWAIT never faults" behavior
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/7] KVM: x86: Attempt to wrangle PEBS/PMU into submission
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86: Ignore benign host accesses to "unsupported" PEBS and BTS MSRs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 6/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v8 12/12] s390x/cpu_topology: activating CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 10/12] s390x/cpu_topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 09/12] target/s390x: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 06/12] s390x/cpu_topology: Adding drawers to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 08/12] s390x/cpu_topology: implementing numa for the s390x topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 11/12] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 07/12] s390x/cpu_topology: Adding drawers to STSI
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 02/12] s390x/cpu_topology: CPU topology objects and structures
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 05/12] s390x/cpu_topology: Adding books to STSI
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 00/12] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 01/12] Update Linux Headers
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 04/12] s390x/cpu_topology: Adding books to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v8 03/12] s390x/cpu_topology: implementating Store Topology System Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [Bug 216026] Fails to compile using gcc 12.1 under Ubuntu 22.04
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Andrew Jones <drjones@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Increase UCALL_MAX_ARGS to 7
- From: Andrew Jones <drjones@xxxxxxxxxx>
- [PATCH 5.10 75/84] KVM: SVM: Use kzalloc for sev ioctl interfaces to prevent kernel data leak
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 3/3] KVM: s390: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v10 2/3] KVM: s390: guest support for topology function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v10 1/3] KVM: s390: ipte lock for SCA access should be contained in KVM
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v10 0/3] s390x: KVM: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] KVM: selftests: Fix filename reporting in guest asserts
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: selftests: Consolidate ucall code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Improve vfio-pci primary GPU assignment behavior
- From: Laszlo Ersek <lersek@xxxxxxxxxx>
- Re: Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959
- From: 潘高宁 <pgn@xxxxxxxxxx>
- Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Alexander Mikhalitsyn <alexander.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 03/23] lib: Add support for the XSDT ACPI table
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [Question] debugging VM cpu hotplug (#GP -> #DF) which results in reset
- From: Alexander Mikhalitsyn <alexander.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [External] [PATCH v9 9/9] KVM: VMX: enable IPI virtualization
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 5/5] vfio/iommu_type1: Simplify group attachment
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [External] [PATCH v9 9/9] KVM: VMX: enable IPI virtualization
- From: Shenming Lu <lushenming@xxxxxxxxxxxxx>
- Re: [RFT][PATCH v1 1/6] vfio/ap: Pass in physical address of ind to ap_aqic()
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH v11 18/19] KVM: s390: pv: avoid export before import if possible
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v11 15/19] KVM: s390: pv: asynchronous destroy for reboot
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]