Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v3 03/23] KVM: x86/mmu: Derive shadow MMU page role from parent
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 02/23] KVM: x86/mmu: Use a bool for direct
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 01/23] KVM: x86/mmu: Optimize MMU page cache lookup for all direct SPs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v3 00/23] KVM: Extend Eager Page Splitting to the shadow MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v6 60/64] KVM: arm64: nv: Sync nested timer state with ARMv8.4
- From: Chase Conklin <chase.conklin@xxxxxxx>
- Re: [PATCH 1/2] KVM: s390: Don't indicate suppression on dirtying, failing memop
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: s390: Don't indicate suppression on dirtying, failing memop
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] x86: uaccess CMPXCHG + KVM bug fixes
- From: Tadeusz Struk <tadeusz.struk@xxxxxxxxxx>
- [PATCH 2/2] KVM: s390: selftest: Test suppression indication on key prot exception
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH 1/2] KVM: s390: Don't indicate suppression on dirtying, failing memop
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH 0/2] Dirtying, failing memop: don't indicate suppression
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH] KVM: SVM: Re-inject soft interrupts instead of retrying instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: nSVM: Don't forget about L1-injected events
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] Second batch of KVM changes for Linux 5.18
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v9 11/18] s390/mm: KVM: pv: when tearing down, try to destroy protected pages
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 13/18] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.10 44/65] tuntap: add sanity checks about msg_controllen in sendmsg
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 042/109] KVM: arm64: Do not change the PMU event filter after a VCPU has run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 26/37] tuntap: add sanity checks about msg_controllen in sendmsg
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 52/98] vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 079/109] tuntap: add sanity checks about msg_controllen in sendmsg
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.16 063/109] vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 68/98] tuntap: add sanity checks about msg_controllen in sendmsg
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 3/6] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 055/149] kvm: selftests: aarch64: fix some vgic related comments
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 056/149] kvm: selftests: aarch64: use a tighter assert in vgic_poke_irq()
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 054/149] kvm: selftests: aarch64: fix the failure check in kvm_set_gsi_routing_irqchip_check
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 114/149] tuntap: add sanity checks about msg_controllen in sendmsg
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 092/149] vfio/pci: Stub vfio_pci_vga_rw when !CONFIG_VFIO_PCI_VGA
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 052/149] kvm: selftests: aarch64: fix assert in gicv3_access_reg
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 059/149] KVM: arm64: Do not change the PMU event filter after a VCPU has run
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.17 053/149] kvm: selftests: aarch64: pass vgic_irq guest args as a pointer
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v9 04/18] KVM: s390: pv: refactor s390_reset_acc
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 01/18] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC PATCH v5 038/104] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: MMU: fix an IS_ERR() vs NULL bug
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Don't split hugepages outside of MMU write lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH] KVM: MMU: fix an IS_ERR() vs NULL bug
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: remove unnecessary flush_workqueue()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: Documentation: Update kvm_run structure for dirty quota
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/2] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 1/2] s390x: gs: move to new header file
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 0/2] s390x: Add tests for SIGP store adtl status
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH -next] KVM: x86/mmu: Fix return value check in kvm_mmu_init_tdp_mmu()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL 24/27] s390x: skey: remove check for old z/VM version
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 23/27] s390x: remove spurious includes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 25/27] lib: s390x: rename and refactor vm.[ch]
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 26/27] lib: s390x: functions for machine models
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 27/27] lib: s390x: stidp wrapper and move get_machine_id
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 22/27] s390x: snippets: c: Load initial cr0
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 21/27] s390x: stsi: check zero and ignored bits in r0 and r1
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 19/27] s390x: smp: add tests for CONDITIONAL EMERGENCY
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 18/27] s390x: smp: add test for EMERGENCY_SIGNAL with invalid CPU address
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 20/27] s390x: add TPROT tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 17/27] s390x: smp: add tests for SET_PREFIX
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 14/27] s390x: Add EPSW test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 15/27] s390x: smp: add tests for several invalid SIGP orders
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 16/27] s390x: smp: stop already stopped CPU
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 12/27] s390x: Add more tests for STSCH
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 11/27] s390x: Add more tests for SSCH
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 13/27] s390x: Add tests for TSCH
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 10/27] s390x: Add tests for STCRW
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 09/27] s390x: Add sck tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 01/27] lib: s390x: smp: Retry SIGP SENSE on CC2
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 07/27] s390x: Add more tests for MSCH
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 06/27] lib: s390x: smp: Remove smp_sigp_retry
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 03/27] s390x: smp: Fix checks for SIGP STOP STORE STATUS
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 05/27] s390x: smp: Create and use a non-waiting CPU restart
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 02/27] s390x: smp: Test SIGP RESTART against stopped CPU
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 08/27] s390x: Add test for PFMF low-address protection
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 04/27] s390x: smp: Create and use a non-waiting CPU stop
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 00/27] s390x: smp, vm lib updates; I/O and smp tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH] KVM: MMU: fix an IS_ERR() vs NULL bug
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- 答复: [PATCH] KVM: x86: fix sending PV IPI
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- [PATCH] KVM: x86/mmu: remove unnecessary flush_workqueue()
- Re: [kvm-unit-tests PATCH v2 3/5] lib: s390: rename and refactor vm.[ch]
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v2 5/5] KVM: X86: Expose PREEMT_COUNT CPUID feature bit to guest
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH v2 3/5] KVM: X86: Boost vCPU which is in critical section
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH v2 4/5] x86/kvm: Add MSR_KVM_PREEMPT_COUNT guest support
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH v2 1/5] KVM: X86: Add MSR_KVM_PREEMPT_COUNT support
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH v2 2/5] KVM: X86: Add last guest interrupt disable state support
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH v2 0/5] KVM: X86: Scaling Guest OS Critical Sections with boosting
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 4/5] lib: s390x: functions for machine models
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/5] s390x: skey: remove check for old z/VM version
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] x86: uaccess CMPXCHG + KVM bug fixes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v5 037/104] KVM: x86/mmu: Allow non-zero init value for shadow PTE
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH -next] KVM: x86/mmu: Fix return value check in kvm_mmu_init_tdp_mmu()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- Re: [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 4/6] KVM: selftests: Dump VM stats in binary stats test
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 3/6] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 5/6] KVM: selftests: Test reading a single stat
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 2/6] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 6/6] selftests: KVM: use page stats to check if dirty logging works properly
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 1/6] KVM: x86/mmu: Set lpage_disallowed in TDP MMU before setting SPTE
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v3 0/6] Verify dirty logging works properly with page stats
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Don't split hugepages outside of MMU write lock
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH v5 038/104] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v5 037/104] KVM: x86/mmu: Allow non-zero init value for shadow PTE
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 15/19] vhost-vdpa: support ASID based IOTLB API
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v7 8/8] KVM: VMX: enable IPI virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v5 033/104] KVM: x86: Add infrastructure for stolen GPA bits
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v5 032/104] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v5 033/104] KVM: x86: Add infrastructure for stolen GPA bits
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 7/8] KVM: x86: Allow userspace set maximum VCPU id for VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v5 032/104] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH RESEND 2/5] KVM: X86: Add guest interrupt disable state support
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: arm64: Limit feature register reads from AArch32
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: arm64: Start trapping ID registers for 32 bit guests
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 2/3] KVM: arm64: Plumb cp10 ID traps through the AArch64 sysreg handler
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: arm64: Wire up CP15 feature registers to their AArch64 equivalents
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH -next] KVM: x86/xen: Remove duplicated include in xen.c
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: nSVM: Don't forget about L1-injected events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v5 024/104] KVM: TDX: create/destroy VM structure
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/5] KVM: nSVM: Don't forget about L1-injected events
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/8] KVM: x86: Add support for vICR APIC-write VM-Exits in x2APIC mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 4/8] KVM: VMX: dump_vmcs() reports tertiary_exec_control field as well
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/8] KVM: VMX: Detect Tertiary VM-Execution control when setup VMCS config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 2/8] KVM: VMX: Extend BUILD_CONTROLS_SHADOW macro to support 64-bit variation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: MMU: propagate alloc_workqueue failure
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Resolve nx_huge_pages when kvm.ko is loaded
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v5 024/104] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH RESEND 2/5] KVM: X86: Add guest interrupt disable state support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 16/26] KVM: x86/mmu: Cache the access bits of shadowed translations
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH] KVM: arm64: Don't split hugepages outside of MMU write lock
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Add cond_resched() to loop in sev_clflush_pages()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH v5 023/104] x86/cpu: Add helper functions to allocate/free MKTME keyid
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 20/26] KVM: x86/mmu: Extend Eager Page Splitting to the shadow MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH v5 021/104] KVM: x86: Introduce hooks to free VM callback prezap and vm_free
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RIP: 0010:param_get_bool.cold+0x0/0x2 - LTP read_all_sys - 5.17.0
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: RIP: 0010:param_get_bool.cold+0x0/0x2 - LTP read_all_sys - 5.17.0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: RIP: 0010:param_get_bool.cold+0x0/0x2 - LTP read_all_sys - 5.17.0
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 5/5] lib: s390x: stidp wrapper and move get_machine_id
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/5] lib: s390x: functions for machine models
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/5] lib: s390: rename and refactor vm.[ch]
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/5] s390x: skey: remove check for old z/VM version
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/5] s390x: remove spurious includes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/5] lib: s390x: Refactor and rename vm.[ch]
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: Implement dirty quota-based throttling of vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Wire up CP15 feature registers to their AArch64 equivalents
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: Documentation: Update kvm_run structure for dirty quota
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 4/4] lib: s390x: stidp wrapper and move get_machine_id
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 3/4] lib: s390x: functions for machine models
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/4] lib: s390: rename and refactor vm.[ch]
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/4] s390x: remove spurious includes
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] s390x: snippets: c: Load initial cr0
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC PATCH v3 17/36] pflash_cfi01/tdx: Introduce ram_mode of pflash for TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9 13/18] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL] virtio: features, fixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v9 11/18] s390/mm: KVM: pv: when tearing down, try to destroy protected pages
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v9 10/18] KVM: s390: pv: add mmu_notifier
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v9 04/18] KVM: s390: pv: refactor s390_reset_acc
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [next ] x86: Assembler messages: Error: invalid operands (*UND* and .data..percpu sections) for `+'
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v9 01/18] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [kvm-unit-tests PATCH] s390x: snippets: c: Load initial cr0
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [next ] x86: Assembler messages: Error: invalid operands (*UND* and .data..percpu sections) for `+'
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: [RFC PATCH v5 032/104] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v5 033/104] KVM: x86: Add infrastructure for stolen GPA bits
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH] x86, kvm: fix compilation for !CONFIG_PARAVIRT_SPINLOCKS or !CONFIG_SMP
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: MMU: propagate alloc_workqueue failure
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH v3 17/36] pflash_cfi01/tdx: Introduce ram_mode of pflash for TDVF
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [RFC PATCH v3 17/36] pflash_cfi01/tdx: Introduce ram_mode of pflash for TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: question about arch/riscv/kvm/mmu.c
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- Re: [PATCH v3 2/3] KVM: Documentation: Update kvm_run structure for dirty quota
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [RFC PATCH v3 17/36] pflash_cfi01/tdx: Introduce ram_mode of pflash for TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: question about arch/riscv/kvm/mmu.c
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: VMX: Enable PKS for nested VM
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Update AMD PMC smaple period to fix guest NMI-watchdog
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- Re: question about arch/riscv/kvm/mmu.c
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Wire up CP15 feature registers to their AArch64 equivalents
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v6 5/7] KVM: MMU: Add support for PKS emulation
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- RE: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Add proper cache tracking for PKRS
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [RFC PATCH v5 027/104] KVM: TDX: initialize VM with TDX specific parameters
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Update AMD PMC smaple period to fix guest NMI-watchdog
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v5 024/104] KVM: TDX: create/destroy VM structure
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Marc Orr <marcorr@xxxxxxxxxx>
- Re: [RFC PATCH v5 021/104] KVM: x86: Introduce hooks to free VM callback prezap and vm_free
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFCv2 PATCH 09/12] KVM: SVM: Refresh AVIC settings when changing APIC mode
- From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
- Re: [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Update AMD PMC smaple period to fix guest NMI-watchdog
- From: "wangyanan (Y)" <wangyanan55@xxxxxxxxxx>
- 答复: linux-next: manual merge of the kvm tree with Linus' tree
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [RFC PATCH v5 023/104] x86/cpu: Add helper functions to allocate/free MKTME keyid
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 2/3] KVM: Documentation: Update kvm_run structure for dirty quota
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v18 17/18] s390/Docs: new doc describing lock usage by the vfio_ap device driver
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/3] KVM: Implement dirty quota-based throttling of vcpus
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v5 008/104] KVM: TDX: Add a function to initialize TDX module
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: MMU: propagate alloc_workqueue failure
- From: David Matlack <dmatlack@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with Linus' tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 10/11] KVM: x86/MMU: Require reboot permission to disable NX hugepages
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: nSVM: Don't forget about L1-injected events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: nSVM: Don't forget about L1-injected events
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: nSVM: Don't forget about L1-injected events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 7/7] KVM: VMX: Enable PKS for nested VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 6/7] KVM: VMX: Expose PKS to guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 5/7] KVM: MMU: Add support for PKS emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [EXTERNAL] linux-next: Signed-off-bys missing for commits in the kvm tree
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v6 2/7] KVM: VMX: Add proper cache tracking for PKRS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- linux-next: Signed-off-bys missing for commits in the kvm tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/7] KVM: VMX: Introduce PKS VMCS fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v18 15/18] s390/vfio-ap: handle config changed and scan complete notification
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/11] KVM: selftests: Test reading a single stat
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v3 02/11] KVM: selftests: Dump VM stats in binary stats test
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v2 20/26] KVM: x86/mmu: Extend Eager Page Splitting to the shadow MMU
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2] Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 16/26] KVM: x86/mmu: Cache the access bits of shadowed translations
- From: Peter Xu <peterx@xxxxxxxxxx>
- [PATCH v3] KVM, SEV: Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v2 18/19] vdpa_sim: filter destination mac address
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 16/19] vdpa_sim: advertise VIRTIO_NET_F_MTU
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 19/19] vdpasim: control virtqueue support
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 13/19] vhost-vdpa: uAPI to get virtqueue group id
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 17/19] vdpa_sim: factor out buffer completion logic
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 15/19] vhost-vdpa: support ASID based IOTLB API
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 14/19] vhost-vdpa: introduce uAPI to set group ASID
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 12/19] vhost-vdpa: introduce uAPI to get the number of address spaces
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 11/19] vhost-vdpa: introduce uAPI to get the number of virtqueue groups
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 10/19] vhost-vdpa: introduce asid based IOTLB
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 09/19] vhost: support ASID in IOTLB API
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 07/19] vdpa: introduce config operations for associating ASID to a virtqueue group
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 08/19] vhost_iotlb: split out IOTLB initialization
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 06/19] vdpa: multiple address spaces support
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 05/19] vdpa: introduce virtqueue groups
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 04/19] vhost-vdpa: switch to use vhost-vdpa specific IOTLB
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 03/19] vhost-vdpa: passing iotlb to IOMMU mapping helpers
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 02/19] virtio-vdpa: don't set callback if virtio doesn't need it
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 01/19] vhost: move the backend feature bits to vhost_types.h
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- [PATCH v2 00/19] Control VQ support in vDPA
- From: Gautam Dawar <gautam.dawar@xxxxxxxxxx>
- Re: [PATCH v3 10/11] KVM: x86/MMU: Require reboot permission to disable NX hugepages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 02/11] KVM: selftests: Dump VM stats in binary stats test
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 03/11] KVM: selftests: Test reading a single stat
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 10/11] KVM: x86/MMU: Require reboot permission to disable NX hugepages
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 11/11] selftests: KVM: Test disabling NX hugepages on a VM
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 07/11] KVM: x86/MMU: Factor out updating NX hugepages state for a VM
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 00/11] KVM: x86: Add a cap to disable NX hugepages on a VM
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 09/11] KVM: x86: Fix errant brace in KVM capability handling
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 05/11] KVM: selftests: Improve error message in vm_phy_pages_alloc
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 08/11] KVM: x86/MMU: Allow NX huge pages to be disabled on a per-vm basis
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 06/11] KVM: selftests: Add NX huge pages test
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 01/11] KVM: selftests: Add vm_alloc_page_table_in_memslot library function
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH v3 04/11] KVM: selftests: Add memslot parameter to elf_load
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [PATCH] KVM: MMU: propagate alloc_workqueue failure
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SEV: Add cond_resched() to loop in sev_clflush_pages()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH] KVM: SEV: Add cond_resched() to loop in sev_clflush_pages()
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH V3 2/4] KVM: X86: Introduce role.glevel for level expanded pagetable
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v3.1 0/4] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [kvm-unit-tests PATCH v1 0/4] lib: s390x: Refactor and rename vm.[ch]
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 3/4] lib: s390x: functions for machine models
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 2/4] lib: s390: rename and refactor vm.[ch]
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 4/4] lib: s390x: stidp wrapper and move get_machine_id
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/4] s390x: remove spurious includes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/26] KVM: x86/mmu: Rename shadow MMU functions that deal with shadow pages
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 03/26] KVM: x86/mmu: Derive shadow MMU page role from parent
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC PATCH V3 4/4] KVM: X86: Use passthrough and pae_root shadow page for 32bit guests
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH V3 3/4] KVM: X86: Alloc role.pae_root shadow page
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH V3 1/4] KVM: X86: Add arguement gfn and role to kvm_mmu_alloc_page()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH V3 0/4] KVM: X86: Add and use shadow page with level expanded or acting as pae_root
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH V3 2/4] KVM: X86: Introduce role.glevel for level expanded pagetable
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH v9 08/18] KVM: s390: pv: clear the state without memset
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: RIP: 0010:param_get_bool.cold+0x0/0x2 - LTP read_all_sys - 5.17.0
- From: Jan Stancek <jstancek@xxxxxxxxxx>
- [PATCH v3 2/9] s390: uv: Add dump fields to query
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 6/9] kvm: s390: Add configuration dump functionality
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v9 00/18] KVM: s390: pv: implement lazy destroy for reboot
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 07/18] KVM: s390: pv: module parameter to fence lazy destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 16/18] KVM: s390: pv: add KVM_CAP_S390_PROTECTED_ASYNC_DISABLE
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 06/18] KVM: s390: pv: add export before import
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 12/18] KVM: s390: pv: refactoring of kvm_s390_pv_deinit_vm
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 11/18] s390/mm: KVM: pv: when tearing down, try to destroy protected pages
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 13/18] KVM: s390: pv: cleanup leftover protected VMs if needed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 10/18] KVM: s390: pv: add mmu_notifier
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 17/18] KVM: s390: pv: avoid export before import if possible
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 18/18] KVM: s390: pv: support for Destroy fast UVC
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 15/18] KVM: s390: pv: api documentation for asynchronous destroy
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 14/18] KVM: s390: pv: asynchronous destroy for reboot
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 09/18] KVM: s390: pv: Add kvm_s390_cpus_from_pv to kvm-s390.h and add documentation
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 02/18] KVM: s390: pv: handle secure storage violations for protected guests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 04/18] KVM: s390: pv: refactor s390_reset_acc
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 05/18] KVM: s390: pv: usage counter instead of flag
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 03/18] KVM: s390: pv: handle secure storage exceptions for normal guests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v9 01/18] KVM: s390: pv: leak the topmost page table when destroy fails
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v3 8/9] Documentation: virt: Protected virtual machine dumps
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 7/9] kvm: s390: Add CPU dump functionality
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 9/9] Documentation/virt/kvm/api.rst: Add protvirt dump/info api descriptions
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 4/9] KVM: s390: pv: Add dump support definitions
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 5/9] KVM: s390: pv: Add query dump information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 0/9] kvm: s390: Add PV dump support
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 3/9] KVM: s390: pv: Add query interface
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 1/9] s390: pv: Add SE hdr query information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 1/8] KVM: x86: avoid loading a vCPU after .vm_destroy was called
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 8/8] KVM: x86: SVM: remove vgif_enabled()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v1] d_path:fix missing include file in d_path.c
- From: Zhiguang Ni <zhiguangni01@xxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- [PATCH] KVM: use kvcalloc for array allocations
- From: Zhiguang Ni <zhiguangni01@xxxxxxxxx>
- Re: [PATCH RESEND 3/5] KVM: X86: Boost vCPU which is in critical section
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH RESEND 2/5] KVM: X86: Add guest interrupt disable state support
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH] KVM: memcg: count KVM page table pages used by KVM in memcg pagetable stats
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/8] KVM: x86: avoid loading a vCPU after .vm_destroy was called
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 8/8] KVM: x86: SVM: remove vgif_enabled()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RESEND 3/5] KVM: X86: Boost vCPU which is in critical section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RESEND 2/5] KVM: X86: Add guest interrupt disable state support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3.1 2/4] KVM: x86: Copy kvm_pmu_ops by value to eliminate layer of indirection
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3.1 3/4] KVM: x86: Move .pmu_ops to kvm_x86_init_ops and tag as __initdata
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3.1 1/4] KVM: x86: Move kvm_ops_static_call_update() to x86.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3.1 4/4] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3.1 0/4] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/4] KVM: x86: Use static calls to reduce kvm_pmu_ops overhead
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH V2 0/4] KVM: X86: Add and use shadow page with level expanded or acting as pae_root
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v2 01/21] x86/virt/tdx: Detect SEAM
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 1/4] KVM: x86: Move kvm_ops_static_call_update() to x86.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/4] KVM: x86: Move kvm_ops_static_call_update() to x86.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: x86/mmu: explicitly check nx_hugepage in disallowed_hugepage_adjust()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: x86/mmu: Track the number of TDP MMU pages, but not the actual pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH V2 0/4] KVM: X86: Add and use shadow page with level expanded or acting as pae_root
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Call for GSoC and Outreachy project ideas for summer 2022
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- [PATCH 1/2] KVM: x86/mmu: Set lpage_disallowed in TDP MMU before setting SPTE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [no subject]
- Re: [PATCH] Documentation: KVM: Describe guest TSC scaling in migration algorithm
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/13] KVM: Zap existing KVM mappings when pages changed in the private fd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 12/13] KVM: Expose KVM_MEM_PRIVATE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 10/13] KVM: Register private memslot to memory backing store
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 02/13] mm: Introduce memfile_notifier
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 01/21] x86/virt/tdx: Detect SEAM
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH] mm: avoid pointless invalidate_range_start/end on mremap(old_size=0)
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Zap only TDP MMU leafs in zap range and mmu_notifier unmap
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: WARNING: at arch/x86/kvm/../../../virt/kvm/kvm_main.c:3156 mark_page_dirty_in_slot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] Documentation: KVM: Describe guest TSC scaling in migration algorithm
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: VMX: replace 0x180 with EPT_VIOLATION_* definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH V2 4/4] KVM: X86: Use passthrough and pae_root shadow page for 32bit guests
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH V2 3/4] KVM: X86: Alloc role.pae_root shadow page
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH V2 2/4] KVM: X86: Introduce role.passthrough for level expanded pagetable
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH V2 1/4] KVM: X86: Add arguement gfn and role to kvm_mmu_alloc_page()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH V2 0/4] KVM: X86: Add and use shadow page with level expanded or acting as pae_root
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- WARNING: at arch/x86/kvm/../../../virt/kvm/kvm_main.c:3156 mark_page_dirty_in_slot
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: [PATCH] Documentation: KVM: Describe guest TSC scaling in migration algorithm
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH] KVM: x86/pmu: Update AMD PMC smaple period to fix guest NMI-watchdog
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Start trapping ID registers for 32 bit guests
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86: nSVM: implement nested LBR virtualization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: riscv: Improve unexpected guest trap handling
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 2/3] KVM: selftests: riscv: Fix alignment of the guest_hang() function
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 1/3] KVM: selftests: riscv: Set PTE A and D bits in VS-stage page table
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 0/3] Unexpected guest trap handling for KVM RISC-V selftests
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH v6 2/2] KVM: arm64: selftests: Introduce vcpu_width_config
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v6 1/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v6 0/2] KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 04/21] x86/virt/tdx: Add skeleton for detecting and initializing TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 04/21] x86/virt/tdx: Add skeleton for detecting and initializing TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v2 2/2] KVM: x86/mmu: Derive EPT violation RWX bits from EPTE RWX bits
- From: "SU Hang" <darcy.sh@xxxxxxxxxxxx>
- [PATCH v2 1/2] KVM: VMX: replace 0x180 with EPT_VIOLATION_* definition
- From: "SU Hang" <darcy.sh@xxxxxxxxxxxx>
- [PATCH v2 0/2] KVM: x86: Replace magic number with readable macro
- From: "SU Hang" <darcy.sh@xxxxxxxxxxxx>
- RE: [PATCH v2 04/21] x86/virt/tdx: Add skeleton for detecting and initializing TDX on demand
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v6 01/25] KVM: arm64: Introduce a validation function for an ID register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: Limit feature register reads from AArch32
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Start trapping ID registers for 32 bit guests
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Plumb cp10 ID traps through the AArch64 sysreg handler
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Wire up CP15 feature registers to their AArch64 equivalents
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: Limit feature register reads from AArch32
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH v5 09/13] KVM: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/21] x86/virt/tdx: Get information about TDX module and convertible memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 08/13] KVM: Use memfile_pfn_ops to obtain pfn for private pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/21] x86/virt/tdx: Get information about TDX module and convertible memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 09/21] x86/virt/tdx: Get information about TDX module and convertible memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [no subject]
- Re: [PATCH v2 04/21] x86/virt/tdx: Add skeleton for detecting and initializing TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>
- Re: [PATCH v2 07/11] KVM: x86/MMU: Factor out updating NX hugepages state for a VM
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v5 07/13] KVM: Add KVM_EXIT_MEMORY_ERROR exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 06/13] KVM: Use kvm_userspace_memory_region_ext
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 06/11] KVM: selftests: Add NX huge pages test
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 05/13] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [no subject]
- [no subject]
- Re: [PATCH v5 05/13] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v1 2/9] KVM: x86/mmu: Move hugepage adjust to direct_page_fault
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v1 0/9] KVM: SVM: Defer page pinning for SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: x86/MMU: Require reboot permission to disable NX hugepages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 09/21] x86/virt/tdx: Get information about TDX module and convertible memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 09/11] KVM: x86/MMU: Allow NX huge pages to be disabled on a per-vm basis
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Speed up slot_rmap_walk_next for sparsely populated rmaps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/21] x86/virt/tdx: Get information about TDX module and convertible memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 08/11] KVM: x86/MMU: Track NX hugepages on a per-VM basis
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 07/11] KVM: x86/MMU: Factor out updating NX hugepages state for a VM
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v6 0/5] optimize the downtime for vfio migration
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Speed up slot_rmap_walk_next for sparsely populated rmaps
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [RFC PATCH 000/105] KVM: selftests: Overhaul APIs, purge VCPU_ID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 06/11] KVM: selftests: Add NX huge pages test
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Allow userspace to opt out of hypercall patching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86/mmu: Promote pages in-place when disabling dirty logging
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86/mmu: Promote pages in-place when disabling dirty logging
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: add lockdep check before lookup_address_in_mm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86/mmu: Promote pages in-place when disabling dirty logging
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v2 6/9] KVM: x86/mmu: Factor out part of vmx_get_mt_mask which does not depend on vcpu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/9] KVM: x86/MMU: Optimize disabling dirty logging
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 9/9] KVM: x86/mmu: Promote pages in-place when disabling dirty logging
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: add lockdep check before lookup_address_in_mm()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Allow userspace to opt out of hypercall patching
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86: nSVM: implement nested LBR virtualization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [syzbot] WARNING in kvm_mmu_notifier_invalidate_range_start (2)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: add lockdep check before lookup_address_in_mm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v4 18/30] KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Zap only TDP MMU leafs in zap range and mmu_notifier unmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: optimize PKU branching in kvm_load_{guest|host}_xsave_state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: Re: [PATCH] kvm/arm64: Fix memory section did not set to kvm
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Sean Mooney <smooney@xxxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- RE: [PATCH v2 04/21] x86/virt/tdx: Add skeleton for detecting and initializing TDX on demand
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] kvm/arm64: Fix memory section did not set to kvm
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- [kvmtool PATCH v3 2/2] aarch64: Add support for MTE
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvmtool PATCH v3 1/2] update_headers.sh: Sync ABI headers with Linux v5.17
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvmtool PATCH v3 0/2] arm64: Add MTE support
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] kvm/arm64: Fix memory section did not set to kvm
- From: Cong Liu <liucong2@xxxxxxxxxx>
- [PATCH 1/2] s390x: gs: move to new header file
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH 0/2] s390x: Add tests for SIGP store adtl status
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH 2/2] s390x: add test for SIGP STORE_ADTL_STATUS order
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/21] x86/virt/tdx: Add skeleton for detecting and initializing TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 03/21] x86/virt/tdx: Implement the SEAMCALL base function
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Zap only TDP MMU leafs in zap range and mmu_notifier unmap
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH v2 04/21] x86/virt/tdx: Add skeleton for detecting and initializing TDX on demand
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 03/21] x86/virt/tdx: Implement the SEAMCALL base function
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 01/21] x86/virt/tdx: Detect SEAM
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/9] s390x: gs: move to new header file
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH] Documentation: kvm: Add missing line break in api.rst
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v2 01/21] x86/virt/tdx: Detect SEAM
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 04/21] x86/virt/tdx: Add skeleton for detecting and initializing TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 03/21] x86/virt/tdx: Implement the SEAMCALL base function
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 09/21] x86/virt/tdx: Get information about TDX module and convertible memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 17/21] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 13/21] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: x86: optimize PKU branching in kvm_load_{guest|host}_xsave_state
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v6 02/25] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v6 02/25] KVM: arm64: Save ID registers' sanitized value per guest
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH kvmtool 5/5] mmio: Sanitize addr and len
- From: Martin Radev <martin.b.radev@xxxxxxxxx>
- [PATCH] KVM: x86/mmu: add lockdep check before lookup_address_in_mm()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH kvmtool 3/5] virtio: Check for overflows in QUEUE_NOTIFY and QUEUE_SEL
- From: Martin Radev <martin.b.radev@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: add lockdep check before lookup_address_in_mm()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH kvmtool 2/5] virtio: Sanitize config accesses
- From: Martin Radev <martin.b.radev@xxxxxxxxx>
- [PATCH] KVM: x86/mmu: add lockdep check before lookup_address_in_mm()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 2/8] KVM: x86: SVM: use vmcb01 in avic_init_vmcb and init_vmcb
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: x86: nSVM: support PAUSE filtering when L0 doesn't intercept PAUSE
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86: nSVM: implement nested LBR virtualization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 kvmtool 0/5] Fix few small issues in virtio code
- From: Martin Radev <martin.b.radev@xxxxxxxxx>
- Re: [PATCH] KVM: x86: optimize PKU branching in kvm_load_{guest|host}_xsave_state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Speed up slot_rmap_walk_next for sparsely populated rmaps
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 18/30] KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [Bug 199727] CPU freezes in KVM guests during high IO load on host
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH v6 5/5] vfio: defer to commit kvm irq routing when enable msi/msix
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v6 4/5] Revert "vfio: Avoid disabling and enabling vectors repeatedly in VFIO migration"
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v6 1/5] vfio: simplify the conditional statements in vfio_msi_enable
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v6 3/5] vfio: simplify the failure path in vfio_msi_enable
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v6 2/5] vfio: move re-enabling INTX out of the common helper
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- [PATCH v6 0/5] optimize the downtime for vfio migration
- From: "Longpeng(Mike)" <longpeng2@xxxxxxxxxx>
- Re: [PATCH v6 02/25] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: optimize PKU branching in kvm_load_{guest|host}_xsave_state
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Speed up slot_rmap_walk_next for sparsely populated rmaps
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 00/21] KVM: x86: Event/exception fixes and cleanups
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: optimize PKU branching in kvm_load_{guest|host}_xsave_state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Speed up slot_rmap_walk_next for sparsely populated rmaps
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Allow userspace to opt out of hypercall patching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Speed up slot_rmap_walk_next for sparsely populated rmaps
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Zap only TDP MMU leafs in zap range and mmu_notifier unmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/11] KVM: selftests: aarch64: Add aarch64/page_fault_test
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH 00/21] KVM: x86: Event/exception fixes and cleanups
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- kvmtool: Have stack be not executable on x86
- From: Martin Radev <martin.b.radev@xxxxxxxxx>
- Re: [FYI PATCH] Revert "KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [FYI PATCH] Revert "KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/17] KVM: Add Xen event channel acceleration
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/17] KVM: Add Xen event channel acceleration
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/17] KVM: Add Xen event channel acceleration
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH] KVM: x86/mmu: fix general protection fault in kvm_mmu_uninit_tdp_mmu
- From: Pavel Skripkin <paskripkin@xxxxxxxxx>
- Re: [PATCH] Documentation: KVM: Describe guest TSC scaling in migration algorithm
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH RFC 07/12] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH] KVM: x86/mmu: fix general protection fault in kvm_mmu_uninit_tdp_mmu
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH] KVM: x86/mmu: fix general protection fault in kvm_mmu_uninit_tdp_mmu
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/9] s390x: gs: move to new header file
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [RFC PATCH] KVM: x86/mmu: fix general protection fault in kvm_mmu_uninit_tdp_mmu
- From: Pavel Skripkin <paskripkin@xxxxxxxxx>
- Re: [syzbot] general protection fault in kvm_mmu_uninit_tdp_mmu
- From: syzbot <syzbot+717ed82268812a643b28@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] general protection fault in kvm_mmu_uninit_tdp_mmu
- From: Pavel Skripkin <paskripkin@xxxxxxxxx>
- Re: [PATCH v2] Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2] Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v2] Add KVM_EXIT_SHUTDOWN metadata for SEV-ES
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v4 18/30] KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/9] s390x: gs: move to new header file
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [FYI PATCH] Revert "KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: Re: [PATCH] kvm/arm64: Fix memory section did not set to kvm
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/9] s390x: gs: move to new header file
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH RESEND 2/5] KVM: X86: Add guest interrupt disable state support
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH RESEND 3/5] KVM: X86: Boost vCPU which is in critical section
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH RESEND 4/5] x86/kvm: Add MSR_KVM_PREEMPT_COUNT guest support
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH RESEND 5/5] KVM: X86: Expose PREEMT_COUNT CPUID feature bit to guest
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH RESEND 1/5] KVM: X86: Add MSR_KVM_PREEMPT_COUNT support
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- [PATCH RESEND 0/5] KVM: X86: Scaling Guest OS Critical Sections with boosting
- From: Wanpeng Li <kernellwp@xxxxxxxxx>
- Re: [PATCH RFC 07/12] iommufd: Data structure to provide IOVA to PFN mapping
- From: "zhangfei.gao@xxxxxxxxxxx" <zhangfei.gao@xxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: Prefent NULL prointer dereference in kvm_irq_delivery_to_apic_fast()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Check lapic_in_kernel() before attempting to set a SynIC irq
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: Prefent NULL prointer dereference in kvm_irq_delivery_to_apic_fast()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86: Forbid VMM to set SYNIC/STIMER MSRs when SynIC wasn't activated
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] kvm/arm64: Fix memory section did not set to kvm
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- [syzbot] general protection fault in kvm_mmu_uninit_tdp_mmu
- From: syzbot <syzbot+717ed82268812a643b28@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 4/9] s390x: smp: add test for SIGP_STORE_ADTL_STATUS order
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] KVM: x86/MMU: Optimize disabling dirty logging
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Don't rebuild page when the page is synced and no tlb flushing is required
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [FYI PATCH] Revert "KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Don't rebuild page when the page is synced and no tlb flushing is required
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: optimize PKU branching in kvm_load_{guest|host}_xsave_state
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [FYI PATCH] Revert "KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v12 40/46] x86/sev: add sev=debug cmdline option to dump SNP CPUID table
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2 0/2] minor cleanups on efer emulation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] Documentation: KVM: Describe guest TSC scaling in migration algorithm
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/25] KVM: arm64: Add remaining ID registers to id_reg_desc_table
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH 11/32] Replace qemu_real_host_page variables with inlined functions
- From: Juan Quintela <quintela@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/9] s390x: gs: move to new header file
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/25] KVM: arm64: Add remaining ID registers to id_reg_desc_table
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- RE: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH net v3 0/3] vsock/virtio: enable VQs early on probe and finish the setup before using them
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [RFC PATCH v3 12/36] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: use EPT_VIOLATION_* instead of 0x7
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: VMX: replace 0x180 with EPT_VIOLATION_* definition
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [FYI PATCH] Revert "KVM: x86/mmu: Zap only TDP MMU leafs in kvm_zap_gfn_range()"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 11/25] KVM: arm64: Add remaining ID registers to id_reg_desc_table
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 00/21] KVM: x86: Event/exception fixes and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH kvmtool 3/6] virtio: Use u32 instead of int in pci_data_in/out
- From: Martin Radev <martin.b.radev@xxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v5.18-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] KVM: x86/mmu: Don't rebuild page when the page is synced and no tlb flushing is required
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 11/25] KVM: arm64: Add remaining ID registers to id_reg_desc_table
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [GIT PULL] First batch of KVM patches for 5.18
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 2/2] selftests: KVM: Test KVM_X86_QUIRK_FIX_HYPERCALL_INSN
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Allow userspace to opt out of hypercall patching
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH 2/3] x86/kvm/svm: Force-inline GHCB accessors
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: x86: nSVM: support PAUSE filtering when L0 doesn't intercept PAUSE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86: nSVM: implement nested LBR virtualization
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 17/21] x86/virt/tdx: Configure global KeyID on all packages
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH 2/8] KVM: x86: SVM: use vmcb01 in avic_init_vmcb and init_vmcb
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 13/21] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Allow userspace to opt out of hypercall patching
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 02/25] KVM: arm64: Save ID registers' sanitized value per guest
- From: Oliver Upton <oupton@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Allow userspace to opt out of hypercall patching
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/21] x86/virt/tdx: Get information about TDX module and convertible memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/9] s390x: gs: move to new header file
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/4] KVM: selftests: add is_cpu_online() utility function
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvmtool PATCH v2 2/2] aarch64: Add support for MTE
- From: Vladimir Murzin <vladimir.murzin@xxxxxxx>
- Re: [PATCH v3 2/4] KVM: selftests: add is_cpu_online() utility function
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvmtool PATCH v2 2/2] aarch64: Add support for MTE
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 05/11] KVM: selftests: Add missing close and munmap in __vm_mem_region_delete
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v2 01/11] KVM: selftests: Add a userfaultfd library
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v2 4/4] selftests: KVM: use dirty logging to check if page stats work correctly
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v6 02/25] KVM: arm64: Save ID registers' sanitized value per guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 0/4] Move npt test cases and NPT code improvements
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 00/13] KVM: mm: fd-based approach for supporting KVM guest private memory
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH kvmtool v1] Make --no-pvtime command argument arm specific
- From: Sebastian Ene <sebastianene@xxxxxxxxxx>
- Re: [RFCv2 PATCH 11/12] KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFCv2 PATCH 10/12] KVM: SVM: Introduce helper functions to (de)activate AVIC and x2AVIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFCv2 PATCH 09/12] KVM: SVM: Refresh AVIC settings when changing APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFCv2 PATCH 08/12] KVM: SVM: Adding support for configuring x2APIC MSRs interception
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH v3 12/36] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v2 5/5] vfio/pci: add the support for PCI D3cold state
- From: Abhishek Sahu <abhsahu@xxxxxxxxxx>
- Re: [kvmtool PATCH v2 2/2] aarch64: Add support for MTE
- From: Vladimir Murzin <vladimir.murzin@xxxxxxx>
- Re: [RFCv2 PATCH 07/12] KVM: SVM: Introduce helper function kvm_get_apic_id
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v18 15/18] s390/vfio-ap: handle config changed and scan complete notification
- From: "Jason J. Herne" <jjherne@xxxxxxxxxxxxx>
- Re: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 4/9] s390x: smp: add test for SIGP_STORE_ADTL_STATUS order
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH RFC 07/12] iommufd: Data structure to provide IOVA to PFN mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH RFC 04/12] kernel/user: Allow user::locked_vm to be usable for iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [kvmtool PATCH v2 2/2] aarch64: Add support for MTE
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvmtool PATCH v2 1/2] update_headers.sh: Sync ABI headers with Linux v5.17
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [kvmtool PATCH v2 0/2] arm64: Add MTE support
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFCv2 PATCH 06/12] KVM: SVM: Do not update logical APIC ID table when in x2APIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFCv2 PATCH 05/12] KVM: SVM: Update avic_kick_target_vcpus to support 32-bit APIC ID
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFCv2 PATCH 04/12] KVM: SVM: Update max number of vCPUs supported for x2AVIC mode
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFCv2 PATCH 03/12] KVM: SVM: Detect X2APIC virtualization (x2AVIC) support
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFCv2 PATCH 02/12] KVM: x86: lapic: Rename [GET/SET]_APIC_DEST_FIELD to [GET/SET]_XAPIC_DEST_FIELD
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH v3 12/36] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [PATCH net v3 0/3] vsock/virtio: enable VQs early on probe and finish the setup before using them
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [RFC PATCH v3 17/36] pflash_cfi01/tdx: Introduce ram_mode of pflash for TDVF
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [RFC PATCH v3 17/36] pflash_cfi01/tdx: Introduce ram_mode of pflash for TDVF
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [RFC PATCH v3 17/36] pflash_cfi01/tdx: Introduce ram_mode of pflash for TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH kvm-unit-tests v2 2/6] s390x: smp: Test SIGP RESTART against stopped CPU
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH RFC 11/12] iommufd: vfio container FD ioctl compatibility
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH kvm-unit-tests v2 1/6] lib: s390x: smp: Retry SIGP SENSE on CC2
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC PATCH v3 12/36] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v3 17/36] pflash_cfi01/tdx: Introduce ram_mode of pflash for TDVF
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [RFC PATCH v3 12/36] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Gerd Hoffmann <kraxel@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 4/9] s390x: smp: add test for SIGP_STORE_ADTL_STATUS order
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v6 01/25] KVM: arm64: Introduce a validation function for an ID register
- From: Oliver Upton <oupton@xxxxxxxxxx>
- [PATCH] vfio/spapr_tce: replace usage of found with dedicated list iterator variable
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- RE: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH v3 12/36] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- RE: [PATCH RFC 08/12] iommufd: IOCTLs for the io_pagetable
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]