Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] kvm/x86: allocate the write-tracking metadata on-demand
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 15/73] mm/vmalloc: Add a helper to reserve a contiguous and aligned kernel virtual area
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [RFC 8/8] qemu-options: Add the cache topology description of -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: folio_mmapped
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [RFC PATCH 15/73] mm/vmalloc: Add a helper to reserve a contiguous and aligned kernel virtual area
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v18 064/121] KVM: TDX: Create initial guest memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v8 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- [PATCH v2 3/8] KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 6/8] KVM: x86/xen: split up kvm_xen_set_evtchn_fast()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 5/8] KVM: x86/xen: fix recursive deadlock in timer injection
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 4/8] KVM: pfncache: simplify locking and make more self-contained
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 8/8] KVM: pfncache: clean up rwlock abuse
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v8 1/2] ppc: Enable 2nd DAWR support on Power10 PowerNV machine
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 2/8] KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 0/8] KVM: x86/xen updates
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 00/21] Introduce smp.modules for x86 in QEMU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 21/21] i386/cpu: Use CPUCacheInfo.share_level to encode CPUID[0x8000001D].EAX[bits 25:14]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 20/21] i386/cpu: Use CPUCacheInfo.share_level to encode CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 19/21] i386: Add cache topology info in CPUCacheInfo
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 17/21] tests: Add test case of APIC ID for module level parsing
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 18/21] hw/i386/pc: Support smp.modules for x86 PC machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 16/21] i386/cpu: Introduce module-id to X86CPU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 15/21] i386: Support module_id in X86CPUTopoIDs
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 14/21] i386: Expose module level in CPUID[0x1F]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 13/21] i386: Support modules_per_die in X86CPUTopoInfo
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 12/21] i386: Introduce module level cpu topology to CPUX86State
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 11/21] i386/cpu: Decouple CPUID[0x1F] subleaf with specific topology level
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 10/21] i386: Split topology types of CPUID[0x1F] from the definitions of CPUID[0xB]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 09/21] i386/cpu: Introduce bitmap to cache available CPU topology levels
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 08/21] i386/cpu: Consolidate the use of topo_info in cpu_x86_cpuid()
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 07/21] i386/cpu: Use APIC ID info get NumSharingCache for CPUID[0x8000001D].EAX[bits 25:14]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 06/21] i386/cpu: Use APIC ID info to encode cache topo in CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 05/21] i386/cpu: Fix i/d-cache topology to core level for Intel CPU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- [PATCH v9 04/21] hw/core: Support module-id in numa configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 03/21] hw/core: Introduce module-id as the topology subindex
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 02/21] hw/core/machine: Support modules in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 01/21] hw/core/machine: Introduce the module as a CPU topology level
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 00/21] Introduce smp.modules for x86 in QEMU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH kvmtool] Fix 9pfs open device file security flaw
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: Xi Ruoyao <xry111@xxxxxxxxxxx>
- Re: [PATCH v19 091/130] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 03/32] powerpc: Fix stack backtrace termination
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PULL 05/30] hw/i386/kvmvapic: Inline sysbus_address_space()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- RE: [PATCH] MAINTAINERS: Re-alphabetize VFIO
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- subscribe
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: "Jiaxun Yang" <jiaxun.yang@xxxxxxxxxxx>
- Re: [PATCH v4 4/5] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v3 00/15] KVM: SEV: allow customizing VMSA features
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v4 1/5] KVM: selftests: aarch64: Make the [create|destroy]_vpmu_vm() public
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with the loongarch tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/8] Use TAP in some more x86 KVM selftests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: selftests: Add SEV and SEV-ES smoke tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/intr: Explicitly check NMI from guest to eliminate false positives
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- [PATCH 1/1] KVM: selftests: close the memfd in some gmem tests
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/intr: Explicitly check NMI from guest to eliminate false positives
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 9/9] KVM: SVM: Add CET features to supported_xss
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 7/9] x86/sev-es: Include XSS value in GHCB CPUID request
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 8/9] KVM: SVM: Use KVM-governed features to track SHSTK
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 6/9] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 5/9] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 4/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 3/9] KVM: x86: SVM: Update dump_vmcb with shadow stack save area additions
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 2/9] KVM: x86: SVM: Emulate reads and writes to shadow stack MSRs
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 1/9] x86/boot: Move boot_*msr helpers to asm/shared/msr.h
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 0/9] SVM guest shadow stack support
- From: John Allen <john.allen@xxxxxxx>
- Re: Re: folio_mmapped
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 1/6] hw/arm: Inline sysbus_create_simple(PL110 / PL111)
- From: BALATON Zoltan <balaton@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: "Jiaxun Yang" <jiaxun.yang@xxxxxxxxxxx>
- Re: [PATCH 0/8] KVM: SVM: Clean up VMRUN=>#VMEXIT assembly
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v19 028/130] KVM: TDX: Add TDX "architectural" error codes
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 071/121] KVM: TDX: restore user ret MSRs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 057/121] KVM: TDX: Add load_mmu_pgd method for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 061/121] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 060/121] KVM: TDX: TDP MMU TDX support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 08/15] KVM: SEV: store VMSA features in kvm_sev_info
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 09/15] KVM: SEV: disable DEBUG_SWAP by default
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 14/15] KVM: SEV: introduce KVM_SEV_INIT2 operation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 13/15] KVM: SEV: define VM types for SEV and SEV-ES
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 03/15] KVM: SVM: Invert handling of SEV and SEV_ES feature flags
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 10/15] KVM: x86: add fields to struct kvm_arch for CoCo features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 15/15] selftests: kvm: add tests for KVM_SEV_INIT2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 06/15] KVM: introduce new vendor op for KVM_GET_DEVICE_ATTR
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 12/15] KVM: SEV: introduce to_kvm_sev_info
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 07/15] KVM: SEV: publish supported VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 04/15] KVM: SVM: Compile sev.c if and only if CONFIG_KVM_AMD_SEV=y
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 11/15] KVM: x86: Add supported_vm_types to kvm_caps
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 02/15] KVM: x86: use u64_to_user_addr()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 05/15] Documentation: kvm/sev: separate description of firmware
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/15] KVM: SEV: allow customizing VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 01/15] KVM: SEV: fix compat ABI for KVM_MEMORY_ENCRYPT_OP
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v18 039/121] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 030/121] KVM: TDX: Do TDX specific vcpu initialization
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 029/121] KVM: TDX: create/free TDX vcpu structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 025/121] KVM: TDX: initialize VM with TDX specific parameters
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 024/121] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v18 023/121] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 064/121] KVM: TDX: Create initial guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v18 007/121] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 001/121] x86/virt/tdx: Export TDX KeyID information
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 044/121] KVM: x86/mmu: Assume guest MMIOs are shared
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v18 064/121] KVM: TDX: Create initial guest memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 044/121] KVM: x86/mmu: Assume guest MMIOs are shared
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 040/121] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 040/121] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- [PATCH v2 5/6] hw/i386/kvmvapic: Inline sysbus_address_space()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v18 002/121] x86/virt/tdx: Export SEAMCALL functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 032/121] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] hw/arm: Inline sysbus_create_simple(PL110 / PL111)
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: selftests: Add SEV and SEV-ES smoke tests
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [PATCH 5/9] KVM: SVM: Save shadow stack host state on VMRUN
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] vfio/type1: unpin PageReserved page
- From: Yisheng Xie <ethan.xys@xxxxxxxxxxxxxxxxx>
- Re: [RFC 8/8] qemu-options: Add the cache topology description of -smp
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 58/73] x86/pvm: Relocate kernel address space layout
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] x86/cpu: Add a VMX flag to enumerate 5-level EPT support to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 63/73] x86/pvm: Add hypercall support
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 37/73] KVM: x86/PVM: Use host PCID to reduce guest TLB flushing
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 51/73] x86/tools/relocs: Append relocations into input file
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] x86: irq: unconditionally define KVM interrupt vectors
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [RFC PATCH 61/73] x86/pvm: Allow to install a system interrupt handler
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 44/73] KVM: x86/PVM: Implement TSC related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] vfio: amba: Rename pl330_ids[] to vfio_amba_ids[]
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 00/73] KVM: x86/PVM: Introduce a new hypervisor
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 57/73] x86/pvm: Make cpu entry area and vmalloc area variable
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 73/73] x86/pvm: Disable some unsupported syscalls and features
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 72/73] x86/pvm: Use RDTSCP as default in vdso_read_cpunode()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 71/73] x86/pvm: Adapt pushf/popf in this_cpu_cmpxchg16b_emu()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 70/73] x86/pvm: Don't use SWAPGS for gsbase read/write
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 32/73] KVM: x86/PVM: Enable guest debugging functions
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 69/73] x86/pvm: Implement mmu related PVOPS
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 68/73] x86/pvm: Implement irq related PVOPS
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 45/73] KVM: x86/PVM: Add dummy PMU related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 67/73] x86/pvm: Implement cpu related PVOPS
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 66/73] x86/pvm: Use new cpu feature to describe XENPV and PVM
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 49/73] KVM: x86/PVM: Implement emulation for non-PVM mode
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 65/73] x86/kvm: Patch KVM hypercall as PVM hypercall
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 64/73] x86/pvm: Enable PVM event delivery
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 62/73] x86/pvm: Add early kernel event entry and dispatch code
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 60/73] x86/pvm: Add event entry/exit and dispatch code
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 59/73] x86/pti: Force enabling KPTI for PVM guest
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 56/73] x86/pvm: Relocate kernel image early in PVH entry
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 55/73] x86/pvm: Relocate kernel image to specific virtual address range
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 26/73] KVM: x86/PVM: Implement event delivery flags related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 54/73] x86/pvm: Detect PVM hypervisor support
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 53/73] x86/pvm: Add Kconfig option and the CPU feature bit for PVM guest
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 52/73] x86/boot: Allow to do relocation for uncompressed kernel
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 50/73] x86/tools/relocs: Cleanup cmdline options
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 48/73] KVM: x86/PVM: Implement system registers setting callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 47/73] KVM: x86/PVM: Handle the left supported MSRs in msrs_to_save_base[]
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 46/73] KVM: x86/PVM: Support for CPUID faulting
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 43/73] KVM: x86/PVM: Enable direct switching
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 20/73] KVM: x86/PVM: Implement vcpu_load()/vcpu_put() related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 42/73] KVM: x86/PVM: Support for kvm_exit() tracepoint
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 41/73] KVM: x86/PVM: Allow to load guest TLS in host GDT
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 40/73] KVM: x86/PVM: Handle hypercall for loading GS selector
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 39/73] KVM: x86/PVM: Handle hypercall for CR3 switching
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 38/73] KVM: x86/PVM: Handle hypercalls for privilege instruction emulation
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 36/73] KVM: x86/PVM: Handle KVM hypercall
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 35/73] KVM: x86/PVM: Handle PVM_SYNTHETIC_CPUID synthetic instruction
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 34/73] KVM: x86/PVM: Handle ERETU/ERETS synthetic instruction
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 33/73] KVM: x86/PVM: Handle VM-exit due to hardware exceptions
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 31/73] KVM: x86/PVM: Implement instruction emulation for #UD and #GP
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 30/73] KVM: x86/PVM: Implement segment related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 29/73] KVM: x86/PVM: Implement allowed range checking for #PF
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 28/73] KVM: x86/PVM: Handle syscall from user mode
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 27/73] KVM: x86/PVM: Implement event injection related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 25/73] KVM: x86/PVM: Implement APIC emulation related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 24/73] KVM: x86/PVM: Introduce PVM mode switching
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 23/73] KVM: x86/PVM: Handle event handling related MSR read/write operation
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 22/73] KVM: x86/PVM: Handle some VM exits before enable interrupts
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 21/73] KVM: x86/PVM: Implement vcpu_run() callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 19/73] x86/entry: Export 32-bit ignore syscall entry and __ia32_enabled variable
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 18/73] KVM: x86/PVM: Implement VM/VCPU initialization related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 17/73] KVM: x86/PVM: Implement module initialization related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 16/73] KVM: x86/PVM: Implement host mmu initialization
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 15/73] mm/vmalloc: Add a helper to reserve a contiguous and aligned kernel virtual area
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 14/73] KVM: x86: Create stubs for PVM module as a new vendor
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 13/73] KVM: x86/emulator: Reinject #GP if instruction emulation failed for PVM
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 12/73] KVM: x86: Add NR_VCPU_SREG in SREG enum
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 11/73] KVM: x86: Implement gpc refresh for guest usage
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 10/73] KVM: x86: Introduce vendor feature to expose vendor-specific CPUID
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 09/73] KVM: x86: Add PVM virtual MSRs into emulated_msrs_all[]
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 08/73] KVM: x86: Allow hypercall handling to not skip the instruction
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 07/73] KVM: x86/mmu: Adapt shadow MMU for PVM
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 06/73] KVM: x86: Move VMX interrupt/nmi handling into kvm.ko
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 05/73] KVM: x86: Set 'vcpu->arch.exception.injected' as true before vendor callback
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 04/73] x86/entry: Implement direct switching for the switcher
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 03/73] x86/entry: Implement switcher for PVM VM enter/exit
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 02/73] x86/ABI/PVM: Add PVM-specific ABI header file
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 01/73] KVM: Documentation: Add the specification for PVM
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 00/73] KVM: x86/PVM: Introduce a new hypervisor
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH 2/2] LoongArch: KVM: Do not restart SW timer when it is expired
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 1/2] LoongArch: KVM: Start SW timer only when vcpu is blocking
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Remove unnecessary CSR register saving during enter guest
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [GIT PULL 1/3] KVM: s390: fix virtual vs physical address confusion
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 2/3] KVM: s390: only deliver the set service event bits
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 0/3] KVM: s390: Changes for 6.9
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 3/3] KVM: s390: selftest: memop: Fix undefined behavior
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/32] powerpc: Fix KVM caps on POWER9 hosts
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/32] powerpc: Fix pseries getchar return value
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] vfio: amba: Rename pl330_ids[] to vfio_amba_ids[]
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] vfio: amba: Rename pl330_ids[] to vfio_amba_ids[]
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- Re: [PATCH 1/1] vhost: Added pad cleanup if vnet_hdr is not present.
- From: Andrew Melnichenko <andrew@xxxxxxxxxx>
- [kvm-unit-tests PATCH 26/32] powerpc: Add sieve.c common test
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 32/32] powerpc: gitlab CI update
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 31/32] powerpc: Remove remnants of ppc64 directory and build structure
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 21/32] powerpc: Add atomics tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 30/32] configure: Make arch_libdir a first-class entity
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 29/32] configure: Fail on unknown arch
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 28/32] powerpc: add pmu tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 27/32] powerpc: add usermode support
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v2 00/13] KVM/arm64: Add NV support for ERET and PAuth
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH 25/32] common/sieve: Support machines without MMU
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 24/32] common/sieve: Use vmalloc.h for setup_mmu definition
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 23/32] powerpc: Add MMU support
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 22/32] powerpc: Add timebase tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 20/32] powerpc: Avoid using larx/stcx. in spinlocks when only one CPU is running
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 19/32] powerpc: Permit ACCEL=tcg,thread=single
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 18/32] powerpc: add SMP and IPI support
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 17/32] arch-run: Fix handling multiple exit status messages
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 16/32] powerpc: Remove broken SMP exception stack setup
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 15/32] powerpc: Add rtas stop-self support
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 14/32] powerpc: general interrupt tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 13/32] powerpc/sprs: Test hypervisor registers on powernv machine
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v2 11/13] KVM: arm64: nv: Add emulation for ERETAx instructions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH 12/32] powerpc: Fix emulator illegal instruction test for powernv
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 11/32] powerpc: Support powernv machine with QEMU TCG
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 10/32] scripts: Accommodate powerpc powernv machine differences
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 09/32] scripts: allow machine option to be specified in unittests.cfg
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 08/32] powerpc/sprs: Avoid taking PMU interrupts caused by register fuzzing
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 07/32] powerpc/sprs: Don't fail changed SPRs that are used by the test harness
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 06/32] powerpc/sprs: Specify SPRs with data rather than code
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 05/32] powerpc: Cleanup SPR and MSR definitions
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 04/32] powerpc: interrupt stack backtracing
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 03/32] powerpc: Fix stack backtrace termination
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 02/32] powerpc: Fix pseries getchar return value
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 01/32] powerpc: Fix KVM caps on POWER9 hosts
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 00/32] powerpc improvements
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v2 13/13] KVM: arm64: nv: Advertise support for PAuth
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 12/13] KVM: arm64: nv: Handle ERETA[AB] instructions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/13] KVM: arm64: nv: Add kvm_has_pauth() helper
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/13] KVM: arm64: nv: Reinject PAC exceptions caused by HCR_EL2.API==0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/13] KVM: arm64: nv: Handle HCR_EL2.{API,APK} independently
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/13] KVM: arm64: nv: Honor HFGITR_EL2.ERET being set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/13] KVM: arm64: nv: Fast-track 'InHost' exception returns
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/13] KVM: arm64: nv: Add trap forwarding for ERET and SMC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/13] KVM: arm64: nv: Configure HCR_EL2 for FEAT_NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/13] KVM: arm64: nv: Drop VCPU_HYP_CONTEXT flag
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/13] KVM: arm64: Add helpers for ESR_ELx_ERET_ISS_ERET*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/13] KVM: arm64: Harden __ctxt_sys_reg() against out-of-range values
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/7] (arm|s390): Use migrate_skip in test cases
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 7/7] common: add memory dirtying vs migration test
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 6/7] gitlab-ci: Run migration selftest on s390x and powerpc
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 5/7] arch-run: Add a "continuous" migration option for tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 4/7] powerpc: add asm/time.h header with delay and get_clock_us/ms
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/7] migration: Add a migrate_skip command
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/7] arch-run: Keep infifo open
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/7] more migration enhancements and tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: folio_mmapped
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/8] Multi-migration support
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 2/2] vfio/cdx: add interrupt support
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- [PATCH v3 1/2] genirq/msi: add wrapper msi allocation API and export msi functions
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- RE: [PATCH v4 7/8] cpuidle/poll_state: replace cpu_relax with smp_cond_load_relaxed
- From: "Tomohiro Misono (Fujitsu)" <misono.tomohiro@xxxxxxxxxxx>
- RE: [PATCH v4 6/8] cpuidle-haltpoll: ARM64 support
- From: "Tomohiro Misono (Fujitsu)" <misono.tomohiro@xxxxxxxxxxx>
- [PATCH v8 12/14] KVM: TDX: Implement merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 14/14] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 13/14] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 11/14] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 10/14] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 09/14] KVM: x86/tdp_mmu: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 08/14] KVM: x86/tdp_mmu: Allocate private page table for large page split
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 06/14] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 07/14] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 05/14] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 04/14] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 03/14] KVM: TDX: Pass KVM page level to tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 01/14] KVM: Add transparent hugepage support for dedicated guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 02/14] KVM: TDX: Flush cache based on page size before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 00/14] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 130/130] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 128/130] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 129/130] RFC: KVM: x86: Add x86 callback to check cpuid
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 127/130] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 125/130] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 126/130] KVM: TDX: Inhibit APICv for TDX guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 124/130] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 122/130] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 123/130] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 119/130] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 113/130] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 121/130] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 120/130] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 118/130] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 117/130] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 116/130] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 107/130] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 115/130] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 114/130] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 110/130] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 112/130] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 111/130] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 109/130] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 108/130] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 106/130] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 105/130] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 104/130] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 103/130] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 102/130] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 101/130] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 100/130] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 099/130] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 098/130] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 094/130] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 097/130] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 096/130] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 095/130] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 092/130] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 093/130] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 091/130] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 090/130] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 088/130] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 089/130] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 087/130] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 086/130] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 085/130] KVM: TDX: Complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 083/130] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 084/130] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 082/130] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 081/130] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 080/130] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 079/130] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 078/130] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 077/130] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 076/130] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 075/130] KVM: TDX: Extend memory measurement with initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 074/130] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 073/130] KVM: x86: Add hooks in kvm_arch_vcpu_memory_mapping()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 072/130] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 071/130] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 070/130] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 068/130] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 069/130] KVM: TDX: Require TDP MMU and mmio caching for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 062/130] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 064/130] KVM: x86/mmu: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 067/130] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 063/130] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 066/130] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 061/130] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 060/130] KVM: x86/tdp_mmu: Apply mmu notifier callback to only shared GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 065/130] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 059/130] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 058/130] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 057/130] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 056/130] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 055/130] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 054/130] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 053/130] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 052/130] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 051/130] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 050/130] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 048/130] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 047/130] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 049/130] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 046/130] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 044/130] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 045/130] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 043/130] KVM: TDX: create/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 041/130] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 042/130] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 040/130] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 038/130] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 039/130] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 037/130] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 036/130] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 035/130] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 034/130] KVM: TDX: Get system-wide info about TDX module on initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 033/130] KVM: TDX: Add helper function to read TDX metadata in array
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 032/130] KVM: TDX: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 031/130] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 030/130] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 029/130] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 028/130] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 027/130] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 026/130] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 025/130] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 024/130] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 023/130] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 020/130] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 022/130] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 021/130] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_init()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 019/130] KVM: x86: Add is_vm_type_supported callback
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 018/130] KVM: x86/mmu: Assume guest MMIOs are shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 017/130] KVM: x86: Implement kvm_arch_{, pre_}vcpu_memory_mapping()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 016/130] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 015/130] KVM: Document KVM_MEMORY_MAPPING ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 014/130] KVM: Add KVM vcpu ioctl to pre-populate guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 013/130] KVM: x86: Use PFERR_GUEST_ENC_MASK to indicate fault is private
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 012/130] KVM: x86/mmu: Pass around full 64-bit error code for the KVM page fault
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 011/130] KVM: Add new members to struct kvm_gfn_range to operate on
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 010/130] KVM: x86: Pass is_private to gmem hook of gmem_max_level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 009/130] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 008/130] x86/tdx: Warning with 32bit build shift-count-overflow
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 007/130] x86/virt/tdx: Export SEAMCALL functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 006/130] x86/virt/tdx: Export TDX KeyID information
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 005/130] x86/virt/tdx: Export global metadata read infrastructure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 003/130] x86/virt/tdx: Unbind global metadata read with 'struct tdx_tdmr_sysinfo'
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 002/130] x86/virt/tdx: Move TDMR metadata fields map table to local variable
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 001/130] x86/virt/tdx: Rename _offset to _member for TD_SYSINFO_MAP() macro
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 000/130] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- Re: [kvm-unit-tests PATCH v5 0/8] Multi-migration support
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/cpu: Add a VMX flag to enumerate 5-level EPT support to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v5 11/12] KVM: riscv: selftests: Change vcpu_has_ext to a common function
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [PATCH v5 11/12] KVM: riscv: selftests: Change vcpu_has_ext to a common function
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v5 6/6] LoongArch: Add pv ipi support on LoongArch system
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v5 4/6] LoongArch: Add paravirt interface for guest kernel
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- Re: [PATCH] x86/cpu: Add a VMX flag to enumerate 5-level EPT support to userspace
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v18 077/121] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH kvmtool] Fix 9pfs open device file security flaw
- From: Mr-Mr-key <2087905531@xxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- [PATCH v9 4/4] vfio: Convey kvm that the vfio-pci device is wc safe
- From: <ankita@xxxxxxxxxx>
- [PATCH v9 3/4] KVM: arm64: Set io memory s2 pte as normalnc for vfio pci device
- From: <ankita@xxxxxxxxxx>
- [PATCH v9 1/4] KVM: arm64: Introduce new flag for non-cacheable IO memory
- From: <ankita@xxxxxxxxxx>
- [PATCH v9 2/4] mm: Introduce new flag to indicate wc safe
- From: <ankita@xxxxxxxxxx>
- [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: <ankita@xxxxxxxxxx>
- Re: [PATCH v5 6/6] LoongArch: Add pv ipi support on LoongArch system
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v5 4/6] LoongArch: Add paravirt interface for guest kernel
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: VMX: Combine "check" and "get" APIs for passthrough MSR lookups
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: VMX: Combine "check" and "get" APIs for passthrough MSR lookups
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v4 00/10] KVM: arm64: Avoid serializing LPI get() / put()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] KVM: Get rid of return value from kvm_arch_create_vm_debugfs()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [GIT PULL] KVM: GUEST_MEMFD fixes for 6.8
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] x86/kvm: Clean up KVM's guest/host async #PF ABI, for 6.9
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: GUEST_MEMFD fixes for 6.8
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] KVM: x86: MMU(ish) fixes for 6.8
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH 8/8] KVM: x86: Stop compiling vmenter.S with OBJECT_FILES_NON_STANDARD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/8] KVM: SVM: Create a stack frame in __svm_sev_es_vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/8] KVM: SVM: Save/restore args across SEV-ES VMRUN via host save area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/8] KVM: SVM: Save/restore non-volatile GPRs in SEV-ES VMRUN via host save area
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/8] KVM: SVM: Clobber RAX instead of RBX when discarding spec_ctrl_intercepted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/8] KVM: SVM: Drop 32-bit "support" from __svm_sev_es_vcpu_run()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/8] KVM: SVM: Wrap __svm_sev_es_vcpu_run() with #ifdef CONFIG_KVM_AMD_SEV
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/8] KVM: SVM: Create a stack frame in __svm_vcpu_run() for unwinding
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/8] KVM: SVM: Clean up VMRUN=>#VMEXIT assembly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: VMX: Combine "check" and "get" APIs for passthrough MSR lookups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/3] KVM: VMX: return early if msr_bitmap is not supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: VMX: fix comment to add LBR to passthrough MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: VMX: MSR intercept/passthrough cleanup and simplification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Kent Overstreet <kent.overstreet@xxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86: irq: unconditionally define KVM interrupt vectors
- From: Xin Li <xin@xxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Jeff Johnson <quic_jjohnson@xxxxxxxxxxx>
- Re: [PATCH v5] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: x86/mmu: Fix a *very* theoretical race in kvm_mmu_track_write()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 11/11] selftests: kvm: add tests for KVM_SEV_INIT2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 7/8] KVM: x86/mmu: Track if sptes refer to refcounted pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 4/8] KVM: mmu: Improve handling of non-refcounted pfns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [FYI][PATCH] tracing/treewide: Remove second parameter of __assign_str()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v10 7/8] KVM: x86/mmu: Track if sptes refer to refcounted pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 11/11] selftests: kvm: add tests for KVM_SEV_INIT2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/11] KVM: SEV: define VM types for SEV and SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 3/4] kvm: arm64: set io memory s2 pte as normalnc for vfio pci device
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 0/4] kvm: arm64: allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 04/11] KVM: SEV: publish supported VMSA features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 10/11] KVM: SEV: introduce KVM_SEV_INIT2 operation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/11] KVM: SEV: define VM types for SEV and SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 08/11] KVM: x86: Add is_vm_type_supported callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 07/11] KVM: x86: define standard behavior for bits 0/1 of VM type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 07/11] KVM: x86: define standard behavior for bits 0/1 of VM type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 04/11] KVM: SEV: publish supported VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 04/11] KVM: SEV: publish supported VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 06/11] KVM: SEV: disable DEBUG_SWAP by default
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 04/11] KVM: SEV: publish supported VMSA features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 14/14] arm64: Add memregions_efi_init
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 13/14] arm64: Simplify efi_mem_init
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 12/14] arm/arm64: Factor out allocator init from mem_init
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 11/14] arm/arm64: Factor out some initial setup
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 10/14] arm64: efi: Allow running tests directly
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 09/14] lib/efi: Add support for loading the initrd
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 08/14] arm64: efi: Improve device tree discovery
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 07/14] arm64: efi: Remove EFI_USE_DTB
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 06/14] arm64: efi: Move run code into a function
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 05/14] arm64: efi: Remove redundant dtb generation
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 04/14] arm64: efi: Make running tests on EFI can be parallel
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 03/14] arm64: efi: Don't create dummy test
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 02/14] runtime: Add yet another 'no kernel' error message
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 01/14] runtime: Update MAX_SMP probe
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 00/14] arm64: EFI improvements
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH] KVM: Get rid of return value from kvm_arch_create_vm_debugfs()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 01/11] KVM: SEV: fix compat ABI for KVM_MEMORY_ENCRYPT_OP
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/11] KVM: SEV: allow customizing VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 02/11] KVM: introduce new vendor op for KVM_GET_DEVICE_ATTR
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 00/11] KVM: SEV: allow customizing VMSA features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 02/11] KVM: introduce new vendor op for KVM_GET_DEVICE_ATTR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 00/10] KVM: arm64: Avoid serializing LPI get() / put()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 01/11] KVM: SEV: fix compat ABI for KVM_MEMORY_ENCRYPT_OP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v2 02/11] KVM: introduce new vendor op for KVM_GET_DEVICE_ATTR
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 01/11] KVM: SEV: fix compat ABI for KVM_MEMORY_ENCRYPT_OP
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 09/11] KVM: SEV: define VM types for SEV and SEV-ES
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 11/11] selftests: kvm: add tests for KVM_SEV_INIT2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 10/11] KVM: SEV: introduce KVM_SEV_INIT2 operation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 08/11] KVM: x86: Add is_vm_type_supported callback
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 06/11] KVM: SEV: disable DEBUG_SWAP by default
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 04/11] KVM: SEV: publish supported VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 00/11] KVM: SEV: allow customizing VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 07/11] KVM: x86: define standard behavior for bits 0/1 of VM type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 03/11] Documentation: kvm/sev: separate description of firmware
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 05/11] KVM: SEV: store VMSA features in kvm_sev_info
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] x86: irq: unconditionally define KVM interrupt vectors
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 7/8] KVM: x86/mmu: Track if sptes refer to refcounted pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 4/8] KVM: mmu: Improve handling of non-refcounted pfns
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v10 0/8] KVM: allow mapping non-refcounted pages
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] Build guest_memfd_test also on arm64.
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH vhost v2 17/19] virtio_net: unify the code for recycling the xmit ptr
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 18/19] virtio_net: rename free_old_xmit_skbs to free_old_xmit
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 14/19] virtio_ring: remove api of setting vq premapped
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 16/19] virtio_ring: introduce virtqueue_dma_map_sg_attrs
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 12/19] virtio_ring: export premapped to driver by struct virtqueue
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 10/19] virtio_ring: simplify the parameters of the funcs related to vring_create/new_virtqueue()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 15/19] virtio_ring: introduce dma map api for page
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 13/19] virtio_net: set premapped mode by find_vqs()
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 11/19] virtio: find_vqs: add new parameter premapped
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 09/19] virtio: vring_new_virtqueue(): pass struct instead of multi parameters
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 08/19] virtio: vring_create_virtqueue: pass struct instead of multi parameters
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 07/19] virtio: find_vqs: pass struct instead of multi parameters
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 03/19] virtio_ring: packed: structure the indirect desc table
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 04/19] virtio_ring: split: remove double check of the unmap ops
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 06/19] virtio_ring: no store dma info when unmap is not needed
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 05/19] virtio_ring: split: structure the indirect desc table
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 01/19] virtio_ring: introduce vring_need_unmap_buffer
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 02/19] virtio_ring: packed: remove double check of the unmap ops
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- [PATCH vhost v2 00/19] virtio: drivers maintain dma info for premapped vq
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: x86/mmu: Fix a *very* theoretical race in kvm_mmu_track_write()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/8] Multi-migration support
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH vhost v1 00/19] virtio: drivers maintain dma info for premapped vq
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v5] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v4 2/2] target/i386: add control bits support for LAM
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v2] target/i386/kvm: Refine VMX controls setting for backward compatibility
- From: Ewan Hai <ewanhai-oc@xxxxxxxxxxx>
- Re: [PATCH v4 1/2] target/i386: add support for LAM in CPUID enumeration
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- Re: [PATCH v19 0/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [RFC PATCH v5 08/29] KVM: selftests: TDX: Add TDX lifecycle test
- From: Chen Yu <yu.c.chen@xxxxxxxxx>
- Re: [PATCH v4 50/66] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
- From: "Qiu, Feng" <feng.qiu@xxxxxxxxx>
- Re: [PATCH] x86/cpu: Add a VMX flag to enumerate 5-level EPT support to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v2] KVM: selftests: Test top-down slots event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: x86/mmu: Clean up indirect_shadow_pages usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/8] KVM: x86/mmu: Allow TDP MMU (un)load to run in parallel
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/6] KVM: x86: Clean up "force immediate exit" code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: Clean up "preempted in-kernel" logic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: kvm_has_noapic_vcpu fix/cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Cleanup kvm_get_dr() usage
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: GUEST_MEMFD fixes/restrictions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: fix kvm_mmu_memory_cache allocation warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 50/66] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v9 11/11] KVM: selftests: Add a basic SEV-ES smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 10/11] KVM: selftests: Add a basic SEV smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 09/11] KVM: selftests: Use the SEV library APIs in the intra-host migration test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 08/11] KVM: selftests: Add library for creating and interacting with SEV guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 07/11] KVM: selftests: Allow tagging protected memory in guest page tables
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 06/11] KVM: selftests: Explicitly ucall pool from shared memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 05/11] KVM: selftests: Add support for protected vm_vaddr_* allocations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 04/11] KVM: selftests: Add support for allocating/managing protected guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 03/11] KVM: selftests: Add a macro to iterate over a sparsebit range
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 02/11] KVM: selftests: Make sparsebit structs const where appropriate
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 01/11] KVM: selftests: Extend VM creation's @shape to allow control of VM subtype
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v9 00/11] KVM: selftests: Add SEV and SEV-ES smoke tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- folio_mmapped
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: [PATCH v8 10/10] KVM: selftests: Add a basic SEV smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 10/10] KVM: selftests: Add a basic SEV smoke test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio: mdev: make mdev_bus_type const
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V1 vfio 0/5] Improve mlx5 driver to better handle some error cases
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v19 0/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Use WARN_ON for low-probability allocation failure issue in vfio_pci_bus_notifier
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v8 4/4] vfio: convey kvm that the vfio-pci device is wc safe
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL] Please pull IOMMUFD subsystem changes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 1/1] vhost: Added pad cleanup if vnet_hdr is not present.
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86: Update KVM_SW_PROTECTED_VM docs to make it clear they're a WIP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Re: Re: EEVDF/vhost regression (bisected to 86bfbb7ce4f6 sched/fair: Add lag based placement)
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]