Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v5 43/65] headers: Add definitions from UEFI spec for volumes, resources, etc...
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 42/65] i386/tdx: Track RAM entries for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 41/65] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 40/65] i386/tdx: Don't initialize pc.rom for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 39/65] i386/tdx: Skip BIOS shadowing setup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 38/65] i386/tdx: Parse TDVF metadata for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 37/65] i386/tdvf: Introduce function to parse TDVF metadata
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 36/65] i386/tdx: load TDVF for TD guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 35/65] memory: Introduce memory_region_init_ram_guest_memfd()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 34/65] kvm/tdx: Ignore memory conversion to shared of unassigned region
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 33/65] kvm/tdx: Don't complain when converting vMMIO region to shared
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 32/65] i386/tdx: Set kvm_readonly_mem_enabled to false for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 31/65] i386/tdx: Implement user specified tsc frequency
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 30/65] i386/tdx: Support user configurable mrconfigid/mrowner/mrownerconfig
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 29/65] i386/tdx: Validate TD attributes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 28/65] i386/tdx: Disable pmu for TD guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 27/65] i386/tdx: Wire CPU features up with attributes of TD guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 26/65] i386/tdx: Make sept_ve_disable set by default
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 25/65] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 24/65] i386/tdx: Initialize TDX before creating TD vcpus
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 23/65] kvm: Introduce kvm_arch_pre_create_vcpu()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 22/65] i386/kvm: Move architectural CPUID leaf generation to separate helper
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 21/65] i386/tdx: Integrate tdx_caps->attrs_fixed0/1 to tdx_cpuid_lookup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 20/65] i386/tdx: Integrate tdx_caps->xfam_fixed0/1 into tdx_cpuid_lookup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 19/65] i386/tdx: Update tdx_cpuid_lookup[].tdx_fixed0/1 by tdx_caps.cpuid_config[]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 18/65] i386/tdx: Make Intel-PT unsupported for TD guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 17/65] i386/tdx: Adjust the supported CPUID based on TDX restrictions
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 16/65] i386/tdx: Introduce is_tdx_vm() helper and cache tdx_guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 15/65] i386/tdx: Get tdx_capabilities via KVM_TDX_CAPABILITIES
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 14/65] i386/tdx: Implement tdx_kvm_init() to initialize TDX VM context
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 13/65] target/i386: Implement mc->kvm_type() to get VM type
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 12/65] i386: Introduce tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 11/65] *** HACK *** linux-headers: Update headers to pull in TDX API changes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 10/65] kvm/memory: Make memory type private by default if it has guest memfd backend
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 09/65] trace/kvm: Add trace for page convertion between shared and private
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 08/65] kvm: handle KVM_EXIT_MEMORY_FAULT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 07/65] physmem: Introduce ram_block_discard_guest_memfd_range()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 06/65] kvm: Introduce support for memory_attributes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: aarch64: Remove unused functions from vpmu test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v5 05/65] kvm: Enable KVM_SET_USER_MEMORY_REGION2 for memslot
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 04/65] trace/kvm: Split address space and slot id in trace_kvm_set_user_memory()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 03/65] HostMem: Add mechanism to opt in kvm guest memfd via MachineState
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 02/65] RAMBlock: Add support of KVM private guest memfd
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 01/65] linux-headers: Update to Linux v6.8-rc5
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v5 00/65] QEMU Guest memfd + QEMU TDX support
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: CVE-2021-46978: KVM: nVMX: Always make an attempt to map eVMCS after migration
- From: Greg KH <gregkh@xxxxxxxxxx>
- Re: [RFC 2/8] hw/core: Move CPU topology enumeration into arch-agnostic file
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 32/32] powerpc: gitlab CI update
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 09/32] scripts: allow machine option to be specified in unittests.cfg
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 04/32] powerpc: interrupt stack backtracing
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 04/13] treewide: lib/stack: Make base_address arch specific
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 03/13] treewide: lib/stack: Fix backtrace
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- [PATCH v11 8/8] KVM: x86/mmu: Handle non-refcounted pages
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v11 7/8] KVM: x86/mmu: Track if sptes refer to refcounted pages
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v11 6/8] KVM: x86: Migrate to kvm_follow_pfn()
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v11 5/8] KVM: Migrate kvm_vcpu_map() to kvm_follow_pfn()
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v11 4/8] KVM: mmu: Improve handling of non-refcounted pfns
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v11 3/8] KVM: mmu: Introduce kvm_follow_pfn()
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v11 2/8] KVM: Relax BUG_ON argument validation
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v11 1/8] KVM: Assert that a page's refcount is elevated when marking accessed/dirty
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- [PATCH v11 0/8] KVM: allow mapping non-refcounted pages
- From: David Stevens <stevensd@xxxxxxxxxxxx>
- Re: [PATCH v7] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH RFC 00/20] Add Counter delegation ISA extension support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 15/15] KVM: riscv: selftests: Add a test for counter overflow
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 14/15] KVM: riscv: selftests: Add a test for PMU snapshot functionality
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 13/15] KVM: riscv: selftests: Add SBI PMU selftest
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 12/15] KVM: riscv: selftests: Add SBI PMU extension definitions
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 11/15] KVM: riscv: selftests: Add Sscofpmf to get-reg-list test
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 10/15] RISC-V: KVM: Support 64 bit firmware counters on RV32
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 09/15] RISC-V: KVM: Add perf sampling support for guests
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 08/15] RISC-V: KVM: Implement SBI PMU Snapshot feature
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 07/15] RISC-V: KVM: No need to exit to the user space if perf event failed
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 06/15] RISC-V: KVM: No need to update the counter value during reset
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 05/15] drivers/perf: riscv: Implement SBI PMU snapshot function
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 04/15] RISC-V: Add SBI PMU snapshot definitions
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 03/15] drivers/perf: riscv: Read upper bits of a firmware counter
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 02/15] RISC-V: Add FIRMWARE_READ_HI definition
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 01/15] RISC-V: Fix the typo in Scountovf CSR name
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v4 00/15] RISC-V SBI v2.0 PMU improvements and Perf sampling in KVM guest
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: selftests: Add SEV and SEV-ES smoke tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 07/11] KVM: selftests: Allow tagging protected memory in guest page tables
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v19 008/130] x86/tdx: Warning with 32bit build shift-count-overflow
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: selftests: Add SEV and SEV-ES smoke tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: CVE-2021-46978: KVM: nVMX: Always make an attempt to map eVMCS after migration
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 0/8] Use TAP in some more x86 KVM selftests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v9 18/21] hw/i386/pc: Support smp.modules for x86 PC machine
- From: "Moger, Babu" <babu.moger@xxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 18/21] KVM: x86: Add gmem hook for initializing memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH 17/21] filemap: add FGP_CREAT_ONLY
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v1 1/1] vfio/nvgrace-gpu: Convey kvm that the device is wc safe
- From: <ankita@xxxxxxxxxx>
- Re: [q&a] Status of IOMMU virtualization for nested virtualization (userspace PCI drivers in VMs)
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 17/21] filemap: add FGP_CREAT_ONLY
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 3/8] KVM: selftests: Move setting a vCPU's entry point to a dedicated API
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: Re: folio_mmapped
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: Re: folio_mmapped
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: [PATCH net-next v2 0/3] tun: AF_XDP Tx zero-copy support
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [q&a] Status of IOMMU virtualization for nested virtualization (userspace PCI drivers in VMs)
- From: Peter Delevoryas <peter@xxxxxxx>
- Re: [PATCH v2 vfio 0/2] vfio/pds: Fix and simplify resets
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH 00/21] TDX/SNP part 1 of n, for 6.9
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 03/13] treewide: lib/stack: Fix backtrace
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 10/21] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/21] TDX/SNP part 1 of n, for 6.9
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 00/21] TDX/SNP part 1 of n, for 6.9
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Pass full 64-bit error code when handling page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v5 05/29] KVM: selftests: Add helper functions to create TDX VMs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: Define more SEV+ page fault error bits/flags for #NPF
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 06/13] KVM: arm64: nv: Fast-track 'InHost' exception returns
- From: Joey Gouly <joey.gouly@xxxxxxx>
- [sean-jc:x86/ro_memslot_snafu] [KVM] 666538d29b: kernel-selftests.kvm.make.fail
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- [kvm-unit-tests PATCH 13/13] riscv: efi: Use efi-direct by default
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 12/13] riscv: efi: Add run script
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 11/13] riscv: Enable EFI boot
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 10/13] riscv: Refactor setup code
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 09/13] efi: Add support for obtaining the boot hartid
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 08/13] riscv: efi: Switch stack in _start
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 07/13] riscv: Enable building for EFI
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 06/13] riscv: Tweak the gnu-efi imported code
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 05/13] riscv: Import gnu-efi files
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 04/13] treewide: lib/stack: Make base_address arch specific
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 02/13] riscv: show_regs: Prepare for EFI images
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 03/13] treewide: lib/stack: Fix backtrace
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 01/13] riscv: Call abort instead of assert on unhandled exceptions
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH 00/13] Enable EFI support
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v4 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 09/10] crypto: qat - implement interface for live migration
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 08/10] crypto: qat - add interface for live migration
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 07/10] crypto: qat - add bank save and restore flows
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 06/10] crypto: qat - expand CSR operations for QAT GEN4 devices
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 05/10] crypto: qat - rename get_sla_arr_of_type()
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 04/10] crypto: qat - relocate CSR access code
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 03/10] crypto: qat - move PFVF compat checker to a function
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 02/10] crypto: qat - relocate and rename 4xxx PF2VM definitions
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 01/10] crypto: qat - adf_get_etr_base() helper
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- [PATCH v4 00/10] crypto: qat - enable QAT GEN4 SRIOV VF live migration for QAT GEN4
- From: Xin Zeng <xin.zeng@xxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Quentin Perret <qperret@xxxxxxxxxx>
- RE: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: "Zeng, Xin" <xin.zeng@xxxxxxxxx>
- Re: folio_mmapped
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH 00/21] TDX/SNP part 1 of n, for 6.9
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 17/21] filemap: add FGP_CREAT_ONLY
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 17/21] filemap: add FGP_CREAT_ONLY
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 14/21] KVM: x86/mmu: pass error code back to MMU when async pf is ready
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: riscv: selftests: Add Zacas extension to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 4/5] RISC-V: KVM: Allow Zacas extension for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: riscv: selftests: Add Ztso extension to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] RISC-V: KVM: Allow Ztso extension for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] RISC-V: KVM: Forward SEED CSR access to user space
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: folio_mmapped
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: folio_mmapped
- From: Quentin Perret <qperret@xxxxxxxxxx>
- Re: [PATCH net-next v2 0/3] tun: AF_XDP Tx zero-copy support
- From: Jiri Pirko <jiri@xxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 32/32] powerpc: gitlab CI update
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 30/32] configure: Make arch_libdir a first-class entity
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 29/32] configure: Fail on unknown arch
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 25/32] common/sieve: Support machines without MMU
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 24/32] common/sieve: Use vmalloc.h for setup_mmu definition
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 23/32] powerpc: Add MMU support
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 10/32] scripts: Accommodate powerpc powernv machine differences
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 17/32] arch-run: Fix handling multiple exit status messages
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v8 03/16] virt: sev-guest: Add SNP guest request structure
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 09/32] scripts: allow machine option to be specified in unittests.cfg
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 04/32] powerpc: interrupt stack backtracing
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: Yisheng Xie <ethan.xys@xxxxxxxxxxxxxxxxx>
- Re: folio_mmapped
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH net-next v2 3/3] tun: AF_XDP Tx zero-copy support
- From: Yunjian Wang <wangyunjian@xxxxxxxxxx>
- [PATCH net-next v2 2/3] vhost_net: Call peek_len when using xdp
- From: Yunjian Wang <wangyunjian@xxxxxxxxxx>
- [PATCH net-next v2 1/3] xsk: Remove non-zero 'dma_page' check in xp_assign_dev
- From: Yunjian Wang <wangyunjian@xxxxxxxxxx>
- [PATCH net-next v2 0/3] tun: AF_XDP Tx zero-copy support
- From: Yunjian Wang <wangyunjian@xxxxxxxxxx>
- Re: folio_mmapped
- From: Quentin Perret <qperret@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Check that KVM_FEATURE_PV_UNHALT is cleared with KVM_X86_DISABLE_EXITS_HLT
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Use actual kvm_cpuid.base for clearing KVM_FEATURE_PV_UNHALT
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: Fix KVM_FEATURE_PV_UNHALT update logic
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Introduce __kvm_get_hypervisor_cpuid() helper
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 03/21] hw/core: Introduce module-id as the topology subindex
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v9 02/21] hw/core/machine: Support modules in -smp
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- RE: [RFC 2/8] hw/core: Move CPU topology enumeration into arch-agnostic file
- From: JeeHeng Sia <jeeheng.sia@xxxxxxxxxxxxxxxx>
- RE: [RFC 6/8] i386/cpu: Update cache topology with machine's configuration
- From: JeeHeng Sia <jeeheng.sia@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 05/15] Documentation: kvm/sev: separate description of firmware
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH net-next v6 4/5] vhost/net: remove vhost_net_page_frag_refill()
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH net-next v6 2/5] page_frag: unify gfp bits for order 3 page allocation
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- RE: [PATCH v2 vfio 0/2] vfio/pds: Fix and simplify resets
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v7 0/4] KVM: selftests: Add LoongArch support
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH 04/16] KVM: x86/mmu: Pass full 64-bit error code when handling page faults
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- RE: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: JeeHeng Sia <jeeheng.sia@xxxxxxxxxxxxxxxx>
- RE: [PATCH v2 vfio 2/2] vfio/pds: Refactor/simplify reset logic
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 vfio 1/2] vfio/pds: Always clear the save/restore FDs on reset
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 03/16] KVM: x86: Define more SEV+ page fault error bits/flags for #NPF
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- RE: [PATCH v4 7/8] cpuidle/poll_state: replace cpu_relax with smp_cond_load_relaxed
- From: Ankur Arora <ankur.a.arora@xxxxxxxxxx>
- Re: [PATCH v3 00/15] KVM: SEV: allow customizing VMSA features
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [PATCH 12/16] KVM: x86/mmu: Move slot checks from __kvm_faultin_pfn() to kvm_faultin_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/16] KVM: x86/mmu: Initialize kvm_page_fault's pfn and hva to error values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/16] KVM: x86/mmu: Sanity check that __kvm_faultin_pfn() doesn't create noslot pfns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/16] KVM: x86/mmu: Set kvm_page_fault.hva to KVM_HVA_ERR_BAD for "no slot" faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/16] KVM: x86/mmu: Handle no-slot faults at the beginning of kvm_faultin_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/16] KVM: x86/mmu: Explicitly disallow private accesses to emulated MMIO
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/16] KVM: x86/mmu: Don't force emulation of L2 accesses to non-APIC internal slots
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/16] KVM: x86/mmu: Move private vs. shared check above slot validity checks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/16] KVM: x86/mmu: WARN and skip MMIO cache on private, reserved page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/16] KVM: x86: Move synthetic PFERR_* sanity checks to SVM's #NPF handler
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/16] KVM: x86/mmu: WARN if upper 32 bits of legacy #PF error code are non-zero
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/16] KVM: x86/mmu: Use synthetic page fault error code to indicate private faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/16] KVM: x86/mmu: Pass full 64-bit error code when handling page faults
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/16] KVM: x86: Define more SEV+ page fault error bits/flags for #NPF
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/16] KVM: x86: Remove separate "bit" defines for page fault error code masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/16] KVM: x86/mmu: Exit to userspace with -EFAULT if private fault hits emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/16] KVM: x86/mmu: Page fault and MMIO cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 17/21] filemap: add FGP_CREAT_ONLY
- From: Yosry Ahmed <yosryahmed@xxxxxxxxxx>
- Re: [PATCH 17/21] filemap: add FGP_CREAT_ONLY
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 07/11] KVM: selftests: Allow tagging protected memory in guest page tables
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/21] TDX/SNP part 1 of n, for 6.9
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 01/21] KVM: x86: Split core of hypercall emulation to helper function
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 10/21] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 14/21] KVM: x86/mmu: pass error code back to MMU when async pf is ready
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 07/21] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/21] TDX/SNP part 1 of n, for 6.9
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 13/15] KVM: SEV: define VM types for SEV and SEV-ES
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- [PATCH v2 vfio 2/2] vfio/pds: Refactor/simplify reset logic
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v2 vfio 0/2] vfio/pds: Fix and simplify resets
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH v2 vfio 1/2] vfio/pds: Always clear the save/restore FDs on reset
- From: Brett Creeley <brett.creeley@xxxxxxx>
- Re: [PATCH v9 07/11] KVM: selftests: Allow tagging protected memory in guest page tables
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- [PATCH 21/21] KVM: x86: Add gmem hook for determining max NPT mapping level
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 09/21] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 17/21] filemap: add FGP_CREAT_ONLY
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 18/21] KVM: x86: Add gmem hook for initializing memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 06/21] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 14/21] KVM: x86/mmu: pass error code back to MMU when async pf is ready
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 11/21] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 08/21] KVM: VMX: Move out vmx_x86_ops to 'main.c' to dispatch VMX and TDX
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 20/21] KVM: x86: Add gmem hook for invalidating memory
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 10/21] KVM: SEV: Use a VMSA physical address variable for populating VMCB
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 16/21] KVM: guest_memfd: pass error up from filemap_grab_folio
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 12/21] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 15/21] KVM: x86/mmu: Use PFERR_GUEST_ENC_MASK to indicate fault is private
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 19/21] KVM: guest_memfd: add API to undo kvm_gmem_get_uninit_pfn
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 13/21] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 04/21] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 00/21] TDX/SNP part 1 of n, for 6.9
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 07/21] KVM: VMX: Introduce test mode related to EPT violation VE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 03/21] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 02/21] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 05/21] KVM: x86/mmu: Add Suppress VE bit to EPT shadow_mmio_mask/shadow_present_mask
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH 01/21] KVM: x86: Split core of hypercall emulation to helper function
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v8 03/16] virt: sev-guest: Add SNP guest request structure
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [GIT PULL] KVM: x86: SVM changes for 6.9
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: VMX: MSR intercept/passthrough cleanup and simplification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] kvm/x86: allocate the write-tracking metadata on-demand
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] arm64: errata: Minimize tlb flush due to vttbr writes on AmpereOne
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] arm64: errata: Minimize tlb flush due to vttbr writes on AmpereOne
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: John Allen <john.allen@xxxxxxx>
- [kvm-unit-tests PATCH v2 12/18] arm/arm64: Factor out allocator init from mem_init
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v2 5/9] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 7/9] x86/sev-es: Include XSS value in GHCB CPUID request
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/9] x86/boot: Move boot_*msr helpers to asm/shared/msr.h
- From: Borislav Petkov <bp@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 05/18] arm64: efi: Remove redundant dtb generation
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v2 5/9] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: John Allen <john.allen@xxxxxxx>
- [GIT PULL] KVM: x86: SVM changes for 6.9
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 18/18] arm64: efi: Add gitlab CI
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 17/18] arm64: efi: Switch to our own stack
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 16/18] arm64: efi: Fix _start returns from failed _relocate
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 15/18] arm64: efi: Don't map reserved regions
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 14/18] arm64: Add memregions_efi_init
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 13/18] arm64: Simplify efi_mem_init
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 11/18] arm/arm64: Factor out some initial setup
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 10/18] arm64: efi: Allow running tests directly
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 09/18] lib/efi: Add support for loading the initrd
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 08/18] arm64: efi: Improve device tree discovery
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 07/18] arm64: efi: Remove EFI_USE_DTB
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 06/18] arm64: efi: Move run code into a function
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 04/18] arm64: efi: Make running tests on EFI can be parallel
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 03/18] arm64: efi: Don't create dummy test
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 02/18] runtime: Add yet another 'no kernel' error message
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 01/18] runtime: Update MAX_SMP probe
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [kvm-unit-tests PATCH v2 00/18] arm64: EFI improvements
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v2 5/9] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 5/9] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 02/16] virt: sev-guest: Replace dev_dbg with pr_debug
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 01/16] virt: sev-guest: Use AES GCM crypto library
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 5/9] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/15] KVM: SEV: allow customizing VMSA features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v18 064/121] KVM: TDX: Create initial guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/73] KVM: x86/PVM: Introduce a new hypervisor
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] kvm/x86: allocate the write-tracking metadata on-demand
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH 15/73] mm/vmalloc: Add a helper to reserve a contiguous and aligned kernel virtual area
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [RFC 8/8] qemu-options: Add the cache topology description of -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: folio_mmapped
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [RFC PATCH 15/73] mm/vmalloc: Add a helper to reserve a contiguous and aligned kernel virtual area
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v18 064/121] KVM: TDX: Create initial guest memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [PATCH v8 2/2] ppc: spapr: Enable 2nd DAWR on Power10 pSeries machine
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- [PATCH v2 3/8] KVM: x86/xen: remove WARN_ON_ONCE() with false positives in evtchn delivery
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 6/8] KVM: x86/xen: split up kvm_xen_set_evtchn_fast()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 5/8] KVM: x86/xen: fix recursive deadlock in timer injection
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 4/8] KVM: pfncache: simplify locking and make more self-contained
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 8/8] KVM: pfncache: clean up rwlock abuse
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v8 1/2] ppc: Enable 2nd DAWR support on Power10 PowerNV machine
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- [PATCH v2 7/8] KVM: x86/xen: avoid blocking in hardirq context in kvm_xen_set_evtchn_fast()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 2/8] KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 0/8] KVM: x86/xen updates
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Markus Armbruster <armbru@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 00/21] Introduce smp.modules for x86 in QEMU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 21/21] i386/cpu: Use CPUCacheInfo.share_level to encode CPUID[0x8000001D].EAX[bits 25:14]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 20/21] i386/cpu: Use CPUCacheInfo.share_level to encode CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 19/21] i386: Add cache topology info in CPUCacheInfo
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 17/21] tests: Add test case of APIC ID for module level parsing
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 18/21] hw/i386/pc: Support smp.modules for x86 PC machine
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 16/21] i386/cpu: Introduce module-id to X86CPU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 15/21] i386: Support module_id in X86CPUTopoIDs
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 14/21] i386: Expose module level in CPUID[0x1F]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 13/21] i386: Support modules_per_die in X86CPUTopoInfo
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 12/21] i386: Introduce module level cpu topology to CPUX86State
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 11/21] i386/cpu: Decouple CPUID[0x1F] subleaf with specific topology level
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 10/21] i386: Split topology types of CPUID[0x1F] from the definitions of CPUID[0xB]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 09/21] i386/cpu: Introduce bitmap to cache available CPU topology levels
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 08/21] i386/cpu: Consolidate the use of topo_info in cpu_x86_cpuid()
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 07/21] i386/cpu: Use APIC ID info get NumSharingCache for CPUID[0x8000001D].EAX[bits 25:14]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 06/21] i386/cpu: Use APIC ID info to encode cache topo in CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 05/21] i386/cpu: Fix i/d-cache topology to core level for Intel CPU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- [PATCH v9 04/21] hw/core: Support module-id in numa configuration
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 03/21] hw/core: Introduce module-id as the topology subindex
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 02/21] hw/core/machine: Support modules in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 01/21] hw/core/machine: Introduce the module as a CPU topology level
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v9 00/21] Introduce smp.modules for x86 in QEMU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH kvmtool] Fix 9pfs open device file security flaw
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v4 53/66] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: Xi Ruoyao <xry111@xxxxxxxxxxx>
- Re: [PATCH v19 091/130] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 03/32] powerpc: Fix stack backtrace termination
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PULL 05/30] hw/i386/kvmvapic: Inline sysbus_address_space()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- RE: [PATCH] MAINTAINERS: Re-alphabetize VFIO
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- subscribe
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: "Jiaxun Yang" <jiaxun.yang@xxxxxxxxxxx>
- Re: [PATCH v4 4/5] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v3 00/15] KVM: SEV: allow customizing VMSA features
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v4 1/5] KVM: selftests: aarch64: Make the [create|destroy]_vpmu_vm() public
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- linux-next: manual merge of the kvm tree with the loongarch tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/8] Use TAP in some more x86 KVM selftests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: selftests: Add SEV and SEV-ES smoke tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/intr: Explicitly check NMI from guest to eliminate false positives
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Yin Fengwei <fengwei.yin@xxxxxxxxx>
- [PATCH 1/1] KVM: selftests: close the memfd in some gmem tests
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/intr: Explicitly check NMI from guest to eliminate false positives
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 0/4] KVM: arm64: Allow the VM to select DEVICE_* and NORMAL_NC for IO memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 9/9] KVM: SVM: Add CET features to supported_xss
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 7/9] x86/sev-es: Include XSS value in GHCB CPUID request
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 8/9] KVM: SVM: Use KVM-governed features to track SHSTK
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 6/9] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 5/9] KVM: SVM: Rename vmplX_ssp -> plX_ssp
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 4/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 3/9] KVM: x86: SVM: Update dump_vmcb with shadow stack save area additions
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 2/9] KVM: x86: SVM: Emulate reads and writes to shadow stack MSRs
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 1/9] x86/boot: Move boot_*msr helpers to asm/shared/msr.h
- From: John Allen <john.allen@xxxxxxx>
- [PATCH v2 0/9] SVM guest shadow stack support
- From: John Allen <john.allen@xxxxxxx>
- Re: Re: folio_mmapped
- From: Elliot Berman <quic_eberman@xxxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: "Cabiddu, Giovanni" <giovanni.cabiddu@xxxxxxxxx>
- Re: [PATCH 1/6] hw/arm: Inline sysbus_create_simple(PL110 / PL111)
- From: BALATON Zoltan <balaton@xxxxxxxxxx>
- Re: [PATCH v5 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: "Jiaxun Yang" <jiaxun.yang@xxxxxxxxxxx>
- Re: [PATCH 0/8] KVM: SVM: Clean up VMRUN=>#VMEXIT assembly
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v19 028/130] KVM: TDX: Add TDX "architectural" error codes
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 071/121] KVM: TDX: restore user ret MSRs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 057/121] KVM: TDX: Add load_mmu_pgd method for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 061/121] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 060/121] KVM: TDX: TDP MMU TDX support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v3 08/15] KVM: SEV: store VMSA features in kvm_sev_info
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 09/15] KVM: SEV: disable DEBUG_SWAP by default
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 14/15] KVM: SEV: introduce KVM_SEV_INIT2 operation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 13/15] KVM: SEV: define VM types for SEV and SEV-ES
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 03/15] KVM: SVM: Invert handling of SEV and SEV_ES feature flags
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 10/15] KVM: x86: add fields to struct kvm_arch for CoCo features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 15/15] selftests: kvm: add tests for KVM_SEV_INIT2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 06/15] KVM: introduce new vendor op for KVM_GET_DEVICE_ATTR
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 12/15] KVM: SEV: introduce to_kvm_sev_info
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 07/15] KVM: SEV: publish supported VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 04/15] KVM: SVM: Compile sev.c if and only if CONFIG_KVM_AMD_SEV=y
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 11/15] KVM: x86: Add supported_vm_types to kvm_caps
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 02/15] KVM: x86: use u64_to_user_addr()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 05/15] Documentation: kvm/sev: separate description of firmware
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 00/15] KVM: SEV: allow customizing VMSA features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v3 01/15] KVM: SEV: fix compat ABI for KVM_MEMORY_ENCRYPT_OP
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v18 039/121] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 030/121] KVM: TDX: Do TDX specific vcpu initialization
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 029/121] KVM: TDX: create/free TDX vcpu structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 025/121] KVM: TDX: initialize VM with TDX specific parameters
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 024/121] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] vfio/qat: Add vfio_pci driver for Intel QAT VF devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v18 023/121] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 064/121] KVM: TDX: Create initial guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v18 007/121] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 001/121] x86/virt/tdx: Export TDX KeyID information
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 044/121] KVM: x86/mmu: Assume guest MMIOs are shared
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v18 064/121] KVM: TDX: Create initial guest memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 044/121] KVM: x86/mmu: Assume guest MMIOs are shared
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 040/121] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 040/121] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- [PATCH v2 5/6] hw/i386/kvmvapic: Inline sysbus_address_space()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v18 002/121] x86/virt/tdx: Export SEAMCALL functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 032/121] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] hw/arm: Inline sysbus_create_simple(PL110 / PL111)
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 00/11] KVM: selftests: Add SEV and SEV-ES smoke tests
- From: Carlos Bilbao <carlos.bilbao@xxxxxxx>
- Re: [PATCH 5/9] KVM: SVM: Save shadow stack host state on VMRUN
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 0/2] x86/cpu: fix invalid MTRR mask values for SEV or TME
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] vfio/type1: unpin PageReserved page
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] vfio/type1: unpin PageReserved page
- From: Yisheng Xie <ethan.xys@xxxxxxxxxxxxxxxxx>
- Re: [RFC 8/8] qemu-options: Add the cache topology description of -smp
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [RFC 4/8] hw/core: Add cache topology options in -smp
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [RFC PATCH 58/73] x86/pvm: Relocate kernel address space layout
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] x86/cpu: Add a VMX flag to enumerate 5-level EPT support to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 63/73] x86/pvm: Add hypercall support
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 37/73] KVM: x86/PVM: Use host PCID to reduce guest TLB flushing
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 51/73] x86/tools/relocs: Append relocations into input file
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] x86: irq: unconditionally define KVM interrupt vectors
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [RFC PATCH 61/73] x86/pvm: Allow to install a system interrupt handler
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 44/73] KVM: x86/PVM: Implement TSC related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] vfio: amba: Rename pl330_ids[] to vfio_amba_ids[]
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 00/73] KVM: x86/PVM: Introduce a new hypervisor
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [RFC PATCH 57/73] x86/pvm: Make cpu entry area and vmalloc area variable
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 73/73] x86/pvm: Disable some unsupported syscalls and features
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 72/73] x86/pvm: Use RDTSCP as default in vdso_read_cpunode()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 71/73] x86/pvm: Adapt pushf/popf in this_cpu_cmpxchg16b_emu()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 70/73] x86/pvm: Don't use SWAPGS for gsbase read/write
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 32/73] KVM: x86/PVM: Enable guest debugging functions
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 69/73] x86/pvm: Implement mmu related PVOPS
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 68/73] x86/pvm: Implement irq related PVOPS
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 45/73] KVM: x86/PVM: Add dummy PMU related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 67/73] x86/pvm: Implement cpu related PVOPS
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 66/73] x86/pvm: Use new cpu feature to describe XENPV and PVM
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 49/73] KVM: x86/PVM: Implement emulation for non-PVM mode
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 65/73] x86/kvm: Patch KVM hypercall as PVM hypercall
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 64/73] x86/pvm: Enable PVM event delivery
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 62/73] x86/pvm: Add early kernel event entry and dispatch code
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 60/73] x86/pvm: Add event entry/exit and dispatch code
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 59/73] x86/pti: Force enabling KPTI for PVM guest
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 56/73] x86/pvm: Relocate kernel image early in PVH entry
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 55/73] x86/pvm: Relocate kernel image to specific virtual address range
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 26/73] KVM: x86/PVM: Implement event delivery flags related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 54/73] x86/pvm: Detect PVM hypervisor support
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 53/73] x86/pvm: Add Kconfig option and the CPU feature bit for PVM guest
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 52/73] x86/boot: Allow to do relocation for uncompressed kernel
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 50/73] x86/tools/relocs: Cleanup cmdline options
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 48/73] KVM: x86/PVM: Implement system registers setting callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 47/73] KVM: x86/PVM: Handle the left supported MSRs in msrs_to_save_base[]
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 46/73] KVM: x86/PVM: Support for CPUID faulting
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 43/73] KVM: x86/PVM: Enable direct switching
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 20/73] KVM: x86/PVM: Implement vcpu_load()/vcpu_put() related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 42/73] KVM: x86/PVM: Support for kvm_exit() tracepoint
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 41/73] KVM: x86/PVM: Allow to load guest TLS in host GDT
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 40/73] KVM: x86/PVM: Handle hypercall for loading GS selector
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 39/73] KVM: x86/PVM: Handle hypercall for CR3 switching
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 38/73] KVM: x86/PVM: Handle hypercalls for privilege instruction emulation
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 36/73] KVM: x86/PVM: Handle KVM hypercall
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 35/73] KVM: x86/PVM: Handle PVM_SYNTHETIC_CPUID synthetic instruction
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 34/73] KVM: x86/PVM: Handle ERETU/ERETS synthetic instruction
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 33/73] KVM: x86/PVM: Handle VM-exit due to hardware exceptions
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 31/73] KVM: x86/PVM: Implement instruction emulation for #UD and #GP
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 30/73] KVM: x86/PVM: Implement segment related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 29/73] KVM: x86/PVM: Implement allowed range checking for #PF
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 28/73] KVM: x86/PVM: Handle syscall from user mode
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 27/73] KVM: x86/PVM: Implement event injection related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 25/73] KVM: x86/PVM: Implement APIC emulation related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 24/73] KVM: x86/PVM: Introduce PVM mode switching
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 23/73] KVM: x86/PVM: Handle event handling related MSR read/write operation
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 22/73] KVM: x86/PVM: Handle some VM exits before enable interrupts
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 21/73] KVM: x86/PVM: Implement vcpu_run() callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 19/73] x86/entry: Export 32-bit ignore syscall entry and __ia32_enabled variable
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 18/73] KVM: x86/PVM: Implement VM/VCPU initialization related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 17/73] KVM: x86/PVM: Implement module initialization related callbacks
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 16/73] KVM: x86/PVM: Implement host mmu initialization
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 15/73] mm/vmalloc: Add a helper to reserve a contiguous and aligned kernel virtual area
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 14/73] KVM: x86: Create stubs for PVM module as a new vendor
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 13/73] KVM: x86/emulator: Reinject #GP if instruction emulation failed for PVM
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 12/73] KVM: x86: Add NR_VCPU_SREG in SREG enum
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 11/73] KVM: x86: Implement gpc refresh for guest usage
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 10/73] KVM: x86: Introduce vendor feature to expose vendor-specific CPUID
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 09/73] KVM: x86: Add PVM virtual MSRs into emulated_msrs_all[]
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 08/73] KVM: x86: Allow hypercall handling to not skip the instruction
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 07/73] KVM: x86/mmu: Adapt shadow MMU for PVM
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 06/73] KVM: x86: Move VMX interrupt/nmi handling into kvm.ko
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 05/73] KVM: x86: Set 'vcpu->arch.exception.injected' as true before vendor callback
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 04/73] x86/entry: Implement direct switching for the switcher
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 03/73] x86/entry: Implement switcher for PVM VM enter/exit
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 02/73] x86/ABI/PVM: Add PVM-specific ABI header file
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 01/73] KVM: Documentation: Add the specification for PVM
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [RFC PATCH 00/73] KVM: x86/PVM: Introduce a new hypervisor
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v19 004/130] x86/virt/tdx: Support global metadata read for all element sizes
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH 2/2] LoongArch: KVM: Do not restart SW timer when it is expired
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 1/2] LoongArch: KVM: Start SW timer only when vcpu is blocking
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Remove unnecessary CSR register saving during enter guest
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [GIT PULL 1/3] KVM: s390: fix virtual vs physical address confusion
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 2/3] KVM: s390: only deliver the set service event bits
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 0/3] KVM: s390: Changes for 6.9
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 3/3] KVM: s390: selftest: memop: Fix undefined behavior
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 01/32] powerpc: Fix KVM caps on POWER9 hosts
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 02/32] powerpc: Fix pseries getchar return value
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] vfio: amba: Rename pl330_ids[] to vfio_amba_ids[]
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] vfio: amba: Rename pl330_ids[] to vfio_amba_ids[]
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- Re: [PATCH 1/1] vhost: Added pad cleanup if vnet_hdr is not present.
- From: Andrew Melnichenko <andrew@xxxxxxxxxx>
- [kvm-unit-tests PATCH 26/32] powerpc: Add sieve.c common test
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 32/32] powerpc: gitlab CI update
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 31/32] powerpc: Remove remnants of ppc64 directory and build structure
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 21/32] powerpc: Add atomics tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 30/32] configure: Make arch_libdir a first-class entity
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 29/32] configure: Fail on unknown arch
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 28/32] powerpc: add pmu tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 27/32] powerpc: add usermode support
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v2 00/13] KVM/arm64: Add NV support for ERET and PAuth
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH 25/32] common/sieve: Support machines without MMU
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 24/32] common/sieve: Use vmalloc.h for setup_mmu definition
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 23/32] powerpc: Add MMU support
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 22/32] powerpc: Add timebase tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 20/32] powerpc: Avoid using larx/stcx. in spinlocks when only one CPU is running
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 19/32] powerpc: Permit ACCEL=tcg,thread=single
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 18/32] powerpc: add SMP and IPI support
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 17/32] arch-run: Fix handling multiple exit status messages
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 16/32] powerpc: Remove broken SMP exception stack setup
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 15/32] powerpc: Add rtas stop-self support
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 14/32] powerpc: general interrupt tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 13/32] powerpc/sprs: Test hypervisor registers on powernv machine
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v2 11/13] KVM: arm64: nv: Add emulation for ERETAx instructions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH 12/32] powerpc: Fix emulator illegal instruction test for powernv
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 11/32] powerpc: Support powernv machine with QEMU TCG
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 10/32] scripts: Accommodate powerpc powernv machine differences
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 09/32] scripts: allow machine option to be specified in unittests.cfg
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 08/32] powerpc/sprs: Avoid taking PMU interrupts caused by register fuzzing
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 07/32] powerpc/sprs: Don't fail changed SPRs that are used by the test harness
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 06/32] powerpc/sprs: Specify SPRs with data rather than code
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 05/32] powerpc: Cleanup SPR and MSR definitions
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 04/32] powerpc: interrupt stack backtracing
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 03/32] powerpc: Fix stack backtrace termination
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 02/32] powerpc: Fix pseries getchar return value
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 01/32] powerpc: Fix KVM caps on POWER9 hosts
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 00/32] powerpc improvements
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v2 13/13] KVM: arm64: nv: Advertise support for PAuth
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 12/13] KVM: arm64: nv: Handle ERETA[AB] instructions
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/13] KVM: arm64: nv: Add kvm_has_pauth() helper
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/13] KVM: arm64: nv: Reinject PAC exceptions caused by HCR_EL2.API==0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/13] KVM: arm64: nv: Handle HCR_EL2.{API,APK} independently
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/13] KVM: arm64: nv: Honor HFGITR_EL2.ERET being set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/13] KVM: arm64: nv: Fast-track 'InHost' exception returns
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/13] KVM: arm64: nv: Add trap forwarding for ERET and SMC
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/13] KVM: arm64: nv: Configure HCR_EL2 for FEAT_NV2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/13] KVM: arm64: nv: Drop VCPU_HYP_CONTEXT flag
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/13] KVM: arm64: Add helpers for ESR_ELx_ERET_ISS_ERET*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/13] KVM: arm64: Harden __ctxt_sys_reg() against out-of-range values
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: David Hildenbrand <david@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/7] (arm|s390): Use migrate_skip in test cases
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 7/7] common: add memory dirtying vs migration test
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 6/7] gitlab-ci: Run migration selftest on s390x and powerpc
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 5/7] arch-run: Add a "continuous" migration option for tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 4/7] powerpc: add asm/time.h header with delay and get_clock_us/ms
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 2/7] migration: Add a migrate_skip command
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/7] arch-run: Keep infifo open
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/7] more migration enhancements and tests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH vhost v2 19/19] virtio_net: sq support premapped mode
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: folio_mmapped
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/8] Multi-migration support
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/26] KVM: Restricted mapping of guest_memfd at the host and pKVM/arm64 support
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [RFC PATCH v1 03/26] KVM: Add restricted support for mapping guestmem by the host
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 2/2] vfio/cdx: add interrupt support
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- [PATCH v3 1/2] genirq/msi: add wrapper msi allocation API and export msi functions
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- RE: [PATCH v4 7/8] cpuidle/poll_state: replace cpu_relax with smp_cond_load_relaxed
- From: "Tomohiro Misono (Fujitsu)" <misono.tomohiro@xxxxxxxxxxx>
- RE: [PATCH v4 6/8] cpuidle-haltpoll: ARM64 support
- From: "Tomohiro Misono (Fujitsu)" <misono.tomohiro@xxxxxxxxxxx>
- [PATCH v8 12/14] KVM: TDX: Implement merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 14/14] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 13/14] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 11/14] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 10/14] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 09/14] KVM: x86/tdp_mmu: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 08/14] KVM: x86/tdp_mmu: Allocate private page table for large page split
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 06/14] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 07/14] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 05/14] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 04/14] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 03/14] KVM: TDX: Pass KVM page level to tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 01/14] KVM: Add transparent hugepage support for dedicated guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 02/14] KVM: TDX: Flush cache based on page size before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v8 00/14] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 130/130] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 128/130] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 129/130] RFC: KVM: x86: Add x86 callback to check cpuid
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 127/130] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 125/130] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 126/130] KVM: TDX: Inhibit APICv for TDX guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 124/130] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 122/130] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 123/130] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 119/130] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 113/130] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 121/130] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 120/130] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 118/130] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 117/130] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 116/130] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 107/130] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 115/130] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 114/130] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 110/130] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 112/130] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 111/130] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v19 109/130] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]