Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v9 21/27] KVM: x86: Save and reload SSP to/from SMRAM
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 20/27] KVM: VMX: Emulate read and write to CET MSRs
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 19/27] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 18/27] KVM: VMX: Introduce CET VMCS fields and control bits
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 17/27] KVM: x86: Report KVM supported CET MSRs as to-be-saved
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 16/27] KVM: x86: Add fault checks for guest CR4.CET setting
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 15/27] KVM: x86: Load guest FPU state when access XSAVE-managed MSRs
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 14/27] KVM: x86: Initialize kvm_caps.supported_xss
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 13/27] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 11/27] KVM: x86: Add kvm_msr_{read,write}() helpers
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 12/27] KVM: x86: Report XSS as to-be-saved if there are supported features
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 10/27] KVM: x86: Refine xsave-managed guest register/MSR reset handling
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 07/27] x86/fpu/xstate: Warn if kernel dynamic xfeatures detected in normal fpstate
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 09/27] KVM: x86: Rename kvm_{g,s}et_msr() to menifest emulation operations
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 08/27] KVM: x86: Rework cpuid_get_supported_xcr0() to operate on vCPU data
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 06/27] x86/fpu/xstate: Create guest fpstate with guest specific config
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 05/27] x86/fpu/xstate: Introduce fpu_guest_cfg for guest FPU configuration
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 04/27] x86/fpu/xstate: Introduce XFEATURE_MASK_KERNEL_DYNAMIC xfeature set
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 03/27] x86/fpu/xstate: Add CET supervisor mode state support
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 02/27] x86/fpu/xstate: Refine CET user xstate bit enabling
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 01/27] x86/fpu/xstate: Always preserve non-user xfeatures/flags in __state_perm
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- [PATCH v9 00/27] Enable CET Virtualization
- From: Yang Weijiang <weijiang.yang@xxxxxxxxx>
- Re: [v2 4/4] KVM: s390: don't setup dummy routing when KVM_CREATE_IRQCHIP
- From: Yi Wang <up2wing@xxxxxxxxx>
- Re: [RFC PATCH 0/8] Dynamic vcpu priority management in kvm
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [v2 1/4] KVM: irqchip: add setup empty irq routing function
- From: Yi Wang <up2wing@xxxxxxxxx>
- Re: [PATCH v18 023/121] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH 2/2] KVM: x86/pmu: Remove vcpu_get_perf_capabilities()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86/pmu: Reset perf_capabilities in vcpu to 0 if PDCM is disabled
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 0/2] minor fix on perf_capabilities in KVM/x86
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2024.01.24 - Memtypes for non-coherent DMA
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/pmu: Fix type length error when reading pmu->fixed_ctr_ctrl
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [v2 4/4] KVM: s390: don't setup dummy routing when KVM_CREATE_IRQCHIP
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [v2 1/4] KVM: irqchip: add setup empty irq routing function
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] vfio/pds: Potential memory leak in pds_vfio_dirty_enable()
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH net-next v2] vsock/test: add '--peer-port' input argument
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v1] KVM: nVMX: Fix handling triple fault on RSM instruction
- From: mlevitsk@xxxxxxxxxx
- Re: [PATCH v11 17/43] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v7] ppc: Enable 2nd DAWR support on p10
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- [PATCH net-next v3 4/5] vhost/net: remove vhost_net_page_frag_refill()
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH net-next v3 2/5] page_frag: unify gfp bits for order 3 page allocation
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v11 17/43] KVM: arm64: nv: Support multiple nested Stage-2 mmu structures
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 05/16] i386: Decouple CPUID[0x1F] subleaf with specific topology level
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 018/121] KVM: TDX: Add helper functions to allocate/free TDX private host key id
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v18 060/121] KVM: TDX: TDP MMU TDX support
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH net-next v2] vsock/test: add '--peer-port' input argument
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH] vfio/pds: Potential memory leak in pds_vfio_dirty_enable()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v18 015/121] KVM: TDX: Retry SEAMCALL on the lack of entropy error
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/21] hw/riscv: Use misa_mxl instead of misa_mxl_max
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: PPC: Book3S HV: Fix L2 guest reboot failure due to empty 'arch_compat'
- From: Gautam Menghani <Gautam.Menghani@xxxxxxxxxxxxx>
- [PATCH net-next v2] vsock/test: add '--peer-port' input argument
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 01/21] hw/riscv: Use misa_mxl instead of misa_mxl_max
- From: Alistair Francis <alistair23@xxxxxxxxx>
- [Bug 218297] Kernel Panic and crash
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v18 007/121] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [kvmtool PATCH 1/1] riscv: Add zacas extension
- From: 秦少青 <qinshaoqing@xxxxxxxxxx>
- [kvmtool PATCH 0/1] riscv: Add zacas extension
- From: 秦少青 <qinshaoqing@xxxxxxxxxx>
- [PATCH] vfio/pds: Potential memory leak in pds_vfio_dirty_enable()
- From: Cong Liu <liucong2@xxxxxxxxxx>
- [PATCH 25/82] KVM: SVM: Refactor intentional wrap-around calculation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 23/82] KVM: Refactor intentional wrap-around calculation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 32/82] vringh: Refactor intentional wrap-around calculation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 58/82] s390/mm: Refactor intentional wrap-around test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v7 10/13] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 00/13] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 13/13] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 08/13] KVM: x86/tdp_mmu: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 12/13] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 06/13] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 11/13] KVM: TDX: Implement merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 09/13] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 07/13] KVM: x86/tdp_mmu: Allocate private page table for large page split
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 05/13] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 04/13] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 02/13] KVM: TDX: Pass KVM page level to tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 03/13] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v7 01/13] KVM: TDX: Flush cache based on page size before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v2] KVM: x86: nSVM/nVMX: Fix handling triple fault on RSM instruction
- From: Michal Wilczynski <michal.wilczynski@xxxxxxxxx>
- [PATCH v18 049/121] KVM: x86/tdp_mmu: Apply mmu notifier callback to only shared GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 046/121] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 040/121] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 045/121] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 044/121] KVM: x86/mmu: Assume guest MMIOs are shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 048/121] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 050/121] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 030/121] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 010/121] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 041/121] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 039/121] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 014/121] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 009/121] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 008/121] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 018/121] KVM: TDX: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 025/121] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 036/121] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 007/121] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 033/121] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 022/121] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 016/121] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 035/121] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 031/121] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 028/121] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 017/121] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 011/121] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 032/121] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 042/121] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 037/121] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 034/121] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 029/121] KVM: TDX: create/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 021/121] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 020/121] x86/virt/tdx: Get system-wide info about TDX module on initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 015/121] KVM: TDX: Retry SEAMCALL on the lack of entropy error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 043/121] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 026/121] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 024/121] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 013/121] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 019/121] KVM: TDX: Add helper function to read TDX metadata in array
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 027/121] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 038/121] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 023/121] KVM: TDX: Make KVM_CAP_MAX_VCPUS backend specific
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 012/121] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 121/121] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 120/121] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 118/121] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 116/121] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 117/121] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 119/121] RFC: KVM: x86: Add x86 callback to check cpuid
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 114/121] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 115/121] KVM: TDX: Inhibit APICv for TDX guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 113/121] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 112/121] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 109/121] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 108/121] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 110/121] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 111/121] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 107/121] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 105/121] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 106/121] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 104/121] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 103/121] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 102/121] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 101/121] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 100/121] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 099/121] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 098/121] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 097/121] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 067/121] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 070/121] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 093/121] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 095/121] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 096/121] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 094/121] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 068/121] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 069/121] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 089/121] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 092/121] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 064/121] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 091/121] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 090/121] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 065/121] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 063/121] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 087/121] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 088/121] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 086/121] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 060/121] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 066/121] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 062/121] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 085/121] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 084/121] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 083/121] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 061/121] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 059/121] KVM: TDX: Require TDP MMU and mmio caching for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 078/121] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 082/121] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 081/121] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 080/121] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 079/121] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 056/121] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 057/121] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 055/121] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 077/121] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 076/121] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 075/121] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 074/121] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 058/121] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 054/121] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 053/121] KVM: x86/mmu: TDX: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 073/121] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 072/121] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 071/121] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 051/121] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 047/121] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 052/121] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 006/121] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 005/121] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 004/121] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 003/121] KVM: x86: Add is_vm_type_supported callback
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 002/121] x86/virt/tdx: Export SEAMCALL functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 000/121] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v18 001/121] x86/virt/tdx: Export TDX KeyID information
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH -next v21 23/27] riscv: detect assembler support for .option arch
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [ANNOUNCE] PUCK Agenda - 2024.01.17 - TDP MMU for IOMMU
- From: Michael Roth <michael.roth@xxxxxxx>
- [GIT PULL 2/2] KVM: s390: fix cc for successful PQAP
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 0/2] KVM: s390: Fixes for 6.8
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [GIT PULL 1/2] KVM: s390: vsie: fix race during shadow creation
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 18/21] contrib/plugins: fix imatch
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 21/21] docs/devel: document some plugin assumptions
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 20/21] docs/devel: lift example and plugin API sections up
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 19/21] contrib/plugins: extend execlog to track register changes
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 16/21] gdbstub: expose api to find registers
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 17/21] plugins: add an API to read registers
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 04/21] target/riscv: Validate misa_mxl_max only once
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 13/21] hw/core/cpu: Remove gdb_get_dynamic_xml member
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 15/21] plugins: Use different helpers when reading registers
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 14/21] gdbstub: Add members to identify registers to GDBFeature
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 12/21] gdbstub: Infer number of core registers from XML
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 11/21] gdbstub: Simplify XML lookup
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 10/21] gdbstub: Change gdb_get_reg_cb and gdb_set_reg_cb
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 09/21] gdbstub: Use GDBFeature for GDBRegisterState
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 08/21] gdbstub: Use GDBFeature for gdb_register_coprocessor
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 07/21] target/riscv: Use GDBFeature for dynamic XML
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 05/21] target/arm: Use GDBFeature for dynamic XML
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 06/21] target/ppc: Use GDBFeature for dynamic XML
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 00/21] plugin updates (register access) for 9.0 (pre-PR?)
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 01/21] hw/riscv: Use misa_mxl instead of misa_mxl_max
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 03/21] target/riscv: Move misa_mxl_max to class
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v3 02/21] target/riscv: Remove misa_mxl validation
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v13 08/35] x86/fred: Disable FRED by default in its early stage
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v13 07/35] x86/fred: Disable FRED support if CONFIG_X86_FRED is disabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 02/12] KVM: arm64: selftests: Data type cleanup for arch_timer test
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v5 02/12] KVM: arm64: selftests: Data type cleanup for arch_timer test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: Re: Re: EEVDF/vhost regression (bisected to 86bfbb7ce4f6 sched/fair: Add lag based placement)
- From: Tobias Huschle <huschle@xxxxxxxxxxxxx>
- [PATCH v3 6/6] LoongArch: Add pv ipi support on LoongArch system
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 5/6] LoongArch: KVM: Add physical cpuid map support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 4/6] LoongArch: Add paravirt interface for guest kernel
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 2/6] LoongArch: KVM: Add hypercall instruction emulation support
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 1/6] LoongArch/smp: Refine ipi ops on LoongArch platform
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/6] LoongArch: Add pv ipi support on LoongArch VM
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 3/6] LoongArch: KVM: Add cpucfg area for kvm hypervisor
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v5 12/12] KVM: riscv: selftests: Add sstc timer test
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 11/12] KVM: riscv: selftests: Change vcpu_has_ext to a common function
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 10/12] KVM: riscv: selftests: Add guest helper to get vcpu id
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 09/12] KVM: riscv: selftests: Add exception handling support
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 08/12] KVM: riscv: selftests: Switch to use macro from csr.h
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 07/12] tools: riscv: Add header file vdso/processor.h
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 06/12] tools: riscv: Add header file csr.h
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 05/12] KVM: selftests: Add CONFIG_64BIT definition for the build
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 04/12] KVM: arm64: selftests: Split arch_timer test code
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 03/12] KVM: arm64: selftests: Enable tuning of error margin in arch_timer test
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 02/12] KVM: arm64: selftests: Data type cleanup for arch_timer test
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 01/12] selftests/kvm: Fix issues with $(SPLIT_TESTS)
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v5 00/12] RISCV: Add kvm Sstc timer selftests
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- Re: [PATCH v4 0/2] Add support for LAM in QEMU
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 4/4] x86: Add test case for INVVPID with LAM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 3/4] x86: Add test cases for LAM_{U48,U57}
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 2/4] x86: Add test case for LAM_SUP
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 1/4] x86: Allow setting of CR3 LAM bits if LAM supported
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 0/4] x86: Add test cases for LAM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] KMSAN: uninit-value in em_ret_far
- From: syzbot <syzbot+579eb95e588b48b4499c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] KVM: x86: LAM support for 6.8
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2] KVM: selftests: Fix dirty_log_page_splitting_test as page migration
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- [PATCH v10 16/16] iommu: Make iommu_report_device_fault() reutrn void
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 15/16] iommu: Make iopf_group_response() return void
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 14/16] iommu: Track iopf group instead of last fault
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 13/16] iommu: Improve iopf_queue_remove_device()
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 12/16] iommu: Use refcount for fault data access
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 11/16] iommu: Refine locking for per-device fault data management
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 10/16] iommu: Separate SVA and IOPF
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 09/16] iommu: Make iommu_queue_iopf() more generic
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 08/16] iommu: Prepare for separating SVA and IOPF
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 07/16] iommu: Merge iommu_fault_event and iopf_fault
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 06/16] iommu: Remove iommu_[un]register_device_fault_handler()
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 05/16] iommu: Merge iopf_device_param into iommu_fault_param
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 04/16] iommu: Cleanup iopf data structure definitions
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 03/16] iommu: Remove unrecoverable fault data
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 02/16] iommu/arm-smmu-v3: Remove unrecoverable faults reporting
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 01/16] iommu: Move iommu fault data to linux/iommu.h
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v10 00/16] iommu: Prepare to deliver page faults to user space
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: Re: Re: EEVDF/vhost regression (bisected to 86bfbb7ce4f6 sched/fair: Add lag based placement)
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH -next v21 23/27] riscv: detect assembler support for .option arch
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH -next v21 23/27] riscv: detect assembler support for .option arch
- From: Andy Chiu <andy.chiu@xxxxxxxxxx>
- Re: [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 25/26] crypto: ccp: Add the SNP_COMMIT command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
- From: Borislav Petkov <bp@xxxxxxxxx>
- [v2 4/4] KVM: s390: don't setup dummy routing when KVM_CREATE_IRQCHIP
- From: Yi Wang <up2wing@xxxxxxxxx>
- [v2 3/4] KVM: x86: don't setup empty irq routing when KVM_CAP_SPLIT_IRQCHIP
- From: Yi Wang <up2wing@xxxxxxxxx>
- [v2 2/4] KVM: setup empty irq routing when create vm
- From: Yi Wang <up2wing@xxxxxxxxx>
- [v2 1/4] KVM: irqchip: add setup empty irq routing function
- From: Yi Wang <up2wing@xxxxxxxxx>
- [v2 0/4] KVM: irqchip: synchronize srcu only if needed
- From: Yi Wang <up2wing@xxxxxxxxx>
- Re: [PATCH -next v21 23/27] riscv: detect assembler support for .option arch
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH -next v21 23/27] riscv: detect assembler support for .option arch
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 4/4] KVM: Nullify async #PF worker's "apf" pointer as soon as it might be freed
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: Put mm immediately after async #PF worker completes remote gup()
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] KVM: Get reference to VM's address space in the async #PF worker
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] KVM: Always flush async #PF workqueue when vCPU is being destroyed
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Fix build due to API changes
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 00/20] arm: Rework target/ headers to build various hw/ files once
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PULL 04/36] accel: Do not set CPUState::can_do_io in non-TCG accels
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [syzbot] Monthly kvm report (Jan 2024)
- From: syzbot <syzbot+list412afdd37eacb0ca532d@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v16 3/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- RE: [PATCH v16 3/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add a requirement for disabling numa balancing
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- [GIT PULL] KVM/riscv changes for 6.8 part #2
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v16 3/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH v16 2/3] vfio/pci: implement range_intesect_range to determine range overlap
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH v16 3/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH -fixes v2] RISC-V: KVM: Require HAVE_KVM
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [RFC] Support for Arm CCA VMs on Linux
- From: Itaru Kitayama <itaru.kitayama@xxxxxxxxx>
- Re: [GIT PULL] virtio: features, fixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] VFIO updates for v6.8-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] Please pull IOMMUFD subsystem changes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH iwl-next v4 00/12] Add E800 live migration driver
- From: Jacob Keller <jacob.e.keller@xxxxxxxxx>
- Re: [PATCH 00/20] arm: Rework target/ headers to build various hw/ files once
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 20/20] hw/arm: Build various units only once
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 19/20] target/arm: Move GTimer definitions to new 'gtimer.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 18/20] target/arm: Move e2h_access() helper around
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 17/20] target/arm: Move ARM_CPU_IRQ/FIQ definitions to 'cpu-qom.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 16/20] hw/arm/armv7m: Make 'hw/intc/armv7m_nvic.h' a target agnostic header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 15/20] target/arm: Expose M-profile register bank index definitions
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 14/20] hw/misc/xlnx-versal-crl: Build it only once
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 13/20] hw/misc/xlnx-versal-crl: Include generic 'cpu-qom.h' instead of 'cpu.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 12/20] hw/cpu/a9mpcore: Build it only once
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 11/20] target/arm: Declare ARM_CPU_TYPE_NAME/SUFFIX in 'cpu-qom.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 10/20] target/arm: Expose arm_cpu_mp_affinity() in 'multiprocessing.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 09/20] target/arm: Create arm_cpu_mp_affinity
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 08/20] target/arm: Rename arm_cpu_mp_affinity
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 07/20] target/arm/cpregs: Include missing 'kvm-consts.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 06/20] target/arm/cpregs: Include missing 'hw/registerfields.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 05/20] target/arm/cpu-features: Include missing 'hw/registerfields.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 04/20] hw/arm/xlnx-versal: Include missing 'cpu.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 03/20] hw/arm/smmuv3: Include missing 'hw/registerfields.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 02/20] hw/arm/xilinx_zynq: Include missing 'exec/tswap.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 01/20] hw/arm/exynos4210: Include missing 'exec/tswap.h' header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 00/20] arm: Rework target/ headers to build various hw/ files once
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH -fixes v2] RISC-V: KVM: Require HAVE_KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add a requirement for disabling numa balancing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Notes - 2024.01.17 - TDP MMU for IOMMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Xu Yilun <yilun.xu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH -fixes v2] RISC-V: KVM: Require HAVE_KVM
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH 00/15] KVM RISC-V report more ISA extensions through ONE_REG
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [Bug 218386] "kvm: enabling virtualization on CPUx failed" on "Ubuntu 22.04.03 with kernel 6.5.0-14-generic"
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH] KVM: PPC: Book3S HV: Fix L2 guest reboot failure due to empty 'arch_compat'
- From: Amit Machhiwal <amachhiw@xxxxxxxxxxxxx>
- Re: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add a requirement for disabling numa balancing
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- RE: [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v16 3/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL] KVM changes for Linux 6.8-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v16 2/3] vfio/pci: implement range_intesect_range to determine range overlap
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] Enable haltpoll for arm64
- From: "Christoph Lameter (Ampere)" <cl@xxxxxxxxx>
- [Bug 218386] "kvm: enabling virtualization on CPUx failed" on "Ubuntu 22.04.03 with kernel 6.5.0-14-generic"
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218386] "kvm: enabling virtualization on CPUx failed" on "Ubuntu 22.04.03 with kernel 6.5.0-14-generic"
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Eric Auger <eauger@xxxxxxxxxx>
- RE: [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: "Woodhouse, David" <dwmw@xxxxxxxxxxxx>
- Re: [PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 19/43] KVM: arm64: nv: Handle shadow stage 2 page faults
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add a requirement for disabling numa balancing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 19/43] KVM: arm64: nv: Handle shadow stage 2 page faults
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v8 4/7] KVM: x86: Report host tsc and realtime values in KVM_GET_CLOCK
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/5] s390x: Dirty cc before executing tested instructions
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] s390/vfio-ap: reset queues filtered from the guest's AP config
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [Bug 218259] High latency in KVM guests
- From: bugzilla-daemon@xxxxxxxxxx
- Re: Temporary KVM guest hangs connected to KSM and NUMA balancer
- From: Friedrich Weber <f.weber@xxxxxxxxxxx>
- Re: [PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH v4 0/6] s390/vfio-ap: reset queues removed from guest's AP configuration
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] accel: Do not set CPUState::can_do_io in non-TCG accels
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- [Bug 218386] "kvm: enabling virtualization on CPUx failed" on "Ubuntu 22.04.03 with kernel 6.5.0-14-generic"
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218386] kvm: enabling virtualization on CPUx failed on "Ubuntu 22.04.03 with kernel 6.5.0-14-generic"
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 218386] New: kvm: enabling virtualization on CPUx failed
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 8/8] iommu/vt-d: Add set_dev_pasid callback for nested domain
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH] KVM: selftests: Add a requirement for disabling numa balancing
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 22/26] KVM: VMX: Set up interception for CET MSRs
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v8 22/26] KVM: VMX: Set up interception for CET MSRs
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- RE: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v8 22/26] KVM: VMX: Set up interception for CET MSRs
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v8 26/26] KVM: nVMX: Enable CET support for nested guest
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v8 24/26] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v8 22/26] KVM: VMX: Set up interception for CET MSRs
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2024.01.17 - TDP MMU for IOMMU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Bug 218259] High latency in KVM guests
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [Bug 218259] High latency in KVM guests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: irqchip: synchronize srcu only if needed
- From: Yi Wang <up2wing@xxxxxxxxx>
- Re: [PATCH v8 00/26] Enable CET Virtualization
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH] KVM: irqchip: synchronize srcu only if needed
- From: Yi Wang <up2wing@xxxxxxxxx>
- Re: [PATCH] accel: Do not set CPUState::can_do_io in non-TCG accels
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 4/6] s390/vfio-ap: reset queues filtered from the guest's AP config
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] s390/vfio-ap: reset queues filtered from the guest's AP config
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v4 4/6] s390/vfio-ap: reset queues filtered from the guest's AP config
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] s390/vfio-ap: let 'on_scan_complete' callback filter matrix and update guest's APCB
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v4] KVM: x86/xen: Inject vCPU upcall vector when local APIC is enabled
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3] KVM: x86/xen: Inject vCPU upcall vector when local APIC is enabled
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: vfio/platform: Use common error handling code in vfio_set_trigger()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 4/6] s390/vfio-ap: reset queues filtered from the guest's AP config
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: Temporary KVM guest hangs connected to KSM and NUMA balancer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: irqchip: synchronize srcu only if needed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86/xen: improve accuracy of Xen timers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86/xen: Inject vCPU upcall vector when local APIC is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] KVM: irqchip: synchronize srcu only if needed
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [GIT PULL] virtio: features, fixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 3/6] s390/vfio-ap: let 'on_scan_complete' callback filter matrix and update guest's APCB
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: Temporary KVM guest hangs connected to KSM and NUMA balancer
- From: Friedrich Weber <f.weber@xxxxxxxxxxx>
- Re: [PATCH v4 3/6] s390/vfio-ap: let 'on_scan_complete' callback filter matrix and update guest's APCB
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: Remove usage of the deprecated ida_simple_xx() API
- From: Simon Horman <horms@xxxxxxxxxx>
- [Bug 218259] High latency in KVM guests
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [kvm-unit-tests PATCH 0/5] s390x: Dirty cc before executing tested instructions
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: Honor guest memory types for virtio GPU devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v2] vfio: Use WARN_ON for low-probability allocation failure issue in vfio_pci_bus_notifier
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: vfio/platform: Use common error handling code in vfio_set_trigger()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [PATCH v3] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v3] KVM: x86/xen: Inject vCPU upcall vector when local APIC is enabled
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Use KMEM_CACHE instead of kmem_cache_create()
- From: Kunwu Chan <chentao@xxxxxxxxxx>
- Re: [PATCH] target/i386/kvm: call kvm_put_vcpu_events() before kvm_put_nested_state()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v4 3/6] s390/vfio-ap: let 'on_scan_complete' callback filter matrix and update guest's APCB
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v8 24/26] KVM: x86: Enable CET virtualization for VMX and advertise to userspace
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 26/26] KVM: nVMX: Enable CET support for nested guest
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] arm64: runtime scripts improvements on efi
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] arm64: efi: Make running tests on EFI can be parallel
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] runtime: Skip the migration tests when run on EFI
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] runtime: Fix the missing last_line
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v16 3/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: Rahul Rameshbabu <rrameshbabu@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] arm64: efi: Make running tests on EFI can be parallel
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] runtime: arm64: Skip the migration tests when run on EFI
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v3 5/5] KVM: selftests: aarch64: Add invalid filter test in pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v3 4/5] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v3 1/5] KVM: selftests: aarch64: Make the [create|destroy]_vpmu_vm() public
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v3 2/5] KVM: selftests: aarch64: Move pmu helper functions into vpmu.h
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v3 3/5] KVM: selftests: aarch64: Fix the buggy [enable|disable]_counter
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH v3 0/5] KVM: selftests: aarch64: Introduce pmu_event_filter_test
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v16 2/3] vfio/pci: implement range_intesect_range to determine range overlap
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH v16 2/3] vfio/pci: implement range_intesect_range to determine range overlap
- From: Rahul Rameshbabu <rrameshbabu@xxxxxxxxxx>
- Re: [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- RE: [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH 0/4] KVM: Honor guest memory types for virtio GPU devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v11 0/8] Add iommufd nesting (part 2/2)
- From: "Duan, Zhenzhong" <zhenzhong.duan@xxxxxxxxx>
- RE: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH AUTOSEL 4.19 3/8] KVM: s390: fix setting of fpc register
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 3/9] KVM: s390: fix setting of fpc register
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 3/9] KVM: s390: fix setting of fpc register
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 04/11] KVM: s390: fix setting of fpc register
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 05/14] KVM: s390: fix setting of fpc register
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 06/19] KVM: s390: fix setting of fpc register
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.7 07/21] KVM: s390: fix setting of fpc register
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [PATCH 0/4] KVM: Honor guest memory types for virtio GPU devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] target/i386/kvm: call kvm_put_vcpu_events() before kvm_put_nested_state()
- From: Eiichi Tsukata <eiichi.tsukata@xxxxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: selftests: Handle feature fields with nonzero minimum value correctly
- From: Itaru Kitayama <itaru.kitayama@xxxxxxxxx>
- Re: [PATCH 1/1] vhost: Added pad cleanup if vnet_hdr is not present.
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v2] KVM: arm64: selftests: Handle feature fields with nonzero minimum value correctly
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v1] KVM: arm64: selftests: Handle feature fields with nonzero minimum value correctly
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v1] KVM: arm64: selftests: Handle feature fields with nonzero minimum value correctly
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v1] KVM: arm64: selftests: Handle feature fields with nonzero minimum value correctly
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH 1/1] vhost: Added pad cleanup if vnet_hdr is not present.
- From: Yuri Benditovich <yuri.benditovich@xxxxxxxxxx>
- [PATCH v16 3/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: <ankita@xxxxxxxxxx>
- [PATCH v16 2/3] vfio/pci: implement range_intesect_range to determine range overlap
- From: <ankita@xxxxxxxxxx>
- [PATCH v16 0/3] vfio/nvgrace-gpu: Add vfio pci variant module for grace hopper
- From: <ankita@xxxxxxxxxx>
- [PATCH v16 1/3] vfio/pci: rename and export do_io_rw()
- From: <ankita@xxxxxxxxxx>
- Re: [PATCH] vfio/platform: Use common error handling code in vfio_set_trigger()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH] vhost-vdpa: Remove usage of the deprecated ida_simple_xx() API
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 1/1] vhost: Added pad cleanup if vnet_hdr is not present.
- From: Andrew Melnychenko <andrew@xxxxxxxxxx>
- [PATCH v4 4/6] s390/vfio-ap: reset queues filtered from the guest's AP config
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v4 6/6] s390/vfio-ap: do not reset queue removed from host config
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v4 5/6] s390/vfio-ap: reset queues associated with adapter for queue unbound from driver
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v4 3/6] s390/vfio-ap: let 'on_scan_complete' callback filter matrix and update guest's APCB
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v4 2/6] s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v4 1/6] s390/vfio-ap: always filter entire AP matrix
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v4 0/6] s390/vfio-ap: reset queues removed from guest's AP configuration
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 3/8] iommufd: Support attach/replace hwpt per pasid
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 8/8] iommu/vt-d: Add set_dev_pasid callback for nested domain
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/8] iommu: Introduce a replace API for device pasid
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio-iommufd: Support pasid [at|de]tach for physical VFIO devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] vfio/platform: Use common error handling code in vfio_set_trigger()
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Call for GSoC/Outreachy internship project ideas
- From: Stefan Hajnoczi <stefanha@xxxxxxxxx>
- Re: [PATCH 0/4] KVM: Honor guest memory types for virtio GPU devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] vfio: Use WARN_ON for low-probability allocation failure issue in vfio_pci_bus_notifier
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: irqchip: synchronize srcu only if needed
- From: Yi Wang <up2wing@xxxxxxxxx>
- Re: [PATCH 15/15] KVM: riscv: selftests: Add Zfa extension to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 14/15] RISC-V: KVM: Allow Zfa extension for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 13/15] KVM: riscv: selftests: Add Zvfh[min] extensions to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 12/15] RISC-V: KVM: Allow Zvfh[min] extensions for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 11/15] KVM: riscv: selftests: Add Zihintntl extension to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 10/15] RISC-V: KVM: Allow Zihintntl extension for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 09/15] KVM: riscv: selftests: Add Zfh[min] extensions to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 08/15] RISC-V: KVM: Allow Zfh[min] extensions for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 07/15] KVM: riscv: selftests: Add vector crypto extensions to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 06/15] RISC-V: KVM: Allow vector crypto extensions for Guest/VM
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- RE: [PATCH v2] vfio: Use WARN_ON for low-probability allocation failure issue in vfio_pci_bus_notifier
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH 05/15] KVM: riscv: selftests: Add scaler crypto extensions to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 14/16] i386: Use CPUCacheInfo.share_level to encode CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 15/16] i386: Use offsets get NumSharingCache for CPUID[0x8000001D].EAX[bits 25:14]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- [PATCH v12 04/20] KVM: pfncache: add a mark-dirty helper
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 00/20] KVM: xen: update shared_info and vcpu_info handling
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 02/20] KVM: pfncache: remove unnecessary exports
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 03/20] KVM: xen: mark guest pages dirty with the pfncache lock held
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 06/20] KVM: pfncache: stop open-coding offset_in_page()
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 07/20] KVM: pfncache: include page offset in uhva and use it consistently
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 05/20] KVM: pfncache: remove KVM_GUEST_USES_PFN usage
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 01/20] KVM: pfncache: Add a map helper function
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 20/20] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 11/20] KVM: xen: allow shared_info to be mapped by fixed HVA
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 12/20] KVM: xen: allow vcpu_info to be mapped by fixed HVA
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 16/20] KVM: xen: split up kvm_xen_set_evtchn_fast()
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 17/20] KVM: xen: don't block on pfncache locks in kvm_xen_set_evtchn_fast()
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 18/20] KVM: pfncache: check the need for invalidation under read lock first
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 10/20] KVM: xen: re-initialize shared_info if guest (32/64-bit) mode is set
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 14/20] KVM: selftests / xen: re-map vcpu_info using HVA rather than GPA
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 19/20] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 15/20] KVM: xen: advertize the KVM_XEN_HVM_CONFIG_SHARED_INFO_HVA capability
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 13/20] KVM: selftests / xen: map shared_info using HVA rather than GFN
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 09/20] KVM: xen: separate initialization of shared_info cache and content
- From: Paul Durrant <paul@xxxxxxx>
- [PATCH v12 08/20] KVM: pfncache: allow a cache to be activated with a fixed (userspace) HVA
- From: Paul Durrant <paul@xxxxxxx>
- Re: [kvm-unit-tests PATCH v1 01/18] Makefile: Define __ASSEMBLY__ for assembly files
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/3] runtime: Fix the missing last_line
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] runtime: arm64: Skip the migration tests when run on EFI
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] arm64: efi: Make running tests on EFI can be parallel
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [RFC PATCH v1] vsock/test: add '--peer-port' input argument
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] vsock/test: add '--peer-port' input argument
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH rfcv1 01/23] Update linux header to support nested hwpt alloc
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [PATCH v8 22/26] KVM: VMX: Set up interception for CET MSRs
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] vfio: Report PASID capability via VFIO_DEVICE_FEATURE ioctl
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1] KVM: arm64: selftests: Handle feature fields with nonzero minimum value correctly
- From: Suzuki K Poulose <suzuki.poulose@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] vfio: Report PASID capability via VFIO_DEVICE_FEATURE ioctl
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v1] KVM: arm64: selftests: Handle feature fields with nonzero minimum value correctly
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 14/16] i386: Use CPUCacheInfo.share_level to encode CPUID[4]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH v2] vfio: Use WARN_ON for low-probability allocation failure issue in vfio_pci_bus_notifier
- From: Kunwu Chan <chentao@xxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 14/16] i386: Use CPUCacheInfo.share_level to encode CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] vfio/platform: Remove unnecessary free in vfio_set_trigger
- From: Kunwu Chan <chentao@xxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio: Fix NULL pointer dereference in vfio_pci_bus_notifier
- From: Kunwu Chan <chentao@xxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 15/16] i386: Use offsets get NumSharingCache for CPUID[0x8000001D].EAX[bits 25:14]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 14/16] i386: Use CPUCacheInfo.share_level to encode CPUID[4]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 02/16] i386/cpu: Use APIC ID offset to encode cache topo in CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 02/16] i386/cpu: Use APIC ID offset to encode cache topo in CPUID[4]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 09/16] i386: Support module_id in X86CPUTopoIDs
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 15/16] i386: Use offsets get NumSharingCache for CPUID[0x8000001D].EAX[bits 25:14]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 14/16] i386: Use CPUCacheInfo.share_level to encode CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 08/16] i386: Expose module level in CPUID[0x1F]
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 02/16] i386/cpu: Use APIC ID offset to encode cache topo in CPUID[4]
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 16/29] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/26] Enable CET Virtualization
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v7 15/16] i386: Use offsets get NumSharingCache for CPUID[0x8000001D].EAX[bits 25:14]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 14/16] i386: Use CPUCacheInfo.share_level to encode CPUID[4]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 02/16] i386/cpu: Use APIC ID offset to encode cache topo in CPUID[4]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 10/16] i386/cpu: Introduce cluster-id to X86CPU
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 09/16] i386: Support module_id in X86CPUTopoIDs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v4 2/2] target/i386: add control bits support for LAM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v10 16/29] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v1] vsock/test: add '--peer-port' input argument
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- [PATCH] KVM: pfncache: rework __kvm_gpc_refresh() to fix locking issues
- From: "Woodhouse, David" <dwmw@xxxxxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] VFIO updates for v6.8-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 0/8] Dynamic vcpu priority management in kvm
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v1] KVM: nVMX: Fix handling triple fault on RSM instruction
- From: "Wilczynski, Michal" <michal.wilczynski@xxxxxxxxx>
- [GIT PULL] Please pull IOMMUFD subsystem changes
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 12/43] qtest: bump boot-serial-test timeout to 3 minutes
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: irqchip: synchronize srcu only if needed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Temporary KVM guest hangs connected to KSM and NUMA balancer
- From: Friedrich Weber <f.weber@xxxxxxxxxxx>
- Re: [PATCH v2 12/43] qtest: bump boot-serial-test timeout to 3 minutes
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH] vfio/fsl-mc: Remove unnecessary free in vfio_set_trigger
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] vfio/platform: Remove unnecessary free in vfio_set_trigger
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] vfio: Fix NULL pointer dereference in vfio_pci_bus_notifier
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 12/43] qtest: bump boot-serial-test timeout to 3 minutes
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH v1 10/26] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PULL 02/22] tests/avocado: use snapshot=on in kvm_xen_guest
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v4 2/2] KVM: VMX: Cleanup VMX misc information defines and usages
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v4 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Xin Li <xin3.li@xxxxxxxxx>
- RE: [PATCH v3 1/2] KVM: VMX: Cleanup VMX basic information defines and usages
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v10 00/29] KVM: x86/pmu: selftests: Fixes and new tests
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 16/29] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [PATCH] KVM: irqchip: synchronize srcu only if needed
- From: Yi Wang <up2wing@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH] vfio/fsl-mc: Remove unnecessary free in vfio_set_trigger
- From: Kunwu Chan <chentao@xxxxxxxxxx>
- [PATCH] KVM: VMX: Correct *intr_info content and *info2 for EPT_VIOLATION in get_exit_info()
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- [PATCH] vfio/platform: Remove unnecessary free in vfio_set_trigger
- From: Kunwu Chan <chentao@xxxxxxxxxx>
- [PATCH] vfio: Fix NULL pointer dereference in vfio_pci_bus_notifier
- From: Kunwu Chan <chentao@xxxxxxxxxx>
- [PATCH v4 2/2] target/i386: add control bits support for LAM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v4 1/2] target/i386: add support for LAM in CPUID enumeration
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v4 0/2] Add support for LAM in QEMU
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v2] KVM: selftests: Fix the dirty_log_test semaphore imbalance
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] KVM: selftests: add selftest driver for KVM to test memory slots for MMIO BARs
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [Bug 218297] Kernel Panic and crash
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [RFC] Support for Arm CCA VMs on Linux
- From: Itaru Kitayama <itaru.kitayama@xxxxxxxxx>
- [PATCH] LoongArch: KVM: Remove unnecessary CSR register saving during enter guest
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH v10 11/29] KVM: x86/pmu: Explicitly check for RDPMC of unsupported Intel PMC types
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 38/43] plugins: add an API to read registers
- From: Pierrick Bouvier <pierrick.bouvier@xxxxxxxxxx>
- Re: [PATCH] x86/cpu: Add a VMX flag to enumerate 5-level EPT support to userspace
- From: Tao Su <tao1.su@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 2/3] KVM: selftests: add selftest driver for KVM to test memory slots for MMIO BARs
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: Initialize guest cpu_caps based on guest CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 6/6] KVM: VMX: Move VERW closer to VMentry for MDS mitigation
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 25/43] target/riscv: Validate misa_mxl_max only once
- From: Alistair Francis <alistair23@xxxxxxxxx>
- Re: [PATCH v2 24/43] target/riscv: Move misa_mxl_max to class
- From: Alistair Francis <alistair23@xxxxxxxxx>
- Re: [PATCH] x86/cpu: Add a VMX flag to enumerate 5-level EPT support to userspace
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 0/3] Update LLVM Phabricator and Bugzilla links
- From: Fangrui Song <maskray@xxxxxxxxxx>
- Re: [PATCH v3] x86/sev: Add support for allowing zero SEV ASIDs.
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH] x86/cpu: Add a VMX flag to enumerate 5-level EPT support to userspace
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v11 0/8] Add iommufd nesting (part 2/2)
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/3] selftests/bpf: Update LLVM Phabricator links
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH] KVM: Aggressively drop and reacquire mmu_lock during CLEAR_DIRTY_LOG
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v11 3/8] iommu: Add iommu_copy_struct_from_user_array helper
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]