Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v6 02/16] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [RFC 7/7] vfio: Add vfio_register_pasid_iommu_dev()
- From: "Cao, Yahui" <yahui.cao@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v3 10/70] kvm: handle KVM_EXIT_MEMORY_FAULT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [kvm-unit-tests PATCH 1/1] arm64: microbench: Improve measurement accuracy of tests
- From: heqiong <heqiong1557@xxxxxxxxxxxxxx>
- Re: [PATCH v3 06/70] kvm: Introduce support for memory_attributes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 02/70] RAMBlock: Add support of KVM private guest memfd
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v4 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: Initialize guest cpu_caps based on guest CPUID
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v3 07/70] physmem: Relax the alignment check of host_startaddr in ram_block_discard_range()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v4 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v3 04/70] HostMem: Add mechanism to opt in kvm guest memfd via MachineState
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 03/70] RAMBlock/guest_memfd: Enable KVM_GUEST_MEMFD_ALLOW_HUGEPAGE
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 02/70] RAMBlock: Add support of KVM private guest memfd
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v1 12/23] KVM: VMX: Handle FRED event data
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v4 3/3] LoongArch: KVM: Remove kvm_acquire_timer before entering guest
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v4 1/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v4 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v4 2/3] LoongArch: KVM: Allow to access HW timer CSR registers always
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 6/9] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v6 01/16] KVM: TDP_MMU: Go to next level if smaller private mapping exists
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 09/13] x86/irq: Install posted MSI notification handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH RFC 09/13] x86/irq: Install posted MSI notification handler
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC 09/13] x86/irq: Install posted MSI notification handler
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- Re: [PATCH] LoongArch: KVM: Fix build due to API changes
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/2] LoongArch: KVM: Add lsx support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v15 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 08/70] physmem: replace function name with __func__ in ram_block_discard_range()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 07/70] physmem: Relax the alignment check of host_startaddr in ram_block_discard_range()
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 04/70] HostMem: Add mechanism to opt in kvm guest memfd via MachineState
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 03/70] RAMBlock/guest_memfd: Enable KVM_GUEST_MEMFD_ALLOW_HUGEPAGE
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 53/70] i386/tdx: setup a timer for the qio channel
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v3 52/70] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v3 02/70] RAMBlock: Add support of KVM private guest memfd
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v3 52/70] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH] KVM: X86: improve documentation for KVM_CAP_X86_BUS_LOCK_EXIT
- From: Carlos López <clopez@xxxxxxx>
- Re: [PATCH v3 31/70] i386/tdx: Allows mrconfigid/mrowner/mrownerconfig for TDX_INIT_VM
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: selftests: Clean up the GIC[D,R]_BASE_GPA
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2] KVM: arm64: selftests: Clean up the GIC[D,R]_BASE_GPA
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: selftests: Clean up the GIC[D,R]_BASE_GPA
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/3] s390/vfio-ap: a couple of corrections to the IRQ enablement function
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [PATCH v6 24/25] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 09/13] x86/irq: Install posted MSI notification handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [GIT PULL v1 1/2] KVM: s390: vsie: fix wrong VIR 37 when MSO is used
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [GIT PULL v1 0/2] KVM: s390: two small but important fixes
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [GIT PULL v1 2/2] KVM: s390/mm: Properly reset no-dat
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH RFC 09/13] x86/irq: Install posted MSI notification handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v1] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [RFC PATCH v1 2/2] vsock/test: SO_RCVLOWAT + deferred credit update test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v1 1/2] virtio/vsock: send credit update during setting SO_RCVLOWAT
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] send credit update during setting SO_RCVLOWAT
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 26/70] i386/tdx: Initialize TDX before creating TD vcpus
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v3 18/70] i386/tdx: Get tdx_capabilities via KVM_TDX_CAPABILITIES
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v3 14/70] target/i386: Implement mc->kvm_type() to get VM type
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH] KVM: arm64: selftests: Clean up the GIC[D,R]_BASE_GPA
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v3 10/70] kvm: handle KVM_EXIT_MEMORY_FAULT
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v15 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 06/70] kvm: Introduce support for memory_attributes
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v3 02/70] RAMBlock: Add support of KVM private guest memfd
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1] s390x: cmm: test no-translate bit after reset
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v1 1/2] LoongArch: KVM: Add lsx support
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v1 2/2] LoongArch: KVM: Add lasx support
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v1 0/2] LoongArch: KVM: Add LSX,LASX support
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH] LoongArch: KVM: Fix build due to API changes
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [kvm-unit-tests PATCH v1] s390x: cmm: test no-translate bit after reset
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v6 10/25] KVM: x86: Add kvm_msr_{read,write}() helpers
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v6 25/25] KVM: nVMX: Enable CET support for nested guest
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v6 24/25] KVM: nVMX: Introduce new VMX_BASIC bit for event error_code delivery to L1
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v6 25/25] KVM: nVMX: Enable CET support for nested guest
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH v1 1/1] vfio/nvgrace-gpu: carve out non cached reserved region from device memory
- From: <ankita@xxxxxxxxxx>
- Re: [PATCH v17 015/116] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v3 70/70] docs: Add TDX documentation
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 69/70] i386/tdx: Don't get/put guest state for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 68/70] i386/tdx: Skip kvm_put_apicbase() for TDs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 67/70] i386/tdx: Only configure MSR_IA32_UCODE_REV in kvm_init_msrs() for TDs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 66/70] i386/tdx: Don't synchronize guest tsc for TDs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 64/70] hw/i386: add eoi_intercept_unsupported member to X86MachineState
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 65/70] hw/i386: add option to forcibly report edge trigger in acpi tables
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 62/70] i386/tdx: Don't allow system reset for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 61/70] i386/tdx: Disable PIC for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 63/70] i386/tdx: LMCE is not supported for TDX
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 60/70] i386/tdx: Disable SMM for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 59/70] q35: Introduce smm_ranges property for q35-pci-host
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 58/70] pci-host/q35: Move PAM initialization above SMRAM initialization
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 57/70] i386/tdx: Wire TDX_REPORT_FATAL_ERROR with GuestPanic facility
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 56/70] i386/tdx: Handle TDG.VP.VMCALL<REPORT_FATAL_ERROR>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 55/70] i386/tdx: Limit the range size for MapGPA
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 54/70] i386/tdx: handle TDG.VP.VMCALL<MapGPA> hypercall
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 53/70] i386/tdx: setup a timer for the qio channel
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 52/70] i386/tdx: handle TDG.VP.VMCALL<GetQuote>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 51/70] i386/tdx: handle TDG.VP.VMCALL<SetupEventNotifyInterrupt>
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 50/70] i386/tdx: Finalize TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 49/70] i386/tdx: Call KVM_TDX_INIT_VCPU to initialize TDX vcpu
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 48/70] i386/tdx: register TDVF as private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 47/70] memory: Introduce memory_region_init_ram_guest_memfd()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 46/70] i386/tdx: Add TDVF memory via KVM_TDX_INIT_MEM_REGION
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 45/70] i386/tdx: Setup the TD HOB list
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 44/70] headers: Add definitions from UEFI spec for volumes, resources, etc...
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 43/70] i386/tdx: Track RAM entries for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 42/70] i386/tdx: Track mem_ptr for each firmware entry of TDVF
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 41/70] i386/tdx: Don't initialize pc.rom for TDX VMs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 40/70] i386/tdx: Skip BIOS shadowing setup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 39/70] i386/tdx: Parse TDVF metadata for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 38/70] i386/tdvf: Introduce function to parse TDVF metadata
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 37/70] kvm/tdx: Ignore memory conversion to shared of unassigned region
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 36/70] kvm/tdx: Don't complain when converting vMMIO region to shared
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 35/70] i386/tdx: Make memory type private by default
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 34/70] kvm/memory: Introduce the infrastructure to set the default shared/private value
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 33/70] i386/tdx: Set kvm_readonly_mem_enabled to false for TDX VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 32/70] i386/tdx: Implement user specified tsc frequency
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 31/70] i386/tdx: Allows mrconfigid/mrowner/mrownerconfig for TDX_INIT_VM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 30/70] i386/tdx: Validate TD attributes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 29/70] i386/tdx: Wire CPU features up with attributes of TD guest
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 28/70] i386/tdx: Make sept_ve_disable set by default
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 27/70] i386/tdx: Add property sept-ve-disable for tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 26/70] i386/tdx: Initialize TDX before creating TD vcpus
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 25/70] kvm: Introduce kvm_arch_pre_create_vcpu()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 24/70] i386/kvm: Move architectural CPUID leaf generation to separate helper
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v6 12/25] KVM: x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v3 23/70] i386/tdx: Integrate tdx_caps->attrs_fixed0/1 to tdx_cpuid_lookup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 22/70] i386/tdx: Integrate tdx_caps->xfam_fixed0/1 into tdx_cpuid_lookup
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 21/70] i386/tdx: Update tdx_cpuid_lookup[].tdx_fixed0/1 by tdx_caps.cpuid_config[]
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 20/70] i386/tdx: Adjust the supported CPUID based on TDX restrictions
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 19/70] i386/tdx: Introduce is_tdx_vm() helper and cache tdx_guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 18/70] i386/tdx: Get tdx_capabilities via KVM_TDX_CAPABILITIES
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 17/70] i386/tdx: Implement tdx_kvm_init() to initialize TDX VM context
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 16/70] target/i386: Introduce kvm_confidential_guest_init()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 15/70] target/i386: Parse TDX vm type
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 14/70] target/i386: Implement mc->kvm_type() to get VM type
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 13/70] i386: Introduce tdx-guest object
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 12/70] *** HACK *** linux-headers: Update headers to pull in TDX API changes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 11/70] trace/kvm: Add trace for page convertion between shared and private
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 10/70] kvm: handle KVM_EXIT_MEMORY_FAULT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 09/70] physmem: Introduce ram_block_convert_range() for page conversion
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 08/70] physmem: replace function name with __func__ in ram_block_discard_range()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 07/70] physmem: Relax the alignment check of host_startaddr in ram_block_discard_range()
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 06/70] kvm: Introduce support for memory_attributes
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 05/70] kvm: Enable KVM_SET_USER_MEMORY_REGION2 for memslot
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 04/70] HostMem: Add mechanism to opt in kvm guest memfd via MachineState
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 03/70] RAMBlock/guest_memfd: Enable KVM_GUEST_MEMFD_ALLOW_HUGEPAGE
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 02/70] RAMBlock: Add support of KVM private guest memfd
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 01/70] *** HACK *** linux-headers: Update headers to pull in gmem APIs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3 00/70] QEMU Guest memfd + QEMU TDX support
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v17 071/116] KVM: TDX: handle vcpu migration over logical processor
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH v7 12/12] iommu: Improve iopf_queue_flush_dev()
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 11/12] iommu: Consolidate per-device fault data management
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 10/12] iommu: Separate SVA and IOPF
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 09/12] iommu: Make iommu_queue_iopf() more generic
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 08/12] iommu: Prepare for separating SVA and IOPF
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 07/12] iommu: Merge iommu_fault_event and iopf_fault
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 06/12] iommu: Remove iommu_[un]register_device_fault_handler()
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 05/12] iommu: Merge iopf_device_param into iommu_fault_param
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 04/12] iommu: Cleanup iopf data structure definitions
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 03/12] iommu: Remove unrecoverable fault data
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 02/12] iommu/arm-smmu-v3: Remove unrecoverable faults reporting
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 01/12] iommu: Move iommu fault data to linux/iommu.h
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 00/12] iommu: Prepare to deliver page faults to user space
- From: Lu Baolu <baolu.lu@xxxxxxxxxxxxxxx>
- RE: [PATCH v1 09/23] KVM: VMX: Switch FRED RSP0 between host and guest
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 13/23] KVM: VMX: Handle VMX nested exception for FRED
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 12/23] KVM: VMX: Handle FRED event data
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 14/23] KVM: VMX: Dump FRED context in dump_vmcs()
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [PATCH V1] vfio: add attach_group_by_node to control behavior of attaching group to domain
- From: yaozhenguo <yaozhenguo1@xxxxxxxxx>
- Re: [PATCH 6/9] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- Re: linux-next: Tree for Nov 14 (loongarch: KVM)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 06/19] hw/pci/msi: Restrict xen_is_pirq_msi() call to Xen
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH vfio 5/5] pds-vfio-pci: Add multi-region support
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH vfio 4/5] pds-vfio-pci: Move seq/ack bitmaps into region struct
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH vfio 3/5] pds-vfio-pci: Pass region info to relevant functions
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH vfio 2/5] pds-vfio-pci: Move and rename region specific info
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH vfio 1/5] pds-vfio-pci: Only use a single SGL for both seq and ack
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [PATCH vfio 0/5] pds-vfio-pci: Clean-ups and multi-region support
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [GIT PULL] vhost,virtio,vdpa,firmware: bugfixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Don't unnecessarily force masterclock update on vCPU hotplug
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Don't unnecessarily force masterclock update on vCPU hotplug
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- RE: [PATCH v1 11/23] KVM: x86: Add kvm_is_fred_enabled()
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Don't unnecessarily force masterclock update on vCPU hotplug
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: s390/mm: Properly reset no-dat
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 06/19] hw/pci/msi: Restrict xen_is_pirq_msi() call to Xen
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 18/19] hw/i386/xen: Compile 'xen-hvm.c' with Xen CPPFLAGS
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 16/19] hw/xen/xen_pt: Add missing license
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 10/19] hw/xen: Rename 'ram_memory' global variable as 'xen_memory'
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 06/19] hw/pci/msi: Restrict xen_is_pirq_msi() call to Xen
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 01/19] tests/avocado: Add 'guest:xen' tag to tests running Xen guest
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: TDISP enablement
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: [RFC PATCH-for-9.0 v2 09/19] hw/block/xen_blkif: Align structs with QEMU_ALIGNED() instead of #pragma
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 07/19] hw/xen: Remove unnecessary xen_hvm_inject_msi() stub
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 06/19] hw/pci/msi: Restrict xen_is_pirq_msi() call to Xen
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 01/19] tests/avocado: Add 'guest:xen' tag to tests running Xen guest
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 06/19] hw/pci/msi: Restrict xen_is_pirq_msi() call to Xen
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 04/19] system/physmem: Do not include 'hw/xen/xen.h' but 'sysemu/xen.h'
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 01/19] tests/avocado: Add 'guest:xen' tag to tests running Xen guest
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 01/19] tests/avocado: Add 'guest:xen' tag to tests running Xen guest
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 01/19] tests/avocado: Add 'guest:xen' tag to tests running Xen guest
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 04/19] system/physmem: Do not include 'hw/xen/xen.h' but 'sysemu/xen.h'
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH-for-9.0 v2 01/19] tests/avocado: Add 'guest:xen' tag to tests running Xen guest
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH-for-9.0 v2 19/19] hw/xen: Have most of Xen files become target-agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 18/19] hw/i386/xen: Compile 'xen-hvm.c' with Xen CPPFLAGS
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 17/19] hw/xen: Extract 'xen_igd.h' from 'xen_pt.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 16/19] hw/xen/xen_pt: Add missing license
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 15/19] hw/xen: Reduce inclusion of 'cpu.h' to target-specific sources
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 14/19] hw/xen: Use target-agnostic qemu_target_page_bits()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH-for-9.0 v2 13/19] hw/xen: Remove use of 'target_ulong' in handle_ioreq()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 12/19] hw/xen: Merge 'hw/xen/arch_hvm.h' in 'hw/xen/xen-hvm-common.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 11/19] hw/xen/xen_arch_hvm: Rename prototypes using 'xen_arch_' prefix
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 10/19] hw/xen: Rename 'ram_memory' global variable as 'xen_memory'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [RFC PATCH-for-9.0 v2 09/19] hw/block/xen_blkif: Align structs with QEMU_ALIGNED() instead of #pragma
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 08/19] hw/xen: Remove unused Xen stubs
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 07/19] hw/xen: Remove unnecessary xen_hvm_inject_msi() stub
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 06/19] hw/pci/msi: Restrict xen_is_pirq_msi() call to Xen
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 05/19] hw/display: Restrict xen_register_framebuffer() call to Xen
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 04/19] system/physmem: Do not include 'hw/xen/xen.h' but 'sysemu/xen.h'
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 03/19] sysemu/xen-mapcache: Check Xen availability with CONFIG_XEN_IS_POSSIBLE
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 02/19] sysemu/xen: Forbid using Xen headers in user emulation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 01/19] tests/avocado: Add 'guest:xen' tag to tests running Xen guest
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-9.0 v2 00/19] hw/xen: Have most of Xen files become target-agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 14/23] KVM: VMX: Dump FRED context in dump_vmcs()
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
- From: Borislav Petkov <bp@xxxxxxxxx>
- Need information
- From: "Y.G Kumar" <ygkumar17@xxxxxxxxx>
- Re: [PATCH 6/9] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: linux-next: build warning after merge of the kvm tree
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH] fs: anon-inode: Prepend blank line separator to anon_inode_create_getfile() reasons list
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 2/9] KVM: x86: Replace guts of "goverened" features with comprehensive cpu_caps
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 12/23] KVM: VMX: Handle FRED event data
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v1 11/23] KVM: x86: Add kvm_is_fred_enabled()
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v13 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: <ankita@xxxxxxxxxx>
- Re: [PATCH v1 09/23] KVM: VMX: Switch FRED RSP0 between host and guest
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v1 13/23] KVM: VMX: Handle VMX nested exception for FRED
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v1 08/23] KVM: VMX: Initialize VMCS FRED fields
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 08/23] KVM: VMX: Initialize VMCS FRED fields
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v12 01/37] x86/cpufeatures: Add the cpu feature bit for WRMSRNS
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 09/23] KVM: VMX: Switch FRED RSP0 between host and guest
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v12 01/37] x86/cpufeatures: Add the cpu feature bit for WRMSRNS
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v1 10/23] KVM: VMX: Add support for FRED context save/restore
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 11/23] KVM: x86: Add kvm_is_fred_enabled()
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [PATCH v2 3/3] KVM: selftests: Add test case for x86 apic_bus_clock_frequency
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v2 2/3] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v2 1/3] KVM: x86: Make the hardcoded APIC bus frequency vm variable
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v2 0/3] KVM: X86: Make bus clock frequency for vapic timer configurable
- From: isaku.yamahata@xxxxxxxxx
- RE: [PATCH v1 12/23] KVM: VMX: Handle FRED event data
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- linux-next: build warning after merge of the kvm tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/2] arm: pmu-overflow-interrupt: Increase count values
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/2] arm: pmu: Declare pmu_stats as volatile
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v8 26/26] KVM: selftests: Extend PMU counters test to validate RDPMC after WRMSR
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- RE: [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [PATCH] linux-headers: Synchronize linux headers from linux v6.7.0-rc1
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- Re: [PATCH v3 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: TDISP enablement
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- RE: [PATCH v12 01/37] x86/cpufeatures: Add the cpu feature bit for WRMSRNS
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [PATCH] KVM: x86: Remove IA32_PERF_GLOBAL_OVF_CTRL from KVM_GET_MSR_INDEX_LIST
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v12 19/37] x86/fred: Update MSR_IA32_FRED_RSP0 during task switch
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v12 19/37] x86/fred: Update MSR_IA32_FRED_RSP0 during task switch
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v3 1/1] target/i386/kvm: introduce 'pmu-cap-disabled' to set KVM_PMU_CAP_DISABLE
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/2] arm: pmu-overflow-interrupt: Increase count values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/2] arm: pmu: Declare pmu_stats as volatile
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/2] arm: pmu-overflow-interrupt: Fix failures on Amberwing
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v12 19/37] x86/fred: Update MSR_IA32_FRED_RSP0 during task switch
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- [PATCH v3] KVM: selftests: Initialise dynamically allocated configuration names
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 2/3] i386: kvm: disable KVM_CAP_PMU_CAPABILITY if "pmu" is disabled
- From: "Denis V. Lunev" <den@xxxxxxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: "Denis V. Lunev" <den@xxxxxxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: TDISP enablement
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: "Denis V. Lunev" <den@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH 10/14] KVM: x86: Make Hyper-V emulation optional
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v8 26/26] KVM: selftests: Extend PMU counters test to validate RDPMC after WRMSR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [virtio] Invitation to comment on Virtual I/O Device (VIRTIO) Version 1.3 - ends December 8th
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v14 00/34] KVM: guest_memfd() and per-page attributes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v8 26/26] KVM: selftests: Extend PMU counters test to validate RDPMC after WRMSR
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- Re: [PATCH 1/6] RISC-V: KVM: return ENOENT in *_one_reg() when reg is unknown
- From: Daniel Henrique Barboza <dbarboza@xxxxxxxxxxxxxxxx>
- Re: [PATCH V11 00/17] riscv: Add Native/Paravirt qspinlock support
- From: Leonardo Bras Soares Passos <leobras@xxxxxxxxxx>
- Re: [PATCH v1 12/23] KVM: VMX: Handle FRED event data
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH V3 vfio 0/9] Introduce a vfio driver over virtio devices
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v12 19/37] x86/fred: Update MSR_IA32_FRED_RSP0 during task switch
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: "Denis V. Lunev" <den@xxxxxxxxxxxxx>
- Re: [PATCH v15 00/23] TDX host kernel support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v2 18/19] heki: x86: Protect guest kernel memory using the KVM hypervisor
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v15 00/23] TDX host kernel support
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 1/6] RISC-V: KVM: return ENOENT in *_one_reg() when reg is unknown
- From: Andreas Schwab <schwab@xxxxxxx>
- Re: [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v1] arm/kvm: Enable support for KVM_ARM_VCPU_PMU_V3_FILTER
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- [PATCH V3 vfio 7/9] vfio/pci: Expose vfio_pci_core_setup_barmap()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- [PATCH V3 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V3 vfio 8/9] vfio/pci: Expose vfio_pci_iowrite/read##size()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V3 vfio 6/9] virtio-pci: Introduce APIs to execute legacy IO admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V3 vfio 5/9] virtio-pci: Initialize the supported admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V3 vfio 4/9] virtio-pci: Introduce admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V3 vfio 3/9] virtio-pci: Introduce admin command sending function
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V3 vfio 2/9] virtio-pci: Introduce admin virtqueue
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V3 vfio 1/9] virtio: Define feature bit for administration virtqueue
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V3 vfio 0/9] Introduce a vfio driver over virtio devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v1 11/23] KVM: x86: Add kvm_is_fred_enabled()
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: TDISP enablement
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: TDISP enablement
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: TDISP enablement
- From: Samuel Ortiz <sameo@xxxxxxxxxxxx>
- Re: [PATCH v1 10/23] KVM: VMX: Add support for FRED context save/restore
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v1 09/23] KVM: VMX: Switch FRED RSP0 between host and guest
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 15/34] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v1 08/23] KVM: VMX: Initialize VMCS FRED fields
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [RFC PATCH v2 14/19] heki: x86: Initialize permissions counters for pages mapped into KVA
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 16/19] heki: x86: Update permissions counters when guest page permissions change
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 02/19] KVM: x86: Add new hypercall to lock control registers
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 09/19] KVM: x86: Extend kvm_range_has_memory_attributes() with match_all
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 03/19] KVM: x86: Add notifications for Heki policy configuration and violation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 04/19] heki: Lock guest control registers at the end of guest kernel init
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 08/19] KVM: x86: Extend kvm_vm_set_mem_attributes() with a mask
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 15/19] heki: x86: Initialize permissions counters for pages in vmap()/vunmap()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 01/19] virt: Introduce Hypervisor Enforced Kernel Integrity (Heki)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 13/19] heki: Implement a kernel page table walker
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 12/19] x86: Implement the Memory Table feature to store arbitrary per-page data
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 00/19] Hypervisor-Enforced Kernel Integrity
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 05/19] KVM: VMX: Add MBEC support
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 10/19] KVM: x86: Implement per-guest-page permissions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 07/19] KVM: x86: Make memory attribute helpers more generic
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 06/19] KVM: x86: Add kvm_x86_ops.fault_gva()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 11/19] KVM: x86: Add new hypercall to set EPT permissions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 19/19] virt: Add Heki KUnit tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 18/19] heki: x86: Protect guest kernel memory using the KVM hypervisor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 07/26] KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 6.1 5/6] vhost-vdpa: clean iotlb map during reset for older userspace
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.5 6/7] vhost-vdpa: clean iotlb map during reset for older userspace
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 6/7] vhost-vdpa: clean iotlb map during reset for older userspace
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH V11 00/17] riscv: Add Native/Paravirt qspinlock support
- From: Guo Ren <guoren@xxxxxxxxxx>
- [PATCH RFC 13/13] iommu/vt-d: Enable posted mode for device MSIs
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 09/13] x86/irq: Install posted MSI notification handler
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 12/13] iommu/vt-d: Add a helper to retrieve PID address
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 10/13] x86/irq: Handle potential lost IRQ during migration and CPU offline
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 11/13] iommu/vt-d: Add an irq_chip for posted MSIs
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 07/13] x86/irq: Add helpers for checking Intel PID
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 05/13] x86/irq: Set up per host CPU posted interrupt descriptors
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 08/13] x86/irq: Factor out calling ISR from common_interrupt
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 04/13] iommu/vt-d: Add helper and flag to check/disable posted MSI
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 06/13] x86/irq: Unionize PID.PIR for 64bit access w/o casting
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 01/13] x86: Move posted interrupt descriptor out of vmx code
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 03/13] x86: Reserved a per CPU IDT vector for posted MSIs
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 00/13] Coalesced Interrupt Delivery with posted MSI
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 02/13] x86: Add a Kconfig option for posted MSI
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] KVM RISC-V Conditional Operations
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v3 0/9] RISC-V SBI debug console extension support
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: TDISP enablement
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [PATCH 8/9] KVM: x86: Replace all guest CPUID feature queries with cpu_caps check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 9/9] KVM: x86: Restrict XSAVE in cpu_caps based on KVM capabilities
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/9] KVM: x86: Shuffle code to prepare for dropping guest_cpuid_has()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/9] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/9] KVM: x86: Drop unnecessary check that cpuid_entry2_find() returns right leaf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/9] KVM: x86: Avoid double CPUID lookup when updating MWAIT at runtime
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/9] KVM: x86: Initialize guest cpu_caps based on guest CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/9] KVM: x86: Replace guts of "goverened" features with comprehensive cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/9] KVM: x86: Rename "governed features" helpers to use "guest_cpu_cap"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/9] KVM: x86: Replace governed features with guest cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: TDISP enablement
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v8 08/26] KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: TDISP enablement
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 14/33] KVM: x86: Add VTL to the MMU role
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC PATCH 3/4] KVM: SEV: Limit the call of WBINVDs based on the event type of mmu notifier
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH 15/34] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] target/i386: Fix CPUID encoding of Fn8000001E_ECX
- From: Babu Moger <babu.moger@xxxxxxx>
- Re: [kvm-unit-tests GIT PULL 00/26] s390x: multiline unittests.cfg, sclp enhancements, topology fixes and improvements, sie without MSO/MSL, 2G guest alignment, bug fixes
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/10] KVM: x86/pmu: Optimize triggering of emulated events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 07/26] KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL 26/26] lib: s390x: interrupt: remove TEID_ASCE defines
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 25/26] s390x: add a test for SIE without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 23/26] s390x: lib: sie: don't reenter SIE on pgm int
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 24/26] s390x: add test source dir to include paths
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 20/26] s390x: add function to set DAT mode for all interrupts
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 19/26] lib: s390x: introduce bitfield for PSW mask
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 22/26] s390x: lib: don't forward PSW when handling exception in SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 18/26] s390x: topology: Add complex topology test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 21/26] s390x: sie: switch to home space mode before entering SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 17/26] scripts: Implement multiline strings for extra_params
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 16/26] s390x: topology: Rewrite topology list test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 15/26] s390x: topology: Rename topology_core to topology_cpu
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 12/26] s390x: topology: Fix parsing loop
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 14/26] s390x: topology: Refine stsi header test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 10/26] s390x: topology: Fix report message
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 13/26] s390x: topology: Make some report messages unique
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 08/26] s390x: mvpg-sie: fix virtual-physical address confusion
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 07/26] s390x: sie: ensure guests are aligned to 2GB
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 04/26] lib: s390x: sclp: Add compat handling for HMC ASCII consoles
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 11/26] s390x: topology: Use function parameter in stsi_get_sysib
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 09/26] s390x: topology: Introduce enums for polarization & cpu type
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 05/26] lib: s390x: sclp: Add line mode input handling
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 06/26] s390x: spec_ex-sie: refactor to use snippet API
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 02/26] s390x: run PV guests with confidential guest enabled
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 03/26] lib: s390x: hw: rework do_detect_host so we don't need allocation
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 01/26] s390x: spec_ex: load full register
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 00/26] s390x: multiline unittests.cfg, sclp enhancements, topology fixes and improvements, sie without MSO/MSL, 2G guest alignment, bug fixes
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v8 05/26] KVM: x86/pmu: Get eventsel for fixed counters from perf
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- [PATCH v3 3/3] LoongArch: KVM: Remove kvm_acquire_timer before entering guest
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 1/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 2/3] LoongArch: KVM: Allow to access HW timer CSR registers always
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 16/34] KVM: x86: "Reset" vcpu->run->exit_reason early in KVM_RUN
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: kernel test robot <yujie.liu@xxxxxxxxx>
- Re: [PATCH 00/10] KVM: x86/pmu: Optimize triggering of emulated events
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Ping? Re: [PATCH rc] kvm: Prevent compiling virt/kvm/vfio.c unless VFIO is selected
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v8 08/26] KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/26] KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/26] KVM: x86/pmu: selftests: Fixes and new tests
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 10/10] KVM: x86/pmu: Avoid CPL lookup if PMC enabline for USER and KERNEL is the same
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/10] KVM: x86/pmu: Check eventsel first when emulating (branch) insns retired
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/10] KVM: x86/pmu: Snapshot event selectors that KVM emulates in software
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/10] KVM: x86/pmu: Expand the comment about what bits are check emulating events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/10] KVM: x86/pmu: Process only enabled PMCs when emulating events in software
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/10] KVM: x86/pmu: Add macros to iterate over all PMCs given a bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/10] KVM: x86/pmu: Snapshot and clear reprogramming bitmap before reprogramming
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/10] KVM: x86/pmu: Move pmc_idx => pmc translation helper to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/10] KVM: x86/pmu: Add common define to capture fixed counters offset
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/10] KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/10] KVM: x86/pmu: Optimize triggering of emulated events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v8 26/26] KVM: selftests: Extend PMU counters test to validate RDPMC after WRMSR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 25/26] KVM: selftests: Add helpers for safe and safe+forced RDMSR, RDPMC, and XGETBV
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 24/26] KVM: selftests: Add a forced emulation variation of KVM_ASM_SAFE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 23/26] KVM: selftests: Test PMC virtualization with forced emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 22/26] KVM: selftests: Move KVM_FEP macro into common library header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 21/26] KVM: selftests: Query module param to detect FEP in MSR filtering test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 20/26] KVM: selftests: Add helpers to read integer module params
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 19/26] KVM: selftests: Add a helper to query if the PMU module param is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 18/26] KVM: selftests: Expand PMU counters test to verify LLC events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 17/26] KVM: selftests: Add functional test for Intel's fixed PMU counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 16/26] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 15/26] KVM: selftests: Test consistency of CPUID with num of gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 14/26] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 13/26] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 12/26] KVM: selftests: Add pmu.h and lib/pmu.c for common PMU assets
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 11/26] KVM: selftests: Extend {kvm,this}_pmu_has() to support fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 10/26] KVM: selftests: Drop the "name" param from KVM_X86_PMU_FEATURE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 09/26] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 08/26] KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 07/26] KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 06/26] KVM: x86/pmu: Don't ignore bits 31:30 for RDPMC index on AMD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 05/26] KVM: x86/pmu: Get eventsel for fixed counters from perf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 04/26] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 03/26] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 02/26] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 01/26] KVM: x86/pmu: Always treat Fixed counters as available when supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 00/26] KVM: x86/pmu: selftests: Fixes and new tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 15/34] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 4/4] KVM: SEV: Use a bitmap module param to decide whether a cache flush is needed during the guest memory reclaim
- From: Jacky Li <jackyli@xxxxxxxxxx>
- [RFC PATCH 3/4] KVM: SEV: Limit the call of WBINVDs based on the event type of mmu notifier
- From: Jacky Li <jackyli@xxxxxxxxxx>
- [RFC PATCH 2/4] KVM: SEV: Plumb mmu_notifier_event into sev function
- From: Jacky Li <jackyli@xxxxxxxxxx>
- [RFC PATCH 1/4] KVM: SEV: Drop wbinvd_on_all_cpus() as kvm mmu notifier would flush the cache
- From: Jacky Li <jackyli@xxxxxxxxxx>
- [RFC PATCH 0/4] KVM: SEV: Limit cache flush operations in sev guest memory reclaim events
- From: Jacky Li <jackyli@xxxxxxxxxx>
- Re: KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [PATCH v1 15/23] KVM: nVMX: Add support for the secondary VM exit controls
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: "Denis V. Lunev" <den@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v6 08/14] KVM: arm64: Enable KVM_CAP_MEMORY_FAULT_INFO
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 14/14] KVM: selftests: Handle memory fault exits in demand_paging_test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 13/14] KVM: selftests: Add memslot_flags parameter to memstress_create_vm()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 11/14] KVM: selftests: Allow many vCPUs and reader threads per UFFD in demand paging test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 12/14] KVM: selftests: Use EPOLL in userfaultfd_util reader threads and signal errors via TEST_ASSERT
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 10/14] KVM: selftests: Report per-vcpu demand paging rate from demand paging test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 06/14] KVM: Add memslot flag to let userspace force an exit on missing hva mappings
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 08/14] KVM: arm64: Enable KVM_CAP_MEMORY_FAULT_INFO
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 09/14] KVM: arm64: Enable KVM_CAP_EXIT_ON_MISSING and annotate an EFAULT from stage-2 fault-handler
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 07/14] KVM: x86: Enable KVM_CAP_EXIT_ON_MISSING and annotate EFAULTs from stage-2 fault handler
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 04/14] KVM: Define and communicate KVM_EXIT_MEMORY_FAULT RWX flags to userspace
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 05/14] KVM: Try using fast GUP to resolve read faults
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 03/14] KVM: Simplify error handling in __gfn_to_pfn_memslot()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 02/14] KVM: Documentation: Add docstrings for __kvm_read/write_guest_page()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 00/14] Improve KVM + userfaultfd performance via KVM_MEMORY_FAULT_EXITs on stage-2 faults
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 01/14] KVM: Documentation: Clarify meaning of hva_to_pfn()'s 'atomic' parameter
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] RISC-V: KVM: return ENOENT in *_one_reg() when reg is unknown
- From: Daniel Henrique Barboza <dbarboza@xxxxxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Konstantin Khorenko <khorenko@xxxxxxxxxxxxx>
- [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
- From: Konstantin Khorenko <khorenko@xxxxxxxxxxxxx>
- KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Konstantin Khorenko <khorenko@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 1/3] s390/vfio-ap: unpin pages on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 3/3] s390/vfio-ap: improve reaction to response code 07 from PQAP(AQIC) command
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 0/3] s390/vfio-ap: a couple of corrections to the IRQ enablement function
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v15 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [kvm:guestmemfd 27/48] htmldocs: Documentation/filesystems/api-summary:74: ./fs/anon_inodes.c:167: WARNING: Unexpected indentation.
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 10/19] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 12/19] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PULL 06/15] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PULL 06/15] hw/xen: automatically assign device index to block devices
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: s390/mm: Properly reset no-dat
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: s390/mm: Properly reset no-dat
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v1 1/1] KVM: s390/mm: Properly reset no-dat
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v15 23/23] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 22/23] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 20/23] x86/kexec(): Reset TDX private memory on platforms with TDX erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 19/23] x86/virt/tdx: Improve readability of module initialization error handling
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 18/23] x86/virt/tdx: Keep TDMRs when module initialization is successful
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 17/23] x86/kexec: Flush cache of TDX private memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 16/23] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 15/23] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 14/23] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 13/23] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 12/23] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 11/23] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 10/23] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 08/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 04/23] x86/cpu: Detect TDX partial write machine check erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 03/23] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 02/23] x86/tdx: Define TDX supported page sizes as macros
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 01/23] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 00/23] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] KVM: xen: update shared_info and vcpu_info handling
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v7 00/11] KVM: xen: update shared_info and vcpu_info handling
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] RISC-V: KVM: return ENOENT in *_one_reg() when reg is unknown
- From: Andreas Schwab <schwab@xxxxxxx>
- Re: [PATCH v1 07/23] KVM: VMX: Disable intercepting FRED MSRs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 34/34] KVM: selftests: Add a memory region subtest to validate invalid flags
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 15/23] KVM: nVMX: Add support for the secondary VM exit controls
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 4/7] iommufd: Support attach/replace for SIOV virtual device {dev, pasid}
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 7/7] vfio: Add vfio_register_pasid_iommu_dev()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 19/19] KVM: selftests: Test PMC virtualization with forced emulation
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [PATCH v3 5/6] target/i386: enumerate VMX nested-exception support
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 6/6] target/i386: Add get/set/migrate support for FRED MSRs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 4/6] target/i386: add support for VMX FRED controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 1/6] target/i386: add support for FRED in CPUID enumeration
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 3/6] target/i386: add the secondary VM exit controls MSR
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 2/6] target/i386: mark CR4.FRED not reserved
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 0/6] target/i386: add support for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [RFC 6/7] iommufd/selftest: Add test coverage for SIOV virtual device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 15/19] KVM: selftests: Add a helper to query if the PMU module param is enabled
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 14/19] KVM: selftests: Expand PMU counters test to verify LLC events
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 13/19] KVM: selftests: Add functional test for Intel's fixed PMU counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/19] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH 09/34] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 10/19] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 09/19] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH 34/34] KVM: selftests: Add a memory region subtest to validate invalid flags
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v7 02/19] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/19] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v1 22/23] KVM: selftests: Add a new VM guest mode to run user level code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 16/23] KVM: nVMX: Add FRED VMCS fields
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 23/23] KVM: selftests: Add fred exception tests
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 21/23] KVM: selftests: Run debug_regs test with FRED enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 20/23] KVM: selftests: Add FRED VMCS fields to evmcs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 19/23] KVM: x86: Allow FRED/LKGS/WRMSRNS to be exposed to guests
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 15/23] KVM: nVMX: Add support for the secondary VM exit controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 18/23] KVM: nVMX: Add VMCS FRED states checking
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 17/23] KVM: nVMX: Add support for VMX FRED controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 13/23] KVM: VMX: Handle VMX nested exception for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 12/23] KVM: VMX: Handle FRED event data
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 11/23] KVM: x86: Add kvm_is_fred_enabled()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 10/23] KVM: VMX: Add support for FRED context save/restore
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 09/23] KVM: VMX: Switch FRED RSP0 between host and guest
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 14/23] KVM: VMX: Dump FRED context in dump_vmcs()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 08/23] KVM: VMX: Initialize VMCS FRED fields
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 03/23] KVM: VMX: Add support for the secondary VM exit controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 07/23] KVM: VMX: Disable intercepting FRED MSRs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 04/23] KVM: x86: Mark CR4.FRED as not reserved
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 01/23] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 02/23] KVM: VMX: Cleanup VMX misc information defines and usages
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 00/23] Enable FRED with KVM VMX
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [PATCH v5] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: David Hildenbrand <david@xxxxxxxxxx>
- [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 14/33] KVM: x86: Add VTL to the MMU role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 4/4] KVM: s390: Minor refactor of base/ext facility lists
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 1/4] KVM: s390: vsie: Fix STFLE interpretive execution identification
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 21/33] KVM: Pass memory attribute array as a MMU notifier argument
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [RFC 18/33] KVM: x86: Decouple kvm_get_memory_attributes() from struct kvm's mem_attr_array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC 25/33] KVM: Introduce a set of new memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm:guestmemfd 59/59] arch/loongarch/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 01/33] KVM: x86: Decouple lapic.h from hyperv.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]