Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 8/9] tty: Add SBI debug console support to HVC SBI driver
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 5/8] iommu/vt-d: Make domain attach helpers to be extern
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v4 08/18] iommufd: Add capabilities to IOMMU_GET_HW_INFO
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v6 3/8] iommu/vt-d: Add helper for nested domain allocation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/18] iommu: Add iommu_domain ops for dirty tracking
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 0/9] RISC-V SBI debug console extension support
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] tty: Add SBI debug console support to HVC SBI driver
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 12/18] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 8/9] tty: Add SBI debug console support to HVC SBI driver
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] tty: Add SBI debug console support to HVC SBI driver
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH v17 1/2] vfio/migration: Add debugfs to live migration driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- [PATCH v6 0/3] Add Intel VT-d nested translation (part 2/2)
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 3/3] iommu/vt-d: Add iotlb flush for nested domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 2/3] iommu/vt-d: Make iotlb flush helpers to be extern
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 1/3] iommufd: Add data structure for Intel VT-d stage-1 cache invalidation
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v6 8/8] iommu/vt-d: Disallow read-only mappings to nest parent domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 6/8] iommu/vt-d: Set the nested domain to a device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 5/8] iommu/vt-d: Make domain attach helpers to be extern
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 4/8] iommu/vt-d: Add helper to setup pasid nested translation
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 7/8] iommu/vt-d: Add nested domain allocation
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 3/8] iommu/vt-d: Add helper for nested domain allocation
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 2/8] iommu/vt-d: Extend dmar_domain to support nested domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 1/8] iommufd: Add data structure for Intel VT-d stage-1 domain allocation
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v6 0/8] Add Intel VT-d nested translation (part 1/2)
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 6/6] iommufd/selftest: Add coverage for IOMMU_HWPT_INVALIDATE ioctl
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 5/6] iommufd/selftest: Add IOMMU_TEST_OP_MD_CHECK_IOTLB test op
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 4/6] iommufd/selftest: Add mock_domain_cache_invalidate_user support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 3/6] iommu: Add iommu_copy_struct_from_user_array helper
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 2/6] iommufd: Add IOMMU_HWPT_INVALIDATE
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 0/5] perf: KVM: Enable callchains for guests
- From: Tianyi Liu <i.pear@xxxxxxxxxxx>
- [PATCH v5 1/6] iommu: Add cache_invalidate_user op
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 0/6] iommufd: Add nesting infrastructure (part 2/2)
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 05/10] iommufd: Derive iommufd_hwpt_paging from iommufd_hw_pagetable
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 09/10] iommufd/selftest: Add nested domain allocation for mock domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 10/10] iommufd/selftest: Add coverage for IOMMU_HWPT_ALLOC with nested HWPTs
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 08/10] iommu: Add iommu_copy_struct_from_user helper
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 07/10] iommufd: Add a nested HW pagetable object
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 06/10] iommufd: Share iommufd_hwpt_alloc with IOMMUFD_OBJ_HWPT_NESTED
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 04/10] iommufd/device: Wrap IOMMUFD_OBJ_HWPT_PAGING-only configurations
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 03/10] iommufd: Rename IOMMUFD_OBJ_HW_PAGETABLE to IOMMUFD_OBJ_HWPT_PAGING
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 02/10] iommu: Pass in parent domain with user_data to domain_alloc_user op
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 01/10] iommu: Add IOMMU_DOMAIN_NESTED
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v5 00/10] iommufd: Add nesting infrastructure (part 1/2)
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 12/18] iommu/intel: Access/Dirty bit support for SL domains
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/9] KVM: selftests: Test the consistency of the PMU's CPUID and its features
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: riscv: selftests: Add SBI DBCN extension to get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] RISC-V: KVM: Allow some SBI extensions to be disabled by default
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- RE: [PATCH v4 15/18] iommufd/selftest: Test IOMMU_HWPT_SET_DIRTY
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 14/18] iommufd/selftest: Test IOMMU_HWPT_ALLOC_ENFORCE_DIRTY
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 13/18] iommufd/selftest: Expand mock_domain with dev_flags
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 06/18] iommufd: Add IOMMU_HWPT_SET_DIRTY
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 12/18] iommu/intel: Access/Dirty bit support for SL domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Don't unnecessarily force masterclock update on vCPU hotplug
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH] vsock: initialize the_virtio_vsock before using VQs
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 9/9] RISC-V: Enable SBI based earlycon support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 8/9] tty: Add SBI debug console support to HVC SBI driver
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 7/9] tty/serial: Add RISC-V SBI debug console based earlycon
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 6/9] RISC-V: Add stubs for sbi_console_putchar/getchar()
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 5/9] KVM: riscv: selftests: Add SBI DBCN extension to get-reg-list test
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 4/9] RISC-V: KVM: Forward SBI DBCN extension to user-space
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 3/9] RISC-V: KVM: Allow some SBI extensions to be disabled by default
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 2/9] RISC-V: KVM: Change the SBI specification version to v2.0
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 1/9] RISC-V: Add defines for SBI debug console extension
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 0/9] RISC-V SBI debug console extension support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- RE: [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PULL 13/17] tests/qtest/migration: Specify the geometry of the bootsector
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 12/17] tests/qtest/migration: Define a machine for all architectures
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 15/17] tests/qtest/migration: Support more than one QEMU binary
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 17/17] tests/qtest: Don't print messages from query instances
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 10/17] tests/qtest: Introduce qtest_resolve_machine_alias
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 14/17] tests/qtest/migration: Set q35 as the default machine for x86_86
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 16/17] tests/qtest/migration: Allow user to specify a machine type
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 11/17] tests/qtest/migration: Introduce find_common_machine_version
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 09/17] tests/qtest: Introduce qtest_has_machine_with_env
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 08/17] tests/qtest: Allow qtest_get_machines to use an alternate QEMU binary
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 07/17] tests/qtest: Introduce qtest_init_with_env
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 06/17] tests/qtest: Allow qtest_qemu_binary to use a custom environment variable
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 05/17] migration/multifd: Stop checking p->quit in multifd_send_thread
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 03/17] migration: Fix parse_ramblock() on overwritten retvals
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 04/17] migration: simplify notifiers
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 02/17] migration: simplify blockers
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 00/17] Migration 20231020 patches
- From: Juan Quintela <quintela@xxxxxxxxxx>
- [PULL 01/17] tests/qtest/migration-test: Disable the analyze-migration.py test on s390x
- From: Juan Quintela <quintela@xxxxxxxxxx>
- RE: [PATCH v4 09/18] iommufd: Add a flag to skip clearing of IOPTE dirty
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH iwl-next v3 00/13] Add E800 live migration driver
- From: "Cao, Yahui" <yahui.cao@xxxxxxxxx>
- RE: [PATCH v4 08/18] iommufd: Add capabilities to IOMMU_GET_HW_INFO
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 06/18] iommufd: Add IOMMU_HWPT_SET_DIRTY
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 05/18] iommufd: Add a flag to enforce dirty tracking on attach
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 04/18] iommu: Add iommu_domain ops for dirty tracking
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 03/18] iommufd/iova_bitmap: Move symbols to IOMMUFD namespace
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 02/18] vfio: Move iova_bitmap into iommufd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 01/18] vfio/iova_bitmap: Export more API symbols
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 3/8] RISC-V: KVM: Allow some SBI extensions to be disabled by default
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- RE: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 6/7] selftest: tun: Add tests for virtio-net hashing
- From: kernel test robot <oliver.sang@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 09/12] KVM: X86: Add debugfs to inject machine check on VM exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 0/9] KVM: selftests: Test the consistency of the PMU's CPUID and its features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 8/9] KVM: selftests: Test Intel supported fixed counters bit mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 08/18] iommufd: Add capabilities to IOMMU_GET_HW_INFO
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 12/18] iommu/intel: Access/Dirty bit support for SL domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v4 5/9] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH vhost v4 00/16] vdpa: Add support for vq descriptor mappings
- From: Si-Wei Liu <si-wei.liu@xxxxxxxxxx>
- Re: [PATCH v4 4/9] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 3/9] KVM: selftests: Add pmu.h for PMU events and common masks
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/9] KVM: selftests: Extend this_pmu_has() and kvm_pmu_has() to check arch events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 2dac75696c6da3c848daa118a729827541c89d33
- From: Philip Li <philip.li@xxxxxxxxx>
- Re: [PATCH RFC 1/1] x86/paravirt: introduce param to disable pv sched_clock
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v17 1/2] vfio/migration: Add debugfs to live migration driver
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Stop zapping invalidated TDP MMU roots asynchronously
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vsock: initialize the_virtio_vsock before using VQs
- From: Alexandru Matei <alexandru.matei@xxxxxxxxxx>
- Re: [PATCH] vsock: initialize the_virtio_vsock before using VQs
- From: Alexandru Matei <alexandru.matei@xxxxxxxxxx>
- Re: [PATCH v14 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Stop zapping invalidated TDP MMU roots asynchronously
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 4/5] tools headers arm64: Update sysreg.h with kernel sources
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 2/2] KVM: arm64: Add PMU event filter bits required if EL3 is implemented
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 1/2] KVM: arm64: Make PMEVTYPER<n>_EL0.NSH RES0 if EL2 isn't advertised
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 0/2] KVM: arm64: PMU event filtering fixes
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH v5 05/12] x86/bugs: Rename RETPOLINE to MITIGATION_RETPOLINE
- From: Breno Leitao <leitao@xxxxxxxxxx>
- Re: [PATCH v7 12/12] KVM: selftests: aarch64: vPMU register test for unimplemented counters
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v7 08/12] KVM: arm64: PMU: Allow userspace to limit PMCR_EL0.N for the guest
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v4 03/18] iommufd/iova_bitmap: Move symbols to IOMMUFD namespace
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH v4 02/18] vfio: Move iova_bitmap into iommufd
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH] KVM: x86: Ignore MSR_AMD64_BU_CFG access
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] x86/paravirt: introduce param to disable pv sched_clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Ignore MSR_AMD64_TW_CFG access
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Declare flush_remote_tlbs{_range}() hooks iff HYPERV!=n
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] x86/paravirt: introduce param to disable pv sched_clock
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 8/9] scripts: Implement multiline strings for extra_params
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v2 13/24] hw/xen: do not repeatedly try to create a failing backend device
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 14/24] hw/xen: update Xen console to XenDevice model
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 23/24] xen-platform: unplug AHCI disks
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 06/24] i386/xen: Ignore VCPU_SSHOTTMR_future flag in set_singleshot_timer()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 04/24] hw/xen: don't clear map_track[] in xen_gnttab_reset()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 10/24] hw/xen: populate store frontend nodes with XenStore PFN/port
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 22/24] tests/avocado: switch to using xen-net-device for Xen guest tests
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 09/24] i386/xen: advertise XEN_HVM_CPUID_UPCALL_VECTOR in CPUID
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/1] x86/paravirt: introduce param to disable pv sched_clock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/24] hw/xen: only remove peers of PCI NICs on unplug
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 08/24] include: update Xen public headers to Xen 4.17.2 release
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 01/24] i386/xen: Don't advertise XENFEAT_supervisor_mode_kernel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 19/24] hw/i386/pc: support '-nic' for xen-net-device
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 18/24] hw/xen: update Xen PV NIC to XenDevice model
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 16/24] hw/xen: handle soft reset for primary console
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 24/24] docs: update Xen-on-KVM documentation
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 0/24] Get Xen PV shim running in Qemu, add net & console
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 02/24] i386/xen: fix per-vCPU upcall vector for Xen emulation
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 20/24] hw/xenpv: fix '-nic' support for xen-net-device
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 11/24] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 21/24] net: do not delete nics in net_cleanup()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 05/24] hw/xen: fix XenStore watch delivery to guest
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 12/24] hw/xen: add get_frontend_path() method to XenDeviceClass
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 07/24] hw/xen: Clean up event channel 'type_val' handling to use union
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 15/24] hw/xen: add support for Xen primary console in emulated mode
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 03/24] hw/xen: select kernel mode for per-vCPU event channel upcall vector
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 2dac75696c6da3c848daa118a729827541c89d33
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: nSVM: TLB_CONTROL / FLUSHBYASID "fixes"
- From: "Stefan Sterz" <s.sterz@xxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Use TAP in the steal_time test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
- From: Liam Merwick <liam.merwick@xxxxxxxxxx>
- Re: [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] x86/paravirt: introduce param to disable pv sched_clock
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 1/5] x86/paravirt: move some functions and defines to alternative
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 11/12] hw/xen: automatically assign device index to block devices
- From: Kevin Wolf <kwolf@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/7] lib: s390x: Add ap library
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/7] lib: s390x: Add ap library
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 9/9] s390x: topology: Add complex topology test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 8/9] scripts: Implement multiline strings for extra_params
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v7 08/12] KVM: arm64: PMU: Allow userspace to limit PMCR_EL0.N for the guest
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH v4 12/18] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH] KVM: selftests: Use TAP in the steal_time test
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v4 08/18] iommufd: Add capabilities to IOMMU_GET_HW_INFO
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v2 4/8] RISC-V: KVM: Forward SBI DBCN extension to user-space
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v3 1/5] x86/paravirt: move some functions and defines to alternative
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH v3 0/5] x86/paravirt: Get rid of paravirt patching
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH v4 12/18] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH 4/5] riscv: Suffix all page table entry pointers with 'p'
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH] vsock: initialize the_virtio_vsock before using VQs
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] MIPS: KVM: Fix a build warning about variable set but not used
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] RISC-V: Enable SBI based earlycon support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/5] tools headers arm64: Update sysreg.h with kernel sources
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Declare flush_remote_tlbs{_range}() hooks iff HYPERV!=n
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 5/5] KVM: arm64: selftests: Test for setting ID register from usersapce
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v17 1/2] vfio/migration: Add debugfs to live migration driver
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- Re: [PATCH v2 6/8] tty/serial: Add RISC-V SBI debug console based earlycon
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Xin Li <xin@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/3] migration: Fix test harness hang if source does not reach migration point
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v2 5/8] RISC-V: Add inline version of sbi_console_putchar/getchar() functions
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v17 1/2] vfio/migration: Add debugfs to live migration driver
- From: liulongfang <liulongfang@xxxxxxxxxx>
- Re: [PATCH v2 4/8] RISC-V: KVM: Forward SBI DBCN extension to user-space
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 3/8] RISC-V: KVM: Allow some SBI extensions to be disabled by default
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/3] migration: Fix test harness hang if source does not reach migration point
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/8] RISC-V: KVM: Change the SBI specification version to v2.0
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/8] RISC-V: Add defines for SBI debug console extension
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: arm64: Virtualise PMEVTYPER<n>_EL1.{NSU,NSK}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v3 25/78] target/i386: add fallthrough pseudo-keyword
- From: Zhao Liu <zhao1.liu@xxxxxxxxx>
- [Bug 218026] New: Compile failure in kvm-unit-tests about "ld: Error: unable to disambiguate: -no-pie"
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 1/1] selftests: KVM: add test to print boottime wallclock
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [Bug 218025] New: Assertion Failure happens in kvm selftest vmx_preemption_timer_test
- From: bugzilla-daemon@xxxxxxxxxx
- [PATCH] KVM: x86: remove the unused assigned_dev_head from kvm_arch
- From: Liang Chen <liangchen.linux@xxxxxxxxx>
- Re: [PATCH v4 12/18] iommu/intel: Access/Dirty bit support for SL domains
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- RE: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 04/18] iommu: Add iommu_domain ops for dirty tracking
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vsock: initialize the_virtio_vsock before using VQs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 4/5] tools headers arm64: Update sysreg.h with kernel sources
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: selftests: Add ID reg test, update headers
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 10/18] iommu/amd: Add domain_alloc_user based domain allocation
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v4 09/18] iommufd: Add a flag to skip clearing of IOPTE dirty
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v4 05/18] iommufd: Add a flag to enforce dirty tracking on attach
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v3 5/5] KVM: arm64: Load the stage-2 MMU context in kvm_vcpu_load_vhe()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 4/5] KVM: arm64: Rename helpers for VHE vCPU load/put
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 3/5] KVM: arm64: Reload stage-2 for VMID change on VHE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 2/5] KVM: arm64: Restore the stage-2 context in VHE's __tlb_switch_to_host()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 1/5] KVM: arm64: Don't zero VTTBR in __tlb_switch_to_host()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 0/5] KVM: arm64: Load stage-2 in vcpu_load() on VHE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 11/12] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 10/18] iommu/amd: Add domain_alloc_user based domain allocation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 09/18] iommufd: Add a flag to skip clearing of IOPTE dirty
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 06/18] iommufd: Add IOMMU_HWPT_SET_DIRTY
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 08/18] iommufd: Add capabilities to IOMMU_GET_HW_INFO
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 05/18] iommufd: Add a flag to enforce dirty tracking on attach
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 04/18] iommu: Add iommu_domain ops for dirty tracking
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 05/18] iommufd: Add a flag to enforce dirty tracking on attach
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH RFC 1/1] x86/paravirt: introduce param to disable pv sched_clock
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 03/18] iommufd/iova_bitmap: Move symbols to IOMMUFD namespace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 02/18] vfio: Move iova_bitmap into iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 01/18] vfio/iova_bitmap: Export more API symbols
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [linux-next:master] BUILD REGRESSION 2dac75696c6da3c848daa118a729827541c89d33
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH 2/3] KVM: Always flush async #PF workqueue when vCPU is being destroyed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: Fix KVM-owned file refcounting of KVM module(s)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] Revert "KVM: Prevent module exit until all VMs are freed"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: Set file_operations.owner appropriately for all such structures
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 17/18] iommufd/selftest: Test out_capabilities in IOMMU_GET_HW_INFO
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 12/18] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 15/18] iommufd/selftest: Test IOMMU_HWPT_SET_DIRTY
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 16/18] iommufd/selftest: Test IOMMU_HWPT_GET_DIRTY_IOVA
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 14/18] iommufd/selftest: Test IOMMU_HWPT_ALLOC_ENFORCE_DIRTY
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 10/18] iommu/amd: Add domain_alloc_user based domain allocation
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 13/18] iommufd/selftest: Expand mock_domain with dev_flags
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 18/18] iommufd/selftest: Test IOMMU_GET_DIRTY_IOVA_NO_CLEAR flag
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 11/18] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 08/18] iommufd: Add capabilities to IOMMU_GET_HW_INFO
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 09/18] iommufd: Add a flag to skip clearing of IOPTE dirty
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 06/18] iommufd: Add IOMMU_HWPT_SET_DIRTY
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 07/18] iommufd: Add IOMMU_HWPT_GET_DIRTY_IOVA
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 03/18] iommufd/iova_bitmap: Move symbols to IOMMUFD namespace
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 04/18] iommu: Add iommu_domain ops for dirty tracking
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 02/18] vfio: Move iova_bitmap into iommufd
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 05/18] iommufd: Add a flag to enforce dirty tracking on attach
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 01/18] vfio/iova_bitmap: Export more API symbols
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v4 00/18] IOMMUFD Dirty Tracking
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [linux-next:master] BUILD REGRESSION 2dac75696c6da3c848daa118a729827541c89d33
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- [PATCH] KVM: x86: Don't unnecessarily force masterclock update on vCPU hotplug
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [mst-vhost:vhost 18/35] drivers/virtio/virtio_pci_modern.c:54:17: warning: format '%ld' expects argument of type 'long int', but argument 3 has type 'size_t' {aka 'unsigned int'}
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/1] selftests: KVM: add test to print boottime wallclock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: nSVM: Advertise support for flush-by-ASID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] Revert "nSVM: Check for reserved encodings of TLB_CONTROL in nested VMCB"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: nSVM: TLB_CONTROL / FLUSHBYASID "fixes"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: SVM: Explicitly require FLUSHBYASID to enable SEV support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Declare flush_remote_tlbs{_range}() hooks iff HYPERV!=n
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] KVM: SVM: Don't intercept IRET when injecting NMI and vNMI is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] vsock: initialize the_virtio_vsock before using VQs
- From: Alexandru Matei <alexandru.matei@xxxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: arm64: Virtualise PMEVTYPER<n>_EL1.{NSU,NSK}
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH vhost v4 12/16] vdpa/mlx5: Improve mr update flow
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- Re: [PATCH vhost v4 00/16] vdpa: Add support for vq descriptor mappings
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH vhost v4 16/16] vdpa/mlx5: Update cvq iotlb mapping on ASID change
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 14/16] vdpa/mlx5: Enable hw support for vq descriptor mapping
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 15/16] vdpa/mlx5: Make iotlb helper functions more generic
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 12/16] vdpa/mlx5: Improve mr update flow
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 08/16] vdpa/mlx5: Collapse "dvq" mr add/delete functions
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 07/16] vdpa/mlx5: Take cvq iotlb lock during refresh
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 09/16] vdpa/mlx5: Rename mr destroy functions
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 10/16] vdpa/mlx5: Allow creation/deletion of any given mr struct
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 06/16] vdpa/mlx5: Decouple cvq iotlb handling from hw mapping code
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 13/16] vdpa/mlx5: Introduce mr for vq descriptor
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 11/16] vdpa/mlx5: Move mr mutex out of mr struct
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 05/16] vdpa/mlx5: Create helper function for dma mappings
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 02/16] vdpa: introduce dedicated descriptor group for virtqueue
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 04/16] vhost-vdpa: uAPI to get dedicated descriptor group id
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 03/16] vhost-vdpa: introduce descriptor group backend feature
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 01/16] vdpa/mlx5: Expose descriptor group mkey hw capability
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- [PATCH vhost v4 00/16] vdpa: Add support for vq descriptor mappings
- From: Dragos Tatulea <dtatulea@xxxxxxxxxx>
- Re: [PATCH v4 01/17] iommu: Add hwpt_type with user_data for domain_alloc_user op
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 01/17] iommu: Add hwpt_type with user_data for domain_alloc_user op
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 03/10] kvmclock: Use free_decrypted_pages()
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use the correct size of struct kvm_vcpu_pv_apf_data and fix the documentation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH] KVM: x86: Turn off KVM_WERROR by default for all configs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use the correct size of struct kvm_vcpu_pv_apf_data and fix the documentation
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [RFC PATCH 4.14 v2] KVM: x86: Backport support for interrupt-based APF page-ready delivery in guest
- From: Riccardo Mancini <mancio@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Clean up included but non-essential header declarations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH gmem FIXUP] selftests/kvm: guestmem: check fstat results on guestmem fd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v14 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] perf build: Generate arm64's sysreg-defs.h and add to include path
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [PATCH v4 21/21] i386: Add new property to control L2 cache topo in CPUID.04H
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/21] Support smp.clusters for x86 in QEMU
- From: Zhao Liu <zhao1.liu@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/5] KVM: selftests: Add ID reg test, update headers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v2 1/3] s390/vfio-ap: unpin pages on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v2 3/3] s390/vfio-ap: improve reaction to response code 07 from PQAP(AQIC) command
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v2 0/3] a couple of corrections to the IRQ enablement function
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: arm64: Virtualise PMEVTYPER<n>_EL1.{NSU,NSK}
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 4/5] tools headers arm64: Update sysreg.h with kernel sources
- From: Eric Auger <eauger@xxxxxxxxxx>
- RE: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 5/5] KVM: arm64: selftests: Test for setting ID register from usersapce
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v3 4/5] tools headers arm64: Update sysreg.h with kernel sources
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 00/21] Support smp.clusters for x86 in QEMU
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 4/5] tools headers arm64: Update sysreg.h with kernel sources
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v14 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH 11/12] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v14 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v14 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v3 3/5] KVM: selftests: Generate sysreg-defs.h and add to include path
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v3 1/5] tools: arm64: Add a Makefile for generating sysreg-defs.h
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH 11/12] hw/xen: automatically assign device index to block devices
- From: Kevin Wolf <kwolf@xxxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH 11/12] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v3 16/19] iommu/amd: Add domain_alloc_user based domain allocation
- From: Vasant Hegde <vasant.hegde@xxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v14 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v14 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH 11/12] hw/xen: automatically assign device index to block devices
- From: Igor Mammedov <imammedo@xxxxxxxxxx>
- Re: [PATCH v2 5/5] KVM: arm64: Load the stage-2 MMU context in kvm_vcpu_load_vhe()
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v2 4/5] KVM: arm64: Rename helpers for VHE vCPU load/put
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v2 2/5] KVM: arm64: Restore the stage-2 context in VHE's __tlb_switch_to_host()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 2/5] KVM: arm64: Restore the stage-2 context in VHE's __tlb_switch_to_host()
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [PATCH v7 12/12] KVM: selftests: aarch64: vPMU register test for unimplemented counters
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v14 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 01/17] iommu: Add hwpt_type with user_data for domain_alloc_user op
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 03/10] kvmclock: Use free_decrypted_pages()
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2023.10.18 - No topic, but still a go
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Clean up included but non-essential header declarations
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: hyper-v: Don't auto-enable stimer on write from user-space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Update the variable naming in kvm_x86_ops.sched_in()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Use octal for file permission
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Stop kicking vCPUs to sync the dirty log when PML is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH gmem] KVM: selftests: Fix gmem conversion tests for multiple vCPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v4 07/13] perf/x86: Add constraint for guest perf metrics event
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH] KVM: x86: Update the variable naming in kvm_x86_ops.sched_in()
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v12 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 2/5] perf build: Generate arm64's sysreg-defs.h and add to include path
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v7 11/12] KVM: selftests: aarch64: vPMU register test for implemented counters
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Clean up included but non-essential header declarations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V1 vfio 6/9] virtio-pci: Introduce APIs to execute legacy IO admin commands
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 03/10] kvmclock: Use free_decrypted_pages()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v4 10/17] iommufd: Support IOMMU_HWPT_ALLOC allocation with user data
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v7 11/12] KVM: selftests: aarch64: vPMU register test for implemented counters
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Do not let a L1 hypervisor access the *32_EL2 sysregs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 7/9] x86/sev-es: Include XSS value in GHCB CPUID request
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v3 07/19] iommufd: Dirty tracking data support
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH 7/9] x86/sev-es: Include XSS value in GHCB CPUID request
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v1 00/10] mm/prmem: Implement the Persistent-Across-Kexec memory feature (prmem)
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 11/12] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 07/19] iommufd: Dirty tracking data support
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Use the correct size of struct kvm_vcpu_pv_apf_data and fix the documentation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH v2] KVM: selftests: Initialise dynamically allocated configuration names
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 07/19] iommufd: Dirty tracking data support
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [Patch v4 07/13] perf/x86: Add constraint for guest perf metrics event
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v3 07/19] iommufd: Dirty tracking data support
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v7 08/12] KVM: arm64: PMU: Allow userspace to limit PMCR_EL0.N for the guest
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] KVM: x86: add param to update master clock periodically
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v2 1/6] iommu: Add new iommu op to create domains owned by userspace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: hyper-v: Don't auto-enable stimer on write from user-space
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 07/19] iommufd: Dirty tracking data support
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v7 08/12] KVM: arm64: PMU: Allow userspace to limit PMCR_EL0.N for the guest
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- [PATCH v3] KVM: x86: hyper-v: Don't auto-enable stimer on write from user-space
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 07/19] iommufd: Dirty tracking data support
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v4 10/17] iommufd: Support IOMMU_HWPT_ALLOC allocation with user data
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Sebastian Ott <sebott@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 16/19] iommu/amd: Add domain_alloc_user based domain allocation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 07/19] iommufd: Dirty tracking data support
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 3/3] arm/kvm: convert to read_sys_reg64
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v2 2/2] vfio/mtty: Enable migration support
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH v3 16/19] iommu/amd: Add domain_alloc_user based domain allocation
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfio/mtty: Overhaul mtty interrupt handling
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 16/19] iommu/amd: Add domain_alloc_user based domain allocation
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- RE: [RFC PATCH 4.14] KVM: x86: Backport support for interrupt-based APF page-ready delivery in guest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [RFC PATCH 4.14] KVM: x86: Backport support for interrupt-based APF page-ready delivery in guest
- From: "Mancini, Riccardo" <mancio@xxxxxxxxxx>
- [PATCH V1 vfio 9/9] vfio/virtio: Introduce a vfio driver over virtio devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 8/9] vfio/pci: Expose vfio_pci_iowrite/read##size()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 7/9] vfio/pci: Expose vfio_pci_core_setup_barmap()
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 6/9] virtio-pci: Introduce APIs to execute legacy IO admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 5/9] virtio-pci: Introduce admin commands
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 4/9] virtio-pci: Introduce admin command sending function
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 2/9] virtio: Define feature bit for administration virtqueue
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 3/9] virtio-pci: Introduce admin virtqueue
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 1/9] virtio-pci: Fix common config map for modern device
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 0/9] Introduce a vfio driver over virtio devices
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v14 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 7/9] s390x: topology: Rewrite topology list test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v14 01/23] x86/virt/tdx: Detect TDX during kernel boot
- From: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 16/19] iommu/amd: Add domain_alloc_user based domain allocation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] arm/kvm: use kvm_{get,set}_one_reg
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 6/9] s390x: topology: Rename topology_core to topology_cpu
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/9] s390x: topology: Refine stsi header test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] arm/kvm: convert to read_sys_reg64
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v3 07/19] iommufd: Dirty tracking data support
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 0/4] KVM: x86: tracepoint updates
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH 4.14] KVM: x86: Backport support for interrupt-based APF page-ready delivery in guest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v14 10/23] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v14 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [Patch v4 07/13] perf/x86: Add constraint for guest perf metrics event
- From: Manali Shukla <manali.shukla@xxxxxxx>
- Re: [PATCH 11/12] hw/xen: automatically assign device index to block devices
- From: Kevin Wolf <kwolf@xxxxxxxxxx>
- [PATCH v14 23/23] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 11/23] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 17/23] x86/kexec: Flush cache of TDX private memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 16/23] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 15/23] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 19/23] x86/virt/tdx: Improve readability of module initialization error handling
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 18/23] x86/virt/tdx: Keep TDMRs when module initialization is successful
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 20/23] x86/kexec(): Reset TDX private memory on platforms with TDX erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 14/23] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 22/23] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 12/23] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 13/23] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 09/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 08/23] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 04/23] x86/cpu: Detect TDX partial write machine check erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 03/23] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 01/23] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 00/23] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v14 02/23] x86/tdx: Define TDX supported page sizes as macros
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH] KVM: x86: Clean up included but non-essential header declarations
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- RE: [PATCH v4 01/17] iommu: Add hwpt_type with user_data for domain_alloc_user op
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 16/19] iommu/amd: Add domain_alloc_user based domain allocation
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- RE: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 10/17] iommufd: Support IOMMU_HWPT_ALLOC allocation with user data
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v4 08/17] iommufd: Always setup MSI and anforce cc on kernel-managed domains
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v4 01/17] iommu: Add hwpt_type with user_data for domain_alloc_user op
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC PATCH v1 00/10] mm/prmem: Implement the Persistent-Across-Kexec memory feature (prmem)
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v3 17/19] iommu/amd: Access/Dirty bit support in IOPTEs
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v3 5/5] KVM: arm64: selftests: Test for setting ID register from usersapce
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] KVM: arm64: Move VTCR_EL2 into struct s2_mmu
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 0/5] KVM: arm64: Load stage-2 in vcpu_load() on VHE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 18/19] iommu/amd: Print access/dirty bits if supported
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [PATCH v2 2/6] iommufd/hw_pagetable: Use domain_alloc_user op for domain allocation
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- [RFC PATCH 11/12] iommu/vt-d: Use intel_iommu_set_dev_pasid() for sva domain
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 10/12] iommu/vt-d: Refactor intel_iommu_remove_dev_pasid()
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 09/12] iommu/vt-d: Refactor intel_iommu_set_dev_pasid()
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 07/12] iommu/vt-d: Retire struct intel_svm
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 12/12] iommu/vt-d: Remove superfluous IOMMU IOTLB invalidations
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 08/12] iommu/vt-d: Use RCU for dev_pasids list updates in set/remove_dev_pasid()
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 06/12] iommu: Add mmu_notifier to sva domain
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 04/12] iommu/vt-d: Make dev_to_intel_iommu() helper global
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 05/12] iommu/vt-d: Retire struct intel_svm_dev
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 04/12] iommu/vt-d: Make dev_to_intel_iommu() helper global
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 03/12] iommu/vt-d: Retire intel_svm_bind_mm()
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 02/12] iommu/vt-d: Remove initialization for dynamically heap-allocated rcu_head
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 01/12] iommu/vt-d: Retire the treatment for revoking PASIDs with pending pgfaults
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- [RFC PATCH 00/12] iommu/vt-d: Remove superfluous IOMMU IOTLB invalidations
- From: Tina Zhang <tina.zhang@xxxxxxxxx>
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 19/19] iommu/intel: Access/Dirty bit support for SL domains
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 16/19] iommu/amd: Add domain_alloc_user based domain allocation
- From: "Suthikulpanit, Suravee" <suravee.suthikulpanit@xxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.6-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 6.6-rc7
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2 0/2] vfio/mtty: Add migration support
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 1/2] vfio/mtty: Overhaul mtty interrupt handling
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 2/2] vfio/mtty: Enable migration support
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] KVM: x86: add param to update master clock periodically
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Stop kicking vCPUs to sync the dirty log when PML is disabled
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] KVM: x86: add param to update master clock periodically
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [RFC PATCH 4.14] KVM: x86: Backport support for interrupt-based APF page-ready delivery in guest
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 1/2] vfio/mtty: Fix eventfd leak
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v7 05/12] KVM: arm64: PMU: Add a helper to read a vCPU's PMCR_EL0
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v7 04/12] KVM: arm64: PMU: Don't define the sysreg reset() for PM{USERENR,CCFILTR}_EL0
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v7 01/12] KVM: arm64: PMU: Introduce helpers to set the guest's PMU
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v7 03/12] KVM: arm64: PMU: Clear PM{C,I}NTEN{SET,CLR} and PMOVS{SET,CLR} on vCPU reset
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v5 09/17] KVM: Introduce KVM_CAP_USERFAULT_ON_MISSING without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v5 04/17] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v7 07/12] KVM: arm64: PMU: Set PMCR_EL0.N for vCPU based on the associated PMU
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v7 10/12] KVM: selftests: aarch64: Introduce vpmu_counter_access test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] KVM: x86: add param to update master clock periodically
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH gmem] KVM: selftests: Fix gmem conversion tests for multiple vCPUs
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v4 10/17] iommufd: Support IOMMU_HWPT_ALLOC allocation with user data
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 2/3] migration: Fix test harness hang if source does not reach migration point
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 01/17] iommu: Add hwpt_type with user_data for domain_alloc_user op
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [RFC PATCH V2 14/18] vfio/pci: Add core IMS support
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 2/6] iommufd/hw_pagetable: Use domain_alloc_user op for domain allocation
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 1/6] iommu: Add new iommu op to create domains owned by userspace
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v5 04/17] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v2] KVM: x86: hyper-v: Don't auto-enable stimer during deserialization
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH RFC 1/1] KVM: x86: add param to update master clock periodically
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: hyper-v: Don't auto-enable stimer during deserialization
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH RFC 07/11] KVM: x86: Make Hyper-V emulation optional
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v16 026/116] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 022/116] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 110/116] KVM: TDX: Inhibit APICv for TDX guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 015/116] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH RFC 08/11] KVM: nVMX: hyper-v: Introduce nested_vmx_evmptr() accessor
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH iwl-next v3 00/13] Add E800 live migration driver
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [RFC PATCH v5 08/16] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 01/16] KVM: TDP_MMU: Go to next level if smaller private mapping exists
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 032/116] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 087/116] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 101/116] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 02/16] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 03/16] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v3 02/19] vfio: Move iova_bitmap into iommu core
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH v16 029/116] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 113/116] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 06/16] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 04/16] KVM: TDX: Pass size to tdx_measure_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 05/16] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 109/116] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 031/116] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 10/16] KVM: x86/tdp_mmu: Allocate private page table for large page split
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 100/116] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 017/116] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 105/116] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 067/116] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 002/116] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 09/16] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 108/116] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 025/116] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 114/116] RFC: KVM: x86: Add x86 callback to check cpuid
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 009/116] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 006/116] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 084/116] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 003/116] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 037/116] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 15/16] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 075/116] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 085/116] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 005/116] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 13/16] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 036/116] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v5 16/16] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 099/116] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 078/116] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 011/116] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 001/116] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 028/116] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 098/116] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v16 007/116] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]