Linux KVM Virtualization
[Prev Page][Next Page]
- [RFC PATCH v2 13/19] heki: Implement a kernel page table walker
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 12/19] x86: Implement the Memory Table feature to store arbitrary per-page data
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 00/19] Hypervisor-Enforced Kernel Integrity
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 05/19] KVM: VMX: Add MBEC support
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 10/19] KVM: x86: Implement per-guest-page permissions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 07/19] KVM: x86: Make memory attribute helpers more generic
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 06/19] KVM: x86: Add kvm_x86_ops.fault_gva()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 11/19] KVM: x86: Add new hypercall to set EPT permissions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 19/19] virt: Add Heki KUnit tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 17/19] heki: x86: Update permissions counters during text patching
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v2 18/19] heki: x86: Protect guest kernel memory using the KVM hypervisor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 07/26] KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [PATCH AUTOSEL 6.1 5/6] vhost-vdpa: clean iotlb map during reset for older userspace
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.5 6/7] vhost-vdpa: clean iotlb map during reset for older userspace
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.6 6/7] vhost-vdpa: clean iotlb map during reset for older userspace
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH V11 00/17] riscv: Add Native/Paravirt qspinlock support
- From: Guo Ren <guoren@xxxxxxxxxx>
- [PATCH RFC 13/13] iommu/vt-d: Enable posted mode for device MSIs
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 09/13] x86/irq: Install posted MSI notification handler
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 12/13] iommu/vt-d: Add a helper to retrieve PID address
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 10/13] x86/irq: Handle potential lost IRQ during migration and CPU offline
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 11/13] iommu/vt-d: Add an irq_chip for posted MSIs
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 07/13] x86/irq: Add helpers for checking Intel PID
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 05/13] x86/irq: Set up per host CPU posted interrupt descriptors
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 08/13] x86/irq: Factor out calling ISR from common_interrupt
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 04/13] iommu/vt-d: Add helper and flag to check/disable posted MSI
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 06/13] x86/irq: Unionize PID.PIR for 64bit access w/o casting
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 01/13] x86: Move posted interrupt descriptor out of vmx code
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 03/13] x86: Reserved a per CPU IDT vector for posted MSIs
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 00/13] Coalesced Interrupt Delivery with posted MSI
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- [PATCH RFC 02/13] x86: Add a Kconfig option for posted MSI
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] KVM RISC-V Conditional Operations
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v3 0/9] RISC-V SBI debug console extension support
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: TDISP enablement
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [PATCH 8/9] KVM: x86: Replace all guest CPUID feature queries with cpu_caps check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 9/9] KVM: x86: Restrict XSAVE in cpu_caps based on KVM capabilities
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/9] KVM: x86: Shuffle code to prepare for dropping guest_cpuid_has()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/9] KVM: x86: Update guest cpu_caps at runtime for dynamic CPUID-based features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/9] KVM: x86: Drop unnecessary check that cpuid_entry2_find() returns right leaf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/9] KVM: x86: Avoid double CPUID lookup when updating MWAIT at runtime
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/9] KVM: x86: Initialize guest cpu_caps based on guest CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/9] KVM: x86: Replace guts of "goverened" features with comprehensive cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/9] KVM: x86: Rename "governed features" helpers to use "guest_cpu_cap"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/9] KVM: x86: Replace governed features with guest cpu_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: TDISP enablement
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v8 08/26] KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: TDISP enablement
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 14/33] KVM: x86: Add VTL to the MMU role
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC PATCH 3/4] KVM: SEV: Limit the call of WBINVDs based on the event type of mmu notifier
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH 15/34] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] target/i386: Fix CPUID encoding of Fn8000001E_ECX
- From: Babu Moger <babu.moger@xxxxxxx>
- Re: [kvm-unit-tests GIT PULL 00/26] s390x: multiline unittests.cfg, sclp enhancements, topology fixes and improvements, sie without MSO/MSL, 2G guest alignment, bug fixes
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 00/10] KVM: x86/pmu: Optimize triggering of emulated events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 07/26] KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests GIT PULL 26/26] lib: s390x: interrupt: remove TEID_ASCE defines
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 25/26] s390x: add a test for SIE without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 23/26] s390x: lib: sie: don't reenter SIE on pgm int
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 24/26] s390x: add test source dir to include paths
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 20/26] s390x: add function to set DAT mode for all interrupts
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 19/26] lib: s390x: introduce bitfield for PSW mask
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 22/26] s390x: lib: don't forward PSW when handling exception in SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 18/26] s390x: topology: Add complex topology test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 21/26] s390x: sie: switch to home space mode before entering SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 17/26] scripts: Implement multiline strings for extra_params
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 16/26] s390x: topology: Rewrite topology list test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 15/26] s390x: topology: Rename topology_core to topology_cpu
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 12/26] s390x: topology: Fix parsing loop
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 14/26] s390x: topology: Refine stsi header test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 10/26] s390x: topology: Fix report message
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 13/26] s390x: topology: Make some report messages unique
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 08/26] s390x: mvpg-sie: fix virtual-physical address confusion
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 07/26] s390x: sie: ensure guests are aligned to 2GB
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 04/26] lib: s390x: sclp: Add compat handling for HMC ASCII consoles
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 11/26] s390x: topology: Use function parameter in stsi_get_sysib
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 09/26] s390x: topology: Introduce enums for polarization & cpu type
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 05/26] lib: s390x: sclp: Add line mode input handling
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 06/26] s390x: spec_ex-sie: refactor to use snippet API
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 02/26] s390x: run PV guests with confidential guest enabled
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 03/26] lib: s390x: hw: rework do_detect_host so we don't need allocation
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 01/26] s390x: spec_ex: load full register
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests GIT PULL 00/26] s390x: multiline unittests.cfg, sclp enhancements, topology fixes and improvements, sie without MSO/MSL, 2G guest alignment, bug fixes
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v8 05/26] KVM: x86/pmu: Get eventsel for fixed counters from perf
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- [PATCH v3 3/3] LoongArch: KVM: Remove kvm_acquire_timer before entering guest
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 0/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 1/3] LoongArch: KVM: Remove SW timer switch when vcpu is halt polling
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- [PATCH v3 2/3] LoongArch: KVM: Allow to access HW timer CSR registers always
- From: Bibo Mao <maobibo@xxxxxxxxxxx>
- Re: [PATCH 16/34] KVM: x86: "Reset" vcpu->run->exit_reason early in KVM_RUN
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: kernel test robot <yujie.liu@xxxxxxxxx>
- Re: [PATCH 00/10] KVM: x86/pmu: Optimize triggering of emulated events
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Ping? Re: [PATCH rc] kvm: Prevent compiling virt/kvm/vfio.c unless VFIO is selected
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v8 08/26] KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/26] KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 00/26] KVM: x86/pmu: selftests: Fixes and new tests
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH 10/10] KVM: x86/pmu: Avoid CPL lookup if PMC enabline for USER and KERNEL is the same
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/10] KVM: x86/pmu: Check eventsel first when emulating (branch) insns retired
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/10] KVM: x86/pmu: Snapshot event selectors that KVM emulates in software
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/10] KVM: x86/pmu: Expand the comment about what bits are check emulating events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/10] KVM: x86/pmu: Process only enabled PMCs when emulating events in software
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/10] KVM: x86/pmu: Add macros to iterate over all PMCs given a bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/10] KVM: x86/pmu: Snapshot and clear reprogramming bitmap before reprogramming
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/10] KVM: x86/pmu: Move pmc_idx => pmc translation helper to common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/10] KVM: x86/pmu: Add common define to capture fixed counters offset
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/10] KVM: x86/pmu: Zero out PMU metadata on AMD if PMU is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/10] KVM: x86/pmu: Optimize triggering of emulated events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v8 26/26] KVM: selftests: Extend PMU counters test to validate RDPMC after WRMSR
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 25/26] KVM: selftests: Add helpers for safe and safe+forced RDMSR, RDPMC, and XGETBV
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 24/26] KVM: selftests: Add a forced emulation variation of KVM_ASM_SAFE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 23/26] KVM: selftests: Test PMC virtualization with forced emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 22/26] KVM: selftests: Move KVM_FEP macro into common library header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 21/26] KVM: selftests: Query module param to detect FEP in MSR filtering test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 20/26] KVM: selftests: Add helpers to read integer module params
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 19/26] KVM: selftests: Add a helper to query if the PMU module param is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 18/26] KVM: selftests: Expand PMU counters test to verify LLC events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 17/26] KVM: selftests: Add functional test for Intel's fixed PMU counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 16/26] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 15/26] KVM: selftests: Test consistency of CPUID with num of gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 14/26] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 13/26] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 12/26] KVM: selftests: Add pmu.h and lib/pmu.c for common PMU assets
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 11/26] KVM: selftests: Extend {kvm,this}_pmu_has() to support fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 10/26] KVM: selftests: Drop the "name" param from KVM_X86_PMU_FEATURE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 09/26] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 08/26] KVM: x86/pmu: Disallow "fast" RDPMC for architectural Intel PMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 07/26] KVM: x86/pmu: Apply "fast" RDPMC only to Intel PMUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 06/26] KVM: x86/pmu: Don't ignore bits 31:30 for RDPMC index on AMD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 05/26] KVM: x86/pmu: Get eventsel for fixed counters from perf
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 04/26] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 03/26] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 02/26] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 01/26] KVM: x86/pmu: Always treat Fixed counters as available when supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v8 00/26] KVM: x86/pmu: selftests: Fixes and new tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 15/34] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 4/4] KVM: SEV: Use a bitmap module param to decide whether a cache flush is needed during the guest memory reclaim
- From: Jacky Li <jackyli@xxxxxxxxxx>
- [RFC PATCH 3/4] KVM: SEV: Limit the call of WBINVDs based on the event type of mmu notifier
- From: Jacky Li <jackyli@xxxxxxxxxx>
- [RFC PATCH 2/4] KVM: SEV: Plumb mmu_notifier_event into sev function
- From: Jacky Li <jackyli@xxxxxxxxxx>
- [RFC PATCH 1/4] KVM: SEV: Drop wbinvd_on_all_cpus() as kvm mmu notifier would flush the cache
- From: Jacky Li <jackyli@xxxxxxxxxx>
- [RFC PATCH 0/4] KVM: SEV: Limit cache flush operations in sev guest memory reclaim events
- From: Jacky Li <jackyli@xxxxxxxxxx>
- Re: KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [PATCH v1 15/23] KVM: nVMX: Add support for the secondary VM exit controls
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: "Denis V. Lunev" <den@xxxxxxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v6 08/14] KVM: arm64: Enable KVM_CAP_MEMORY_FAULT_INFO
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 14/14] KVM: selftests: Handle memory fault exits in demand_paging_test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 13/14] KVM: selftests: Add memslot_flags parameter to memstress_create_vm()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 11/14] KVM: selftests: Allow many vCPUs and reader threads per UFFD in demand paging test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 12/14] KVM: selftests: Use EPOLL in userfaultfd_util reader threads and signal errors via TEST_ASSERT
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 10/14] KVM: selftests: Report per-vcpu demand paging rate from demand paging test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 06/14] KVM: Add memslot flag to let userspace force an exit on missing hva mappings
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 08/14] KVM: arm64: Enable KVM_CAP_MEMORY_FAULT_INFO
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 09/14] KVM: arm64: Enable KVM_CAP_EXIT_ON_MISSING and annotate an EFAULT from stage-2 fault-handler
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 07/14] KVM: x86: Enable KVM_CAP_EXIT_ON_MISSING and annotate EFAULTs from stage-2 fault handler
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 04/14] KVM: Define and communicate KVM_EXIT_MEMORY_FAULT RWX flags to userspace
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 05/14] KVM: Try using fast GUP to resolve read faults
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 03/14] KVM: Simplify error handling in __gfn_to_pfn_memslot()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 02/14] KVM: Documentation: Add docstrings for __kvm_read/write_guest_page()
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 00/14] Improve KVM + userfaultfd performance via KVM_MEMORY_FAULT_EXITs on stage-2 faults
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [PATCH v6 01/14] KVM: Documentation: Clarify meaning of hva_to_pfn()'s 'atomic' parameter
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/6] RISC-V: KVM: return ENOENT in *_one_reg() when reg is unknown
- From: Daniel Henrique Barboza <dbarboza@xxxxxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH 0/1] KVM: x86/vPMU: Speed up vmexit for AMD Zen 4 CPUs
- From: Konstantin Khorenko <khorenko@xxxxxxxxxxxxx>
- [PATCH 1/1] KVM: x86/vPMU: Check PMU is enabled for vCPU before searching for PMC
- From: Konstantin Khorenko <khorenko@xxxxxxxxxxxxx>
- KVM: x86/vPMU/AMD: Can we detect PMU is off for a VM?
- From: Konstantin Khorenko <khorenko@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 1/3] s390/vfio-ap: unpin pages on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 2/3] s390/vfio-ap: set status response code to 06 on gisc registration failure
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 3/3] s390/vfio-ap: improve reaction to response code 07 from PQAP(AQIC) command
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH v3 0/3] s390/vfio-ap: a couple of corrections to the IRQ enablement function
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v15 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [kvm:guestmemfd 27/48] htmldocs: Documentation/filesystems/api-summary:74: ./fs/anon_inodes.c:167: WARNING: Unexpected indentation.
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 10/19] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 12/19] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PULL 06/15] hw/xen: automatically assign device index to block devices
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PULL 06/15] hw/xen: automatically assign device index to block devices
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: s390/mm: Properly reset no-dat
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v1 1/1] KVM: s390/mm: Properly reset no-dat
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v1 1/1] KVM: s390/mm: Properly reset no-dat
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v15 23/23] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 22/23] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 21/23] x86/virt/tdx: Handle TDX interaction with ACPI S3 and deeper states
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 20/23] x86/kexec(): Reset TDX private memory on platforms with TDX erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 19/23] x86/virt/tdx: Improve readability of module initialization error handling
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 18/23] x86/virt/tdx: Keep TDMRs when module initialization is successful
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 17/23] x86/kexec: Flush cache of TDX private memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 16/23] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 15/23] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 14/23] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 13/23] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 12/23] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 11/23] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 10/23] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 09/23] x86/virt/tdx: Get module global metadata for module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 08/23] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 07/23] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 06/23] x86/virt/tdx: Add SEAMCALL error printing for module initialization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 05/23] x86/virt/tdx: Handle SEAMCALL no entropy error in common code
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 04/23] x86/cpu: Detect TDX partial write machine check erratum
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 03/23] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 02/23] x86/tdx: Define TDX supported page sizes as macros
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 01/23] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v15 00/23] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] KVM: xen: update shared_info and vcpu_info handling
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v7 00/11] KVM: xen: update shared_info and vcpu_info handling
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] RISC-V: KVM: return ENOENT in *_one_reg() when reg is unknown
- From: Andreas Schwab <schwab@xxxxxxx>
- Re: [PATCH v1 07/23] KVM: VMX: Disable intercepting FRED MSRs
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 34/34] KVM: selftests: Add a memory region subtest to validate invalid flags
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 15/23] KVM: nVMX: Add support for the secondary VM exit controls
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 4/7] iommufd: Support attach/replace for SIOV virtual device {dev, pasid}
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 7/7] vfio: Add vfio_register_pasid_iommu_dev()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 19/19] KVM: selftests: Test PMC virtualization with forced emulation
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- [PATCH v3 5/6] target/i386: enumerate VMX nested-exception support
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 6/6] target/i386: Add get/set/migrate support for FRED MSRs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 4/6] target/i386: add support for VMX FRED controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 1/6] target/i386: add support for FRED in CPUID enumeration
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 3/6] target/i386: add the secondary VM exit controls MSR
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 2/6] target/i386: mark CR4.FRED not reserved
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v3 0/6] target/i386: add support for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [RFC 6/7] iommufd/selftest: Add test coverage for SIOV virtual device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v7 15/19] KVM: selftests: Add a helper to query if the PMU module param is enabled
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 14/19] KVM: selftests: Expand PMU counters test to verify LLC events
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 13/19] KVM: selftests: Add functional test for Intel's fixed PMU counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 12/19] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH 09/34] KVM: Add KVM_EXIT_MEMORY_FAULT exit to report faults to userspace
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 10/19] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 09/19] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: "Mi, Dapeng" <dapeng1.mi@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Ankit Agrawal <ankita@xxxxxxxxxx>
- Re: [PATCH 34/34] KVM: selftests: Add a memory region subtest to validate invalid flags
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v7 02/19] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 05/19] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v1 22/23] KVM: selftests: Add a new VM guest mode to run user level code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 16/23] KVM: nVMX: Add FRED VMCS fields
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 23/23] KVM: selftests: Add fred exception tests
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 21/23] KVM: selftests: Run debug_regs test with FRED enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 20/23] KVM: selftests: Add FRED VMCS fields to evmcs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 19/23] KVM: x86: Allow FRED/LKGS/WRMSRNS to be exposed to guests
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 15/23] KVM: nVMX: Add support for the secondary VM exit controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 18/23] KVM: nVMX: Add VMCS FRED states checking
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 17/23] KVM: nVMX: Add support for VMX FRED controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 13/23] KVM: VMX: Handle VMX nested exception for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 12/23] KVM: VMX: Handle FRED event data
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 11/23] KVM: x86: Add kvm_is_fred_enabled()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 06/23] KVM: VMX: Defer enabling FRED MSRs save/load until after set CPUID
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 10/23] KVM: VMX: Add support for FRED context save/restore
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 09/23] KVM: VMX: Switch FRED RSP0 between host and guest
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 14/23] KVM: VMX: Dump FRED context in dump_vmcs()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 08/23] KVM: VMX: Initialize VMCS FRED fields
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 03/23] KVM: VMX: Add support for the secondary VM exit controls
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 07/23] KVM: VMX: Disable intercepting FRED MSRs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 05/23] KVM: VMX: Initialize FRED VM entry/exit controls in vmcs_config
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 04/23] KVM: x86: Mark CR4.FRED as not reserved
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 01/23] KVM: VMX: Cleanup VMX basic information defines and usages
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 02/23] KVM: VMX: Cleanup VMX misc information defines and usages
- From: Xin Li <xin3.li@xxxxxxxxx>
- [PATCH v1 00/23] Enable FRED with KVM VMX
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: [PATCH v5] KVM x86/xen: add an override for PVCLOCK_TSC_STABLE_BIT
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: David Hildenbrand <david@xxxxxxxxxx>
- [kvm:guestmemfd 59/59] arch/s390/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 14/33] KVM: x86: Add VTL to the MMU role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 4/4] KVM: s390: Minor refactor of base/ext facility lists
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 1/4] KVM: s390: vsie: Fix STFLE interpretive execution identification
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [PATCH v3 0/4] KVM: s390: Fix minor bugs in STFLE shadowing
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 21/33] KVM: Pass memory attribute array as a MMU notifier argument
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 27/34] KVM: selftests: Introduce VM "shape" to allow tests to specify the VM type
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [RFC 18/33] KVM: x86: Decouple kvm_get_memory_attributes() from struct kvm's mem_attr_array
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC 25/33] KVM: Introduce a set of new memory attributes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm:guestmemfd 59/59] arch/loongarch/kvm/../../../virt/kvm/kvm_main.c:5517:14: error: 'KVM_TRACE_ENABLE' undeclared; did you mean 'KVM_PV_ENABLE'?
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 01/33] KVM: x86: Decouple lapic.h from hyperv.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: "Liang, Kan" <kan.liang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v7 11/11] KVM: xen: allow vcpu_info content to be 'safely' copied
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] s390/vfio-ap: fix sysfs status attribute for AP queue devices
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC 05/33] KVM: x86: hyper-v: Introduce VTL call/return prologues in hypercall page
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 09/33] KVM: x86: hyper-v: Introduce per-VTL vcpu helpers
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 32/33] KVM: x86: hyper-v: Implement HVCALL_TRANSLATE_VIRTUAL_ADDRESS
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 30/33] KVM: x86: hyper-v: Introduce KVM_REQ_HV_INJECT_INTERCEPT request
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [RFC 32/33] KVM: x86: hyper-v: Implement HVCALL_TRANSLATE_VIRTUAL_ADDRESS
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 30/33] KVM: x86: hyper-v: Introduce KVM_REQ_HV_INJECT_INTERCEPT request
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v12 01/37] x86/cpufeatures: Add the cpu feature bit for WRMSRNS
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 25/33] KVM: Introduce a set of new memory attributes
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 09/33] KVM: x86: hyper-v: Introduce per-VTL vcpu helpers
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 11/33] KVM: x86: hyper-v: Handle GET/SET_VP_REGISTER hcall in user-space
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC 05/33] KVM: x86: hyper-v: Introduce VTL call/return prologues in hypercall page
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
- From: Alexander Graf <graf@xxxxxxxxxx>
- Re: [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Alexander Graf <graf@xxxxxxxxxx>
- [RFC 33/33] Documentation: KVM: Introduce "Emulating Hyper-V VSM with KVM"
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 32/33] KVM: x86: hyper-v: Implement HVCALL_TRANSLATE_VIRTUAL_ADDRESS
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 31/33] KVM: x86: hyper-v: Inject intercept on VTL memory protection fault
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 30/33] KVM: x86: hyper-v: Introduce KVM_REQ_HV_INJECT_INTERCEPT request
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 29/33] KVM: VMX: Save instruction length on EPT violation
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 28/33] x86/hyper-v: Introduce memory intercept message structure
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 27/33] KVM: x86/mmu/hyper-v: Validate memory faults against per-VTL memprots
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 26/33] KVM: x86: hyper-vsm: Allow setting per-VTL memory attributes
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [RFC 25/33] KVM: Introduce a set of new memory attributes
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 24/33] KVM: x86: hyper-v: Introduce KVM VTL device
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 23/33] KVM: Expose memory attribute helper functions unanimously
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 22/33] KVM: Decouple kvm_ioctl_set_mem_attributes() from kvm's mem_attr_array
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 21/33] KVM: Pass memory attribute array as a MMU notifier argument
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 20/33] KVM: x86/mmu: Decouple hugepage_has_attrs() from struct kvm's mem_attr_array
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 19/33] KVM: x86: Decouple kvm_range_has_memory_attributes() from struct kvm's mem_attr_array
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 18/33] KVM: x86: Decouple kvm_get_memory_attributes() from struct kvm's mem_attr_array
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 17/33] KVM: x86/mmu: Allow setting memory attributes if VSM enabled
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 16/33] KVM: x86/mmu: Expose R/W/X flags during memory fault exits
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 15/33] KVM: x86/mmu: Introduce infrastructure to handle non-executable faults
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 13/33] KVM: Allow polling vCPUs for events
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 14/33] KVM: x86: Add VTL to the MMU role
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 12/33] KVM: x86: hyper-v: Handle VSM hcalls in user-space
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 11/33] KVM: x86: hyper-v: Handle GET/SET_VP_REGISTER hcall in user-space
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 10/33] KVM: x86: hyper-v: Introduce KVM_HV_GET_VSM_STATE
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 09/33] KVM: x86: hyper-v: Introduce per-VTL vcpu helpers
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 07/33] KVM: x86: hyper-v: Introduce KVM_CAP_HYPERV_VSM
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 08/33] KVM: x86: Don't use hv_timer if CAP_HYPERV_VSM enabled
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 06/33] KVM: x86: hyper-v: Introduce VTL awareness to Hyper-V's PV-IPIs
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 05/33] KVM: x86: hyper-v: Introduce VTL call/return prologues in hypercall page
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 04/33] KVM: x86: hyper-v: Move hypercall page handling into separate function
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 03/33] KVM: x86: hyper-v: Introduce XMM output support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 02/33] KVM: x86: Introduce KVM_CAP_APIC_ID_GROUPS
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 01/33] KVM: x86: Decouple lapic.h from hyperv.h
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- [RFC 0/33] KVM: x86: hyperv: Introduce VSM support
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH] selftests: kvm/s390x: use vm_create_barebones()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] selftests: kvm/s390x: use vm_create_barebones()
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH] selftests: kvm/s390x: use vm_create_barebones()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/7] iommufd: Add iommufd_device_bind_pasid()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [RFC 3/7] iommufd: Add iommufd_device_bind_pasid()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC 3/7] iommufd: Add iommufd_device_bind_pasid()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC PATCH v1 2/2] vsock/test: SO_RCVLOWAT + deferred credit update test
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 0/2] send credit update during setting SO_RCVLOWAT
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 1/2] virtio/vsock: send credit update during setting SO_RCVLOWAT
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH net v2] virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH v4 4/4] KVM: selftests: Add test cases for LoongArch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v4 0/4] KVM: selftests: Add LoongArch support
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v4 2/4] KVM: selftests: Add core KVM selftests support for LoongArch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v4 1/4] KVM: selftests: Add KVM selftests header files for LoongArch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v4 3/4] KVM: selftests: Add ucall test support for LoongArch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH] target/i386/kvm: call kvm_put_vcpu_events() before kvm_put_nested_state()
- From: Eiichi Tsukata <eiichi.tsukata@xxxxxxxxxxx>
- Re: [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 02/19] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Add logic to detect if ioctl() failed because VM was killed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Drop the single-underscore ioctl() helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: selftests: Detect if KVM bugged the VM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2023.11.08 - No topic, but still a go
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 19/19] KVM: selftests: Test PMC virtualization with forced emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 18/19] KVM: selftests: Move KVM_FEP macro into common library header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 17/19] KVM: selftests: Query module param to detect FEP in MSR filtering test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 16/19] KVM: selftests: Add helpers to read integer module params
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 15/19] KVM: selftests: Add a helper to query if the PMU module param is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 14/19] KVM: selftests: Expand PMU counters test to verify LLC events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 13/19] KVM: selftests: Add functional test for Intel's fixed PMU counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 12/19] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 11/19] KVM: selftests: Test consistency of CPUID with num of gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 10/19] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 09/19] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 08/19] KVM: selftests: Add pmu.h and lib/pmu.c for common PMU assets
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 07/19] KVM: selftests: Extend {kvm,this}_pmu_has() to support fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 06/19] KVM: selftests: Drop the "name" param from KVM_X86_PMU_FEATURE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 05/19] KVM: selftests: Add vcpu_set_cpuid_property() to set properties
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 04/19] KVM: x86/pmu: Setup fixed counters' eventsel during PMU initialization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 03/19] KVM: x86/pmu: Remove KVM's enumeration of Intel's architectural encodings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 02/19] KVM: x86/pmu: Allow programming events that match unsupported arch events
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 01/19] KVM: x86/pmu: Always treat Fixed counters as available when supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v7 00/19] KVM: x86/pmu: selftests: Fixes and new tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: Performance and correctness fixes for CLEAR_DIRTY_LOG
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: Performance and correctness fixes for CLEAR_DIRTY_LOG
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: improve accuracy of Xen timers
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH net 0/4] vsock: fix server prevents clients from reconnecting
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH 1/1] s390/cio: make sch->lock a spinlock (is a pointer)
- From: Vasily Gorbik <gor@xxxxxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH 14/14] KVM: VAC: Bring up VAC as a new module
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 13/14] KVM: x86: VAC: Move all hardware enable/disable code into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 12/14] KVM: x86: Move VMX and SVM support checks into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 11/14] KVM: SVM: Move SVM enable and disable into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 10/14] KVM: VMX: Move VMX enable and disable into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 09/14] KVM: x86: Move shared KVM state into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 08/14] KVM: VMX: Move shared VMX data structures into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 07/14] KVM: SVM: Move shared SVM data structures into VAC
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 06/14] KVM: x86: Move user return msr operations out of KVM
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 05/14] KVM: x86: Refactor hardware enable/disable operations into a new file
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 04/14] KVM: x86: Create stubs for a new VAC module
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 03/14] KVM: x86: Remove unused exports
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 02/14] KVM: x86: Fold x86 vendor modules into the main KVM modules
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 01/14] KVM: x86: Move common module params from SVM/VMX to x86
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- [RFC PATCH 00/14] Support multiple KVM modules on the same host
- From: Anish Ghulati <aghulati@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [RFC PATCH V3 00/26] vfio/pci: Back guest interrupts from Interrupt Message Store (IMS)
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- KVM: X86: Make bus clock frequency for vapic timer (bus lock -> bus clock) (was Re: [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer) configurable
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxxxxxxxx>
- [PATCH 2/2] KVM: X86: Add a capability to configure bus frequency for APIC timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH 1/2] KVM: x86: Make the hardcoded APIC bus frequency vm variable
- From: isaku.yamahata@xxxxxxxxx
- [PATCH 0/2] KVM: X86: Make bus lock frequency for vapic timer configurable
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v3 2/3] KVM: arm64: selftests: Guarantee interrupts are handled
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 02/10] powerpc: properly format non-kernel-doc comments
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 11/14] KVM: nVMX: hyper-v: Introduce nested_vmx_evmptr12() and nested_vmx_is_evmptr12_valid() helpers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 10/14] KVM: x86: Make Hyper-V emulation optional
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 09/14] KVM: selftests: Fix vmxon_pa == vmcs12_pa == -1ull vmx_set_nested_state_test for !eVMCS case
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 08/14] KVM: selftests: Make all Hyper-V tests explicitly dependent on Hyper-V emulation support in KVM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH] KVM: selftests: Fix MWAIT error message when guest assertion fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 07/14] KVM: x86: hyper-v: Introduce kvm_hv_nested_transtion_tlb_flush() helper
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 02/14] KVM: x86: hyper-v: Move Hyper-V partition assist page out of Hyper-V emulation context
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 6/9] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/9] KVM: x86: SVM: Pass through shadow stack MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 19/25] KVM: VMX: Emulate read and write to CET MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: A question about how the KVM emulates the effect of guest MTRRs on AMD platforms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 18/25] KVM: x86: Use KVM-governed feature framework to track "SHSTK/IBT enabled"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 06/25] x86/fpu/xstate: Opt-in kernel dynamic bits when calculate guest xstate size
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v6 03/20] KVM: x86/pmu: Don't enumerate arch events KVM doesn't support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: s390: cpu model: Use proper define for facility mask size
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: s390: Minor refactor of base/ext facility lists
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: s390: vsie: Fix length of facility list shadowed
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v17 000/116] KVM TDX basic feature support
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: James Houghton <jthoughton@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH v17 075/116] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 068/116] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 073/116] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 067/116] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 071/116] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 080/116] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 076/116] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 061/116] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 078/116] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 083/116] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 085/116] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 079/116] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 077/116] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 066/116] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 082/116] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 084/116] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 102/116] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 088/116] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 07/16] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 081/116] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 095/116] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 090/116] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 086/116] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 103/116] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 02/16] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 096/116] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 074/116] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 03/16] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 089/116] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 101/116] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 04/16] KVM: TDX: Pass size to tdx_measure_page()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 08/16] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 00/16] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 097/116] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 087/116] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 099/116] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 093/116] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 091/116] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 094/116] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 106/116] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 06/16] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 098/116] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 100/116] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 01/16] KVM: TDP_MMU: Go to next level if smaller private mapping exists
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 05/16] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 065/116] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 16/16] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 092/116] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 13/16] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 112/116] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 12/16] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 15/16] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 115/116] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 114/116] RFC: KVM: x86: Add x86 callback to check cpuid
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 116/116] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 113/116] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 11/16] KVM: x86/tdp_mmu: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 14/16] KVM: x86/tdp_mmu: TDX: Implement merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 09/16] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v6 10/16] KVM: x86/tdp_mmu: Allocate private page table for large page split
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 107/116] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 111/116] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 110/116] KVM: TDX: Inhibit APICv for TDX guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 109/116] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 108/116] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 104/116] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 105/116] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 059/116] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 070/116] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 072/116] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 069/116] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 056/116] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 052/116] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 064/116] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 050/116] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 048/116] KVM: x86/mmu: TDX: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 063/116] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 043/116] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 037/116] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 062/116] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 035/116] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 046/116] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 060/116] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 058/116] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 057/116] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 055/116] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 054/116] KVM: TDX: Require TDP MMU and mmio caching for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 051/116] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 053/116] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 047/116] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 049/116] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 042/116] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 044/116] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 045/116] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 041/116] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 039/116] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 040/116] KVM: x86/mmu: Assume guest MMIOs are shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 036/116] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 038/116] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 034/116] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 032/116] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 033/116] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 031/116] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 030/116] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 029/116] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 028/116] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 026/116] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 027/116] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 025/116] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 023/116] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 022/116] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 024/116] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 020/116] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 021/116] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 019/116] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 018/116] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 017/116] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 016/116] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 011/116] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 015/116] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 014/116] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 012/116] KVM: TDX: Retry SEAMCALL on the lack of entropy error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 013/116] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 006/116] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 009/116] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 010/116] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 005/116] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 008/116] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 007/116] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 003/116] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 001/116] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 004/116] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 002/116] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v17 000/116] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH 33/34] KVM: selftests: Test KVM exit behavior for private memory/access
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: RFC: A KVM-specific alternative to UserfaultFD
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/1] arm64: microbench: Move the read of the count register and the ISB operation out of the while loop
- From: Zenghui Yu <yuzenghui@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PULL 00/15] xenfv.for-upstream queue
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: pmu-overflow-interrupt: Increase count values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH 32/34] KVM: selftests: Add basic selftest for guest_memfd()
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH 30/34] KVM: selftests: Add KVM_SET_USER_MEMORY_REGION2 helper
- From: Fuad Tabba <tabba@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]