Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH v13 29/30] LoongArch: KVM: Supplement kvm document about LoongArch-specific part
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH v3 02/11] KVM: x86/mmu: Use KVM honors guest MTRRs helper in kvm_tdp_page_fault()
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v3 01/11] KVM: x86/mmu: helpers to return if KVM honors guest MTRRs
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v3 00/11] KVM: x86/mmu: refine memtype related mmu zap
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v13 30/30] LoongArch: KVM: Add maintainers for LoongArch KVM
- From: zhaotianrui <zhaotianrui@xxxxxxxxxxx>
- RE: [PATCH v2 00/11] iommufd: Add nesting infrastructure
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v13 29/30] LoongArch: KVM: Supplement kvm document about LoongArch-specific part
- From: zhaotianrui <zhaotianrui@xxxxxxxxxxx>
- RE: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 1/3] vfio/pci: Cleanup Kconfig
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 09/21] KVM:x86: Load guest FPU state when accessing xsaves-managed MSRs
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v3 07/21] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v9 6/6] KVM: x86: Expose LAM feature to userspace VMM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/21] Enable CET Virtualization
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3] runtime: Allow to specify properties for accelerator
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v3 00/21] Enable CET Virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 10/21] KVM:x86: Add #CP support in guest exception classification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Remove KVM MMU write lock when accessing indirect_shadow_pages
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v3 09/21] KVM:x86: Load guest FPU state when accessing xsaves-managed MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 07/21] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/21] Enable CET Virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] vfio/pci: Propagate ACPI notifications to user-space via eventfd
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v11 15/20] x86/virt/tdx: Configure global KeyID on all packages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 vfio 4/7] vfio/pds: Add VFIO live migration support
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH v10 vfio 3/7] vfio/pds: register with the pds_core PF
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH v3] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH part-5 00/22] VMX emulation
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v7 2/8] PCI/VGA: Deal only with VGA class devices
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- RE: [PATCH v10 vfio 4/7] vfio/pds: Add VFIO live migration support
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- RE: [PATCH v10 vfio 3/7] vfio/pds: register with the pds_core PF
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- [RFC PATCH 3/6] KVM: x86/mmu: Pass round full 64-bit error code for the KVM page fault
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 5/6] KVM: Add flags to struct kvm_gfn_range
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 2/6] KVM: selftests: Fix guest_memfd()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 4/6] KVM: x86: Introduce PFERR_GUEST_ENC_MASK to indicate fault is private
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 6/6] KVM: x86: Add is_vm_type_supported callback
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 1/6] KVM: selftests: Fix test_add_overlapping_private_memory_regions()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH 0/6] KVM: guest memory: Misc enhacnement
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v3] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 09/10] kvm/x86: add kvm_arch_test_clear_young()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH part-5 00/22] VMX emulation
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [PATCH mm-unstable v2 01/10] mm/kvm: add mmu_notifier_ops->test_clear_young()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: arm64: Add support for FEAT_TLBIRANGE
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 08/10] kvm/x86: move tdp_mmu_enabled and shadow_accessed_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- linux-kvm.org cert expired
- From: Iggy Jackson <notiggy@xxxxxxxxx>
- Re: [RFC PATCH v2] x86/sev-es: Include XSS value in GHCB CPUID request
- From: John Allen <john.allen@xxxxxxx>
- Re: [RFC PATCH v2] x86/sev-es: Include XSS value in GHCB CPUID request
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2] x86/sev-es: Include XSS value in GHCB CPUID request
- From: John Allen <john.allen@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 06/16] x86/run_in_user: Change type of code label
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: Introduce KVM_CAP_NOWAIT_ON_FAULT without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] configure: efi: Link correct run script
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [kvm-unit-tests PATCH 2/3] arm/efi/run: Add Fedora's path to QEMU_EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arch-run: Extend timeout when booting with UEFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH v4 08/16] KVM: x86: Annotate -EFAULTs from kvm_handle_error_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Update the version number of SDM in comments
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: arm64: Add support for FEAT_TLBIRANGE
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3] runtime: Allow to specify properties for accelerator
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Fix hVHE init on CPUs where HCR_EL2.E2H is not RES1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/6] s390x: sie: switch to home space mode before entering SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/6] s390x: add function to set DAT mode for all interrupts
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [Bug 217558] In KVM guest with VF of X710 NIC passthrough, the mac address of VF is inconsistent with it in host
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v3] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v2] x86/sev-es: Include XSS value in GHCB CPUID request
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5 4/7] s390/uvdevice: Add 'List Secrets' UVC
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [PATCH v5 3/7] s390/uvdevice: Add 'Add Secret' UVC
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [PATCH v5 7/7] s390/uv: Update query for secret-UVCs
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [PATCH v5 2/7] s390/uvdevice: Add info IOCTL
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [PATCH v5 6/7] s390/uv: replace scnprintf with sysfs_emit
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [PATCH v5 1/7] s390/uv: Always export uv_info
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [PATCH v5 0/7] s390/uvdevice: Expose secret UVCs
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [PATCH v5 5/7] s390/uvdevice: Add 'Lock Secret Store' UVC
- From: Steffen Eiden <seiden@xxxxxxxxxxxxx>
- [Bug 217558] In KVM guest with VF of X710 NIC passthrough, the mac address of VF is inconsistent with it in host
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 217558] In KVM guest with VF of X710 NIC passthrough, the mac address of VF is inconsistent with it in host
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 217558] New: In KVM guest with VF of X710 NIC passthrough, the mac address of VF is inconsistent with it in host
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v13 05/30] LoongArch: KVM: Add vcpu related header files
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v13 29/30] LoongArch: KVM: Supplement kvm document about LoongArch-specific part
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v13 30/30] LoongArch: KVM: Add maintainers for LoongArch KVM
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Update the version number of SDM in comments
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH kvmtool 12/21] Add helpers to pause the VM from vCPU thread
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: arm64: Add support for FEAT_TLBIRANGE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v11 15/20] x86/virt/tdx: Configure global KeyID on all packages
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [kvm-unit-tests v4 00/12] powerpc: updates, P10, PNV support
- From: Joel Stanley <joel@xxxxxxxxx>
- [PATCH] KVM: x86: Update the version number of SDM in comments
- From: Jun Miao <jun.miao@xxxxxxxxx>
- Re: [PATCH v4 04/34] pgtable: Create struct ptdesc
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: [PATCH v11 12/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- [PATCH v3 10/10] RISC-V: KVM: Expose IMSIC registers as attributes of AIA irqchip
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 09/10] RISC-V: KVM: Add in-kernel virtualization of AIA IMSIC
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 06/10] RISC-V: KVM: Implement device interface for AIA irqchip
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 08/10] RISC-V: KVM: Expose APLIC registers as attributes of AIA irqchip
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 07/10] RISC-V: KVM: Add in-kernel emulation of AIA APLIC
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 02/10] RISC-V: KVM: Add IMSIC related defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 01/10] RISC-V: KVM: Implement guest external interrupt line management
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 05/10] RISC-V: KVM: Skeletal in-kernel AIA irqchip support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 00/10] RISC-V KVM in-kernel AIA irqchip
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 03/10] RISC-V: KVM: Add APLIC related defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v3 04/10] RISC-V: KVM: Set kvm_riscv_aia_nr_hgei to zero
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH kernel 0/9 v6] KVM: SEV: Enable AMD SEV-ES DebugSwap
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v7 7/8] drm/amdgpu: Implement the is_boot_device callback function
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- [PATCH kernel 9/9] KVM: SVM: Don't try to pointlessly single-step SEV-ES guests for NMI window
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 8/9] KVM: SVM: Don't defer NMI unblocking until next exit for SEV-ES guests
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 7/9] KVM: SEV-ES: Eliminate #DB intercept when DebugSwap enabled
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 6/9] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 5/9] KVM: SVM/SEV/SEV-ES: Rework intercepts
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 4/9] KVM: SEV-ES: explicitly disable debug
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 3/9] KVM: SVM: Rewrite sev_es_prepare_switch_to_guest()'s comment about swap types
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 2/9] KVM: SEV: Move SEV's GP_VECTOR intercept setup to SEV
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 1/9] KVM: SEV: move set_dr_intercepts/clr_dr_intercepts from the header
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel 0/9] KVM: SEV: Enable AMD SEV-ES DebugSwap
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 07/10] RISC-V: KVM: Add in-kernel emulation of AIA APLIC
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH v2 06/10] RISC-V: KVM: Implement device interface for AIA irqchip
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3] runtime: Allow to specify properties for accelerator
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH RESEND v2] KVM: move KVM_CAP_DEVICE_CTRL to the generic check
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH v3] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v2 06/10] RISC-V: KVM: Implement device interface for AIA irqchip
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v2 07/10] RISC-V: KVM: Add in-kernel emulation of AIA APLIC
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- RE: [RFC PATCH part-5 00/22] VMX emulation
- From: "Chen, Jason CJ" <jason.cj.chen@xxxxxxxxx>
- RE: [PATCH v4 09/16] KVM: Introduce KVM_CAP_NOWAIT_ON_FAULT without implementation
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH RESEND v2] KVM: move KVM_CAP_DEVICE_CTRL to the generic check
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [kvm-unit-tests v4 00/12] powerpc: updates, P10, PNV support
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: [PATCH v4 08/16] KVM: x86: Annotate -EFAULTs from kvm_handle_error_pfn()
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- Re: [PATCH v4 04/16] KVM: Add docstrings to __kvm_write_guest_page() and __kvm_read_guest_page()
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: arm64: Add support for FEAT_TLBIRANGE
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Expired HTTPS certificate for www.linux-kvm.org
- From: Kenneth Kienle <deadmagpiesoftware@xxxxxxxxx>
- [kvm-unit-tests PATCH] arm64: timer: ignore ISTATUS with disabled timer
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 00/16] x86: cleanups, fixes and new tests
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v10 vfio 2/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH v10 vfio 2/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: Introduce KVM_CAP_NOWAIT_ON_FAULT without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 27/34] nios2: Convert __pte_free_tlb() to use ptdescs
- From: Dinh Nguyen <dinguyen@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: Introduce KVM_CAP_NOWAIT_ON_FAULT without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 06/16] x86/run_in_user: Change type of code label
- From: Mathias Krause <minipli@xxxxxxxxxxxxxx>
- Re: [PATCH v4 10/16] KVM: x86: Implement KVM_CAP_NOWAIT_ON_FAULT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 vfio 0/7] pds_vfio driver
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 09/16] KVM: Introduce KVM_CAP_NOWAIT_ON_FAULT without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 08/16] KVM: x86: Annotate -EFAULTs from kvm_handle_error_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 1/3] vfio/pci: Cleanup Kconfig
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v3 3/3] vfio/fsl: Create Kconfig sub-menu
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v3 2/3] vfio/platform: Cleanup Kconfig
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v3 0/3] vfio: Cleanup Kconfigs
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 07/16] KVM: Simplify error handling in __gfn_to_pfn_memslot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 06/16] KVM: Annotate -EFAULTs from kvm_vcpu_read_guest_page()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Fwd: [PATCH] KVM: x86: remove unneeded variable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 05/16] KVM: Annotate -EFAULTs from kvm_vcpu_write_guest_page()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 03/16] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 01/16] KVM: Allow hva_pfn_fast() to resolve read-only faults.
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH RFC v9 04/51] KVM: x86: Determine shared/private faults using a configurable mask
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v4 21/34] arm64: Convert various functions to use ptdescs
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: (subset) [PATCH v3 00/17] KVM: arm64: Allow using VHE in the nVHE hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH kvmtool 00/21] arm64: Handle PSCI calls in userspace
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH] KVM: arm64: Fix hVHE init on CPUs where HCR_EL2.E2H is not RES1
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: (subset) [PATCH v3 00/17] KVM: arm64: Allow using VHE in the nVHE hypervisor
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4 34/34] mm: Remove pgtable_{pmd, pte}_page_{ctor, dtor}() wrappers
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 33/34] um: Convert {pmd, pte}_free_tlb() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 32/34] sparc: Convert pgtable_pte_page_{ctor, dtor}() to ptdesc equivalents
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 31/34] sparc64: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 29/34] riscv: Convert alloc_{pmd, pte}_late() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 28/34] openrisc: Convert __pte_free_tlb() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 27/34] nios2: Convert __pte_free_tlb() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 26/34] mips: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 25/34] m68k: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 24/34] loongarch: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v10 08/59] KVM: arm64: Add missing HCR_EL2 trap bits
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v10 07/59] arm64: Add AT operation encodings
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH v4 23/34] hexagon: Convert __pte_free_tlb() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 22/34] csky: Convert __pte_free_tlb() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 21/34] arm64: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 20/34] arm: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 19/34] pgalloc: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 03/16] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 18/34] mm: Remove page table members from struct page
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 17/34] s390: Convert various pgalloc functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 01/16] KVM: Allow hva_pfn_fast() to resolve read-only faults.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 16/34] s390: Convert various gmap functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 15/34] x86: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH RFC v9 03/51] KVM: x86: Use full 64-bit error code for kvm_mmu_do_page_fault
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v4 14/34] powerpc: Convert various functions to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 13/34] mm: Create ptdesc equivalents for pgtable_{pte,pmd}_page_{ctor,dtor}
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 12/34] mm: Convert ptlock_free() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 11/34] mm: Convert pmd_ptlock_free() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 10/34] mm: Convert ptlock_init() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 09/34] mm: Convert pmd_ptlock_init() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 08/34] mm: Convert ptlock_ptr() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 07/34] mm: Convert ptlock_alloc() to use ptdescs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 06/34] mm: Convert pmd_pgtable_page() to pmd_ptdesc()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 05/34] mm: add utility functions for ptdesc
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 04/34] pgtable: Create struct ptdesc
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 03/34] s390: Use pt_frag_refcount for pagetables
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Luiz Capitulino <luizcap@xxxxxxxxxx>
- Re: [PATCH v4 02/34] s390: Use _pt_s390_gaddr for gmap address tracking
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- RE: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 1/6] kvm: determine memory type from VMA
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: "Gao,Shiyuan" <gaoshiyuan@xxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Nikolay Borisov <nik.borisov@xxxxxxxx>
- Re: [PATCH RESEND v2] KVM: move KVM_CAP_DEVICE_CTRL to the generic check
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: arm64: Add support for FEAT_TLBIRANGE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 6/9] vfio: Mark cdev usage in vfio_device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kvmtool 00/21] arm64: Handle PSCI calls in userspace
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "kirill.shutemov@xxxxxxxxxxxxxxx" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 2/8] PCI/VGA: Deal only with VGA class devices
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- RE: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "kirill.shutemov@xxxxxxxxxxxxxxx" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v14 111/113] RFC: KVM: x86, TDX: Add check for setting CPUID
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 27/34] nios2: Convert __pte_free_tlb() to use ptdescs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- RE: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v3 03/17] arm64: Turn kaslr_feature_override into a generic SW feature override
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- RE: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v7 6/9] vfio: Mark cdev usage in vfio_device
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [RFC PATCH v4 00/17] vsock: MSG_ZEROCOPY flag support
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- RE: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Fwd: [PATCH] KVM: x86: remove unneeded variable
- From: baomingtong001@xxxxxxxxxx
- RE: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v3 00/28] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: "Ma, Yongwei" <yongwei.ma@xxxxxxxxx>
- Re: [kvm-unit-tests v4 00/12] powerpc: updates, P10, PNV support
- From: Joel Stanley <joel@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: WARN, but continue, if misc_cg_set_capacity() fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: selftests: Add new CFLAGS to generate dependency files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Update comments about MSR lists exposed to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/2] kvm_io_bus_unregister_dev cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 27/34] nios2: Convert __pte_free_tlb() to use ptdescs
- From: Dinh Nguyen <dinguyen@xxxxxxxxxx>
- Re: [PATCH v2] KVM: MAINTAINERS: note that linux-kvm.org isn't current
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 00/16] x86: cleanups, fixes and new tests
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RESEND v2] KVM: move KVM_CAP_DEVICE_CTRL to the generic check
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] KVM: selftests: Expand x86's sregs test to cover illegal CR0 values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: VMX: Don't fudge CR0 and CR4 for restricted L2 guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Disallow KVM_SET_SREGS{2} if incoming CR0 is invalid
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: CR0 vs. KVM_SET_SREGS and !URG
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH part-5 00/22] VMX emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: VMX: Retry APIC-access page reload if invalidation is in-progress
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [ANNOUNCE / CFP] KVM Microconference at LPC 2023
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 9/9] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 6/9] vfio: Mark cdev usage in vfio_device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2023.06.14 - No Topic (Office Hours)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [ANNOUNCE] PUCK Notes - 2023.06.07 - pKVM on x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 24/24] docs: vfio: Add vfio device cdev description
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v14 111/113] RFC: KVM: x86, TDX: Add check for setting CPUID
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Update comments about MSR lists exposed to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v12 24/24] docs: vfio: Add vfio device cdev description
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH kvmtool 14/21] aarch64: Add skeleton implementation for PSCI
- From: Joey Gouly <joey.gouly@xxxxxxx>
- Re: [PATCH v12 24/24] docs: vfio: Add vfio device cdev description
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v12 18/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH v12 24/24] docs: vfio: Add vfio device cdev description
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH v12 18/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v12 18/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v12 18/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v12 24/24] docs: vfio: Add vfio device cdev description
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH -next v21 09/27] riscv: Introduce struct/helpers to save/restore per-task Vector state
- From: Andy Chiu <andy.chiu@xxxxxxxxxx>
- Re: [PATCH v12 18/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH v2 1/3] i386/cpuid: Decrease cpuid_i when skipping CPUID leaf 1F
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 2/3] i386/cpuid: Remove subleaf constraint on CPUID leaf 1F
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 0/3] i386: Minor fixes of building CPUIDs
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2 3/3] i386/cpuid: Move leaf 7 to correct group
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v13 20/30] LoongArch: KVM: Implement handle csr excption
- From: "bibo, mao" <bibo.mao@xxxxxxxxx>
- Re: [PATCH v13 10/30] LoongArch: KVM: Implement vcpu ENABLE_CAP ioctl interface
- From: "bibo, mao" <bibo.mao@xxxxxxxxx>
- Re: [PATCH v13 08/30] LoongArch: KVM: Implement vcpu handle exit interface
- From: "bibo, mao" <bibo.mao@xxxxxxxxx>
- Re: [PATCH v13 07/30] LoongArch: KVM: Implement vcpu run interface
- From: "bibo, mao" <bibo.mao@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v13 05/30] LoongArch: KVM: Add vcpu related header files
- From: "bibo, mao" <bibo.mao@xxxxxxxxx>
- RE: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v13 03/30] LoongArch: KVM: Implement kvm hardware enable, disable interface
- From: "bibo, mao" <bibo.mao@xxxxxxxxx>
- RE: [PATCH v12 24/24] docs: vfio: Add vfio device cdev description
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v1] KVM: s390: selftests: CMMA: don't run if CMMA not supported
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v7 7/9] vfio: Add helper to search vfio_device in a dev_set
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 5/9] iommufd: Add helper to retrieve iommufd_ctx and devid
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 8/9] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 3/9] iommufd: Reserve all negative IDs in the iommufd xarray
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v7 4/9] iommufd: Add iommufd_ctx_has_group()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "kirill.shutemov@xxxxxxxxxxxxxxx" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "kirill.shutemov@xxxxxxxxxxxxxxx" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/17] KVM: arm64: Key use of VHE instructions in nVHE code off ARM64_KVM_HVHE
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- RE: [PATCH v12 20/24] vfio: Only check group->type for noiommu test
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 02/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v4 25/34] m68k: Convert various functions to use ptdescs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH RFC v9 48/51] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- RE: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v12 18/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v12 06/24] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 1/2] iommu: Prevent RESV_DIRECT devices from blocking domains
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 7/8] drm/amdgpu: Implement the is_boot_device callback function
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 6/8] PCI/VGA: Introduce is_boot_device function callback to vga_client_register
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 8/8] drm/radeon: Implement the is_boot_device callback function
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 5/8] video/aperture: Add a helper to detect if an aperture contains firmware FB
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 1/8] PCI/VGA: Use unsigned type for the io_state variable
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 3/8] PCI/VGA: Tidy up the code and comment format
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 4/8] PCI/VGA: Replace full MIT license text with SPDX identifier
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 2/8] PCI/VGA: Deal only with VGA class devices
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 0/8] PCI/VGA: Introduce is_boot_device function callback to vga_client_register
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v7 4/8] PCI/VGA: Replace full MIT license text with SPDX identifier
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- [PATCH v7 1/8] PCI/VGA: Use unsigned type for the io_state variable
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- [PATCH v7 3/8] PCI/VGA: Tidy up the code and comment format
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- [PATCH v7 2/8] PCI/VGA: Deal only with VGA class devices
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- [PATCH v7 0/8] PCI/VGA: Introduce is_boot_device function callback to vga_client_register
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [PATCH] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 06/16] x86/run_in_user: Change type of code label
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in kvm_arch_vcpu_ioctl_run (5)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 19/20] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [syzbot] [kvm?] WARNING in kvm_arch_vcpu_ioctl_run (5)
- From: syzbot <syzbot+5feef0b9ee9c8e9e5689@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v12 24/24] docs: vfio: Add vfio device cdev description
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 22/24] vfio: Remove vfio_device_is_noiommu()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 21/24] vfio: Determine noiommu device in __vfio_register_dev()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 20/24] vfio: Only check group->type for noiommu test
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 18/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH v12 06/24] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v12 07/24] vfio: Block device access via device fd until device is opened
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 06/10] RISC-V: KVM: Implement device interface for AIA irqchip
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- [PATCH v4 26/34] mips: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 18/34] mm: Remove page table members from struct page
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 14/34] powerpc: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 17/34] s390: Convert various pgalloc functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 22/34] csky: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 32/34] sparc: Convert pgtable_pte_page_{ctor, dtor}() to ptdesc equivalents
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 23/34] hexagon: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 31/34] sparc64: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 28/34] openrisc: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 24/34] loongarch: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 34/34] mm: Remove pgtable_{pmd, pte}_page_{ctor, dtor}() wrappers
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 10/34] mm: Convert ptlock_init() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 19/34] pgalloc: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 33/34] um: Convert {pmd, pte}_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 20/34] arm: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 21/34] arm64: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 27/34] nios2: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 15/34] x86: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 29/34] riscv: Convert alloc_{pmd, pte}_late() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 25/34] m68k: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 16/34] s390: Convert various gmap functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 13/34] mm: Create ptdesc equivalents for pgtable_{pte,pmd}_page_{ctor,dtor}
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 12/34] mm: Convert ptlock_free() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 11/34] mm: Convert pmd_ptlock_free() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 09/34] mm: Convert pmd_ptlock_init() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 08/34] mm: Convert ptlock_ptr() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 03/34] s390: Use pt_frag_refcount for pagetables
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 06/34] mm: Convert pmd_pgtable_page() to pmd_ptdesc()
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 05/34] mm: add utility functions for ptdesc
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 04/34] pgtable: Create struct ptdesc
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 07/34] mm: Convert ptlock_alloc() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 02/34] s390: Use _pt_s390_gaddr for gmap address tracking
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 00/34] Split ptdesc from struct page
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- Re: [PATCH] perf/x86/intel: Save/restore cpuc->active_pebs_data_cfg when using guest PEBS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 03/17] vsock/virtio: support to send non-linear skb
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [RFC PATCH v4 02/17] vhost/vsock: read data from non-linear skb
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v4 01/17] vsock/virtio: read data from non-linear skb
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- [PATCH v6 0/8] PCI/VGA: introduce is_boot_device function callback to vga_client_register
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- [PATCH v6 4/8] PCI/VGA: Replace full MIT license text with SPDX identifier
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v6 3/8] PCI/VGA: Tidy up the code and comment format
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v6 2/8] PCI/VGA: Deal only with VGA class devices
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v6 1/8] PCI/VGA: Use unsigned type for the io_state variable
- From: Sui Jingfeng <15330273260@xxxxxx>
- [PATCH v6 0/8] PCI/VGA: introduce is_boot_device function callback to vga_client_register
- From: Sui Jingfeng <15330273260@xxxxxx>
- Re: [PATCH v3 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 16/17] arm64: Allow arm64_sw.hvhe on command line
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 07/17] arm64: Use CPACR_EL1 format to set CPTR_EL2 when E2H is set
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 06/17] arm64: Allow EL1 physical timer access when running VHE
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH v4 00/17] vsock: MSG_ZEROCOPY flag support
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH v3 03/17] arm64: Turn kaslr_feature_override into a generic SW feature override
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH RFC v9 29/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH RFC v9 14/51] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 02/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH RFC v9 13/51] x86/fault: Handle RMP page faults for user addresses
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC v9 12/51] x86/fault: Report RMP page faults for kernel addresses
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC v9 11/51] x86/traps: Define RMP violation #PF error code
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC v9 10/51] x86/fault: Add helper for dumping RMP entries
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC v9 09/51] x86/sev: Add RMP entry lookup helpers
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH RFC v9 08/51] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC v9 07/51] x86/sev: Add the host SEV-SNP initialization support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH -next v21 09/27] riscv: Introduce struct/helpers to save/restore per-task Vector state
- From: Rémi Denis-Courmont <remi@xxxxxxxxxx>
- Re: [PATCH] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "kirill.shutemov@xxxxxxxxxxxxxxx" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 19/20] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v2] runtime: Allow to specify properties for accelerator
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "kirill.shutemov@xxxxxxxxxxxxxxx" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] runtime: Allow to specify properties for accelerator
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] runtime: Allow to specify properties for accelerator
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH v2] runtime: Allow to specify properties for accelerator
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v11 07/20] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] RISC-V: KVM: Allow Svnapot extension for Guest/VM
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 06/20] x86/virt/tdx: Handle SEAMCALL running out of entropy error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 00/20] TDX host kernel support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH RFC v9 02/51] KVM: x86: Add gmem hook for invalidating private memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH RFC net-next v4 7/8] vsock: Add lockless sendmsg() support
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH RFC net-next v4 4/8] vsock: make vsock bind reusable
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH v3 09/10] KVM: riscv: selftests: Skip some registers set operation
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v3 10/10] KVM: riscv: selftests: Add get-reg-list test
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- [Bug 217516] FAIL: TSC reference precision test when do hyperv_clock test of kvm unit test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v3 10/10] KVM: riscv: selftests: Add get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 09/10] KVM: riscv: selftests: Skip some registers set operation
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v9 05/51] x86/coco: move CONFIG_HAS_CC_PLATFORM check down into coco/Makefile
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Snapshot host's MSR_IA32_ARCH_CAPABILITIES
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] runtime: Allow to specify properties for accelerator
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH 1/2] iommu: Prevent RESV_DIRECT devices from blocking domains
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- Re: [PATCH v11 19/20] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: "kirill.shutemov@xxxxxxxxxxxxxxx" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "kirill.shutemov@xxxxxxxxxxxxxxx" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v20 09/21] machine: adding s390 topology to query-cpu-fast
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 23/32] arm64: Add a setup sequence for systems that boot through EFI
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v4 10/11] x86: AMD SEV-ES: Handle IOIO #VC
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v4 11/11] x86: AMD SEV-ES: Handle string IO for IOIO #VC
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 08/11] x86: AMD SEV-ES: Handle CPUID #VC
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 01/11] x86: AMD SEV-ES: Setup #VC exception handler for AMD SEV-ES
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 02/11] x86: Move svm.h to lib/x86/
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 09/11] x86: AMD SEV-ES: Handle MSR #VC
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 03/11] lib: Define unlikely()/likely() macros in libcflat.h
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 04/11] lib: x86: Import insn decoder from Linux
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 07/11] lib/x86: Move xsave helpers to lib/
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 05/11] x86: AMD SEV-ES: Pull related GHCB definitions and helpers from Linux
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 00/11] Add #VC exception handling for AMD SEV-ES
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- [PATCH v4 06/11] x86: AMD SEV-ES: Prepare for #VC processing
- From: Vasant Karasulli <vkarasulli@xxxxxxx>
- Re: [PATCH v2] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 10/10] RISC-V: KVM: Expose IMSIC registers as attributes of AIA irqchip
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 09/10] RISC-V: KVM: Add in-kernel virtualization of AIA IMSIC
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 07/10] RISC-V: KVM: Add in-kernel emulation of AIA APLIC
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 08/10] RISC-V: KVM: Expose APLIC registers as attributes of AIA irqchip
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 06/10] RISC-V: KVM: Implement device interface for AIA irqchip
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 05/10] RISC-V: KVM: Skeletal in-kernel AIA irqchip support
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 04/10] RISC-V: KVM: Set kvm_riscv_aia_nr_hgei to zero
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 03/10] RISC-V: KVM: Add APLIC related defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 02/10] RISC-V: KVM: Add IMSIC related defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 01/10] RISC-V: KVM: Implement guest external interrupt line management
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH v2 00/10] RISC-V KVM in-kernel AIA irqchip
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] runtime: Allow to specify properties for accelerator
- From: Gavin Shan <gshan@xxxxxxxxxx>
- [PATCH RFC v9 06/51] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 08/51] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 07/51] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 05/51] x86/coco: move CONFIG_HAS_CC_PLATFORM check down into coco/Makefile
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 49/51] x86/sev: Add KVM commands for per-instance certs
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 50/51] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 04/51] KVM: x86: Determine shared/private faults using a configurable mask
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 51/51] crypto: ccp: Add debug support for decrypting pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 48/51] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 46/51] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 47/51] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 44/51] KVM: SEV: Implement gmem hook for initializing private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 43/51] KVM: SEV: Configure MMU to check for private fault flags
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 45/51] KVM: SEV: Implement gmem hook for invalidating private pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 03/51] KVM: x86: Use full 64-bit error code for kvm_mmu_do_page_fault
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 41/51] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 42/51] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 40/51] KVM: SVM: Add support to handle RMP nested page faults
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 39/51] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 38/51] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 37/51] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 35/51] KVM: SVM: Add KVM_EXIT_VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 36/51] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 34/51] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 33/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 32/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 31/51] KVM: Split out memory attribute xarray updates to helper function
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 02/51] KVM: x86: Add gmem hook for invalidating private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 30/51] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 29/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 27/51] KVM: SVM: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 28/51] KVM: SVM: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 26/51] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 25/51] KVM: SVM: Add GHCB handling for Hypervisor Feature Support requests
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 24/51] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 22/51] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 20/51] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 21/51] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 23/51] KVM: SEV: Select CONFIG_KVM_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 01/51] KVM: x86: Add gmem hook for initializing private memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 18/51] crypto: ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 19/51] x86/sev: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 17/51] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 15/51] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 16/51] crypto: ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 14/51] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 13/51] x86/fault: Handle RMP page faults for user addresses
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 11/51] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 00/51] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 09/51] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 12/51] x86/fault: Report RMP page faults for kernel addresses
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v9 10/51] x86/fault: Add helper for dumping RMP entries
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v11 20/20] Documentation/x86: Add documentation for TDX host support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 19/20] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH 4/4] Documentation: KVM: make corrections to vcpu-requests.rst
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 3/4] Documentation: KVM: make corrections to ppc-pv.rst
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 2/4] Documentation: KVM: make corrections to locking.rst
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 1/4] Documentation: KVM: make corrections to halt-polling.rst
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 0/4] Documentation: KVM: multiple editing corrections
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 10/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 12/20] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 11/20] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 10/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 08/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 08/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH RFC net-next v4 8/8] tests: add vsock dgram tests
- From: Arseniy Krasnov <oxffffaa@xxxxxxxxx>
- Re: [PATCH RFC net-next v4 6/8] virtio/vsock: support dgrams
- From: Arseniy Krasnov <oxffffaa@xxxxxxxxx>
- Re: [PATCH RFC net-next v4 1/8] vsock/dgram: generalize recvmsg and drop transport->dgram_dequeue
- From: Arseniy Krasnov <oxffffaa@xxxxxxxxx>
- Re: [PATCH v10 00/59] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
- From: Eric Auger <eauger@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: PMU: Disallow vPMU on non-uniform PMUVer systems
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: PMU: Disallow vPMU on non-uniform PMUVer systems
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: PMU: Introduce pmu_v3_is_supported() helper
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/1] KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 1/1] KVM: arm64: PMU: Avoid inappropriate use of host's PMUVer
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v10 00/59] KVM: arm64: ARMv8.3/8.4 Nested Virtualization support
- From: Miguel Luis <miguel.luis@xxxxxxxxxx>
- [PATCH 2/2] KVM: arm64: PMU: Disallow vPMU on non-uniform PMUVer systems
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 1/2] KVM: arm64: PMU: Introduce pmu_v3_is_supported() helper
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 0/2] KVM: arm64: PMU: Disallow vPMU on non-uniform PMUVer systems
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH] accel/kvm/kvm-all: Handle register access errors
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH] accel/kvm: Specify default IPA size for arm64
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH v3 10/10] KVM: riscv: selftests: Add get-reg-list test
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v3 07/10] KVM: arm64: selftests: Finish generalizing get-reg-list
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v3 09/10] KVM: riscv: selftests: Skip some registers set operation
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [RFC PATCH v2 5/6] KVM: PPC: Add support for nested PAPR guests
- From: Jordan Niethe <jniethe5@xxxxxxxxx>
- Re: [RFC PATCH v2 4/6] KVM: PPC: Add helper library for Guest State Buffers
- From: Jordan Niethe <jniethe5@xxxxxxxxx>
- Re: [RFC PATCH v2 2/6] KVM: PPC: Add fpr getters and setters
- From: Jordan Niethe <jniethe5@xxxxxxxxx>
- Re: [RFC PATCH v2 1/6] KVM: PPC: Use getters and setters for vcpu register state
- From: Jordan Niethe <jniethe5@xxxxxxxxx>
- Re: [RFC PATCH v2 0/6] KVM: PPC: Nested PAPR guests
- From: Jordan Niethe <jniethe5@xxxxxxxxx>
- Re: [PATCH RFC v2 6/6] docs: powerpc: Document nested KVM on POWER
- From: Jordan Niethe <jniethe5@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 23/32] arm64: Add a setup sequence for systems that boot through EFI
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 12/32] arm64: Add support for discovering the UART through ACPI
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [PATCH RFC net-next v4 7/8] vsock: Add lockless sendmsg() support
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v4 5/8] virtio/vsock: add VIRTIO_VSOCK_F_DGRAM feature bit
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v4 4/8] vsock: make vsock bind reusable
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v4 6/8] virtio/vsock: support dgrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v4 2/8] vsock: refactor transport lookup code
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v4 1/8] vsock/dgram: generalize recvmsg and drop transport->dgram_dequeue
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v4 8/8] tests: add vsock dgram tests
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v4 3/8] vsock: support multi-transport datagrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v4 0/8] virtio/vsock: support datagrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: bugfixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 4/4] PCI/VGA: introduce is_boot_device function callback to vga_client_register
- From: Sui Jingfeng <15330273260@xxxxxx>
- Re: [kvm-unit-tests PATCH v6 28/32] arm64: Add support for efi in Makefile
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Trilok Soni <quic_tsoni@xxxxxxxxxxx>
- Re: [PATCH v3 00/17] KVM: arm64: Allow using VHE in the nVHE hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 4/4] PCI/VGA: introduce is_boot_device function callback to vga_client_register
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v12 00/24] Add vfio_device cdev for iommufd support
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v3 11/17] KVM: arm64: Disable TTBR1_EL2 when using ARM64_KVM_HVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 12/17] KVM: arm64: Adjust EL2 stage-1 leaf AP bits when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 14/17] KVM: arm64: Program the timer traps with VHE layout in hVHE mode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 15/17] KVM: arm64: Force HCR_E2H in guest context when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 17/17] KVM: arm64: Terrible timer hack for M1 with hVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 16/17] arm64: Allow arm64_sw.hvhe on command line
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 10/17] KVM: arm64: Force HCR_EL2.E2H when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 13/17] KVM: arm64: Rework CPTR_EL2 programming for HVHE configuration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v2 6/6] KVM: SVM: Add CET features to supported_xss
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 08/17] KVM: arm64: Remove alternatives from sysreg accessors in VHE hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 09/17] KVM: arm64: Key use of VHE instructions in nVHE code off ARM64_KVM_HVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 07/17] arm64: Use CPACR_EL1 format to set CPTR_EL2 when E2H is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 06/17] arm64: Allow EL1 physical timer access when running VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 00/17] KVM: arm64: Allow using VHE in the nVHE hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 03/17] arm64: Turn kaslr_feature_override into a generic SW feature override
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 02/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 01/17] KVM: arm64: Drop is_kernel_in_hyp_mode() from __invalidate_icache_guest_page()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL] virtio,vhost,vdpa: bugfixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 3/3] vfio/fsl: Create Kconfig sub-menu
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Clear possible conflict aborts
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v2 6/6] KVM: SVM: Add CET features to supported_xss
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: Skip break phase when we have FEAT_BBM level 2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH -next v21 00/27] riscv: Add vector ISA support
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH -next v21 00/27] riscv: Add vector ISA support
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- Re: [PATCH v11 06/20] x86/virt/tdx: Handle SEAMCALL running out of entropy error
- From: Nikolay Borisov <n.borisov.lkml@xxxxxxxxx>
- Re: [PATCH v7 9/9] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 12/32] arm64: Add support for discovering the UART through ACPI
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 12/32] arm64: Add support for discovering the UART through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [PATCH v5] vfio/pci: Propagate ACPI notifications to user-space via eventfd
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH v3 10/10] KVM: riscv: selftests: Add get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v11 18/20] x86: Handle TDX erratum to reset TDX private memory during kexec() and reboot
- From: kirill.shutemov@xxxxxxxxxxxxxxx
- Re: [PATCH v11 19/20] x86/mce: Improve error log of kernel space TDX #MC due to erratum
- From: kirill.shutemov@xxxxxxxxxxxxxxx
- Re: kvm/arm64: Spark benchmark
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4] vfio/pci: Propagate ACPI notifications to user-space via eventfd
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH v3 07/10] KVM: arm64: selftests: Finish generalizing get-reg-list
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v3 3/4] PCI/VGA: only deal with VGA class devices
- From: Sui Jingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [PATCH kvmtool 12/21] Add helpers to pause the VM from vCPU thread
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [PATCH v11 17/20] x86/kexec: Flush cache of TDX private memory
- From: kirill.shutemov@xxxxxxxxxxxxxxx
- Re: [PATCH v3 4/6] target/riscv: Create an KVM AIA irqchip
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [PATCH v2] KVM: Avoid illegal stage2 mapping on invalid memory slot
- From: Gavin Shan <gshan@xxxxxxxxxx>
- Re: [PATCH v11 16/20] x86/virt/tdx: Initialize all TDMRs
- From: kirill.shutemov@xxxxxxxxxxxxxxx
- Re: [PATCH v11 08/20] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: kirill.shutemov@xxxxxxxxxxxxxxx
- Re: [PATCH v13 00/30] Add KVM LoongArch support
- From: zhaotianrui <zhaotianrui@xxxxxxxxxxx>
- Re: [PATCH v13 00/30] Add KVM LoongArch support
- From: zhaotianrui <zhaotianrui@xxxxxxxxxxx>
- [PATCH v13 26/30] LoongArch: KVM: Implement kvm exception vector
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v13 28/30] LoongArch: KVM: Enable kvm config and add the makefile
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v13 22/30] LoongArch: KVM: Implement handle idle exception
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] KVM: riscv: selftests: Skip some registers set operation
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v13 24/30] LoongArch: KVM: Implement handle mmio exception
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v13 27/30] LoongArch: KVM: Implement vcpu world switch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v13 13/30] LoongArch: KVM: Implement misc vcpu related interfaces
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]