Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v12 25/31] LoongArch: KVM: Implement handle fpu exception
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 14/31] LoongArch: KVM: Implement vcpu load and vcpu put operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 17/31] LoongArch: KVM: Implement virtual machine tlb operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 20/31] LoongArch: KVM: Implement handle csr excption
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 13/31] LoongArch: KVM: Implement misc vcpu related interfaces
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 15/31] LoongArch: KVM: Implement vcpu status description
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 16/31] LoongArch: KVM: Implement update VM id function
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 12/31] LoongArch: KVM: Implement vcpu interrupt operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 09/31] LoongArch: KVM: Implement vcpu get, vcpu set registers
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 05/31] LoongArch: KVM: Add vcpu related header files
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 10/31] LoongArch: KVM: Implement vcpu ENABLE_CAP ioctl interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 07/31] LoongArch: KVM: Implement vcpu run interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 06/31] LoongArch: KVM: Implement vcpu create and destroy interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 08/31] LoongArch: KVM: Implement vcpu handle exit interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 01/31] LoongArch: KVM: Add kvm related header files
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 00/31] Add KVM LoongArch support
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 04/31] LoongArch: KVM: Implement VM related functions
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 02/31] LoongArch: KVM: Implement kvm module related interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 03/31] LoongArch: KVM: Implement kvm hardware enable, disable interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RDMA migration is slower than TCP
- From: Roja Eswaran <reswara1@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 01/10] iommufd: Add data structure for Intel VT-d stage-1 domain allocation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 01/10] iommufd: Add data structure for Intel VT-d stage-1 domain allocation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] kvm: fix multiple SIMD prefixes decoding
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH v1 5/9] KVM: x86: Add new hypercall to lock control registers
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 3/9] virt: Implement Heki common code
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH V5 05/10] KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: arm64: Use TLBI range-based intructions for unmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: arm64: Implement __kvm_tlb_flush_vmid_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [Bug] AMD nested: commit broke VMware
- From: jwarren@xxxxxxxxxxxx
- Re: [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v7 0/1] arm: enable MTE for QEMU + kvm
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v7 0/1] arm: enable MTE for QEMU + kvm
- From: Andrea Bolognani <abologna@xxxxxxxxxx>
- Re: [PATCH v6] vfio/cdx: add support for CDX bus
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- Re: [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v14 075/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 087/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 102/113] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 077/113] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 108/113] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 104/113] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 097/113] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 078/113] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 111/113] RFC: KVM: x86, TDX: Add check for setting CPUID
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 098/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 110/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 079/113] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 099/113] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 094/113] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 092/113] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 091/113] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 112/113] RFC: KVM: TDX: Make busy with S-EPT on entry bug
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 109/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 080/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 085/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 103/113] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 084/113] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 086/113] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 082/113] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 093/113] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 088/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 076/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 090/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 073/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 095/113] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 089/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 101/113] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 106/113] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 100/113] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 096/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 074/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 107/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 105/113] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 071/113] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 083/113] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 081/113] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 072/113] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 070/113] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 069/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 057/113] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 064/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 067/113] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 063/113] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 068/113] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 060/113] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 065/113] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 061/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 059/113] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 066/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 058/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 062/113] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 055/113] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 056/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 054/113] KVM: TDX: Require TDP MMU and mmio caching for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 053/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 052/113] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 051/113] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 050/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 049/113] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 048/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 044/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 045/113] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 043/113] KVM: Add flags to struct kvm_gfn_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 042/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 041/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 040/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 039/113] KVM: x86/mmu: Assume guest MMIOs are shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 038/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 037/113] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 034/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 030/113] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 031/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 036/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 035/113] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 033/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 032/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 014/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 023/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 013/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 024/113] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 015/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 017/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 012/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 018/113] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 020/113] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 022/113] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 019/113] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 025/113] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 010/113] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 006/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 008/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 007/113] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 009/113] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 000/113] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 002/113] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Fabio Coatti <fabio.coatti@xxxxxxxxx>
- Re: [PATCH v10 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Fabio Coatti <fabio.coatti@xxxxxxxxx>
- Re: [PATCH v13 064/113] KVM: TDX: Implement TDX vcpu enter/exit path
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 05/34] mm: add utility functions for ptdesc
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: arm64: PMU: Set the default PMU for the guest on vCPU reset
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 05/34] mm: add utility functions for ptdesc
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v10 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 05/34] mm: add utility functions for ptdesc
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: PMU: Don't overwrite PMUSERENR with vcpu loaded
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 4/4] KVM: arm64: PMU: Don't use the PMUVer of the PMU set for guest
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 2/4] KVM: arm64: PMU: Set the default PMU for the guest on vCPU reset
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 3/4] KVM: arm64: PMU: Use PMUVer of the guest's PMU for ID_AA64DFR0.PMUVer
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 1/4] KVM: arm64: PMU: Introduce a helper to set the guest's PMU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 09/11] KVM: riscv: selftests: Make check_supported arch specific
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [GIT PULL] VFIO fix for v6.4-rc4
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2 2/3] KVM: x86: Retry APIC optimized map recalc if vCPU is added/enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/3] KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is out-of-bounds
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/3] KVM: x86: Out-of-bounds access in kvm_recalculate_phys_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH mm-unstable v2 10/10] mm: multi-gen LRU: use mmu_notifier_test_clear_young()
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 02/10] mm/kvm: use mmu_notifier_ops->test_clear_young()
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 06/10] kvm/powerpc: make radix page tables RCU safe
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 09/10] kvm/x86: add kvm_arch_test_clear_young()
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 05/10] kvm/arm64: add kvm_arch_test_clear_young()
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 08/10] kvm/x86: move tdp_mmu_enabled and shadow_accessed_mask
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 07/10] kvm/powerpc: add kvm_arch_test_clear_young()
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 03/10] kvm/arm64: export stage2_try_set_pte() and macros
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 01/10] mm/kvm: add mmu_notifier_ops->test_clear_young()
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH mm-unstable v2 00/10] mm/kvm: locklessly clear the accessed bit
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Fix out-of-bounds access in kvm_recalculate_phys_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH kvmtool 21/21] aarch64: smccc: Start sending PSCI to userspace
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 20/21] aarch64: psci: Implement SYSTEM_{OFF,RESET}
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 17/21] aarch64: psci: Implement CPU_ON
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 16/21] aarch64: psci: Implement CPU_OFF
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 18/21] aarch64: psci: Implement AFFINITY_INFO
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 19/21] aarch64: psci: Implement MIGRATE_INFO_TYPE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 15/21] aarch64: psci: Implement CPU_SUSPEND
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 11/21] arm: Generalize execution state specific VM initialization
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 14/21] aarch64: Add skeleton implementation for PSCI
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 06/21] aarch64: Copy cputype.h from Linux 6.4-rc1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 07/21] arm: Stash kvm_vcpu_init for later use
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 10/21] aarch64: Expose ARM64_CORE_REG() for general use
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 05/21] Import arm-smccc.h from Linux 6.4-rc1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 09/21] arm: Use KVM_SET_MP_STATE ioctl to power off non-boot vCPUs
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 12/21] Add helpers to pause the VM from vCPU thread
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 04/21] Update headers with Linux 6.4-rc1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 08/21] arm: Add support for resetting a vCPU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 13/21] aarch64: Add support for finding vCPU for given MPIDR
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 03/21] Copy 64-bit alignment attrtibutes from Linux 6.4-rc1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 01/21] update_headers: Use a list for arch-generic headers
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 02/21] update_headers: Add missing entries to list of headers to copy
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH kvmtool 00/21] arm64: Handle PSCI calls in userspace
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v10 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v3 1/2] KVM: x86: Update number of entries for KVM_GET_CPUID2 on success, not failure
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 0/2] KVM: x86: Report actual nent from KVM_GET_CPUID2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 2/2] KVM: selftests: Extend cpuid_test to verify KVM_GET_CPUID2 "nent" updates
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Deadlock due to EPT_VIOLATION
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86/xen: Implement hvm_op/HVMOP_flush_tlbs hypercall
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Update KVM_GET_CPUID2 to return valid entry count
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] VFIO fix for v6.4-rc4
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add comment on try_cmpxchg64 usage in tdp_mmu_set_spte_atomic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Fix out-of-bounds access in kvm_recalculate_phys_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Fix out-of-bounds access in kvm_recalculate_phys_map()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [ANNOUNCE] KVM Microconference at LPC 2023
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Deadlock due to EPT_VIOLATION
- From: Brian Rak <brak@xxxxxxxxx>
- Re: [PATCH v1 6/9] KVM: x86: Add Heki hypervisor support
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [ANNOUNCE] KVM Microconference at LPC 2023
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Fix out-of-bounds access in kvm_recalculate_phys_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [ANNOUNCE] KVM Microconference at LPC 2023
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [ANNOUNCE] KVM Microconference at LPC 2023
- From: "Gowans, James" <jgowans@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2 15/17] KVM: arm64: Force HCR_E2H in guest context when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/17] KVM: arm64: Rework CPTR_EL2 programming for HVHE configuration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/17] KVM: arm64: Disable TTBR1_EL2 when using ARM64_KVM_HVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 17/17] KVM: arm64: Terrible timer hack for M1 with hVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/17] KVM: arm64: Program the timer traps with VHE layout in hVHE mode
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 12/17] KVM: arm64: Adjust EL2 stage-1 leaf AP bits when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/17] KVM: arm64: Force HCR_EL2.E2H when ARM64_KVM_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 16/17] arm64: Allow arm64_sw.hvhe on command line
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/17] arm64: Allow EL1 physical timer access when running VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/17] KVM: arm64: Key use of VHE instructions in nVHE code off ARM64_KVM_HVHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/17] arm64: Use CPACR_EL1 format to set CPTR_EL2 when E2H is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/17] KVM: arm64: Remove alternatives from sysreg accessors in VHE hypervisor context
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/17] KVM: arm64: Allow using VHE in the nVHE hypervisor
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/17] arm64: Turn kaslr_feature_override into a generic SW feature override
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/17] KVM: arm64: Drop is_kernel_in_hyp_mode() from __invalidate_icache_guest_page()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/17] vsock: MSG_ZEROCOPY flag support
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 00/17] vsock: MSG_ZEROCOPY flag support
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/17] vsock: MSG_ZEROCOPY flag support
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH] KVM: Don't kfree(NULL) on kzalloc() failure in kvm_assign_ioeventfd_idx()
- From: Michal Luczaj <mhal@xxxxxxx>
- RE: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Fix out-of-bounds access in kvm_recalculate_phys_map()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [RFC PATCH v3 00/17] vsock: MSG_ZEROCOPY flag support
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 09/11] KVM: riscv: selftests: Make check_supported arch specific
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- RE: [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 09/11] KVM: riscv: selftests: Make check_supported arch specific
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Fabio Coatti <fabio.coatti@xxxxxxxxx>
- [PATCH v3 3/6] target/riscv: check the in-kernel irqchip support
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [PATCH v3 1/6] update-linux-headers: sync-up header with Linux for KVM AIA support placeholder
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- [PATCH v3 4/6] target/riscv: Create an KVM AIA irqchip
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- Re: [PATCH v2 00/11] RISCV: Add KVM_GET_REG_LIST API
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Trilok Soni <quic_tsoni@xxxxxxxxxxx>
- Re: [PATCH v2 00/17] Add Nested Translation Support for SMMUv3
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 10/10] iommu/vt-d: Disallow nesting on domains with read-only mappings
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 06/10] iommu/vt-d: Set the nested domain to a device
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 04/10] iommu/vt-d: Add helper to setup pasid nested translation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v3 02/10] iommu/vt-d: Extend dmar_domain to support nested domain
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: James Morris <jamorris@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/17] Add Nested Translation Support for SMMUv3
- From: zhangfei gao <zhangfei.gao@xxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: x86: Fix out-of-bounds access in kvm_recalculate_phys_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Agenda - 2023.05.31 - guest_memfd()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/17] Add Nested Translation Support for SMMUv3
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: arm64: PMU: Don't overwrite PMUSERENR with vcpu loaded
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: vmx/pmu: Indicate available fixed function PMCs through a bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM support for Intel PMU v5 fixed function PMC bitmap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/34] mm: add utility functions for ptdesc
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH v4] vfio/pci: Propagate ACPI notifications to user-space via eventfd
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: FW: [Bug 217472] New: ACPI _OSC features have different values in Host OS and Guest OS
- From: "Patel, Nirmal" <nirmal.patel@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/34] mm: add utility functions for ptdesc
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Trilok Soni <quic_tsoni@xxxxxxxxxxx>
- [PATCH 1/3] KVM: x86: Fix out-of-bounds access in kvm_recalculate_phys_map()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH 2/3] KVM: x86: Simplify APIC ID selection in kvm_recalculate_phys_map()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH 0/3] Out-of-bounds access in kvm_recalculate_phys_map()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v2 13/34] mm: Create ptdesc equivalents for pgtable_{pte,pmd}_page_{ctor,dtor}
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH v2 6/7] KVM: selftests: Check gp event filters without affecting fixed event filters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/7] KVM: selftests: Check if pmu_event_filter meets expectations on fixed ctrs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 05/34] mm: add utility functions for ptdesc
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: x86/pmu: Add documentation for fixed ctr on PMU filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/7] KVM: selftests: Test unavailable event filters are rejected
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/7] KVM: selftests: Apply create_pmu_event_filter() to fixed ctrs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 00/11] RISCV: Add KVM_GET_REG_LIST API
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/34] s390: Use _pt_s390_gaddr for gmap address tracking
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH v2 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH v2 10/11] KVM: riscv: selftests: Skip some registers set operation
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/11] KVM: riscv: selftests: Make check_supported arch specific
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] KVM: selftests: Replace int with uint32_t for nevents
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v3 00/17] vsock: MSG_ZEROCOPY flag support
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v8 0/6] Linear Address Masking (LAM) KVM Enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Test pmu event filter with incompatible kvm_pmu_event_filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v2] KVM: MAINTAINERS: note that linux-kvm.org isn't current
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH kvmtool 0/2] Fix builds with clang
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH kvmtool 1/2] option parsing: fix type of empty .argh parameter
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH kvmtool 2/2] virtio: sanitise virtio endian wrappers
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 13/34] mm: Create ptdesc equivalents for pgtable_{pte,pmd}_page_{ctor,dtor}
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 05/34] mm: add utility functions for ptdesc
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 02/34] s390: Use _pt_s390_gaddr for gmap address tracking
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 06/11] KVM: arm64: selftests: Split get-reg-list test code
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 10/11] KVM: riscv: selftests: Skip some registers set operation
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 09/11] KVM: riscv: selftests: Make check_supported arch specific
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 08/11] KVM: riscv: Add KVM_GET_REG_LIST API support
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 02/11] KVM: arm64: selftests: Drop SVE cap check in print_reg
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 07/11] KVM: arm64: selftests: Finish generalizing get-reg-list
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 01/11] KVM: arm64: selftests: Replace str_with_index with strdup_printf
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 05/11] KVM: arm64: selftests: Delete core_reg_fixup
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 04/11] KVM: arm64: selftests: Rename vcpu_config and add to kvm_util.h
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 03/11] KVM: arm64: selftests: Remove print_reg's dependency on vcpu_config
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- [PATCH v2 00/11] RISCV: Add KVM_GET_REG_LIST API
- From: Haibo Xu <haibo1.xu@xxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- Re: [PATCH v3 07/21] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Kautuk Consul <kconsul@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v3 01/10] iommufd: Add data structure for Intel VT-d stage-1 domain allocation
- From: "Zhang, Tina" <tina.zhang@xxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Test pmu event filter with incompatible kvm_pmu_event_filter
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v8 0/6] Linear Address Masking (LAM) KVM Enabling
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/11] iommu: Add new iommu op to create domains owned by userspace
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Trilok Soni <quic_tsoni@xxxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Test pmu event filter with incompatible kvm_pmu_event_filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 05/10] KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: selftests: Test consistency of CPUID with num of Fixed counters
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: selftests: Test the consistency of the PMU's CPUID and its features
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: selftests: Test Intel counters' bit width emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/7] KVM: selftests: Test consistency of CPUID with num of Fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: selftests: Test consistency of CPUID with num of GP counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/pmu: Reorder functions to reduce unnecessary declarations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Trilok Soni <quic_tsoni@xxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86/pmu: Move the overflow of a normal counter out of PMI context
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/5] KVM: x86/pmu: Add a helper to check if pmc has PEBS mode enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 2/9] KVM: x86/mmu: Add support for prewrite page tracking
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/pmu: Fix emulation on Intel counters' bit width
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6] vfio/cdx: add support for CDX bus
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v2 6/6] KVM: SVM: Add CET features to supported_xss
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v6] vfio/cdx: add support for CDX bus
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 04/13] arm64/arch_timer: Provide noinstr sched_clock_read() functions
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v2 03/13] arm64/io: Always inline all of __raw_{read,write}[bwlq]()
- From: Valentin Schneider <vschneid@xxxxxxxxxx>
- Re: [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
- From: Peter Xu <peterx@xxxxxxxxxx>
- [RFC PATCH v2] x86/sev-es: Include XSS value in GHCB CPUID request
- From: John Allen <john.allen@xxxxxxx>
- [RFC PATCH v2 6/6] KVM: SVM: Add CET features to supported_xss
- From: John Allen <john.allen@xxxxxxx>
- [RFC PATCH v2 4/6] KVM: SVM: Save shadow stack host state on VMRUN
- From: John Allen <john.allen@xxxxxxx>
- [RFC PATCH v2 3/6] KVM: x86: SVM: Pass through shadow stack MSRs
- From: John Allen <john.allen@xxxxxxx>
- [RFC PATCH v2 5/6] KVM: SVM: Add MSR_IA32_XSS to the GHCB for hypervisor kernel
- From: John Allen <john.allen@xxxxxxx>
- [RFC PATCH v2 2/6] KVM: x86: SVM: Update dump_vmcb with shadow stack save area additions
- From: John Allen <john.allen@xxxxxxx>
- [RFC PATCH v2 1/6] KVM: x86: SVM: Emulate reads and writes to shadow stack MSRs
- From: John Allen <john.allen@xxxxxxx>
- [RFC PATCH v2 0/6] SVM guest shadow stack support
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 00/11] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH -next v20 11/26] riscv: Allocate user's vector context in the first-use trap
- From: Darius Rad <darius@xxxxxxxxxxxx>
- Re: [GIC PULL] KVM/arm64 fixes for 6.4, take #2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH kvmtool 00/16] Fix vhost-net, scsi and vsock
- From: Jean-Philippe Brucker <jean-philippe@xxxxxxxxxx>
- Re: Deadlock due to EPT_VIOLATION
- From: Brian Rak <brak@xxxxxxxxx>
- [GIC PULL] KVM/arm64 fixes for 6.4, take #2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: arm64: Handle MTE Set/Way CMOs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 0/6] KVM: x86/mmu: refine memtype related mmu zap
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH kvmtool v3 2/2] virtio/rng: return at least one byte of entropy
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH kvmtool v3 1/2] virtio/rng: switch to using /dev/urandom
- From: Andre Przywara <andre.przywara@xxxxxxx>
- [PATCH kvmtool v3 0/2] Fix virtio/rng handling in low entropy situations
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH v3 6/6] vfio/nvgpu: register device memory for poison handling
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: sclp: consider monoprocessor on read_info error
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 2/3] KVM: x86: Correct the name for skipping VMENTER l1d flush
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2 3/3] x86/cpu, KVM: Use helper function to read MSR_IA32_ARCH_CAPABILITIES
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 06/21] KVM:x86: Report XSS as to-be-saved if there are supported features
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- RE: [PATCH v11 21/23] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 1/3] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v3 18/21] KVM:x86: Enable CET virtualization for VMX and advertise to userspace
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH] vfio/pci: Also demote hiding standard cap messages
- From: Oleksandr Natalenko <oleksandr@xxxxxxxxxxxxxx>
- RE: [PATCH v2 06/11] iommufd: IOMMU_HWPT_ALLOC allocation with user data
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vfio/pci: Also demote hiding standard cap messages
- From: Cédric Le Goater <clg@xxxxxxxxxx>
- Re: [PATCH -next v20 12/26] riscv: Add ptrace vector support
- From: Andreas Schwab <schwab@xxxxxxx>
- RE: [PATCH v2 01/11] iommu: Add new iommu op to create domains owned by userspace
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 10/10] iommu/vt-d: Disallow nesting on domains with read-only mappings
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 07/10] iommu/vt-d: Add iotlb flush for nested domain
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 06/10] iommu/vt-d: Set the nested domain to a device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 04/10] iommu/vt-d: Add helper to setup pasid nested translation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 06/21] KVM:x86: Report XSS as to-be-saved if there are supported features
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v3 02/10] iommu/vt-d: Extend dmar_domain to support nested domain
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 01/10] iommufd: Add data structure for Intel VT-d stage-1 domain allocation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH kernel v5 6/6] x86/sev: Do not handle #VC for DR7 read/write
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v3 18/21] KVM:x86: Enable CET virtualization for VMX and advertise to userspace
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH -next v20 12/26] riscv: Add ptrace vector support
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH v2 3/3] x86/cpu, KVM: Use helper function to read MSR_IA32_ARCH_CAPABILITIES
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v2 2/3] KVM: x86: Correct the name for skipping VMENTER l1d flush
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v2 1/3] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [PATCH v2 0/3] MSR_IA32_ARCH_CAPABILITIES cleanups
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Kautuk Consul <kconsul@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/11] iommufd: IOMMU_HWPT_ALLOC allocation with user data
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 04/11] iommufd: Pass parent hwpt and user_data to iommufd_hw_pagetable_alloc()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 02/11] iommu: Add nested domain support
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 01/11] iommu: Add new iommu op to create domains owned by userspace
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v3 3/4] iommufd: Add IOMMU_DEVICE_GET_HW_INFO
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH v2 06/11] iommufd: IOMMU_HWPT_ALLOC allocation with user data
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 04/11] iommufd: Pass parent hwpt and user_data to iommufd_hw_pagetable_alloc()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 03/11] iommufd/hw_pagetable: Use domain_alloc_user op for domain allocation
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 02/11] iommu: Add nested domain support
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
- From: Alistair Popple <apopple@xxxxxxxxxx>
- RE: [PATCH v2 01/11] iommu: Add new iommu op to create domains owned by userspace
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v3 3/4] iommufd: Add IOMMU_DEVICE_GET_HW_INFO
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- RE: [PATCH v2 00/11] iommufd: Add nesting infrastructure
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 14/21] KVM:VMX: Add a synthetic MSR to allow userspace to access GUEST_SSP
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v3 13/21] KVM:VMX: Emulate reads and writes to CET MSRs
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH V5 00/11] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: YangHang Liu <yanghliu@xxxxxxxxxx>
- RE: [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- RE: [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- [PATCH 1/2] mmu_notifiers: Restore documentation for .invalidate_range()
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH -next v20 11/26] riscv: Allocate user's vector context in the first-use trap
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH -next v20 10/26] riscv: Add task switch support for vector
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH -next v20 12/26] riscv: Add ptrace vector support
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH -next v20 09/26] riscv: Introduce struct/helpers to save/restore per-task Vector state
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH -next v20 03/26] riscv: hwprobe: Add support for probing V in RISCV_HWPROBE_KEY_IMA_EXT_0
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH -next v20 23/26] riscv: Enable Vector code to be built
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v2 0/6] KVM: x86/mmu: refine memtype related mmu zap
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] vfio/pci: Also demote hiding standard cap messages
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 00/11] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: demote hiding ecap messages to debug level
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] vfio/type1: check pfn valid before converting to struct page
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 2/2] x86/msr: Allow unprivileged read access to some MSRs
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2] vfio/type1: check pfn valid before converting to struct page
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH 2/2] x86/msr: Allow unprivileged read access to some MSRs
- From: Tim Wiederhake <twiederh@xxxxxxxxxx>
- [PATCH 1/2] x86/msr: Read MSRs individually
- From: Tim Wiederhake <twiederh@xxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Nicolas Saenz Julienne <nsaenz@xxxxxxxxxx>
- Re: [PATCH 0/2][next] vfio/ccw: Replace one-element array with flexible-array member
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- Re: [Bug 217472] New: ACPI _OSC features have different values in Host OS and Guest OS
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/2][next] vfio/ccw: Replace one-element array with flexible-array member
- From: Marion & Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH 1/2][next] vfio/ccw: Replace one-element array with flexible-array member
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v3 00/22] Improve scalability of KVM + userfaultfd live migration via annotated memory faults.
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH 1/2][next] vfio/ccw: Replace one-element array with flexible-array member
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2][next] vfio/ccw: Use struct_size() helper
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [Bug 217472] New: ACPI _OSC features have different values in Host OS and Guest OS
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH v2] KVM: SVM: Remove TSS reloading code after VMEXIT
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: vPMU: truncate counter value to allowed width
- From: Roman Kagan <rkagan@xxxxxxxxx>
- Re: [PATCH 0/2][next] vfio/ccw: Replace one-element array with flexible-array member
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 1/2][next] vfio/ccw: Replace one-element array with flexible-array member
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH 2/2][next] vfio/ccw: Use struct_size() helper
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: Deadlock due to EPT_VIOLATION
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: arm64: Handle MTE Set/Way CMOs
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kvmtool v2 2/2] virtio/rng: return at least one byte of entropy
- From: Andre Przywara <andre.przywara@xxxxxxx>
- Re: [PATCH] KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] vhost: use kzalloc() instead of kmalloc() followed by memset()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH 1/2] x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Deadlock due to EPT_VIOLATION
- From: Brian Rak <brak@xxxxxxxxx>
- Re: [PATCH -next v20 20/26] riscv: Add prctl controls for userspace vector management
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2] arm64: Make vector_table and vector_stub weak symbols
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PATCH -next v20 21/26] riscv: Add sysctl to set the default vector rule for new processes
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: vPMU: truncate counter value to allowed width
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v10 00/30] Add KVM LoongArch support
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH kvmtool 00/16] Fix vhost-net, scsi and vsock
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH kvmtool v2 2/2] virtio/rng: return at least one byte of entropy
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v10 00/30] Add KVM LoongArch support
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [PTACH v2 1/6] update-linux-headers: sync-up header with Linux for KVM AIA support
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm64: Make vector_table and vector_stub weak symbols
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [PTACH v2 1/6] update-linux-headers: sync-up header with Linux for KVM AIA support
- From: Yong-Xuan Wang <yongxuan.wang@xxxxxxxxxx>
- RE: [RFC PATCH 30/32] KVM: arm64: Pass PSCI calls to userspace
- From: Salil Mehta <salil.mehta@xxxxxxxxxx>
- Re: [PATCH v3 14/21] KVM:VMX: Add a synthetic MSR to allow userspace to access GUEST_SSP
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm64: Make vector_table and vector_stub weak symbols
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v3 13/21] KVM:VMX: Emulate reads and writes to CET MSRs
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
- From: "Wen, Qian" <qian.wen@xxxxxxxxx>
- RE: [PATCH 1/2] x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH v11 00/23] Add vfio_device cdev for iommufd support
- From: "Duan, Zhenzhong" <zhenzhong.duan@xxxxxxxxx>
- [Bug 217307] windows guest entering boot loop when nested virtualization enabled and hyperv installed
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v7 08/14] KVM: Rename mmu_notifier_*
- From: Kautuk Consul <kconsul@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2] vfio/type1: check pfn valid before converting to struct page
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [RFC PATCH v3 05/17] vsock/virtio: MSG_ZEROCOPY flag support
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/6] mm: handle poisoning of pfn without struct pages
- From: HORIGUCHI NAOYA(堀口 直也) <naoya.horiguchi@xxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- [PATCH v2] KVM: x86/mmu: Assert on @mmu in the __kvm_mmu_invalidate_addr()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v10 00/30] Add KVM LoongArch support
- From: maobibo <maobibo@xxxxxxxxxxx>
- Re: [ANNOUNCE / RFC] Periodic Upstream Call for KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: "Wen, Qian" <qian.wen@xxxxxxxxx>
- RE: [PATCH v11 21/23] vfio: Determine noiommu device in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 17/18] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- [PATCH 2/2][next] vfio/ccw: Use struct_size() helper
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- RE: [PATCH v11 13/23] vfio-iommufd: Add detach_ioas support for physical VFIO devices
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- [PATCH 1/2][next] vfio/ccw: Replace one-element array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- [PATCH 0/2][next] vfio/ccw: Replace one-element array with flexible-array member
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- RE: [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- RE: [PATCH v11 10/23] vfio-iommufd: Move noiommu compat probe out of vfio_iommufd_bind()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH v3 13/18] x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kernel v5 6/6] x86/sev: Do not handle #VC for DR7 read/write
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Rename restrictedmem => guardedmem? (was: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM)
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: Rename restrictedmem => guardedmem? (was: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [ANNOUNCE / RFC] Periodic Upstream Call for KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH v3 09/18] x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH v3 16/18] x86/virt: KVM: Move "disable SVM" helper into KVM SVM
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 15/18] KVM: VMX: Ensure CPU is stable when probing basic VMX support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 17/18] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 05/18] x86/reboot: Disable virtualization during reboot iff callback is registered
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 03/18] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v11 21/23] vfio: Determine noiommu device in __vfio_register_dev()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH kernel v5 4/6] KVM: SVM/SEV/SEV-ES: Rework intercepts
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 00/11] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH kernel v5 3/6] KVM: SEV-ES: explicitly disable debug
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 00/11] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v10 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v10 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v10 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v10 0/5] Support writable CPU ID registers from userspace
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [Bug 217307] windows guest entering boot loop when nested virtualization enabled and hyperv installed
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 4/4] KVM: mmu: remove over-aggressive warnings
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 13/23] vfio-iommufd: Add detach_ioas support for physical VFIO devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 13/23] vfio-iommufd: Add detach_ioas support for physical VFIO devices
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v6 1/4] KVM: mmu: introduce new gfn_to_pfn_noref functions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v11 10/23] vfio-iommufd: Move noiommu compat probe out of vfio_iommufd_bind()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v20 16/21] tests/avocado: s390x cpu topology entitlement tests
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v20 15/21] tests/avocado: s390x cpu topology polarisation
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v11 03/23] vfio: Accept vfio device file in the KVM facing kAPI
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v20 14/21] tests/avocado: s390x cpu topology core
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v2] vfio/type1: check pfn valid before converting to struct page
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 03/18] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/18] x86/reboot: Disable virtualization during reboot iff callback is registered
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v9 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: Rename restrictedmem => guardedmem? (was: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4] vfio/pci: Propagate ACPI notifications to user-space via eventfd
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: SVM: free sev_*asid_bitmap init if SEV init fails
- From: Alexander Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- [PATCH v2 2/2] KVM: SVM: enhance info printk's in SEV init
- From: Alexander Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- [PATCH v2 0/2] KVM: SVM: small tweaks for sev_hardware_setup
- From: Alexander Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] iommu/amd: Fix GAM IRTEs affinity and GALog restart
- From: Joerg Roedel <joro@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 1/2] s390x: topology: Check the Perform Topology Function
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH] mmu_notifiers: Notify on pte permission upgrades
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Add tests for pmu event filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Track supported ARCH_CAPABILITIES in kvm_caps
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 06/13] s390/time: Provide sched_clock_noinstr()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- RE: [PATCH 1/2] x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm64: Make vector_table and vector_stub weak symbols
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: Rename restrictedmem => guardedmem? (was: Re: [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM)
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH v3 04/17] vsock/virtio: non-linear skb handling for tap
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 10/18] x86/virt: KVM: Move VMXOFF helpers into KVM VMX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v3 04/17] vsock/virtio: non-linear skb handling for tap
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/17] vsock/virtio: MSG_ZEROCOPY flag support
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 05/17] vsock/virtio: MSG_ZEROCOPY flag support
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH v3 08/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_{INTEL,AMD} is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 07/18] x86/reboot: Hoist "disable virt" helpers above "emergency reboot" path
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 05/18] x86/reboot: Disable virtualization during reboot iff callback is registered
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 06/18] x86/reboot: Assert that IRQs are disabled when turning off virtualization
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 04/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callback
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 03/18] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]