Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v7 5/9] iommufd: Add helper to retrieve iommufd_ctx and devid
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 6/9] vfio: Mark cdev usage in vfio_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 3/9] iommufd: Reserve all negative IDs in the iommufd xarray
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 2/9] vfio/pci: Move the existing hot reset logic to be a helper
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 0/9] Enhance vfio PCI hot reset for vfio cdev device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 1/9] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [Bug 217516] FAIL: TSC reference precision test when do hyperv_clock test of kvm unit test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v2] vhost/vdpa: Add MSI translation tables to iommu for software-managed MSI
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH][next] KVM: s390: selftests: Fix spelling mistake "initally" -> "initially"
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v2 04/13] arm64/arch_timer: Provide noinstr sched_clock_read() functions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH][next] KVM: s390: selftests: Fix spelling mistake "initally" -> "initially"
- From: "Colin King (gmail)" <colin.i.king@xxxxxxxxx>
- Re: [PATCH][next] KVM: s390: selftests: Fix spelling mistake "initally" -> "initially"
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH][next] KVM: s390: selftests: Fix spelling mistake "initally" -> "initially"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] vringh: IOMEM support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 0/2] KVM: x86: Report actual nent from KVM_GET_CPUID2
- From: Takahiro Itazuri <itazur@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 0/2] Fixing infinite loop on SCLP READ SCP INFO error
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/9] s390x: uv-host: Fixups and extensions part 1
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH] kvm: limit the maximum CPUID.0xA.edx[0..4] to 3
- From: Shiyuan Gao <gaoshiyuan@xxxxxxxxx>
- [PATCH] KVM: x86/vPMU: ignore the check of IA32_PERF_GLOBAL_CTRL bit35
- From: Gao Shiyuan <gaoshiyuan@xxxxxxxxx>
- Re: [RFC PATCH 4/5] KVM: TDX: Implement moving private pages between 2 TDs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- [PATCH v4 1/1] vringh: IOMEM support
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [PATCH v4 0/1] Introduce a vringh accessor for IO memory
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: VMX: Clean up of vmx_set_cr4()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/pmu: Remove redundant check for MSR_IA32_DS_AREA set handler
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: VMX: UMIP emulation related cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Refactor stable TSC check to use TEST_REQUIRE()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/2] selftests/kvm: Fixes for demand paging test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] selftests/kvm: touch all pages of args on each memstress iteration
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH][next] KVM: selftests: Fix spelling mistake "miliseconds" -> "milliseconds"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: SVM: Remove TSS reloading code after VMEXIT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/mmu: Add comment on try_cmpxchg64 usage in tdp_mmu_set_spte_atomic
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/mmu: Assert on @mmu in the __kvm_mmu_invalidate_addr()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 0/2] KVM: x86: Report actual nent from KVM_GET_CPUID2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/8] KVM: x86: Clean up MSR PAT handling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: x86: Fix poll command
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Protect vcpu->pid dereference via debugfs with RCU
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: Don't kfree(NULL) on kzalloc() failure in kvm_assign_ioeventfd_idx()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/2] KVM: SVM: Invoke trace_kvm_exit() for fastpath VM-Exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86: Account fastpath-only VM-Exits in vCPU stats
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: Fastpath accounting fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/3] KVM: x86/mmu: Trigger APIC-access page reload iff vendor code cares
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/3] KVM: x86: Use standard mmu_notifier invalidate hooks for APIC access page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/3] KVM: VMX: Retry APIC-access page reload if invalidation is in-progress
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/3] KVM: x86: Use "standard" mmu_notifier hook for APIC page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Use cpu_feature_enabled() for PKU instead of #ifdef
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Suraj Jitindar Singh <sjitindarsingh@xxxxxxxxx>
- [PATCH] KVM: x86/mmu: Grab memslot for correct address space in NX recovery worker
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- [PATCH v11 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 4/5] KVM: arm64: Reuse fields of sys_reg_desc for idreg
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- [PATCH v11 0/5] Support writable CPU ID registers from userspace
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v6 05/10] KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 0/6] LASS KVM virtualization support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [ANNOUNCE] KVM Microconference at LPC 2023
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH net] virtio/vsock: fix sock refcnt bug on owner set failure
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v2 3/3] KVM: selftests: Add test for race in kvm_recalculate_apic_map()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/22] Improve scalability of KVM + userfaultfd live migration via annotated memory faults.
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [ANNOUNCE] KVM Microconference at LPC 2023
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 05/22] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 03/34] s390: Use pt_frag_refcount for pagetables
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 05/22] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 05/22] KVM: Add KVM_CAP_MEMORY_FAULT_INFO
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2] selftests/kvm: Allow specify physical cpu list in demand paging test
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH] selftests/kvm: Allow specify physical cpu list in demand paging test
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: selftests: Print summary stats of memory latency distribution
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: selftests: Provide generic way to read system counter
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: vNMI pending bit is V_NMI_PENDING_MASK not V_NMI_BLOCKING_MASK
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: SVM: vNMI pending bit is V_NMI_PENDING_MASK not V_NMI_BLOCKING_MASK
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: vNMI pending bit is V_NMI_PENDING_MASK not V_NMI_BLOCKING_MASK
- From: "Maciej S. Szmigiero" <mail@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 2/2] s390x: sclp: Implement extended-length-SCCB facility
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 2/2] s390x: sclp: Implement extended-length-SCCB facility
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/2] Fixing infinite loop on SCLP READ SCP INFO error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/2] s390x: sclp: treat system as single processor when read_info is NULL
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 17/22] KVM: Introduce KVM_CAP_ABSENT_MAPPING_FAULT without implementation
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PULL 1/8] block: add blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 8/8] qapi: add '@fdset' feature for BlockdevOptionsVirtioBlkVhostVdpa
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 7/8] block/blkio: use qemu_open() to support fd passing for virtio-blk
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 6/8] block: remove bdrv_co_io_plug() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 4/8] block/io_uring: convert to blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 5/8] block/linux-aio: convert to blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 3/8] block/blkio: convert to blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 2/8] block/nvme: convert to blk_io_plug_call() API
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PULL 0/8] Block patches
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [PATCH v1 4/6] KVM: x86: Add emulator helper for LASS violation check
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 0/6] LASS KVM virtualization support
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 2/6] KVM: x86: Virtualize CR4.LASS
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 6/6] KVM: x86: Advertise LASS CPUID to user space
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 5/6] KVM: x86: LASS protection on KVM emulation
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 3/6] KVM: VMX: Add new ops in kvm_x86_ops for LASS violation check
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- [PATCH v1 1/6] KVM: x86: Consolidate flags for __linearize()
- From: Zeng Guang <guang.zeng@xxxxxxxxx>
- Re: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 25/34] m68k: Convert various functions to use ptdescs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6] vfio/cdx: add support for CDX bus
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- RE: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v3 03/34] s390: Use pt_frag_refcount for pagetables
- From: Gerald Schaefer <gerald.schaefer@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/2] s390x: sclp: consider monoprocessor on read_info error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [Bug 217516] FAIL: TSC reference precision test when do hyperv_clock test of kvm unit test
- From: bugzilla-daemon@xxxxxxxxxx
- [Bug 217516] New: FAIL: TSC reference precision test when do hyperv_clock test of kvm unit test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/17] arm64: Allow EL1 physical timer access when running VHE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/2] s390x: sclp: consider monoprocessor on read_info error
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v9 2/2] s390x: topology: Checking Configuration Topology Information
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3] KVM: selftests: Add new CFLAGS to generate dependency files
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Fabio Coatti <fabio.coatti@xxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [PATCH v3 25/34] m68k: Convert various functions to use ptdescs
- From: Vishal Moola <vishal.moola@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH net] virtio/vsock: fix sock refcnt bug on owner set failure
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/6] lib: s390x: introduce bitfield for PSW mask
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v3 25/34] m68k: Convert various functions to use ptdescs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 05/17] arm64: Don't enable VHE for the kernel if OVERRIDE_HVHE is set
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/6] lib: s390x: introduce bitfield for PSW mask
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/6] s390x: Add support for running guests without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/6] s390x: add function to set DAT mode for all interrupts
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 04/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [kvm-unit-tests PATCH v3 4/6] s390x: lib: don't forward PSW when handling exception in SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/6] s390x: sie: switch to home space mode before entering SIE
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 5/6] s390x: lib: sie: don't reenter SIE on pgm int
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 02/17] arm64: Add KVM_HVHE capability and has_hvhe() predicate
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [kvm-unit-tests PATCH v3 6/6] s390x: add a test for SIE without MSO/MSL
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/17] arm64: Allow EL1 physical timer access when running VHE
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- RE: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v6 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: selftests: Print summary stats of memory latency distribution
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH -next v20 03/26] riscv: hwprobe: Add support for probing V in RISCV_HWPROBE_KEY_IMA_EXT_0
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 22/34] csky: Convert __pte_free_tlb() to use ptdescs
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 08/13] x86/vdso: Fix gettimeofday masking
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/13] x86/vdso: Fix gettimeofday masking
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] selftests/kvm: Allow specify physical cpu list in demand paging test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: selftests: Add tests for vcpu_array[0] races
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio/pci-core: Add capability for AtomicOp copleter support
- From: Robin Voetter <robin@xxxxxxxxxxxxx>
- [PATCH v3 34/34] mm: Remove pgtable_{pmd, pte}_page_{ctor, dtor}() wrappers
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 33/34] um: Convert {pmd, pte}_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 14/34] powerpc: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 15/34] x86: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 32/34] sparc: Convert pgtable_pte_page_{ctor, dtor}() to ptdesc equivalents
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 31/34] sparc64: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 30/34] sh: Convert pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 29/34] riscv: Convert alloc_{pmd, pte}_late() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 28/34] openrisc: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 26/34] mips: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 27/34] nios2: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 25/34] m68k: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 24/34] loongarch: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 23/34] hexagon: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 22/34] csky: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 21/34] arm64: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 20/34] arm: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 19/34] pgalloc: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 18/34] mm: Remove page table members from struct page
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 17/34] s390: Convert various pgalloc functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 16/34] s390: Convert various gmap functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 13/34] mm: Create ptdesc equivalents for pgtable_{pte,pmd}_page_{ctor,dtor}
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 12/34] mm: Convert ptlock_free() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 11/34] mm: Convert pmd_ptlock_free() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 10/34] mm: Convert ptlock_init() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 09/34] mm: Convert pmd_ptlock_init() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 08/34] mm: Convert ptlock_ptr() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 07/34] mm: Convert ptlock_alloc() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 06/34] mm: Convert pmd_pgtable_page() to pmd_ptdesc()
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 05/34] mm: add utility functions for ptdesc
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 04/34] pgtable: Create struct ptdesc
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 02/34] s390: Use _pt_s390_gaddr for gmap address tracking
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 00/34] Split ptdesc from struct page
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 03/34] s390: Use pt_frag_refcount for pagetables
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v3 01/34] mm: Add PAGE_TYPE_OP folio functions
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH mm-unstable v2 05/10] kvm/arm64: add kvm_arch_test_clear_young()
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: selftests: Print summary stats of memory latency distribution
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 1/2] KVM: selftests: Provide generic way to read system counter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 5/6] arm: pmu: Add pmu-memaccess-reliability test
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 4/6] arm: pmu: Fix chain counter enable/disable sequences
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 6/6] arm: pmu-chain-promotion: Increase the count and margin values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/6] arm: pmu: pmu-chain-promotion: Improve debug messages
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/6] arm: pmu: Add extra DSB barriers in the mem_access loop
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/6] arm: pmu: pmu-chain-promotion: Introduce defines for count and margin values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/6] arm: pmu: Fix chain counter enable/disable sequences
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 5/6] arm: pmu: Add pmu-mem-access-reliability test
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/6] arm: pmu: Fix random failures of pmu-chain-promotion
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/6] arm: pmu: Add extra DSB barriers in the mem_access loop
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH mm-unstable v2 05/10] kvm/arm64: add kvm_arch_test_clear_young()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH net] virtio/vsock: fix sock refcnt bug on owner set failure
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH mm-unstable v2 02/10] mm/kvm: use mmu_notifier_ops->test_clear_young()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH mm-unstable v2 01/10] mm/kvm: add mmu_notifier_ops->test_clear_young()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v6 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PULL v2 02/16] block/file-posix: introduce helper functions for sysfs attributes
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [ANNOUNCE] PUCK Notes - 2023.05.31 - guest_memfd()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH RFC net-next v3 6/8] virtio/vsock: support dgrams
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: Deadlock due to EPT_VIOLATION
- From: Brian Rak <brak@xxxxxxxxx>
- Re: [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v6 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH RFC net-next v3 7/8] vsock: Add lockless sendmsg() support
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH RFC net-next v3 6/8] virtio/vsock: support dgrams
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: VMX: restore vmx_vmexit alignment
- From: Jon Kohler <jon@xxxxxxxxxxx>
- RE: [RFC PATCH V6 02/14] x86/sev: Add Check of #HV event in path
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH RFC net-next v3 1/8] vsock/dgram: generalize recvmsg and drop transport->dgram_dequeue
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [RFC PATCH V6 02/14] x86/sev: Add Check of #HV event in path
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4] vfio/pci: Propagate ACPI notifications to user-space via eventfd
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 08/13] x86/vdso: Fix gettimeofday masking
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH v4] KVM: VMX: do not disable interception for MSR_IA32_SPEC_CTRL on eIBRS
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH] KVM: VMX: remove LFENCE in vmx_spec_ctrl_restore_host()
- From: Jon Kohler <jon@xxxxxxxxxxx>
- RE: [RFC PATCH V6 02/14] x86/sev: Add Check of #HV event in path
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/9] s390x: uv-host: Fixups and extensions part 1
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/7] lib: s390x: uv: Introduce UV validity function
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] s390/vfio-ap: Wire in the vfio_device_ops request callback
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- Re: [PATCH 2/3] vfio: ap: realize the VFIO_DEVICE_SET_IRQS ioctl
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- Re: [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Cédric Le Goater <clegoate@xxxxxxxxxx>
- [PATCH v7] vfio/cdx: add support for CDX bus
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- Re: [PATCH v3 1/6] kvm: determine memory type from VMA
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [kvm-unit-tests PATCH v1] runtime: don't run pv-host tests when gen-se-header is unavailable
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 0/7] s390x: Add PV SIE intercepts and ipl tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests] arm/arm64: psci_cpu_on_test failures with tcg
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v1] runtime: don't run pv-host tests when gen-se-header is unavailable
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.4, take #3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH RFCv2 24/24] iommu/arm-smmu-v3: Advertise IOMMU_DOMAIN_F_ENFORCE_DIRTY
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [RFC PATCH V6 01/14] x86/sev: Add a #HV exception handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: arm64: Use TLBI range-based intructions for unmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v4 8/8] target/i386/intel-pt: Access MSR_IA32_RTIT_ADDRn based on guest CPUID configuration
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 7/8] target/i386/intel-pt: Define specific PT feature set for IceLake-server, Snowridge and SapphireRapids
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 5/8] target/i386/intel-pt: Rework/rename the default INTEL-PT feature set
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 3/8] target/i386/intel-pt: Introduce FeatureWordInfo for Intel PT CPUID leaf 0x14
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 2/8] target/i386/intel-pt: Fix INTEL_PT_ADDR_RANGES_NUM_MASK
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 1/8] target/i386: Print CPUID subleaf info for unsupported feature
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v4 0/8] i386: Make Intel PT configurable
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3] KVM: x86/pmu: Add documentation for fixed ctr on PMU filter
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- Re: [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 02/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/2] s390x: sclp: consider monoprocessor on read_info error
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 003/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 07/21] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH RFC net-next v3 8/8] tests: add vsock dgram tests
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 2/8] vsock: refactor transport lookup code
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 3/8] vsock: support multi-transport datagrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 5/8] virtio/vsock: add VIRTIO_VSOCK_F_DGRAM feature bit
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 4/8] vsock: make vsock bind reusable
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 1/8] vsock/dgram: generalize recvmsg and drop transport->dgram_dequeue
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 6/8] virtio/vsock: support dgrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 0/8] virtio/vsock: support datagrams
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- [PATCH RFC net-next v3 7/8] vsock: Add lockless sendmsg() support
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- RE: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Leo Li <leoyang.li@xxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: MAINTAINERS: note that linux-kvm.org isn't current
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/9] KVM: x86: Add new hypercall to lock control registers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH 1/3] vfio: ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 3/3] s390/vfio-ap: Wire in the vfio_device_ops request callback
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 2/3] vfio: ap: realize the VFIO_DEVICE_SET_IRQS ioctl
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 0/3] s390/vfio-ap: fix hang when mdev attached to guest is removed
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v14 000/113] KVM TDX basic feature support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: arm64: Use TLBI range-based intructions for unmap
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH v10 5/5] KVM: arm64: Refactor writings for PMUVer/CSV2/CSV3
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: arm64: Implement __kvm_tlb_flush_vmid_range()
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- [PATCH] x86/fpu/xstate: clear XSAVE features if DISABLED_MASK set
- From: Jon Kohler <jon@xxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 02/17] arm64: Prevent the use of is_kernel_in_hyp_mode() in hypervisor code
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH mm-unstable v2 04/10] kvm/arm64: make stage2 page tables RCU safe
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH RFCv2 24/24] iommu/arm-smmu-v3: Advertise IOMMU_DOMAIN_F_ENFORCE_DIRTY
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [RFC PATCH V6 01/14] x86/sev: Add a #HV exception handler
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH V6 01/14] x86/sev: Add a #HV exception handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: Deadlock due to EPT_VIOLATION
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 3/5] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v10 2/5] KVM: arm64: Use per guest ID register for ID_AA64PFR0_EL1.[CSV2|CSV3]
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v10 1/5] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Deadlock due to EPT_VIOLATION
- From: Brian Rak <brak@xxxxxxxxx>
- Re: [PATCH v2] x86/msr: Allow unprivileged read access to some MSRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] x86/msr: Allow unprivileged read access to some MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH -next v20 11/26] riscv: Allocate user's vector context in the first-use trap
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: michael.christie@xxxxxxxxxx
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [kvm-unit-tests PATCH v6 32/32] arm64: Use the provided fdt when booting through EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 27/32] lib: Avoid external dependency in libelf
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 30/32] arm64: debug: Make inline assembly symbols global
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 24/32] arm64: Copy code from GNU-EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 22/32] arm64: Add a new type of memory type flag MR_F_RESERVED
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 31/32] arm64: Add an efi/run script
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 26/32] arm64: Use code from the gnu-efi when booting with EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 20/32] arm/arm64: Rename etext to _etext
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 29/32] lib: arm: Print test exit status
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 16/32] lib/printf: Support for precision modifier in printf
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 23/32] arm64: Add a setup sequence for systems that boot through EFI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 19/32] lib/efi: Add support for reading an FDT
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 28/32] arm64: Add support for efi in Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 17/32] lib/printf: Add support for printing wide strings
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 21/32] lib: Avoid ms_abi for calls related to EFI on arm64
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 25/32] arm64: Change GNU-EFI imported code to use defined types
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 15/32] arm64: Add support for gic initialization through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 18/32] lib/efi: Add support for getting the cmdline
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 13/32] arm64: Add support for timer initialization through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 14/32] arm64: Add support for cpu initialization through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 11/32] arm64: Add support for setting up the PSCI conduit through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 09/32] lib/acpi: Extend the definition of the FADT table
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 12/32] arm64: Add support for discovering the UART through ACPI
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 07/32] lib/acpi: Ensure all struct definition for ACPI tables are packed
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 08/32] lib/acpi: Add support for the XSDT table
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 10/32] devicetree: Check that fdt is not NULL in dt_available()
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 05/32] lib/acpi: Convert table names to Linux style
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 06/32] x86: Avoid references to fields of ACPI tables
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 04/32] lib: Fix style for acpi.{c,h}
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 03/32] lib: Apply Lindent to acpi.{c,h}
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 01/32] lib: Move acpi header and implementation to lib
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 02/32] x86: Move x86_64-specific EFI CFLAGS to x86_64 Makefile
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- [kvm-unit-tests PATCH v6 00/32] EFI and ACPI support for arm64
- From: Nikos Nikoleris <nikos.nikoleris@xxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [RFC PATCH V6 01/14] x86/sev: Add a #HV exception handler
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Mike Christie <michael.christie@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC PATCH V6 01/14] x86/sev: Add a #HV exception handler
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [RFC PATCH V6 01/14] x86/sev: Add a #HV exception handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH RFCv2 24/24] iommu/arm-smmu-v3: Advertise IOMMU_DOMAIN_F_ENFORCE_DIRTY
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v2 8/8] KVM: selftests: Test consistency of PMU MSRs with Intel PMU version
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH v2 7/8] KVM: selftests: Test Intel supported fixed counters bit mask
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH v2 4/8] KVM: selftests: Test Intel PMU architectural events on fixed counters
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH v2 6/8] KVM: selftests: Test consistency of CPUID with num of fixed counters
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH v2 2/8] KVM: selftests: Add pmu.h for PMU events and common masks
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH v2 5/8] KVM: selftests: Test consistency of CPUID with num of gp counters
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH v2 1/8] KVM: selftests: KVM: selftests: Add macros for fixed counters in processor.h
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH v2 3/8] KVM: selftests: Test Intel PMU architectural events on gp counters
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [PATCH v2 0/8] KVM: selftests: Test the consistency of the PMU's CPUID and its features
- From: Jinrong Liang <ljr.kernel@xxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/2] s390x: sclp: consider monoprocessor on read_info error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/2] Fixing infinite loop on SCLP READ SCP INFO error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/2] s390x: sclp: consider monoprocessor on read_info error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/2] s390x: sclp: Implement SCLP_RC_INSUFFICIENT_SCCB_LENGTH
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/2] Fixing infinite loop on SCLP READ SCP INFO error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH V6 01/14] x86/sev: Add a #HV exception handler
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v3 07/21] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: sclp: consider monoprocessor on read_info error
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: WARNING trace at kvm_nx_huge_page_recovery_worker on 6.3.4
- From: Fabio Coatti <fabio.coatti@xxxxxxxxx>
- [PATCH v2] x86/msr: Allow unprivileged read access to some MSRs
- From: Tim Wiederhake <twiederh@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH -next v20 10/26] riscv: Add task switch support for vector
- From: Andy Chiu <andy.chiu@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/9] Hypervisor-Enforced Kernel Integrity
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH kernel v5 5/6] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 2/2] arm64: Notify on pte permission upgrades
- From: Alistair Popple <apopple@xxxxxxxxxx>
- RE: [PATCH v14 000/113] KVM TDX basic feature support
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- [syzbot] [kvm?] [net?] [virt?] general protection fault in vhost_work_queue
- From: syzbot <syzbot+d0d442c22fa8db45ff0e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH v6 09/10] KVM: x86/svm/pmu: Add AMD PerfMonV2 support
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 10/10] KVM: x86/cpuid: Add AMD CPUID ExtPerfMonAndDbg leaf 0x80000022
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 08/10] KVM: x86/cpuid: Add a KVM-only leaf to redirect AMD PerfMonV2 flag
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 07/10] KVM: x86/pmu: Constrain the num of guest counters with kvm_pmu_cap
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 06/10] KVM: x86/pmu: Forget PERFCTR_CORE if the min num of counters isn't met
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 05/10] KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 04/10] KVM: x86: Explicitly zero cpuid "0xa" leaf when PMU is disabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 03/10] KVM: x86/pmu: Make part of the Intel v2 PMU MSRs handling x86 generic
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 02/10] KVM: x86/pmu: Return #GP if user sets the GLOBAL_STATUS reserved bits
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 01/10] KVM: x86/pmu: Expose reprogram_counters() in pmu.h
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v6 00/10] KVM: x86: Add AMD Guest PerfMonV2 PMU support
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- RE: [PATCH v6 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v3 07/21] KVM:x86: Refresh CPUID on write to guest MSR_IA32_XSS
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH v5 4/4] x86: Add test case for INVVPID with LAM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v5 3/4] x86: Add test cases for LAM_{U48,U57}
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v5 2/4] x86: Add test case for LAM_SUP
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v5 1/4] x86: Allow setting of CR3 LAM bits if LAM supported
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v5 0/4] x86: Add test cases for LAM
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [PATCH v12 11/31] LoongArch: KVM: Implement fpu related operations for vcpu
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86/mmu: add a new mmu zap helper to indicate memtype changes
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v12 23/31] LoongArch: KVM: Implement handle gspr exception
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 31/31] LoongArch: KVM: Add maintainers for LoongArch KVM
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 27/31] LoongArch: KVM: Implement vcpu world switch
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 30/31] LoongArch: KVM: Supplement kvm document about LoongArch-specific part
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 29/31] LoongArch: KVM: Enable kvm config and add the makefile
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 18/31] LoongArch: KVM: Implement vcpu timer operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 26/31] LoongArch: KVM: Implement kvm exception vector
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 24/31] LoongArch: KVM: Implement handle mmio exception
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 28/31] LoongArch: KVM: Implement probe virtualization when LoongArch cpu init
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 21/31] LoongArch: KVM: Implement handle iocsr exception
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 19/31] LoongArch: KVM: Implement kvm mmu operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 22/31] LoongArch: KVM: Implement handle idle exception
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 25/31] LoongArch: KVM: Implement handle fpu exception
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 14/31] LoongArch: KVM: Implement vcpu load and vcpu put operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 17/31] LoongArch: KVM: Implement virtual machine tlb operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 20/31] LoongArch: KVM: Implement handle csr excption
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 13/31] LoongArch: KVM: Implement misc vcpu related interfaces
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 15/31] LoongArch: KVM: Implement vcpu status description
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 16/31] LoongArch: KVM: Implement update VM id function
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 12/31] LoongArch: KVM: Implement vcpu interrupt operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 09/31] LoongArch: KVM: Implement vcpu get, vcpu set registers
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 05/31] LoongArch: KVM: Add vcpu related header files
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 10/31] LoongArch: KVM: Implement vcpu ENABLE_CAP ioctl interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 07/31] LoongArch: KVM: Implement vcpu run interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 06/31] LoongArch: KVM: Implement vcpu create and destroy interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 08/31] LoongArch: KVM: Implement vcpu handle exit interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 01/31] LoongArch: KVM: Add kvm related header files
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 00/31] Add KVM LoongArch support
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 04/31] LoongArch: KVM: Implement VM related functions
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 02/31] LoongArch: KVM: Implement kvm module related interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- [PATCH v12 03/31] LoongArch: KVM: Implement kvm hardware enable, disable interface
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- Re: [PATCH v2 5/6] KVM: x86: Keep a per-VM MTRR state
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- RDMA migration is slower than TCP
- From: Roja Eswaran <reswara1@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v3 01/10] iommufd: Add data structure for Intel VT-d stage-1 domain allocation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 01/10] iommufd: Add data structure for Intel VT-d stage-1 domain allocation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Add Intel VT-d nested translation
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] vfio: Fixup kconfig ordering for VFIO_PCI_CORE
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/nvgpu: Add vfio pci variant module for grace hopper
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH] kvm: fix multiple SIMD prefixes decoding
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH v1 5/9] KVM: x86: Add new hypercall to lock control registers
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 3/9] virt: Implement Heki common code
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH V5 05/10] KVM: x86/pmu: Disable vPMU if the minimum num of counters isn't met
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v4 6/6] KVM: arm64: Use TLBI range-based intructions for unmap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 3/6] KVM: arm64: Implement kvm_arch_flush_remote_tlbs_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: arm64: Implement __kvm_tlb_flush_vmid_range()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [Bug] AMD nested: commit broke VMware
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 0/4] KVM: arm64: PMU: Fix PMUVer handling on heterogeneous PMU systems
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [Bug] AMD nested: commit broke VMware
- From: jwarren@xxxxxxxxxxxx
- Re: [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
- From: Haibo Xu <xiaobo55x@xxxxxxxxx>
- Re: [PATCH v7 0/1] arm: enable MTE for QEMU + kvm
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v7 0/1] arm: enable MTE for QEMU + kvm
- From: Andrea Bolognani <abologna@xxxxxxxxxx>
- Re: [PATCH v6] vfio/cdx: add support for CDX bus
- From: Nipun Gupta <nipun.gupta@xxxxxxx>
- Re: [PATCH v2 11/11] KVM: riscv: selftests: Add get-reg-list test
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v14 075/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 087/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 102/113] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 077/113] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 108/113] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 104/113] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 097/113] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 078/113] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 111/113] RFC: KVM: x86, TDX: Add check for setting CPUID
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 098/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 110/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 079/113] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 099/113] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 094/113] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 092/113] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 091/113] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 112/113] RFC: KVM: TDX: Make busy with S-EPT on entry bug
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 109/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 080/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 085/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 103/113] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 084/113] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 086/113] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 082/113] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 093/113] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 088/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 076/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 090/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 073/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 095/113] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 089/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 101/113] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 106/113] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 100/113] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 096/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 074/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 107/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 105/113] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 071/113] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 083/113] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 081/113] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 072/113] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 070/113] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 069/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 057/113] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 064/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 067/113] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 063/113] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 068/113] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 060/113] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 065/113] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 061/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 059/113] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 066/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 058/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 062/113] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 055/113] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 056/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 054/113] KVM: TDX: Require TDP MMU and mmio caching for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 053/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 052/113] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 051/113] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 050/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 049/113] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 048/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 044/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 045/113] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 043/113] KVM: Add flags to struct kvm_gfn_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 042/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 041/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 040/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 039/113] KVM: x86/mmu: Assume guest MMIOs are shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 038/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 037/113] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 034/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 030/113] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 031/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 036/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 035/113] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 033/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 032/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 014/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 016/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 023/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 013/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 024/113] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 015/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 017/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 012/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 018/113] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 020/113] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 022/113] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 019/113] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 025/113] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 010/113] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 006/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 008/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 007/113] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 009/113] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 000/113] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v14 002/113] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
- From: isaku.yamahata@xxxxxxxxx
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]