Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v11 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 107/113] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 008/113] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 009/113] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 004/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 110/113] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 099/113] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 097/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 007/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 000/113] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 006/113] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 005/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 103/113] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 109/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 106/113] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 003/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 101/113] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 100/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 102/113] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 104/113] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 098/113] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 094/113] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 091/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 095/113] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 093/113] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 096/113] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 092/113] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 087/113] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 089/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 083/113] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 085/113] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 090/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 086/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 076/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 084/113] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 080/113] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 078/113] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 081/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 088/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 082/113] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 073/113] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 077/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 079/113] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 074/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 075/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 070/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 072/113] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v11 071/113] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: Ensure lockdep knows about kvm->lock vs. vcpu->mutex ordering rule
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v10 000/108] KVM TDX basic feature support
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: x86/xen: Fix lockdep warning on "recursive" gpc locking
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [PATCH] KVM: arm64: vgic-v3: Limit IPI-ing when accessing GICR_{C,S}ACTIVER0
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] KVM: arm64: Kill CPACR_EL1_TTA definition
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/7] s390x: snippets: c: Cleanup flat.lds
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/7] s390x: snippets: Fix SET_PSW_NEW_ADDR macro
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/11] RISC-V: KVM: Disable all hpmcounter access for VS/VU mode
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 7/7] lib: s390x: Handle debug prints for SIE exceptions correctly
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 6/7] s390x: Clear first stack frame and end backtrace early
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/7] s390x: Add a linker script to assembly snippets
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/7] s390x: Cleanup flat.lds
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 5/7] lib: s390x: sie: Set guest memory pointer
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/7] s390x: Snippet fixes
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v2 07/11] RISC-V: KVM: Add SBI PMU extension support
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 06/11] RISC-V: KVM: Add skeleton support for perf
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH] MAINTAINERS: step down as vfio reviewer
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 7/7] RISC-V: KVM: Implement guest external interrupt line management
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 6/7] RISC-V: KVM: Virtualize per-HART AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 5/7] RISC-V: KVM: Add ONE_REG interface for AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 4/7] RISC-V: KVM: Initial skeletal support for AIA
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 2/7] RISC-V: Detect AIA CSRs from ISA string
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 3/7] RISC-V: KVM: Drop the _MASK suffix from hgatp.VMID mask defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 1/7] RISC-V: Add AIA related CSR defines
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- [PATCH 0/7] RISC-V KVM virtualize AIA CSRs
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Reduce overhead of trapped timer sysreg accesses
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Don't arm a hrtimer for an already pending timer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: timers: Don't BUG() on unhandled timer trap
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: timer fixes and optimisations
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v14 11/11] docs/s390x/cpu topology: document s390x cpu topology
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH v14 10/11] qapi/s390/cpu topology: POLARITY_CHANGE qapi event
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 09/11] qapi/s390/cpu topology: monitor query topology information
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 11/11] docs/s390x/cpu topology: document s390x cpu topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH kernel v2 1/3] x86/amd: Cache values in percpu variables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 04/11] RISC-V: KVM: Modify SBI extension handler to return SBI error code
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v2 03/11] RISC-V: KVM: Return correct code for hsm stop function
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/11] RISC-V: KVM: Define a probe function for SBI extension data structures
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 01/11] RISC-V: Define helper functions expose hpm counter width and count
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] configure: Show the option in case it is not known
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] arm: Replace MAX_SMP probe loop in favor of reading directly
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: x86/xen: Avoid deadlock by adding kvm->arch.xen.xen_lock leaf node lock
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] arm: Replace MAX_SMP probe loop in favor of reading directly
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [PATCH v5] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Yu Zhao <yuzhao@xxxxxxxxxx>
- Re: [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v3 10/13] riscv: alternative: patch alternatives in the vDSO
- From: Conor Dooley <conor.dooley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/4] arm: pmu: Prepare for testing 64-bit overflows
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH kernel v2 1/3] x86/amd: Cache values in percpu variables
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH] vhost-scsi: unbreak any layout for response
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v10 021/108] KVM: TDX: initialize VM with TDX specific parameters
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v2 00/15] Introduce Architectural LBR for vPMU
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Pedro Falcato <pedro.falcato@xxxxxxxxx>
- Re: [PATCH rcu 01/27] arch/x86: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 01/13] riscv: fix jal offsets in patched alternatives
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.2, take #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 4/4] KVM: x86/xen: Avoid deadlock by adding kvm->arch.xen.xen_lock leaf node lock
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 6/7] x86/cpu: Support AMD Automatic IBRS
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 005/108] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Erdem Aktas <erdemaktas@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/1] Replace MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/1] arm: Replace MAX_SMP probe loop in favor of reading directly
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [Patch v2] KVM: selftests: Make reclaim_period_ms input always be positive
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1] drm/ttm: Refcount allocated tail pages
- From: Dmitry Osipenko <dmitry.osipenko@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vhost-scsi: unbreak any layout for response
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- [Patch v2] KVM: selftests: Make reclaim_period_ms input always be positive
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH] Documentation: kvm: fix SRCU locking order docs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH iommufd v3 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 6/9] irq: Rename IRQ_DOMAIN_MSI_REMAP to IRQ_DOMAIN_ISOLATED_MSI
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 5/9] irq: Remove unused irq_domain_check_msi_remap() code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 1/9] irq: Add msi_device_has_isolated_msi()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/13] riscv: switch to relative alternative entries
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 4/4] KVM: x86/xen: Avoid deadlock by adding kvm->arch.xen.xen_lock leaf node lock
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 3/4] KVM: Ensure lockdep knows about kvm->lock vs. vcpu->mutex ordering rule
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH v2 1/4] KVM: x86/xen: Fix lockdep warning on "recursive" gpc locking
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 01/13] riscv: fix jal offsets in patched alternatives
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 04/11] s390x/sclp: reporting the maximum nested topology entries
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH v3 13/13] riscv: remove riscv_isa_ext_keys[] array and related usage
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 07/13] riscv: fpu: switch has_fpu() to riscv_has_extension_likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 09/13] riscv: switch to relative alternative entries
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 10/13] riscv: alternative: patch alternatives in the vDSO
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 05/13] riscv: cpufeature: extend riscv_cpufeature_patch_func to all ISA extensions
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 06/13] riscv: introduce riscv_has_extension_[un]likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 12/13] riscv: KVM: Switch has_svinval() to riscv_has_extension_unlikely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 11/13] riscv: cpu_relax: switch to riscv_has_extension_likely()
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 08/13] riscv: module: move find_section to module.h
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 04/13] riscv: hwcap: make ISA extension ids can be used in asm
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 03/13] riscv: cpufeature: detect RISCV_ALTERNATIVES_EARLY_BOOT earlier
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 02/13] riscv: move riscv_noncoherent_supported() out of ZICBOM probe
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 01/13] riscv: fix jal offsets in patched alternatives
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- [PATCH v3 00/13] riscv: improve boot time isa extensions handling
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v1] drm/ttm: Refcount allocated tail pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1] drm/ttm: Refcount allocated tail pages
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4] x86/sev: Add SEV-SNP guest feature negotiation support
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v4 2/2] qtests/arm: add some mte tests
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v4 1/2] arm/kvm: add support for MTE
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- [PATCH v4 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v4] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 14/64] x86/sev: Add the host SEV-SNP initialization support
- From: Sabin Rapan <sabrapan@xxxxxxxxxx>
- Re: [PATCH RFC v7 47/64] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Tom Dohrmann <erbse.13@xxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 10/13] riscv: alternative: patch alternatives in the vDSO
- From: Andrew Jones <ajones@xxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v7 39/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Harald Hoyer <harald@xxxxxxxxxxx>
- Re: [PATCH RFC v7 39/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Tom Dohrmann <erbse.13@xxxxxx>
- Re: [PATCH RFC v7 49/64] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Sabin Rapan <sabrapan@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Sabin Rapan <sabrapan@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v5 00/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] Documentation: kvm: clarify SRCU locking order
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 08/11] qapi/s390/cpu topology: change-topology monitor command
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH] vhost: remove unused paramete
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [PATCH v14 07/11] target/s390x/cpu topology: activating CPU topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v7 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v7 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- [PATCH 2/3] KVM: x86/xen: Fix potential deadlock in kvm_xen_update_runstate_guest()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH 3/3] KVM: Ensure lockdep knows about kvm->lock vs. vcpu->mutex ordering rule
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janosch Frank <frankja@xxxxxxxxxxxxx>
- Re: [PATCH v14 02/11] s390x/cpu topology: add topology entries on CPU hotplug
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: "Linux kernel regression tracking (#adding)" <regressions@xxxxxxxxxxxxx>
- Re: [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 04/11] s390x/sclp: reporting the maximum nested topology entries
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v14 05/11] s390x/cpu topology: resetting the Topology-Change-Report
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] vhost: remove unused paramete
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Stalls in qemu with host running 6.1 (everything stuck at mmap_read_lock())
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- [PATCH v4] x86/sev: Add SEV-SNP guest feature negotiation support
- From: Nikunj A Dadhania <nikunj@xxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- [PATCH] vhost-scsi: unbreak any layout for response
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH v2] vfio: Support VFIO_NOIOMMU with iommufd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 4/9] vringh: unify the APIs for all accessors
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] vringh: remove vringh_iov and unite to vringh_kiov
- From: Shunsuke Mie <mie@xxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [Bug 216910] New: Test Assertion failure in kvm selftest rseq_test
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [Patch] KVM: selftests: Make reclaim_period_ms input always be positive
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [V5 PATCH 3/3] KVM: selftests: x86: Use host's native hypercall instruction in kvm_hypercall()
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V5 PATCH 2/3] KVM: selftests: x86: Cache host CPU vendor (AMD vs. Intel)
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V5 PATCH 1/3] KVM: selftests: x86: Use "this_cpu" prefix for cpu vendor queries
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V5 PATCH 0/3] Execute hypercalls according to host cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [V4 PATCH 4/4] KVM: selftests: x86: Invoke kvm hypercall as per host cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [V4 PATCH 2/4] KVM: selftests: x86: Add variables to store cpu type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [V4 PATCH 1/4] KVM: selftests: x86: use this_cpu_* helpers
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [PATCH v6 7/7] x86/cpu, kvm: Propagate the AMD Automatic IBRS feature to the guest
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v6 4/7] x86/cpu, kvm: Add the Null Selector Clears Base feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v6 5/7] x86/cpu, kvm: Add the SMM_CTL MSR not present feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v6 6/7] x86/cpu: Support AMD Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v6 3/7] x86/cpu, kvm: Move the LFENCE_RDTSC / LFENCE always serializing feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v6 2/7] x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v6 1/7] x86/cpufeatures: Add support for cpuid leaf 80000021/EAX (FeatureExt2Eax)
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v6 1/7] x86/cpu, kvm: Add support for cpuid leaf 80000021/EAX (FeatureExt2Eax)
- From: Kim Phillips <kim.phillips@xxxxxxx>
- [PATCH v6 0/7] x86/cpu, kvm: Support AMD Automatic IBRS
- From: Kim Phillips <kim.phillips@xxxxxxx>
- Re: [Patch] KVM: selftests: Make reclaim_period_ms input always be positive
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [Patch] KVM: selftests: Make reclaim_period_ms input always be positive
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [PATCH v5 02/10] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 03/10] KVM: s390: selftest: memop: Pass mop_desc via pointer
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 05/10] KVM: s390: selftest: memop: Move testlist into main
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 01/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 04/10] KVM: s390: selftest: memop: Replace macros by functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 00/10] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 09/10] KVM: s390: selftest: memop: Fix wrong address being used in test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 07/10] KVM: s390: selftest: memop: Add bad address test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 08/10] KVM: s390: selftest: memop: Fix typo
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 10/10] KVM: s390: selftest: memop: Fix integer literal
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v5 06/10] KVM: s390: selftest: memop: Add cmpxchg tests
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v2] vfio: Support VFIO_NOIOMMU with iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kernel v2 3/3] x86/sev: Do not handle #VC for DR7 read/write
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH rcu 01/27] arch/x86: Remove "select SRCU"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/7] Enable LASS (Linear Address space Separation)
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH V6.1 7/7] KVM: selftests: Add simple sev vm testing
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86: update APIC_ID also when disabling x2APIC in kvm_lapic_set_baseg
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH 4/4] KVM: selftests: x86: Repeat the checking of xheader when IA32_XFD[18] is set in amx_test
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 1/4] KVM: selftests: x86: Fix an error in comment of amx_test
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 0/4] Add extra checkings to amx_test
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 3/4] KVM: selftests: x86: Enable checking on xcomp_bv in amx_test
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- [PATCH 2/4] KVM: selftests: x86: Add check of IA32_XFD in amx_test
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH] vfio: Support VFIO_NOIOMMU with iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH V6 7/7] KVM: selftests: Add simple sev vm testing
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 4/7] KVM: selftests: add support for protected vm_vaddr_* allocations
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 6/7] KVM: selftests: Update ucall pool to allocate from shared memory
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 3/7] KVM: selftests: handle protected bits in page tables
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 2/7] KVM: selftests: add hooks for managing protected guest memory
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 1/7] KVM: selftests: sparsebit: add const where appropriate
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 0/7] KVM: selftests: Add simple SEV test
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH kernel v2 0/3] KVM: SEV: Enable AMD SEV-ES DebugSwap
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: Define kvm_flush_remote_tlbs_range
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH] KVM: sev: Fix int overflow in send|recieve_update_data ioctls
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH] KVM: sev: Fix int overflow in send|recieve_update_data ioctls
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH V6 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 0/7] KVM: selftests: Add simple SEV test
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 1/7] KVM: selftests: sparsebit: add const where appropriate
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 6/7] KVM: selftests: Update ucall pool to allocate from shared memory
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 7/7] KVM: selftests: Add simple sev vm testing
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 4/7] KVM: selftests: add support for protected vm_vaddr_* allocations
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 2/7] KVM: selftests: add hooks for managing protected guest memory
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH V6 3/7] KVM: selftests: handle protected bits in page tables
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] KVM: sev: Fix int overflow in send|recieve_update_data ioctls
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [PATCH v3 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- [PATCH v3 0/1] vfio/type1: Fix vfio-pci pass-through of ISM devices
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: sev: Fix int overflow in send|recieve_update_data ioctls
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/4] vfio-mdev: move the mtty usage documentation
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 4/4] vfio-mdev: remove an non-existing driver from vfio-mediated-device
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 2/4] vfio-mdev: turn VFIO_MDEV into a selectable symbol
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/4] vfio-mdev: allow building the samples into the kernel
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH kernel v2 1/3] x86/amd: Cache values in percpu variables
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH net-next v9] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 1/4] vfio-mdev: allow building the samples into the kernel
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86: update APIC_ID also when disabling x2APIC in kvm_lapic_set_base
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- RE: [PATCH v4 00/17] IOMMUFD Generic interface
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH] Documentation: KVM: fix typos in running-nested-guests.rst
- From: Kashyap Chamarthy <kchamart@xxxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/4] vfio-mdev: allow building the samples into the kernel
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH] KVM: x86/xen: Fix lockdep warning on "recursive" gpc locking
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 00/17] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 00/17] IOMMUFD Generic interface
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] Documentation: KVM: fix typos in running-nested-guests.rst
- From: Wang Yong <yongw.kernel@xxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/4] vfio-mdev: allow building the samples into the kernel
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] vfio-mdev: turn VFIO_MDEV into a selectable symbol
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] KVM: x86: Clear all supported MPX xfeatures if they are not all set
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 4/4] vfio-mdev: remove an non-existing driver from vfio-mediated-device
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH net-next v9] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH v14 03/11] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86: update APIC_ID also when disabling x2APIC in kvm_lapic_set_base
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v4 00/17] IOMMUFD Generic interface
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v14 02/11] s390x/cpu topology: add topology entries on CPU hotplug
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 0/3] KVM: arm64: nv: Fixes for Nested Virtualization issues
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86: update APIC_ID also when disabling x2APIC in kvm_lapic_set_base
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v14 01/11] s390x/cpu topology: adding s390 specificities to CPU topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- RE: [PATCH v4 00/17] IOMMUFD Generic interface
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 14/16] x86/virt/tdx: Initialize all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH] kvm: remove a semicolon
- From: Li zeming <zeming@xxxxxxxxxxxx>
- Re: [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH net-next v9] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH 4/4] vfio-mdev: remove an non-existing driver from vfio-mediated-device
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 1/4] vfio-mdev: allow building the samples into the kernel
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/4] vfio-mdev: turn VFIO_MDEV into a selectable symbol
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 3/4] vfio-mdev: move the mtty usage documentation
- From: Christoph Hellwig <hch@xxxxxx>
- misc mdev tidyups
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 2/3] KVM: arm64: nv: Emulate ISTATUS when emulated timers are fired.
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v9] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- RE: [PATCH] vfio: Support VFIO_NOIOMMU with iommufd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 1/7] KVM: arm64: PMU: Have reset_pmu_reg() to clear a register
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- RE: [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 08/12] vfio: Add infrastructure for bind_iommufd and attach
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] vhost: remove unused paramete
- From: liming.wu@xxxxxxxxxxxxxxx
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH 4/4] KVM: selftests: aarch64: Test read-only PT memory regions
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 2/4] KVM: selftests: aarch64: Do not default to dirty PTE pages on all S1PTWs
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 3/4] KVM: selftests: aarch64: Fix check of dirty log PT write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 1/4] KVM: selftests: aarch64: Relax userfaultfd read vs. write checks
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 0/4] KVM: selftests: aarch64: page_fault_test S1PTW related fixes
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: arm64: PMU: Allow userspace to limit the number of PMCs on vCPU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: arm64: PMU: Use reset_pmu_reg() for PMUSERENR_EL0 and PMCCFILTR_EL0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: arm64: PMU: Use reset_pmu_reg() for PMUSERENR_EL0 and PMCCFILTR_EL0
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 09/16] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH V7 3/7] vfio/type1: track locked_vm per dma
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] vfio: Support VFIO_NOIOMMU with iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 3/6] KVM: Define kvm_flush_remote_tlbs_range
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC PATCH 3/6] KVM: Define kvm_flush_remote_tlbs_range
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] vfio: Support VFIO_NOIOMMU with iommufd
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [RFC PATCH 4/6] KVM: arm64: Optimize TLBIs in the dirty logging path
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 6/6] KVM: arm64: Create a fast stage-2 unmap path
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 1/6] arm64: tlb: Refactor the core flush algorithm of __flush_tlb_range
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 5/6] KVM: arm64: Optimize the stage2 map path with TLBI range instructions
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 3/6] KVM: Define kvm_flush_remote_tlbs_range
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 2/6] KVM: arm64: Add support for FEAT_TLBIRANGE
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [RFC PATCH 0/6] KVM: arm64: Add support for FEAT_TLBIRANGE
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 4/4] arm: pmu: Print counter values as hexadecimals
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH V7 3/7] vfio/type1: track locked_vm per dma
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V5 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH V5 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/4] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 4/4] arm: pmu: Print counter values as hexadecimals
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/4] arm: pmu: Prepare for testing 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/4] arm: pmu: Add support for PMUv3p5
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 0/2] kvm/vfio: fix potential deadlock on vfio group lock
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH 2/2] KVM: s390: pci: use asyncronous kvm put
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH rcu 01/27] arch/x86: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH rcu 01/27] arch/x86: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC 04/14] KVM: x86/MMU: Expose functions for paging_tmpl.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC 00/14] KVM: x86/MMU: Formalize the Shadow MMU
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- RE: [RFC PATCH 05/32] x86/traps: add exc_raise_irq() for VMX IRQ reinjection
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [V4 PATCH 4/4] KVM: selftests: x86: Invoke kvm hypercall as per host cpu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 PATCH 2/4] KVM: selftests: x86: Add variables to store cpu type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [V4 PATCH 1/4] KVM: selftests: x86: use this_cpu_* helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH rcu 01/27] arch/x86: Remove "select SRCU"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Replace 0-length arrays with flexible arrays
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: VMX: Always intercept accesses to unsupported "extended" x2APIC regs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dionna Amalie Glaze <dionnaglaze@xxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 5/6] KVM: VMX: Always intercept accesses to unsupported "extended" x2APIC regs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86: update APIC_ID also when disabling x2APIC in kvm_lapic_set_base
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V1 vfio 3/6] vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH V1 vfio 3/6] vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH] KVM: sev: Fix int overflow in send|recieve_update_data ioctls
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH V1 vfio 3/6] vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- For Charity Purpose
- From: Maly Bobb <malybobb18@xxxxxxxxx>
- Re: [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 0/4] Qemu SEV reduced-phys-bits fixes
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: Sanitize sev_platform_init() error messages
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] vfio: Support VFIO_NOIOMMU with iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: nv: only emulate timers that have not yet fired
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: arm64: nv: Avoid block mapping if max_map_size is smaller than block size.
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: nv: only emulate timers that have not yet fired
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 1/2] KVM: x86: update APIC_ID also when disabling x2APIC in kvm_lapic_set_base
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC 08/12] vfio: Add infrastructure for bind_iommufd and attach
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V1 vfio 0/6] Move to use cgroups for userspace persistent allocations
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [RFC PATCH 0/2] xapic: make sure x2APIC -> xapic transition correctly
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [RFC PATCH 1/2] KVM: x86: update APIC_ID also when disabling x2APIC in kvm_lapic_set_base
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [RFC PATCH 2/2] KVM: selftests: APIC_ID must be correctly updated when disabling x2apic
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- [PATCH] KVM: s390: interrupt: use READ_ONCE() before cmpxchg()
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: nv: only emulate timers that have not yet fired
- From: Ganapatrao Kulkarni <gankulkarni@xxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH] vhost-test: remove meaningless debug info
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- RE: [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [RFC 10/12] vfio: Add cdev for vfio_device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH] accel/kvm: Specify default IPA size for arm64
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- RE: [RFC 09/12] vfio: Make vfio_device_open() exclusive between group path and device cdev path
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 08/12] vfio: Add infrastructure for bind_iommufd and attach
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH kernel v2 0/3] KVM: SEV: Enable AMD SEV-ES DebugSwap
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- RE: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] target/i386/kvm: fix two svm pmu virtualization bugs
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v2] crypto: ccp: Sanitize sev_platform_init() error messages
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v8 04/16] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v8 02/16] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2] crypto: ccp: Sanitize sev_platform_init() error messages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxxx>
- Re: [PATCH 2/7] KVM: arm64: PMU: Use reset_pmu_reg() for PMUSERENR_EL0 and PMCCFILTR_EL0
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/7] KVM: arm64: PMU: Have reset_pmu_reg() to clear a register
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 6/6] KVM: VMX: Intercept reads to invalid and write-only x2APIC registers
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 5/6] KVM: VMX: Always intercept accesses to unsupported "extended" x2APIC regs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 4/6] KVM: x86: Split out logic to generate "readable" APIC regs mask to helper
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 3/6] KVM: x86: Mark x2APIC DFR reg as non-existent for x2APIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/6] KVM: x86: Inject #GP on x2APIC WRMSR that sets reserved bits 63:32
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 1/6] KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- [PATCH V1 vfio 6/6] vfio/platform: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 5/6] vfio/fsl-mc: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 4/6] vfio/hisi: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 3/6] vfio: Use GFP_KERNEL_ACCOUNT for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 2/6] vfio/mlx5: Allow loading of larger images than 512 MB
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 1/6] vfio/mlx5: Fix UBSAN note
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH V1 vfio 0/6] Move to use cgroups for userspace persistent allocations
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- Re: [PATCH v5 33/33] KVM: x86: Add helpers to recalc physical vs. logical optimized APIC maps
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 32/33] KVM: x86: Allow APICv APIC ID inhibit to be cleared
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 27/33] KVM: SVM: Require logical ID to be power-of-2 for AVIC entry
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 18/33] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 10/33] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v5 03/33] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 1/4] KVM: Implement dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- Re: [PATCH rcu 05/27] arch/riscv/kvm: Remove "select SRCU"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH rcu 05/27] arch/riscv/kvm: Remove "select SRCU"
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH] vfio: platform: No need to check res again
- From: Angus Chen <angus.chen@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH 3/3] x86/msr: Add testcases for x2APIC MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/3] x86/apic: Refactor x2APIC reg helper to provide exact semantics
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/3] x86/msr: Skip built-in testcases if user provides custom MSR+value to test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH 0/3] x86: Add testcases for x2APIC MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/6] KVM: VMX: Intercept reads to invalid and write-only x2APIC registers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/6] KVM: VMX: Always intercept accesses to unsupported "extended" x2APIC regs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/6] KVM: x86: Split out logic to generate "readable" APIC regs mask to helper
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/6] KVM: x86: Mark x2APIC DFR reg as non-existent for x2APIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/6] KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/6] KVM: x86: Inject #GP on x2APIC WRMSR that sets reserved bits 63:32
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/6] KVM: x86: x2APIC reserved bits/regs fixes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH net-next v9] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH v8 14/16] x86/virt/tdx: Initialize all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 4/6] KVM: x86: Explicitly state lockdep condition of msr_filter update
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 2/6] KVM: x86: Optimize kvm->lock and SRCU interaction (KVM_X86_SET_MSR_FILTER)
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 5/6] KVM: x86: Remove unnecessary initialization in kvm_vm_ioctl_set_msr_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 1/6] KVM: x86: Optimize kvm->lock and SRCU interaction (KVM_SET_PMU_EVENT_FILTER)
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 0/6] kvm->lock vs. SRCU sync optimizations
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 6/6] KVM: x86: Simplify msr_io()
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v2 3/6] KVM: x86: Simplify msr_filter update
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [RFC PATCH v2 32/32] x86/fred: disable FRED by default in its early stage
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 32/32] x86/fred: disable FRED by default in its early stage
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC 04/14] KVM: x86/MMU: Expose functions for paging_tmpl.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v8 09/16] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH] KVM: selftests: Fix build of rseq test
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC 00/14] KVM: x86/MMU: Formalize the Shadow MMU
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v8 03/16] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 01/16] x86/tdx: Define TDX supported page sizes as macros
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 3/5] target/i386: Add a couple of feature bits in 8000_0008_EBX
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 0/5] target/i386: Update AMD EPYC CPU Models
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 1/5] target/i386: allow versioned CPUs to specify new cache_info
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 2/5] target/i386: Add new EPYC CPU versions with updated cache_info
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 5/5] target/i386: Add missing feature bits in EPYC-Milan model
- From: Babu Moger <babu.moger@xxxxxxx>
- [PATCH v2 4/5] target/i386: Add feature bits for CPUID_Fn80000021_EAX
- From: Babu Moger <babu.moger@xxxxxxx>
- Re: [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 1/1] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH v8 04/16] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 02/16] x86/virt/tdx: Detect TDX during kernel boot
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 1/8] iommu: Add a gfp parameter to iommu_map()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/8] iommu: Remove iommu_map_atomic()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 8/8] iommu/s390: Push the gfp parameter to the kmem_cache_alloc()'s
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 6/8] iommu/intel: Add a gfp parameter to alloc_pgtable_page()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 5/8] iommufd: Use GFP_KERNEL_ACCOUNT for iommu_map()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 7/8] iommu/intel: Support the gfp argument to the map_pages op
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 3/8] iommu: Add a gfp parameter to iommu_map_sg()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 0/8] Let iommufd charge IOPTE allocations to the memory cgroup
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 4/8] iommu/dma: Use the gfp parameter in __iommu_dma_alloc_noncontiguous()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v3 1/1] vfio: remove VFIO_GROUP_NOTIFY_SET_KVM
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd v3 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 4/9] iommufd: Convert to msi_device_has_isolated_msi()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 3/9] vfio/type1: Convert to iommu_group_has_isolated_msi()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH iommufd v3 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v7 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v7 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v7 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: x86: Fix deadlock in kvm_vm_ioctl_set_msr_filter()
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [RFC PATCH v2 29/32] x86/ia32: do not modify the DPL bits for a null selector
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 25/32] x86/fred: disallow the swapgs instruction when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 32/32] x86/fred: disable FRED by default in its early stage
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 28/32] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 30/32] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 26/32] x86/fred: no ESPFIX needed when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 31/32] x86/fred: allow dynamic stack frame size
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 27/32] x86/fred: allow single-step trap and NMI when starting a new thread
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 24/32] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 22/32] x86/fred: FRED initialization code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 02/32] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 15/32] x86/fred: make unions for the cs and ss fields in struct pt_regs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 10/32] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH v2 16/32] x86/fred: reserve space for the FRED stack frame
- From: Xin Li <xin3.li@xxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]