Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH v13 109/113] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 111/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 092/113] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 112/113] RFC: KVM: TDX: Make busy with S-EPT on entry bug
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 108/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 094/113] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 103/113] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 093/113] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 091/113] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 090/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 089/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 088/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 077/113] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 080/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 083/113] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 084/113] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 074/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 079/113] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 085/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 086/113] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 081/113] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 075/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 087/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 076/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 082/113] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 073/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 072/113] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 067/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 068/113] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 069/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 064/113] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 040/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 037/113] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 066/113] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 070/113] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 065/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 071/113] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 063/113] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 036/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 057/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 059/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 034/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 056/113] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 061/113] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 035/113] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 060/113] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 062/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 058/113] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 033/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 049/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 055/113] KVM: TDX: Require TDP MMU and mmio caching for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 031/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 054/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 030/113] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 051/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 053/113] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 050/113] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 032/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 052/113] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 048/113] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 024/113] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 045/113] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 025/113] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 044/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 023/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 042/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 022/113] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 043/113] KVM: Add flags to struct kvm_gfn_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 038/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 020/113] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 018/113] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 039/113] KVM: x86/mmu: Assume guest MMIOs are shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 041/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 016/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 017/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 015/113] x86/virt/tdx: Add a helper function to return system wide info about TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 014/113] x86/cpu: Add helper functions to allocate/free TDX private host key id
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 013/113] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 009/113] KVM: TDX: Define TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 011/113] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 010/113] KVM: TDX: Add TDX "architectural" error codes
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 012/113] KVM: TDX: Add helper functions to print TDX SEAMCALL error
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 008/113] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 007/113] KVM: TDX: Make TDX VM type supported
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 004/113] KVM: TDX: Initialize logical processor when onlined
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 006/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 001/113] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 000/113] KVM TDX basic feature support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: isaku.yamahata@xxxxxxxxx
- RE: [PATCH] KVM: SVM: Disable TDP MMU when running on Hyper-V
- From: Alexander Grest <Alexander.Grest@xxxxxxxxxxxxx>
- Re: [PATCH 15/16] KVM: arm64: selftests: Augment existing timer test to handle variable offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add coverage of MTE system registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: arm64: PMU: Preserve vPMC registers properly on migration
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: PMU: Don't save PMCR_EL0.{C,P} for the vCPU
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: PMU: Fix GET_ONE_REG for vPMC regs to return the current value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add coverage of MTE system registers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v2] perf/x86: use hexidecimal value for cpuid
- From: Zhenyu Wang <zhenyuw@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 12/12] KVM: arm64: Use local TLBI on permission relaxation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 11/12] KVM: arm64: Split huge pages during KVM_CLEAR_DIRTY_LOG
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 09/12] KVM: arm64: Split huge pages when dirty logging is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 08/12] KVM: arm64: Add KVM_CAP_ARM_EAGER_SPLIT_CHUNK_SIZE
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 07/12] KVM: arm64: Export kvm_are_all_memslots_empty()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 03/12] KVM: arm64: Add helper for creating unlinked stage2 subtrees
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v6 02/12] KVM: arm64: Add KVM_PGTABLE_WALK ctx->flags for skipping BBM and CMO
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add coverage of MTE system registers
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: Don't enable hardware after a restart/shutdown is initiated
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: Use syscore_ops instead of reboot_notifier to hook restart/shutdown
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [RFC PATCH part-7 01/12] pkvm: x86: Introduce pkvm_pgtable_annotate
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 12/13] pkvm: x86: Add INVEPT instruction emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 07/13] pkvm: x86: Initialize ept_zero_check
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 00/12] Memory protection based on page state
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 11/13] pkvm: x86: Introduce shadow EPT invalidation support
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 09/13] pkvm: x86: Introduce PKVM_ASSERT
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 11/12] pkvm: x86: Add pgtable override helper functions for map/unmap/free leaf
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 09/12] pkvm: x86: Implement do_share() helper for sharing memory
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 10/13] pkvm: x86: add pkvm_pgtable_unmap_safe for a safe unmap
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 13/13] pkvm: x86: Switch to use shadow EPT for nested guests
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 12/12] pkvm: x86: Use page state API in shadow EPT for normal VM
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 03/12] pkvm: x86: Use SW bits to track page state
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 06/12] pkvm: x86: Implement do_donate() helper for donating memory
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 07/12] pkvm: x86: Implement __pkvm_hyp_donate_host()
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 10/12] pkvm: x86: Implement do_unshare() helper for unsharing memory
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 02/12] pkvm: x86: Use host EPT to track page ownership
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 05/12] pkvm: x86: Expose host EPT lock
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 06/13] pkvm: x86: Add API to get the max phys address bits
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 08/13] pkvm: x86: Add support for pKVM to handle the nested EPT violation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 04/12] pkvm: x86: Add the record of the page state into page table entry
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-7 08/12] pkvm: x86: Donate shadow vm & vcpu pages to hypervisor
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 05/13] pkvm: x86: Introduce vEPT to record guest EPT information
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 04/13] pkvm: x86: Introduce shadow EPT
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 20/22] pkvm: x86: Add INVEPT/INVVPID emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 22/22] pkvm: x86: Add vmx msr emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 21/22] pkvm: x86: Initialize msr_bitmap for vmsr
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 19/22] pkvm: x86: Add VMLAUNCH/VMRESUME emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 03/13] pkvm: x86: Initialize the shadow EPT pool
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 00/13] EPT Emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 02/13] pkvm: x86: init: Reserve memory for shadow EPT
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 17/22] pkvm: x86: Add VMPTRLD/VMCLEAR emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 18/22] pkvm: x86: Add VMREAD/VMWRITE emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 16/22] pkvm: x86: Add vmcs_load/clear_track APIs
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-6 01/13] pkvm: x86: Pre-define the maximum number of supported VMs
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 14/22] pkvm: x86: Add msr ops for pKVM hypervisor
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 15/22] pkvm: x86: Move _init_host_state_area to pKVM hypervisor
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 13/22] pkvm: x86: Initialize emulated fields for vmcs emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 12/22] pkvm: x86: Init vmcs read/write bitmap for vmcs emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 11/22] KVM: VMX: Add more vmcs and vmcs12 fields definition
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 10/22] pkvm: x86: Add has_vmcs_field() API for physical vmx capability check
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 09/22] pkvm: x86: Add VMXON/VMXOFF emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 00/22] Isolate pKVM & host
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 14/22] pkvm: x86: Add global pkvm_hyp pointer
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 21/22] pkvm: x86: Introduce find_mem_range API
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 07/22] pkvm: x86: Reserve memory for pKVM
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 01/22] pkvm: x86: Define hypervisor runtime VA/PA APIs
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 08/22] pkvm: x86: Add hash table mapping for shadow vcpu based on vmcs12_pa
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 05/22] pkvm: x86: Add hypercalls for shadow_vm/vcpu init & teardown
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 22/22] pkvm: x86: Dynamically handle host MMIO EPT violation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 03/22] pkvm: x86: Do guest address translation per page granularity
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 05/22] pkvm: x86: Generate pkvm_constants.h for pKVM initialization
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 18/22] pkvm: x86: Introduce host EPT pgtable support
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 02/22] pkvm: x86: Add arch specific spinlock
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 17/22] pkvm: x86: Add vmemmap and switch to buddy page allocator
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 13/22] pkvm: x86: Introduce MMU pgtable support
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 08/22] pkvm: x86: Early alloc from reserved memory
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 11/22] pkvm: x86: Add early allocator based mm_ops
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 06/22] KVM: VMX: Add new kvm_x86_ops vm_free
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 19/22] pkvm: x86: Create host EPT pgtable in init-finalise hypercall
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 02/22] pkvm: x86: Add memory operation APIs for for host VM
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 03/22] pkvm: x86: Add memset lib
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 07/22] KVM: VMX: Add initialization/teardown for shadow vm/vcpu
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-4 3/4] pkvm: x86: Support get_pcpu_id
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 04/22] pkvm: x86: Add buddy page allocator
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 10/22] pkvm: x86: Initialize MMU/EPT configuration
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-4 4/4] pkvm: x86: Handle pending nmi in pKVM runtime
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 16/22] pkvm: x86: Create MMU pgtable in init-finalise hypercall
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-4 2/4] pkvm: x86: Add pKVM debug support
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 04/22] pkvm: x86: Add check for guest address translation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 06/22] pkvm: x86: Calculate total reserve page numbers
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-4 0/4] Misc
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 00/22] VMX emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-5 01/22] pkvm: x86: Add memcpy lib
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 09/22] pkvm: x86: Introduce general page table management framework
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 12/22] pkvm: x86: Define linker script alias for kernel-proper symbol
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-4 1/4] pkvm: x86: Enable VPID for host VM
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 20/22] pkvm: x86: Add pgtable API pkvm_pgtable_lookup
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-3 15/22] pkvm: x86: Add init-finalise hypercall
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 15/17] pkvm: x86: Build pKVM runtime as an independent binary
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 16/17] pkvm: x86: Deprivilege host OS
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 14/17] pkvm: x86: Add pKVM retpoline.S
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 12/17] pkvm: x86: Add vmexit handler for host vcpu
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 17/17] pkvm: x86: Stub CONFIG_DEBUG_LIST in pKVM
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 10/17] pkvm: x86: Initialize vmcs control fields for host vcpu
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 11/17] pkvm: x86: Define empty debug functions for hypervisor
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 13/17] pkvm: x86: Add private vmx_ops.h for pKVM
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 09/17] pkvm: x86: Initialize vmcs host state area for host vcpu
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 08/17] pkvm: x86: Initailize vmcs guest state area for host vcpu
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 07/17] pkvm: x86: Allocate vmcs and msr bitmap pages for host vcpu
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 06/17] pkvm: x86: Introduce pkvm_host_deprivilege_cpus
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 04/17] pkvm: x86: Add pCPU env setup
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 05/17] pkvm: x86: Add basic setup for host vcpu
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 03/17] pkvm: x86: Add vmx capability check and vmx config setup
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 02/17] KVM: VMX: Refactor for setup_vmcs_config
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 01/17] pkvm: x86: Introduce CONFIG_PKVM_INTEL
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-2 00/17] Introduce & support pKVM on Intel platform
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-1 5/5] pkvm: arm64: Move general part of memory reservation to virt/kvm/pkvm
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-1 4/5] pkvm: arm64: Make memory reservation arch agnostic
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-1 3/5] pkvm: arm64: Move page allocator to virt/kvm/pkvm
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-1 2/5] pkvm: arm64: Make page allocator arch agnostic
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-1 1/5] pkvm: arm64: Move nvhe/spinlock.h to include/asm dir
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.3, part #1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2] KVM: arm64: timers: Convert per-vcpu virtual offset to a global value
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- RE: [PATCH v5 00/34] x86: enable FRED for x86-64
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v14 00/12] Parallel CPU bringup for x86_64
- From: Tor Vic <torvic9@xxxxxxxxxxx>
- Re: [PATCH v14 10/12] x86/smpboot: Send INIT/SIPI/SIPI to secondary CPUs in parallel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v14 10/12] x86/smpboot: Send INIT/SIPI/SIPI to secondary CPUs in parallel
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH v6 13/24] vfio/iommufd: Split the compat_ioas attach out from vfio_iommufd_bind()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v14 05/12] x86/smpboot: Split up native_cpu_up into separate phases and document them
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v14 10/12] x86/smpboot: Send INIT/SIPI/SIPI to secondary CPUs in parallel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/34] x86: enable FRED for x86-64
- From: "Kang, Shan" <shan.kang@xxxxxxxxx>
- Re: [PATCH v14 10/12] x86/smpboot: Send INIT/SIPI/SIPI to secondary CPUs in parallel
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v14 05/12] x86/smpboot: Split up native_cpu_up into separate phases and document them
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v14 10/12] x86/smpboot: Send INIT/SIPI/SIPI to secondary CPUs in parallel
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: VMX: Remove a unnecessary cpu_has_vmx_desc() check in vmx_set_cr4()
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: VMX: Rename vmx_umip_emulated() to cpu_has_vmx_desc()
- From: Robert Hoo <robert.hoo.linux@xxxxxxxxx>
- [PATCH v3 19/21] KVM: selftests: Refactor LBR_FMT test to avoid use of separate macro
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 20/21] KVM: selftests: Add negative testcase for PEBS format in PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 18/21] KVM: selftests: Drop "all done!" printf() from PERF_CAPABILITIES test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 21/21] KVM: selftests: Verify LBRs are disabled if vPMU is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 17/21] KVM: selftests: Test post-KVM_RUN writes to PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 15/21] KVM: selftests: Test all immutable non-format bits in PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 12/21] KVM: selftests: Verify KVM preserves userspace writes to "durable" MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 16/21] KVM: selftests: Expand negative testing of guest writes to PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 14/21] KVM: selftests: Test all fungible features in PERF_CAPABILITIES
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 11/21] KVM: selftests: Print out failing MSR and value in vcpu_set_msr()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 10/21] KVM: selftests: Assert that full-width PMC writes are supported if PDCM=1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 13/21] KVM: selftests: Drop now-redundant checks on PERF_CAPABILITIES writes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 09/21] KVM: selftests: Move 0/initial value PERF_CAPS checks to dedicated sub-test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 08/21] KVM: x86/pmu: Zero out LBR capabilities during PMU refresh
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 07/21] KVM: x86/pmu: WARN and bug the VM if PMU is refreshed after vCPU has run
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 06/21] KVM: x86: Disallow writes to immutable feature MSRs after KVM_RUN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 05/21] KVM: selftests: Split PMU caps sub-tests to avoid writing MSR after KVM_RUN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 04/21] KVM: x86: Generate set of VMX feature MSRs using first/last definitions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 03/21] KVM: x86: Add macros to track first...last VMX feature MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 02/21] KVM: x86: Add a helper to query whether or not a vCPU has ever run
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 01/21] KVM: x86: Rename kvm_init_msr_list() to clarify it inits multiple lists
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v3 00/21] KVM: x86: Disallow writes to feature MSRs post-KVM_RUN
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 27/27] drm/i915/gvt: Drop final dependencies on KVM internal details
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/27] KVM: x86: Add a new page-track hook to handle memslot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/27] drm/i915/gvt: remove interface intel_gvt_is_valid_gfn
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/27] drm/i915/gvt: switch from ->track_flush_slot() to ->track_remove_region()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 18/27] KVM: x86: Remove the unused page-track hook track_flush_slot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 25/27] KVM: x86/mmu: Drop @slot param from exported/external page-track APIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 24/27] KVM: x86/mmu: Bug the VM if write-tracking is used but not enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 23/27] KVM: x86/mmu: Assert that correct locks are held for page write-tracking
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/27] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/27] KVM: x86/mmu: Factor out helper to get max mapping size of a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/27] KVM: x86: Reject memslot MOVE operations if KVMGT is attached
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 19/27] KVM: x86/mmu: Move KVM-only page-track declarations to internal header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/27] drm/i915/gvt: Don't bother removing write-protection on to-be-deleted slot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/27] drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/27] KVM: x86/mmu: Don't bounce through page-track mechanism for guest PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 20/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/27] drm/i915/gvt: Protect gfn hash table with vgpu_lock
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/27] drm/i915/gvt: Don't rely on KVM's gfn_to_pfn() to query possible 2M GTT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/27] drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/27] KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hook
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 26/27] KVM: x86/mmu: Handle KVM bookkeeping in page-track APIs, not callers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 21/27] KVM: x86/mmu: Drop infrastructure for multiple page-track modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 22/27] KVM: x86/mmu: Rename page-track APIs to reflect the new reality
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/27] drm/i915/gvt: Verify VFIO-pinned page is THP when shadowing 2M gtt entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/27] drm/i915/gvt: Use an "unsigned long" to iterate over memslot gfns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/27] drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: add missing consistency checks for CR0 and CR4
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 2/5] iommufd/selftest: Add IOMMU_TEST_OP_ACCESS_SET_IOAS coverage
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [REPOST PATCH 12/16] selftests: KVM: aarch64: Test PMU overflow/IRQ functionality
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH] KVM: nVMX: add missing consistency checks for CR0 and CR4
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 19/24] vfio-iommufd: Add detach_ioas support for emulated VFIO devices
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v4 5/5] vfio: Support IO page table replacement
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 05/12] iommufd/hw_pagetable: Do not populate user-managed hw_pagetables
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH 6/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>
- [PATCH 2/2] KVM: Don't enable hardware after a restart/shutdown is initiated
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: Use syscore_ops instead of reboot_notifier to hook restart/shutdown
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: Fix race between reboot and hardware enabling
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [REPOST PATCH 10/16] selftests: KVM: aarch64: Add KVM EVTYPE filter PMU test
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- [PATCH v2 18/18] KVM: SVM: Use "standard" stgi() helper when disabling SVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 17/18] KVM: x86: Force kvm_rebooting=true during emergency reboot/crash
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 16/18] x86/virt: KVM: Move "disable SVM" helper into KVM SVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 15/18] KVM: VMX: Ensure CPU is stable when probing basic VMX support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 13/18] x86/virt: KVM: Open code cpu_has_svm() into kvm_is_svm_supported()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 12/18] x86/virt: Drop unnecessary check on extended CPUID level in cpu_has_svm()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 11/18] KVM: SVM: Make KVM_AMD depend on CPU_SUP_AMD or CPU_SUP_HYGON
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 10/18] x86/virt: KVM: Move VMXOFF helpers into KVM VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/18] x86/virt: KVM: Open code cpu_has_vmx() in KVM VMX
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 08/18] x86/reboot: Assert that IRQs are disabled when turning off virtualization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 07/18] x86/reboot: Disable virtualization during reboot iff callback is registered
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 05/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 06/18] x86/reboot: Hoist "disable virt" helpers above "emergency reboot" path
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 04/18] x86/reboot: KVM: Handle VMXOFF in KVM's reboot callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 03/18] x86/reboot: Harden virtualization hooks for emergency reboot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 02/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_INTEL is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 00/18] x86/reboot: KVM: Clean up "emergency" virt code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 01/18] x86/reboot: VMCLEAR active VMCSes before emergency reboot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v4 2/8] crypto: ccp: Add a header for multiple drivers to use `__psp_pa`
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- [PATCH v4 0/8] Export platform features from ccp driver
- From: Mario Limonciello <mario.limonciello@xxxxxxx>
- Re: [PATCH v12 050/106] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v5 4/5] KVM: x86: emulation: Apply LAM mask when emulating data access in 64-bit mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 4/5] KVM: x86: emulation: Apply LAM mask when emulating data access in 64-bit mode
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 2/5] [Trivial]KVM: x86: Explicitly cast ulong to bool in kvm_set_cr3()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v14 00/12] Parallel CPU bringup for x86_64
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/5] iommufd/selftest: Add IOMMU_TEST_OP_ACCESS_SET_IOAS coverage
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 1/5] vfio: Do not allow !ops->dma_unmap in vfio_pin/unpin_pages()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v5 3/5] KVM: x86: Virtualize CR3.LAM_{U48,U57}
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/6] use canonical ftrace path whenever possible
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 15/16] KVM: arm64: selftests: Augment existing timer test to handle variable offsets
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v14 00/12] Parallel CPU bringup for x86_64
- From: Tor Vic <torvic9@xxxxxxxxxxx>
- [PATCH v3 1/3] selftests: use canonical ftrace path
- From: Ross Zwisler <zwisler@xxxxxxxxxx>
- [PATCH v3 2/3] leaking_addresses: also skip canonical ftrace path
- From: Ross Zwisler <zwisler@xxxxxxxxxx>
- [PATCH v3 3/3] tools/kvm_stat: use canonical ftrace path
- From: Ross Zwisler <zwisler@xxxxxxxxxx>
- [PATCH v3 0/3] use canonical ftrace path whenever possible
- From: Ross Zwisler <zwisler@xxxxxxxxxx>
- Re: [PATCH v2 0/6] use canonical ftrace path whenever possible
- From: Ross Zwisler <zwisler@xxxxxxxxxx>
- [kvm-unit-tests PATCH v5] s390x: Add tests for execute-type instructions
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 08/12] iommufd/device: Report supported hwpt_types
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 07/12] iommufd: Add IOMMU_HWPT_INVALIDATE
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH 04/12] iommufd: Pass parent hwpt and user_data to iommufd_hw_pagetable_alloc()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 4/5] Samples/mdev: Uses the vfio emulated iommufd ops set in the mdev sample drivers
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 3/5] vfio-iommufd: Make vfio_iommufd_emulated_bind() return iommufd_access ID
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 2/5] vfio-iommufd: No need to record iommufd_ctx in vfio_device
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCHv4 00/11] SVM: virtual NMI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: VMX: fix lockdep warning on posted intr wakeup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 39/45] target/riscv: Add vghsh.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 44/45] target/riscv: Add Zvksed support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 40/45] target/riscv: Expose zvkg cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 36/45] target/riscv: Expose zvksh cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 43/45] target/riscv: Add zvksed cfg property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 33/45] target/riscv: Add zvksh cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 34/45] target/riscv: Add vsm3me.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 41/45] crypto: Create sm4_subword
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 38/45] target/riscv: Add vgmul.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] KVM: VMX: Use the canonical interface to read CR4.UMIP bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: VMX: fix lockdep warning on posted intr wakeup
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH -v2] x86/CPU/AMD: Make sure EFER[AIBRSE] is set
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH V3 00/16] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH 42/45] crypto: Add SM4 constant parameter CK
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 31/45] target/riscv: Add vsha2c[hl].vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 30/45] target/riscv: Add vsha2ms.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 37/45] target/riscv: Add zvkg cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 32/45] target/riscv: Expose zvknh cpu properties
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: VMX: Remove a unnecessary cpu_has_vmx_desc() check in vmx_set_cr4()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 45/45] target/riscv: Expose Zvksed property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 35/45] target/riscv: Add vsm3c.vi decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 22/45] target/riscv: Add vaesdm.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 27/45] target/riscv: Add vaeskf2.vi decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 23/45] target/riscv: Add vaesz.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 18/45] target/riscv: Add vaesef.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 25/45] target/riscv: Add vaesem.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 21/45] target/riscv: Add vaesdm.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 19/45] target/riscv: Add vaesdf.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [PATCH kvmtool 1/1] Add virtio-transport option and deprecate force-pci and virtio-legacy.
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH 16/45] target/riscv: Add zvkned cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 26/45] target/riscv: Add vaeskf1.vi decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 20/45] target/riscv: Add vaesdf.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 28/45] target/riscv: Expose zvkned cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 04/45] target/riscv: Refactor some of the generic vector functionality
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 13/45] target/riscv: Add vrev8.v decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 24/45] target/riscv: Add vaesem.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 15/45] target/riscv: Expose zvkb cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 10/45] target/riscv: Add vrol.[vv,vx] and vror.[vv,vx,vi] decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 29/45] target/riscv: Add zvknh cpu properties
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 12/45] target/riscv: Add vbrev8.v decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 02/45] target/riscv: Refactor some of the generic vector functionality
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 09/45] qemu/bitops.h: Limit rotate amounts
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 01/45] target/riscv: Add zvkb cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 14/45] target/riscv: Add vandn.[vv,vx] decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 17/45] target/riscv: Add vaesef.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 03/45] target/riscv: Add vclmul.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 00/45] Add RISC-V vector cryptographic instruction set support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 07/45] target/riscv: Add vclmulh.vx decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 05/45] target/riscv: Add vclmul.vx decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 06/45] target/riscv: Add vclmulh.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 08/45] target/riscv: Refactor some of the generic vector functionality
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 11/45] target/riscv: Refactor some of the generic vector functionality
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH V3 16/16] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V3 13/16] x86/sev: Add Check of #HV event in path
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: VMX: Rename vmx_umip_emulated() to cpu_has_vmx_desc()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 17/28] arm64: RME: Runtime faulting of memory
- From: Steven Price <steven.price@xxxxxxx>
- Re: [RFC PATCH V3 12/16] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH 06/28] arm64: RME: ioctls to create and configure realms
- From: Steven Price <steven.price@xxxxxxx>
- Re: [RFC PATCH 16/28] arm64: RME: Allow populating initial contents
- From: Steven Price <steven.price@xxxxxxx>
- Re: [RFC PATCH 15/28] KVM: arm64: Handle realm MMIO emulation
- From: Steven Price <steven.price@xxxxxxx>
- Re: [RFC PATCH V3 00/16] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 05/12] iommufd/hw_pagetable: Do not populate user-managed hw_pagetables
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v1 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 12/17] iommufd: Add iommufd_device_replace()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH kvmtool 1/1] Add virtio-transport option and deprecate force-pci and virtio-legacy.
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 10/17] iommufd: Reorganize iommufd_device_attach into iommufd_device_change_pt
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v2 03/17] iommufd: Replace the hwpt->devices list with iommufd_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v1 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v1 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 3/3] KVM: VMX: Use the canonical interface to read CR4.UMIP bit
- From: Robert Hoo <robert.hu@xxxxxxxxx>
- [PATCH 2/3] KVM: VMX: Remove a unnecessary cpu_has_vmx_desc() check in vmx_set_cr4()
- From: Robert Hoo <robert.hu@xxxxxxxxx>
- [PATCH 1/3] KVM: VMX: Rename vmx_umip_emulated() to cpu_has_vmx_desc()
- From: Robert Hoo <robert.hu@xxxxxxxxx>
- [PATCH 0/3] Some code refactor surround CR4.UMIP virtualization
- From: Robert Hoo <robert.hu@xxxxxxxxx>
- Re: [PATCH 05/12] iommufd/hw_pagetable: Do not populate user-managed hw_pagetables
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 0/4] several updates to virtio/vsock
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v2] vhost/vdpa: Add MSI translation tables to iommu for software-managed MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- RE: [PATCH v4 5/5] vfio: Support IO page table replacement
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 3/5] iommufd: Add replace support in iommufd_access_set_ioas()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 12/17] iommufd: Add iommufd_device_replace()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH v4 0/4] several updates to virtio/vsock
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v2] KVM: x86/pmu/misc: Fix a typo on kvm_pmu_request_counter_reprogam()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- RE: [PATCH v2 10/17] iommufd: Reorganize iommufd_device_attach into iommufd_device_change_pt
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH v7 4/4] virtio-blk: add some trace events for zoned emulation
- From: Sam Li <faithilikerun@xxxxxxxxx>
- [PATCH v7 3/4] block: add accounting for zone append operation
- From: Sam Li <faithilikerun@xxxxxxxxx>
- [PATCH v7 2/4] virtio-blk: add zoned storage emulation for zoned devices
- From: Sam Li <faithilikerun@xxxxxxxxx>
- [PATCH v7 0/4] Add zoned storage emulation to virtio-blk driver
- From: Sam Li <faithilikerun@xxxxxxxxx>
- [PATCH v7 1/4] include: update virtio_blk headers to v6.3-rc1
- From: Sam Li <faithilikerun@xxxxxxxxx>
- [PATCH 5/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 3/5] KVM: x86/pmu: Move the overflow of a normal counter out of PMI context
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 4/5] KVM: x86/pmu: Reorder functions to reduce unnecessary declarations
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 2/5] KVM: x86/pmu: Add a helper to check if pmc has PEBS mode enabled
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 1/5] KVM: x86/pmu: Emulate CTR overflow directly in kvm_pmu_handle_event()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH 0/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- RE: [PATCH v2 08/17] iommufd: Move putting a hwpt to a helper function
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 07/17] iommufd: Make sw_msi_start a group global
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 06/17] iommufd: Use the iommufd_group to avoid duplicate MSI setup
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 05/17] iommufd: Keep track of each device's reserved regions instead of groups
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 04/17] iommu: Export iommu_get_resv_regions()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 03/17] iommufd: Replace the hwpt->devices list with iommufd_group
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 02/17] iommufd: Add iommufd_group
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 21/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [patch] docs: vfio: fix header path
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v6 20/24] vfio: Add cdev for vfio_device
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- [patch] docs: vfio: fix header path
- From: Jiri Pirko <jiri@xxxxxxxxxxx>
- RE: [PATCH v6 21/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2] vhost/vdpa: Add MSI translation tables to iommu for software-managed MSI
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH 30/45] target/riscv: Add vsha2ms.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] vhost/vdpa: Add MSI translation tables to iommu for software-managed MSI
- From: Jason Wang <jasowang@xxxxxxxxxx>
- [PATCH 33/45] target/riscv: Add zvksh cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 39/45] target/riscv: Add vghsh.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 42/45] crypto: Add SM4 constant parameter CK
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 41/45] crypto: Create sm4_subword
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 44/45] target/riscv: Add Zvksed support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 0/4] several updates to virtio/vsock
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH 38/45] target/riscv: Add vgmul.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 36/45] target/riscv: Expose zvksh cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 45/45] target/riscv: Expose Zvksed property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 40/45] target/riscv: Expose zvkg cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 37/45] target/riscv: Add zvkg cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 34/45] target/riscv: Add vsm3me.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 43/45] target/riscv: Add zvksed cfg property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 31/45] target/riscv: Add vsha2c[hl].vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 35/45] target/riscv: Add vsm3c.vi decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 32/45] target/riscv: Expose zvknh cpu properties
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [PATCHv4 00/11] SVM: virtual NMI
- From: Santosh Shukla <santosh.shukla@xxxxxxx>
- [PATCH 06/45] target/riscv: Add vclmulh.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 26/45] target/riscv: Add vaeskf1.vi decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 13/45] target/riscv: Add vrev8.v decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 28/45] target/riscv: Expose zvkned cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 22/45] target/riscv: Add vaesdm.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 05/45] target/riscv: Add vclmul.vx decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH 15/45] target/riscv: Expose zvkb cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 27/45] target/riscv: Add vaeskf2.vi decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 17/45] target/riscv: Add vaesef.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 19/45] target/riscv: Add vaesdf.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 14/45] target/riscv: Add vandn.[vv,vx] decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 00/45] Add RISC-V vector cryptographic instruction set support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 01/45] target/riscv: Add zvkb cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 16/45] target/riscv: Add zvkned cpu property
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 0/4] several updates to virtio/vsock
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 04/45] target/riscv: Refactor some of the generic vector functionality
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 29/45] target/riscv: Add zvknh cpu properties
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 08/45] target/riscv: Refactor some of the generic vector functionality
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 10/45] target/riscv: Add vrol.[vv,vx] and vror.[vv,vx,vi] decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 07/45] target/riscv: Add vclmulh.vx decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 24/45] target/riscv: Add vaesem.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 12/45] target/riscv: Add vbrev8.v decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 11/45] target/riscv: Refactor some of the generic vector functionality
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 23/45] target/riscv: Add vaesz.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 09/45] qemu/bitops.h: Limit rotate amounts
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- RE: [PATCH v6 13/24] vfio/iommufd: Split the compat_ioas attach out from vfio_iommufd_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH 25/45] target/riscv: Add vaesem.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 20/45] target/riscv: Add vaesdf.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 18/45] target/riscv: Add vaesef.vs decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 02/45] target/riscv: Refactor some of the generic vector functionality
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 21/45] target/riscv: Add vaesdm.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- [PATCH 03/45] target/riscv: Add vclmul.vv decoding, translation and execution support
- From: Lawrence Hunter <lawrence.hunter@xxxxxxxxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH v4 3/4] virtio/vsock: don't drop skbuff on copy failure
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v4 2/4] virtio/vsock: remove redundant 'skb_pull()' call
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH v6 23/24] vfio: Compile group optionally
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH v4 1/4] virtio/vsock: don't use skbuff state to account credit
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH v6 21/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vhost_net: revert upend_idx only on retriable error
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH net-next v3 0/3] vsock: add support for sockmap
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [PATCH v6 20/24] vfio: Add cdev for vfio_device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2] vhost/vdpa: Add MSI translation tables to iommu for software-managed MSI
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vhost-vdpa: cleanup memory maps when closing vdpa fds
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [PATCH v6 17/24] vfio-iommufd: Make vfio_iommufd_bind() selectively return devid
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 0/6] use canonical ftrace path whenever possible
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [PATCH v6 16/24] vfio: Make vfio_device_first_open() to cover the noiommu mode in cdev path
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 13/24] vfio/iommufd: Split the compat_ioas attach out from vfio_iommufd_bind()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v6 13/24] vfio/iommufd: Split the compat_ioas attach out from vfio_iommufd_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 3/4] iommufd: Add IOMMU_DEVICE_GET_HW_INFO
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 08/12] iommufd/device: Report supported hwpt_types
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH 08/12] iommufd/device: Report supported hwpt_types
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 08/12] iommufd/device: Report supported hwpt_types
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 05/12] iommufd/hw_pagetable: Do not populate user-managed hw_pagetables
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v5 16/19] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v6 11/24] vfio/pci: Accept device fd in VFIO_DEVICE_PCI_HOT_RESET ioctl
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 11/24] vfio/pci: Accept device fd in VFIO_DEVICE_PCI_HOT_RESET ioctl
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 10/24] vfio/pci: Rename the helpers and data in hot reset path to accept device fd
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 09/24] vfio/pci: Only need to check opened devices in the dev_set for hot reset
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 07/24] vfio: Block device access via device fd until device is opened
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 08/12] iommufd/device: Report supported hwpt_types
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/12] iommufd: Add IOMMU_HWPT_INVALIDATE
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH 06/12] iommufd: IOMMU_HWPT_ALLOC allocation with user data
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 16/19] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH v3 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [REPOST PATCH 11/16] selftests: KVM: aarch64: Add vCPU migration test for PMU
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [PATCH 05/12] iommufd/hw_pagetable: Do not populate user-managed hw_pagetables
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- RE: [PATCH v1 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: arm64: Save ID registers' sanitized value per guest
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH 04/12] iommufd: Pass parent hwpt and user_data to iommufd_hw_pagetable_alloc()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- RE: [PATCH v1 4/5] Samples/mdev: Uses the vfio emulated iommufd ops set in the mdev sample drivers
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 3/5] vfio-iommufd: Make vfio_iommufd_emulated_bind() return iommufd_access ID
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH 03/12] iommufd/hw_pagetable: Use domain_alloc_user op for domain allocation
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: Bug: Intel Arc A-Series GPUs VFIO pass through no video out
- From: "David N." <taact135200@xxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH 01/12] iommu: Add new iommu op to create domains owned by userspace
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v4 05/18] KVM: x86/mmu: Add split_shadow_page_cache pages to global count of MMU cache pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v4 05/18] KVM: x86/mmu: Add split_shadow_page_cache pages to global count of MMU cache pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [REPOST PATCH 09/16] selftests: KVM: aarch64: Add KVM PMU event filter test
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [REPOST PATCH 08/16] selftests: KVM: aarch64: Consider PMU event filters for VM creation
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [REPOST PATCH 07/16] selftests: KVM: aarch64: Add PMU cycle counter helpers
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [REPOST PATCH 06/16] tools: arm64: perf_event: Define Cycle counter enable/overflow bits
- From: Raghavendra Rao Ananta <rananta@xxxxxxxxxx>
- Re: [RFC PATCH v3 0/4] several updates to virtio/vsock
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 4/4] test/vsock: copy to user failure test
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 3/4] virtio/vsock: don't drop skbuff on copy failure
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 2/4] virtio/vsock: remove redundant 'skb_pull()' call
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 1/4] virtio/vsock: don't use skbuff state to account credit
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v4 0/4] several updates to virtio/vsock
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [Patch v4 06/18] KVM: x86/mmu: Shrink split_shadow_page_cache via MMU shrinker
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v4 05/18] KVM: x86/mmu: Add split_shadow_page_cache pages to global count of MMU cache pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Reenable VFIO support on POWER systems
- From: Timothy Pearson <tpearson@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vfio/pci: Propagate ACPI notifications to the user-space
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] KVM: SVM: Disable TDP MMU when running on Hyper-V
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/4] iommufd: Add IOMMU_DEVICE_GET_HW_INFO
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH v3 0/4] several updates to virtio/vsock
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 4/4] test/vsock: copy to user failure test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 3/4] virtio/vsock: don't drop skbuff on copy failure
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 2/4] virtio/vsock: remove redundant 'skb_pull()' call
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/4] virtio/vsock: don't use skbuff state to account credit
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 0/4] several updates to virtio/vsock
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 0/4] several updates to virtio/vsock
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [Patch v4 07/18] KVM: x86/mmu: Unconditionally count allocations from MMU page caches
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [Patch v4 06/18] KVM: x86/mmu: Shrink split_shadow_page_cache via MMU shrinker
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [Patch v4 05/18] KVM: x86/mmu: Add split_shadow_page_cache pages to global count of MMU cache pages
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v2 02/17] iommufd: Add iommufd_group
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH 00/12] iommufd: Add nesting infrastructure
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/4] iommufd: Add IOMMU_DEVICE_GET_HW_INFO
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio/pci: Propagate ACPI notifications to the user-space
- From: Grzegorz Jaszczyk <jaz@xxxxxxxxxxxx>
- Re: [PATCH 3/3] powerpc/kvm: Enable prefixed instructions for HV KVM and disable for PR KVM
- From: Sachin Sant <sachinp@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] iommu: Move dev_iommu_ops() to private header
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/17] iommufd: Move isolated msi enforcement to iommufd_device_bind()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- [PATCH v17 07/12] target/s390x/cpu topology: activate CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 08/12] qapi/s390x/cpu topology: set-cpu-topology qmp command
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 09/12] machine: adding s390 topology to query-cpu-fast
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 10/12] machine: adding s390 topology to info hotpluggable-cpus
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 12/12] docs/s390x/cpu topology: document s390x cpu topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 11/12] qapi/s390x/cpu topology: CPU_POLARIZATION_CHANGE qapi event
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 06/12] s390x/cpu topology: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 05/12] s390x/cpu topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 03/12] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 02/12] s390x/cpu topology: add topology entries on CPU hotplug
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 04/12] s390x/sclp: reporting the maximum nested topology entries
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 01/12] s390x/cpu topology: add s390 specifics to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v17 00/12] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH V3 12/16] x86/sev: Add a #HV exception handler
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v2 0/4] Reenable VFIO support on POWER systems
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Reenable VFIO support on POWER systems
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [RFC PATCH v3 4/4] test/vsock: copy to user failure test
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 2/4] virtio/vsock: remove redundant 'skb_pull()' call
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 3/4] virtio/vsock: don't drop skbuff on copy failure
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 1/4] virtio/vsock: don't use skbuff state to account credit
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 0/4] several updates to virtio/vsock
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add coverage of MTE system registers
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH v12 050/106] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 15/16] KVM: arm64: selftests: Augment existing timer test to handle variable offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: arm64: timers: Allow userspace to set the counter offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 08/16] KVM: arm64: timers: Allow userspace to set the counter offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 2/5] iommu/vt-d: Implement hw_info for iommu capability query
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 5/5] iommu/vt-d: Add nested domain support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 4/5] iommu/vt-d: Add helper to setup pasid nested translation
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 1/5] iommufd: Add nesting related data structures for Intel VT-d
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 3/5] iommu/vt-d: Extend dmar_domain to support nested domain
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 0/5] Add Intel VT-d nested translation
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH 12/12] iommufd/selftest: Add coverage for IOMMU_HWPT_INVALIDATE ioctl
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 11/12] iommufd/selftest: Add IOMMU_TEST_OP_MD_CHECK_IOTLB test op
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 10/12] iommufd/selftest: Add coverage for IOMMU_HWPT_ALLOC with user data
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 09/12] iommufd/selftest: Add domain_alloc_user() support in iommu mock
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 05/12] iommufd/hw_pagetable: Do not populate user-managed hw_pagetables
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 08/12] iommufd/device: Report supported hwpt_types
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 07/12] iommufd: Add IOMMU_HWPT_INVALIDATE
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 06/12] iommufd: IOMMU_HWPT_ALLOC allocation with user data
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 04/12] iommufd: Pass parent hwpt and user_data to iommufd_hw_pagetable_alloc()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 03/12] iommufd/hw_pagetable: Use domain_alloc_user op for domain allocation
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 02/12] iommu: Add nested domain support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 01/12] iommu: Add new iommu op to create domains owned by userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 00/12] iommufd: Add nesting infrastructure
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH vfio] vfio/mlx5: Fix the report of dirty_bytes upon pre-copy
- From: Yishai Hadas <yishaih@xxxxxxxxxx>
- [PATCH v2 4/4] iommufd/selftest: Add coverage for IOMMU_DEVICE_GET_HW_INFO ioctl
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 3/4] iommufd: Add IOMMU_DEVICE_GET_HW_INFO
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 1/4] iommu: Move dev_iommu_ops() to private header
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 0/4] iommufd: Add iommu hardware info reporting
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 2/4] iommu: Add new iommu op to get iommu hardware information
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v4 04/30] lib: Apply Lindent to acpi.{c,h}
- From: Shaoqin Huang <shahuang@xxxxxxxxxx>
- Re: [Patch v4 03/18] KVM: x86/mmu: Track count of pages in KVM MMU page caches globally
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: Make setup_vmcs_config() preemption disabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 09/17] iommufd: Add enforced_cache_coherency to iommufd_hw_pagetable_alloc()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/17] iommufd: Add enforced_cache_coherency to iommufd_hw_pagetable_alloc()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH] vfio/pci: Propagate ACPI notifications to the user-space
- From: Dominik Behr <dbehr@xxxxxxxxxxxx>
- Re: [PATCH v2 05/17] iommufd: Keep track of each device's reserved regions instead of groups
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 15/17] iommufd: Add IOMMU_HWPT_ALLOC
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 12/17] iommufd: Add iommufd_device_replace()
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/2] Documentation/process: Add a label for the tip tree handbook's coding style
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio/pci: Propagate ACPI notifications to the user-space
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]