Linux KVM Virtualization
[Prev Page][Next Page]
- [PATCH rcu 3/7] locking: Reduce the number of locks in ww_mutex stress tests
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH rcu 6/7] rcutorture: Add RCU Tasks Trace and SRCU deadlock scenarios
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH rcu 4/7] locking/lockdep: Improve the deadlock scenario print for sync and read lock
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH rcu 2/7] rcu: Annotate SRCU's update-side lockdep dependencies
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH rcu 1/7] locking/lockdep: Introduce lock_sync()
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [GIT PULL] KVM/arm64 fixes for 6.3, part #2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- RE: [PATCH v7 15/22] vfio-iommufd: Add detach_ioas support for physical VFIO devices
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH 12/14] iommufd: Add IOMMU_HWPT_ALLOC
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 4/8] vringh: support VA with iotlb
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH v7 22/22] docs: vfio: Add vfio device cdev description
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 19/22] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 17/22] vfio-iommufd: Add detach_ioas support for emulated VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 15/22] vfio-iommufd: Add detach_ioas support for physical VFIO devices
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 16/22] iommufd/device: Add iommufd_access_detach() API
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 14/22] vfio: Record devid in vfio_device_file
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 13/22] vfio-iommufd: Split bind/attach into two steps
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 12/22] vfio-iommufd: Move noiommu support out of vfio_iommufd_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 11/22] vfio: Make vfio_device_first_open() to accept NULL iommufd for noiommu
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 06/22] kvm/vfio: Accept vfio device file from userspace
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v7 03/22] vfio: Remove vfio_file_is_group()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: arm64: Plug a couple of MM races
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- RE: [PATCH 7/7] vfio/pci: Accept device fd in VFIO_DEVICE_PCI_HOT_RESET ioctl
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 6/7] vfio: Accpet device file from vfio PCI hot reset path
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 5/7] vfio: Refine vfio file kAPIs for vfio PCI hot reset
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 4/7] vfio/pci: Renaming for accepting device fd in hot reset path
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 3/7] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 4/5] vfio/mdev: Uses the vfio emulated iommufd ops set in the mdev sample drivers
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v2 2/5] vfio-iommufd: No need to record iommufd_ctx in vfio_device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [WIP Patch v2 10/14] KVM: x86: Implement KVM_CAP_MEMORY_FAULT_NOWAIT
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: Add the missing stub function for kvm_dirty_ring_check_request()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2 2/4] iommu: Add new iommu op to get iommu hardware information
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [WIP Patch v2 04/14] KVM: x86: Add KVM_CAP_X86_MEMORY_FAULT_EXIT and associated kvm_run field
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- RE: [RFC PATCH 0/8] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: Disable interrupts while walking userspace PTs
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 0/8] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 01/16] x86/tdx: Define TDX supported page sizes as macros
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 02/16] x86/virt/tdx: Detect TDX during kernel boot
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Provide generic way to read system counter
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Print summary stats of memory latency distribution
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v2 0/2] Calculate memory access latency stats
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- [PATCH v15 07/12] x86/smpboot: Remove early_gdt_descr on 64-bit
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 06/12] x86/smpboot: Remove initial_stack on 64-bit
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 09/12] x86/smpboot: Support parallel startup of secondary CPUs
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 10/12] x86/smpboot: Send INIT/SIPI/SIPI to secondary CPUs in parallel
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 11/12] x86/smpboot: Serialize topology updates for secondary bringup
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 12/12] x86/smpboot: Allow parallel bringup for SEV-ES
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 05/12] x86/smpboot: Split up native_cpu_up into separate phases and document them
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 08/12] x86/smpboot: Remove initial_gs
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 04/12] x86/smpboot: Reference count on smpboot_setup_warm_reset_vector()
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 00/12] Parallel CPU bringup for x86_64
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 02/12] cpu/hotplug: Move idle_thread_get() to <linux/smpboot.h>
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 03/12] cpu/hotplug: Add dynamic parallel bringup states before CPUHP_BRINGUP_CPU
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- [PATCH v15 01/12] x86/apic/x2apic: Allow CPU cluster_mask to be populated in parallel
- From: Usama Arif <usama.arif@xxxxxxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 00/16] TDX host kernel support
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 0/8] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v13 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 1/2] iommu/amd: Don't block updates to GATag if guest mode is on
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: x86/ioapic: Resample the pending state of an IRQ when unmasking
- From: Dmytro Maluka <dmy@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] iommu/amd: Don't block updates to GATag if guest mode is on
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/2] iommu/amd: Fix GAM IRTEs affinity and GALog restart
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v2 1/2] iommu/amd: Don't block updates to GATag if guest mode is on
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- [PATCH v2 2/2] iommu/amd: Handle GALog overflows
- From: Joao Martins <joao.m.martins@xxxxxxxxxx>
- RE: [PATCH] KVM: Add the missing stub function for kvm_dirty_ring_check_request()
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH] KVM: Add the missing stub function for kvm_dirty_ring_check_request()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v7 3/4] block: add accounting for zone append operation
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH v7 2/4] virtio-blk: add zoned storage emulation for zoned devices
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: [PATCH v7 0/4] Add zoned storage emulation to virtio-blk driver
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- RE: [PATCH] KVM: Add the missing stub function for kvm_dirty_ring_check_request()
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [syzbot] [kvm?] WARNING in kvm_arch_vcpu_ioctl_run (4)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: WARNING in kvm_arch_vcpu_ioctl_run
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [syzbot] [kvm?] WARNING in kvm_arch_vcpu_ioctl_run (4)
- From: syzbot <syzbot+8accb43ddc6bd1f5713a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [GIT PULL] KVM fixes for Linux 6.3-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v2 2/2] KVM: arm64: Check for kvm_vma_mte_allowed in the critical section
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: arm64: Disable interrupts while walking userspace PTs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: arm64: Plug a couple of MM races
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RESEND net v4 0/4] several updates to virtio/vsock
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] KVM: Add the missing stub function for kvm_dirty_ring_check_request()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/kvm: refine condition for checking vCPU preempted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 09/32] include/exec: fix kerneldoc definition
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH v2 4/8] vringh: support VA with iotlb
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH] KVM: Add the missing stub function for kvm_dirty_ring_check_request()
- From: Shameer Kolothum <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [PATCH v13 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v13 006/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix kvm/queue breakage on clang
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [GIT PULL] KVM fixes for Linux 6.3-rc3
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] s390/vfio_ap: fix memory leak in vfio_ap device driver
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 03/16] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v7 22/22] docs: vfio: Add vfio device cdev description
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 21/22] vfio: Compile group optionally
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 20/22] vfio: Add VFIO_DEVICE_AT[DE]TACH_IOMMUFD_PT
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 17/22] vfio-iommufd: Add detach_ioas support for emulated VFIO devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 12/22] vfio-iommufd: Move noiommu support out of vfio_iommufd_bind()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 15/22] vfio-iommufd: Add detach_ioas support for physical VFIO devices
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 18/22] vfio: Add cdev for vfio_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 19/22] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 09/22] vfio: Add cdev_device_open_cnt to vfio_group
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 10/22] vfio: Make vfio_device_open() single open for device cdev path
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 16/22] iommufd/device: Add iommufd_access_detach() API
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 14/22] vfio: Record devid in vfio_device_file
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 11/22] vfio: Make vfio_device_first_open() to accept NULL iommufd for noiommu
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 08/22] vfio: Block device access via device fd until device is opened
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 07/22] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 13/22] vfio-iommufd: Split bind/attach into two steps
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 05/22] kvm/vfio: Rename kvm_vfio_group to prepare for accepting vfio device fd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 06/22] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 04/22] vfio: Accept vfio device file in the KVM facing kAPI
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 02/22] vfio: Refine vfio file kAPIs for KVM
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 03/22] vfio: Remove vfio_file_is_group()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 01/22] vfio: Allocate per device file structure
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v7 00/22] Add vfio_device cdev for iommufd support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 02/16] x86/virt/tdx: Detect TDX during kernel boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH 7/7] vfio/pci: Accept device fd in VFIO_DEVICE_PCI_HOT_RESET ioctl
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 6/7] vfio: Accpet device file from vfio PCI hot reset path
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 5/7] vfio: Refine vfio file kAPIs for vfio PCI hot reset
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 4/7] vfio/pci: Renaming for accepting device fd in hot reset path
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 3/7] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 2/7] vfio/pci: Only check ownership of opened devices in hot reset
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 1/7] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH 0/7] Introduce new methods for verifying ownership in vfio PCI hot reset
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 01/16] x86/tdx: Define TDX supported page sizes as macros
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v10 00/16] TDX host kernel support
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v2 4/5] vfio/mdev: Uses the vfio emulated iommufd ops set in the mdev sample drivers
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 3/5] vfio-iommufd: Make vfio_iommufd_emulated_bind() return iommufd_access ID
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 2/5] vfio-iommufd: No need to record iommufd_ctx in vfio_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [PATCH v2 0/5] vfio: Make emulated devices prepared for vfio device cdev
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH 0/2] KVM: x86: Fix kvm/queue breakage on clang
- From: Emanuele Giuseppe Esposito <eesposit@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: PPC: support kvm selftests
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH] KVM: x86/pmu: Fix emulation on counters' bit width
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v13 057/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 2/8] vhost-vdpa: use bind_mm/unbind_mm device callbacks
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 20/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 14/27] KVM: x86: Reject memslot MOVE operations if KVMGT is attached
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 19/27] KVM: x86/mmu: Move KVM-only page-track declarations to internal header
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 3/8] vringh: replace kmap_atomic() with kmap_local_page()
- From: "Fabio M. De Francesco" <fmdefrancesco@xxxxxxxxx>
- Re: [PATCH v2 3/8] vringh: replace kmap_atomic() with kmap_local_page()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 3/8] vringh: replace kmap_atomic() with kmap_local_page()
- From: "Fabio M. De Francesco" <fmdefrancesco@xxxxxxxxx>
- Re: [PATCH v2 8/8] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 7/8] vdpa_sim: replace the spinlock with a mutex to protect the state
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] s390/vfio_ap: fix memory leak in vfio_ap device driver
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/8] vringh: support VA with iotlb
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 2/8] vhost-vdpa: use bind_mm/unbind_mm device callbacks
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 2/4] iommu: Add new iommu op to get iommu hardware information
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 3/4] iommufd: Add IOMMU_DEVICE_GET_HW_INFO
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 1/8] vdpa: add bind_mm/unbind_mm callbacks
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH v2 2/4] iommu: Add new iommu op to get iommu hardware information
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v2 3/8] vringh: replace kmap_atomic() with kmap_local_page()
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH v5 00/19] Add vfio_device cdev for iommufd support
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH] kvm/x86: actually verify that reading MSR_IA32_UCODE_REV succeeds
- From: Daniil Tatianin <d-tatianin@xxxxxxxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v4 2/5] iommufd/selftest: Add IOMMU_TEST_OP_ACCESS_SET_IOAS coverage
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH] x86/kvm: refine condition for checking vCPU preempted
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- [offlist] RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [PATCH 1/2] KVM: PPC: Add kvm selftests support for powerpc
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 2/2] KVM: PPC: Add basic framework tests for kvm selftests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 0/2] KVM: PPC: support kvm selftests
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v2 3/8] vringh: replace kmap_atomic() with kmap_local_page()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- [RFC PATCH 10/10] KVM: selftests: Test KVM exit behavior for private memory/access
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 09/10] KVM: selftests: Add tests around sharing a restrictedmem fd
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 07/10] KVM: selftests: Add vm_userspace_mem_region_add_with_restrictedmem
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 08/10] KVM: selftests: Default private_mem_conversions_test to use 1 restrictedmem file for test data
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 06/10] KVM: selftests: Default private_mem_conversions_test to use 1 memslot for test data
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 05/10] KVM: selftests: Generalize private_mem_conversions_test for parallel execution
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 04/10] KVM: selftests: Exercise restrictedmem allocation and truncation code after KVM invalidation code has been unbound
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 03/10] KVM: selftests: Test that VM private memory should not be readable from host
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 01/10] KVM: selftests: Test error message fixes for memfd_restricted selftests
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 02/10] KVM: selftests: Test that ftruncate to non-page-aligned size on a restrictedmem fd should fail
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [RFC PATCH 00/10] Additional selftests for restrictedmem
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 2/2] KVM: x86/ioapic: Resample the pending state of an IRQ when unmasking
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v5 00/19] Add vfio_device cdev for iommufd support
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v6 12/24] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH] KVM: selftest: Add dependency rules in makefile for C source code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 6/6] KVM: VMX: Make CR0.WP a guest owned bit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 30/32] contrib/gitdm: add revng to domain map
- From: Alessandro Di Federico <ale@xxxxxx>
- Re: [PATCH v3 4/6] KVM: x86: Make use of kvm_read_cr*_bits() when testing bits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/6] KVM: x86: Do not unload MMU roots when only toggling CR0.WP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 2/6] KVM: VMX: Avoid retpoline call for control register caused exits
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 3/6] KVM: x86: Do not unload MMU roots when only toggling CR0.WP
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 3/8] vringh: replace kmap_atomic() with kmap_local_page()
- From: "Fabio M. De Francesco" <fmdefrancesco@xxxxxxxxx>
- Re: [PATCH v6 07/12] KVM: arm64: Export kvm_are_all_memslots_empty()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 5/8] vfio/pci: Remove interrupt context counter
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 0/8] vfio/pci: Support dynamic allocation of MSI-X interrupts
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 8/8] vfio/pci: Clear VFIO_IRQ_INFO_NORESIZE for MSI-X
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 6/8] vfio/pci: Move to single error path
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 7/8] vfio/pci: Support dynamic MSI-x
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 1/8] vfio/pci: Consolidate irq cleanup on MSI/MSI-X disable
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 2/8] vfio/pci: Remove negative check on unsigned vector
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 3/8] vfio/pci: Prepare for dynamic interrupt context storage
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 4/8] vfio/pci: Use xarray for interrupt context storage
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm/x86: actually verify that reading MSR_IA32_UCODE_REV succeeds
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: add KVM_VCPU_TSC_VALUE attribute
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] kvm/x86: actually verify that reading MSR_IA32_UCODE_REV succeeds
- From: Daniil Tatianin <d-tatianin@xxxxxxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v2 01/27] drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2 28/32] contrib/gitdm: add Amazon to the domain map
- From: "Durrant, Paul" <pdurrant@xxxxxxxxxxxx>
- [PATCH 2/2] KVM: SVM: Drop unprotected-by-braces variable declaration in case-statement
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/2] KVM: VMX: Drop unprotected-by-braces variable declaration in case-statement
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/2] KVM: x86: Fix kvm/queue breakage on clang
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [Intel-gfx] [PATCH v2 01/27] drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"
- From: Andrzej Hajda <andrzej.hajda@xxxxxxxxx>
- Re: [PATCH v6 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 27/32] contrib/gitdm: Add SYRMIA to the domain map
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 11/32] tcg: Clear plugin_mem_cbs on TB exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH] s390/vfio_ap: fix memory leak in vfio_ap device driver
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: VMX: Rename vmx_umip_emulated() to cpu_has_vmx_desc()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 28/32] contrib/gitdm: add Amazon to the domain map
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 23/32] iotests: always use a unique sub-directory per test
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 12/32] tcg: Drop plugin_gen_disable_mem_helpers from tcg_gen_exit_tb
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 10/32] tests/avocado: don't use tags to define drive
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 22/32] iotests: connect stdin to /dev/null when running tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 29/32] contrib/gitdm: add Alibaba to the domain-map
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 26/32] contrib/gitdm: Add ASPEED Technology to the domain map
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 09/32] include/exec: fix kerneldoc definition
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 13/32] include/qemu/plugin: Remove QEMU_PLUGIN_ASSERT
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 32/32] contrib/gitdm: add group map for AMD
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 31/32] contrib/gitdm: add more individual contributors
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 07/32] tests/tcg: add some help output for running individual tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 30/32] contrib/gitdm: add revng to domain map
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 24/32] iotests: register each I/O test separately with meson
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 20/32] iotests: strip subdir path when listing tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 25/32] iotests: remove the check-block.sh script
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 18/32] iotests: explicitly pass source/build dir to 'check' command
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 21/32] iotests: print TAP protocol version when reporting tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 16/32] include/qemu: Split out plugin-event.h
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 15/32] *: Add missing includes of qemu/plugin.h
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 19/32] iotests: allow test discovery before building
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 17/32] include/qemu/plugin: Inline qemu_plugin_disable_mem_helpers
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 14/32] *: Add missing includes of qemu/error-report.h
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 08/32] tests/tcg: disable pauth for aarch64 gdb tests
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 06/32] include/qemu: add documentation for memory callbacks
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 05/32] gitlab: update centos-8-stream job
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 04/32] scripts/ci: update gitlab-runner playbook to handle CentOS
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 03/32] scripts/ci: add libslirp-devel to build-environment
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 01/32] tests/avocado: update AArch64 tests to Alpine 3.17.2
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 02/32] tests/docker: all add DOCKER_BUILDKIT to RUNC environment
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2 00/32] tweaks and fixes for 8.0-rc1 (tests, plugins, docs)
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH] s390/vfio_ap: fix memory leak in vfio_ap device driver
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH kvmtool 1/1] Add virtio-transport option and deprecate force-pci and virtio-legacy.
- From: Rajnesh Kanwal <rkanwal@xxxxxxxxxxxx>
- Re: [PATCH kernel v4] KVM: PPC: Make KVM_CAP_IRQFD_RESAMPLE support platform dependent
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 kvmtool] Add virtio-transport option and deprecate force-pci and virtio-legacy.
- From: Rajnesh Kanwal <rkanwal@xxxxxxxxxxxx>
- Re: [PATCH v2 20/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: VMX: Remove a unnecessary cpu_has_vmx_desc() check in vmx_set_cr4()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 20/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/3] s390x/spec_ex: Add test introducing odd address into PSW
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/3] s390x/spec_ex: Use PSW macro
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/3] s390x: Add misaligned instruction tests
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2 14/27] KVM: x86: Reject memslot MOVE operations if KVMGT is attached
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] s390/vfio_ap: fix memory leak in vfio_ap device driver
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/kvm: refine condition for checking vCPU preempted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 19/27] KVM: x86/mmu: Move KVM-only page-track declarations to internal header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/5] target/i386: Update AMD EPYC CPU Models
- From: "Moger, Babu" <babu.moger@xxxxxxx>
- [PATCH v18 14/17] tests/avocado: s390x cpu topology polarisation
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 16/17] tests/avocado: s390x cpu topology test dedicated CPU
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 12/17] docs/s390x/cpu topology: document s390x cpu topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 17/17] tests/avocado: s390x cpu topology test socket full
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 15/17] tests/avocado: s390x cpu topology entitlement tests
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 13/17] tests/avocado: s390x cpu topology core
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 11/17] qapi/s390x/cpu topology: CPU_POLARIZATION_CHANGE qapi event
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 10/17] machine: adding s390 topology to info hotpluggable-cpus
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 09/17] machine: adding s390 topology to query-cpu-fast
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 08/17] qapi/s390x/cpu topology: set-cpu-topology qmp command
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 06/17] s390x/cpu topology: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 03/17] target/s390x/cpu topology: handle STSI(15) and build the SYSIB
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 07/17] target/s390x/cpu topology: activate CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 04/17] s390x/sclp: reporting the maximum nested topology entries
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 02/17] s390x/cpu topology: add topology entries on CPU hotplug
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 01/17] s390x/cpu topology: add s390 specifics to CPU topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 05/17] s390x/cpu topology: resetting the Topology-Change-Report
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH v18 00/17] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 38/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Peter Gonda <pgonda@xxxxxxxxxx>
- Re: [PATCH v2 1/5] iommufd: Add nesting related data structures for Intel VT-d
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] s390x/spec_ex: Add test introducing odd address into PSW
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH v1 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- [kvm:queue 24/34] arch/x86/kvm/vmx/vmx.c:2328:3: error: expected expression
- From: kernel test robot <lkp@xxxxxxxxx>
- [kvm-unit-tests PATCH 0/6] arm: pmu: Fix random failures of pmu-chain-promotion
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH 2/6] arm: pmu: pmu-chain-promotion: Introduce defines for count and margin values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH 1/6] arm: pmu: pmu-chain-promotion: Improve debug messages
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH 6/6] arm: pmu-chain-promotion: Increase the count and margin values
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH 3/6] arm: pmu: Add extra DSB barriers in the mem_access loop
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- [kvm-unit-tests PATCH 5/6] arm: pmu: Add pmu-memaccess-reliability test
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvm-unit-tests PATCH 4/6] arm: pmu: Fix chain counter enable/disable sequences
- From: Eric Auger <eric.auger@xxxxxxxxxx>
- Re: [PATCH v2 20/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v13 006/113] KVM: x86: Introduce vm_type to differentiate default VMs from confidential VMs
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v13 005/113] KVM: TDX: Add placeholders for TDX VM/vcpu structure
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH RESEND v2] KVM: move KVM_CAP_DEVICE_CTRL to the generic check
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v2 20/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v13 004/113] KVM: TDX: Initialize logical processor when onlined
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 19/27] KVM: x86/mmu: Move KVM-only page-track declarations to internal header
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- [PATCH] KVM: x86: SVM: Fix one redefine issue about VMCB_AVIC_APIC_BAR_MASK
- From: korantwork@xxxxxxxxx
- Re: [PATCH v2 14/27] KVM: x86: Reject memslot MOVE operations if KVMGT is attached
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- RE: [PATCH v6 21/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH V3 00/16] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v6 19/24] vfio-iommufd: Add detach_ioas support for emulated VFIO devices
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v6 19/24] vfio-iommufd: Add detach_ioas support for emulated VFIO devices
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH] vfio/pci: Add DVSEC PCI Extended Config Capability to user visible list.
- From: "K V P, Satyanarayana" <satyanarayana.k.v.p@xxxxxxxxx>
- Re: [RFC PATCH kernel 2/2] KVM: SEV: PreventHostIBS enablement for SEV-ES and SNP guest
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [RFC PATCH kernel 0/2] PreventHostIBS feature for SEV-ES and SNP guests
- From: Manali Shukla <manali.shukla@xxxxxxx>
- RE: [PATCH v6 21/24] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH] x86/kvm: refine condition for checking vCPU preempted
- From: "Li,Rongqing" <lirongqing@xxxxxxxxx>
- Re: [PATCH -next v14 08/19] riscv: Introduce struct/helpers to save/restore per-task Vector state
- From: Andy Chiu <andy.chiu@xxxxxxxxxx>
- Re: [PATCH -next v14 08/19] riscv: Introduce struct/helpers to save/restore per-task Vector state
- From: Andy Chiu <andy.chiu@xxxxxxxxxx>
- [WIP Patch v2 14/14] KVM: selftests: Handle memory fault exits in demand_paging_test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 11/14] KVM: arm64: Allow user_mem_abort to return 0 to signal a 'normal' exit
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 07/14] KVM: x86: Implement memory fault exit for setup_vmgexit_scratch
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 12/14] KVM: arm64: Implement KVM_CAP_MEMORY_FAULT_NOWAIT
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 09/14] KVM: Introduce KVM_CAP_MEMORY_FAULT_NOWAIT without implementation
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 08/14] KVM: x86: Implement memory fault exit for FNAME(fetch)
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 13/14] KVM: selftests: Add memslot_flags parameter to memstress_create_vm
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 10/14] KVM: x86: Implement KVM_CAP_MEMORY_FAULT_NOWAIT
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 04/14] KVM: x86: Add KVM_CAP_X86_MEMORY_FAULT_EXIT and associated kvm_run field
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 06/14] KVM: x86: Implement memory fault exit for kvm_handle_page_fault
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 05/14] KVM: x86: Implement memory fault exit for direct_map
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 03/14] KVM: Allow hva_pfn_fast to resolve read-only faults.
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 01/14] KVM: selftests: Allow many vCPUs and reader threads per UFFD in demand paging test
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 02/14] KVM: selftests: Use EPOLL in userfaultfd_util reader threads and signal errors via TEST_ASSERT
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- [WIP Patch v2 00/14] Avoiding slow get-user-pages via memory fault exit
- From: Anish Moorthy <amoorthy@xxxxxxxxxx>
- Re: [PATCH v2 11/27] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 05/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callback
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH v2 05/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] x86/kvm: refine condition for checking vCPU preempted
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: VMX: Stub out enable_evmcs static key
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: x86: replace kvm_vcpu_map usage in vmx
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: VMX: Stub out enable_evmcs static key
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [PATCH 15/16] KVM: arm64: selftests: Augment existing timer test to handle variable offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Retry fault if vma_lookup() results become invalid
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH 15/16] KVM: arm64: selftests: Augment existing timer test to handle variable offsets
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [patch] docs: vfio: fix header path
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH AUTOSEL 6.2 05/16] s390/virtio: sort out physical vs virtual pointers usage
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v3 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 04/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Retry fault if vma_lookup() results become invalid
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 17/28] arm64: RME: Runtime faulting of memory
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: arm64: Retry fault if vma_lookup() results become invalid
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH RESEND net v4 3/4] virtio/vsock: don't drop skbuff on copy failure
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH RESEND net v4 2/4] virtio/vsock: remove redundant 'skb_pull()' call
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH RESEND net v4 1/4] virtio/vsock: don't use skbuff state to account credit
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH v17 06/12] s390x/cpu topology: interception of PTF instruction
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 15/28] KVM: arm64: Handle realm MMIO emulation
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [RFC PATCH 16/28] arm64: RME: Allow populating initial contents
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 2/3] s390x/spec_ex: Add test introducing odd address into PSW
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/3] s390x/spec_ex: Add test of EXECUTE with odd target address
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: VMX: Stub out enable_evmcs static key
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v2 0/4] Common KVM exit reason test assertions and exit reason sync
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: VMX: Stub out enable_evmcs static key
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: selftests: xen_shinfo cleanups and slowpath test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: SVM: Fix GATag bug for >256 vCPUs
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/3] KVM: x86/mmu: Drop dedicated self-changing mapping code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/6] KVM: Standardize on "int" return types instead of "long"
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/3] KVM: support the cpu feature FLUSH_L1D
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V5 0/2] selftests: KVM: Add a test for eager page splitting
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/5] riscv: add PREEMPT_RT support
- From: "Schaffner, Tobias" <tobias.schaffner@xxxxxxxxxxx>
- [PATCH] KVM: selftests: skip hugetlb tests if huge pages are not available
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: VMX: Use tabs instead of spaces for indentation
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] KVM: nVMX: remove unnecessary #ifdef
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v2] KVM: nVMX: add missing consistency checks for CR0 and CR4
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: VMX: Fix indentation coding style issue
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5] s390x: Add tests for execute-type instructions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: add missing consistency checks for CR0 and CR4
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v5 00/19] Add vfio_device cdev for iommufd support
- From: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 fixes for 6.3, part #1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH RESEND net v4 4/4] test/vsock: copy to user failure test
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH RESEND net v4 3/4] virtio/vsock: don't drop skbuff on copy failure
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH net v4 0/4] several updates to virtio/vsock
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH RESEND net v4 2/4] virtio/vsock: remove redundant 'skb_pull()' call
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH RESEND net v4 1/4] virtio/vsock: don't use skbuff state to account credit
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH RESEND net v4 0/4] several updates to virtio/vsock
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 00/32] ACPI/arm64: add support for virtual cpuhotplug
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH net v4 4/4] test/vsock: copy to user failure test
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH net v4 4/4] test/vsock: copy to user failure test
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH net v4 3/4] virtio/vsock: don't drop skbuff on copy failure
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH net v4 2/4] virtio/vsock: remove redundant 'skb_pull()' call
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- [PATCH net v4 1/4] virtio/vsock: don't use skbuff state to account credit
- From: Arseniy Krasnov <avkrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH -next v14 11/19] riscv: Add ptrace vector support
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH -next v14 11/19] riscv: Add ptrace vector support
- From: Andy Chiu <andy.chiu@xxxxxxxxxx>
- Re: [PATCH v6 07/12] KVM: arm64: Export kvm_are_all_memslots_empty()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH kernel v4] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [RFC PATCH part-5 00/22] VMX emulation
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- Re: [PATCH v1 1/5] iommufd: Create access in vfio_iommufd_emulated_bind()
- From: Nicolin Chen <nicolinc@xxxxxxxxxx>
- Re: [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Jason Chen CJ <jason.cj.chen@xxxxxxxxx>
- Re: [PATCH v3 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 8/8] vdpa_sim: add support for user VA
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 6/8] vdpa_sim: use kthread worker
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 7/8] vdpa_sim: replace the spinlock with a mutex to protect the state
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 7/8] vdpa_sim: replace the spinlock with a mutex to protect the state
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 5/8] vdpa_sim: make devices agnostic for work management
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v2 4/8] vringh: support VA with iotlb
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v3 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- Re: [PATCH v3 5/6] KVM: arm64: Introduce ID register specific descriptor
- From: Jing Zhang <jingzhangos@xxxxxxxxxx>
- RE: [PATCH 07/12] iommufd: Add IOMMU_HWPT_INVALIDATE
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH 07/12] iommufd: Add IOMMU_HWPT_INVALIDATE
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- RE: [PATCH 07/12] iommufd: Add IOMMU_HWPT_INVALIDATE
- From: "Liu, Yi L" <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 3/8] vringh: replace kmap_atomic() with kmap_local_page()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 2/8] vhost-vdpa: use bind_mm/unbind_mm device callbacks
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 1/8] vdpa: add bind_mm/unbind_mm callbacks
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v2 04/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v13 003/113] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 5/5] iommu/vt-d: Add nested domain support
- From: Baolu Lu <baolu.lu@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_INTEL is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 07/18] x86/reboot: Disable virtualization during reboot iff callback is registered
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 05/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callback
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v6 04/12] KVM: arm64: Add kvm_pgtable_stage2_split()
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH] KVM: arm64: Retry fault if vma_lookup() results become invalid
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5] s390x: Add tests for execute-type instructions
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v6 03/12] KVM: arm64: Add helper for creating unlinked stage2 subtrees
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v14 09/12] x86/smpboot: Support parallel startup of secondary CPUs
- From: Brian Gerst <brgerst@xxxxxxxxx>
- [PATCH v4 3/3] tools/kvm_stat: use canonical ftrace path
- From: Ross Zwisler <zwisler@xxxxxxxxxx>
- [PATCH v4 2/3] leaking_addresses: also skip canonical ftrace path
- From: Ross Zwisler <zwisler@xxxxxxxxxx>
- [PATCH v4 1/3] selftests: use canonical ftrace path
- From: Ross Zwisler <zwisler@xxxxxxxxxx>
- Re: [PATCH v13 009/113] KVM: TDX: Define TDX architectural definitions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v2 2/2] KVM: arm64: PMU: Don't save PMCR_EL0.{C,P} for the vCPU
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 1/2] KVM: arm64: PMU: Fix GET_ONE_REG for vPMC regs to return the current value
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 02/12] KVM: arm64: Add KVM_PGTABLE_WALK ctx->flags for skipping BBM and CMO
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 07/18] x86/reboot: Disable virtualization during reboot iff callback is registered
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH 31/36] vhost-vdpa: vhost_vdpa_alloc_domain() should be using a const struct bus_type *
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_INTEL is enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: bugfixes
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5] s390x: Add tests for execute-type instructions
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] KVM: arm64: PMU: Preserve vPMC registers properly on migration
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/2] KVM: Don't enable hardware after a restart/shutdown is initiated
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: Disable interrupts while walking userspace PTs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 2/2] Documentation/process: Add a maintainer handbook for KVM x86
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: Disable interrupts while walking userspace PTs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: Disable interrupts while walking userspace PTs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 05/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callback
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: Disable interrupts while walking userspace PTs
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 03/18] x86/reboot: Harden virtualization hooks for emergency reboot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH part-5 00/22] VMX emulation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 06/19] KVM: arm64: timers: Allow physical offset without CNTPOFF_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH part-1 0/5] pKVM on Intel Platform Introduction
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: Disable interrupts while walking userspace PTs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 00/32] ACPI/arm64: add support for virtual cpuhotplug
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Laurentiu Tudor <laurentiu.tudor@xxxxxxx>
- Re: [PATCH -v2] x86/CPU/AMD: Make sure EFER[AIBRSE] is set
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v2 01/27] drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v2 02/27] KVM: x86/mmu: Factor out helper to get max mapping size of a memslot
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v6 07/12] KVM: arm64: Export kvm_are_all_memslots_empty()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: Don't enable hardware after a restart/shutdown is initiated
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 0/2] x86: Fixes for rdpid test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v13 002/113] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v2 5/5] iommu/vt-d: Add nested domain support
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- Re: [PATCH 0/6] bus: fsl-mc: Make remove function return void
- From: Ioana Ciornei <ioana.ciornei@xxxxxxx>
- [PATCH v2 18/19] KVM: arm64: selftests: Augment existing timer test to handle variable offset
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 17/19] KVM: arm64: selftests: Add physical timer registers to the sysreg list
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 13/19] KVM: arm64: Abstract the number of valid timers per vcpu
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 12/19] KVM: arm64: timers: Move the timer IRQs into arch_timer_vm_data
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 16/19] KVM: arm64: nv: timers: Support hyp timer emulation
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 19/19] KVM: arm64: selftests: Deal with spurious timer interrupts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 14/19] KVM: arm64: Document KVM_ARM_SET_CNT_OFFSETS and co
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 10/19] KVM: arm64: timers: Rationalise per-vcpu timer init
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 15/19] KVM: arm64: nv: timers: Add a per-timer, per-vcpu offset
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 11/19] KVM: arm64: timers: Abstract per-timer IRQ access
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 09/19] KVM: arm64: timers: Allow save/restoring of the physical timer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 08/19] KVM: arm64: timers: Allow userspace to set the global counter offset
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 06/19] KVM: arm64: timers: Allow physical offset without CNTPOFF_EL2
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 05/19] KVM: arm64: timers: Use CNTPOFF_EL2 to offset the physical timer
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 04/19] arm64: Add HAS_ECV_CNTPOFF capability
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 00/19] KVM: arm64: Rework timer offsetting for fun and profit
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 01/19] KVM: arm64: timers: Convert per-vcpu virtual offset to a global value
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 03/19] arm64: Add CNTPOFF_EL2 register definition
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 07/19] KVM: arm64: Expose {un,}lock_all_vcpus() to the reset of KVM
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 02/19] KVM: arm64: timers: Use a per-vcpu, per-timer accumulator for fractional ns
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 15/16] KVM: arm64: selftests: Augment existing timer test to handle variable offsets
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] KVM: VMX: fix lockdep warning on posted intr wakeup
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v13 009/113] KVM: TDX: Define TDX architectural definitions
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- [PATCH v3] KVM: VMX: fix lockdep warning on posted intr wakeup
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/pmu: Hide guest counter updates from the VMRUN instruction
- From: Sandipan Das <sandipan.das@xxxxxxx>
- Re: [PATCH v2 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH v2] KVM: VMX: fix lockdep warning on posted intr wakeup
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- [PATCH 2/2] KVM: arm64: Check for kvm_vma_mte_allowed in the critical section
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/2] KVM: arm64: Disable interrupts while walking userspace PTs
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 0/2] KVM: arm64: Plug a couple of MM races
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: selftests: Report enable_pmu module value when test is skipped
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 1/2] KVM: selftests: Add a helper to read kvm boolean module parameters
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v2 0/2] KVM: selftests: Report enable_pmu module value when test is skipped
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: fix lockdep warning on posted intr wakeup
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v2 03/18] x86/reboot: Harden virtualization hooks for emergency reboot
- From: Chao Gao <chao.gao@xxxxxxxxx>
- [GIT PULL] virtio,vhost,vdpa: bugfixes
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v3 5/6] KVM: arm64: Introduce ID register specific descriptor
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH v3 4/6] KVM: arm64: Use per guest ID register for ID_AA64DFR0_EL1.PMUVer
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 0/2] KVM: arm64: PMU: Preserve vPMC registers properly on migration
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 2/2] KVM: arm64: PMU: Don't save PMCR_EL0.{C,P} for the vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [PATCH 1/2] KVM: arm64: PMU: Fix GET_ONE_REG for vPMC regs to return the current value
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 2/2] KVM: arm64: PMU: Don't save PMCR_EL0.{C,P} for the vCPU
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 1/2] KVM: arm64: PMU: Fix GET_ONE_REG for vPMC regs to return the current value
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 0/2] KVM: arm64: PMU: Preserve vPMC registers properly on migration
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [RFC PATCH kernel 1/2] perf/x86/amd: Add amd_prevent_hostibs_window() to set per-cpu ibs_flags
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2 14/18] KVM: SVM: Check that the current CPU supports SVM in kvm_is_svm_supported()
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH v6 13/24] vfio/iommufd: Split the compat_ioas attach out from vfio_iommufd_bind()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v4 5/5] vfio: Support IO page table replacement
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH v1 5/5] vfio: Check the presence for iommufd callbacks in __vfio_register_dev()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v3 19/29] LoongArch: KVM: Implement kvm mmu operations
- From: Tianrui Zhao <zhaotianrui@xxxxxxxxxxx>
- Re: [PATCH v2 07/18] x86/reboot: Disable virtualization during reboot iff callback is registered
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 05/18] x86/reboot: KVM: Disable SVM during reboot via virt/KVM reboot callback
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 02/18] x86/reboot: Expose VMCS crash hooks if and only if KVM_INTEL is enabled
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 04/45] target/riscv: Refactor some of the generic vector functionality
- From: Wilfred Mallawa <wilfred.mallawa@xxxxxxx>
- Re: [PATCH v10 05/16] x86/virt/tdx: Add skeleton to enable TDX on demand
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Add coverage of MTE system registers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v13 104/113] KVM: TDX: Add a method to ignore dirty logging
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 097/113] KVM: TDX: Handle TDX PV report fatal error hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 102/113] KVM: TDX: Add methods to ignore accesses to CPU state
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 113/113] [MARKER] the end of (the first phase of) TDX KVM patch series
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 099/113] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 107/113] KVM: TDX: Ignore setting up mce
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 101/113] KVM: TDX: Silently ignore INIT/SIPI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 105/113] KVM: TDX: Add methods to ignore VMX preemption timer
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 078/113] KVM: TDX: Implements vcpu request_immediate_exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 098/113] KVM: TDX: Handle TDX PV map_gpa hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 106/113] KVM: TDX: Add methods to ignore accesses to TSC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 100/113] KVM: TDX: Silently discard SMI request
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 110/113] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 096/113] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 095/113] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 109/113] KVM: TDX: Add methods to ignore virtual apic related operation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 111/113] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 092/113] KVM: TDX: Handle TDX PV HLT hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 112/113] RFC: KVM: TDX: Make busy with S-EPT on entry bug
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 108/113] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 094/113] KVM: TDX: Handle TDX PV MMIO hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 103/113] KVM: TDX: Add methods to ignore guest instruction emulation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 093/113] KVM: TDX: Handle TDX PV port io hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 091/113] KVM: TDX: Handle TDX PV CPUID hypercall
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 090/113] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 089/113] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 088/113] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 077/113] KVM: TDX: Implement interrupt injection
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 080/113] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 083/113] KVM: TDX: Add a place holder to handle TDX VM exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 084/113] KVM: TDX: Handle vmentry failure for INTEL TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 074/113] KVM: TDX: Add support for find pending IRQ in a protected local APIC
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 079/113] KVM: TDX: Implement methods to inject NMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 085/113] KVM: TDX: handle EXIT_REASON_OTHER_SMI
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 086/113] KVM: TDX: handle ept violation/misconfig exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 081/113] KVM: VMX: Move NMI/exception handler to common helper
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 075/113] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 087/113] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 076/113] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 082/113] KVM: x86: Split core of hypercall emulation to helper function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 073/113] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 072/113] KVM: TDX: handle vcpu migration over logical processor
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 067/113] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 068/113] KVM: TDX: restore user ret MSRs
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 069/113] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 064/113] KVM: TDX: Implement TDX vcpu enter/exit path
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 040/113] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 037/113] KVM: VMX: Introduce test mode related to EPT violation VE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 066/113] KVM: TDX: restore host xsave state when exit from the guest TD
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 070/113] KVM: TDX: complete interrupts after tdexit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 065/113] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 071/113] KVM: TDX: restore debug store when TD exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 063/113] KVM: TDX: Add helper assembly function to TDX vcpu
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 036/113] KVM: x86/mmu: Allow per-VM override of the TDP max page level
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 057/113] KVM: TDX: MTRR: implement get_mt_mask() for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 059/113] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 034/113] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 056/113] KVM: TDX: TDP MMU TDX support
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 061/113] KVM: TDX: Finalize VM initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 035/113] KVM: x86/mmu: Disallow fast page fault on private GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 060/113] KVM: TDX: Create initial guest memory
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 062/113] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 058/113] [MARKER] The start of TDX KVM patch series: TD finalization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 033/113] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 049/113] KVM: x86/mmu: TDX: Do not enable page track for TD guest
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 055/113] KVM: TDX: Require TDP MMU and mmio caching for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 031/113] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 054/113] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 030/113] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 051/113] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 053/113] KVM: TDX: Add load_mmu_pgd method for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 029/113] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 050/113] KVM: VMX: Split out guts of EPT violation to common/exposed function
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 032/113] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 052/113] KVM: TDX: Add accessors VMX VMCS helpers
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 046/113] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 048/113] KVM: x86/mmu: Disallow dirty logging for x86 TDX
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 026/113] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 028/113] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 047/113] [MARKER] The start of TDX KVM patch series: TDX EPT violation
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 027/113] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 024/113] KVM: TDX: allocate/free TDX vcpu structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 045/113] KVM: x86/tdp_mmu: Sprinkle __must_check
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 025/113] KVM: TDX: Do TDX specific vcpu initialization
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 044/113] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 023/113] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 042/113] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 022/113] KVM: TDX: Refuse to unplug the last cpu on the package
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 043/113] KVM: Add flags to struct kvm_gfn_range
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 038/113] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 020/113] KVM: TDX: initialize VM with TDX specific parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 018/113] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 039/113] KVM: x86/mmu: Assume guest MMIOs are shared
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 021/113] KVM: TDX: Make pmu_intel.c ignore guest TD case
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 041/113] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 019/113] KVM: TDX: create/destroy VM structure
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 016/113] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
- From: isaku.yamahata@xxxxxxxxx
- [PATCH v13 017/113] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
- From: isaku.yamahata@xxxxxxxxx
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]