Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [V3 PATCH 0/2] Execute hypercalls from guests according to cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [V3 PATCH 0/2] Execute hypercalls from guests according to cpu
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: TDP MMU fixes for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 3/4] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Zero out valid_bank_mask for "all" case in Hyper-V IPI test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Sanity check inputs to kvm_handle_memory_failure()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Simplify kvm_apic_hw_enabled
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: hyper-v: Fix 'using uninitialized value' Coverity warning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: Remove stale comment about KVM_REQ_UNHALT
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] Prevent zero period event from being repeatedly released
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5.15 0/2] Fix kvm selftest build failures in linux-5.15.y
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: use unified srcu interface function
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] vfio_iommu_type1: increase the validity check of function parameters
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- From: "Nikunj A. Dadhania" <nikunj@xxxxxxx>
- Re: [PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: Yan Zhao <yan.y.zhao@xxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH] vfio_iommu_type1: increase the validity check of function parameters
- From: Li kunyu <kunyu@xxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [V3 PATCH 1/2] KVM: selftests: x86: Cache the cpu vendor type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [PATCH 23/27] KVM: x86/mmu: Bug the VM if write-tracking is used but not enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 24/27] KVM: x86/mmu: Drop @slot param from exported/external page-track APIs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 19/27] KVM: x86/mmu: Use page-track notifiers iff there are external users
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 26/27] KVM: x86/mmu: Add page-track API to query if a gfn is valid
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 22/27] KVM: x86/mmu: Assert that correct locks are held for page write-tracking
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 27/27] drm/i915/gvt: Drop final dependencies on KVM internal details
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 18/27] KVM: x86/mmu: Move KVM-only page-track declarations to internal header
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 21/27] KVM: x86/mmu: Rename page-track APIs to reflect the new reality
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 17/27] KVM: x86: Remove the unused page-track hook track_flush_slot()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 25/27] KVM: x86/mmu: Handle KVM bookkeeping in page-track APIs, not callers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 20/27] KVM: x86/mmu: Drop infrastructure for multiple page-track modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 15/27] KVM: x86: Add a new page-track hook to handle memslot deletion
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 16/27] drm/i915/gvt: switch from ->track_flush_slot() to ->track_remove_region()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/27] KVM: x86: Reject memslot MOVE operations if KVMGT is attached
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/27] drm/i915/gvt: Don't bother removing write-protection on to-be-deleted slot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/27] KVM: drm/i915/gvt: Drop @vcpu from KVM's ->track_write() hook
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/27] drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/27] drm/i915/gvt: Protect gfn hash table with dedicated mutex
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/27] KVM: x86/mmu: Don't rely on page-track mechanism to flush on memslot change
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/27] drm/i915/gvt: Use an "unsigned long" to iterate over memslot gfns
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/27] drm/i915/gvt: Don't rely on KVM's gfn_to_pfn() to query possible 2M GTT
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/27] KVM: x86/mmu: Don't bounce through page-track mechanism for guest PTEs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/27] drm/i915/gvt: Hoist acquisition of vgpu_lock out to kvmgt_page_track_write()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/27] drm/i915/gvt: Incorporate KVM memslot info into check for 2MiB GTT entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/27] drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/27] drm/i915/gvt: Verify VFIO-pinned page is THP when shadowing 2M gtt entry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/27] drm/i915/gvt: KVM: KVMGT fixes and page-track cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/27] KVM: x86/mmu: Factor out helper to get max mapping size of a memslot
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [V3 PATCH 2/2] KVM: selftests: x86: Add native hypercall support
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [V3 PATCH 1/2] KVM: selftests: x86: Cache the cpu vendor type
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [V3 PATCH 7/8] KVM: selftests: private_mem_test: Add support for SEV VMs
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 6/8] KVM: selftests: Refactor private_mem_test
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 8/8] KVM: selftests: Add private mem test for SEV VMs
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 5/8] KVM: selftests: Enable pagetable mapping for SEV VMs
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 4/8] KVM: selftests: Split SEV VM creation logic
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 3/8] KVM: selftests: x86: Support changing gpa encryption masks
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 2/8] KVM: selftests: Support mapping pagetables to guest virtual memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 1/8] KVM: selftests: private_mem: Use native hypercall
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 0/8] KVM: selftests: SEV: selftests for fd-based private memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [PATCH 5.15 2/2] KVM: selftests: Fix build regression by using accessor function
- From: Tyler Hicks <code@xxxxxxxxxxx>
- [PATCH 5.15 1/2] tools/include: Add _RET_IP_ and math definitions to kernel.h
- From: Tyler Hicks <code@xxxxxxxxxxx>
- [PATCH 5.15 0/2] Fix kvm selftest build failures in linux-5.15.y
- From: Tyler Hicks <code@xxxxxxxxxxx>
- [V3 PATCH 2/2] KVM: selftests: x86: Add native hypercall support
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 1/2] KVM: selftests: x86: Cache the cpu vendor type
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [V3 PATCH 0/2] Execute hypercalls from guests according to cpu
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v2 04/13] riscv: hwcap: make ISA extension ids can be used in asm
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH V5 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [RFC PATCH 1/2] KVM: x86/xen: Fix use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- [RFC PATCH 0/2] Use-after-free in kvm_xen_eventfd_update()
- From: Michal Luczaj <mhal@xxxxxxx>
- [RFC PATCH 2/2] KVM: x86/xen: Simplify eventfd IOCTLs
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [GIT PULL] virtio,vhost,vdpa: features, fixes, cleanups
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 2/2] arm/psci: Add PSCI_CPU_OFF testscase to arm/psci testsuite
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Dov Murik <dovmurik@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] of: overlay: Fix trivial typo
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] vfio/type1: Respect IOMMU reserved regions in vfio_test_domain_fgsp()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 12/15] KVM: x86/vmx: Disable Arch LBREn bit in #DB and warm reset
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 05/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 06/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_CTL for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 10/15] KVM: x86/vmx: Check Arch LBR config when return perf capabilities
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 15/15] KVM: x86/cpuid: Advertise Arch LBR feature in CPUID
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 05/15] KVM: vmx/pmu: Emulate MSR_ARCH_LBR_DEPTH for guest Arch LBR
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v2 01/15] perf/x86/lbr: Simplify the exposure check for the LBR_INFO registers
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] MIPS: remove support for trap and emulate KVM
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v8 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v8 3/7] kvm: x86/pmu: prepare the pmu event filter for masked events
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH v8 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [RFC PATCH 1/6] vdpa: add bind_mm callback
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [GIT PULL] KVM/RISC-V changes for Linux 6.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: David Gibson <david@xxxxxxxxxxxxxxxxxxxxx>
- [Patch v3 8/9] KVM: x86/mmu: Make split_shadow_page_cache NUMA aware
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 9/9] KVM: x86/mmu: Reduce default cache size in KVM from 40 to PT64_ROOT_MAX_LEVEL
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 7/9] KVM: x86/mmu: Allocate page table's pages on NUMA node of the underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 6/9] KVM: Provide NUMA node support to kvm_mmu_memory_cache{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 4/9] KVM: Add module param to make page tables NUMA aware
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 3/9] KVM: x86/mmu: Shrink split_shadow_page_cache via KVM MMU shrinker
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 5/9] KVM: x86/mmu: Allocate TDP page table's page on correct NUMA node on split
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 1/9] KVM: x86/mmu: Repurpose KVM MMU shrinker to purge shadow page caches
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 2/9] KVM: x86/mmu: Remove zapped_obsolete_pages from struct kvm_arch{}
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v3 0/9] NUMA aware page table's pages allocation
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC 03/14] KVM: x86/MMU: Move the Shadow MMU implementation to shadow_mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 12/14] KVM: x86/MMU: Remove unneeded exports from shadow_mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 11/14] KVM: x86/MMU: Factor Shadow MMU wrprot / clear dirty ops out of mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 10/14] KVM: x86/MMU: Fix naming on prepare / commit zap page functions
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 13/14] KVM: x86/MMU: Wrap uses of kvm_handle_gfn_range in mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 14/14] KVM: x86/MMU: Add kvm_shadow_mmu_ to the last few functions in shadow_mmu.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 09/14] KVM: x86/MMU: Only make pages available on Shadow MMU fault
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 08/14] KVM: x86/MMU: Clean up naming of exported Shadow MMU functions
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 06/14] KVM: x86/MMU: Clean up Shadow MMU exports
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 07/14] KVM: x86/MMU: Cleanup shrinker interface with Shadow MMU
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 05/14] KVM: x86/MMU: Move paging_tmpl.h includes to shadow_mmu.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 04/14] KVM: x86/MMU: Expose functions for paging_tmpl.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 02/14] KVM: x86/MMU: Expose functions for the Shadow MMU
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 01/14] KVM: x86/MMU: Add shadow_mmu.(c|h)
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- [RFC 00/14] KVM: x86/MMU: Formalize the Shadow MMU
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH V5 5/7] KVM: selftests: add library for creating/interacting with SEV guests
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- [syzbot] INFO: trying to register non-static key in __timer_delete_sync
- From: syzbot <syzbot+1e164be619b690a43d79@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/11] SVM: vNMI (with my fixes)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] MIPS: remove support for trap and emulate KVM
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH 1/1] kvm selftests: Add conditional KVM_CAP_DIRTY_LOG_RING_ACQ_REL define kernel sources
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- DMAR: [DMA Read NO_PASID] Request device [0b:00.0] fault addr 0xffffe000 [fault reason 0x06] PTE Read access is not set
- From: Major Saheb <majosaheb@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] KVM: x86: Fix trivial typo
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 3/3] of: overlay: Fix trivial typo
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v2] KVM: VMX: Use tabs instead of spaces for indentation
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- [PATCH v2] KVM: VMX: Fix indentation coding style issue
- From: Rong Tao <rtoax@xxxxxxxxxxx>
- Re: [PATCH v9 06/12] vdpa: request iova_range only once
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v6 1/1] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 1/1] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v6 0/1] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH v2] MIPS: remove support for trap and emulate KVM
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/12] vdpa: request iova_range only once
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- Re: [RFC 06/12] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RFC 01/12] vfio: Allocate per device file structure
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Cindy Lu <lulu@xxxxxxxxxx>
- RE: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [RFC 07/12] vfio: Block device access via device fd until device is opened
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 06/12] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- RE: [RFC 01/12] vfio: Allocate per device file structure
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Jason Wang <jasowang@xxxxxxxxxx>
- RE: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- [PATCH 2/3] KVM: x86: Fix trivial typo
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH 3/3] of: overlay: Fix trivial typo
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH 1/3] scripts/spelling.txt: Add permitted
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH 0/3] spelling: Fix some trivial typos
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- Re: [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH V7 7/7] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 6/7] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 1/7] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 5/7] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 3/7] vfio/type1: track locked_vm per dma
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 4/7] vfio/type1: restore locked_vm
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V7 0/7] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH 0/3] KVM: arm64: Fix handling of S1PTW S2 fault on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 3/3] KVM: arm64: Convert FSC_* over to ESR_ELx_FSC_*
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 2/3] KVM: arm64: Handle S1PTW translation with TCR_HA set as a write
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH 1/3] KVM: arm64: Fix S1PTW handling on RO memslots
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- RE: [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [kvm-unit-tests PATCH v1 1/1] s390x: fix make standalone
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 13/16] vfio/ccw: allocate/populate the guest idal
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/16] vfio/ccw: read only one Format-1 IDAW
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [PATCH v2 04/16] vfio/ccw: move where IDA flag is set in ORB
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 09/16] vfio/ccw: populate page_array struct inline
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 06/16] vfio/ccw: simplify CCW chain fetch routines
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 03/16] vfio/ccw: allow non-zero storage keys
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 10/16] vfio/ccw: refactor the idaw counter
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 12/16] vfio/ccw: calculate number of IDAWs regardless of format
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 01/16] vfio/ccw: cleanup some of the mdev commentary
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 15/16] vfio/ccw: don't group contiguous pages on 2K IDAWs
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 11/16] vfio/ccw: read only one Format-1 IDAW
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 13/16] vfio/ccw: allocate/populate the guest idal
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 16/16] vfio/ccw: remove old IDA format restrictions
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 14/16] vfio/ccw: handle a guest Format-1 IDAL
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 02/16] vfio/ccw: simplify the cp_get_orb interface
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH v2 08/16] vfio/ccw: pass page count to page_array struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH 1/1] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- [PATCH v2 00/16] vfio/ccw: channel program cleanup
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- [PATCH 0/1] KVM: selftests: kvm_vm_elf_load() and elfhdr_get() should close fd
- From: Reiji Watanabe <reijiw@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v8 7/7] selftests: kvm/x86: Test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 6/7] selftests: kvm/x86: Add testing for KVM_SET_PMU_EVENT_FILTER
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 5/7] selftests: kvm/x86: Add flags when creating a pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 3/7] kvm: x86/pmu: prepare the pmu event filter for masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 0/7] Introduce and test masked events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 2/7] kvm: x86/pmu: Remove impossible events from the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH v8 1/7] kvm: x86/pmu: Correct the mask used in a pmu event filter lookup
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- [PATCH] KVM: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] KVM: x86: Sanity check inputs to kvm_handle_memory_failure()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH v2] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 0/3] accel: Silent few -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [GIT PULL] KVM/RISC-V changes for Linux 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 3/3] softmmu: Silent -Wmissing-field-initializers warning
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 2/3] accel/kvm: Silent -Wmissing-field-initializers warning
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 1/3] tcg: Silent -Wmissing-field-initializers warning
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- Re: [PATCH 0/3] accel: Silent few -Wmissing-field-initializers warning
- From: Daniel P. Berrangé <berrange@xxxxxxxxxx>
- [PATCH 3/3] softmmu: Silent -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 2/3] accel/kvm: Silent -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 0/3] accel: Silent few -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 1/3] tcg: Silent -Wmissing-field-initializers warning
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] s390/vfio_ap: increase max wait time for reset verification
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/2] arm/psci: Add PSCI_CPU_OFF testscase to arm/psci testsuite
- From: Nikita Venkatesh <Nikita.Venkatesh@xxxxxxx>
- [kvm-unit-tests PATCH v3] arm: Add PSCI CPU_OFF test
- From: Nikita Venkatesh <Nikita.Venkatesh@xxxxxxx>
- [kvm-unit-tests PATCH v3 1/2] arm/psci: Test that CPU 1 has been successfully brought online
- From: Nikita Venkatesh <Nikita.Venkatesh@xxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 5/7] s390/vfio_ap: fix handling of error response codes
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] s390/vfio_ap: verify ZAPQ completion after return of response code zero
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] s390/vfio_ap: use TAPQ to verify reset in progress completes
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v6 0/2] KVM: x86/xen: update Xen CPUID Leaf 4
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v6 1/2] KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also capture limit
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- [PATCH v6 2/2] KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if present
- From: Paul Durrant <pdurrant@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH] vhost_vdpa: fix the compile issue in commit 881ac7d2314f
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Chao Gao <chao.gao@xxxxxxxxx>
- Re: [PATCH v3 0/2] arm: enable MTE for QEMU + kvm
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] dump: Include missing "cpu.h" header for tswap32/tswap64() declarations
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Mads Ynddal <mads@xxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v2 00/11] SVM: vNMI (with my fixes)
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/1] s390x: add CMM test during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/1] s390x: test CMM during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 18/32] x86/fred: add a debug fault entry stub for FRED
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: "Liu, Jingqi" <jingqi.liu@xxxxxxxxx>
- Re: [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [kvm-unit-tests PATCH v5 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v5 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: use unified srcu interface function
- From: Hao Peng <flyingpenghao@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH 30/32] x86/fred: allow FRED systems to use interrupt vectors 0x10-0x1f
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 31/32] x86/fred: allow dynamic stack frame size
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 26/32] x86/fred: no ESPFIX needed when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 28/32] x86/fred: fixup fault on ERETU by jumping to fred_entrypoint_user
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 27/32] x86/fred: allow single-step trap and NMI when starting a new thread
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 32/32] x86/fred: disable FRED by default in its early stage
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 29/32] x86/ia32: do not modify the DPL bits for a null selector
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 24/32] x86/fred: let ret_from_fork() jmp to fred_exit_user when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 22/32] x86/fred: FRED initialization code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 23/32] x86/fred: update MSR_IA32_FRED_RSP0 during task switch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 25/32] x86/fred: disallow the swapgs instruction when FRED is enabled
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 13/32] x86/fred: header file for event types
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 15/32] x86/fred: make unions for the cs and ss fields in struct pt_regs
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 17/32] x86/fred: add a page fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 18/32] x86/fred: add a debug fault entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 08/32] x86/objtool: teach objtool about ERETU and ERETS
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 04/32] x86/traps: add external_interrupt() to dispatch external interrupts
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 16/32] x86/fred: reserve space for the FRED stack frame
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 05/32] x86/traps: add exc_raise_irq() for VMX IRQ reinjection
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 14/32] x86/fred: header file with FRED definitions
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 07/32] x86/opcode: add ERETU, ERETS instructions to x86-opcode-map
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 19/32] x86/fred: add a NMI entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 12/32] x86/cpu: add MSR numbers for FRED configuration
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 11/32] x86/fred: if CONFIG_X86_FRED is disabled, disable FRED support
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 09/32] x86/cpu: add X86_CR4_FRED macro
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 21/32] x86/fred: FRED entry/exit and dispatch code
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 20/32] x86/fred: add a machine check entry stub for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 10/32] x86/fred: add Kconfig option for FRED (CONFIG_X86_FRED)
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 06/32] x86/cpufeature: add the cpu feature bit for FRED
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 03/32] x86/traps: add install_system_interrupt_handler()
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 02/32] x86/traps: add a system interrupt table for system interrupt dispatch
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 01/32] x86/traps: let common_interrupt() handle IRQ_MOVE_CLEANUP_VECTOR
- From: Xin Li <xin3.li@xxxxxxxxx>
- [RFC PATCH 00/32] x86: enable FRED for x86-64
- From: Xin Li <xin3.li@xxxxxxxxx>
- Re: Coverity: handle_vmclear(): Error handling issues
- From: Thorsten Leemhuis <linux@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: Binbin Wu <binbin.wu@xxxxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/4] arm: pmu: Print counter values as hexadecimals
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/4] arm: pmu: Add support for PMUv3p5
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/4] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/4] arm: pmu: Prepare for testing 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/4] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- RE: [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [PATCH] KVM: selftests: Zero out valid_bank_mask for "all" case in Hyper-V IPI test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 14/16] vfio/ccw: handle a guest Format-1 IDAL
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/13] riscv: fix jal offsets in patched alternatives
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v1 13/16] vfio/ccw: allocate/populate the guest idal
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: Coverity: handle_vmclear(): Error handling issues
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V6 0/7] fixes for virtual address update
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v1 16/16] vfio/ccw: remove old IDA format restrictions
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 15/16] vfio/ccw: don't group contiguous pages on 2K IDAWs
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 14/16] vfio/ccw: handle a guest Format-1 IDAL
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 11/16] vfio/ccw: discard second fmt-1 IDAW
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 13/16] vfio/ccw: allocate/populate the guest idal
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v1 12/16] vfio/ccw: calculate number of IDAWs regardless of format
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 11/16] vfio/ccw: discard second fmt-1 IDAW
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 10/16] vfio/ccw: refactor the idaw counter
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH] arm: Remove MAX_SMP probe loop
- From: Colton Lewis <coltonlewis@xxxxxxxxxx>
- Re: [PATCH V6 0/7] fixes for virtual address update
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: RFC: few questions about hypercall patching in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH] KVM: Destroy target device if coalesced MMIO unregistration fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 08/16] vfio/ccw: pass page count to page_array struct
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH v1 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Eric Farman <farman@xxxxxxxxxxxxx>
- Re: [PATCH iommufd v2 8/9] irq/s390: Add arch_is_isolated_msi() for s390
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Install sanitised kernel headers before compilation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH Part2 v6 07/49] x86/sev: Invalid pages from direct map when adding it to RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2 0/2] target/i386/kvm: fix two svm pmu virtualization bugs
- From: Dongli Zhang <dongli.zhang@xxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- [linux-next:master] BUILD REGRESSION d650871875b2ccc670f1044be7f3cc90f276745d
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 0/1] QEMU: Dirty quota-based throttling of vcpus
- From: Hyman Huang <huangy81@xxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Halil Pasic <pasic@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Chao Gao <chao.gao@xxxxxxxxx>
- RE: [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- RE: [PATCH v10 052/108] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: "Wang, Wei W" <wei.w.wang@xxxxxxxxx>
- Re: [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH] KVM: selftests: Install sanitised kernel headers before compilation
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [RFC 00/12] Add vfio_device cdev for iommufd support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [RFC 11/12] vfio: Add ioctls for device cdev iommufd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 12/12] vfio: Compile group optionally
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 08/12] vfio: Add infrastructure for bind_iommufd and attach
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 09/12] vfio: Make vfio_device_open() exclusive between group path and device cdev path
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 07/12] vfio: Block device access via device fd until device is opened
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 10/12] vfio: Add cdev for vfio_device
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 06/12] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 05/12] kvm/vfio: Accept vfio device file from userspace
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 04/12] kvm/vfio: Rename kvm_vfio_group to prepare for accepting vfio device fd
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 02/12] vfio: Refine vfio file kAPIs
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 03/12] vfio: Accept vfio device file in the driver facing kAPI
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 01/12] vfio: Allocate per device file structure
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- [RFC 00/12] Add vfio_device cdev for iommufd support
- From: Yi Liu <yi.l.liu@xxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH V6 3/7] vfio/type1: track locked_vm per dma
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH V6 6/7] vfio/type1: revert "implement notify callback"
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH V6 7/7] vfio: revert "iommu driver notify callback"
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH V6 4/7] vfio/type1: restore locked_vm
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH V6 5/7] vfio/type1: revert "block on invalid vaddr"
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH] vhost_net: revert upend_idx only on retriable error
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- [PATCH v4] vhost_vdpa: fix the crash in unmap a large memory
- From: Cindy Lu <lulu@xxxxxxxxxx>
- Re: [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- 答复: Found a memory leak in kvm module
- From: 柳菁峰 <liujingfeng@xxxxxxxxxxx>
- Re: [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH linux-next] KVM: x86/xen: Remove unneeded semicolon
- From: <zhang.songyi@xxxxxxxxxx>
- Re: [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 0/1] QEMU: Dirty quota-based throttling of vcpus
- From: Shivam Kumar <shivam.kumar1@xxxxxxxxxxx>
- [RFC PATCH v1 2/2] vsock_test: mutual hungup reproducer
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v1 1/2] virtio/vsock: send credit update depending on SO_RCVLOWAT
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v1 0/2] virtio/vsock: fix mutual rx/tx hungup
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v2 7/9] target/riscv/cpu: Restrict some sysemu-specific fields from CPUArchState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 9/9] target/xtensa/cpu: Include missing "memory.h" header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 8/9] target/sparc/sysemu: Remove pointless CONFIG_USER_ONLY guard
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 7/9] target/riscv/cpu: Restrict some sysemu-specific fields from CPUArchState
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 5/9] target/ppc/kvm: Remove unused "sysbus.h" header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 6/9] target/riscv/cpu: Move Floating-Point fields closer
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 4/9] target/ppc/internal: Restrict MMU declarations to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 3/9] target/loongarch/cpu: Restrict "memory.h" header to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 2/9] target/loongarch/cpu: Remove unused "sysbus.h" header
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 1/9] target/alpha: Remove obsolete STATUS document
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v2 0/9] target/misc: Header cleanups around "cpu.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] exec: Rename NEED_CPU_H -> CONFIG_TARGET
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- Re: [PATCH 2/2] sysemu/kvm: Reduce target-specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [Bug 216812] kvm-unit-test xapic failed on linux 6.1 release kernel
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 2/2] KVM: MMU: Make the definition of 'INVALID_GPA' common
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/2] sysemu/kvm: Reduce target-specific declarations
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH 1/2] sysemu/kvm: Remove CONFIG_USER_ONLY guard
- From: Richard Henderson <richard.henderson@xxxxxxxxxx>
- Re: [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] exec: Rename NEED_CPU_H -> CONFIG_TARGET
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 2/2] sysemu/kvm: Reduce target-specific declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 1/2] sysemu/kvm: Remove CONFIG_USER_ONLY guard
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH 0/2] sysemu/kvm: Header cleanups around "cpu.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 4/5] target/cpu: Restrict cpu_get_phys_page_debug() handlers to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 5/5] target/cpu: Restrict do_transaction_failed() handlers to sysemu
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 0/5] target/cpu: System/User cleanups around hwaddr/vaddr
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 1/5] dump: Include missing "cpu.h" header for tswap32/tswap64() declarations
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 3/5] gdbstub: Use vaddr type for generic insert/remove_breakpoint() API
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH v3 2/5] cputlb: Restrict SavedIOTLB to system emulation
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 09/16] vfio/ccw: populate page_array struct inline
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH-for-8.0 0/4] ppc: Clean up few headers to make them target agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v1 07/16] vfio/ccw: remove unnecessary malloc alignment
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 08/16] vfio/ccw: pass page count to page_array struct
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 11/32] KVM: x86: Inhibit APIC memslot if x2APIC and AVIC are enabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH V6 7/7] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 6/7] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 5/7] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 3/7] vfio/type1: track locked_vm per dma
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 1/7] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 4/7] vfio/type1: restore locked_vm
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 0/7] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V6 2/7] vfio/type1: prevent underflow of locked_vm via exec()
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v4 19/32] KVM: x86: Explicitly track all possibilities for APIC map's logical modes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH v6 4/7] kvm: x86/pmu: Introduce masked events to the pmu event filter
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH] kvm: kvm_main: Remove unnecessary (void*) conversions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH-for-8.0 0/4] ppc: Clean up few headers to make them target agnostic
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH v4 2/2] KVM: MMU: Make the definition of 'INVALID_GPA' common
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH-for-8.0 3/4] hw/ppc/spapr: Reduce "vof.h" inclusion
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH-for-8.0 2/4] hw/ppc/vof: Do not include the full "cpu.h"
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- Re: [PATCH-for-8.0 1/4] target/ppc/kvm: Add missing "cpu.h" and "exec/hwaddr.h"
- From: Daniel Henrique Barboza <danielhb413@xxxxxxxxx>
- [Bug 216812] kvm-unit-test xapic failed on linux 6.1 release kernel
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION ca39c4daa6f7f770b1329ffb46f1e4a6bcc3f291
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V5 4/7] vfio/type1: restore locked_vm
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V5 1/7] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Minor security issue on website
- From: davtur19 <davtur19@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Michal Luczaj <mhal@xxxxxxx>
- [PATCH v1 10/10] gdbstub: retire exec/gdbstub.h
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 06/12] vdpa: request iova_range only once
- From: Eugenio Perez Martin <eperezma@xxxxxxxxxx>
- [PATCH v4 0/2] KVM: MMU: Use 'INVALID_GPA' and 'INVALID_GFN' properly
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v4 1/2] KVM: MMU: Introduce 'INVALID_GFN' and use it for GFN values
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- [PATCH v4 2/2] KVM: MMU: Make the definition of 'INVALID_GPA' common
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 1/6] vdpa: add bind_mm callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v9 12/12] vdpa: always start CVQ in SVQ mode if possible
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v9 06/12] vdpa: request iova_range only once
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [RFC PATCH 1/6] vdpa: add bind_mm callback
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [Bug 216812] New: kvm-unit-test xapic failed on linux 6.1 release kernel
- From: bugzilla-daemon@xxxxxxxxxx
- Re: [linux-next:master] BUILD REGRESSION 459c73db4069c27c1d4a0e20d055b837396364b8
- From: Vincent Mailhol <vincent.mailhol@xxxxxxxxx>
- Re: [PATCH v10 106/108] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 104/108] KVM: TDX: Silently ignore INIT/SIPI
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v3] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 077/108] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH] KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page()
- From: Michal Luczaj <mhal@xxxxxxx>
- Re: [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 056/108] KVM: TDX: don't request KVM_REQ_APIC_PAGE_RELOAD
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: linux-next: manual merge of the kvm tree with the tip tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v10 052/108] KVM: x86/tdp_mmu: Ignore unsupported mmu operation on private GFNs
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH v2 vfio 0/7] pds vfio driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH V5 3/7] vfio/type1: count reserved pages
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [PATCH V5 7/7] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 5/7] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 6/7] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 4/7] vfio/type1: restore locked_vm
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 2/7] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 1/7] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 3/7] vfio/type1: count reserved pages
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V5 0/7] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V4 0/5] fixes for virtual address update
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.2-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH V4 4/5] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 5/5] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 3/5] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 0/5] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v10 024/108] KVM: TDX: allocate/free TDX vcpu structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [GIT PULL] VFIO updates for v6.2-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] VFIO updates for v6.2-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 06/16] vfio/ccw: simplify CCW chain fetch routines
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/11] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Atish Kumar Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH v1 05/16] vfio/ccw: replace copy_from_iova with vfio_dma_rw
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v1 04/16] vfio/ccw: move where IDA flag is set in ORB
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- Re: [PATCH v1 03/16] vfio/ccw: allow non-zero storage keys
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [GIT PULL] VFIO updates for v6.2-rc1
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 05/11] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [GIT PULL v2] First batch of KVM changes for Linux 6.2
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 011/108] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [GIT PULL v2] First batch of KVM changes for Linux 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V4 0/5] fixes for virtual address update
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: Found a memory leak in kvm module
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86/xen: Use kvm_read_guest_virt() instead of open-coding it badly
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [PATCH] KVM: selftests: Fix a typo in the vcpu_msrs_set assert
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 09/11] RISC-V: KVM: Implement trap & emulate for hpmcounters
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 10/11] RISC-V: KVM: Implement perf support without sampling
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 00/11] KVM perf support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 05/11] RISC-V: KVM: Improve privilege mode filtering for perf
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 08/11] RISC-V: KVM: Disable all hpmcounter access for VS/VU mode
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 06/11] RISC-V: KVM: Add skeleton support for perf
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 11/11] RISC-V: KVM: Implement firmware events
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 01/11] RISC-V: Define helper functions expose hpm counter width and count
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 07/11] RISC-V: KVM: Add SBI PMU extension support
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 02/11] RISC-V: KVM: Define a probe function for SBI extension data structures
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 03/11] RISC-V: KVM: Return correct code for hsm stop function
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- [PATCH v2 04/11] RISC-V: KVM: Modify SBI extension handler to return SBI error code
- From: Atish Patra <atishp@xxxxxxxxxxxx>
- Re: [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: Broken link on Virtio page
- From: Cornelia Huck <cohuck@xxxxxxxxxx>
- Re: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V4 0/5] fixes for virtual address update
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 459c73db4069c27c1d4a0e20d055b837396364b8
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/2] Fix "Instructions Retired" from incorrectly counting
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH v1] KVM: x86: add KVM_CAP_DEVICE_CTRL
- From: Wei Wang <wei.w.wang@xxxxxxxxx>
- [PATCH v9 11/12] vdpa: add shadow_data to vhost_vdpa
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 12/12] vdpa: always start CVQ in SVQ mode if possible
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 10/12] vdpa: store x-svq parameter in VhostVDPAState
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 09/12] vdpa: add asid parameter to vhost_vdpa_dma_map/unmap
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 08/12] vdpa: allocate SVQ array unconditionally
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 07/12] vdpa: move SVQ vring features check to net/
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 06/12] vdpa: request iova_range only once
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 04/12] vhost: move iova_tree set to vhost_svq_start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 05/12] vdpa: add vhost_vdpa_net_valid_svq_features
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 03/12] vhost: allocate SVQ device file descriptors at device start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 01/12] vdpa: use v->shadow_vqs_enabled in vhost_vdpa_svqs_start & stop
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 02/12] vhost: set SVQ device call handler at SVQ start
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- [PATCH v9 00/12] ASID support in vhost-vdpa net
- From: Eugenio Pérez <eperezma@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] s390/vfio_ap: increase max wait time for reset verification
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 5/7] s390/vfio_ap: fix handling of error response codes
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- [PATCH] KVM: nVMX: Remove outdated comments in nested_vmx_setup_ctls_msrs().
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] s390/vfio_ap: verify ZAPQ completion after return of response code zero
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] s390/vfio_ap: use TAPQ to verify reset in progress completes
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- Re: [PATCH 2/7] s390/vfio_ap: check TAPQ response code when waiting for queue reset
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]