Linux KVM Virtualization
[Prev Page][Next Page]
- Re: [PATCH 1/7] s390/vfio-ap: verify reset complete in separate function
- From: Harald Freudenberger <freude@xxxxxxxxxxxxx>
- RE: [PATCH iommufd v2 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH iommufd v2 8/9] irq/s390: Add arch_is_isolated_msi() for s390
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [RFC PATCH v2 vfio 0/7] pds vfio driver
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86/mmu: Re-check under lock that TDP MMU SP hugepage is disallowed
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- RE: [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH net-next v8] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- RE: [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- RE: [RFC PATCH 2/9] KVM: x86: Add a kvm-only leaf for RRSBA_CTRL
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [PATCH RFC v7 21/64] x86/fault: fix handle_split_page_fault() to work with memfd backed pages
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: RFC: few questions about hypercall patching in KVM
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: "Jayaramappa, Srilakshmi" <sjayaram@xxxxxxxxxx>
- Re: [PATCH v12 04/17] riscv: Add vector feature to compile
- From: Atish Patra <atishp@xxxxxxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86/mmu: Re-check under lock that TDP MMU SP hugepage is disallowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH v2 vfio 7/7] vfio/pds: Add Kconfig and documentation
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 5/7] vfio/pds: Add support for dirty page tracking
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 6/7] vfio/pds: Add support for firmware recovery
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 4/7] vfio: Commonize combine_ranges for use in other VFIO drivers
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 3/7] vfio/pds: Add VFIO live migration support
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 2/7] vfio/pds: Add support to register as PDS client
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 1/7] vfio/pds: Initial support for pds_vfio VFIO driver
- From: Brett Creeley <brett.creeley@xxxxxxx>
- [RFC PATCH v2 vfio 0/7] pds vfio driver
- From: Brett Creeley <brett.creeley@xxxxxxx>
- Re: [PATCH V4 0/5] fixes for virtual address update
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 3/9] KVM: x86: Add a kvm-only leaf for BHI_CTRL
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- [PATCH V4 4/5] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC PATCH 2/9] KVM: x86: Add a kvm-only leaf for RRSBA_CTRL
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- [PATCH V4 3/5] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 5/5] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: KVM: x86: snapshotted TSC frequency causing time drifts in vms
- From: "Jayaramappa, Srilakshmi" <sjayaram@xxxxxxxxxx>
- [PATCH V4 2/5] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 0/5] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- RE: [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- Re: [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 08/64] KVM: Move kvm_for_each_memslot_in_hva_range() to be used in SVM
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 64/64] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 63/64] x86/sev: Document KVM_SEV_SNP_{G,S}ET_CERTS
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 61/64] KVM: SVM: Make VMSAVE target area memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 05/64] KVM: x86: Add 'update_mem_attr' x86 op
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 60/64] KVM: SVM: Sync the GHCB scratch buffer using already mapped ghcb
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 59/64] ccp: Add support to decrypt the page
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V3 2/5] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH RFC v7 58/64] KVM: SVM: Add module parameter to enable the SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 57/64] KVM: SEV: Handle restricted memory invalidations for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 55/64] KVM: SVM: Add SNP-specific handling for memory attribute updates
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 56/64] KVM: x86/mmu: Generate KVM_EXIT_MEMORY_FAULT for implicit conversions for SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 54/64] KVM: SVM: Support SEV-SNP AP Creation NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 50/64] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 51/64] KVM: SVM: Add support to handle the RMP nested page fault
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 53/64] KVM: SVM: Use a VMSA physical address variable for populating VMCB
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 48/64] KVM: SVM: Add support to handle Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 47/64] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 46/64] KVM: SVM: Add KVM_EXIT_VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 49/64] KVM: SVM: Introduce ops for the post gfn map and unmap
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 45/64] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 44/64] KVM: SVM: Remove the long-lived GHCB host map
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 43/64] KVM: SVM: Do not use long-lived GHCB map while setting scratch area
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 42/64] KVM: x86: Define RMP page fault error bits for #NPF
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 41/64] KVM: X86: Keep the NPT and RMP page level in sync
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 39/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 38/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 34/64] KVM: SVM: Provide the Hypervisor Feature support VMGEXIT
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 36/64] KVM: SVM: Add initial SEV-SNP support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 35/64] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 31/64] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 33/64] KVM: SVM: Add support to handle AP reset MSR protocol
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 30/64] crypto: ccp: Add the SNP_PLATFORM_STATUS command
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 32/64] crypto: ccp: Provide APIs to query extended attestation report
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 28/64] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 23/64] x86/fault: Add support to dump RMP entry on fault
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 27/64] crypto: ccp: Introduce snp leaked pages list
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 24/64] crypto:ccp: Define the SEV-SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 26/64] crypto:ccp: Provide API to issue SEV and SNP commands
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 22/64] x86/fault: Return pfn from dump_pagetable() for SEV-specific fault handling.
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 01/64] KVM: Fix memslot boundary condition for large page
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 20/64] x86/fault: Add support to handle the RMP fault for user address
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 21/64] x86/fault: fix handle_split_page_fault() to work with memfd backed pages
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 19/64] x86/traps: Define RMP violation #PF error code
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 18/64] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 17/64] x86/mm/pat: Introduce set_memory_p
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 16/64] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 15/64] x86/sev: Add RMP entry lookup helpers
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 14/64] x86/sev: Add the host SEV-SNP initialization support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 13/64] x86/cpufeatures: Add SEV-SNP CPU feature
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 12/64] KVM: SEV: Implement .fault_is_private callback
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 10/64] KVM: SEV: Populate private memory fd during LAUNCH_UPDATE_DATA
- From: Michael Roth <michael.roth@xxxxxxx>
- [PATCH RFC v7 09/64] KVM: Add HVA range operator
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH V3 2/5] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 0/5] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 4/5] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 3/5] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V3 5/5] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in kvm_set_pte_rmapp()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 0/7] improve AP queue reset processing
- From: Anthony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [GIT PULL] Please pull IOMMUFD subsystem changes
- From: pr-tracker-bot@xxxxxxxxxx
- RFC: few questions about hypercall patching in KVM
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- RE: [PATCH 0/7] KVM: VMX: Handle NMI VM-Exits in noinstr section
- From: "Li, Xin3" <xin3.li@xxxxxxxxx>
- [RFC PATCH 5/6] vdpa_sim: use kthread worker
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 0/6] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 6/6] vdpa_sim: add support for user VA
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 4/6] vdpa_sim: make devices agnostic for work management
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 3/6] vringh: support VA with iotlb
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 2/6] vhost-vdpa: use bind_mm device callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [RFC PATCH 1/6] vdpa: add bind_mm callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 663397d1b469ff57f216d499b74a0b0183a508b8
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v4 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: TDP MMU fixes for 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] improve AP queue reset processing
- From: "Jason J. Herne" <jjherne@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/6] KVM: x86/mmu: Fix wrong gfn range of tlb flushing in kvm_set_pte_rmapp()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH] gdbstub: move update guest debug to accel ops
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [kvm-unit-tests PATCH v4 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v4 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- [PATCH] KVM: x86/xen: Use kvm_read_guest_virt() instead of open-coding it badly
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH 0/5] KVM: x86/mmu: TDP MMU fixes for 6.2
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] KVM: x86/mmu: Re-check under lock that TDP MMU SP hugepage is disallowed
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] KVM: x86/mmu: Don't attempt to map leaf if target TDP MMU SPTE is frozen
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 105/108] KVM: TDX: Add methods to ignore accesses to CPU state
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 098/108] KVM: TDX: Implement callbacks for MSR operations for TDX
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 047/108] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [PATCH net-next v7] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH v10 046/108] KVM: Add flags to struct kvm_gfn_range
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 11/27] lib: Add random number generator
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Paul Durrant <xadimgnik@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 4/9] KVM: s390: selftest: memop: Replace macros by functions
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH net-next v7] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 5/7] x86/entry: KVM: Use dedicated VMX NMI entry for 32-bit kernels too
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- RE: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: "Zhang, Chen" <chen.zhang@xxxxxxxxx>
- Re: [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Ravi Bangoria <ravi.bangoria@xxxxxxx>
- Re: [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86/MMU: Move pte_list operations to rmap.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86/MMU: Move pte_list operations to rmap.c
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH V2 3/5] vfio/type1: revert "block on invalid vaddr"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 5/5] vfio: revert "iommu driver notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 4/5] vfio/type1: revert "implement notify callback"
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 2/5] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 0/5] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V2 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [PATCH net-next v7] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- RE: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [linux-stable-rc:linux-5.15.y 2855/9999] arch/x86/kvm/hyperv.c:2185:5: warning: stack frame size (1036) exceeds limit (1024) in 'kvm_hv_hypercall'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 3/3] arm: pmu: Add tests for 64-bit overflows
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH v4 5/9] KVM: s390: selftest: memop: Move testlist into main
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 1/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 7/9] KVM: s390: selftest: memop: Add bad address test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 6/9] KVM: s390: selftest: memop: Add cmpxchg tests
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 4/9] KVM: s390: selftest: memop: Replace macros by functions
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 3/9] KVM: s390: selftest: memop: Pass mop_desc via pointer
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 9/9] KVM: s390: selftest: memop: Fix wrong address being used in test
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 2/9] Documentation: KVM: s390: Describe KVM_S390_MEMOP_F_CMPXCHG
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 0/9] KVM: s390: Extend MEM_OP ioctl by storage key checked cmpxchg
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- [PATCH v4 8/9] KVM: s390: selftest: memop: Fix typo
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Harsh Prateek Bora <harshpb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/4] lib: add function to request migration
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH V1 2/2] vfio/type1: prevent locked_vm underflow
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V1 1/2] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH V1 0/2] fixes for virtual address update
- From: Steve Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH 7/7] s390/vfio_ap: always clean up IRQ resources
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 6/7] s390/vfio_ap: increase max wait time for reset verification
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 5/7] s390/vfio_ap: fix handling of error response codes
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 4/7] s390/vfio_ap: verify ZAPQ completion after return of response code zero
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 2/7] s390/vfio_ap: check TAPQ response code when waiting for queue reset
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 1/7] s390/vfio-ap: verify reset complete in separate function
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 3/7] s390/vfio_ap: use TAPQ to verify reset in progress completes
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- [PATCH 0/7] improve AP queue reset processing
- From: Tony Krowiak <akrowiak@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 0/4] lib: add function to request migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH iommufd v2 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Janis Schoetterl-Glausch <scgl@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- [PATCH] kvm: x86/mmu: Remove FNAME(is_self_change_mapping)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH-for-8.0 4/4] hw/ppc/spapr_ovec: Avoid target_ulong spapr_ovec_parse_vector()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 3/4] hw/ppc/spapr: Reduce "vof.h" inclusion
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 2/4] hw/ppc/vof: Do not include the full "cpu.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 1/4] target/ppc/kvm: Add missing "cpu.h" and "exec/hwaddr.h"
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- [PATCH-for-8.0 0/4] ppc: Clean up few headers to make them target agnostic
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v2] KVM: MMU: Make the definition of 'INVALID_GPA' common.
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/14] KVM: selftests: Define literal to asm constraint in aarch64 as unsigned long
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 07/14] KVM: selftests: Use proper function prototypes in probing code
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 05/14] KVM: selftests: Fix a typo in x86-64's kvm_get_cpu_address_width()
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH 03/14] KVM: selftests: Fix divide-by-zero bug in memslot_perf_test
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: Use the common definition - 'GPA_INVALID' for X86
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [PATCH] kvm: kvm_main: Remove unnecessary (void*) conversions
- From: Li kunyu <kunyu@xxxxxxxxxxxx>
- Re: [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- [PATCH net-next v6] virtio/vsock: replace virtio_vsock_pkt with sk_buff
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxxxxxx>
- Re: [PATCH V2 00/12] ifcvf/vDPA implement features provisioning
- From: "Zhu, Lingshan" <lingshan.zhu@xxxxxxxxx>
- [PATCH v2 4/4] KVM: selftests: Test KVM's handling of VMX's sec exec MSR on KVM_SET_CPUID
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/4] KVM: nVMX: Don't muck with allowed sec exec controls on CPUID changes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/4] KVM: nVMX: Don't stuff secondary execution control if it's not supported
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/4] KVM: nVMX: Fix 2nd exec controls override goofs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/4] KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 7/7] KVM: VMX: Handle NMI VM-Exits in noinstr region
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 6/7] KVM: VMX: Provide separate subroutines for invoking NMI vs. IRQ handlers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/7] x86/entry: KVM: Use dedicated VMX NMI entry for 32-bit kernels too
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/7] KVM: VMX: Always inline to_vmx() and to_kvm_vmx()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/7] KVM: VMX: Always inline eVMCS read/write helpers
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/7] KVM: VMX: Allow VM-Fail path of VMREAD helper to be instrumented
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/7] KVM: x86: Make vmx_get_exit_qual() and vmx_get_intr_info() noinstr-friendly
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/7] KVM: VMX: Handle NMI VM-Exits in noinstr section
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: Use the common definition - 'GPA_INVALID' for X86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: linux-next: build warning after merge of the kvm tree
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- linux-next: build warning after merge of the kvm tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 0/5] KVM: x86/mmu: TDP MMU fixes for 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 3/5] KVM: x86/mmu: Re-check under lock that TDP MMU SP hugepage is disallowed
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 4/5] KVM: x86/mmu: Don't install TDP MMU SPTE if SP has unexpected level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 1/5] KVM: x86/mmu: Don't attempt to map leaf if target TDP MMU SPTE is frozen
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 5/5] KVM: x86/mmu: Move kvm_tdp_mmu_map()'s prolog and epilog to its caller
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 2/5] KVM: x86/mmu: Map TDP MMU leaf SPTE iff target level is reached
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Re: [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 14/14] KVM: selftests: Enable RSEQ test for RISC-V
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 13/14] KVM: selftests: Use wildcards to find targets and test source files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 07/14] KVM: selftests: Use proper function prototypes in probing code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 06/14] KVM: selftests: Rename UNAME_M to ARCH_DIR, fill explicitly for x86
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 11/14] KVM: selftests: Disable "gnu-variable-sized-type-not-at-end" warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 08/14] KVM: selftests: Probe -no-pie with actual CFLAGS used to compile
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 09/14] KVM: selftests: Explicitly disable builtins for mem*() overrides
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 12/14] KVM: selftests: Use wildcards to find library source files
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 10/14] KVM: selftests: Include lib.mk before consuming $(CC)
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 04/14] KVM: selftests: Use pattern matching in .gitignore
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 03/14] KVM: selftests: Fix divide-by-zero bug in memslot_perf_test
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 02/14] KVM: selftests: Delete dead code in x86_64/vmx_tsc_adjust_test.c
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 05/14] KVM: selftests: Fix a typo in x86-64's kvm_get_cpu_address_width()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 00/14] KVM: selftests: Clang fixes, Makefile cleanup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH 01/14] KVM: selftests: Define literal to asm constraint in aarch64 as unsigned long
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 04/37] KVM: x86/mmu: Invert sp->tdp_mmu_page to sp->shadow_mmu_page
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RFC PATCH 33/37] KVM: Move kvm_arch_flush_remote_tlbs_memslot() to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Ricardo Koller <ricarkol@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [GIT PULL] First batch of KVM changes for Linux 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nina Schoetterl-Glausch <nsg@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Pawan Gupta <pawan.kumar.gupta@xxxxxxxxxxxxxxx>
- RE: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH 20/37] KVM: x86/mmu: Abstract away computing the max mapping level
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 17/37] KVM: Move struct kvm_gfn_range to kvm_types.h
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- RE: [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH iommufd v2 7/9] iommu/x86: Replace IOMMU_CAP_INTR_REMAP with IRQ_DOMAIN_FLAG_ISOLATED_MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 8/9] irq/s390: Add arch_is_isolated_msi() for s390
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 9/9] iommu: Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 1/9] irq: Add msi_device_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 6/9] irq: Rename IRQ_DOMAIN_MSI_REMAP to IRQ_DOMAIN_ISOLATED_MSI
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 4/9] iommufd: Convert to msi_device_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 3/9] vfio/type1: Convert to iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 2/9] iommu: Add iommu_group_has_isolated_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH iommufd v2 5/9] irq: Remove unused irq_domain_check_msi_remap() code
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [Patch v4 13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 09/13] KVM: x86: hyper-v: Add extended hypercall support in Hyper-v
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 10/13] KVM: selftests: Test Hyper-V extended hypercall enablement
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 12/13] KVM: selftests: Make vCPU exit reason test assertion common.
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 08/13] KVM: x86: hyper-v: Use common code for hypercall userspace exit
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 11/13] KVM: selftests: Replace hardcoded Linux OS id with HYPERV_LINUX_OS_ID
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 04/13] KVM: selftests: Rename 'msr->available' to 'msr->fault_exepected' in hyperv_features test
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 07/13] KVM: selftests: Test Hyper-V invariant TSC control
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 06/13] KVM: selftests: Test that values written to Hyper-V MSRs are preserved
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 03/13] KVM: x86: Hyper-V invariant TSC control
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 05/13] KVM: selftests: Convert hyperv_features test to using KVM_X86_CPU_FEATURE()
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 02/13] KVM: x86: Add a KVM-only leaf for CPUID_8000_0007_EDX
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 01/13] x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [Patch v4 00/13] Add Hyper-v extended hypercall support in KVM
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- [GIT PULL] Please pull IOMMUFD subsystem changes
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 10/37] KVM: MMU: Move struct kvm_page_fault to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 06/37] KVM: MMU: Move struct kvm_mmu_page to common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- RE: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH 02/37] KVM: MMU: Move struct kvm_mmu_page_role into common code
- From: Ben Gardon <bgardon@xxxxxxxxxx>
- Re: [RFC PATCH vfio 0/7] pds vfio driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [GIT PULL] First batch of KVM changes for Linux 6.2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [Patch v3 12/13] KVM: selftests: Make vCPU exit reason test assertion common.
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- [GIT PULL] First batch of KVM changes for Linux 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- [PATCH 2/2] kvm: x86/mmu: Remove useless shadow_host_writable_mask
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- [PATCH 1/2] kvm: x86/mmu: Reduce the update to the spte in FNAME(sync_page)
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [PATCH 0/2] Fix "Instructions Retired" from incorrectly counting
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH 1/1] virtio/vsock: Make vsock virtio packet buff size configurable
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.2
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH RFC 4/8] KVM: x86/pmu: Add Intel CPUID-hinted Topdown Slots event
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 6/8] KVM: x86/pmu: properly use INTEL_PMC_FIXED_RDPMC_BASE macro
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 8/8] KVM: x86/pmu: Add MSR_PERF_METRICS MSR emulation to enable Topdown
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 7/8] KVM: x86/pmu: Use flex *event arrays to implement grouped events
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 5/8] KVM: x86/pmu: Add kernel-defined slots event to enable Fixed Counter3
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 3/8] perf: x86/core: Snyc PERF_METRICS bit together with fixed counter3
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 2/8] perf: x86/core: Expose the available number of the Topdown metrics
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 1/8] perf/core: Add *group_leader to perf_event_create_kernel_counter()
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- [PATCH RFC 0/8] KVM: x86/pmu: Enable Fixed Counter3 and Topdown Perf Metrics
- From: Like Xu <like.xu.linux@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH v3 3/4] s390x: use migrate_once() in migration tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [kvm-unit-tests PATCH v3 2/4] powerpc: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 4/4] arm: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 3/4] s390x: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 1/4] lib: add function to request migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v3 0/4] lib: add function to request migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Major Saheb <majosaheb@xxxxxxxxx>
- Re: [PATCH v13 2/7] s390x/cpu topology: reporting the CPU topology to the guest
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] kvm: x86/mmu: Warn on linking when sp->unsync_children
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [PATCH v13 1/7] s390x/cpu topology: Creating CPU topology device
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- [PATCH V2] kvm: Remove the unused macro KVM_MMU_READ_[UN]LOCK()
- From: Lai Jiangshan <jiangshanlai@xxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: vfio-pci rejects binding to devices having same pcie vendor id and device id
- From: Zhenzhong Duan <zhenzhong.duan@xxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: Mingwei Zhang <mizhang@xxxxxxxxxx>
- Found a memory leak in kvm module
- From: 柳菁峰 <liujingfeng@xxxxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: "Rao, Lei" <lei.rao@xxxxxxxxx>
- Re: [RFC PATCH vfio 0/7] pds vfio driver
- From: Brett Creeley <bcreeley@xxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Pierre Morel <pmorel@xxxxxxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: "Rao, Lei" <lei.rao@xxxxxxxxx>
- Re: [RFC PATCH vfio 0/7] pds vfio driver
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: Max Gurtovoy <mgurtovoy@xxxxxxxxxx>
- Re: [Patch v3 13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [RFC PATCH 9/9] x86/kvm/vmx: Initialize SPEC_CTRL MASK for BHI
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 7/9] kvm/x86: Add MSR_VIRTUAL_MITIGATION_ENUM/CTRL emulation
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 8/9] x86/kvm/vmx: Initialize SPEC_CTRL MASK for RRSBA
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 3/9] KVM: x86: Add a kvm-only leaf for BHI_CTRL
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 6/9] kvm/x86: Add ARCH_CAP_VIRTUAL_ENUM for guest MSR_IA32_ARCH_CAPABILITIES
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 1/9] x86/speculation: Introduce Intel SPEC_CTRL BHI related definition
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 4/9] x86/kvm/vmx: Virtualize Intel IA32_SPEC_CTRL
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 5/9] x86/bugs: Use Virtual MSRs to request hardware mitigations
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 2/9] KVM: x86: Add a kvm-only leaf for RRSBA_CTRL
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- [RFC PATCH 0/9] Intel SPEC CTRL virtualization support
- From: Zhang Chen <chen.zhang@xxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [Patch v3 12/13] KVM: selftests: Make vCPU exit reason test assertion common.
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v3 13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 3/7] KVM: x86/MMU: Move gfn_to_rmap() to rmap.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 7/7] KVM: x86/MMU: Move rmap_add() to rmap.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 0/7] KVM: x86/MMU: Factor rmap operations out of mmu.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 2/7] KVM: x86/MMU: Move rmap_iterator to rmap.h
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 6/7] KVM: x86/MMU: Move rmap zap operations to rmap.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH 1/7] KVM: x86/MMU: Move pte_list operations to rmap.c
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 13/13] KVM: selftests: Test Hyper-V extended hypercall exit to userspace
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v3 12/13] KVM: selftests: Make vCPU exit reason test assertion common.
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH v4 0/2] Deprecate BUG() in pte_list_remove() in shadow mmu
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: selftests: Fix a typo in the vcpu_msrs_set assert
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH] KVM: selftests: Fix a typo in the vcpu_msrs_set assert
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- [PATCH 2/2] KVM: selftests: Test the PMU event "Instructions retired"
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 1/2] KVM: x86/pmu: Prevent the PMU from counting disallowed events
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- [PATCH 0/2] Fix "Instructions Retired" from incorrectly counting
- From: Aaron Lewis <aaronlewis@xxxxxxxxxx>
- Re: [PATCH 1/1] virtio/vsock: Make vsock virtio packet buff size configurable
- From: Carlos Llamas <cmllamas@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v10 016/108] KVM: TDX: create/destroy VM structure
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [RFC PATCH 00/37] KVM: Refactor the KVM/x86 TDP MMU into common code
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- RE: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH] vfio/type1: Cleanup remaining vaddr removal/update fragments
- From: Steven Sistare <steven.sistare@xxxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH 1/3] arm: pmu: Fix overflow checks for PMUv3p5 long counters
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [RFC PATCH 23/37] KVM: MMU: Move VM-level TDP MMU state to struct kvm
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: "Li, Yadong" <yadong.li@xxxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 2/2] arm/psci: Add PSCI_CPU_OFF testscase to arm/psci testsuite
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH 1/2] arm/psci: Test that CPU 1 has been successfully brought online
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [kvm-unit-tests PATCH v2 3/4] s390x: use migrate_once() in migration tests
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH v13 2/7] s390x/cpu topology: reporting the CPU topology to the guest
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [kvm-unit-tests PATCH v2 1/4] lib: add function to request migration
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 4/7] s390x/cpu_topology: CPU topology migration
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH v13 1/7] s390x/cpu topology: Creating CPU topology device
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Cédric Le Goater <clg@xxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd 1/9] irq: Add msi_device_has_secure_msi()
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v13 1/7] s390x/cpu topology: Creating CPU topology device
- From: Thomas Huth <thuth@xxxxxxxxxx>
- [kvm-unit-tests PATCH v2 4/4] arm: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 3/4] s390x: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 1/4] lib: add function to request migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/4] lib: add function to request migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 2/4] powerpc: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v13 0/7] s390x: CPU Topology
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 2/4] powerpc: use migrate_once() in migration tests
- From: Thomas Huth <thuth@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 4/4] arm: use migrate_once() in migration tests
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [kvm-unit-tests v2 PATCH] s390x: sie: Test whether the epoch extension field is working as expected
- From: Claudio Imbrenda <imbrenda@xxxxxxxxxxxxx>
- Re: [PATCH iommufd 2/9] vfio/type1: Check that every device supports IOMMU_CAP_INTR_REMAP
- From: Robin Murphy <robin.murphy@xxxxxxx>
- [kvm-unit-tests PATCH v2 1/1] s390x: add parallel skey migration test
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- [kvm-unit-tests PATCH v2 0/1] s390x: test storage keys during migration
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH v1 1/3] s390x: add library for skey-related functions
- From: Nico Boehr <nrb@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- Re: [GIT PULL] KVM/riscv changes for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [GIT PULL] KVM/arm64 updates for 6.2
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] KVM: X86: set EXITING_GUEST_MODE as soon as vCPU exits
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm: x86/mmu: Remove duplicated "be split" in spte.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] kvm: Remove the unused macro KVM_MMU_READ_LOCK()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v3 7/8] target/i386/intel-pt: Define specific PT feature set for IceLake-server and Snowridge
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v3 6/8] target/i386/intel-pt: Enable host pass through of Intel PT
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- [PATCH v8 14/16] x86/virt/tdx: Initialize all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 13/16] x86/virt/tdx: Configure global KeyID on all packages
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 15/16] x86/virt/tdx: Flush cache in kexec() when TDX is enabled
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 16/16] Documentation/x86: Add documentation for TDX host support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 11/16] x86/virt/tdx: Designate reserved areas for all TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 12/16] x86/virt/tdx: Designate the global KeyID and configure the TDX module
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 10/16] x86/virt/tdx: Allocate and set up PAMTs for TDMRs
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 09/16] x86/virt/tdx: Fill out TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 08/16] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 07/16] x86/virt/tdx: Use all system memory when initializing TDX module as TDX memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 06/16] x86/virt/tdx: Get information about TDX module and TDX-capable memory
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 05/16] x86/virt/tdx: Implement functions to make SEAMCALL
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 04/16] x86/virt/tdx: Add skeleton to initialize TDX on demand
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 03/16] x86/virt/tdx: Make INTEL_TDX_HOST depend on X86_X2APIC
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 01/16] x86/tdx: Define TDX supported page sizes as macros
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 02/16] x86/virt/tdx: Detect TDX during kernel boot
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v8 00/16] TDX host kernel support
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v3 4/8] target/i386/intel-pt: print special message for INTEL_PT_ADDR_RANGES_NUM
- From: Chenyi Qiang <chenyi.qiang@xxxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH iommufd 4/9] iommufd: Convert to msi_device_has_secure_msi()
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH v3 9/9] KVM: x86: LAM: Expose LAM CPUID to user space VMM
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 8/9] KVM: x86: When guest set CR3, handle LAM bits semantics
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 7/9] KVM: x86: When judging setting CR3 valid or not, consider LAM bits
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 6/9] KVM: x86: Untag LAM bits when applicable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 5/9] KVM: x86: MMU: Integrate LAM bits when build guest CR3
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 4/9] KVM: x86: MMU: Commets update
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 3/9] KVM: x86: MMU: Rename get_cr3() --> get_pgd() and clear high bits for pgd
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 2/9] KVM: x86: Add CR4.LAM_SUP in guest owned bits
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 1/9] KVM: x86: Rename cr4_reserved/rsvd_* variables to be more readable
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH v3 0/9] Linear Address Masking (LAM) KVM Enabling
- From: Robert Hoo <robert.hu@xxxxxxxxxxxxxxx>
- [PATCH kernel v2 3/3] x86/sev: Do not handle #VC for DR7 read/write
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel v2 1/3] x86/amd: Cache values in percpu variables
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel v2 2/3] KVM: SEV: Enable data breakpoints in SEV-ES
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- [PATCH kernel v2 0/3] KVM: SEV: Enable AMD SEV-ES DebugSwap
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [PATCH 6/9] RISC-V: Export sbi_get_mvendorid() and friends
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- [PATCH] KVM: X86: Use the common definition - 'GPA_INVALID' for X86
- From: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx>
- RE: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Re: [RFC PATCH 01/37] KVM: x86/mmu: Store the address space ID directly in kvm_mmu_page_role
- From: "Yang, Weijiang" <weijiang.yang@xxxxxxxxx>
- Re: [PATCH kernel 2/3] KVM: SEV: Enable DebugSwap
- From: Alexey Kardashevskiy <aik@xxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [RFC PATCH 1/5] nvme-pci: add function nvme_submit_vf_cmd to issue admin commands for VF driver.
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- RE: [RFC PATCH 5/5] nvme-vfio: Add a document for the NVMe device
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- [PATCH v2 7/7] KVM: selftests: Avoid infinite loop if ucall_alloc() fails
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 6/7] KVM: selftests: Allocate ucall pool from MEM_REGION_DATA
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 5/7] KVM: arm64: selftests: Don't identity map the ucall MMIO hole
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 4/7] KVM: selftests: Correctly initialize the VA space for TTBR0_EL1
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 3/7] KVM: selftests: Mark correct page as mapped in virt_map()
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 2/7] KVM: selftests: Setup ucall after loading program into guest memory
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 1/7] KVM: selftests: Fix build due to ucall_uninit() removal
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- [PATCH v2 0/7] KVM: selftests: Fixes for ucall pool + page_fault_test
- From: Oliver Upton <oliver.upton@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: use unified srcu interface function
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: hyper-v: Fix 'using uninitialized value' Coverity warning
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: selftests: Setup ucall after loading program into guest memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 24/32] KVM: x86: Inhibit APICv/AVIC if the optimized physical map is disabled
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 27/32] KVM: SVM: Update svm->ldr_reg cache even if LDR is "bad"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH iommufd 2/9] vfio/type1: Check that every device supports IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v2 0/2] NUMA aware page table allocation
- From: David Matlack <dmatlack@xxxxxxxxxx>
- Re: [Patch v2 2/2] KVM: x86/mmu: Allocate page table pages on NUMA node of underlying pages
- From: David Matlack <dmatlack@xxxxxxxxxx>
- [PATCH v10 062/108] KVM: x86/tdp_mmu: implement MapGPA hypercall for TDX
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH iommufd 0/9] Remove IOMMU_CAP_INTR_REMAP
- From: Matthew Rosato <mjrosato@xxxxxxxxxxxxx>
- [RFC PATCH v2 13/15] KVM: x86/tdp_mmu: TDX: Implement merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 11/15] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 15/15] KVM: TDX: Allow 2MB large page for TD GUEST
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 12/15] KVM: x86/tdp_mmu: Try to merge pages into a large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 14/15] KVM: x86/mmu: Make kvm fault handelr aware of large page of private memslot
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 10/15] KVM: x86/tdp_mmu: Split the large page when zap leaf
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 02/15] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 05/15] KVM: TDX: Pass size to reclaim_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 04/15] KVM: TDX: Pass size to tdx_measure_page()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 03/15] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 08/15] KVM: TDX: Pin pages via get_page() right before ADD/AUG'ed to TDs
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 09/15] KVM: TDX: Pass desired page level in err code for page fault handler
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 06/15] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 01/15] KVM: TDP_MMU: Go to next level if smaller private mapping exists
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 07/15] KVM: MMU: Introduce level info in PFERR code
- From: isaku.yamahata@xxxxxxxxx
- [RFC PATCH v2 00/15] KVM TDX: TDP MMU: large page support
- From: isaku.yamahata@xxxxxxxxx
- Re: [PATCH v7 11/20] x86/virt/tdx: Add placeholder to construct TDMRs to cover all TDX memory regions
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [Patch v2 1/2] KVM: x86/mmu: Allocate page table pages on TDP splits during dirty log enable on the underlying page's numa node
- From: Vipin Sharma <vipinsh@xxxxxxxxxx>
- Re: [PATCH V1 1/8] vfio: delete interfaces to update vaddr
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v2] samples: vfio-mdev: Fix missing pci_disable_device() in mdpy_fb_probe()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH 1/2] vfio/mlx5: fix error code in mlx5vf_precopy_ioctl()
- From: Alex Williamson <alex.williamson@xxxxxxxxxx>
- Re: [PATCH v4 32/32] KVM: x86: Track required APICv inhibits with variable, not callback
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 03/32] KVM: SVM: Flush the "current" TLB when activating AVIC
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 31/32] Revert "KVM: SVM: Do not throw warning when calling avic_vcpu_load on a running vcpu"
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Scanners]
[Linux SCSI]
[Samba]
[Yosemite News]